CP R81 NextGenSecurityGateway Guide
CP R81 NextGenSecurityGateway Guide
NEXT GENERATION
SECURITY GATEWAY
R81
Administration Guide
[Classification: Protected]
Check Point Copyright Notice
© 2020 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed
under licensing restricting their use, copying, distribution, and decompilation. No part of this product or
related documentation may be reproduced in any form or by any means without prior written authorization
of Check Point. While every precaution has been taken in the preparation of this book, Check Point
assumes no responsibility for errors or omissions. This publication and features described herein are
subject to change without notice.
TRADEMARKS:
Refer to the Copyright page for a list of our trademarks.
Refer to the Third Party copyright notices for a list of relevant copyrights and third-party licenses.
Next Generation Security Gateway R81 Administration Guide
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date with the
latest functional improvements, stability fixes, security enhancements and protection
against new and evolving attacks.
Certifications
For third party independent certification of Check Point products, see the Check Point
Certifications page.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments.
Revision History
Date Description
Table of Contents
Glossary 13
Check Point Next Generation Security Gateway Solution 22
Security Policy 23
Access Control Policy 23
Threat Prevention Policy 27
HTTPS Inspection Policy 28
Data Loss Prevention Policy 30
Geo Policy 31
Mobile Access Policy 32
Firewall Software Blade 33
IPsec VPN Software Blade 34
Remote Access VPN 35
Threat Prevention 36
Anti-Bot Software Blade 37
Anti-Virus Software Blade 38
Threat Extraction Software Blade 39
Threat Emulation Software Blade 40
Mail Transfer Agent (MTA) 41
IPS Software Blade 42
Identity Awareness Software Blade 43
Content Awareness Software Blade 44
Mobile Access Software Blade 45
Application Control Software Blade 46
URL Filtering Software Blade 47
Data Loss Prevention Software Blade 48
Anti-Spam & Email Security Software Blade 49
UserCheck 50
ClusterXL Software Blade 51
QoS Software Blade 52
VSX 53
comp_init_policy 183
control_bootsec 186
cp_conf 190
cp_conf auto 192
cp_conf corexl 193
cp_conf fullha 195
cp_conf ha 196
cp_conf intfs 197
cp_conf lic 198
cp_conf sic 200
cpconfig 201
cpinfo 204
cplic 205
cplic check 207
cplic contract 209
cplic del 211
cplic print 212
cplic put 214
cpprod_util 216
cpstart 219
cpstat 220
cpstop 227
cpview 228
Overview of CPView 228
CPView User Interface 228
Using CPView 229
dynamic_objects 230
cpwd_admin 234
cpwd_admin config 236
cpwd_admin del 239
cpwd_admin detach 240
cpwd_admin exist 241
cpwd_admin flist 242
fw hastat 301
fw isp_link 302
fw kill 303
fw lichosts 304
fw log 305
fw logswitch 313
fw lslogs 316
fw mergefiles 319
fw monitor 322
fw repairlog 350
fw sam 351
fw sam_policy 358
fw sam_policy add 360
fw sam_policy batch 372
fw sam_policy del 374
fw sam_policy get 377
fw showuptables 381
fw stat 382
fw tab 384
fw unloadlocal 391
fw up_execute 395
fw ver 398
fwboot 400
fwboot bootconf 402
fwboot corexl 406
fwboot cpuid 412
fwboot default 414
fwboot fwboot_ipv6 415
fwboot fwdefault 416
fwboot ha_conf 417
fwboot ht 418
fwboot multik_reg 420
fwboot post_drv 422
sam_alert 423
stattest 427
usrchk 429
Working with Kernel Parameters on Security Gateway 433
Introduction to Kernel Parameters 434
Firewall Kernel Parameters 435
Working with Integer Kernel Parameters 436
Working with String Kernel Parameters 440
SecureXL Kernel Parameters 443
Kernel Debug on Security Gateway 447
Kernel Debug Syntax 448
Kernel Debug Filters 456
Kernel Debug Procedure 461
Kernel Debug Procedure with Connection Life Cycle 463
Kernel Debug Modules and Debug Flags 470
Module 'accel_apps' (Accelerated Applications) 472
Module 'accel_pm_mgr' (Accelerated Pattern Match Manager) 473
Module 'APPI' (Application Control Inspection) 474
Module 'BOA' (Boolean Analyzer for Web Intelligence) 475
Module 'CI' (Content Inspection) 476
Module 'cluster' (ClusterXL) 478
Module 'cmi_loader' (Context Management Interface / Infrastructure Loader) 480
Module 'CPAS' (Check Point Active Streaming) 481
Module 'cpcode' (Data Loss Prevention - CPcode) 482
Module 'CPSSH' (SSH Inspection) 483
Module 'crypto' (SSL Inspection) 485
Module 'dlpda' (Data Loss Prevention - Download Agent for Content Awareness) 486
Module 'dlpk' (Data Loss Prevention - Kernel Space) 488
Module 'dlpuk' (Data Loss Prevention - User Space) 489
Module 'DOMO' (Domain Objects) 490
Module 'fg' (FloodGate-1 - QoS) 491
Module 'FILE_SECURITY' (File Inspection) 493
Module 'FILEAPP' (File Application) 494
Glossary
A
Administrator
A user with permissions to manage Check Point security products and the network
environment.
API
In computer programming, an application programming interface (API) is a set of
subroutine definitions, protocols, and tools for building application software. In general
terms, it is a set of clearly defined methods of communication between various software
components.
Appliance
A physical computer manufactured and distributed by Check Point.
Bond
A virtual interface that contains (enslaves) two or more physical interfaces for
redundancy and load sharing. The physical interfaces share one IP address and one
MAC address. See "Link Aggregation".
Bonding
See "Link Aggregation".
Bridge Mode
A Security Gateway or Virtual System that works as a Layer 2 bridge device for easy
deployment in an existing topology.
CA
Certificate Authority. Issues certificates to gateways, users, or computers, to identify
itself to connecting entities with Distinguished Name, public key, and sometimes IP
address. After certificate validation, entities can send encrypted data using the public
keys in the certificates.
Certificate
An electronic document that uses a digital signature to bind a cryptographic public key
to a specific identity. The identity can be an individual, organization, or software entity.
The certificate is used to authenticate one identity to another.
CGNAT
Carrier Grade NAT. Extending the traditional Hide NAT solution, CGNAT uses
improved port allocation techniques and a more efficient method for logging. A CGNAT
rule defines a range of original source IP addresses and a range of translated IP
addresses. Each IP address in the original range is automatically allocated a range of
translated source ports, based on the number of original IP addresses and the size of
the translated range. CGNAT port allocation is Stateless and is performed during policy
installation. See sk120296.
Cluster
Two or more Security Gateways that work together in a redundant configuration - High
Availability, or Load Sharing.
Cluster Member
A Security Gateway that is part of a cluster.
CoreXL
A performance-enhancing technology for Security Gateways on multi-core processing
platforms. Multiple Check Point Firewall instances are running in parallel on multiple
CPU cores.
CoreXL SND
Secure Network Distributer. Part of CoreXL that is responsible for: Processing incoming
traffic from the network interfaces; Securely accelerating authorized packets (if
SecureXL is enabled); Distributing non-accelerated packets between Firewall kernel
instances (SND maintains global dispatching table, which maps connections that were
assigned to CoreXL Firewall instances). Traffic distribution between CoreXL Firewall
instances is statically based on Source IP addresses, Destination IP addresses, and the
IP 'Protocol' type. The CoreXL SND does not really "touch" packets. The decision to
stick to a particular FWK daemon is done at the first packet of connection on a very high
level, before anything else. Depending on the SecureXL settings, and in most of the
cases, the SecureXL can be offloading decryption calculations. However, in some other
cases, such as with Route-Based VPN, it is done by FWK daemon.
CPUSE
Check Point Upgrade Service Engine for Gaia Operating System. With CPUSE, you
can automatically update Check Point products for the Gaia OS, and the Gaia OS itself.
For details, see sk92449.
DAIP Gateway
A Dynamically Assigned IP (DAIP) Security Gateway is a Security Gateway where the
IP address of the external interface is assigned dynamically by the ISP.
Data Type
A classification of data. The Firewall classifies incoming and outgoing traffic according
to Data Types, and enforces the Policy accordingly.
Database
The Check Point database includes all objects, including network objects, users,
services, servers, and protection profiles.
Distributed Deployment
The Check Point Security Gateway and Security Management Server products are
deployed on different computers.
Domain
A network or a collection of networks related to an entity, such as a company, business
unit or geographical location.
Expert Mode
The name of the full command line shell that gives full system root permissions in the
Check Point Gaia operating system.
External Network
Computers and networks that are outside of the protected network.
External Users
Users defined on external servers. External users are not defined in the Security
Management Server database or on an LDAP server. External user profiles tell the
system how to identify and authenticate externally defined users.
Firewall
The software and hardware that protects a computer network by analyzing the incoming
and outgoing network traffic (packets).
Gaia
Check Point security operating system that combines the strengths of both
SecurePlatform and IPSO operating systems.
Gaia Clish
The name of the default command line shell in Check Point Gaia operating system. This
is a restrictive shell (role-based administration controls the number of commands
available in the shell).
Gaia Portal
Web interface for Check Point Gaia operating system.
Hotfix
A piece of software installed on top of the current software in order to fix some wrong or
undesired behavior.
ICA
Internal Certificate Authority. A component on Check Point Management Server that
issues certificates for authentication.
Internal Network
Computers and resources protected by the Firewall and accessed by authenticated
users.
IPv4
Internet Protocol Version 4 (see RFC 791). A 32-bit number - 4 sets of numbers, each
set can be from 0 - 255. For example, 192.168.2.1.
IPv6
Internet Protocol Version 6 (see RFC 2460 and RFC 3513). 128-bit number - 8 sets of
hexadecimal numbers, each set can be from 0 - ffff. For example,
FEDC:BA98:7654:3210:FEDC:BA98:7654:3210.
Link Aggregation
Technology that joins (aggregates) multiple physical interfaces together into one virtual
interface, known as a bond interface. Also known as Interface Bonding, or Interface
Teaming. This increases throughput beyond what a single connection could sustain,
and to provides redundancy in case one of the links should fail.
Log
A record of an action that is done by a Software Blade.
Log Server
A dedicated Check Point computer that runs Check Point software to store and process
logs in Security Management Server or Multi-Domain Security Management
environment.
Management Interface
Interface on Gaia computer, through which users connect to Portal or CLI. Interface on a
Gaia Security Gateway or Cluster member, through which Management Server
connects to the Security Gateway or Cluster member.
Management Server
A Check Point Security Management Server or a Multi-Domain Server.
Multi-Domain Server
A computer that runs Check Point software to host virtual Security Management Servers
called Domain Management Servers. Acronym: MDS.
Network Object
Logical representation of every part of corporate topology (physical machine, software
component, IP Address range, service, and so on).
Open Server
A physical computer manufactured and distributed by a company, other than Check
Point.
Rule
A set of traffic parameters and other conditions in a Rule Base that cause specified
actions to be taken for a communication session.
Rule Base
Also Rulebase. All rules configured in a given Security Policy.
SecureXL
Check Point product that accelerates IPv4 and IPv6 traffic. Installed on Security
Gateways for significant performance improvements.
Security Gateway
A computer that runs Check Point software to inspect traffic and enforces Security
Policies for connected network resources.
Security Policy
A collection of rules that control network traffic and enforce organization guidelines for
data protection and access to resources with packet inspection.
SIC
Secure Internal Communication. The Check Point proprietary mechanism with which
Check Point computers that run Check Point software authenticate each other over
SSL, for secure communication. This authentication is based on the certificates issued
by the ICA on a Check Point Management Server.
Single Sign-On
A property of access control of multiple related, yet independent, software systems. With
this property, a user logs in with a single ID and password to gain access to a
connected system or systems without using different usernames or passwords, or in
some configurations seamlessly sign on at each system. This is typically accomplished
using the Lightweight Directory Access Protocol (LDAP) and stored LDAP databases
on (directory) servers. Acronym: SSO.
SmartConsole
A Check Point GUI application used to manage Security Policies, monitor products and
events, install updates, provision new devices and appliances, and manage a multi-
domain environment and each domain.
SmartDashboard
A legacy Check Point GUI client used to create and manage the security settings in
R77.30 and lower versions.
SmartUpdate
A legacy Check Point GUI client used to manage licenses and contracts.
Software Blade
A software blade is a security solution based on specific business needs. Each blade is
independent, modular and centrally managed. To extend security, additional blades can
be quickly added.
SSO
See "Single Sign-On".
Standalone
A Check Point computer, on which both the Security Gateway and Security
Management Server products are installed and configured.
Traffic
Flow of data between network devices.
Users
Personnel authorized to use network resources and applications.
VLAN
Virtual Local Area Network. Open servers or appliances connected to a virtual network,
which are not physically connected to the same network.
VLAN Trunk
A connection between two switches that contains multiple VLANs.
VSX
Virtual System Extension. Check Point virtual networking solution, hosted on a
computer or cluster with virtual abstractions of Check Point Security Gateways and
other network devices. These Virtual Devices provide the same functionality as their
physical counterparts.
VSX Gateway
Physical server that hosts VSX virtual networks, including all Virtual Devices that
provide the functionality of physical network devices. It holds at least one Virtual
System, which is called VS0.
Item Description
1 SmartConsole
5 Internal network
Notes:
n For information about Cluster, see the R81 ClusterXL Administration Guide.
n For information about Security Management Server and SmartConsole, see the
R81 Security Management Administration Guide.
Security Policy
In This Section:
Security Policy is a collection of rules and settings that control network traffic and enforce organization
guidelines for data protection and access to resources with packet inspection.
Check Point solution provides several types of Security Policies.
For more information, see the R81 Security Management Administration Guide.
In addition, see sk120964 - ATRG: Unified Policy.
Contains unified simple and granular rules to control access from specified sources to
specified destinations over specified protocols.
If you enable Identity Awareness Software Blade on your Security Gateways, you can also use
Access Role objects as the source and destination in a rule. This lets you easily make rules for
individuals or different groups of users.
Rule structure:
Services
N Nam Sour Destinati & Actio Tim Instal
VPN Track
o e ce on Applicatio n e l On
ns
# Your Specific Specific Specific or Specific or All Accep Any Log Polic
Rule Source Destination All VPN Service objects t or (with y
Name objects objects Communiti Specific or All or Specif Accounti Targe
es Application Drop ic ng) ts
objects Time
or or
Rejec object Alert
t or
or None
User
Auth
or
Clien
t
Auth
For more information, see the R81 Security Management Administration Guide.
Contains automatic and manual rules for Network Address Translation (NAT).
Rule structure:
Prerequisites:
1. In the Security Gateway (Cluster) object, enable the IPsec VPN and the Policy Server
Software Blades.
2. In the Policy Package, enable the Desktop Security .
This policy is installed on the Security Management Server. Remote Access Clients download
this policy when a VPN Site update is performed. Once downloaded, this policy determines
access control on the Remote Access Client machines.
Rule structure:
For more information, see the R81 Threat Prevention Administration Guide.
Determines how the system inspects connections for bots and viruses. The primary component of the
policy is the Rule Base. The rules use the Malware database and network objects.
If you enable Identity Awareness Software Blade on your Security Gateways, you can also use Access
Role objects as the scope in a rule. This lets you easily make rules for individuals or different groups of
users.
Rule structure:
Protecti
Protect on/ Inst
N Na Sour Destinat Servic Comme
ed Site/ Action Track all
o me ce ion es nts
Scope File/ On
Blade
# Your Specific Specific Specific N/A Any Basic None Polic Your
Rule objects Source Destination (or your or or or y Comment
Name objects objects specific Specific Optimi Log Targe
objects in an Service zed or ts
exception objects or Alert or
rule) Strict In Specifi
or addition: c
Your Packet Securit
Profile Captur y
e Gatew
Forens ay and
Cluster
ics
objects
Description
For more information, see the R81 Security Management Administration Guide.
Lets you inspect the HTTP / HTTPS traffic on these Software Blades:
n Anti-Bot
n Anti-Virus
n Application Control
n Content Awareness (Data Awareness)
n Data Loss Prevention
n IPS
n Threat Emulation
n URL Filtering
Security Gateways cannot inspect HTTPS traffic because it is encrypted. You can enable the HTTPS
Inspection feature to let the Security Gateways create new SSL connections with the external site or
server. The Security Gateways are then able to decrypt and inspect HTTPS traffic that uses the new
SSL connections.
Rule structure:
Categor
y/ Inst
N Na Sour Destinat Servi Acti Tra Bla Certific Comm
Custom all
o me ce ion ces on ck de ate ent
Applicat On
ion
# Your Any APPI_ TLS Any Insp None All Poli Outbound Your
Rule global_ defaul or ect or or cy Certific Comment
Name obj_ t Specific or Log Speci TLS ate
Internet servic objects Bypa or fic Targ or
ss Aler Blade Your
or es ets
Specific or t or Certificate
Destination Specific Specifi for Inbound
objects Service c Inspection
objects Securit
y
Gatew
ay and
Cluste
r
object
s
For more information, see the R81 Data Loss Prevention Administration Guide.
Prevents unintentional data leaks by catching protected data before it leaves your organization.
Rule structure:
In
Na D Tr st Ti
Fla Sourc Desti Prot Exce Acti Sev Cate Com
m at ac all m
g e nation ocol ptions on erity gory ment
e a k O e
n
Category Name(Y-Z)
Geo Policy
Description
For more information, see the R81 Security Management Administration Guide.
Creates a policy for traffic to or from specific geographical or political locations.
Important - From R81, Security Gateways and Clusters no longer support Geo
Policy configured in SmartConsole > Security Policies view > Shared Policies
section > Geo Policy (Known Limitation PMTR-56212).
Rule structure:
Specific Country object From and To Country Accept None Your Comment
or or or
From Country Drop Log
or or
To Country Alert
For more information, see the R81 Mobile Access Administration Guide.
Controls which user groups have access to which applications, when connecting through a Mobile
Access Security Gateway.
Rule structure:
Threat Prevention
To challenge today's malware landscape, Check Point's comprehensive Threat Prevention solution offers
a multi-layered, pre- and post-infection defense approach and a consolidated platform that enables
enterprise security to detect and block modern malware.
For more information, see the R81 Threat Prevention Administration Guide.
These Software Blades provide Threat Prevention:
n "Anti-Bot Software Blade" on page 37
n "Anti-Virus Software Blade" on page 38
n "Threat Extraction Software Blade" on page 39
n "Threat Emulation Software Blade" on page 40
n "IPS Software Blade" on page 42
Note - Data Loss Prevention is also known as Data Leak Prevention, Information Leak
Detection and Prevention, Information Leak Prevention, Content Monitoring and
Filtering, and Extrusion Prevention.
UserCheck
This feature gives users a warning when there is a potential risk of data loss or security violation.
This helps users to prevent security incidents and to learn about the organizational security policy.
These Software Blades require the UserCheck feature:
n "Threat Emulation Software Blade" on page 40
n "Threat Extraction Software Blade" on page 39
n "Anti-Bot Software Blade" on page 37
n "Anti-Virus Software Blade" on page 38
n "Data Loss Prevention Software Blade" on page 48
n "Application Control Software Blade" on page 46
n "URL Filtering Software Blade" on page 47
For more information, see:
n The R81 Security Management Administration Guide > Chapter Creating an Access Control Policy
> Section The Columns of the Access Control Rule Base
n sk83700 - How to customize and localize the UserCheck portal
Item Description
1 Internal network
5 Internet
Item Description
1 SmartConsole
3 QoS Policy
5 Internet
6 Internal network
QoS leverages the industry's most advanced traffic inspection and bandwidth control technologies. Check
Point patented Stateful Inspection technology captures and dynamically updates detailed state information
on all network traffic. This state information is used to classify traffic by service or application. After traffic
has been classified, QoS applies an innovative, hierarchical, Weighted Fair Queuing (WFQ) algorithm to
accurately control bandwidth allocation.
For more information, see the R81 QoS Administration Guide.
VSX
Virtual System eXtension product runs several virtual firewalls on the same hardware.
Each Virtual System works as a Security Gateway, typically protecting a specified network. When packets
arrive at the VSX Gateway, it sends traffic to the Virtual System protecting the destination network. The
Virtual System inspects all traffic and allows or rejects it according to rules defined in the security policy.
In order to better understand how virtual networks work, it is important to compare physical network
environments with their virtual (VSX) counterparts. While physical networks consist of many hardware
components, VSX virtual networks reside on a single configurable VSX Gateway or cluster that defines and
protects multiple independent networks, together with their virtual components.
Item Description
1 Internet
2 Router
3 Security Gateways
4 Network
Item Description
1 Internet
2 Router
3 VSX Gateway.
Each Virtual System in a VSX environment is a Security Gateway, with the same security and
networking functionality as a physical gateway.
Each handles packet traffic to and from the one network it protects.
4 Warp Links.
Virtual interfaces and network cables connect the Virtual Systems and the Virtual Switch.
5 Virtual Switch.
Connects all the Virtual Systems to the Internet router.
6 Networks
SecureXL
This feature accelerates traffic that passes through a Security Gateway.
For more information, see:
n R81 Performance Tuning Administration Guide
n sk153832 - ATRG: SecureXL for R80.20 and above (requires Advanced access to Check Point
Support Center)
n sk98348 - Best Practices - Security Gateway Performance
CoreXL
CoreXL is a performance-enhancing technology for Security Gateways on multi-core platforms.
CoreXL makes it possible for the CPU cores to perform multiple tasks concurrently. This enhances the
Security Gateway performance.
CoreXL provides almost linear scalability of performance, according to the number of processing cores on
a single machine. The increase in performance does not require changes to management or to network
topology.
On a Security Gateway with CoreXL enabled, the Firewall kernel is replicated multiple times.
Each replicated copy of the Firewall kernel, or CoreXL Firewall instance, runs on one CPU core.
These CoreXL Firewall instances handle traffic concurrently, and each CoreXL Firewall instance is a
complete and independent Firewall inspection kernel. When CoreXL is enabled, all the Firewall kernel
instances in the Security Gateway process traffic through the same interfaces and apply the same security
policy.
CoreXL Firewall instances work with SecureXL instances.
For more information. see:
n R81 Performance Tuning Administration Guide
n sk98737 - ATRG: CoreXL (requires Advanced access to Check Point Support Center)
n sk98348 - Best Practices - Security Gateway Performance
Multi-Queue
By default, each network interface has one traffic queue handled by one CPU.
You cannot use more CPU cores for acceleration than the number of interfaces handling traffic.
Multi-Queue lets you configure more than one traffic queue for each network interface.
For each interface, more than one CPU core is used for acceleration.
ICAP
The Internet Content Adaptation Protocol (ICAP) is a lightweight HTTP-like protocol (request and
response protocol), which is used to extend transparent proxy servers. This frees up resources and
standardizes the way in which new features are implemented. ICAP is usually used to implement virus
scanning and content filters in transparent HTTP proxy caches.
The ICAP allows ICAP Clients to pass HTTP / HTTPS messages to ICAP Servers for content adaptation.
The ICAP Server executes its transformation service on these HTTP / HTTPS messages and sends
responses to the ICAP Client, usually with modified HTTP / HTTPS messages. The adapted HTTP /
HTTPS messages can be HTTP / HTTPS requests, or HTTP / HTTPS responses.
You can configure a Check Point Security Gateway as:
n ICAP Client - To send the HTTP / HTTPS messages to ICAP Servers for content adaptation.
n ICAP Server - To perform content adaptation in the HTTP / HTTPS messages received from ICAP
Clients.
n Both ICAP Client and ICAP Server at the same time.
Check Point Security Gateway configured for ICAP can work with third party ICAP devices without
changing the network topology.
For more information, see the R81 Threat Prevention Administration Guide.
HTTPS Inspection
Lets you inspect the HTTP / HTTPS traffic on these Software Blades:
n Anti-Bot
n Anti-Virus
n Application Control
n Content Awareness (Data Awareness)
n Data Loss Prevention
n IPS
n Threat Emulation
n URL Filtering
Security Gateways cannot inspect HTTPS traffic because it is encrypted. You can enable the HTTPS
Inspection feature to let the Security Gateways create new SSL connections with the external site or
server. The Security Gateways are then able to decrypt and inspect HTTPS traffic that uses the new SSL
connections.
For more information, see:
n R81 Threat Prevention Administration Guide > Chapter HTTPS Inspection.
n sk108202 - Best Practices - HTTPS Inspection
n sk65123 - HTTPS Inspection FAQ
HTTP/HTTPS Proxy
You can configure a Security Gateway to act as an HTTP/HTTPS Proxy on your network.
In such configuration, the Security Gateway becomes an intermediary between hosts that communicate
with each other through the Security Gateway. It does not allow a direct connection between these hosts.
Each successful connection creates two different connections:
n One connection between the client in the organization and the proxy (Security Gateway).
n One connection between the proxy (Security Gateway) and the actual destination.
These proxy modes are supported:
n Transparent - All HTTP traffic on specified ports and interfaces is intercepted and processed by the
Proxy code in the Security Gateway. No configuration is required on the clients.
n Non Transparent - All HTTP/HTTPS traffic on specified ports and interfaces is intercepted and
processed by the Proxy code in the Security Gateway. Configuration of the proxy address and port is
required on client machines.
For more information, see:
n SmartDashboard built-in help
n sk110013 - How to configure Check Point Security Gateway as HTTP/HTTPS Proxy (requires
Advanced access to Check Point Support Center)
n sk92482 - Performance impact from enabling HTTP/HTTPS Proxy functionality (requires
Advanced access to Check Point Support Center)
Note - For other HSM vendors that use PKCS#11 API, contact Check Point Solution
Center through a local Check Point Office.
Item Description
1 Internal computers that connect to HTTPS web sites through the Check Point Security Gateway.
4 Check Point Security Management Server that manages the Check Point Security Gateway.
5 Interconnecting Network.
6 HSM Server that stores and serves the SSL keys and certificates to the Check Point Security
Gateway.
7 HSM Client workstation used to create a Certificate Authority (CA) certificate on the HSM Server.
Note - Check Point Security Gateway uses the HSM Server only for outbound HTTPS
Inspection.
Generic Workflow
In This Section:
Workflow for Configuring a Check Point Security Gateway to Work with HSM 63
Workflow for Configuring an HSM Client Workstation 67
Note - Instructions for specific HSM vendors are located in the corresponding sections.
Generic Step 1 of 3: Configure the HTTPS Inspection to work without the HSM Server
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n In a VSX environment, you must perform this step in the context of every
Virtual System (on the VSX Gateway or every VSX Cluster Member).
Step Instructions
2 On the Security Gateway (every Cluster Member), disable the HSM in the
$FWDIR/conf/hsm_configuration.C file.
a. Connect to the command line.
b. Log in to the Expert mode.
c. Edit the file:
vi $FWDIR/conf/hsm_configuration.C
d. Configure the value "no" for the parameter "enabled":
:enabled ("no")
e. Save the changes in the file and exit the editor.
3 In SmartConsole, install the applicable Access Control Policy on the Security Gateway
(Cluster).
Step Instructions
4 Make sure that HTTPS Inspection works correctly without the HSM Server:
a. From an internal computer, connect to any HTTPS web site.
b. On the internal computer, in the web browser, you must receive the signed CA
certificate from the Security Gateway (Cluster).
Generic Step 2 of 3: Install and configure the PKCS#11 library supplied by the HSM vendor
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n In a VSX environment, you must perform this step in the context of the VSX
Gateway or every VSX Cluster Member (context of VS 0).
n You must get the HSM Client package from the HSM vendor.
Step Instructions
1 Unpack and install the HSM Client package supplied by the HSM vendor.
3 Transfer other tools or files supplied by the HSM vendor that are required to configure the
PKCS#11 library.
4 Configure the required connection or trust between with the HSM Server.
5 Optional: Make sure there is a trusted link with the HSM Server that is based on the
PKCS#11 library.
Note - Use the applicable tool supplied by the HSM vendor. You can also examine
the trust with the Check Point command "cpstat").
Generic Step 3 of 3: Configure the HTTPS Inspection to work with the HSM Server for
Outbound HTTPS Inspection
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n In a VSX environment, you must perform this step in the context of every
Virtual System (on the VSX Gateway or every VSX Cluster Member).
Notes:
n In this step, you configure the $FWDIR/conf/hsm_configuration.C
file on the Security Gateway (every Cluster Member).
n After you apply the HSM configuration for the first time, you can get an HSM
connection error.
Most common scenario is when you configure several Security Gateways
(Cluster Members) to use the same HSM Server, and they access it at the
same time.
