Notes Checkpoint CLI Commands

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16
At a glance
Powered by AI
Some useful Check Point CLI commands and their descriptions are provided in the document. Commands like cpconfig, cphaprob, cpstat can be used to manage licenses, display statistics, and check the state of firewall services.

The cpconfig command can be used to change licenses, SNMP settings and other configuration options. The cphaprob commands display HA statistics and state. The cpstat commands display firewall, HA and OS status information.

The cphaprob stat command can be used to list the state of high availability cluster members and show the active and standby devices.

Useful Check Point CLI commands

Useful Check Point commands. Check Point commands generally come under cp (general) and
fw (firewall)
Useful CP Commands
Command

Description
change SIC, licenses and more

cpconfig

Configuration Options:
---------------------(1) Licenses and contracts
(2) SNMP Extension
(3) PKCS#11 Token
(4) Random Pool
(5) Secure Internal Communication
(6) Disable cluster membership for this gateway
(7) Enable Check Point Per Virtual System State
(8) Enable Check Point ClusterXL for Bridge Active/Standby
(9) Disable Check Point SecureXL
(10) Check Point CoreXL
(11) Automatic start of Check Point Products
(12) Exit

cphaprob ldstat

display sync serialization statistics


[Expert@hslcpgw1:0]# cphaprob ldstat
Operand
Calls
Bytes Average Ratio %
------------------------------------------------------ERROR
0 0
0
0
SET
26980814 1776154904
65
0
RENAME
0 0
0
0
REFRESH
19848463 1032728680
52
0
DELETE
16820120 641096828
38
2
SLINK
89543176 1435809728
16
0
UNLINK
0 0
0
0
MODIFYFIELDS
73078451 1258994980
17
0
RECORD DATA CONN 36464
11236616
308 0
COMPLETE DATA CONN 36311 28619855
788 1

Total bytes sent: 4026983060 (4026 MB) in 28619855 packets. Average


140
list the state of the high availability cluster members. Should show active
and standby devices.
[Expert@hslcpgw1:0]# cphaprob stat
cphaprob stat

Cluster Mode: High Availability (Active Up) with IGMP Membership


Number

Unique Address Assigned Load State

1 (local) 1.1.1.1
2
1.1.1.2
cphaprob syncstat

100%
0%

Active
Standby

display sync transport layer statistics


Sync Statistics (IDs of F&A Peers - None):
Other Member Updates:
Sent retransmission requests................... 4791
Avg missing updates per request................ 2
Old or too-new arriving updates................ 7825
Unsynced missing updates....................... 0
Lost sync connection (num of events)........... 499
Timed out sync connection ..................... 0
Local Updates:
Total generated updates ....................... 29778776
Recv Retransmission requests................... 4296
Recv Duplicate Retrans request................. 0
Blocking Events................................ 0
Blocked packets................................ 0
Max length of sending queue.................... 0
Avg length of sending queue.................... 0
Hold Pkts events............................... 1242
Unhold Pkt events.............................. 1242
Not held due to no members..................... 36857
Max held duration (sync ticks)................. 0
Avg held duration (sync ticks)................. 0
Timers:
Sync tick (ms)................................. 100
CPHA tick (ms)................................. 100

Queues:
Sending queue size............................. 512
Receiving queue size........................... 256
cphastop

stop a cluster member from passing traffic. Stops synchronization.


(emergency only)

cplic print

license information

cpstart

start all checkpoint services

cpstat fw

show policy name, policy install time and interface table


high availability state

cpstat ha

Product name: High Availability


Version: N/A
Status:
OK
HA installed: 1
Working mode: High Availability (Active Up)
HA started: yes

cpstat os -f all

checkpoint interface address, routing table, version, memory status, cpu


load, disk space

cpstat os -f cpu

checkpoint cpu status

cpstat os -f routing

checkpoint routing table

cpstop

stop all checkpoint services


list processes actively monitored. Firewall should contain cpd and vpnd.