In this case:
a. Run the "fw fetch local" command on the Security Gateway
(Cluster Member) that has an HSM connection issue.
In a VSX environment, run this command in the context of the
problematic VSX Virtual System.
b. When you see "HSM on" on the screen, continue to configure the next
Security Gateway, Cluster Member, or VSX Virtual System.
n After any change in the $FWDIR/conf/hsm_configuration.C file, you
must fetch the local policy (with the "fw fetch local" command) or
install the policy on the Security Gateway (Cluster, VSX Virtual System) in
SmartConsole.
n If the HSM Server is not available when you fetch the local policy or install the
policy in SmartConsole, the HTTPS Inspection cannot inspect the Outbound
HTTPS traffic. As a result, internal computers behind the Security Gateway
(Cluster, VSX Virtual System) cannot access HTTPS web sites.
In addition, see "Disabling Communication from the Security Gateway to the
HSM Server" on page 95.
Configuration steps:
Step Instructions
1 Connect to the command line on the Security Gateway (every Cluster Member).
Step Instructions
Notes:
n The ":enabled ()" attribute must have the value of either "yes " (to enable the
HSM), or "no" (to disable the HSM).
n The ":hsm_vendor_name ()" attribute must contain the required name of
the HSM vendor.
n The ":lib_filename ()" attribute must contain the name of the PKCS#11
library of your HSM vendor (located in the /usr/lib/hsm_client/ directory).
n The ":CA_cert_<XXX> ()" attributes must have the required values of
handles.
n The ":token_id ()" attribute must contain the password for the partition on
the HSM Server.
Example:
(
:enabled ("yes") # "yes" / "no"
:hsm_vendor_name ("FutureX HSM")
:lib_filename ("libfxpkcs11.so")
:CA_cert_public_key_handle (2)
:CA_cert_private_key_handle (1)
:CA_cert_buffer_handle (3)
:token_id ("safest")
)
6 To apply the new configuration, restart all Check Point services with this command:
cprestart
Important - This blocks all traffic until all services restart. In a cluster, this can
cause a failover.
7 Make sure that the Security Gateway (every Cluster Member) can connect to the HSM
Server and that HTTPS Inspection is activated successfully on the outbound traffic.
Run this command:
cpstat https_inspection -f all
The output must show:
n HSM partition access (Accessible/Not Accessible):
Accessible
n Outbound status (HSM on/HSM off/HSM error): HSM on
For more information, see "Monitoring HTTPS Inspection with HSM in CLI" on page 110.
Important - You must get the HSM Client package from the HSM vendor.
Configuration Steps 68
Additional Actions for a Gemalto HSM Server 78
Configuration Steps
Use this workflow to configure a Check Point Security Gateway (Cluster) to work with the Gemalto HSM
Server.
Step 1 of 5: Extracting the Gemalto Help Package
Use the Gemalto configuration documents to configure the Gemalto HSM environment.
Step Instructions
Step 2 of 5: Configuring the Gemalto HSM Server to Work with Security Gateway
Use the Gemalto Help documents to install and configure the Gemalto HSM Server.
Step Instructions
2 Do the initial configuration of the Gemalto HSM Appliance and the Gemalto HSM Server.
From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the
Configuration Guide > follow from [Step 1] to [Step 6].
3 Run the "sysconf recenCert" command in LunaSH to generate a new certificate for the
Gemalto HSM Server (server.pem).
From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the
Configuration Guide > [Step 7] Create a trusted link and register Client and Appliance with
each other.
4 Complete the configuration of the Gemalto HSM Server to work with the Check Point Security
Gateway (Cluster):
a. Set the applicable partition to be active and auto-activated.
Run these commands in LunaSH:
lunash:> partition showPolicies -partition <Partition
Name>
Note - If you do not set the partition to stay auto-activated, the partition does
not stay activated when the machine is shut down for more than two hours.
b. Disable the validation of the client source IP address by NTLS upon an NTLA client
connection.
Run this command in LunaSH:
lunash:> ntls ipcheck disable
Note - This allows the HSM Server to accept traffic from Check Point Cluster
Members that hide this traffic behind a Cluster VIP address, and from a
Check Point Security Gateway hidden behind NAT.
You use the Gemalto HSM Client workstation to create a CA Certificate on the Gemalto HSM Server.
Check Point Security Gateway (Cluster Members) uses this CA Certificate for HTTPS Inspection to
store and to access SSL keys on the Gemalto HSM Server.
Note - You can also use Check Point Security Gateway (Cluster Members) with the
installed HSM Client package as an HSM Client workstation.
Step Instructions
4 Establish a Trust Link between the Gemalto HSM Client Workstation and the Gemalto HSM
Server.
From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the
Configuration Guide > [Step 7] Create a trusted link and register Client and Appliance with
each other.
On the Gemalto HSM Client Workstation, run in LunaCM:
lunacm:> clientconfig deploy -c <IP Address of HSM Client
Workstation> -n <IP Address of HSM Server> -par <Partition
Name> -pw <Partition Password>
Step Instructions
1 On the Gemalto HSM Client workstation, open a command prompt or a terminal window.
3 When prompted, enter the password for the partition on Gemalto HSM Server (you
configured it in "Step 2 of 5: Configuring the Gemalto HSM Server to Work with Security
Gateway" on page 69).
Example:
Enter a password for the token in slot 0:
6 Use the handle numbers from the previous step to create the CA certificate.
From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the Utilities
Reference Guide > Certificate Management Utility (CMU) > cmu selfsigncertificate
Example:
# ./cmu selfsigncertificate -privatehandle=17
CN="www.gemltoHSM.cp" -sha256WithRSA -startDate 20190720 -
endDate 20240720 -serialNum=111aaa -keyusage
digitalsignature,keycertsign,crlsign -
basicconstraints=critical,ca:true
Step Instructions
Important - You use the numbers of these three handles later when you configure
the $FWDIR/conf/hsm_configuration.C file on the Check Point Security
Gateway (Cluster Members).
Step 5 of 5: Configuring the Security Gateway to Work with the Gemalto HSM Server
Step Instructions
2 On the Security Gateway (every Cluster Member), disable the HSM in the
$FWDIR/conf/hsm_configuration.C file.
a. Connect to the command line.
b. Log in to the Expert mode.
c. Edit the file:
vi $FWDIR/conf/hsm_configuration.C
d. Configure the value "no" for the parameter "enabled":
:enabled ("no")
e. Save the changes in the file and exit the editor.
3 In SmartConsole, install the applicable Access Control Policy on the Security Gateway
(Cluster).
4 Make sure that HTTPS Inspection works correctly without the HSM Server:
a. From an internal computer, connect to any HTTPS web site.
b. On the internal computer, in the web browser, you should receive the signed CA
certificate from the Security Gateway (Cluster).
Sub-Step 5-B: Installing the Gemalto HSM Simplified Client Software Packages on the
Security Gateway (Cluster Members)
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n In a VSX environment, you must perform this step in the context of the
VSX Gateway or every VSX Cluster Member (context of VS 0).
Step Instructions
1 Open the Gemalto HSM Client package you received from Gemalto:
610-012382-017_SW_Client_HSM_6.2.2_RevA
Go to this directory: linux > 32
3 In the Expert mode, copy the libCryptoki2.so file to the /usr/lib/hsm_client/ directory:
cp -v /usr/safenet/lunaclient/lib/libCryptoki2.so
/usr/lib/hsm_client/
Important - For security reasons, only the root user has permissions to access
this directory.
You must copy the physical file into this directory. Do not create a symbolic link.
4 Establish a Trust Link between the Gemalto HSM Client on the Security Gateway (every
Cluster Member) and the Gemalto HSM Server.
From the Gemalto SafeNet Network HSM 6.2.2 Product Documentation, go to the
Configuration Guide > [Step 7] Create a trusted link and register Client and Appliance
with each other.
On the Security Gateway (every Cluster Member), run in LunaCM:
lunacm:> clientconfig deploy -c <IP Address of Security
Gateway or Cluster Member> -n <IP Address of HSM Server> -
par <Partition Name> -pw <Partition Password>
5 Examine the partition access on the Security Gateway (every Cluster Member):
# /usr/safenet/lunaclient/bin/vtl verify
Notes:
n For more information, see the Gemalto SafeNet Network HSM 6.2.2
Product Documentation.
For information about establishing a Trust Link, go to the Appliance
Administration Guide > Configuration without One-step NTLS > [Step 7]
Create a Network Trust Link Between the Client and the Appliance.
n If you need to establish new Trust Link, you have to delete the current
Trust Link.
See "Deleting a Trust Link with the HSM Server" on page 78.
Notes:
n After you apply the HSM configuration for the first time, you may get an
HSM connection error.
Most common scenario is when you configure several Security Gateways
(Cluster Members) to use the same HSM Server, and they access it at the
same time.
In this case:
a. Run the "fw fetch local" command on the Security Gateway
(Cluster Member) that has an HSM connection issue.
In a VSX environment, run this command in the context of the
problematic VSX Virtual System.
b. Wait until you see "HSM on".
c. Continue to configure the next Security Gateway, Cluster Member,
or VSX Virtual System.
n After any change in the $FWDIR/conf/hsm_configuration.C file,
you must fetch the local policy (with the "fw fetch local" command)
or install the policy on the Security Gateway (Cluster, VSX Virtual System)
in SmartConsole.
n If the HSM Server is not available when you fetch the local policy or install
the policy in SmartConsole, the HTTPS Inspection is not able to inspect
the Outbound HTTPS traffic. As a result, internal computers behind the
Security Gateway (Cluster, VSX Virtual System) are not able to access
HTTPS web sites.
In addition, see "Disabling Communication from the Security Gateway to
the HSM Server" on page 95.
Step Instructions
1 Connect to the command line on the Security Gateway (every Cluster Member).
Step Instructions
Notes:
n The ":enabled ()" attribute must have the value of either "yes " (to enable
the HSM), or "no" (to disable the HSM).
n The ":hsm_vendor_name ()" attribute must contain the string "Luna
Gemalto HSM " (or must be empty).
n The ":lib_filename ()" attribute must contain the name of the PKCS#11
library of the Gemalto HSM vendor (located in the /usr/lib/hsm_client/
directory on the Security Gateway or Cluster Member).
n The ":CA_cert_<XXX> ()" attributes must have the required values of
handles from the output of the "cmu list" command on the Gemalto
HSM Server.
See "Step 4 of 5: Creating the CA Certificate on the Gemalto HSM
Server" on page 71.
n The ":token_id ()" attribute must have the contain the password for the
partition on the Gemalto HSM Server.
See "Step 2 of 5: Configuring the Gemalto HSM Server to Work with
Security Gateway" on page 69.
Example:
(
:enabled ("yes")
:hsm_vendor_name ("Gemalto HSM")
:lib_filename ("libCryptoki2.so")
:CA_cert_public_key_handle (17)
:CA_cert_private_key_handle (18)
:CA_cert_buffer_handle (13)
:token_id ("p@ssw0rd")
)
Step Instructions
Important - This blocks all traffic until all services restart. In a cluster, this
can cause a failover.
n If you did not define the value of the ":hsm_vendor_name ()" attribute (it is empty),
then fetch the local policy with this command:
fw fetch local
7 Make sure that the Security Gateway (every Cluster Member) can connect to the HSM
Server and that HTTPS Inspection is activated successfully on the outbound traffic.
Run this command:
cpstat https_inspection -f all
The output must show:
n HSM partition access (Accessible/Not Accessible):
Accessible
n Outbound status (HSM on/HSM off/HSM error): HSM on
For more information, see "Monitoring HTTPS Inspection with HSM in CLI" on page 110.
If you need to establish new Trust Link between a Check Point Security Gateway and an HSM Server,
you have to delete the current Trust Link.
Use Case: When you replace or reconfigure a Check Point Security Gateway, or an HSM Server.
Step Instructions
1 Delete the current Trust Link on the Check Point Security Gateway (every Cluster Member):
a. Connect to the command line.
b. Log in to the Expert mode.
c. Go to the SafeNet HSM Simplified Client installation directory:
cd /usr/safenet/lunaclient/bin/
d. Delete the old Trust Link:
./vtl deleteServer -n <IP Address of HSM Server>
Note - For more information, see the Gemalto SafeNet Network HSM 6.2.2
Product Documentation.
Step Instructions
Note - For more information, see the Gemalto SafeNet Network HSM 6.2.2
Product Documentation > LunaSH Command Reference Guide > LunaSH
Commands.
Prerequisites
FutureX Software Packages
FutureX CLI n fxcl-hsm- Contains the FutureX CLI Utility to manage keys and
Utility windows- certificates.
1.2.4.2- Install on the FutureX HSM Client Workstation.
37a8.zip
n fxcl-hsm-
redhat-
1.2.4.2-
37a8.tar
n fxcl-hsm-
linux-
1.2.4.2-
37a8.tar
n fxcl-hsm-mac-
1.2.4.2-
37a8.tar
n fxcli-hsm-
commands.txt
Configuration Steps
Use this workflow to configure a Check Point Security Gateway (Cluster) to work with the FutureX HSM
Server.
Step 1 of 3: Configuring the FutureX HSM Client Workstation
Step Instructions
2 Transfer the applicable FutureX PKCS #11 Library package to the FutureX HSM Client
Workstation.
n For Windows OS:
fxpkcs11-windows-<BUILD>.zip
n For Red Hat Linux OS:
fxpkcs11-redhat-<BUILD>.tar
n For Ubuntu and Debian Linux OS:
fxpkcs11-linux-<BUILD>.tar
n For macOS:
fxpkcs11-mac-<BUILD>.tar
Important - Make sure to transfer the file in the binary mode.
Step Instructions
3 Extract the contents of the FutureX PKCS #11 Library package to some directory on the
FutureX HSM Client Workstation.
In the instructions below, we show this directory as: <PKCS#11 Dir> .
Important:
n The FutureX PKCS #11 Library package (fxpkcs11-<OS>-<BUILD> )
contains the nested directory called "fxpkcs11".
You must extract the contents of this nested directory "fxpkcs11" into the
<PKCS#11 Dir> directory.
n The nested directory "fxpkcs11" contains the nested directories called
"x64" (for 64-bit OS) and "x86" (for 32-bit OS).
You must extract the contents of the applicable nested directory "x64" or
"x86" into the <PKCS#11 Dir> directory.
4 Transfer the certificates you received from the FutureX vendor to some directory on the
FutureX HSM Client Workstation.
Step Instructions
libfxpkcs11.so
n On Windows OS:
fxpkcs11.dll
c. Make sure the configuration file fxpkcs11.cfg is located in the applicable directory:
n On Linux OS:
Transfer this file from the <PKCS#11 Dir> directory to the /etc/ directory
(you must edit the copied file in the /etc/ directory).
n On Windows OS:
Keep this file in the <PKCS#11 Dir> directory.
d. Configure these settings in the file fxpkcs11.cfg:
n <LOG-FILE>
Set the path to the log file in this attribute.
n <ADDRESS>
Set the IP address of the FutureX HSM Server in this attribute.
n <PROD-PORT>
Set the port on the FutureX HSM Server in this attribute.
You can use the default port 9100, or configure a different port.
If you use a Cloud FutureX HSM, get the port number from the FutureX
Support.
Additional related attributes:
n <PROD-TLS-CA>
Contains the path to the Certificate Authority certificate file.
This attribute can appear multiple times.
You can put all the certificates of the CA chain.
n <PROD-TLS-CERT>
Contains the path to the client certificate file.
n <PROD-TLS-KEY>
Contains the path to the client private key file.
Step Instructions
a. To test the configuration, run the tool configTest from the <PKCS#11 Dir> directory.
b. To manage keys, run the tool PKCS11Manager from the <PKCS#11 Dir> directory.
c. Examine the log file you configured in the <LOG-FILE> attribute in the fxpkcs11.cfg
file.
Important - If you have problems with the location of the configuration file or the
PKCS #11 Library file, you can set these environmental variables:
n FXPKCS11_CFG to contain the full path to the configuration file
fxpkcs11.cfg
n FXPKCS11_MODULE to contain the full path to the PKCS #11 Library file
To set an environmental variable:
n On Linux OS, use this command:
export VARIABLE=VALUE
Example:
export FXPKCS11_CFG=/home/user/fxpkcs11.cfg
n On Windows OS, use this command:
set VARIABLE=VALUE
Example:
set FXPKCS11_
CFG=C:\Users\Futurex\Desktop\fxpkcs11.cfg
7 For more information about the configuration of PKCS#11 on the FutureX HSM Client
Workstation:
8 Transfer the applicable FutureX CLI Utility package to the FutureX HSM Client Workstation.
n For Windows OS:
fxcl-hsm-windows-<BUILD>.zip
n For Red Hat Linux OS:
fxcl-hsm-redhat-<BUILD>.tar
n For Ubuntu and Debian Linux OS:
fxcl-hsm-linux-<BUILD>.tar
n For macOS:
fxcl-hsm-mac-<BUILD>.tar
Important - Make sure to transfer the file in the binary mode.
Step Instructions
9 Extract the contents of the FutureX CLI Utility package to some directory on the FutureX
HSM Client Workstation.
In the instructions below, we show this directory as: <CLI Dir> .
Important:
n The FutureX CLI Utility package (fxcl-hsm-<OS>-<BUILD> ) contains the
nested directory called "fxcl ".
n The nested directory fxcl contains the nested directories called "x64" (for
64-bit OS) and "x86" (for 32-bit OS).
n The nested directories x64 and x86 contain the nested directories called
"OpenSSL-1.0.x " and "OpenSSL-1.1.x ".
You must extract the contents of the applicable nested directory "OpenSSL-
1.0.x " or "OpenSSL-1.1.x " into the <CLI Dir> directory.
Administrator decides, which version of the OpenSSL to use (for more
information, contact the FutureX vendor).
10 Transfer these certificates to the <CLI Dir> directory on the FutureX HSM Client
Workstation:
n The Client certificate (denoted below as <Client Certificate> )
n The CA certificate (denoted below as <CA Certificate> )
11 Establish a connection between the FutureX HSM Client and the FutureX HSM Server:
exit
Step Instructions
12 You can use these tools on the FutureX HSM Client Workstation to manage keys and
certificates that are stored on the FutureX HSM Server:
a. PKCS11Manager
n Run this command from the <PKCS#11 Dir> directory.
n This tool can create keys and browse the content of the HSM partition (that
stores keys and certificates).
n Follow the tool's menu to see the available options.
b. fxcli-hsm
n Run this command from the <CLI Dir> directory.
n To see all available commands in this shell, run: help
n To see all available options for a command in this shell, either run only the
command, or the command with the "-h" option.
Step Instructions
1 On the FutureX HSM Client Workstation, open a command prompt or a terminal window.
keytable reload
Important - Do not use the "... slot next" option, because it can
override keys for a fake certificate the Check Point Security Gateway (Cluster
Member) created.
Step Instructions
7 Get the list of slots used for the CA certificate and CA certificate's key pair.
Run one of these commands:
keytable list
keytable reload
Note - The command "keytable list" shows the slot numbers as the
PKCS#11 handles plus one. For example, it shows slot 0 as handle 1, slot 1 as
handle 2, and so on.
Important - You use the numbers of these three handles when you configure
the $FWDIR/conf/hsm_configuration.C file on the Check Point
Security Gateway (Cluster Members).
Note - The "x509 sign" command in step 6 can create a CA certificate that the
Mozilla Firefox browser cannot read.
If this issue occurs, you can create the required certificate with the FutureX API "excrypt".
1. Send this API to the HSM Server:
excrypt -m
[AORSGC;AD1;AL2;KUdigitalSignature,keyCertSign,cRLSign;BCCA:TRUE
;RC<Slot or Label of Private Key>;RG2;RT<Distinguished Name of
CA Certificate>;RY3;SG91234;XE002100;BF<Not Before Date
YYYYMMDD>;AF<Not After Date YYYYMMDD>;]
Example:
excrypt -m
[AORSGC;AD1;AL2;KUdigitalSignature,keyCertSign,cRLSign;BCCA:TRUE
;RC0;RG2;RTwww.hsmfx.cp;RY3;SG91234;XE002100;BF20200101;AF202501
01;]
Example:
3. Decode the certificate Hex string and save it as a certificate file in DER format.
In the above example, the Hex string is:
Example:
Step 3 of 3: Configuring the Security Gateway to Work with the FutureX HSM Server
Step Instructions
2 On the Security Gateway (every Cluster Member), disable the HSM in the
$FWDIR/conf/hsm_configuration.C file.
a. Connect to the command line.
b. Log in to the Expert mode.
c. Edit the file:
vi $FWDIR/conf/hsm_configuration.C
d. Configure the value "no" for the parameter "enabled":
:enabled ("no")
e. Save the changes in the file and exit the editor.
3 In SmartConsole, install the applicable Access Control Policy on the Security Gateway
(Cluster).
4 Make sure that HTTPS Inspection works correctly without the HSM Server:
a. From an internal computer, connect to any HTTPS web site.
b. On the internal computer, in the web browser, you must receive the signed CA
certificate from the Security Gateway (Cluster).
Sub-Step 3-B: Installing the required software packages on the Security Gateway
(Cluster Members)
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n In a VSX environment, you must perform this step in the context of the
VSX Gateway or every VSX Cluster Member (context of VS 0).
Step Instructions
1 Transfer the FutureX PKCS #11 binary files to the Security Gateway (every Cluster
Member):
2 Transfer the FutureX PKCS #11 configuration file to the Security Gateway (every Cluster
Member):
Step Instructions
1 Transfer the FutureX certificate files you received from the FutureX vendor to the Security
Gateway (every Cluster Member) to the /usr/futurex/ directory.
2 Connect to the command line on the Security Gateway (every Cluster Member).
<LOG-FILE> /var/log/fxpkcs11.log
Notes:
n After you apply the HSM configuration for the first time, you can get an
HSM connection error.
Most common scenario is when you configure several Security Gateways
(Cluster Members) to use the same HSM Server, and they access it at the
same time.
In this case:
a. Run the "fw fetch local" command on the Security Gateway
(Cluster Member) that has an HSM connection issue.
In a VSX environment, run this command in the context of the
problematic VSX Virtual System.
b. When you see "HSM on" on the screen, continue to configure the
next Security Gateway, Cluster Member, or VSX Virtual System.
n After any change in the $FWDIR/conf/hsm_configuration.C file,
you must fetch the local policy (with the "fw fetch local" command)
or install the policy on the Security Gateway (Cluster, VSX Virtual System)
in SmartConsole.
n If the HSM Server is not available when you fetch the local policy or install
the policy in SmartConsole, the HTTPS Inspection cannot inspect the
Outbound HTTPS traffic. As a result, internal computers behind the
Security Gateway (Cluster, VSX Virtual System) cannot access HTTPS
web sites.
In addition, see "Disabling Communication from the Security Gateway to
the HSM Server" on page 95.
Step Instructions
1 Connect to the command line on the Security Gateway (every Cluster Member).
Step Instructions
Notes:
n The ":enabled ()" attribute must have the value of either "yes " (to enable
the HSM), or "no" (to disable the HSM).
n The ":hsm_vendor_name ()" attribute must contain the string "FutureX
HSM ".
n The ":lib_filename ()" attribute must contain the full path to the file
libfxpkcs11.so (from the FutureX PKCS #11 Library) on the Security
Gateway (Cluster Member).
You must configure this full path explicitly, if this file is not located at the
default path: /usr/lib/libfxpkcs11.so
n The ":CA_cert_<XXX> ()" attributes must have the required values of
handles from the output of the "keytable" command on the FutureX
HSM Server.
See "Step 2 of 3: Creating the CA Certificate on the FutureX HSM
Server" on page 86.
n The ":token_id ()" attribute must have the contain the password for the
partition on the FutureX HSM Server.
Example:
(
:enabled ("yes")
:hsm_vendor_name ("FutureX HSM")
:lib_filename ("")
:CA_cert_public_key_handle (1)
:CA_cert_private_key_handle (2)
:CA_cert_buffer_handle (3)
:token_id ("p@ssw0rd")
)
Step Instructions
Important - This blocks all traffic until all services restart. In a cluster, this
can cause a failover.
n If the value of the ":hsm_vendor_name ()" attribute already contained the string
"FutureX HSM ", then fetch the local policy with this command:
fw fetch local
7 Make sure that the Security Gateway (every Cluster Member) can connect to the HSM
Server and that HTTPS Inspection is activated successfully on the outbound traffic.
Run this command:
cpstat https_inspection -f all
The output must show:
n HSM partition access (Accessible/Not Accessible):
Accessible
n Outbound status (HSM on/HSM off/HSM error): HSM on
For more information, see "Monitoring HTTPS Inspection with HSM in CLI" on page 110.
Note - If there is a connectivity issue from the Check Point Security Gateway
(Cluster Member) to the FutureX HSM Server, then perform these steps on the
Security Gateway (Cluster Member):
1. Examine the /var/log/fxpkcs11.log file.
If you do not see a root cause in this log file, continue to the next step to
configure verbose logs.
2. Configure these logging settings in the /etc/fxpkcs11.cfg file to see more
information in the log file:
n LOG-TRAFFIC: YES
n LOG-MODE: INFO
or
LOG-MODE: ERROR
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n In a VSX environment, you must perform this step in the context of every Virtual
System (on the VSX Gateway or every VSX Cluster Member).
Step Instructions
1 Connect to the command line on the Security Gateway (every Cluster Member).
Note - To see detailed information about wstlsd initialization, follow sk105559: How to
debug WSTLSD daemon.
Step Description
1 From the left navigation panel, click Logs & Monitor > Logs .
Log Additional
Log Description Explanation
Information
Log Additional
Log Description Explanation
Information
Log Additional
Log Description Explanation
Information
Outbound HTTPS One of these strings: See the section Log Additional Information in
inspection is the log.
n HSM
off due to HSM
configuration
error
file is
corrupted
n Loading HSM
library
failed
n There is no
trust or no
connectivity
with HSM
server
n Login to HSM
partition
failed
n Error
importing CA
certificate
from HSM
server
n Error
generating
key pair on
HSM server
Example:
.iso.org.dod.internet.private.enterprises.checkpoint.products.http
sInspection
.1.3.6.1.4.1.2620.1.54
Returned
SNMP OID Explanation
strings
To get the HTTPS Inspection status description, query this SNMP object:
Returned
SNMP OID Explanation
strings
Returned
SNMP OID Explanation
strings
To get the HSM configuration status description, query this SNMP object:
Returned
SNMP OID Explanation
strings
Important - In these
cases, outbound HTTPS
Inspection works without
the HSM Server, and
SSL keys are stored on
the Security Gateway
(Cluster Member).
To get the HSM partition access status , query this SNMP object:
Returned
SNMP OID Explanation
strings
To get the HSM partition access status description, query this SNMP object:
Returned
SNMP OID Explanation
strings
To get the Outbound HTTPS Inspection status , query this SNMP object:
Returned
SNMP OID Explanation
strings
Note - The conditions for the returned strings are calculated on the Security
Gateway (Cluster Member) during the start of the HTTPS Inspection daemon
wstlsd, or during policy installation. For example, you can get
"hsmStatus.hsmEnabled = HSM enabled" and
"hsmStatus.outboundStatus = HSM off", because when the wstlsd
daemon started, or during last policy installation, the HSM configuration was
disabled.
"Outbound HTTPS Inspection status description"
To get the Outbound HTTPS Inspection status description, query this SNMP object:
Important - In
this case,
outbound
HTTPS
Inspection does
not work, and
HTTPS traffic
does not pass
through.
Possible error messages
are:
n HSM
configuration
file is
corrupted
n Loading HSM
library failed
n There is no
trust or no
connectivity
with HSM
server
n Login to HSM
partition
failed
n Error
importing CA
certificate
from HSM
server
n Error
generating key
pair on HSM
server
Note - The conditions for the returned strings are calculated on the Security
Gateway (Cluster Member) during the start of the HTTPS Inspection daemon
wstlsd, or during policy installation. For example, you can get
"hsmStatus.hsmEnabledDescription = HSM is enabled for
HTTPS inspection with <HSM Vendor>" and
"hsmStatus.outboundStatusDescription = Outbound HTTPS
inspection works without HSM", because when the wstlsd daemon
started, or during last policy installation, the HSM configuration was disabled.
Examples
# snmpwalk -m $CPDIR/lib/snmp/chkpnt.mib -On -v 2c -c public localhost 1.3.6.1.4.1.2620.1.54
.1.3.6.1.4.1.2620.1.54.1.0 = STRING: On
.1.3.6.1.4.1.2620.1.54.2.0 = STRING: HTTPS Inspection is on
.1.3.6.1.4.1.2620.1.54.3.1.0 = STRING: Enabled
.1.3.6.1.4.1.2620.1.54.3.2.0 = STRING: HSM is enabled for HTTPS inspection with Gemalto HSM
.1.3.6.1.4.1.2620.1.54.3.3.0 = STRING: Accessible
.1.3.6.1.4.1.2620.1.54.3.4.0 = STRING: Gateway can access HSM partition for HTTPS inspection
.1.3.6.1.4.1.2620.1.54.3.5.0 = STRING: HSM on
.1.3.6.1.4.1.2620.1.54.3.6.0 = STRING: Outbound HTTPS inspection works with HSM
CHECKPOINT-MIB::httpsInspectionStatus.0 = STRING: On
CHECKPOINT-MIB::httpsInspectionStatusDescription.0 = STRING: HTTPS Inspection is on
CHECKPOINT-MIB::hsmEnabled.0 = STRING: Enabled
CHECKPOINT-MIB::hsmEnabledDescription.0 = STRING: HSM is enabled for HTTPS inspection with Gemalto HSM
CHECKPOINT-MIB::hsmPartitionAccess.0 = STRING: Accessible
CHECKPOINT-MIB::hsmPartitionAccessDescription.0 = STRING: Gateway can access HSM partition for HTTPS
inspection
CHECKPOINT-MIB::outboundStatus.0 = STRING: HSM on
CHECKPOINT-MIB::outboundStatusDescription.0 = STRING: Outbound HTTPS inspection works with HSM
For more information about SNMP on Gaia OS, see the R81 Gaia Administration Guide > Chapter System
Management > Section SNMP.
Syntax
cpstat -h
For more information about this command, see the R81 CLI Reference Guide > Chapter Security
Gateway Commands > Section cpstat.
Example outputs
[Expert@GW:0]# cpstat https_inspection -f default
[Expert@GW:0]#
[Expert@GW:0]#
[Expert@GW:0]#
Possible
Item returned Explanation
strings
Possible
Item Explanation
returned strings
Possible
Item returned Explanation
strings
HSM enabled Enabled The value of the :enabled() attribute is set to "yes" in the
(Enabled/Disabled) $FWDIR/conf/hsm_configuration.C file on the
Security Gateway (Cluster Member).
Possible returned
Item Explanation
strings
HSM enabled HSM is enabled n The value of the :enabled() attribute is set to "yes"
description for HTTPS in the $FWDIR/conf/hsm_
inspection configuration.C file on the Security Gateway
with <HSM (Cluster Member).
Vendor> n The < HSM Vendor> is the value of the ":hsm_
vendor_name ()" attribute in the
$FWDIR/conf/hsm_configuration.C file
on the Security Gateway (Cluster Member).
Possible
Item returned Explanation
strings
HSM partition access N/A Security Gateway (Cluster Member) could not
(Accessible/Not check the access to its partition on the HSM
Accessible) Server.
HSM HSM partition access Security Gateway (Cluster Member) could not
partition cannot be checked check the access to its partition on the HSM
access Server.
description Most probably, because HSM configuration is
disabled on the Security Gateway (Cluster
Member).
Possible
Item returned Explanation
strings
Note - The conditions for the returned strings are calculated on the Security
Gateway (Cluster Member) during the start of the HTTPS Inspection daemon
wstlsd, or during policy installation. For example, you can get "HSM enabled
(Enabled/Disabled) = Enabled" and "Outbound status (HSM
on/HSM off/HSM error) = HSM off", because when the wstlsd daemon
started, or during last policy installation, the HSM configuration was disabled.
Note - The conditions for the returned strings are calculated on the Security
Gateway (Cluster Member) during the start of the HTTPS Inspection daemon
wstlsd, or during policy installation. For example, you can get "HSM enabled
(Enabled/Disabled) = Enabled" and "Outbound status
description = Outbound HTTPS inspection works without
HSM", because when the wstlsd daemon started, or during last policy installation,
the HSM configuration was disabled.
Introduction 119
ISP Redundancy Modes 123
Outgoing Connections 124
Incoming Connections 125
Note - For information about ISP Redundancy on a Cluster, see the R81 ClusterXL
Administration Guide.
Introduction
ISP Redundancy connects a Security Gateway to the Internet through redundant Internet Service Provider
(ISP) links.
ISP Redundancy monitors the ISP links and chooses the best current link.
Notes:
n R81 supports two ISPs.
n ISP Redundancy is intended to traffic that originates on your internal networks
and goes to the Internet.
Item Description
1 Internal network
2 Security Gateway
3 ISP
4 Internet
Example of a typical deployment with two dedicated physical interfaces for two ISP links
Item Description
1 Internal network
2 Security Gateway
3 ISP A
4 ISP B
5 Internet
Example of a typical deployment with one dedicated physical interface for two ISP links
If only one external interface is available on the Security Gateway, you can configure two subnets on the
same external interface.
(See the R81 Gaia Administration Guide > Chapter Network Management > Section Network Interfaces >
Section Aliases.)
Both ISP links are then connected to the same Security Gateway interface, but to different next hop
routers, usually through a switch.
Item Description
1 Internal network
2 Security Gateway
3 Switch
4 ISP A
5 ISP B
6 Internet
Mode Description
Best Practice:
n If both ISPs are basically the same, use the Load Sharing mode to ensure that
you are making the best use of both ISPs.
n You may prefer to use one of your two ISPs that is more cost-effective in terms of
price and reliability. In that case, use Primary/Backup mode and set the more
cost-effective ISP as the Primary ISP link.
Outgoing Connections
n In ISP Redundancy Load Sharing mode, outgoing traffic that exits the Security Gateway on its way
to the Internet is distributed between the ISP Links. You can set a relative weight for how much you
want each of the ISP Links to be used.
For example, if one link is faster, it can be configured to route more traffic across that ISP link than
the other.
n In ISP Redundancy Primary/Backup mode, outgoing traffic uses an active primary link.
Hide NAT is used to change the source address of outgoing packets to the address of the interface,
through which the packet leaves the Security Gateway. This allows return packets to be
automatically routed through the same ISP link, because their destination address is the address of
the correct link. Hide NAT is configured by the administrator.
Incoming Connections
For external users to make incoming connections, the administrator must give each application server two
routable IP addresses, one for each ISP. The administrator must also configure Static NAT to translate the
routable addresses to the real server address.
If the servers handle different services (for example, HTTP and FTP), you can use NAT to employ only two
routable IP addresses for all the publicly available servers.
External clients use one of the two addresses. In order to connect, the clients must be able to resolve the
DNS name of the server to the correct IP address.
In the following example, the Web server www.example.com is assigned an IP address from each ISP:
n 192.168.1.2 from ISP A
n 172.16.2.2 from ISP B
If the ISP Link A is down, then IP address 192.168.1.2 becomes unavailable, and the clients must be able
to resolve the URL www.example.com to the IP address 172.16.2.2.
An incoming connection is established, based on this example, in the following sequence:
1. When an external client on the Internet contacts www.example.com , the client sends a DNS query
for the IP address of this URL.
The DNS query reaches the Security Gateway. The Security Gateway has a built-in mini-DNS server
that can be configured to intercept DNS queries (of Type A) for servers in its domain.
2. A DNS query arriving at an interface that belongs to one of the ISP links, is intercepted by the
Security Gateway.
3. If the Security Gateway recognizes the name of the host, it sends one of the following replies:
n In ISP Redundancy Primary/Backup mode, the Security Gateway replies only with the IP
addresses associated with the Primary ISP link, as long as the Primary ISP link is active.
n In ISP Redundancy Load Sharing mode, the Security Gateway replies with two IP addresses,
alternating their order.
4. If the Security Gateway is unable to handle DNS requests (for example, it may not recognize the
host name), it passes the DNS query to its original destination or the DNS server of the domain
example.com .
5. When the external client receives the reply to its DNS query, it opens a connection. Once the
packets reach the Security Gateway, the Security Gateway uses Static NAT to translate the
destination IP address 192.168.1.2 or 172.16.2.2 to the real server IP address 10.0.0.2.
6. The Security Gateway routes the reply packets from the server to the client through the same ISP
link that was used to initiate the connection.
Make sure you have the ISP data - the speed of the link and next hop IP address.
Automatic vs Manual configuration:
n If the Security Gateway object has two interfaces with Topology "External " in the Network
Management page, you can configure the ISP links automatically.
Configuring ISP links automatically
n If the Security Gateway object only one interface with Topology "External " in the Network
Management page, you must configure the ISP links manually.
Configuring ISP links manually
Procedure
The Security Gateway, or a DNS server behind it, must respond to DNS queries.
It resolves IP addresses of servers in the DMZ (or another internal network).
Get a public IP address from each ISP.
If public IP addresses are not available, register the domain to make the DNS server accessible
from the Internet.
The Security Gateway intercepts DNS queries "Type A" for the web servers in its domain that
come from external hosts.
n If the Security Gateway recognizes the external host, it replies:
l In ISP Redundancy Load Sharing mode, the Security Gateway replies with two IP
addresses, alternating their order.
l In ISP Redundancy Primary/Backup mode, the Security Gateway replies with the IP
addresses of the active ISP link.
n If the Security Gateway does not recognize the host, it passes the DNS query on to the
original destination, or to the domain DNS server.
Note - If the servers use different services (for example, HTTP and
FTP), you can use NAT for only two public IP addresses.
The Access Control Policy must allow connections through the ISP links, with Automatic Hide NAT
on network objects that start outgoing connections.
a. In the properties of the object for an internal network, select NAT > Add Automatic
Address Translation Rules .
b. Select Hide behind the gateway .
c. Click OK.
d. Define rules for publicly reachable servers (Web servers, DNS servers, DMZ servers).
n If you have one public IP address from each ISP for the Security Gateway, define
Static NAT.
Allow specific services for specific servers.
For example, make NAT rules, so that incoming HTTP connections from the two
ISPs reach a Web server, and DNS traffic from the ISP reach the DNS server.
Example: Manual Static Rules for a Web Server and a DNS Server
n If you have a public IP address from each ISP for each publicly reachable server (in
addition to the Security Gateway), define NAT rules:
i. Give each server a private IP address.
ii. Use the public IP addresses in the Original Destination.
iii. Use the private IP address in the Translated Destination.
iv. Select Any as the Original Service.
Note - If you use Manual NAT, then automatic ARP does not work for the IP
addresses behind NAT. You must configure the local.arp file as
described in sk30197.
10. Install the Access Control Policy on this Security Gateway object.
Note - ISP Redundancy settings override the VPN Link Selection settings.
When ISP Redundancy is enabled, VPN encrypted connections survive a failure of an ISP link.
The settings in the ISP Redundancy page override settings in the IPsec VPN > Link Selection page.
Step Instructions
7 Make sure that Use ongoing probing. Link redundancy mode shows the mode of the ISP
Redundancy:
High Availability (for Primary/Backup) or Load Sharing.
The VPN Link Selection now only probes the ISP configured in ISP Redundancy.
If the VPN peer is not a Check Point Security Gateway, the VPN may fail, or the third-party device may
continue to encrypt traffic to a failed ISP link.
n Make sure the third-party VPN peer recognizes encrypted traffic from the secondary ISP link as
coming from the Check Point cluster.
n Change the configuration of ISP Redundancy to not use these Check Point technologies:
l Use Probing - Makes sure that Link Selection uses another option.
l The options Load Sharing, Service Based Link Selection, and Route based probing
work only on Check Point Security Gateways and Clusters.
If used, the Security Gateway or Cluster Members use one link to connect to the third-party
VPN peer.
The link with the highest prefix length and lowest metric is used.
For more information, see the R81 CLI Reference Guide > Chapter Security Gateway Commands -
Section fw - Section fw isp_link.
2. If you use PPPoE or PPTP xDSL modems, in the PPPoE or PPTP configuration, the Use Peer as
Default Gateway option must be cleared.
Action Description
Only mirror of Your Security Gateway or Cluster clones all traffic (including HTTPS without
all traffic decryption) that passes through it, and sends it out of the designated physical
interface.
Mirror and Your Security Gateway or Cluster clones all HTTPS traffic that passes through it,
Decrypt of decrypts it, and sends it in clear-text out of the designated physical interface.
HTTPS traffic
Note - If you wish to decrypt the HTTPS traffic, you must enable and
configure the HTTPS Inspection on your Security Gateway, or Cluster.
You can add a third-party Recorder or Packet-Broker in your environment and forward to it the traffic that
passes through your Security Gateway, or Cluster.
This Recorder or Packet-Broker must work in monitor (promiscuous) mode to accept the decrypted and
mirrored traffic from your Security Gateway, or Cluster.
Security Gateway, or Cluster works only with one Recorder, which is directly connected to a designated
physical network interface (NIC) on the Check Point Gateway, or Cluster Members.
Item Description
1 First network that sends and receives traffic through the Security Gateway (2).
2 Security Gateway, through which networks (1) and (3) send and receive their traffic.
3 Second network that sends and receives traffic through the Security Gateway (2).
A Traffic flow between the first network (1) and the Security Gateway (2).
B Traffic flow between the second network (3) and the Security Gateway (2).
C Flow of the decrypted and mirrored traffic from the Security Gateway (2) to the Recorder, or
Packet-Broker (5).
Mirror only of all traffic MAC address of the designated physical interface.
2 Maximum Transmission Unit (MTU) on the Mirror and Decrypt designated physical interface:
n MTU value has to be 1500 (default), or at least the maximum MTU value from other
interfaces on the Security Gateway.
Item Description
1 Security Gateway, through which your networks send and receive their traffic.
3 Flow of the decrypted and mirrored traffic from the Security Gateway (1) to the Recorder, or
Packet-Broker (2).
Step Description
3 Configure the Mirror and Decrypt in the Security Gateway, or Cluster object in SmartConsole.
See "Configuring Mirror and Decrypt in SmartConsole for Gateway Mode" on page 139.
1 Select a designated physical interface for Mirror and Decrypt on the Security Gateway, or each
cluster member.
Important - On cluster members, you must select an interface with the same name
(for example, eth3 on each cluster member).
3 Configure the required Maximum Transmission Unit (MTU) on this designated physical
interface.
MTU has to be the default 1500, or at least the maximal MTU value from other interfaces on the
Security Gateway.
For instructions about configuring an MTU on a physical interface, see the R81 Gaia
Administration Guide - Chapter Network Management - Section Network Interfaces - Section
Physical Interfaces.
4
Important - On cluster members, you must configure this designated physical
interface in the $FWDIR/conf/discntd.if file on each Cluster Member.
Note - To apply the configuration from the file and make it persistent, install an Access
Control Policy on the cluster object. You install the Access Control Policy later, after
the required configuration steps in the SmartConsole.
Procedure
Step Description
g Click OK.
2. Configure the HTTPS Inspection Rule Base (for decrypting the HTTPS traffic).
Procedure
Step Description
3. Activate the Mirror and Decrypt in the object of your Security Gateway, or Cluster.
Procedure
Step Description
Step Description
e Make sure the interface designated for Mirror and Decrypt is listed with the dummy IP
address.
f Select the interface designated for Mirror and Decrypt and click Edit.
m Click OK to save the changes and close the Topology Settings window.
p In the Mirror gateway traffic to interface field, select the designated physical
interface.
Step Description
q Click OK to save the changes and close the Security Gateway, or Cluster properties
window.
4. Configure the Mirror and Decrypt rules in the Access Control Policy for the traffic you wish to mirror
and decrypt.
Procedure
Best Practice - We recommend you to configure a new separate Access
Control Layer to contain Mirror and Decrypt rules. Alternatively, you can
configure the Mirror and Decrypt rules in the regular Rule Base.
Important - When you configure the Mirror and Decrypt rules, these
limitations apply:
n In the Mirror and Decrypt rules, you must not select Content criteria,
such as Application, URL Filtering, Service matched by IP Protocol,
Content Awareness.
n Above the Mirror and Decrypt rules, you must not configure other rules
that contain Content criteria, such as Application, URL Filtering,
Service matched by IP Protocol, Content Awareness.
n You must configure rules that contain an excluded source or an
excluded destination above the Mirror and Decrypt rules.
The Name column of these rules cannot contain these strings:
<M&D>, <M&d>, <m&D>, or <m&d>.
The procedure below describes how to configure the Mirror and Decrypt rules in a separate
Access Control Layer in SmartConsole:
Step Description
c In SmartConsole top left corner, click Menu > Manage policies and layers .
d Select the existing policy and click Edit (the pencil icon).
Alternatively, create a new policy.
f In the Policy Types section, make sure you select only the Access Control .
g In Access Control section, click on the + (plus) icon. A pop up window opens.
h In the top right corner of this pop up window, click New Layer.
The Layer Editor window opens.
i From the navigation tree of the Layer Editor window, click General .
Step Description
j In the Blades section, make sure you select only the Firewall .
k On other pages of the Layer Editor window, configure additional applicable settings.
Click OK.
l In the Access Control section, you see the Network Layer and the new Access
Control Layer.
o In the Access Control section, click the new Access Control Layer.
In the default rule, you must change the Action column from Drop to Accept to not
affect the policy enforcement:
n Name - Your text
n Source - *Any
n Destination - *Any
n VPN - *Any
n Services & Applications - *Any
n Action - Must contain Accept
n Track - None
n Install On - *Policy Targets
Step Description
p Above the existing Cleanup rule, add the applicable rules for the traffic you wish to
Mirror and Decrypt.
You must configure the Mirror and Decrypt rules as follows:
n Name - Must contain one of these strings (the angle brackets <> are
mandatory):
l <M&D>
l <M&d>
l <m&D>
l <m&d>
higher
Important:
n In the Mirror and Decrypt rules, you must not select Content criteria,
such as Application, URL Filtering, Service matched by IP Protocol,
Content Awareness.
n Above the Mirror and Decrypt rules, you must not configure other
rules that contain Content criteria, such as Application, URL Filtering,
Service matched by IP Protocol, Content Awareness.
n You must configure rules that contain an excluded source or an
excluded destination above the Mirror and Decrypt rules.
The Name column of these rules cannot contain these strings:
<M&D>, <M&d>, <m&D>, or <m&d>.
s If in a Mirror and Decrypt rule you set the Track to Log, then you can filter the logs for
this rule by the Access Rule Name, which contains the configured string:
<M&D>, <M&d>, <m&D>, or <m&d>.
Item Description
1 VSX Gateway.
3 Virtual System, through which your networks send and receive their traffic.
4 Flow of the decrypted and mirrored traffic from the VSX Gateway (1) to the Recorder, or
Packet-Broker (2).
Note - This topology requires you to configure a VLAN Trunk on the Recorder or
Packet-Broker. The VLAN Trunk on the Recorder or Packet-Broker must accept all
VLAN IDs that you configure in the objects of the applicable Virtual Systems in
SmartConsole.
Item Description
1 VSX Gateway.
2 First Virtual System, through which your networks send and receive their traffic.
3 Second Virtual System, through which your networks send and receive their traffic.
4 Flow of the decrypted and mirrored traffic from the VSX Gateway (1) to the Recorder, or
Packet-Broker (5).
5 Recorder, or Packet-Broker.
wrp128 One of the virtual interfaces on the Virtual Systems (2 and 3).
Important - It is not supported to change the designated physical interface with the
"vsx_util change_interfaces" command. For information about this
command, see the R81 VSX Administration Guide.
Step Description
3 Configure the Mirror and Decrypt in the Virtual System object in SmartConsole.
See:
n "Configuring Mirror and Decrypt in SmartConsole for One Virtual System" on
page 148.
n "Configuring Mirror and Decrypt in SmartConsole for Several Virtual Systems" on
page 153.
1 Select a designated physical interface for Mirror and Decrypt on the VSX Gateway, or each VSX
Cluster Member.
Important - On VSX Cluster Members, you must select an interface with the same
name (for example, eth3 on each VSX Cluster Member).
3 Configure the required Maximum Transmission Unit (MTU) on this designated physical
interface.
MTU has to be the default 1500, or at least the maximal MTU value from other interfaces on the
VSX Gateway, or VSX Cluster Member.
For instructions about configuring an MTU on a physical interface, see R81 Gaia Administration
Guide - Chapter Network Management - Section Network Interfaces - Section Physical
Interfaces.
4
Important - In VSX Cluster, you must configure this designated physical interface in
the $FWDIR/conf/discntd.if file on each VSX Cluster Member.
Note - To apply the configuration from the file and make it persistent, install an Access
Control Policy on the VSX Cluster object. You install the Access Control Policy later,
after the required configuration steps in the SmartConsole.
Step Description
g Click OK.
2. Configure the HTTPS Inspection Rule Base (for decrypting the HTTPS traffic).
Procedure
Step Description
3. Add the designated physical interface in the object of the Virtual System.
Procedure
Step Description
Step Description
4. Activate the Mirror and Decrypt in the object of the Virtual System.
Procedure
Step Description
c From the left tree, click the [+] near the Other and click Mirror and Decrypt.
e In the Mirror gateway traffic to interface field, select the designated physical
interface.
f Click OK to save the changes and close the Virtual System properties window.
5. Configure the Mirror and Decrypt rules in the Access Control Policy for the traffic you wish to mirror
and decrypt.
Procedure
Best Practice - We recommend you to configure a new separate Access
Control Layer to contain Mirror and Decrypt rules. Alternatively, you can
configure the Mirror and Decrypt rules in the regular Rule Base.
Important - When you configure the Mirror and Decrypt rules, these
limitations apply:
n In the Mirror and Decrypt rules, you must not select Content criteria,
such as Application, URL Filtering, Service matched by IP Protocol,
Content Awareness.
n Above the Mirror and Decrypt rules, you must not configure other rules
that contain Content criteria, such as Application, URL Filtering,
Service matched by IP Protocol, Content Awareness.
n You must configure rules that contain an excluded source or an
excluded destination above the Mirror and Decrypt rules.
The Name column of these rules cannot contain these strings:
<M&D>, <M&d>, <m&D>, or <m&d>.
The procedure below describes how to configure the Mirror and Decrypt rules in a separate
Access Control Layer in SmartConsole:
Step Description
c In SmartConsole top left corner, click Menu > Manage policies and layers .
d Select the existing policy and click Edit (the pencil icon).
Alternatively, create a new policy.
f In the Policy Types section, make sure you select only the Access Control .
g In Access Control section, click on the + (plus) icon. A pop up window opens.
h In the top right corner of this pop up window, click New Layer.
The Layer Editor window opens.
i From the navigation tree of the Layer Editor window, click General .
j In the Blades section, make sure you select only the Firewall .
k On other pages of the Layer Editor window, configure additional applicable settings.
Click OK.
l In the Access Control section, you see the Network Layer and the new Access
Control Layer.
Step Description
o In the Access Control section, click the new Access Control Layer.
In the default rule, you must change the Action column from Drop to Accept to not
affect the policy enforcement:
n Name - Your text
n Source - *Any
n Destination - *Any
n VPN - *Any
n Services & Applications - *Any
n Action - Must contain Accept
n Track - None
n Install On - *Policy Targets
p Above the existing Cleanup rule, add the applicable rules for the traffic you wish to
Mirror and Decrypt.
You must configure the Mirror and Decrypt rules as follows:
n Name - Must contain one of these strings (the angle brackets <> are
mandatory):
l <M&D>
l <M&d>
l <m&D>
l <m&d>
higher
Step Description
Important:
n In the Mirror and Decrypt rules, you must not select Content criteria,
such as Application, URL Filtering, Service matched by IP Protocol,
Content Awareness.
n Above the Mirror and Decrypt rules, you must not configure other
rules that contain Content criteria, such as Application, URL Filtering,
Service matched by IP Protocol, Content Awareness.
n You must configure rules that contain an excluded source or an
excluded destination above the Mirror and Decrypt rules.
The Name column of these rules cannot contain these strings:
<M&D>, <M&d>, <m&D>, or <m&d>.
s If in a Mirror and Decrypt rule you set the Track to Log, then you can filter the logs for
this rule by the Access Rule Name, which contains the configured string:
<M&D>, <M&d>, <m&D>, or <m&d>.
Procedure
Step Description
g Click OK.
2. Configure the HTTPS Inspection Rule Base (for decrypting the HTTPS traffic).
Procedure
Step Description
3. Define the designated physical interface as VLAN Trunk in the object of the VSX Gateway, or VSX
Cluster.
Procedure
Note - If the Recorder or Packet-Broker connects to the VSX Gateway, or
VSX Cluster members through a Switch, configure a VLAN Trunk on the
applicable Switch port. The VLAN Trunk port on the Switch must accept all
VLAN IDs that you configure in the applicable Virtual Systems.
Step Description
3 Check the box VLAN Trunk near the designated physical interface.
4 Click OK.
4. Add the designated physical interface in the object of each applicable Virtual System.
Procedure
Step Description
5. Activate the Mirror and Decrypt in the object of each applicable Virtual System.
Procedure
Step Description
Step Description
c From the left tree, click the [+] near the Other and click Mirror and Decrypt.
e In the Mirror gateway traffic to interface field, select the designated physical
interface.
f Click OK to save the changes and close the Virtual System properties window.
6. Configure the Mirror and Decrypt rules in the Access Control Policy for the traffic you wish to mirror
and decrypt.
Procedure
Best Practice - We recommend you to configure a new separate Access
Control Layer to contain Mirror and Decrypt rules. Alternatively, you can
configure the Mirror and Decrypt rules in the regular Rule Base.
Important - When you configure the Mirror and Decrypt rules, these
limitations apply:
n In the Mirror and Decrypt rules, you must not select Content criteria,
such as Application, URL Filtering, Service matched by IP Protocol,
Content Awareness.
n Above the Mirror and Decrypt rules, you must not configure other rules
that contain Content criteria, such as Application, URL Filtering,
Service matched by IP Protocol, Content Awareness.
n You must configure rules that contain an excluded source or an
excluded destination above the Mirror and Decrypt rules.
The Name column of these rules cannot contain these strings:
<M&D>, <M&d>, <m&D>, or <m&d>.
The procedure below describes how to configure the Mirror and Decrypt rules in a separate
Access Control Layer in SmartConsole:
Step Description
c In SmartConsole top left corner, click Menu > Manage policies and layers .
d Select the existing policy and click Edit (the pencil icon).
Alternatively, create a new policy.
Step Description
f In the Policy Types section, make sure you select only the Access Control .
g In Access Control section, click on the + (plus) icon. A pop up window opens.
h In the top right corner of this pop up window, click New Layer.
The Layer Editor window opens.
i From the navigation tree of the Layer Editor window, click General .
j In the Blades section, make sure you select only the Firewall .
k On other pages of the Layer Editor window, configure additional applicable settings.
Click OK.
l In the Access Control section, you see the Network Layer and the new Access
Control Layer.
o In the Access Control section, click the new Access Control Layer.
In the default rule, you must change the Action column from Drop to Accept to not
affect the policy enforcement:
n Name - Your text
n Source - *Any
n Destination - *Any
n VPN - *Any
n Services & Applications - *Any
n Action - Must contain Accept
n Track - None
n Install On - *Policy Targets
Step Description
p Above the existing Cleanup rule, add the applicable rules for the traffic you wish to
Mirror and Decrypt.
You must configure the Mirror and Decrypt rules as follows:
n Name - Must contain one of these strings (the angle brackets <> are
mandatory):
l <M&D>
l <M&d>
l <m&D>
l <m&d>
higher
Important:
n In the Mirror and Decrypt rules, you must not select Content criteria,
such as Application, URL Filtering, Service matched by IP Protocol,
Content Awareness.
n Above the Mirror and Decrypt rules, you must not configure other
rules that contain Content criteria, such as Application, URL Filtering,
Service matched by IP Protocol, Content Awareness.
n You must configure rules that contain an excluded source or an
excluded destination above the Mirror and Decrypt rules.
The Name column of these rules cannot contain these strings:
<M&D>, <M&d>, <m&D>, or <m&d>.
s If in a Mirror and Decrypt rule you set the Track to Log, then you can filter the logs for
this rule by the Access Rule Name, which contains the configured string:
<M&D>, <M&d>, <m&D>, or <m&d>.
Item Description
2 From the left navigation panel, click Logs & Monitor > Logs .
The Mirror and Decrypt logs show this information in the More section > Mirror and Decrypt field:
Action Description
Decrypt and mirror Security Gateway decrypted and mirrored the HTTP / HTTPS traffic
Note - This can be the case even for a clear-text HTTP connection, because
the HTTPS Inspection inspects it first (example is all connections that use
proxy 8080).
Partial mirroring Security Gateway started to decrypt the traffic, but stopped later due to a
(HTTPS inspection Bypass rule (for example, a rule with a Category).
Bypass) Therefore, the mirrored connection is not complete.
When a client requests access to an application that is load balanced by ConnectControl, the request goes
through the Security Gateway or Cluster.