cpwd_admin
monitor_list

[Expert@hslcpgw1:0]# cpwd_admin monitor_list


cpwd_admin:
APP
FILE_NAME
NO_MSG_TIMES
LAST_MSG_TIME
vpnd
vpnd_32730_434190160.mntr 0/6
[14:58:21]
29/7/2015
CPD
CPD_31828_434188288.mntr
0/10
[14:58:18]
29/7/2015
Table 1. Useful CP Commands

Useful FW Commands
Command

Description
show interface names

fw ctl iflist

[Expert@hslcpgw1:0]# fw ctl iflist


1 : eth1-01
2 : eth1-02
5 : eth5
6 : eth1
7 : eth6
8 : eth2
9 : eth7
10 : eth3
11 : Mgmt

fw ctl pstat

show control kernel memory and connections

fw exportlog -o

export the current log file to ascii

fw fetch <manager IP>

get the policy from the firewall manager

fw log

show the content of the connections log

fw log -b <MMM DD, YYYY


HH:MM:SS> <MMM DD, YYYY
HH:MM:SS>

search the current log for activity between specific


times, eg

fw log -c drop

search for dropped packets in the active log; also


can use accept or reject to search

fw log -f

tail the current log

fwm logexport -i <log name> -o <output


name>

export an old log file on the firewall manager

fw logswitch

rotate logs

fw lslogs

list firewall logs

fw stat

firewall status, should contain the name of the


policy and the relevant interfaces.

fw stat -l

show which policy is associated with which


interface and package drop, accept and reject

fw tab

displays firewall tables

fw tab -s -t connections

number of connections in state table

fw tab -t xlate -x

clear all translated entries

fw unloadlocal

clear local firewall policy

fw ver

firewall version

uname -a

Management server IPSO version

Backup
1. Login cli the firewall just command Backup
Login management server via cli command
# cd $FWDIR/bin/upgrade_tools
# ./upgrade_export filename
Example : ./upgrade_export 28_july_15.tgz
To Import
# cd $FWDIR/bin/upgrade_tools
# ./upgrade_import filename

Table 1.
General checkpoint, IPSO commands

Description

ipsctl hw:eeprom:product_id

Show Product Id. on IPSO

ipsctl hw:eeprom:serial_number

Show Serial No. on IPSO

uname -a

Show IPSO Version

ipsofwd list

show forwarding option on IPSO

[admin]# ipsofwd list


example for forwarding options
net:ip:forward:noforwarding = 0
net:ip:forward:noforwarding_author = fwstart

net:ip:forward:switch_mode = flowpath
net:ip:forwarding = 1
ipsofwd on username

set forwarding on if firewall stopped

ipsctl -w net:log:partner:status:debug 1

enable interface debugging


(sk41089)

ipsctl -w net:log:sink:console 0

disable debugging

Table 2.
Firewall Commands
fw ver

Show Firewall Version

vpn macutil

Generate MAC Address for users. This


can be used to fix an IP in DHCP
Server.

cpstat polsrv -f all

Show the connected and the licensed


users

cpstat fw -f http, ftp, telnet, rlogin, smtp,


pop3

Check protocol states.

fw stat

Show policy name and the interfaces


that have already seen any traffic.

fw stat -long

Shows the policy and the stats for


the policy

cpstat os -f cpu -o 3

Monitor CPU state every 3 seconds

-o Polling interval (seconds) specifies the


cpstat useful parameters
pace of the results. Default is 0, meaning the
results are shown only once.
-c Specifying how many times the results are
shown. Default is 0, meaning the results are
repeatedly shown.
cpstat os

Show SVN Foundation and OS Version

cpstat fw -f all

Product, Policy und Status

informations
cpstat fw -f policy

Show Installed Policy name

fw tab -t connections -s

Show active connections

fw fetch

Install Policy from MGM server

cplic print

Print licenses

fwha_mac_magic

Connecting multiple clusters to the


same network segment (same VLAN,
same switch) sk25977

cp_conf sic state

SIC test on the firewall

cp_conf sic init <Activation Key> [norestart]