Item Description
1 Client request - A client starts a connection with the logical IP address of the application server
(the address assigned to the Logical server).
3 Security Gateway - The service request arrives at the destination public IP address of the
Logical Server, which is on the Security Gateway. The request is matched to the Logical Server
rule in the Rule Base. The Security Gateway directs the request to the internal IP address of the
Logical Server group.
4 Logical Server - ConnectControl determines which server in the Logical Server group is best for
the request, based on the selected load-balancing method.
Note - Make sure that rules that allow traffic for services to ConnectControl Logical
Servers and that server groups are before Access Control Policy rules that allow traffic
for those services.
Configuring ConnectControl
This procedure explains the steps to set up ConnectControl in your environment.
Procedure
1. In the SmartConsole, click Objects menu > Object Explorer (or press Ctrl+E).
2. Define a Host object for each of the servers that will be load-balanced.
In the Object Explorer, from the toolbar, click New > Host.
3. Define a Network Group object to contain all Host objects for each of the servers that will be
load-balanced.
Instructions
In the Object Explorer, from the toolbar, click New > Network Group.
a. Name the group (for example, HTTP_Server_Group).
b. Add the Host objects for each of the servers.
a. In the Object Explorer, from the toolbar, click New > Network Object > More > Logical
Server.
b. In the New Logical Server window, enter a name for the ConnectControl Logical
Server.
c. Enter a Virtual IP address.
Make sure the IP address is a public IP address.
All traffic to be load-balanced, must be directed through the cluster.
If the assigned IP address is on the same subnet as a Cluster Virtual IP address, you
also need to configure a Manual ARP proxy entry for this IP address.
i. Click Menu >Global properties > NAT - Network Address Translation.
ii. Select Merge manual proxy ARP configuration.
iii. Click OK.
iv. Configure the $FWDIR/conf/local.arp file as described in sk30197.
v. Install the Access Control Policy on this cluster object.
When you create the Logical server object, configure the server type as HTTP or
Other. This distinction is important. ConnectControl handles the connection to the
client differently for each server type.
n The HTTP server type uses HTTP redirection.
This type supports offsite HTTP servers and form-based applications, but only
works with the HTTP protocol. An HTTP Logical server makes sure that all
HTTP-connection sessions are directed to one server, which is a requirement
for many Web applications. ConnectControl finds the correct physical server,
behind the Security Gateway or offsite, based on the selected load-balancing
method. The session connections continue to go to that one server.
n The Other server type uses NAT (address translation) to send traffic to the
grouped servers.
This Logical server supports all protocols (including HTTP) and gives the most
effectively balanced load. It requires servers to be NATed by the Security
Gateway. ConnectControl mediates each service request and then selects the
server to get that request. It uses NAT to change the destination IP address of
the incoming packet. If a return connection is opened, the connection is
automatically established between the server and the client. The server's
source address in the packet is translated to the IP address of the Logical
server. On the packet's return, the Security Gateway translates the packet's
original address to the IP address of the Logical server.
This setting maintains a client's connection to the server that ConnectControl first
selected.
n Persistency by server is useful for HTTP applications, such as forms, in a
load-balanced environment with multiple Web servers. ConnectControl directs
an HTTP client to one server for all requests. This allows clients to fill forms
without the data loss that occurs if different servers take the requests.
n Persistency by service is useful if you are load balancing multiple services in
your server group. For example, in a redundant environment of two servers,
each running HTTP and FTP, ConnectControl directs traffic from one client to
the server of the correct service. This prevents heavy load on one server,
which can happen with Persistency by server.
Item Description
2 Internet.
3 Security Gateway.
The service requests arrive at the destination public IP address of the
Logical Server, which is on the Security Gateway.
The Security Gateway directs the requests to the internal IP address of the
Logical Server group.
4 Logical Server group with two servers, each with FTP and HTTP services.
ConnectControl balances the load between the servers.
Method Description
Round The Security Gateway directs service requests to the next server in
Robin the sequence.
This method is a good choice when all the load balanced servers have
similar RAM and CPU and are on the same segment.
h. Click OK.
6. From the left navigation panel, click Security Policies and click Access Control .
7. Add the Load Balancing rule to the Access Control Policy Rule Base:
8. For applications that use HTTP redirection, add a rule to allow the Network Group object (that
contains load-balanced server objects) to communicate directly with the clients:
10. Install the Access Control Policy on this Security Gateway or Cluster object.
Cloud Security
Check Point cloud security protects assets in the cloud from the most sophisticated threats with dynamic
scalability, intelligent provisioning and consistent control across physical and virtual networks.
For more information, see:
n R81 CloudGuard Controller Administration Guide
n https://www.checkpoint.com/products/
Advanced Routing
Gaia OS supports:
n Dynamic Routing protocols - OSPF, BGP, and RIP.
n Dynamic Multicast Routing - PIM Sparse Mode (SM), PIM Dense Mode (DM), PIM Source-Specific
Multicast (SSM), and IGMP.
n Different routing options.
You can configure these routing protocols and options in Gaia Portal and Gaia Clish.
For more information, see the R81 Gaia Advanced Routing Administration Guide.
SNMP
SNMP, as implemented on Check Point platforms, enables an SNMP manager to monitor the device using
GetRequest, GetNextRequest, GetBulkRequest, and a select number of traps.
The Check Point implementation also supports using SetRequest to change these attributes:
sysContact, sysLocation, and sysName. You must configure read-write permissions for set
operations to work.
Check Point Gaia supports SNMP v1, v2, and v3.
For more information, see the R81 Gaia Administration Guide > Chapter System Management > Section
SNMP.
Item Description
1 Switch with a mirror or SPAN port that duplicates all incoming and outgoing packets.
The Security Gateway connects to a mirror or SPAN port on the switch.
2 Servers.
3 Clients.
Item Description
3 Switch that connects the first network segment to one bridged slave interface (4) on the Security
Gateway in Bridge Mode.
4 One bridged slave interface (for example, eth1) on the Security Gateway in Bridge Mode.
6 Another bridged slave interface (for example, eth2) on the Security Gateway in Bridge Mode.
7 Dedicated Gaia Management Interface (for example, eth0) on the Security Gateway.
8 Switch that connects the second network segment to the other bridged slave interface (6) on the
Security Gateway in Bridge Mode.
Baseline
Name of Policy Description
Security
Initial Policy InitialPolicy Security before a policy is installed for the first time, or when
Security Gateway failed to load the policy.
Important - If you disable the boot security or unload the currently installed policy, you
leave your Security Gateway, or a Cluster Member without protection.
Best Practice - Before you disable the boot security, we recommend to
disconnect your Security Gateway, or a Cluster Member from the network
completely.
Command Description
Boot Security
The Boot Security protects the Security Gateway and its networks, during the boot:
n Disables the IP Forwarding in Linux OS kernel
n Loads the Default Filter Policy
Important - In a Cluster, you must configure all the Cluster Members in the same way.
The Default Filter Policy (defaultfilter) protects the Security Gateway from the time it boots up
until it installs the user-defined Security Policy.
Boot Security disables IP Forwarding and loads the Default Filter Policy.
There are three Default Filters templates on the Security Gateway:
Default Filter
Default Filter Policy File Description
Mode
Default Filter
Default Filter Policy File Description
Mode
Step Description
1 Make sure to configure and install a Security Policy on the Security Gateway.
Step Description
n The new complied Default Filter file for IPv4 traffic is:
$FWDIR/state/default.bin
n The new complied Default Filter file for IPv6 traffic is:
$FWDIR/state/default.bin6
8 Copy new complied Default Filter file to the path of the Default Filter Policy file.
n For IPv4 traffic, run:
cp -v $FWDIR/state/default.bin
/etc/fw.boot/default.bin
n For IPv6 traffic, run:
cp -v $FWDIR/state/default.bin6
/etc/fw.boot/default.bin6
Important - If the new Default Filter Policy fails and blocks all access
through the network interfaces, you can unload that Default Filter
Policy and install the working policy.
Administrators with Check Point INSPECT language knowledge can define customized Default Filters.
Important - Make sure your customized Default Filter policy does not interfere with
the Security Gateway boot process.
Step Description
1 Make sure to configure and install a Security Policy on the Security Gateway.
Step Description
6 Edit the new Default Filter Policy file to include the applicable INSPECT code.
Important - Your customized Default Filter must not use these
functions:
n Logging
n Authentication
n Encryption
n Content Security
n The new complied Default Filter file for IPv4 traffic is:
$FWDIR/state/default.bin
n The new complied Default Filter file for IPv6 traffic is:
$FWDIR/state/default.bin6
Step Description
9 Copy new complied Default Filter file to the path of the Default Filter Policy file.
n For IPv4 traffic, run:
cp -v $FWDIR/state/default.bin
/etc/fw.boot/default.bin
n For IPv6 traffic, run:
cp -v $FWDIR/state/default.bin6
/etc/fw.boot/default.bin6
Important - If the new Default Filter Policy fails and blocks all access
through the network interfaces, you can unload that Default Filter
Policy and install the working policy.
It is sometimes necessary to stop the Security Gateway for maintenance. It is not always practical to
disconnect the Security Gateway from the network (for example, if the Security Gateway is on a remote
site).
To stop the Security Gateway for maintenance and maintain security, you can run:
Command Description
Note - Only security rules that do not use user space processes continue
to work.
Note - During a Check Point upgrade, a SIC certificate reset, or license expiration, the
Initial Policy overwrites the user-defined policy.
The sequence of actions during boot of the Security Gateway until a Security Policy is loaded for the first
time:
Step Description
2 The Security Gateway disables IP Forwarding and loads the Default Filter policy.
5 The Security Gateway fetches the Initial Policy from the local directory.
6 Administrator installs the user-defined Security Policy from the Management Server.
The Security Gateway enforces the Initial Policy until administrator installs a user-defined policy.
In subsequent boots, the Security Gateway loads the user-defined policy immediately after the Default
Filter policy.
There are different Initial Policies for Standalone and distributed setups:
n In a Standalone configuration, where the Security Management Server and the Security Gateway
are on the same computer, the Initial Policy allows CPMI management communication only.
This permits SmartConsole clients to connect to the Security Management Server.
n In a distributed configuration, where the Security Management Server is on one computer and the
Security Gateway is on a different computer, the Initial Policy:
l Allows the cpd and fwd daemons to communicate for SIC (to establish trust) and for Policy
installation.
l Does not allow CPMI connections through the Security Gateway.
The SmartConsole is not be able to connect to the Security Management Server, if the
SmartConsole must access the Security Management Server through a Security Gateway
with the Initial Policy.
Step Description
Syntax Legend
Whenever possible, this guide lists commands, parameters and options in the alphabetical order.
This guide uses this convention in the Command Line Interface (CLI) syntax:
Character Description
n This command:
cpwd_admin config -a <options>
n Or this command:
cpwd_admin config -d <options>
n Or this command:
cpwd_admin config -p
n Or this command:
cpwd_admin config -r
n Or this command:
cpwd_admin del <options>
Curly brackets or braces Enclose a list of available commands or parameters, separated by the
{ } vertical bar |.
User can enter only one of the available commands or parameters.
Square brackets or Enclose an optional command or parameter, which user can also enter.
brackets
[ ]
comp_init_policy
Description
Generates, loads, or removes the Initial Policy on a Security Gateway, or a Cluster Member.
Until the Security Gateway or cluster administrator installs the user-defined Security Policy on the Security
Gateway or Cluster Members for the first time, security is enforced by an Initial Policy.
The Initial Policy operates by adding "implied rules" to the Default Filter.
These rules forbid most of the communication, but allow the communication needed for the installation of
the Security Policy.
The Initial Policy also protects a Security Gateway or Cluster Members in these cases:
n During Check Point product upgrades
n When a SIC certificate is reset on the Security Gateway or Cluster Member
n When Check Point product license expires
The Initial Policy is enforced until a policy is installed, and is never loaded again. In subsequent boots, the
regular policy is loaded immediately after the Default Filter.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Notes:
n You must run this command from the Expert mode.
n The Initial Policy overwrites the user-defined policy.
n Output of the "cpstat -f policy fw" command (see "cpstat" on
page 220) shows the name of this policy as "InitialPolicy".
n Security Gateway, or Cluster Member stores the installed Access Control Policy
in these directories:
l $FWDIR/state/__tmp/FW1/
l $FWDIR/state/local/FW1/
Syntax
Parameters
Parameter Description
Example
[Expert@GW:0]# cd $FWDIR/state/local/FW1/
[Expert@GW:0]#
[Expert@GW:0]# pwd
/opt/CPsuite-R81/fw1/state/local/FW1
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 7744
-rw-r--r-- 1 admin root 20166 Jun 13 16:34 install_policy_report.txt
-rw-r--r-- 1 admin root 55 Jun 13 16:34 install_policy_report_timing.txt
-rw-r--r-- 1 admin root 37355 Jun 13 16:34 local.Sandbox-persistence.xml
... output was cut for brevity ...
-rw-r--r-- 1 admin root 2278 Jun 13 16:34 local.vsx_cluster_netobj
-rw-r--r-- 1 admin root 5172 Jun 13 16:34 local.{939922F7-DF98-4988-B776-B70B9B8340F3}
-rw-r--r-- 1 admin root 10328 Jun 13 16:34 local.{B9D14722-3936-4B33-814B-F87EA4062BEB}
-rw-r----- 1 admin root 14743 Jun 13 16:34 manifest.C
-rw-r--r-- 1 admin root 7381 Jun 13 16:34 policy.info
-rw-r--r-- 1 admin root 2736 Jun 13 16:34 policy.map
-rw-r--r-- 1 admin root 51 Jun 13 16:34 sig.map
[Expert@GW:0]#
[Expert@GW:0]# comp_init_policy -u
erasing local state..
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 0
[Expert@GW:0]#
[Expert@GW:0]# comp_init_policy -g
initial_module:
Compiled OK.
initial_module:
Compiled OK.
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 56
-rw-rw---- 1 admin root 8 Jul 19 19:51 local.ctlver
-rw-rw---- 1 admin root 4514 Jul 19 19:51 local.fc
-rw-rw---- 1 admin root 4721 Jul 19 19:51 local.fc6
-rw-rw---- 1 admin root 235 Jul 19 19:51 local.ft
-rw-rw---- 1 admin root 317 Jul 19 19:51 local.ft6
-rw-rw---- 1 admin root 135 Jul 19 19:51 local.fwrl.conf
-rw-rw---- 1 admin root 14 Jul 19 19:51 local.ifs
-rw-rw---- 1 admin root 833 Jul 19 19:51 local.inspect.lf
-rw-rw---- 1 admin root 243 Jul 19 19:51 local.lg
-rw-rw---- 1 admin root 243 Jul 19 19:51 local.lg6
-rw-rw---- 1 admin root 0 Jul 19 19:51 local.magic
-rw-rw---- 1 admin root 3 Jul 19 19:51 local.set
-rw-rw---- 1 admin root 51 Jul 19 19:51 sig.map
[Expert@GW:0]#
control_bootsec
Description
Controls the boot security - loading of both the Default Filter policy (defaultfilter) and the Initial
Policy (InitialPolicy) during boot on a Security Gateway, or a Cluster Member.
Warning - If you disable the boot security, you leave your Security Gateway, or a
Cluster Member without any protection during the boot. Before you disable the boot
security, we recommend to disconnect your Security Gateway, or a Cluster Member
from the network completely.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Notes:
n You must run this command from the Expert
mode.
n The changes made with this command survive
reboot.
n Refer to these related commands:
l "comp_init_policy" on page 183
l "fwboot bootconf" on page 402
l "fw defaultgen" on page 295
l "fwboot default" on page 414
Syntax
Parameters
Parameter Description
[Expert@GW:0]# cd $FWDIR/state/local/FW1/
[Expert@GW:0]#
[Expert@GW:0]# pwd
/opt/CPsuite-R81/fw1/state/local/FW1
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 7736
-rw-rw---- 1 admin root 11085 Jul 19 20:16 install_policy_report.txt
-rw-rw---- 1 admin root 56 Jul 19 20:16 install_policy_report_timing.txt
-rw-rw---- 1 admin root 37355 Jul 19 20:16 local.Sandbox-persistence.xml
-rw-rw---- 1 admin root 3 Jul 19 20:16 local.ad_query_profiles
... ... ...
-rw-r----- 1 admin root 14743 Jul 19 20:16 manifest.C
-rw-rw---- 1 admin root 7381 Jul 19 20:16 policy.info
-rw-rw---- 1 admin root 2736 Jul 19 20:16 policy.map
-rw-rw---- 1 admin root 51 Jul 19 20:16 sig.map
[Expert@GW:0]#
[Expert@GW:0]# $FWDIR/bin/control_bootsec -r
Disabling boot security
FW-1 will not load a default filter on boot
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 0
[Expert@GW:0]#
[Expert@GW:0]# cd $FWDIR/state/local/FW1/
[Expert@GW:0]#
[Expert@GW:0]# pwd
/opt/CPsuite-R81/fw1/state/local/FW1
[Expert@GW:0]#
[Expert@GW:0]# control_bootsec -g
Enabling boot security
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 56
-rw-rw---- 1 admin root 8 Jul 19 20:22 local.ctlver
-rw-rw---- 1 admin root 4514 Jul 19 20:22 local.fc
-rw-rw---- 1 admin root 4721 Jul 19 20:22 local.fc6
-rw-rw---- 1 admin root 235 Jul 19 20:22 local.ft
-rw-rw---- 1 admin root 317 Jul 19 20:22 local.ft6
-rw-rw---- 1 admin root 135 Jul 19 20:22 local.fwrl.conf
-rw-rw---- 1 admin root 14 Jul 19 20:22 local.ifs
-rw-rw---- 1 admin root 833 Jul 19 20:22 local.inspect.lf
-rw-rw---- 1 admin root 243 Jul 19 20:22 local.lg
-rw-rw---- 1 admin root 243 Jul 19 20:22 local.lg6
-rw-rw---- 1 admin root 0 Jul 19 20:22 local.magic
-rw-rw---- 1 admin root 3 Jul 19 20:22 local.set
-rw-rw---- 1 admin root 51 Jul 19 20:22 sig.map
[Expert@GW:0]#
cp_conf
Description
Configures or reconfigures a Check Point product installation.
Note - The available options for each Check Point computer depend on the
configuration and installed products.
cp_conf
-h
adv_routing <options>
auto <options>
corexl <options>
fullha <options>
ha <options>
intfs <options>
lic <options>
sic <options>
snmp <options>
Parameters
Parameter Description
adv_routing Enables or disables the Advanced Routing feature on this Security Gateway.
<options>
Important - Do not use these outdated commands. To configure
Advanced Routing, see the R81 Gaia Advanced Routing
Administration Guide.
auto <options> Shows and configures the automatic start of Check Point products during boot.
See "cp_conf auto" on page 192.
Parameter Description
intfs Sets the topology of interfaces on a Security Gateway, which you manage with
<options> SmartProvisioning.
See "cp_conf intfs" on page 197.
cp_conf auto
Description
Shows and controls which of Check Point products start automatically during boot.
Note - This command corresponds to the option Automatic start of Check Point
Products in the "cpconfig" on page 201 menu.
Syntax
cp_conf auto
-h
{enable | disable} <Product1> <Product2> ...
get all
Parameters
Parameter Description
{enable | disable} <Product1> Controls whether the installed Check Point products start
<Product2> ... automatically during boot.
This command is for Check Point use only.
[Expert@GW:0]#
cp_conf corexl
Description
Enables or disables CoreXL.
For more information, see the R81 Performance Tuning Administration Guide.
Important:
n This command is for Check Point use only.
To configure CoreXL, use the Check Point CoreXL option in the "cpconfig" on page 201
menu.
n After all changes in CoreXL configuration on the Security Gateway, you must reboot it.
n In Custer, you must configure all the Cluster Members in the same way.
Syntax
n To enable CoreXL with 'n' IPv4 Firewall instances and optionally 'k' IPv6 Firewall instances:
n To disable CoreXL:
Parameters
Parameter Description
Example
Currently, the Security Gateway runs two IP4v CoreXL Firewall instances (KERN_INSTANCE_NUM = 2).
We change the number of IP4v CoreXL Firewall instances to three.
cp_conf fullha
Description
Manages the state of the Full High Availability Cluster:
n Enables the Full High Availability Cluster
n Disables the Full High Availability Cluster
n Deletes the Full High Availability peer
n Shows the Full High Availability state
Important - To configure a Full High Availability cluster, follow the R81 Installation and
Upgrade Guide.
Syntax
cp_conf fullha
enable
del_peer
disable
state
Parameters
Parameter Description
del_peer Deletes the Full High Availability peer from the configuration.
Example
cp_conf ha
Description
Enables or disables cluster membership on this Security Gateway.
Important - This command is for Check Point use only. To configure cluster
membership, you must use the "cpconfig" on page 201 command.
For more information, see the R81 ClusterXL Administration Guide.
Syntax
Parameters
Parameter Description
norestart Optional: Specifies to apply the configuration change without the restart of Check Point
services. The new configuration takes effect only after reboot.
Example 1 - Enable the cluster membership without restart of Check Point services
[Expert@MyGW:0]#
Example 2 - Disable the cluster membership without restart of Check Point services
[Expert@MyGW:0]#
cp_conf intfs
Description
Sets the topology of interfaces on a Security Gateway, which you manage with SmartProvisioning.
For more information, see the R81 SmartProvisioning Administration Guide.
Syntax
cp_conf intfs
get
set
auxiliary <Name of Interface>
DMZ <Name of Interface>
external <Name of Interface>
internal <Name of Interface>
Parameters
Parameter Description
cp_conf lic
Description
Shows, adds and deletes Check Point licenses.
Note - This command corresponds to the option Licenses and contracts in the
"cpconfig" on page 201 menu.
Syntax
cp_conf lic
-h
add -f <Full Path to License File>
add -m <Host> <Date> <Signature Key> <SKU/Features>
del <Signature Key>
get [-x]
Parameters
Parameter Description
add -f <Full Path to License Adds a license from the specified Check Point license
File> file.
You get this license file in the Check Point User Center.
cp_conf sic
Description
Manages SIC on the Security Gateway.
For additional information, see sk65764: How to reset SIC.
Syntax
cp_conf
-h
sic
cert_pull <Management Server> <DAIP GW object>
init <Activation Key> [norestart]
state
Parameters
Parameter Description
cert_pull <Management For DAIP Security Gateways, pulls a SIC certificate from the
Server> <DAIP GW specified Management Server for the specified DAIP Security
object> Gateway:
n <Management Server> - IPv4 address or HostName of the
Security Management Server or Domain Management
Server
n <DAIP GW object> - Name of the DAIP Security Gateway
object as configured in SmartConsole
Example
[Expert@MyGW:0]#
cpconfig
Description
This command starts the Check Point Configuration Tool.
This tool lets you configure specific settings for the installed Check Point products.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Syntax
cpconfig
Menu Options
Note - The options shown depend on the configuration and installed products.
Licenses and contracts Manages Check Point licenses and contracts on this Security
Gateway or Cluster Member.
Random Pool Configures the RSA keys, to be used by Gaia Operating System.
Secure Internal Communication Manages SIC on the Security Gateway or Cluster Member.
This change requires a restart of Check Point services on the
Security Gateway or Cluster Member.
For more information, see:
n The R81 Security Management Administration Guide.
n sk65764: How to reset SIC.
Enable cluster membership for Enables the cluster membership on the Security Gateway.
this gateway This change requires a reboot of the Security Gateway.
For more information, see the:
n R81 Installation and Upgrade Guide.
n R81 ClusterXL Administration Guide.
Disable cluster membership for Disables the cluster membership on the Security Gateway.
this gateway This change requires a reboot of the Security Gateway.
For more information, see the:
n R81 Installation and Upgrade Guide.
n R81 ClusterXL Administration Guide.
Enable Check Point Per Virtual Enables Virtual System Load Sharing on the VSX Cluster
System State Member.
For more information, see the R81 VSX Administration Guide.
Disable Check Point Per Virtual Disables Virtual System Load Sharing on the VSX Cluster
System State Member.
For more information, see the R81 VSX Administration Guide.
Enable Check Point ClusterXL Enables Check Point ClusterXL for Bridge mode.
for Bridge Active/Standby This change requires a reboot of the Cluster Member.
For more information, see the:
n R81 Installation and Upgrade Guide.
n R81 ClusterXL Administration Guide.
Disable Check Point ClusterXL Disables Check Point ClusterXL for Bridge mode.
for Bridge Active/Standby This change requires a reboot of the Cluster Member.
For more information, see the:
n R81 Installation and Upgrade Guide.
n R81 ClusterXL Administration Guide.
Check Point CoreXL Manages CoreXL on the Security Gateway or Cluster Member.
After all changes in CoreXL configuration, you must reboot the
Security Gateway or Cluster Member.
For more information, see the R81 Performance Tuning
Administration Guide.
Automatic start of Check Point Shows and controls which of the installed Check Point products
Products start automatically during boot.
[Expert@MySingleGW:0]# cpconfig
This program will let you re-configure
your Check Point products configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) SNMP Extension
(3) PKCS#11 Token
(4) Random Pool
(5) Secure Internal Communication
(6) Enable cluster membership for this gateway
(7) Check Point CoreXL
(8) Automatic start of Check Point Products
(9) Exit
[Expert@MyClusterMember:0]# cpconfig
This program will let you re-configure
your Check Point products configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) SNMP Extension
(3) PKCS#11 Token
(4) Random Pool
(5) Secure Internal Communication
(6) Disable cluster membership for this gateway
(7) Enable Check Point Per Virtual System State
(8) Enable Check Point ClusterXL for Bridge Active/Standby
(9) Check Point CoreXL
(10) Automatic start of Check Point Products
(11) Exit
cpinfo
Description
A utility that collects diagnostics data on your Check Point computer at the time of execution.
It is mandatory to collect these data when you contact Check Point Support about an issue on your Check
Point computer.
For more information, see sk92739.
cplic
Description
The cplic command lets you manage Check Point licenses.
You can run this command in Gaia Clish or in the Expert Mode.
License Management is divided into three types of commands:
Licensing
Applies To Description
Commands
Local Management You execute these commands locally on the Check Point computers.
licensing Servers,
commands Security
Gateways and
Cluster
Members
Remote Management You execute these commands on the Security Management Server or
licensing Servers only Domain Management Server. These changes affect the managed
commands Security Gateways and Cluster Members.
License Management You execute these commands on the Security Management Server or
Repository Servers only Domain Management Server. These changes affect the licenses
commands stored in the local license repository.
For more about managing licenses, see the R81 Security Management Administration Guide.
cplic [-d]
{-h | -help}
check <options>
contract <options>
del <options>
print <options>
put <options>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
check Confirms that the license includes the feature on the local Security Gateway or
<options> Security Management Server.
See "cplic check" on page 207.
contract Manages (deletes and installs) the Check Point Service Contract on the local
<options> Check Point computer.
See "cplic contract" on page 209.
del <options> Deletes a Check Point license on a host, including unwanted evaluation, expired,
and other licenses.
See "cplic del" on page 211.
print Prints details of the installed Check Point licenses on the local Check Point
<options> computer.
See "cplic print" on page 212.
cplic check
Description
Confirms that the license includes the feature on the local Security Gateway or Management Server. See
sk66245.
Syntax
cplic [-d] check [-p <Product>] [-v <Version>] [{-c | -count}] [-t
<Date>] [{-r | -routers}] [{-S | -SRusers}] <Feature>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
Parameter Description
cplic contract
Description
Deletes the Check Point Service Contract on the local Check Point computer.
Installs the Check Point Service Contract on the local Check Point computer.
Note
n For more information about Service Contract files, see sk33089: What is a
Service Contract File?
n If you install a Service Contract on a managed Security Gateway / Cluster
Member, you must update the license repository on the applicable Management
Server - either with the "cplic get" command, or in SmartUpdate.
Syntax
cplic contract -h
Parameters
Parameter Description
cplic del
Description
Deletes a Check Point license on a host, including unwanted evaluation, expired, and other licenses.
This command can delete a license on both local computer, and on remote managed computers.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
<Object Name> The name of the Security Gateway / Cluster Member object as defined in
SmartConsole.
cplic print
Description
Prints details of the installed Check Point licenses on the local Check Point computer.
Note - On a Security Gateway / Cluster Member, this command prints all installed
licenses (both Local and Central).
Syntax
Parameters
Parameter Description
Example 1
Example 2
cplic put
Description
Installs one or more Local licenses on a Check Point computer.
Note - You get the license details in the Check Point User Center.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
{-o | - On a Security Gateway / Cluster Member, this command erases only the local
overwrite} licenses, but not central licenses that are installed remotely.