SIC reset on the firewall

fw ctl zdebug drop | grep 1.1.1.1

check dropped packets on the


firewall for host 1.1.1.1

Table 3.
Sniffer on the Firewall
fw monitor -m iIoO -e accept (src=IP_S and
dst=_IP_D) or (src=IP_D and dst=IP_S);

Monitor traffic between host


with IP IP_S and host with IP
IP_D

fw monitor -m iIoO -e accept (src=IP_S and


dst=_IP_D) or (src=IP_D and dst=IP_S); -ow
monitor_cat.cap

not just monitor but save as


capture to a file

fw monitor -m iIoO -e accept (src=IP_S and


dst=_IP_D) or (src=IP_D and dst=IP_S); -p all -a -o
Datei.cap

not just monitor but save


capture to a file + deeper
debug

fw monitor -m iIoO -e accept (sport=5200 or


sport=5100 or sport=5000);

Monitor traffic on the source


port 5200, 5100 or 5000

Table 4.
Remote Access and S2S VPN
commands

vpn tu

vpn tunnel util, for VPN checking, delete

fw tab -t inbound_SPI -f

List SPI and users (external IP, office mode IP,


username, DN of a user in case of certificate
auth)

fw tab -t om_assigned_ips -f

List users and assigned Office mode IPs

fw tab -t marcipan_ippool_users -f List Office Mode used IPs


fw tab -t om_assigned_ips -f -m
Lists office mode Ip fore 2000 users (use -u for
2000 | awk {print $7,$11} | grep unlimited number)
-v ^
fw tab -t marcipan_ippool_users -x used to manually clear the Office Mode
connections table on the Gateway
vpn debug trunc

initiates both vpn debug and ike debug

vpn debug on
TDERROR_ALL_ALL=5

initiates vpn debug on the level of detail


provided by TDERROR_ALL_ALL=5. Output file is
$FWDIR/log/vpnd.elg

vpn debug ikeon

initiates vpn ike debug. Output file is


$FWDIR/log/ike.elg

vpn debug mon

Writes ike traffic unecrypted to a file. The output


file is ikemonitor.snoop. In this output file, all the
IKE payloads are in clear

vpn debug ikeof

Stops ike debug. Get ikeviewer to check the ike


traffic and log.

vpn debug of

Stops vpn debug

vpn debug mof

Stops ike snifer

vpn export_12 -obj <objectname> export a certificate using the Security


-cert <certificatename>
Management server. certificate object is the
-file <filename> -passwd
Certificakte Nickname from the GUI.
<passw>
Example:
vpn export_p12 -obj Office_GW
-cert defaultCert
file office_cert.p12 -passwd
mypassword

Table 5.

Clustering
commands
cphaprob list

Show processes monitored by HA

cpstat fw -f sync

Show counters for sync traffic

cphaprob state

Show cluster mode and status

cpstat ha -f all

Show HA process and HA IP status

fw ctl pstat

Show memory, kernel stacks, connections, fragments,, SYNC


status

cphaprob -a if

Show Sync interface(s) and HA IP(s)

cphaprob syncstat

Show Sync statistics

fw hastat

Show HA stat ONLY by ClusterXL! not with VRRP

Table 6.
General commands
ps -aux

Report all active processes in the kernel IPSO

kill -9 prozessid

Stop a process

dmesg

show boot logs

vmstat 5 5

show memory, cpu usage

ifconfig bge1:xx down

set virtual Interface on Provider1 down

fsck

Filsystemcheck

Table 7.
Administrate CMA/MDS
processes
mdsstop_customer

Stop a CMA

mdsstart_customer

Start a CMA

mdsstat

Shows MDS and CMA Status

mdsstop

Stops all CMAs und Server processes

mdsstart

Start all CMAs und Server processes

mdsenv CMANAME

Change the Enviroment to selected CMA

echo $FWDIR

This displays the correct path for the CMA.

cpstat mg

check the connected clients (with Provider1 in the CMA


Level: mdsenv <CMA-IP>)

fwm -a

Change admin password (or cpconfig delete admin and


add admin)

fwm dbload

Install database

watch -d cpstat os -f
cpu

Monitor cpu state with watch

Table 8.
Searching for objects

What you cannot find whit


cross CMA search

cd $FWDIR/conf
grep subdomain objects.C | grep -v Name | awk
{print $2} | grep ^( | sed -e s/(//

Searching all objects with


subdomain subdomain in
their name

cd $FWDIR/conf
grep subdomain /opt/CPmds-R65/customers/*/CPsuiteR65/fw1/conf/objects.C | grep -v Name | awk {print
$1, $3} | grep ( | sed -e s/(//

Searching all objects in all


firewalls (in MDS) with
subdomain subdomain in
their name

grep 2.2.2.2\|3.3.3.3 /opt/CPmdsR65/customers/*/CPsuite-R65/fw1/conf/objects_5_0.C

find the 2 IP Address in the


firewall configs

grep hostimiss.com /opt/CPmdsR65/customers/*/CPsuiteR65/fw1/conf/rulebases_5_0.fws

find the hostname in the


firewall rulebase configs

Table 9.

Archive commands
tar tfv [ARCHIVNAME].tar

Show the content of an archive

tar cfvz [ARCHIVNAME].tar.gz [VERZEICHNIS1] Archive files


[DATEI1]
tar xfvz [ARCHIVNAME].tar.gz

open archive

SCP command
scp root@provider1:/opt/CPmdsR65/customers/cma1/CPsuiteR65/fw1/conf/objects_5_0.C .

copy the objects_5_0.C file to the


lokal folder from where the
command was issued

Collect info for Checkpoint TAC


cpinfo [-v] [-l] [-n] [-o ] [-r | -t [tablename]] [-c cma | -x vs]* -z: Output gzipped
(efective with -o option).
* -r: Includes the registry (Windows very large output).
* -v: Prints version information.
* -l: Embeds log records (very large output).
* -n: Does not resolve network addresses (faster)
* -t: Output consists of tables only (SR only).
* -c: Get information about the specified CMA (Provider-1).
* -x: Get information about the specified VS (VSX).

And some example for cpinfo.


CPinfo Options:
cpinfo [-v] [-l] [-n] [-o output_file] [-r | -t [tablename]] [-c cma/ctx]-o output_file
(Redirect output into file output_file)
-r (Include the registry in the output)
-v (Print version information)
-l (Embed Log records)
-n (Do not resolve network addresses)
-t (Output consists of tables only (SR only)
-c (Get information about the specified cma/ctx)
(No parameters): Redirects output to the standard output (the command
window).Required steps to get the cpinfo from mds:1. Back to MDS
# mdsenv
2. Verify the correct environment
# echo $FWDIR
/opt/CPmds-R65/

3. Run cpinfo
# cpinfo -z -n -o /var/mds.cpinfoRequired steps for cpinfo from the relevant CMA
(sk10176)1. List of all Customers (CMAs)
# mdsstat
2. Set the environment for the Customer
# mdsenv CMANAME
3. Verify the correct environment
# echo $FWDIR
/opt/CPmds-R65/customers//CPsuite-R65/fw1/
4. Run cpinfo
# cpinfo -c CMANAME -z -n -o FILENAME

Checkpoint logging in short.


VPN-1/FireWall-1 NG includes the following log type files:- FWDIR/log/xx.log stores
the log records.
FWDIR/log/xx.logptr provides pointers to the beginning of each log record.
FWDIR/log/xx.loginitial_ptr provides pointers to the beginning of each log chain
(logs that share the same connection ID LUUID).
FWDIR/log/xx.logaccount_ptr provides pointers to the beginning of each
accounting record.
Note: the NG log directory also includes an additional temporary pointer file,
named xx.logLuuidDB.To purge/delete the current log files without saving it to a
backup file, run:
# fw logswitch The VPN-1/FireWall-1 NG audit log type files are:- xx.adtlog
stores the audit log records.
xx.adtlogptr provides pointers to the beginning of each log records.
xx.adtloginitial_ptr provides pointers to the beginning of each log chain (logs
that shared the same connection ID LUUID).
xx.adtlogaccount_ptr provides pointers to the beginning of each accounting
record.To purge/delete the current audit log files without saving it to a backup file,
run:
# fw logswitch -audit