{-c | - Verifies the license. Checks if the IP of the license matches the Check Point
check-only} computer and if the signature is valid.
{-s | - Selects only the local license whose IP address matches the IP address of the
select} Check Point computer.
{-P | -Pre- Use this option after you have upgraded and before you reboot the Check Point
boot} computer.
Use of this option will prevent certain error messages.
Parameter Description
<Host> Hostname or IP address of the Security Gateway / Cluster Member for a local
license.
Hostname or IP address of the Security Management Server / Domain
Management Server for a central license.
< The SKU of the license summarizes the features included in the license.
SKU/Features For example: CPSUITE-EVAL-3DES-vNG
>
Copy and paste the parameters from the license received from the User Center:
Parameter Description
SKU/features A string listing the SKU and the Certificate Key of the license.
The SKU of the license summarizes the features included in the license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab
Example
cpprod_util
Description
This utility lets you work with Check Point Registry ($CPDIR/registry/HKLM_registry.data)
without manually opening it:
n Shows which Check Point products and features are enabled on this Check Point computer.
n Enables and disables Check Point products and features on this Check Point computer.
Syntax
cpprod_util -dump
Parameters
Parameter Description
"< Specifies the configuration parameter for the specified product or feature.
Parameter
>"
"<Value>" Specifies the value of the configuration parameter for the specified product or feature:
Notes
n On a Multi-Domain Server, you must run this command in the context of the relevant Domain
Management Server.
n If you run the cpprod_util command without parameters, it prints:
l The list of all available products and features (for example, "FwIsFirewallMgmt",
"FwIsLogServer", "FwIsStandAlone")
l The type of the expected argument when you configure a product or feature ("no-
parameter", "string-parameter", or "integer-parameter")
l The type of the returned output ("status-output", or "no-output")
n To redirect the output of the cpprod_util command, it is necessary to redirect the stderr to
stdout:
Example:
Examples
Example - Showing a list of all installed Check Point Products Packages on a Security
Gateway
[Expert@MyGW:0]# cpprod_util CPPROD_GetInstalledProducts
CPFC
IDA
MGMT
FW1
SecurePlatform
CPinfo
DIAG
PPACK
CVPN
[Expert@MyGW:0]#
cpstart
Description
Manually starts all Check Point processes and applications.
Syntax
Parameters
Important - These parameters are for Check Point internal use. Do not use them,
unless explicitly instructed by Check Point Support or R&D to do so.
Parameter Description
-fwflag - Starts Check Point processes and loads the Default Filter policy
default (defaultfilter).
cpstat
Description
Displays the status and statistics information of Check Point applications.
Syntax
cpstat [-d] [-h <Host>] [-p <Port>] [-s <SICname>] [-f <Flavor>] [-o
<Polling Interval> [-c <Count>] [-e <Period>]] <Application Flag>
Note - You can write the parameters in the syntax in any order.
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
The output shows the SNMP queries and SNMP responses for the applicable SNMP
OIDs.
-h <Host> Optional.
When you run this command on a Management Server, this parameter specifies the
managed Security Gateway.
<Host> is an IPv4 address, a resolvable hostname, or a DAIP object name.
The default is localhost.
Note - On a Multi-Domain Server, you must run this command in the
context of the applicable Domain Management Server:mdsenv <IP
Address or Name of Domain Management Server>.
-p <Port> Optional.
Port number of the Application Monitoring (AMON) server.
The default port is 18192.
-s Optional.
<SICname> Secure Internal Communication (SIC) name of the Application Monitoring (AMON)
server.
Parameter Description
-f <Flavor> Optional.
Specifies the type of the information to collect.
If you do not specify a flavor explicitly, the command uses the first flavor in the
<Application Flag>. To see all flavors, run the cpstat command without any
parameters.
-o <Polling Optional.
Interval> Specifies the polling interval (in seconds) - how frequently the command collects and
shows the information.
Examples:
n 0 - The command shows the results only once and the stops (this is the default
value).
n 5 - The command shows the results every 5 seconds in the loop.
n 30 - The command shows the results every 30 seconds in the loop.
n N - The command shows the results every N seconds in the loop.
Use this parameter together with the "-c <Count>" parameter and the "-e
<Period>" parameter.
Example:
cpstat os -f perf -o 2
-c <Count> Optional.
Specifies how many times the command runs and shows the results before it stops.
You must use this parameter together with the "-o <Polling Interval>"
parameter.
Examples:
n 0 - The command shows the results repeatedly every <Polling
Interval> (this is the default value).
n 10 - The command shows the results 10 times every <Polling
Interval> and then stops.
n 20 - The command shows the results 20 times every <Polling
Interval> and then stops.
n N - The command shows the results N times every <Polling Interval>
and then stops.
Example:
cpstat os -f perf -o 2 -c 2
-e <Period> Optional.
Specifies the time (in seconds), over which the command calculates the statistics.
You must use this parameter together with the "-o <Polling Interval>"
parameter.
You can use this parameter together with the "-c <Count>" parameter.
Example:
cpstat os -f perf -o 2 -c 2 -e 60
Parameter Description
< Mandatory.
Application See the table below with flavors for the application flags.
Flag>
Note - The available flags depend on the enabled Software Blades. Some flags are
supported only by a Security Gateway, and some flags are supported only by a
Management Server.
Feature or
Software Flag Flavors
Blade
List of enabled blades fw, ips, av, urlf, vpn, cvpn, aspm, dlp,
Software appi, anti_bot, default, content_
Blades awareness, threat-emulation, default
Anti-Virus ci default
Feature or
Software Flag Flavors
Blade
QoS fg all
Feature or
Software Flag Flavors
Blade
Provisioning PA default
Agent
Examples
Network interfaces
--------------------------------------------------------------------------------------------------------
------------
|Name|IP |Netmask |Flags|Peer name|Remote IP|Topology|Proxy name|Slaves|Ports|IPv6
Address|IPv6 Len|
--------------------------------------------------------------------------------------------------------
------------
|eth0|192.168.30.40|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth1| 172.30.60.80|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth2| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth3| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth4| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth5| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth6| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth7| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
--------------------------------------------------------------------------------------------------------
------------
[Expert@MyGW:0]#
Interface table
---------------------------------------
|Name|Dir|Total |Accept|Deny |Log|
---------------------------------------
|eth0|in | 2393126| 32589| 2360537| 52|
|eth0|out| 33016| 33016| 0| 0|
|eth1|in | 2360350| 0| 2360350| 0|
|eth1|out| 0| 0| 0| 0|
|eth2|in | 2360350| 0| 2360350| 0|
|eth2|out| 0| 0| 0| 0|
|eth3|in | 2348704| 0| 2348704| 1|
|eth3|out| 0| 0| 0| 0|
|eth4|in | 2360350| 0| 2360350| 0|
|eth4|out| 0| 0| 0| 0|
---------------------------------------
| | |11855896| 65605|11790291| 53|
---------------------------------------
[Expert@MyGW:0]#
Example - CPU utilization
[Expert@HostName:0]# cpstat -f cpu os
CPU User Time (%): 1
CPU System Time (%): 0
CPU Idle Time (%): 99
CPU Usage (%): 1
CPU Queue Length: -
CPU Interrupts/Sec: 172
CPUs Number: 8
[Expert@HostName:0]#
Example - Performance
[Expert@HostName:0]# cpstat os -f perf -o 2 -c 2 -e 60
[Expert@HostName:0]#
cpstop
Description
Manually stops all Check Point processes and applications.
Syntax
Parameters
Important - These parameters are for Check Point internal use. Do not use them,
unless explicitly instructed by Check Point Support or R&D to do so.
Parameter Description
Note - Only security rules that do not use user space processes continue to work.
Example
See these articles:
n sk35496
n sk113045
cpview
Overview of CPView
Description
CPView is a text based built-in utility on a Check Point computer.
CPView Utility shows statistical data that contain both general system information (CPU, Memory, Disk
space) and information for different Software Blades (only on Security Gateway).
The CPView continuously updates the data in easy to access views.
On Security Gateway, you can use this statistical data to monitor the performance.
For more information, see sk101878.
Syntax
cpview --help
Section Description
Header This view shows the time the statistics in the third view are collected.
It updates when you refresh the statistics.
Navigation This menu bar is interactive. Move between menus with the arrow keys and mouse.
A menu can have sub-menus and they show under the menu bar.
Using CPView
Use these keys to navigate the CPView:
Key Description
Q Quits CPView.
Key Description
Use these keys to save statistics, show help, and refresh statistics:
Key Description
C Saves the current page to a file. The file name format is:
cpview_<ID of the cpview process>.cap<Number of the capture>
dynamic_objects
Description
Manages dynamic objects and their applicable ranges of IP addresses on the Security Gateway.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Workflow
Step Description
1 In SmartConsole:
1. Define the applicable dynamic object.
2. Install the Access Control Policy on the Security Gateway.
Syntax
n To show all configured dynamic objects and their ranges of IP addresses:
dynamic_objects -l
n To update the specific existing dynamic object (and assign a different range of IP addresses to it):
dynamic_objects -c
n To delete the specific existing dynamic object (and all ranges of IP addresses assigned to it):
n To delete all the existing dynamic objects (and all ranges of IP addresses assigned to them):
dynamic_objects -e
Parameters
Parameter Description
Example 1 - Create a new dynamic object named "bigserver" and assign to it the range of IP addresses
192.168.2.30-192.168.2.40
Run either these two commands:
dynamic_objects -n bigserver
dynamic_objects -o bigserver -r 192.168.2.30 192.168.2.40 -a
Example 2 - Update the ranges of IP addresses assigned to the dynamic object named "bigserver" from
the current range to the new range 192.168.2.60-192.168.2.80
dynamic_objects -u bigserver -r 192.168.2.60 192.168.2.80
cpwd_admin
Description
The Check Point WatchDog (cpwd) is a process that invokes and monitors critical processes such as
Check Point daemons on the local computer, and attempts to restart them if they fail.
Among the processes monitored by Watchdog are fwm, fwd, cpd, DAService, and others.
The list of monitored processes depends on the installed and configured Check Point products and
Software Blades.
The Check Point WatchDog writes monitoring information to the $CPDIR/log/cpwd.elg log file.
The cpwd_admin utility shows the status of the monitored processes, and configures the Check Point
WatchDog.
Monitoring Description
Passive WatchDog restarts the process only when the process terminates abnormally.
In the output of the cpwd_admin list command, the MON column shows N for
passively monitored processes.
Syntax
cpwd_admin
config <options>
del <options>
detach <options>
exist
flist <options>
getpid <options>
kill
list <options>
monitor_list
start <options>
start_monitor
stop <options>
stop_monitor
Parameters
Parameter Description
start_ Starts the active WatchDog monitoring - WatchDog monitors the predefined
monitor processes actively.
See "cpwd_admin start_monitor" on page 252.
stop_ Stops the active WatchDog monitoring - WatchDog monitors all processes only
monitor passively.
See "cpwd_admin stop_monitor" on page 255.
cpwd_admin config
Description
Configures the Check Point WatchDog.
Important - After changing the WatchDog configuration parameters, you must restart
the WatchDog process with the cpstop and cpstart commands (which restart all
Check Point processes).
Syntax
cpwd_admin config
-h
-a <options>
-d <options
-p
-r
Parameters
Parameter Description
These are the available configuration parameters and the accepted values:
Configuration Accepted
Description
Parameter Values
default_ Text string up On a VSX Gateway, configures the CTX value that is assigned to
ctx to 128 monitored processes, for which no CTX is specified.
characters
rerun_ n 0 Configures whether the WatchDog restarts processes after they fail:
mode n 1
(default) n 0 - Does not restart a failed process. Monitor and log only.
n 1 - Restarts a failed process (this is the default).
reset_ n Range: Configures the time (in seconds) the WatchDog waits after the
startups >0 process starts and before the WatchDog resets the process's
n Default: startup_counter to 0.
3600 To see the process's startup counter, in the output of the cpwd_
admin list command, refer to the #START column.
sleep_ n Range: If rerun_mode=1, specifies how much time (in seconds) passes
timeout 0 - 3600 from a process failure until WatchDog tries to restart it.
n Default:
60
stop_ n Range: Configures the time (in seconds) the WatchDog waits for a process
timeout >0 stop command to complete.
n Default:
60
Configuration Accepted
Description
Parameter Values
zero_ n Range: After failing no_limit times to restart a process, the WatchDog
timeout >0 waits zero_timeout seconds before it tries again.
n Default: The value of the zero_timeout must be greater than the value of
7200 the timeout.
The WatchDog saves the user defined configuration parameters in the $CPDIR/registry/HKLM_
registry.data file in the ": (Wd_Config" section:
Example
cpwd_admin del
Description
Temporarily deletes a monitored process from the WatchDog database of monitored processes.
Notes:
n WatchDog stops monitoring the detached process, but the process stays alive.
n The "cpwd_admin list" on page 246 command does not show the deleted
process anymore.
n This change applies until all Check Point services restart during boot, or with the
"cpstart" on page 219 command.
Parameters
Parameter Description
< Name of the monitored Check Point process as you see in the output of the "cpwd_
Application admin list" on page 246 command in the leftmost column APP.
Name> Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Example
cpwd_admin detach
Description
Temporarily detaches a monitored process from the WatchDog monitoring.
Notes:
n WatchDog stops monitoring the detached process, but the process stays alive.
n The "cpwd_admin list" on page 246 command does not show the detached
process anymore.
n This change applies until all Check Point services restart during boot, or with the
"cpstart" on page 219 command.
Parameters
Parameter Description
< Name of the monitored Check Point process as you see in the output of the "cpwd_
Application admin list" on page 246 command in the leftmost column APP.
Name> Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Example
cpwd_admin exist
Description
Checks whether the WatchDog process cpwd is alive.
Syntax
cpwd_admin exist
Example
cpwd_admin flist
Description
Prints the status of all WatchDog monitored processes on the screen.
Parameters
Parameter Description
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Output
Column Description
CTX On a VSX Gateway, shows the VSID, in which the monitored process runs.
#START Shows how many times the WatchDog started the monitored process.
START_ Shows the time when the WatchDog started the monitored process for the last time.
TIME
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_limit
configuration parameters (see "cpwd_admin" on page 234).
MON Shows how the WatchDog monitors this process (see the explanation for the "cpwd_
admin" on page 234):
n Y - Active monitoring
n N - Passive monitoring
COMMAND Shows the command the WatchDog run to start this process.
Example
cpwd_admin getpid
Description
Shows the PID of a WatchDog monitored process.
Parameters
Parameter Description
< Name of the monitored Check Point process as you see in the output of the "cpwd_
Application admin list" on page 246 command in the leftmost column APP.
Name> Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On VSX Gateway, specifies the context of the applicable Virtual System.
Example
cpwd_admin kill
Description
Terminates the WatchDog process cpwd.
Important - Do not run this command unless explicitly instructed by Check Point
Support or R&D to do so.
To restart the WatchDog process, you must restart all Check Point services with the
"cpstop" on page 227 and "cpstart" on page 219 commands.
Syntax
cpwd_admin kill
cpwd_admin list
Description
Prints the status of all WatchDog monitored processes on the screen.
Parameters
Parameter Description
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Output
Column Description
CTX On a VSX Gateway, shows the VSID, in which the monitored process runs.
#START Shows how many times the WatchDog started the monitored process.
START_ Shows the time when the WatchDog started the monitored process for the last time.
TIME
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_limit
configuration parameters (see "cpwd_admin" on page 234).
MON Shows how the WatchDog monitors this process (see the explanation for the "cpwd_
admin" on page 234):
n Y - Active monitoring
n N - Passive monitoring
COMMAND Shows the command the WatchDog run to start this process.
Examples
cpwd_admin monitor_list
Description
Prints the status of actively monitored processes on the screen.
See the explanation about the active monitoring in "cpwd_admin" on page 234.
Syntax
cpwd_admin monitor_list
Example
cpwd_admin start
Description
Starts a process as monitored by the WatchDog.
Parameters
Parameter Description
-name <Application Name, under which the cpwd_admin list command shows the
Name> monitored process in the leftmost column APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual
System.
-path "<Full Path The full path (with or without Check Point environment variables) to the
to Executable>" executable including the executable name.
Must enclose in double-quotes.
Examples:
n For FWM: "$FWDIR/bin/fwm"
n For FWD: "/opt/CPsuite-R81/fw1/bin/fw"
n For CPD: "$CPDIR/bin/cpd"
n For CPM: "/opt/CPsuite-R81/fw1/scripts/cpm.sh"
n For SICTUNNEL: "/opt/CPshrd-R81/bin/cptnl"
Parameter Description
-env {inherit | Configures whether to inherit the environment variables from the shell.
<Env_Var>=<Value>}
n inherit - Inherits all the environment variables (WatchDog
supports up to 80 environment variables)
n <Env_Var>=<Value> - Assigns the specified value to the
specified environment variable
Example
For the list of process and the applicable syntax, see sk97638.
cpwd_admin start_monitor
Description
Starts the active WatchDog monitoring. WatchDog monitors the predefined processes actively.
See the explanation for the "cpwd_admin" on page 234 command.
Syntax
cpwd_admin start_monitor
Example
cpwd_admin stop
Description
Stops a WatchDog monitored process.
Parameters
Parameter Description
-name <Application Name under which the cpwd_admin list command shows the
Name> monitored process in the leftmost column APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual
System.
-path "<Full Path to The full path (with or without Check Point environment variables) to the
Executable>" executable including the executable name.
Must enclose in double-quotes.
Examples:
n For FWM: "$FWDIR/bin/fwm"
n For FWD: "/opt/CPsuite-R81/fw1/bin/fw"
n For CPD: "$CPDIR/bin/cpd_admin"
Parameter Description
-env {inherit | Configures whether to inherit the environment variables from the shell.
<Env_Var>=<Value>}
n inherit - Inherits all the environment variables (WatchDog
supports up to 80 environment variables)
n <Env_Var>=<Value> - Assigns the specified value to the
specified environment variable
Example
For the list of process and the applicable syntax, see sk97638.
cpwd_admin stop_monitor
Description
Stops the active WatchDog monitoring. WatchDog monitors all processes only passively.
See the explanation for the "cpwd_admin" on page 234 command.
Syntax
cpwd_admin stop_monitor
Example
fw
Description
n Fetches and unloads Threat Prevention policy.
n Controls the Firewall module.
n Generates the Default Filter policy files.
n Fetches the policy from the Management Server, peer Cluster Member, or local directory.
n Fetches the specified Security or Audit log files from the specified Check Point computer.
n Shows the list of interfaces and their IP addresses.
n Shows information about Check Point computers in High Availability configuration and their states.
n Controls ISP links in ISP Redundancy configuration.
n Kills the specified Check Point processes.
n Shows a list of hosts protected by the Security Gateway.
n Shows the content of Check Point log files.
n Switches the current active log file.
n Shows a list of Security or Audit log files.
n Merges several input log files into a single log file.
n Runs FW Monitor to capture the traffic that passes through the Security Gateway.
n Rebuilds pointer files for Security or Audit log files.
n Manages the Suspicious Activity Monitoring (SAM) rules.
n Manages the Suspicious Activity Policy editor.
n Shows the contents of the Unified Policy kernel tables.
n Shows the currently installed policy.
n Shows and deletes the contents of the specified kernel tables.
n Executes the offline Unified Policy.
n Removes all policies from the Security Gateway or Cluster Member.
n Shows the Security Gateway major and minor version number and build number.
Syntax
fw [-d] [-i]
amw <options>
ctl <options>
defaultgen
fetch <options>
fetchlogs <options>
getifs
hastat <options>
isp_link <options>
kill <options>
lichosts <options>
log <options>
logswitch <options>
lslogs <options>
mergefiles <options>
repairlog <options>
sam <options>
sam_policy <options>
showuptables <options>
stat
tab <options>
unloadlocal
up_execute <options>
ver <options>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
Parameter Description
fetch Fetches the policy from the Management Server, peer Cluster Member, or local
<options> directory.
See "fw fetch" on page 296.
fetchlogs Fetches the specified Security log files ($FWDIR/log/*.log*) or Audit log files
<options> ($FWDIR/log/*.adtlog*) from the specified Check Point computer.
See "fw fetchlogs" on page 298.
hastat Shows information about Check Point computers in High Availability configuration
<options> and their states.
See "fw hastat" on page 301.
log Shows the content of Check Point log files - Security ($FWDIR/log/*.log) or
<options> Audit ($FWDIR/log/*.adtlog).
See "fw log" on page 305.
logswitch Switches the current active log file - Security ($FWDIR/log/fw.log) or Audit
<options> ($FWDIR/log/fw.adtlog).
See "fw logswitch" on page 313.
lslogs Shows a list of Security log files ($FWDIR/log/*.log*) or Audit log files
<options> ($FWDIR/log/*.adtlog*) residing on the local computer or a remote
computer.
See "fw lslogs" on page 316.
monitor Runs FW Monitor to capture the traffic that passes through the Security Gateway.
<options> See "fw monitor" on page 322.
repairlog Rebuilds pointer files for Security log files ($FWDIR/log/*.log) or Audit
<options> ($FWDIR/log/*.adtlog) log files.
See "fw repairlog" on page 350.
Parameter Description
tab Shows and deletes the contents of the specified kernel tables.
<options> See "fw tab" on page 384.
unloadlocal Uninstalls all policies from the Security Gateway or Cluster Member.
See "fw unloadlocal" on page 391.
ver Shows the Security Gateway major and minor version number and build number.
<options> See "fw ver" on page 398.
fw -i
Description
By default, the "fw" on page 256 commands apply to the entire Security Gateway.
The fw commands show aggregated information for all CoreXL Firewall instances.
The fw -i commands apply to the specified CoreXL Firewall instance.
Syntax
Parameters
Parameter Description
For details and additional parameters for any of these commands, refer
to the corresponding entry for each command.
fw amw
Description
Fetches and unloads Threat Prevention policy.
Threat Prevention policy applies to these Software Blades:
n Anti-Bot
n Anti-Spam
n Anti-Virus
n IPS
n Threat Emulation
n Threat Extraction
Syntax
n To fetch the Threat Prevention policy from the Management Server:
n To fetch the Threat Prevention policy from a peer Cluster Member, and, if it fails, then from the
Management Server:
n To fetch the Threat Prevention policy from the specified Check Point computer(s):
fw [-d] amw fetch [-i] [-n] [-r] <Master 1> [<Master 2> ...]
n To fetch the Threat Prevention policy stored locally on the Security Gateway:
n To fetch the Threat Prevention policy stored locally on the Security Gateway in the specified
directory:
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
fw amw fetch Fetches the Threat Prevention policy from the specified Check Point computer(s).
These can be a Management Server, or a peer Cluster Member.
fw amw fetch Fetches the Threat Prevention policy that is stored locally on the Security
local Gateway in the $FWDIR/state/local/AMW/ directory.
fw amw fetch
localhost
fw amw Fetches the Threat Prevention policy that stored locally on the Security Gateway
fetchlocal in the specified directory.
fw amw Unloads the current Threat Prevention policy from the Security Gateway.
unload
Important - This significantly decreases the security on the Security
Gateway. This is the same as if you disable the Threat Prevention
Software Blades on the Security Gateway.
-c Specifies that you fetch the policy from a peer Cluster Member.
Notes:
n Must also use the "-f" parameter.
n Works only in cluster.
-f Specifies that you fetch the policy from a Management Server listed in the
$FWDIR/conf/masters file.
-lu Specifies to perform a late update - to load signatures just after the Security
Gateway copies the policy files to the local directory
$FWDIR/state/local/AMW/.
-n Specifies not to load the fetched policy, if it is the same as the policy already
located on the Security Gateway.
Parameter Description
<Master 1> Specifies the Check Point computer(s), from which to fetch the Threat Prevention
[<Master 2> policy.
...] You can fetch the Threat Prevention policy from the Management Server, or a
peer Cluster Member.
Notes:
n If you fetch the Threat Prevention policy from the Management
Server, you can enter one of these:
l The main IP address of the Management Server object.
Member.
n If the fetch from the first specified <Master> fails, the Security
Gateway fetches the policy from the second specified <Master>
, and so on. If the Security Gateway fails to connect to each
specified <Masters>, the Security Gateway fetches the policy
from the localhost.
n If you do not specify the <Masters> explicitly, the Security
Gateway fetches the policy from the localhost.
-d <Full Specifies local directory on the Security Gateway, from which to fetch the Threat
Path to Prevention policy files.
Directory>
Example
fw ctl
Description
Controls the Firewall kernel module.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Syntax
fw [-d] ctl
arp <options>
bench <options>
block <options>
chain
conn
conntab <options>
cpasstat <options>
debug <options>
get <options>
iflist
install
kdebug <options>
pstat <options>
set <options>
tcpstrstat <options>
uninstall
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
arp <options> Shows the configured Proxy ARP entries based on the
$FWDIR/conf/local.arp file on the Security Gateway.
See "fw ctl arp" on page 267.
Parameter Description
bench Runs the CPU benchmark tests that collect these statistics:
<options>
n FireWall Lock Statistics
n Outbound Packets Statistics
n Inbound Packets Statistics
block Blocks all connections to, from, and through the Security Gateway.
<options> See "fw ctl block" on page 270.
conntab Shows formatted list of current connections from the Connections kernel table
<options> (ID 8158).
See "fw ctl conntab" on page 274.
cpasstat Generates statistics report about Check Point Active Streaming (CPAS).
<options> See "fw ctl cpasstat" on page 278.
debug Generates kernel debug messages from Check Point Firewall kernel to a debug
<options> buffer.
See "'fw ctl debug' and 'fw ctl kdebug'" on page 279.
dlpkstat Generates statistics report about Data Loss Prevention kernel module.
<options> See "fw ctl dlpkstat" on page 280.
kdebug Generates kernel debug messages from Check Point Firewall kernel to a debug
<options> buffer.
See "'fw ctl debug' and 'fw ctl kdebug'" on page 279.
Parameter Description
set <options> Configures the specified value for the specified kernel parameter.
See "fw ctl set" on page 290.
uninstall Tells the operating system to stop passing packets to Firewall, and unloads the
current Security Policy.
See "fw ctl uninstall" on page 294.
fw ctl arp
Description
Shows the configured Proxy ARP entries based on the $FWDIR/conf/local.arp file on the Security
Gateway.
For more information about the Proxy ARP, see sk30197.
Syntax
Parameters
Parameter Description
fw ctl bench
Description
The benchmark mechanism provides a way to measure the time spent in the code between two points.
This command runs the CPU benchmark tests that collect these statistics:
n FireWall Lock Statistics
n Outbound Packets Statistics
n Inbound Packets Statistics.
Note - This command writes the output of these tests to the dmesg.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
lock Runs the lock benchmark that collects the FireWall Lock Statistics.
[ioctl[ Available options:
<Limit>]]
n No parameters - Starts the lock benchmark.
[packet
n ioctl - Calculates the IOCTL flow statistics.
[<Limit>]]
n packet - Calculates the packet flow statistics.
[stop]
n <Limit> - Specifies the time limit (in seconds) for the benchmark to
run. Default is 10 seconds. Maximum is 200 seconds.
n stop - Stops the current lock benchmark.
Parameter Description
packet Runs the packet benchmark test that collects these statistics:
[{<Limit> |
n Outbound Packets Statistics
stop}]
n Inbound Packets Statistics
Available options:
n No parameters - Starts the packet benchmark.
n <Limit> - Specifies the time limit (in seconds) for the benchmark to
run. Default is 10 seconds. Maximum is 200 seconds.
n stop - Stops the current packet benchmark.
fw ctl block
Description
Blocks all connections to, from, and through the Security Gateway.
Important - The "fw ctl block on" command immediately blocks all connections
without a prompt and regardless the currently installed policy. To unblock the
connections, you must either reboot the Security Gateway, or connect to the Security
Gateway over a serial console (or Lights Out Management Card) and run the "fw ctl
block off" command.
Syntax
Parameters
Parameter Description
fw ctl chain
Description
Shows the list of Firewall Chain Modules.
This list shows various inspection Chain Modules, through which the traffic passes on this Security
Gateway.
The available Chain Modules depend on the configuration and enabled Software Blades.
Important - In Cluster, outputs of this command must be the same on all the Cluster Members.
Syntax
Parameters
Parameter Description
Example
fw ctl conn
Description
Shows the list of Firewall Connection Modules.
This list shows various inspection Connection Modules, through which the traffic passes on this Security
Gateway.
The available Connection Modules depend on the configuration and enabled Software Blades.
Important - In Cluster, outputs of this command must be the same on all the Cluster Members.