This is an example how to collect the same info (the fw version here) from all of our firewall
with a script.
We need to collect the firewalls with their IPs or with their hostnames in a file I call iplist and
run the srcipt with sh ./get_fwversion.sh
root@myserver # cat get_fwversion.sh
#!/bin/bash
for HOST in $(cat iplist | grep -v "^#" | grep -v "^$")
do

echo $HOST
ssh admin@$HOST 'fw ver'
# Some example. Just delete the # for the required command
# ssh admin@$HOST 'ipsctl hw:eeprom:product_id'
# ssh admin@$HOST 'fwaccel stat'
# ssh admin@$HOST 'clish -c "show vrrp"'
# ssh admin@$HOST 'grep buffer /var/log/messages' | tail -n 2
# ssh admin@$HOST 'grep "Log buffer is full\|log/trap messages"
/var/log/messages'
# ssh admin@$HOST 'cpstat os -f cpu'
done
root@myserver # cat iplist
#R55
myfirewall1
myfirewall2
myfirewall3
myfirewall4
myfirewallcluster1_A
myfirewallcluster1_B
#R60
myfirewall5
myfirewall6
#R65
myfirewall7
myfirewall8
myfirewallcluster2_A
myfirewallcluster2_B

Important Files:
On the Management Server:
$FWDIR/conf/classes.C scheme file. Each object in objects.c, rulebases.fws, fwauth.ndb or
whatever must match one of the classes listed below.
$FWDIR/conf/objects_5_0.C object file.
$FWDIR/conf/rulebases_5_0.fws Rulebase file.
$FWDIR/conf/fwauth.NDB userdatabase
$FWDIR/conf/.W The policy file
$FWDIR/conf/user.def.NGX_FLO User defined inspect code (sk30919)
On the Firewall:
$FWDIR/conf/masters On the firewalls shows who is the management server
$FWDIR/conf/initial_module.pf Initial Policy of the firewall
$FWDIR/conf/discntd.if Add the interface-name in this file to disable monitoring in
fw monitor
Posted on March 5, 2013 by otrdemo Leave a comment

###FW MONITOR Examples###

fw monitor -e accept host(192.168.1.12);


SRC or DST:]

[Show packets with IP 192.168.1.12 as

fw monitor -e accept src=192.168.1.12 and dst=192.168.3.3;


from 192.168.1.12 to 192.168.3.3:]
fw monitor -pi ipopt_strip -e accept udpport(53);
(DNS) packets, pre-in position is before ippot_strip':]
fw monitor -m O -e accept udp and (sport>1023 or dport>1023);
from or to unprivileged ports, only show post-out]

[Show all packets

[Show UDP port 53

[Show UPD traffic

fw monitor -e accept host(192.168.1.12) and tracert;


traceroute (ICMP, TTL<30) from and to 192.168.1.12]

[Show Windows

fw monitor -v 23 -e accept tcpport(80);


traffic for VSX virtual system ID 23]

[Show Capture web

fw monitor -e accept ip_p=50 and ifid=0;


protocol 50) packets on the interface with the ID 0.
(List interfaces and corresponding IDs with fw ctl iflist)]