Syntax
Parameters
Parameter Description
Example
fw ctl conntab
Description
Shows formatted list of current connections from the Connections kernel table (ID 8158).
Use this command if you want to see the simplified information about the current connections.
Best Practices:
n Use the "fw ctl conntab" command to see the simplified information about
the current connections.
n Use the "fw tab -t connections -f" command ("fw tab" on page 384)
to see the detailed (and more technical) information about the current
connections.
Syntax
Parameters
Parameter Description
-sport=<Port Number in Decimal Filters the output by the specified Source Port
Format> number.
See IANA Service Name and Port Number Registry.
Parameter Description
-dport=<Port Number in Decimal Filters the output by the specified Destination Port
Format> number.
See IANA Service Name and Port Number Registry.
-rule=<Rule Number in Decimal See your Rule Base in SmartConsole, or in the output
Format> of the command.
Examples
Example 10 - Formatted detailed output from the Connections table (for comparison)
[Expert@MyGW:0]# fw tab -t connections -f
localhost:
Date: Sep 10, 2018
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv;
: (+)====================================(+); Table_Name: connections; : (+); Attributes: dynamic, id 8158, attributes: keep,
sync, aggressive aging, kbufs 21 22 23 24 25 26 27 28 29 30 31 32 33 34, expires 25, refresh, , hashsize 2097152, unlimited;
LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv;
: -----------------------------------(+); Direction: 1; Source: 192.168.204.40; SPort: 54201; Dest: 192.168.204.1; DPort: 53;
Protocol: udp; CPTFMT_sep: ;; Type: 131073; Rule: 0; Timeout: 335; Handler: 0; Ifncin: -1; Ifncout: -1; Ifnsin: -1; Ifnsout:
1; Bits: 0000780000000000; Expires: 23/40; LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1;
ProductFamily: Network;
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv;
: -----------------------------------(+); Direction: 0; Source: 192.168.204.1; SPort: 53; Dest: 192.168.204.40; DPort: 54201;
Protocol: udp; CPTFMT_sep_1: ->; Direction_1: 1; Source_1: 192.168.204.40; SPort_1: 54201; Dest_1: 192.168.204.1; DPort_1:
53; Protocol_1: udp; FW_symval: 2054; LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1; ProductFamily:
Network;
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv;
: -----------------------------------(+); Direction: 1; Source: 192.168.204.40; SPort: 22; Dest: 192.168.204.1; DPort: 54201;
Protocol: tcp; CPTFMT_sep_1: ->; Direction_2: 0; Source_2: 192.168.204.1; SPort_2: 54201; Dest_2: 192.168.204.40; DPort_2:
22; Protocol_2: tcp; FW_symval: 2053; LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1; ProductFamily:
Network;
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv;
: -----------------------------------(+); Direction: 0; Source: 192.168.204.1; SPort: 54201; Dest: 192.168.204.40; DPort: 22;
Protocol: tcp; CPTFMT_sep: ;; Type: 114689; Rule: 2; Timeout: 481; Handler: 0; Ifncin: 1; Ifncout: 1; Ifnsin: -1; Ifnsout: -
1; Bits: 02007800000f9000; Expires: 3596/3600; LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1;
ProductFamily: Network;
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv;
: -----------------------------------(+); Direction: 0; Source: 192.168.204.1; SPort: 53; Dest: 192.168.204.40; DPort: 44966;
Protocol: udp; CPTFMT_sep_1: ->; Direction_1: 1; Source_1: 192.168.204.40; SPort_1: 44966; Dest_1: 192.168.204.1; DPort_1:
53; Protocol_1: udp; FW_symval: 2054; LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1; ProductFamily:
Network;
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv;
: -----------------------------------(+); Direction: 1; Source: 192.168.204.40; SPort: 44966; Dest: 192.168.204.1; DPort: 53;
Protocol: udp; CPTFMT_sep: ;; Type: 131073; Rule: 0; Timeout: 335; Handler: 0; Ifncin: -1; Ifncout: -1; Ifnsin: 1; Ifnsout:
1; Bits: 0000780000000000; Expires: 23/40; LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1;
ProductFamily: Network;
[Expert@MyGW:0]#
fw ctl cpasstat
Description
Generates statistics report about Check Point Active Streaming (CPAS).
Syntax
Parameters
Parameter Description
Description
These commands generate kernel debug messages from Check Point Firewall kernel to a debug buffer.
For more information, see the R81 Next Generation Security Gateway Guide - Chapter Kernel Debug on
Security Gateway.
fw ctl dlpkstat
Description
Generates statistics report about Data Loss Prevention, inspected HTTP requests, and Identity Awareness
Captive Portal.
This report contains these statistics:
Category Information
Identity Awareness - Captive Portal HTTP requests redirected to the Captive Portal
Syntax
Parameters
Parameter Description
fw ctl get
Description
Shows the current value of the specified kernel parameter.
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n In VSX Gateway, the configured values of kernel parameters apply to all existing
Virtual Systems and Virtual Routers.
Notes:
n Kernel parameters let you change the advanced behavior of your Security
Gateway.
n There are two types of kernel parameters - integer and string.
n Security Gateway gets the names and the default values of the kernel
parameters from these kernel module files:
l $FWDIR/boot/modules/fw_kern_64.o
l $FWDIR/boot/modules/fw_kern_64_v6.o
l $FWDIR/boot/modules/fw_kern_64_3_10_64.o
l $FWDIR/boot/modules/fw_kern_64_3_10_64_v6.o
l $PPKDIR/boot/modules/sim_kern_64.o
l $PPKDIR/boot/modules/sim_kern_64_v6.o
l $PPKDIR/boot/modules/sim_kern_64_3_10_64.o
l $PPKDIR/boot/modules/sim_kern_64_3_10_64_v6.o
Syntax
Parameters
Parameter Description
<Name of Integer Kernel Specifies the name of the integer kernel parameter.
Parameter>
<Name of String Kernel Specifies the name of the string kernel parameter.
Parameter>
fw ctl iflist
Description
Shows the list with this information:
n The name of interfaces, to which the Check Point Firewall kernel attached.
n The internal numbers of the interfaces in the Check Point Firewall kernel.
Notes:
n This list shows all detected interfaces, even if there are no IP addresses
assigned on them.
n You use this list when you analyze a kernel debug, which shows only the internal
numbers of the interfaces (for example, ifn=2).
n Related "cpstat" on page 220 commands:
l cpstat -f ifconfig os
l cpstat -f interfaces fw
Syntax
Parameters
Parameter Description
Example
fw ctl install
Description
Tells the operating system to start passing packets to Firewall.
This command runs automatically when the Security Gateway or an administrator runs the "cpstart" on
page 219 command.
Warning
If you run the "fw ctl uninstall" on page 294 command and then the "fw ctl install" command, it
does not restore the Security Policy.
You must run one of these commands: "fw fetch" on page 296, or "cpstart" on page 219.
Syntax
Parameters
Parameter Description
fw ctl leak
Description
Generates leak detection report. This report is for Check Point use only.
Important - This command save the report into the active /var/log/messages file
and the dmesg buffer.
Syntax
Parameters
Parameter Description
-o <Internal Specifies to perform leak detection for the specified internal object ID.
Object ID>
Parameter Description
-t <Internal Specifies the internal object types, for which to perform leak detection.
Object Type> Available internal object types are:
n chain
n connh
n cookie
n kbuf
n num
If you do not specify the internal object type explicitly, the command performs
leak detection for all internal object types.
Procedure
Step Description
6 Generate the leak detection report (see the Syntax section above):
[Expert@GW_HostName:0]# fw [-d] ctl leak
<options>
[Expert@GW_HostName:0]# cat
/var/log/messages
Step Description
Example
[Expert@MyGW:0]# cp -v /var/log/messages{,_BKP}
`/var/log/messages' -> `/var/log/messages_BKP'
[Expert@MyGW:0]#
[Expert@MyGW:0]# echo '' > /var/log/messages
[Expert@MyGW:0]#
[Expert@MyGW:0]# dmesg -c
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw ctl leak -s
[Expert@MyGW:0]#
[Expert@MyGW:0]# dmesg
[fw4_0];fwleak_report: type chain - 0 objects
[fw4_0];fwleak_report: type cookie - 0 objects
[fw4_0];fwleak_report: type kbuf - 0 objects
[fw4_0];fwleak_report: type connh - 0 objects
[fw4_1];fwleak_report: type chain - 0 objects
[fw4_1];fwleak_report: type cookie - 0 objects
[fw4_1];fwleak_report: type kbuf - 0 objects
[fw4_1];fwleak_report: type connh - 0 objects
[fw4_2];fwleak_report: type chain - 0 objects
[fw4_2];fwleak_report: type cookie - 0 objects
[fw4_2];fwleak_report: type kbuf - 0 objects
[fw4_2];fwleak_report: type connh - 0 objects
[Expert@MyGW:0]#
[Expert@MyGW:0]# cat /var/log/messages
Sep 12 16:09:50 2019 MyGW kernel: [fw4_0];fwleak_report: type chain - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_0];fwleak_report: type cookie - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_0];fwleak_report: type kbuf - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_0];fwleak_report: type connh - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_1];fwleak_report: type chain - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_1];fwleak_report: type cookie - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_1];fwleak_report: type kbuf - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_1];fwleak_report: type connh - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_2];fwleak_report: type chain - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_2];fwleak_report: type cookie - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_2];fwleak_report: type kbuf - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_2];fwleak_report: type connh - 0 objects
[Expert@MyGW:0]
[Expert@MyGW:0]# cp -v /var/log/messages{,_LEAK_DETECTION}
`/var/log/messages' -> `/var/log/messages_LEAK_DETECTION'
[Expert@MyGW:0]#
fw ctl pstat
Description
Shows Security Gateway various internal statistics:
n System Capacity Summary
n Hash kernel memory (hmem) statistics
n System kernel memory (smem) statistics
n Kernel memory (kmem) statistics
n Cookies
n Connections
n Fragments
n NAT
n Handles
Syntax
fw [-d] ctl pstat [-c] [-h] [-k] [-l] [-m] [-o] [-s] [-v {4 | 6}]
Parameters
Parameter Description
Parameter Description
-v 4 Shows statistics for IPv4 (-v 4) traffic only, or for IPv6 (-v 4) traffic only.
-v 6 Default is to show statistics for both IPv4 and IPv6 traffic.
Examples
Cookies:
91808 total, 0 alloc, 0 free,
2 dup, 91808 get, 0 put,
182258 len, 909 cached len, 0 chain alloc,
0 chain free
Connections:
0 total, 0 TCP, 0 UDP, 0 ICMP,
0 other, 0 anticipated, 0 recovered, -3 concurrent,
0 peak concurrent
Fragments:
0 fragments, 0 packets, 0 expired, 0 short,
0 large, 0 duplicates, 0 failures
NAT:
0/0 forw, 0/0 bckw, 0 tcpudp,
0 icmp, 0-0 alloc
[Expert@MyGW:0]#
fw ctl set
Description
Configures the specified value for the specified kernel parameter.
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n In VSX Gateway, the configured values of kernel parameters apply to all existing
Virtual Systems and Virtual Routers.
n The configuration made with this command does not survive reboot.
To make this configuration permanent, you must edit one of the applicable
configuration files:
l $FWDIR/boot/modules/fwkern.conf
l $FWDIR/boot/modules/vpnkern.conf
l $PPKDIR/conf/simkern.conf.
Notes:
n Kernel parameters let you change the advanced behavior of your Security
Gateway.
n There are two types of kernel parameters - integer and string.
n Security Gateway gets the names and the default values of the kernel
parameters from these kernel module files:
l $FWDIR/boot/modules/fw_kern_64.o
l $FWDIR/boot/modules/fw_kern_64_v6.o
l $FWDIR/boot/modules/fw_kern_64_3_10_64.o
l $FWDIR/boot/modules/fw_kern_64_3_10_64_v6.o
l $PPKDIR/boot/modules/sim_kern_64.o
l $PPKDIR/boot/modules/sim_kern_64_v6.o
l $PPKDIR/boot/modules/sim_kern_64_3_10_64.o
l $PPKDIR/boot/modules/sim_kern_64_3_10_64_v6.o
Syntax
Parameters
Parameter Description
<Name of Integer Kernel Specifies the name of the integer kernel parameter.
Parameter>
<Integer Value> Specifies the integer value for the integer kernel
parameter.
<Name of String Kernel Specifies the name of the string kernel parameter.
Parameter>
'<String Value>' Specifies the string value for the string kernel
parameter.
fw ctl tcpstrstat
Description
Generates statistics report about TCP Streaming.
Syntax
Parameters
Parameter Description
General Counters:
=================
Connections:
Concurrent num of connections ............. 0
Concurrent num of si connections .......... 0
Packets:
Total num of packets ...................... 2567
Total packets in bytes .................... 202394
Concurrent num of async packets ........... 0
Memory:
Allocated memory in bytes ................. 0
Referenced skbuffs num .................... 0
Referenced skbuffs size in bytes .......... 0
External packet references................. 0
Allocated memory per connection ........... 0
Rejected packets/connections:
Total num of rejected packets ............. 0
Dropped packets/connections:
Total num of dropped packets .............. 0
Stripped/Truncated packets:
Total num of stripped packets ............. 0
Total num of truncated packets ............ 0
Paused packets:
Total num of c2s|s2c paused packets ....... 0 | 0
Concurrent num of UDP held packets ........ 0
Applications Counters:
======================
Application Name: ASPII_MT
Connections:
Total num of connections .................. 954
Concurrent num of connections ............. 0
Total num of c2s|s2c connections .......... 954 | 954
Concurrent num of c2s|s2c connections ..... 0 | 0
Packets:
Total num of c2s|s2c data packets ......... 2567 | 0
Total c2s|s2c data packets in bytes ....... 130518 | 0
FastForward Counters:
=====================
FF connection:
Total num of c2s|s2c FFconns .............. 0 | 0
Total num of c2s|s2c saved packets ........ 0 | 0
Total num of c2s|s2c bytes requests ....... 0 | 0
Total num of c2s|s2c saved bytes .......... 0 | 0
[Expert@MyGW:0]#
fw ctl uninstall
Description
1. Tells the operating system to stop passing packets to Firewall.
2. Unloads the current Security Policy.
3. Unloads the current Firewall Chain Modules (see "fw ctl chain" on page 271).
4. Unloads the current Firewall Connection Modules except for RTM (see "fw ctl conn" on page 273).
Warnings
1. If you run the "fw ctl uninstall" command, the networks behind the Security Gateway
become unprotected.
2. If you run the "fw ctl uninstall" command and then the "fw ctl install" on page 284
command, it does not restore the Security Policy.
You must run one of these commands: "fw fetch" on page 296, or "cpstart" on page 219.
Syntax
Parameters
Parameter Description
fw defaultgen
Description
Manually generates the Default Filter policy files.
Refer to these related commands:
n "comp_init_policy" on page 183
n "control_bootsec" on page 186
n "fwboot default" on page 414
n "fwboot bootconf" on page 402
Syntax
fw [-d] defaultgen
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
If the Default Filter policy file already exists, the command creates a backup copy
($FWDIR/state/default.bin.bak and
$FWDIR/state/default.bin6.bak).
Example
[Expert@MyGW:0]# fw defaultgen
Generating default filter
defaultfilter:
Compiled OK.
defaultfilter:
Compiled OK.
Backing up default.bin as default.bin.bak
hostaddr(MyGW) failed
Backing up default.bin6 as default.bin6.bak
[Expert@MyGW:0]#
fw fetch
Description
Fetches the Security Policy from the specified host and installs it to the kernel.
Syntax
n To fetch the policy from the Management Server:
n To fetch the policy from a peer Cluster Member, and, if it fails, then from the Management Server:
fw [-d] fetch [-i] [-n] [-r] <Master 1> [<Master 2> ...]
n To fetch the policy stored locally on the Security Gateway in the specified directory:
Parameters
Parameter Description
-c Specifies that you fetch the policy from a peer Cluster Member.
Notes:
n Must also use the "-f" parameter.
n Works only in cluster.
-f Specifies that you fetch the policy from a Management Server listed in the
$FWDIR/conf/masters file.
Parameter Description
-n Specifies not to load the fetched policy, if it is the same as the policy already
located on the Security Gateway.
<Master 1> Specifies the Check Point computer(s), from which to fetch the policy.
[<Master 2> ...] You can fetch the policy from the Management Server, or a peer Cluster
Member.
Notes:
n If you fetch the policy from the Management Server, you
can enter one of these:
l The main IP address of the Management Server
object.
l The object name of the Management Server.
Member.
n If the fetch from the first specified <Master> fails, the
Security Gateway fetches the policy from the second
specified <Master> , and so on. If the Security Gateway
fails to connect to each specified <Masters>, the Security
Gateway fetches the policy from the localhost.
n If you do not specify the <Masters> explicitly, the Security
Gateway fetches the policy from the localhost.
-d <Full Path to Specifies the local directory on the Security Gateway, from which to fetch the
Directory> policy files.
fw fetchlogs
Description
Fetches the specified Security log files ($FWDIR/log/*.log*) or Audit log files
($FWDIR/log/*.adtlog*) from the specified Check Point computer.
Syntax
fw [-d] fetchlogs [-f <Name of Log File 1>] [-f <Name of Log File
2>]... [-f <Name of Log File N>] <Target>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
-f <Name Specifies the name of the log file to fetch. Need to specify name only.
of Log Notes:
File N>
n If you do not specify the log file name explicitly, the command transfers all Security
log files ($FWDIR/log/*.log*) and all Audit log files
($FWDIR/log/*.adtlog*).
n The specified log file name can include wildcards * and ? (for example, 2017-0?-
*.log).
If you enter a wildcard, you must enclose it in double quotes or single quotes.
n You can specify multiple log files in one command.
You must use the -f parameter for each log file name pattern.
n This command also transfers the applicable log pointer files.
<Target> Specifies the remote Check Point computer, with which this local Check Point computer
has established SIC trust.
n If you run this command on a Security Management Server or Domain
Management Server, then <Target> is the applicable object's name or main IP
address of the Check Point Computer as configured in SmartConsole.
n If you run this command on a Security Gateway or Cluster Member, then
<Target> is the main IP address of the applicable object as configured in
SmartConsole.
Notes:
n This command moves the specified log files from the $FWDIR/log/ directory on the specified
Check Point computer. Meaning, it deletes the specified log files on the specified Check Point
computer after it copies them successfully.
n This command moves the specified log files to the $FWDIR/log/ directory on the local Check Point
computer, on which you run this command.
n This command cannot fetch the active log files $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog.
To fetch these active log files:
1. Perform log switch on the applicable Check Point computer:
2. Fetch the rotated log file from the applicable Check Point computer:
n This command renames the log files it fetched from the specified Check Point computer. The new
log file name is the concatenation of the Check Point computer's name (as configured in
SmartConsole), two underscore (_) characters, and the original log file name (for example: MyGW__
2019-06-01_000000.log).
[Expert@HostName:0]# ls $FWDIR/log/MyGW*
/opt/CPsuite-R81/fw1/log/MyGW__2019-06-01_000000.log
/opt/CPsuite-R81/fw1/log/MyGW__2019-06-01_000000.logaccount_ptr
/opt/CPsuite-R81/fw1/log/MyGW__2019-06-01_000000.loginitial_ptr
/opt/CPsuite-R81/fw1/log/MyGW__2019-06-01_000000.logptr
[Expert@HostName:0]#
fw getifs
Description
Shows the list with this information:
n The name of interfaces, to which the Check Point Firewall kernel attached.
n The IP addresses assigned to the interfaces.
Notes:
n This list shows only interfaces that have IP addresses assigned
on them.
n Related "cpstat" on page 220 commands:
l cpstat -f ifconfig os
l cpstat -f interfaces fw
Syntax
fw [-d] getifs
Parameters
Parameter Description
Example
[Expert@MyGW:0]# fw getifs
localhost eth0 192.168.30.40 255.255.255.0
localhost eth1 172.30.60.80 255.255.255.0
[Expert@MyGW:0]#
fw hastat
Description
Shows information about Check Point computers in High Availability configuration and their states.
Syntax
Parameters
Parameter Description
fw isp_link
Description
Controls the state of ISP Links in the ISP Redundancy configuration on Security Gateway.
Syntax
fw [-d] isp_link
{-h | -help}
[<Name of Object>] <Name of ISP Link>
down
up
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
<Name of The name of the ISP Link as defined in the Security Gateway or Cluster object:
ISP Link>
1. In SmartConsole, from the left navigation panel, click Gateways & Servers .
2. Open the Security Gateway or Cluster object.
3. From the left tree, click Other > ISP Redundancy .
fw kill
Description
Kills the specified Check Point processes.
Important - Make sure the killed process is restarted, or restart it manually. See sk97638.
Syntax
Parameters
Parameter Description
Example
fw kill fwd
fw lichosts
Description
Shows IP addresses of internal hosts that Security Gateway detected and counted based on the installed
license.
Syntax
Parameters
Parameter Description
Example
[Expert@MyGW:0]# fw lichosts
License allows an unlimited number of hosts
[Expert@MyGW:0]
Related SK article
sk10200 - 'too many internal hosts' error in /var/log/messages on Security Gateway.
fw log
Description
Shows the content of Check Point log files - Security ($FWDIR/log/*.log) or Audit
($FWDIR/log/*.adtlog).
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
-b "<Start Shows only entries that were logged between the specified start and end
Timestamp>" times.
"<End
n The <Start Timestamp> and <End Timestamp> may be a date,
Timestamp>"
a time, or both.
n If date is omitted, then the command assumes the current date.
n Enclose the "<Start Timestamp>" and "<End Timestamp> in
single or double quotes (-b 'XX' 'YY", or -b "XX" "YY).
n You cannot use the "-b" parameter together with the "-s" or "-e"
parameters.
n See the date and time format below.
Parameter Description
-c <Action> Shows only events with the specified action. One of these:
n accept
n drop
n reject
n encrypt
n decrypt
n vpnroute
n keyinst
n authorize
n deauthorize
n authcrypt
n ctl
Notes:
n The fw log command always shows the Control (ctl) actions.
n For login action, use the authcrypt.
-e "<End Shows only entries that were logged before the specified time.
Timestamp>" Notes:
n The <End Timestamp> may be a date, a time, or both.
n Enclose the <End Timestamp> in single or double quotes (-e
'...', or -e "...").
n You cannot use the "-e" parameter together with the "-b" parameter.
n See the date and time format below.
-f This parameter:
1. Shows the saved entries that match the specified conditions.
2. After the command reaches the end of the currently opened log file, it
continues to monitor the log file indefinitely and shows the new entries
that match the specified conditions.
-h <Origin> Shows only logs that were generated by the Security Gateway with the
specified IP address or object name (as configured in SmartConsole).
Parameter Description
l mail
l snmp_trap
l spoof
l user_alert
l user_auth
n all - Show entries that match all alert types (this is the default).
-l Shows both the date and the time for each log entry.
The default is to show the date only once above the relevant entries, and then
specify the time for each log entry.
-n Does not perform DNS resolution of the IP addresses in the log file (this is the
default behavior).
This significantly speeds up the log processing.
-o Shows detailed log chains - shows all the log segments in the log entry.
-p Does not perform resolution of the port numbers in the log file (this is the
default behavior).
This significantly speeds up the log processing.
-s "<Start Shows only entries that were logged after the specified time.
Timestamp>" Notes:
n The <Start Timestamp> may be a date, a time, or both.
n If the date is omitted, then the command assumed the current date.
n Enclose the <Start Timestamp> in single or double quotes (-s
'...', or -s "...").
n You cannot use the "-s" parameter together with the "-b" parameter.
n See the date and time format below.
Parameter Description
-t This parameter:
1. Does not show the saved entries that match the specified conditions.
2. After the command reaches the end of the currently opened log file, it
continues to monitor the log file indefinitely and shows the new entries
that match the specified conditions.
-u <Unification Specifies the path and name of the log unification scheme file.
Scheme File> The default log unification scheme file is:
$FWDIR/conf/log_unification_scheme.C
-w Shows the flags of each log entry (different bits used to specify the "nature" of
the log - for example, control, audit, accounting, complementary, and so on).
-x <Start Entry Shows only entries from the specified log entry number and below, counting
Number> from the beginning of the log file.
-y <End Entry Shows only entries until the specified log entry number, counting from the
Number> beginning of the log file.
-z In case of an error (for example, wrong field value), continues to show log
entries.
The default behavior is to stop.
Output
Each output line consists of a single log entry, whose fields appear in this format:
Note - The fields that show depends on the connection type.
ContentVersion Version 5
LogId Log ID 0
Examples
Example 1 - Show all log entries with both the date and the time for each log entry
fw log -l
Example 2 - Show all log entries that start after the specified timestamp
[Expert@MyGW:0]# fw log -l -s "June 12, 2018 12:33:00"
12Jun2018 12:33:00 5 N/A 1 accept MyGW > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; fg-1_client_in_rule_name: Default; fg-1_client_out_rule_name: Default; fg-1_server_in_rule_
name: Host Redirect; fg-1_server_out_rule_name: ; ProductName: FG; ProductFamily: Network;
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_
match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy
Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table:
TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp;
sport_svc: 64933; ProductFamily: Network;
[Expert@MyGW:0]#
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_
match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy
Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table:
TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp;
sport_svc: 64933; ProductFamily: Network;
12Jun2018 12:33:45 5 N/A 1 ctl MyGW > LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; description: Contracts; reason: Could not reach
"https://productcoverage.checkpoint.com/ProductCoverageService". Check DNS and Proxy configuration on the gateway.; Severity:
2; status: Failed; version: 1.0; failure_impact: Contracts may be out-of-date; update_service: 1; ProductName: Security
Gateway/Management; ProductFamily: Network;
[Expert@MyGW:0]#
Example 5 - Show all log entries with action "drop", show all field headers, and show log
flags
[Expert@MyGW:0]# fw log -l -q -w -c drop
HeaderDateHour: 12Jun2018 12:33:39; ContentVersion: 5; HighLevelLogKey: <max_null>; LogUid: ; SequenceNum: 1; Flags: 428292;
Action: drop; Origin: MyGW; IfDir: <; InterfaceName: eth0; Alert: ; LogId: 0; ContextNum: <max_null>; OriginSicName:
CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst:
MyFTPServer; proto: tcp; UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-
9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_
match_table: TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END;
ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933; ProductFamily: Network;
[Expert@MyGW:0]#
Example 6 - Show only log entries from 0 to 10 (counting from the beginning of the log file)
[Expert@MyGW:0]# fw log -l -x 0 -y 10
... ...
[Expert@MyGW:0]#
fw logswitch
Description
Switches the current active log file:
1. Closes the current active log file
2. Renames the current active log file
3. Creates a new active log file with the default name
Notes:
n By default, this command switches the active Security log file -
$FWDIR/log/fw.log
n You can specify to switch the active Audit log file - $FWDIR/log/fw.adtlog
Syntax
fw [-d] logswitch
[-audit] [<Name of Switched Log>]
-h <Target> [[+ | -]<Name of Switched Log>]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
Parameter Description
+ Specifies to copy the active log from the remote computer to the local computer.
Notes:
n If you specify the name of the switched log file, you must write it immediately
after this + (plus) parameter.
n The command copies the active log from the remote computer and saves it in
the $FWDIR/log/ directory on the local computer.
n The default name of the saved log file is:
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
For example, MyGW__2018-03-26_174455.log
n If you specify the name of the switched log file, then the name of the saved log
file is:
<Gateway_Object_Name>__<Specified_Log_Name>.log
n When this command copies the log file from the remote computer, it
compresses the file.
- Specifies to transfer the active log from the remote computer to the local computer.
Notes:
n The command saves the copied active log file in the $FWDIR/log/ directory
on the local computer and then deletes the switched log file on the remote
computer.
n If you specify the name of the switched log file, you must write it immediately
after this - (minus) parameter.
n The default name of the saved log file is:
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
For example, MyGW__2018-03-26_174455.log
n If you specify the name of the switched log file, then the name of the saved log
file is:
<Gateway_Object_Name>__<Specified_Log_Name>.log
n When this command transfers the log file from the remote computer, it
compresses the file.
n As an alternative, you can use the "fw fetchlogs" on page 298 command.
Compression
When this command transfers the log files from the remote computer, it compresses the file with the gzip
command (see RFC 1950 to RFC 1952 for details). The algorithm is a variation of LZ77 method. The
compression ratio varies with the content of the log file and is difficult to predict. Binary data are not
compressed. Text data, such as user names and URLs, are compressed.
Example - Switching the active Security log on a Security Management Server or Security
Gateway
[Expert@MGMT:0]# fw logswitch
Log file has been switched to: 2018-06-13_182359.log
[Expert@MGMT:0]#
Example - Switching the active Security log on a managed Security Gateway and copying
the switched log
[Expert@MGMT:0]# fw logswitch -h MyGW +
Log file has been switched to: 2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MGMT:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R81/fw1/log/fw.log
/opt/CPsuite-R81/fw1/log/MyGW__2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MyGW:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R81/fw1/log/fw.log
/opt/CPsuite-R81/fw1/log/2018-06-13_185451.log
[Expert@MyGW:0]#
fw lslogs
Description
Shows a list of Security log files ($FWDIR/log/*.log) and Audit log files ($FWDIR/log/*.adtlog)
residing on the local computer or a remote computer.
Syntax
fw [-d] lslogs [-f <Name of Log File 1>] [-f <Name of Log File 2>] ...
[-f <Name of Log File N>] [-e] [-r] [-s {name | size | stime | etime}]
[<Target>]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
-f <Name of Specifies the name of the log file to show. Need to specify name only.
Log File> Notes:
n If the log file name is not specified explicitly, the command shows all Security
log files ($FWDIR/log/*.log).
n File names may include * and ? as wildcards (for example, 2019-0?-*). If
you enter a wildcard, you must enclose it in double quotes or single quotes.
n You can specify multiple log files in one command. You must use the "-f"
parameter for each log file name pattern:
-f <Name of Log File 1> -f <Name of Log File 2> ... -
f <Name of Log File N>
-e Shows an extended file list. It includes the following information for each log file:
n Size - The total size of the log file and its related pointer files
n Creation Time - The time the log file was created
n Closing Time - The time the log file was closed
n Log File Name - The file name
-s {name | Specifies the sort order of the log files using one of the following sort options:
size |
stime | n name - The file name
etime} n size - The file size
n stime - The time the log file was created (this is the default option)
n etime - The time the log file was closed
Parameter Description
<Target> Specifies the remote Check Point computer, with which this local Check Point
computer has established SIC trust.
n If you run this command on a Security Management Server or Domain
Management Server, then <Target> is the applicable object's name or main
IP address of the Check Point Computer as configured in SmartConsole.
n If you run this command on a Security Gateway or Cluster Member, then
<Target> is the main IP address of the applicable object as configured in
SmartConsole.
[Expert@HostName:0]# fw lslogs
Size Log file name
9KB 2019-06-14_000000.log
11KB 2019-06-15_000000.log
9KB 2019-06-16_000000.log
10KB 2019-06-17_000000.log
9KB fw.log
[Expert@HostName:0]#
Example 4 - Showing only log files specified by the patterns and their extended information
Example 5 - Showing only log files specified by the patterns, sorting by name in reverse order
Example 6 - Showing only log files specified by the patterns, from a managed Security Gateway with main
IP address 192.168.3.53
fw mergefiles
Description
Merges several Security log files ($FWDIR/log/*.log) into a single log file.
Merges several Audit log files ($FWDIR/log/*.adtlog) into a single log file.
Important:
n Do not merge the active Security file $FWDIR/log/fw.log with other Security
switched log files.
Switch the active Security file $FWDIR/log/fw.log (with the "fw logswitch"
on page 313 command) and only then merge it with other Security switched log
files.
n Do not merge the active Audit file $FWDIR/log/fw.adtlog with other Audit
switched log files.
Switch the active Audit file $FWDIR/log/fw.adtlog (with the "fw logswitch"
on page 313 command) and only then merge it with other Audit switched log
files.
n This command unifies logs entries with the same Unique-ID (UID). If you rotate
the current active log file before all the segments of a specific log arrive, this
command merges the records with the same Unique ID from two different files,
into one fully detailed record.
n If the size of the final merged log file exceeds 2GB, this command creates a list
of merged files, where the size of each merged file size is not more than 2GB.
The user receives this warning:
Warning: The size of the files you have chosen to
merge is greater than 2GB. The merge will produce
two or more files.
The names of merged files are:
l <Name of Merged Log File>.log
l <Name of Merged Log File>_1.log
l <Name of Merged Log File>_2.log
l ... ...
Syntax
fw [-d] mergefiles [-r] [-s] [-t <Time Conversion File>] <Name of Log
File 1> <Name of Log File 2> ... <Name of Log File N> <Name of Merged
Log File>
Parameters
Parameter Description
-t <Time Conversion File> Specifies a full path and name of a file that instructs this
command how to adjust the times during the merge.
This is required if you merge log files from Log Servers
configured with different time zones.
The file format is:
<IP Address of Log Server #1> <Signed
Date Time #1 in Seconds>
<IP Address of Log Server #2> <Signed
Date Time #2 in Seconds>
... ...
Notes
n You must specify the absolute path and the
file name.
n The name of the time conversion file cannot
exceed 230 characters.
<Name of Log File 1> ... Specifies the log files to merge.
<Name of Log File N> Notes:
n You must specify the absolute path and the
name of the input log files.
n The name of the input log file cannot exceed
230 characters.
Parameter Description
<Name of Merged Log File> Specifies the output merged log file.
Notes:
n The name of the merged log file cannot
exceed 230 characters.
n If a file with the specified name already exists,
the command stops and asks you to remove
the existing file, or to specify another name.
n The size of the merged log file cannot exceed
2 GB. In such scenario, the command creates
several merged log files, each not exceeding
the size limit.
[Expert@HostName:0]# ls -l $FWDIR/*.log
-rw-rw-r-- 1 admin root 189497 Sep 7 00:00 2019-09-07_000000.log
-rw-rw-r-- 1 admin root 14490 Sep 9 09:52 2019-09-09_000000.log
-rw-rw-r-- 1 admin root 30796 Sep 10 10:56 2019-09-10_000000.log
-rw-rw-r-- 1 admin root 24503 Sep 10 13:08 fw.log
[Expert@HostName:0]#
[Expert@HostName:0]# fw mergefiles -s $FWDIR/2019-09-07_000000.log $FWDIR/2019-09-09_000000.log
$FWDIR/2019-09-10_000000.log /var/log/2019-Sep-Merged.log
[Expert@HostName:0]#
[Expert@HostName:0]# ls -l /var/log/2019-Sep-Merged.log*
-rw-rw---- 1 admin root 213688 Sep 10 13:18 /var/log/2019-Sep-Merged.log
-rw-rw---- 1 admin root 8192 Sep 10 13:18 /var/log/2019-Sep-Merged.logLuuidDB
-rw-rw---- 1 admin root 80 Sep 10 13:18 /var/log/2019-Sep-Merged.logaccount_ptr
-rw-rw---- 1 admin root 2264 Sep 10 13:18 /var/log/2019-Sep-Merged.loginitial_ptr
-rw-rw---- 1 admin root 4448 Sep 10 13:18 /var/log/2019-Sep-Merged.logptr
[Expert@HostName:0]#
fw monitor
Description
Firewall Monitor is the Check Point traffic capture tool.
In a Security Gateway, traffic passes through different inspection points - Chain Modules in the Inbound
direction and then in the Outbound direction (see "fw ctl chain" on page 271).
The FW Monitor tool captures the traffic at each Chain Module in both directions.
You can later analyze the captured traffic with the same FW Monitor tool, or with special tools like
Wireshark.
Notes:
n Only one instance of "fw monitor" can run at a time.
n You can stop the "fw monitor" instance in one of these ways:
l In the shell, in which the "fw monitor" instance runs, press CTRL + C
keys
l In another shell, run this command: fw monitor -U
n Each time you run the FW Monitor, it compiles its temporary policy files
($FWDIR/tmp/monitorfilter.*).
n From R80.20, the FW Monitor is able to show the traffic accelerated with
SecureXL.
n For more information, see sk30583 and How to use FW Monitor.
fw6 monitor [-d] [-D] [-ci <Number of Inbound Packets>] [-co <Number
of Outbound Packets>] [-e <INSPECT Expression> | -f {<INSPECT Filter
File> | -}] [-F "<Source IP>,<Source Port>,<Dest IP>,<Dest
Port>,<Protocol Number>"] [-i] [-l <Length>] [-m {i,I,o,O,e,E}] [-o
<Output File> [-w]] [[-pi <Position>] [-pI <Position>] [-po
<Position>] [-pO <Position>] | -p all [-a]] [-T] [-u | -s] [-U] [-v
<VSID>] [-x <Offset>[,<Length>] [-w]]
Parameters
Parameter Description
-d Runs the command in debug mode and shows some information about
-D how the FW Monitor starts and compiles the specified INSPECT filter:
n -d
Simple debug output.
n -D
Verbose output.
Best Practice - You can use the "-ci" and the "-co"
parameters together. This is especially useful during large
volumes of traffic. In such scenarios, FW Monitor may bind so
many resources (for writing to the console, or to a file) that
recognizing the break sequence (CTRL+C) might take a very
long time.
Parameter Description
Notes:
n Refer to the $FWDIR/lib/fwmonitor.def file for
useful macro definitions.
n See syntax examples below ("Examples for the "-e"
parameter" on page 336).
-F "<Source Specifies the capture filter (for both accelerated and non-accelerated
IP>,<Source traffic):
Port>,<Dest
n <Source IP> - Specifies the source IP address
IP>,<Dest
Port>,<Protocol n <Source Port> - Specifies the source Port Number (see IANA
Number>" Service Name and Port Number Registry)
n <Dest IP> - Specifies the destination IP address
n <Dest Port> - Specifies the destination Port Number (see IANA
Service Name and Port Number Registry)
n <Protocol Number> - Specifies the Protocol Number (see
IANA Protocol Numbers)
Parameter Description
Notes:
n See syntax examples below ("Examples for the "-F"
parameter" on page 348).
n The "-F" parameter uses these Kernel Debug Filters.
For more information, see "Kernel Debug Filters" on
page 456.
l For the Source IP address:
simple_debug_filter_saddr_<N>
"<IP Address>"
l For the Source Ports:
simple_debug_filter_sport_<N>
<1-65535>
l For the Destination IP address:
simple_debug_filter_daddr_<N>
"<IP Address>"
l For the Destination Ports:
simple_debug_filter_dport_<N>
<1-65535>
l For the Protocol Number:
command_simple_debug_filter_
proto_<N> <0-254>
n Value 0 means "any".
n This parameter supports up to 5 capture filters (up to 5
instances of the "-F" parameter in the syntax).
The FW Monitor performs the logical "OR" between all
specified simple capture filters.
Parameter Description
-l <Length> Specifies the maximal length of the captured packets. FW Monitor reads
only the specified number of bytes from each packet.
Notes:
n This parameter is optional.
n This parameter lets you capture only the headers from
each packet (for example, IP and TCP) and omit the
payload. This decreases the size of the output file. This
also helps the internal FW Monitor buffer not to fill too
fast.
n Make sure to capture the minimal required number of
bytes, to capture the Layer 3 IP header and Layer 4
Transport header.
-m {i, I, o, O, e, Specifies the capture mask (inspection point) in relation to Chain Modules,
E} in which the FW Monitor captures the traffic.
These are the inspection points, through which each packet passes on a
Security Gateway.
n -m i
Pre-Inbound only (before the packet enters a Chain Module in the
inbound direction)
n -m I
Post-Inbound only (after the packet passes a Chain Module in the
inbound direction)
n -m o
Pre-Outbound only (before the packet enters a Chain Module in the
outbound direction)
n -m O
Post-Outbound only (after the packet passes through a Chain
Module in the outbound direction)
n -m e
Pre-Outbound VPN only (before the packet enters a VPN Chain
Module in the outbound direction)
n -m E
Post-Outbound VPN only (after the packet passes through a VPN
Chain Module in the outbound direction)
Parameter Description
Notes:
n You can specify several capture masks (for example, to see NAT on
the egress packets, enter "... -m o O ...").
n You can use this capture mask parameter "-m {i, I, o, O,
e, E}" together with the chain module position parameter "-p{i
| I | o | O}".
n In the inbound direction:
l All chain positions before the FireWall Virtual Machine
are Post-Inbound.
n In the outbound direction:
l All chain position before the FireWall Virtual Machine module
are Pre-Outbound.
l All chain modules after the FireWall Virtual Machine module
are Post-Outbound.
n By default, the FW Monitor captures the traffic only in the FireWall
Virtual Machine module.
n The packet direction relates to each specific packet, and not to the
connection's direction.
n The letters "q" and "Q" after the inspection point mean that the QoS
policy is applied to the interface.
-o <Output File> Specifies the output file, to which FW Monitor writes the captured raw
data.
Important - If you do not specify the path explicitly, FW Monitor
creates this output file in the current working directory. Because
this output file can grow very fast to very large size, we always
recommend to specify the full path to the largest partition
/var/log/.
The format of this output file is the same format used by tools like snoop
(refer to RFC 1761).
You can later analyze the captured traffic with the same FW Monitor tool,
or with special tools like Wireshark.
Parameter Description
-pi <Position> Inserts the FW Monitor Chain Module at the specified position between
-pI <Position> the kernel Chain Modules (see the "fw ctl chain" on page 271).
-po <Position> If the FW Monitor writes the captured data to the specified output file (with
-pO <Position> the parameter "-o <Output File>"), it also writes the position of the
or FW Monitor chain module as one of the fields.
-p all [-a] You can insert the FW Monitor Chain Module in these positions only:
n -pi <Position>
Inserts the FW Monitor Chain Module in the specified Pre-Inbound
position.
n -pI <Position>
Inserts the FW Monitor Chain Module in the specified Post-Inbound
position.
n -po <Position>
Inserts the FW Monitor Chain Module in the specified Pre-
Outbound position.
n -pO <Position>
Inserts the FW Monitor Chain Module in the specified Post-
Outbound position
n -p all [-a]
Inserts the FW Monitor Chain Module at all positions (both Inbound
and Outbound).
Parameter Description
Notes:
n <Position> can be one of these:
l A relative position number
are Post-Inbound.
n In the outbound direction:
l All chain position before the FireWall Virtual Machine module
are Pre-Outbound.
l All chain modules after the FireWall Virtual Machine module
are Post-Outbound.
n By default, the FW Monitor captures the traffic only in the FireWall
Virtual Machine module.
n The chain module position parameters "-p{i | I| o | O}
..." parameters do not apply to the accelerated traffic, which is still
monitored at the default inbound and outbound positions.
n For more information about the inspection points, see the
applicable table below.
Best Practice - Use this parameter if you do not save the output
to a file, but print it on the screen.
Parameter Description
-u Shows UUID for each packet (it is only possible to print either the UUID, or
or the SUUID - not both):
-s n -u
Prints connection's Universal-Unique-ID (UUID) for each packet
n -s
Prints connection's Session UUID (SUUID) for each packet
-v <VSID> On a VSX Gateway or VSX Cluster Member, captures the packets on the
specified Virtual System or Virtual Router.
By default, FW Monitor captures the packets on all Virtual Systems and
Virtual Routers.
Example:
fw monitor -v 4 -e "accept;" -o /var/log/fw_
mon.cap
-x <Offset> Specifies the position in each packet, where the FW Monitor starts to
[,<Length>] capture the data from each packet.
Optionally, it is also possible to limit the amount of data the FW Monitor
captures.
n <Offset>
Specifies how many bytes to skip from the beginning of each
packet. FW Monitor starts to capture the data from each packet only
after the specified number of bytes.
n <Length>
Specifies the maximal length of the captured packets. FW Monitor
reads only the specified number of bytes from each packet.
For example, to skip over the IP header and TCP header, enter "-x
52,96"
n Inbound
n Outbound
Generic Examples
Example 3 - Capturing only three Pre-Inbound packets at the FireWall Virtual Machine
module
[Expert@MyGW:0]# fw monitor -m i -ci 3
monitor: getting filter (from command line)
monitor: compiling
monitorfilter:
Compiled OK.
monitor: loading
monitor: monitoring (control-C to stop)
[vs_0][fw_1] eth0:i[40]: 192.168.204.1 -> 192.168.204.40 (TCP) len=40 id=31905
TCP: 53901 -> 22 ....A. seq=76111bb5 ack=f92e683b
[vs_0][fw_1] eth0:i[40]: 192.168.204.1 -> 192.168.204.40 (TCP) len=40 id=31906
TCP: 53901 -> 22 ....A. seq=76111bb5 ack=f92e68ef
[vs_0][fw_1] eth0:i[40]: 192.168.204.1 -> 192.168.204.40 (TCP) len=40 id=31907
TCP: 53901 -> 22 ....A. seq=76111bb5 ack=f92e69a3
monitor: unloading
Read 3 inbound packets and 0 outbound packets
[Expert@MyGW:0]#
Example 4 - Inserting the FW Monitor chain is before the chain #2 and capture only three
Pre-Inbound packets
Example 5 - Showing list of Chain Modules with the FW Monitor, when you do not change
the default capture positions
[Expert@MyGW:0]# fw ctl chain
in chain (17):
0: -7fffffff (0000000000000000) (00000000) SecureXL inbound (sxl_in)
1: -7ffffffe (0000000000000000) (00000000) SecureXL inbound CT (sxl_ct)
2: -7f800000 (ffffffff8b6718c0) (ffffffff) IP Options Strip (in) (ipopt_strip)
3: -70000000 (ffffffff8b6774d0) (ffffffff) fwmonitor (i/f side)
4: - 1fffff8 (ffffffff8b66f6f0) (00000001) Stateless verifications (in) (asm)
5: - 1fffff7 (ffffffff8b66f210) (00000001) fw multik misc proto forwarding
6: 0 (ffffffff8b8506a0) (00000001) fw VM inbound (fw)
7: 2 (ffffffff8b671d10) (00000001) fw SCV inbound (scv)
8: 4 (ffffffff8b061ed0) (00000003) QoS inbound offload chain module
9: 5 (ffffffff8b564d30) (00000003) fw offload inbound (offload_in)
10: 10 (ffffffff8b842710) (00000001) fw post VM inbound (post_vm)
11: 100000 (ffffffff8b7fd6c0) (00000001) fw accounting inbound (acct)
12: 22000000 (ffffffff8b0638d0) (00000003) QoS slowpath inbound chain mod (fg_sched)
13: 70000000 (ffffffff8b6774d0) (ffffffff) fwmonitor (IP side)
14: 7f730000 (ffffffff8b3c40b0) (00000001) passive streaming (in) (pass_str)
15: 7f750000 (ffffffff8b0e5b40) (00000001) TCP streaming (in) (cpas)
16: 7f800000 (ffffffff8b671870) (ffffffff) IP Options Restore (in) (ipopt_res)
out chain (16):
0: -7f800000 (ffffffff8b6718c0) (ffffffff) IP Options Strip (out) (ipopt_strip)
1: -70000000 (ffffffff8b6774d0) (ffffffff) fwmonitor (i/f side)
2: - 1fffff0 (ffffffff8b0d0190) (00000001) TCP streaming (out) (cpas)
3: - 1ffff50 (ffffffff8b3c40b0) (00000001) passive streaming (out) (pass_str)
4: - 1f00000 (ffffffff8b66f6f0) (00000001) Stateless verifications (out) (asm)
5: - 1ff (ffffffff8aeec0a0) (00000001) NAC Packet Outbound (nac_tag)
6: 0 (ffffffff8b8506a0) (00000001) fw VM outbound (fw)
7: 10 (ffffffff8b842710) (00000001) fw post VM outbound (post_vm)
8: 15000000 (ffffffff8b062540) (00000003) QoS outbound offload chain modul (fg_pol)
9: 21000000 (ffffffff8b0638d0) (00000003) QoS slowpath outbound chain mod (fg_sched)
10: 70000000 (ffffffff8b6774d0) (ffffffff) fwmonitor (IP side)
11: 7f000000 (ffffffff8b7fd6c0) (00000001) fw accounting outbound (acct)
12: 7f700000 (ffffffff8b0e4660) (00000001) TCP streaming post VM (cpas)
13: 7f800000 (ffffffff8b671870) (ffffffff) IP Options Restore (out) (ipopt_res)
14: 7f900000 (0000000000000000) (00000000) SecureXL outbound (sxl_out)
15: 7fa00000 (0000000000000000) (00000000) SecureXL deliver (sxl_deliver)
[Expert@MyGW:0]#
n Capture everything between hosts X,Z and hosts Y,Z in all Firewall kernel chains:
Note - You must specify protocol numbers in Decimal format. Refer to the
/etc/protocols file on the Security Gateway, or to IANA Protocol Numbers.
Examples:
l To specify TCP protocol with byte offset, use "ip_p=6"
Examples:
l To specify TCP protocol with byte offset, use "accept [9:1]=6"
l To specify UDP protocol with byte offset, use "accept [9:1]=11"
l To specify ICMP protocol with byte offset, use "accept [9:1]=1"
n In addition, you can explicitly use these expressions to specify protocols:
Summary Table
Example filters:
n Filter to capture everything on protocol X:
IANA Protocol Number (either in Dec ip_p = <IANA_ Example for TCP:
or in Hex) encapsulated in the IPv4 Protocol_ fw monitor -e "ip_p =
packet Number> 6, accept;"
Examples for UDP:
fw monitor -e "ip_p =
17, accept;"
fw monitor -e "ip_p =
0x11, accept;"
Example for ICMPv4:
fw monitor -e "ip_p =
1, accept;"
ACK fw monitor -e
(0x10) "th_flags =
0x10, accept;"
PSH fw monitor -e
(0x8) "th_flags =
0x8, accept;"
FIN fw monitor -e
(0x1) "th_flags =
0x1, accept;"
RST fw monitor -e
(0x4) "th_flags =
0x4, accept;"
URG fw monitor -e
(0x20) "th_flags =
0x20, accept;"
SYN + fw monitor -e
ACK "th_flags =
0x12, accept;"
PSH + fw monitor -e
ACK "th_flags =
0x18, accept;"
FIN + fw monitor -e
ACK "th_flags =
0x11, accept;"
RST + fw monitor -e
ACK "th_flags =
0x14, accept;"
Option
Expression Example
Description
Syntax:
Parameters:
Parameter Explanation
<Offset> Specifies the offset relative to the beginning of the IP packet from where the
value should be read.
Parameter Explanation
<Relational- Relational operator to express the relation between the packet data and the
Operator value:
n < - less than
n > - greater than
n <= - less than or equal to
n >= - greater than
n = or is - equal to
n != or is not - not equal to
<Value> One of the data types known to INSPECT (for example, an IP address, or
an integer).
Explanations:
n The IP-based protocols are stored in the IP packet as a byte at offset 9.
l To filter based on a Protocol encapsulated into IP, use this syntax:
n The Layer 3 IP Addresses are stored in the IP packet as double words at offset 12 (Source
address) and at offset 16 (Destination address).
l To filter based on a Source IP address, use this syntax:
n The Layer 4 Ports are stored in the IP packet as a word at offset 20 (Source port) and at offset 22
(Destination port).
Example filters:
n Capture everything between host X and host Y:
You must specify the network address and length of network mask (number of bits).
There are 3 options:
Example filters:
n Capture everything to/from network 192.168.33.0 / 24:
n Capture all traffic from Source IP x.x.x.x (any port) to Destination IP y.y.y.y (any port), over all
protocols:
n Capture all traffic between Host x.x.x.x (any port) and Host y.y.y.y (any port), over all protocols:
n Capture traffic from any Source IP from Source Port X to any Destination IP to Destination Port Y,
over all protocols:
n Capture traffic between all hosts, between Port X and Port Y, over all protocols:
n Capture traffic between all hosts, between all ports, over a Protocol with assigned number X:
Example 5 - Capture traffic between specific hosts between specific ports over specific
protocol
[Expert@HostName]# fw monitor -F "a.a.a.a,b,c.c.c.c,d,e" -F
"c.c.c.c,d,a.a.a.a,b,e" -o /var/log/fw_mon.cap
To capture only HTTP traffic between the Client 1.1.1.1 and the Server 2.2.2.2:
fw repairlog
Description
Check Point Security log file ($FWDIR/log/*.log) and Audit log files ($FWDIR/log/*.adtlog) are
databases, with special pointer files.
If these log pointer files become corrupted (which causes the inability to read the log file), this command
can rebuild them.
Syntax
Parameters
Parameter Description
fw sam
Description
Manages the Suspicious Activity Monitoring (SAM) rules. You can use the SAM rules to block connections
to and from IP addresses without the need to change or reinstall the Security Policy. For more information,
see sk112061.
You can create the Suspicious Activity Rules in two ways:
n In SmartConsole from Monitoring Results
n In CLI with the fw sam command
Notes:
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Monitoring (SAM) Rules. See sk79700.
n See the "fw sam_policy" on page 358 and "sam_alert" on page 423 commands.
n SAM rules consume some CPU resources on Security Gateway.
Best Practice - The SAM Policy rules consume some CPU resources
on Security Gateway. Set an expiration for rules that gives you time to
investigate, but does not affect performance. Keep only the required
SAM Policy rules. If you confirm that an activity is risky, edit the
Security Policy, educate users, or otherwise handle the risk.
n Logs for enforced SAM rules (configured with the fw sam command) are stored
in the $FWDIR/log/sam.dat file.
By design, the file is purged when the number of stored entries reaches 100,000.
This data log file contains the records in one of these formats:
<type>,<actions>,<expire>,<ipaddr>
<type>,<actions>,<expire>,<src>,<dst>,<dport>,<ip_p>
n SAM Requests are stored on the Security Gateway in the kernel table sam_
requests.
n IP Addresses that are blocked by SAM rules, are stored on the Security Gateway
in the kernel table sam_blocked_ips.
Syntax
n To add or cancel a SAM rule according to criteria:
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-t <Timeout>] [-l <Log Type>] [-C] [-e
<key=val>]+ [-r] -{n|i|I|j|J} <Criteria>
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] -D
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-r] -M -{i|j|n|b|q} all
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-r] -M -{i|j|n|b|q} <Criteria>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
-s <SAM Specifies the IP address (in the X.X.X.X format) or resolvable HostName of the
Server> Security Gateway that enforces the command.
The default is localhost.
Parameter Description
-S <SIC Specifies the SIC name for the SAM server to be contacted. It is expected that the
Name of SAM SAM server has this SIC name, otherwise the connection fails.
Server> Notes:
n If you do not explicitly specify the SIC name, the connection
continues without SIC names comparison.
n For more information about enabling SIC, refer to the OPSEC API
Specification.
n On VSX Gateway, run the fw vsx showncs -vs <VSID> command to
show the SIC name for the applicable Virtual System.
Notes:
n You can use this syntax only on Security Management Server or
Domain Management Server.
n VSX Gateways and VSX Cluster Members do not support
Suspicious Activity Monitoring (SAM) Rules. See sk79700.
-D Cancels all inhibit ("-i", "-j", "-I", "-J") and notify ("-n") parameters.
Notes:
n To "uninhibit" the inhibited connections, run the fw sam command
with the "-C" or "-D" parameters.
n It is also possible to use this command for active SAM requests.
Parameter Description
-C Cancels the fw sam command to inhibit connections with the specified parameters.
Notes:
n These connections are no longer inhibited (no longer rejected or
dropped).
n The command parameters must match the parameters in the
original fw sam command, except for the -t <Timeout>
parameter.
-t Specifies the time period (in seconds), during which the action is enforced.
<Timeout> The default is forever, or until you cancel the fw sam command.
-e Specifies rule information based on the keys and the provided values.
<key=val>+ Multiple keys are separated by the plus sign (+).
Available keys are (each is limited to 100 characters):
n name - Security rule name
n comment - Security rule comment
n originator - Security rule originator's username
-I Inhibits (drops or rejects) new connections with the specified parameters, and closes
all existing connections with the specified parameters.
Notes:
n Matching connections are rejected.
n Each inhibited connection is logged according to the log type.
Parameter Description
-J Inhibits new connections with the specified parameters, and closes all existing
connections with the specified parameters.
Notes:
n Matching connections are dropped.
n Each inhibited connection is logged according to the log type.
-M Monitors the active SAM requests with the specified actions and criteria.
all Gets all active SAM requests. This is used for monitoring purposes only.
Parameter Description
Parameter Description
srv <Src IP> <Dest IP> <Port> Matches the specific Source IP address, Destination IP
<Protocol> address, Service (port number) and Protocol.
Parameter Description
subsrv <Src IP> <Netmask> Matches the specific Source IP address, Destination IP
<Dest IP> <Netmask> <Port> address, Service (port number) and Protocol.
<Protocol> Source and Destination IP addresses are assigned
according to the netmask.
subsrvs <Src IP> <Src Netmask> Matches the specific Source IP address, source
<Dest IP> <Port> <Protocol> netmask, destination netmask, Service (port number)
and Protocol.
subsrvd <Src IP> <Dest IP> Matches specific Source IP address, Destination IP,
<Dest Netmask> <Port> destination netmask, Service (port number) and
<Protocol> Protocol.
dstsrv <Dest IP> <Service> Matches specific Destination IP address, Service (port
<Protocol> number) and Protocol.
subdstsrv <Dest IP> <Netmask> Matches specific Destination IP address, Service (port
<Port> <Protocol> number) and Protocol.