[Show all ESP (IP

srfw monitor -o output_file.cap


[Show traffic on a
SecuRemote/SecureClient client into a file.
srfw.exe is in $SRDIR/bin (C:\Program Files\CheckPoint\SecuRemote\bin)]
fw monitor -m iIoO (accpet dst=172.31.10.100;) | grep ICMP
[This is standard fw
monitor on the destionation and grepping for ICMP (ICMP in capital impotant here, ass the out
put is in capitals)]
fw monitor -e accept ip_p=1; -o ping.cap
fw monitor -m iIoO e (accept src=10.0.1.30 and dst=4.2.2.2) and [9:1] = 1; -o output.cap
fw monitor -m iIoO e accept src=10.0.1.30 or dst=10.0.1.30 and [9:1] = 1; -o output.cap
fw monitor -m iIoO e accept (src=10.0.1.30 or dst=10.0.1.30) and no (sport=443 or
dport=443); -o output.cap [open this file in wire shark.]
fw monitor -m iIoO e accept (src=10.0.1.30 or dst=10.0.1.30); this is a goood fw monitor to
run which wil just output to the CPShell, the -m iIoO Just means - Monitor pre (i)nbound post
(I)nbound pre (o)utbound post (O)utbound interfaces

Management server CLI Splat command

clock
cpconfig
cphaprob ldstat
cphaprob stat
cphaprob syncstat
cphastop
cplic print
cpstart
cpstat fw
cpstat ha
cpstat os -f all
cpstat os -f cpu
cpstat os -f routing
cpstop
cpwd_admin monitor_list
expert
find / -type f -size 10240k
-exec ls -la {} \;
fw ctl iflist
fw ctl pstat
fw exportlog -o
fw fetch 10.0.0.42
fw log
fw log -b <MMM DD,
YYYY HH:MM:SS>
<MMM DD, YYYY
HH:MM:SS>
fw log -c drop
fw log -f
fwm logexport -i <log
name> -o <output name>
fw logswitch

display date and time on firewall


change SIC, licenses and more
display sync serialization statistics
list the state of the high availability cluster members. Should show
active and standby devices.
display sync transport layer statistics
stop a cluster member from passing traffic. Stops synchronization.
(emergency only)
license information
start all checkpoint services
show policy name, policy install time and interface table
high availability state
checkpoint interface table, routing table, version, memory status,
cpu load, disk space
checkpoint cpu status
checkpoint routing table
stop all checkpoint services
list processes actively monitored. Firewall should contain cpd and
vpnd.
change from the initial administrator privilege to advanced
privilege
Search for files larger than 10Mb
show interface names
show control kernel memory and connections
export the current log file to ascii
get the policy from the firewall manager (use this only if there are
problems on the firewall)
show the content of the connections log
search the current log for activity between specific times, eg
fw log -b "Jul 23, 2009 15:01:30" "Jul 23,2009 15:15:00"
search for dropped packets in the active log; also can use accept or
reject to search
tail the current log
export an old log file on the firewall manager
rotate logs

fw lslogs
fw stat
fw stat -l
fw tab
fw tab -s -t connections
fw tab -t xlate -x
fw unloadlocal
fw ver
fwm lock_admin -h
fwm ver
ifconfig -a
log list
log show <list #>
netstat -an | more
netstat -rn
passwd
ps -ef
sysconfig
upgrade_import
hwclock
fw fetch 10.0.0.42
fw log -f

list firewall logs


firewall status, should contain the name of the policy and the
relevant interfaces, i.e. Standard_5_1_1_1_1 [>eth4] [<eth4]
[<eth5] [>eth0.900] [<eth0.900]
show which policy is associated with which interface and package
drop, accept and reject
displays firewall tables
number of connections in state table
clear all translated entries (emergency only)
clear local firewall policy (emergency only)
firewall version
unlock a user account after repeated failed log in attempts
firewall manager version (on SmartCenter)
list all interfaces
list the names of the logs
display a specific log, log show 33 will display "Cant find my
SIC name in registry" if there are communication problems
check what ports are in use or listening
routing table
change the current users password
list running processes
configure date/time, network, dns, ntp
run /opt/CPsuite-R65/fw1/bin/upgrade_tools/upgrade_import after
a system upgrade to import the old license and system information.
show the hardware clock. If the hardware and operating system
clocks are off by more than a minute, sync the hardware clock to
the OS with "hwclock systohc"
Manually grab the policy from the mgmt server at 10.0.0.42
Shows you realtime logs on the firewall will likely crash your
terminal

You might also like