Destination IP address is assigned according to the
netmask.
fw sam_policy
Description
Manages the Suspicious Activity Policy editor that lets you work with these types of rules:
n Suspicious Activity Monitoring (SAM) rules.
See sk112061: How to create and view Suspicious Activity Monitoring (SAM) Rules.
n Rate Limiting rules.
See sk112454: How to configure Rate Limiting rules for DoS Mitigation.
Also, see these commands:
n "fw sam" on page 351
n "sam_alert" on page 423
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy
add <options>
batch
del <options>
get <options>
fw [-d] samp
add <options>
batch
del <options>
get <options>
Parameters
Parameter Description
del <options> Deletes one configured Rate Limiting rule one at a time.
See "fw sam_policy del" on page 374.
fw sam_policy add
Description
The "fw sam_policy add" and "fw6 sam_policy add" commands:
n Add one Suspicious Activity Monitoring (SAM) rule at a time.
n Add one Rate Limiting rule at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] ip <IP Filter Arguments>
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] ip <IP Filter Arguments>
fw [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] quota <Quota Filter Arguments>
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] quota <Quota Filter Arguments
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
-u Optional.
Specifies that the rule category is User-defined.
Default rule category is Auto.
-a {d | n | Mandatory.
b} Specifies the rule action if the traffic matches the rule conditions:
-l {r | a} Optional.
Specifies which type of log to generate for this rule for all traffic that matches:
n -r - Generate a regular log
n -a - Generate an alert log
-t Optional.
<Timeout> Specifies the time period (in seconds), during which the rule will be enforced.
Default timeout is indefinite.
Parameter Description
-f <Target> Optional.
Specifies the target Security Gateways, on which to enforce the Rate Limiting rule.
<Target> can be one of these:
n all - This is the default option. Specifies that the rule should be enforced on
all managed Security Gateways.
n Name of the Security Gateway or Cluster object - Specifies that the rule should
be enforced only on this Security Gateway or Cluster object (the object name
must be as defined in the SmartConsole).
n Name of the Group object - Specifies that the rule should be enforced on all
Security Gateways that are members of this Group object (the object name
must be as defined in the SmartConsole).
-n "<Rule Optional.
Name>" Specifies the name (label) for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write a
backslash (\) character. Example:
"This\ is\ a\ rule\ name\ with\ a\ backslash\ \\"
-c "<Rule Optional.
Comment>" Specifies the comment for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write a
backslash (\) character. Example:
"This\ is\ a\ comment\ with\ a\ backslash\ \\"
-o "<Rule Optional.
Originator Specifies the name of the originator for this rule.
>" Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write a
backslash (\) character. Example:
"Created\ by\ John\ Doe"
-z "<Zone>" Optional.
Specifies the name of the Security Zone for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
Parameter Description
Important:
n The Quota rules are not applied immediately to the Security
Gateway. They are only registered in the Suspicious Activity
Monitoring (SAM) policy database. To apply all the rules from the
SAM policy database immediately, add "flush true" in the fw
samp add command syntax.
n Explanation:
For new connections rate (and for any rate limiting in general), when
a rule's limit is violated, the Security Gateway also drops all packets
that match the rule.
The Security Gateway computes new connection rates on a per-
second basis.
At the start of the 1-second timer, the Security Gateway allows all
packets, including packets for existing connections.
If, at some point, during that 1 second period, there are too many
new connections, then the Security Gateway blocks all remaining
packets for the remainder of that 1-second interval.
At the start of the next 1-second interval, the counters are reset, and
the process starts over - the Security Gateway allows packets to
pass again up to the point, where the rule’s limit is violated.
Explanation for the IP Filter Arguments syntax for Suspicious Activity Monitoring (SAM) rules
Argument Description
-m <Source Mask> Specifies the Source subnet mask (in dotted decimal format - x.y.z.w).
-M <Destination Specifies the Destination subnet mask (in dotted decimal format -
Mask> x.y.z.w).
-p <Port> Specifies the port number (see IANA Service Name and Port Number
Registry).
Explanation for the Quota Filter Arguments syntax for Rate Limiting rules
Argument Description
flush true Specifies to compile and load the quota rule to the
SecureXL immediately.
(xxxx:yyyy:...:zzzz)
n cidr:<IP Address>/<Prefix>
The rule is applied to packets sent from:
l IPv4 address with Prefix from 0 to 32
n cc:<Country Code>
The rule matches the country code to the source
IP addresses assigned to this country, based on
the Geo IP database.
The two-letter codes are defined in ISO 3166-1
alpha-2.
n asn:<Autonomous System Number>
The rule matches the AS number of the
organization to the source IP addresses that are
assigned to this organization, based on the Geo
IP database.
The valid syntax is ASnnnn, where nnnn is a
number unique to the specific organization.
Notes:
n Default is: source-negated false
n The source-negated true processes all
source types, except the specified type.
Argument Description
(xxxx:yyyy:...:zzzz)
n cidr:<IP Address>/<Prefix>
The rule is applied to packets sent to:
l IPv4 address with Prefix from 0 to 32
n cc:<Country Code>
The rule matches the country code to the
destination IP addresses assigned to this
country, based on the Geo IP database.
The two-letter codes are defined in ISO 3166-1
alpha-2.
n asn:<Autonomous System Number>
The rule matches the AS number of the
organization to the destination IP addresses that
are assigned to this organization, based on the
Geo IP database.
The valid syntax is ASnnnn, where nnnn is a
number unique to the specific organization.
Notes:
n Default is: destination-negated false
n The destination-negated true will
process all destination types except the specified
type
Argument Description
Notes:
n Default is: service-negated false
n The service-negated true will process all
traffic except the traffic with the specified
protocols and ports
Argument Description
Examples
Explanations:
n This rule drops packets for all connections (-a d) that exceed the quota set by this rule,
including packets for existing connections.
n This rule logs packets (-l r) that exceed the quota set by this rule.
n This rule will expire in 3600 seconds (-t 3600).
n This rule limits the rate of creation of new connections to 5 connections per second (new-conn-
rate 5) for any traffic (service any) from the source IP addresses in the range 172.16.7.11
- 172.16.7.13 (source range:172.16.7.11-172.16.7.13).
Note - The limit of the total number of log entries per second is configured with the fwaccel dos
config set -n <rate> command.
n This rule will be compiled and loaded on the SecureXL, together with other rules in the Suspicious
Activity Monitoring (SAM) policy database immediately, because this rule includes the "flush
true" parameter.
Explanations:
n This rule logs and lets through all packets (-a n) that exceed the quota set by this rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to all packets except (service-negated true) the packets with IP protocol
number 1, 50-51, 6 port 443 and 17 port 53 (service 1,50-51,6/443,17/53).
n This rule applies to all packets from source IP addresses that are assigned to the country with
specified country code (cc:QQ).
n This rule does not let any traffic through (byte-rate 0) except the packets with IP protocol
number 1, 50-51, 6 port 443 and 17 port 53.
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to packets from the Autonomous System number 64500 (asn:AS64500).
n This rule applies to packets from source IPv6 addresses FFFF:C0A8:1100/120 (cidr:
[::FFFF:C0A8:1100]/120).
n This rule applies to all traffic (service any).
n This rule does not let any traffic through (pkt-rate 0).
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
Explanations:
n This rule bypasses (-a b) all packets that match this rule.
Note - The Access Control Policy and other types of security policy rules still apply.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to packets from the source IP addresses in the range 172.16.8.17 -
172.16.9.121 (range:172.16.8.17-172.16.9.121).
n This rule applies to packets sent to TCP port 80 (service 6/80).
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not log any packets (the -l r parameter is not specified).
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to all traffic (service any).
n This rule applies to all sources except (source-negated true) the source IP addresses that
are assigned to the country with specified country code (cc:QQ).
n This rule limits the maximal number of concurrent active connections to 655/65536=~1%
(concurrent-conns-ratio 655) for any traffic (service any) except (service-
negated true) the connections from the source IP addresses that are assigned to the country
with specified country code (cc:QQ).
n This rule counts connections, packets, and bytes for traffic only from sources that match this rule,
and not cumulatively for this rule.
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
fw sam_policy batch
Description
The "fw sam_policy batch" and "fw6 sam_policy batch" commands:
n Add and delete many Suspicious Activity Monitoring (SAM) rules at a time.
n Add and delete many Rate Limiting rules at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Procedure
n Enter one "add" or "del" command on each line, on as many lines as necessary.
Start each line with only "add" or "del" parameter (not with "fw samp").
n Use the same set of parameters and values as described in these commands:
l "fw sam_policy add" on page 360
l "fw sam_policy del" on page 374
n Terminate each line with a Return (ASCII 10 - Line Feed) character (press Enter).
add -a d -l r -t 3600 -c "Limit\ conn\ rate\ to\ 5\ conn/sec from\ these\ sources" quota service any source
range:172.16.7.13-172.16.7.13 new-conn-rate 5
del <501f6ef0,00000000,cb38a8c0,0a0afffe>
EOF
[Expert@HostName]#
fw sam_policy del
Description
The "fw sam_policy del" and "fw6 sam_policy del" commands:
n Delete one configured Suspicious Activity Monitoring (SAM) rule at a time.
n Delete one configured Rate Limiting rule at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Parameters
Parameter Description
'<Rule UID>' Specifies the UID of the rule you wish to delete.
Important:
n The quote marks and angle
brackets ('<...>') are
mandatory.
n To see the Rule UID, run the
"fw sam_policy get" on
page 377 command.
Procedure
1. List all the existing rules in the Suspicious Activity Monitoring policy database
List all the existing rules in the Suspicious Activity Monitoring policy database.
n For IPv4, run:
fw sam_policy get
operation=add uid=<5ac3965f,00000000,3403a8c0,0000264a>
target=all timeout=300 action=notify log=log name=Test\ Rule
comment=Notify\ about\ traffic\ from\ 1.1.1.1 originator=John\
Doe src_ip_addr=1.1.1.1 req_tpe=ip
Explanation:
The "fw samp del" and "fw6 samp del" commands only remove a rule from the persistent
database. The Security Gateway continues to enforce the deleted rule until the next time you
compiled and load a policy. To force the rule deletion immediately, you must enter a flush-only
rule right after the "fw samp del" and "fw6 samp del" command. This flush-only rule
immediately deletes the rule you specified in the previous step, and times out in 2 seconds.
Best Practice - Specify a short timeout period for the flush-only rules. This
prevents accumulation of rules that are obsolete in the database.
fw sam_policy get
Description
The "fw sam_policy get" and "fw6 sam_policy get" commands:
n Show all the configured Suspicious Activity Monitoring (SAM) rules.
n Show all the configured Rate Limiting rules.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t <Type> [+
{-v '<Value>'}] [-n]]
fw6 [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t <Type>
[+{-v '<Value>'}] [-n]]
Parameters
Note - All these parameters are optional.
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
-u '<Rule Prints the rule specified by its Rule UID or its zero-based rule index.
UID>' The quote marks and angle brackets ('<...>') are mandatory.
Examples
uid
<5ac3965f,00000000,3403a8c0,0000264a>
target
all
timeout
2147483647
action
notify
log
log
name
Test\ Rule
comment
Notify\ about\ traffic\ from\ 1.1.1.1
originator
John\ Doe
src_ip_addr
1.1.1.1
req_type
ip
fw showuptables
Description
Shows the formatted contents of the Unified Policy kernel tables.
Syntax
fw [-d] showuptables
[-h]
[-i]
Parameters
Parameter Description
fw stat
Description
Shows the following information about the policy on the Security Gateway:
n Name of the installed policy.
n Date of the last policy installation.
n Names of the interfaces protected by the installed policy, and in which direction the policy protects
them.
Important - This command is outdated and exists only for backward compatibility with
very old versions. Use the "cpstat -f policy fw" command instead (see
"cpstat" on page 220).
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
<Name of Specifies the name of the Security Gateway or Cluster Member object (as defined in
Object> SmartConsole), from which to show the information. Use this parameter only on the
Management Server.
This requires the established SIC with that Check Point computer.
[Expert@MyGW:0]# fw stat
HOST POLICY DATE
localhost MyGW_Policy 10Sep2018 14:01:25 : [>eth0] [<eth0] [>eth1]
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw stat -s
HOST IF POLICY DATE
localhost >eth0 MyGW_Policy 10Sep2018 14:01:25 :
localhost <eth0 MyGW_Policy 10Sep2018 14:01:25 :
localhost >eth1 MyGW_Policy 10Sep2018 14:01:25 :
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw stat -l
HOST IF POLICY DATE TOTAL REJECT DROP ACCEPT LOG
localhost >eth0 MyGW_Policy 10Sep2018 14:01:25 : 14377 0 316 14061 1
localhost <eth0 MyGW_Policy 10Sep2018 14:01:25 : 60996 0 0 60996 0
localhost >eth1 MyGW_Policy 10Sep2018 14:01:25 : 304 0 304 0 0
[Expert@MyGW:0]#
fw tab
Description
Shows data from the specified Security Gateway kernel tables.
This command also lets you change the content of dynamic kernel tables. You cannot change the content
of static kernel tables.
Kernel tables (also known as State tables) store data that the Firewall and other Software Blades use to
inspect packets. These kernel tables are a critical component of Stateful Inspection.
Best Practices:
n Use the "fw tab -t connections -f" command to see the detailed (and
more technical) information about the current connections in the Connections
kernel table (ID 8158).
n Use the "fw ctl conntab" on page 274 command to see the simplified information
about the current connections in the Connections kernel table (ID 8158).
Syntax
fw [-d]
{-h | -help}
[-v] [-t <Table>] [-c | -s] [-f] [-o <Output File>] [-r] [-u | -
m <Limit>] [-a -e "<Entry>"] [ -x [-e "<Entry>"]] [-y] [<Name of
Object>]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
Parameter Description
Warning - If you add a wrong entry, you can make your Security Gateway
unresponsive.
-c Shows formatted kernel table data in the common format. This is the default.
Important - If the specified kernel table is large, this consumes a large amount
of RAM. This can make your Security Gateway unresponsive.
-o Saves the output in the specified file in the CL format as a Check Point Firewall log.
<Output You can later open this file with the "fw log" on page 305 command.
File> If you do not specify the full path explicitly, this command saves the output file in the
current working directory.
Important - If the specified kernel table is large, this consumes a large amount
of RAM. This can make your Security Gateway unresponsive.
-v Shows the CoreXL Firewall instance number as a prefix for each line.
Parameter Description
-x [-e Deletes all entries or the specified entry from the specified kernel table.
< You can use this parameter only on the local Security Gateway.
Entry>]
Warning - If you delete a wrong entry, you can break the current connections
through your Security Gateway. This includes the remote SSH connection.
<Name Specifies the name of the Security Gateway or Cluster Member object (as defined in
of SmartConsole), from which to show the information. Use this parameter only on the
Object> Management Server.
This requires the established SIC with that Check Point computer.
If you do not use this parameter, the default is localhost.
[Expert@MyGW:0]# fw tab -s
HOST NAME ID #VALS #PEAK #SLINKS
localhost vsx_firewalled 0 1 1 0
localhost firewalled_list 1 2 2 0
localhost external_firewalled_list 2 0 0 0
localhost management_list 3 2 2 0
localhost external_management_list 4 0 0 0
localhost log_server_list 5 0 0 0
localhost ips1_sensors_list 6 0 0 0
localhost all_tcp_services 7 141 141 0
localhost tcp_services 8 1 1 0
... ...
localhost connections 8158 2 56 2
... ...
localhost up_251_rule_to_clob_uuid 14083 0 0 0
... ...
localhost urlf_cache_tbl 29 0 0 0
localhost proxy_outbound_conn_tbl 30 0 0 0
localhost dns_cache_tbl 31 0 0 0
localhost appi_referrer_table 32 0 0 0
localhost uc_hits_htab 33 0 0 0
localhost uc_cache_htab 34 0 0 0
localhost uc_incident_to_instance_htab 35 0 0 0
localhost fwx_cntl_dyn_ghtab 36 0 0 0
localhost frag_table 37 0 0 0
localhost dos_blacklist_notifs 38 0 0 0
[Expert@MyGW:0]#
localhost:
Date: Sep 10, 2018
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName:
cn=cp_mgmt,o=MyGW..44jkyv; : (+)====================================(+); Table_Name: connections; : (+);
Attributes: dynamic, id 8158, attributes: keep, sync, aggressive aging, kbufs 21 22 23 24 25 26 27 28 29 30
31 32 33 34, expires 25, refresh, , hashsize 2097152, unlimited; LastUpdateTime: 10Sep2018 20:30:48;
ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName:
cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction: 1; Source: 192.168.204.40;
SPort: 55411; Dest: 192.168.204.1; DPort: 53; Protocol: udp; CPTFMT_sep: ;; Type: 131073; Rule: 0; Timeout:
335; Handler: 0; Ifncin: -1; Ifncout: -1; Ifnsin: 1; Ifnsout: 1; Bits: 0000780000000000; Expires: 2/40;
LastUpdateTime: 10Sep2018 20:30:48; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName:
cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction: 0; Source: 192.168.204.1;
SPort: 53901; Dest: 192.168.204.40; DPort: 22; Protocol: tcp; CPTFMT_sep: ;; Type: 114689; Rule: 2;
Timeout: 481; Handler: 0; Ifncin: 1; Ifncout: 1; Ifnsin: -1; Ifnsout: -1; Bits: 02007800000f9000; Expires:
2002/3600; LastUpdateTime: 10Sep2018 20:30:48; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName:
cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction: 1; Source: 192.168.204.40;
SPort: 22; Dest: 192.168.204.1; DPort: 53901; Protocol: tcp; CPTFMT_sep_1: ->; Direction_1: 0; Source_1:
192.168.204.1; SPort_1: 53901; Dest_1: 192.168.204.40; DPort_1: 22; Protocol_1: tcp; FW_symval: 2053;
LastUpdateTime: 10Sep2018 20:30:48; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName:
cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction: 0; Source: 192.168.204.1;
SPort: 51702; Dest: 192.168.204.40; DPort: 22; Protocol: tcp; CPTFMT_sep: ;; Type: 114689; Rule: 2;
Timeout: 481; Handler: 0; Ifncin: 1; Ifncout: 1; Ifnsin: -1; Ifnsout: -1; Bits: 02007800000f9000; Expires:
3600/3600; LastUpdateTime: 10Sep2018 20:30:48; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName:
cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction: 1; Source: 192.168.204.40;
SPort: 22; Dest: 192.168.204.1; DPort: 51702; Protocol: tcp; CPTFMT_sep_1: ->; Direction_1: 0; Source_1:
192.168.204.1; SPort_1: 51702; Dest_1: 192.168.204.40; DPort_1: 22; Protocol_1: tcp; FW_symval: 2053;
LastUpdateTime: 10Sep2018 20:30:48; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName:
cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction: 0; Source: 192.168.204.1;
SPort: 53; Dest: 192.168.204.40; DPort: 55411; Protocol: udp; CPTFMT_sep_1: ->; Direction_2: 1; Source_2:
192.168.204.40; SPort_2: 55411; Dest_2: 192.168.204.1; DPort_2: 53; Protocol_2: udp; FW_symval: 2054;
LastUpdateTime: 10Sep2018 20:30:48; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
[Expert@MyGW:0]#
Example 5 - Show the raw data from the Connections table and show the IDs of CoreXL Firewall instances
for each entry
fw unloadlocal
Description
Uninstalls all policies from the Security Gateway or Cluster Member.
Warning
1. The "fw unloadlocal" command prevents all traffic from passing through the Security
Gateway (Cluster Member), because it disables the IP Forwarding in the Linux kernel on the
Security Gateway (Cluster Member).
2. The "fw unloadlocal" command removes all policies from the Security Gateway (Cluster
Member). This means that the Security Gateway (Cluster Member) accepts all incoming
connections destined to all active interfaces without any filtering or protection enabled.
Notes
n If it is necessary to remove the current policy, but keep the Security Gateway (Cluster Member)
protected, then run the "comp_init_policy" on page 183 command on the Security Gateway (Cluster
Member).
n To load the policies on the Security Gateway (Cluster Member), run one of these commands on the
Security Gateway (Cluster Member), or reboot:
l "fw fetch" on page 296
l "cpstart" on page 219
Syntax
fw [-d] unloadlocal
Parameters
Parameter Description
Example
[Expert@MyGW:0]# fw unloadlocal
net.ipv4.conf.default.mc_forwarding = 0
net.ipv4.conf.default.forwarding = 0
net.ipv4.conf.all.mc_forwarding = 0
net.ipv4.conf.all.forwarding = 0
[Expert@MyGW:0]#
fw up_execute
Description
Executes the offline Unified Policy.
Important -
This command only supports:
n Source IP address, Destination IP address, and objects that contain an IP
address
n Simple services objects (based on destination port, source port, and protocol)
n Protocol detection
n Application detection
This command does not support:
n Implied rules
n All other objects (Security Zone, Access Roles, Domain Objects, Updatable
Objects, Dynamic Objects, Other/DCERPC service, Content Awareness, VPN,
Resource, Mobile Access application, Time Objects, and so on)
Syntax
Parameters
Parameter Description
Parameter Description
For example:
n TCP = 6
n UDP = 17
n ICMP = 1
n TCP
n UDP
n ICMP
n HTTP
Example 1
Per Layer:
------------
Layer name: Network
Layer id: 0
Match status: MATCH
Match action: Accept
Matched rule: 2
Possible rules: 2 16777215
[Expert@MyGW:0]#
Example 2
Per Layer:
------------
Layer name: Network
Layer id: 0
Match status: MATCH
Match action: Accept
Matched rule: 2
Possible rules: 2 16777215
[Expert@MyGW:0]#
fw ver
Description
Shows this information about the Security Gateway software:
n Major version
n Minor version
n Build number
n Kernel build number
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
ver Shows:
n Major version
n Minor version
n Build number
-k n Shows:
n Major version
n Minor version
n Build number
n Kernel build number
Example 1
[Expert@MyGW:0]# fw ver -k
This is Check Point's software version R81 - Build 123
[Expert@MyGW:0]#
Example 2
[Expert@MyGW:0]# fw ver -k
This is Check Point's software version R81 - Build 456
[Expert@MyGW:0]#
fwboot
Description
Configures Check Point boot options.
Important - Most of these commands are for Check Point use only.
Syntax
[Expert@HostName:0]# $FWDIR/boot/fwboot
bootconf <options>
corexl <options>
cpuid <options>
default <options>
fwboot_ipv6 <options>
fwdefault <options>
ha_conf <options>
ht <options>
multik_reg <options>
post_drv <options>
Parameters
Parameter Description
cpuid <options> Shows the number of available CPUs and CPU cores on this Security
Gateway.
See "fwboot cpuid" on page 412.
default Loads the specified Default Filter policy on this Security Gateway.
<options> See "fwboot default" on page 414.
fwboot_ipv6 Shows the internal memory address of the hook function for the specified
<options> CoreXL Firewall instance.
See "fwboot fwboot_ipv6" on page 415.
fwdefault Loads the specified Default Filter policy on this Security Gateway.
<options> See "fwboot fwdefault" on page 416.
Parameter Description
ht <options> Shows and configures the SMT (HyperThreading) feature (sk93000) boot
options.
See "fwboot ht" on page 418.
multik_reg Shows the internal memory address of the registration function for the
<options> specified CoreXL Firewall instance.
See "fwboot multik_reg" on page 420.
fwboot bootconf
Description
Configures boot security options.
Notes:
n You must run this command from the Expert mode.
n The settings are saved in the
$FWDIR/boot/boot.conf file.
Warning - To avoid issues, do not edit the
$FWDIR/boot/boot.conf file manually.
Edit the file only with this command.
n Refer to these related commands:
l "fwboot corexl" on page 406
l "control_bootsec" on page 186
Parameters
Parameter Description
Parameter Description
get_def Shows the configured path and the name of the Default Filter policy file
(default is $FWDIR/boot/default.bin).
Parameter Description
Notes:
n In the $FWDIR/boot/boot.conf file, refer to the value
of the COREXL_INSTALLED.
n To configure CoreXL, use the "cpconfig" on page 201
menu.
set_def Configures the path and the name of the Default Filter policy file (default is
[< $FWDIR/boot/default.bin).
/path/filename>] Notes:
n In the $FWDIR/boot/boot.conf file, refer to the value
of the DEFAULT_FILTER_PATH.
n If you do not specify the path and the name explicitly, then
the value of the DEFAULT_FILTER_PATH is set to 0.
As a result, Security Gateway does not load a Default Filter
during boot.
Parameter Description
Notes:
n In the $FWDIR/boot/boot.conf file, refer to the value
of the IPV6_INSTALLED.
n Configure the IPv6 Support in Gaia Portal, or Gaia Clish.
See the R81 Gaia Administration Guide.
fwboot corexl
Description
Configures and monitors the CoreXL.
Important:
n The configuration commands are for Check Point use only. To configure
CoreXL, use the Check Point CoreXL option in the "cpconfig" on page 201
menu.
n After all changes in CoreXL configuration on the Security Gateway, you must
reboot it.
n In a Cluster, you must configure all the Cluster Members in the same way.
Parameters
Parameter Description
Parameter Description
curr_ Returns the current configured number of IPv4 CoreXL Firewall instances.
instance4_ Example
count
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl curr_
instance4_count
[Expert@MyGW:0]# echo $?
3
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 11 | 18
1 | Yes | 2 | 12 | 18
2 | Yes | 1 | 13 | 18
[Expert@MyGW:0]#
curr_ Returns the current configured number of IPv6 CoreXL Firewall instances.
instance6_ Example
count
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl curr_
instance6_count
[Expert@MyGW:0]# echo $?
2
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw6 ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 11 | 18
1 | Yes | 2 | 12 | 18
[Expert@MyGW:0]#
def_by_ Sets the default configuration for CoreXL according to the specified allowed number
allowed of CPU cores.
[n]
def_ Returns the default number of IPv4 CoreXL Firewall instances for this Security
instance4_ Gateway.
count Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl def_
instance4_count
[Expert@MyGW:0]# echo $?
3
[Expert@MyGW:0]#
Parameter Description
def_ Returns the default number of IPv4 CoreXL Firewall instances for this Security
instance6_ Gateway.
count Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl def_
instance6_count
[Expert@MyGW:0]# echo $?
2
[Expert@MyGW:0]#
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl eligible
[Expert@MyGW:0]# echo $?
1
[Expert@MyGW:0]#
[-v] Enables CoreXL with 'n' IPv4 Firewall instances and optionally 'k' IPv6 Firewall
enable [n] instances.
[-6 k]
n -v - Leaves the high memory (vmalloc) unchanged.
n n - Denotes the number of IPv4 CoreXL Firewall instances.
n k - Denotes the number of IPv6 CoreXL Firewall instances.
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl installed
[Expert@MyGW:0]# echo $?
1
[Expert@MyGW:0]#
Parameter Description
max_ Returns the maximal allowed number of IPv4 CoreXL Firewall instances for this
instance4_ Security Gateway.
count Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instance4_count
[Expert@MyGW:0]# echo $?
4
[Expert@MyGW:0]#
max_ Returns the maximal allowed number of IPv4 CoreXL Firewall instances for a
instances Security Gateway that runs Gaia with 32-bit kernel.
4_32bit Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances4_32bit
[Expert@MyGW:0]# echo $?
14
[Expert@MyGW:0]#
max_ Returns the maximal allowed number of IPv4 CoreXL Firewall instances for a
instances Security Gateway that runs Gaia with 64-bit kernel.
4_64bit Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances4_64bit
[Expert@MyGW:0]# echo $?
38
[Expert@MyGW:0]#
max_ Returns the maximal allowed number of IPv6 CoreXL Firewall instances for this
instance6_ Security Gateway.
count Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instance6_count
[Expert@MyGW:0]# echo $?
3
[Expert@MyGW:0]#
max_ Returns the total maximal allowed number of CoreXL Firewall instances (IPv4 and
instances_ IPv6) for this Security Gateway.
count Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances_count
[Expert@MyGW:0]# echo $?
40
[Expert@MyGW:0]#
Parameter Description
max_ Returns the total maximal allowed number of CoreXL Firewall instances for a Security
instances_ Gateway that runs Gaia with 32-bit kernel.
32bit Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances_32bit
[Expert@MyGW:0]# echo $?
16
[Expert@MyGW:0]#
max_ Returns the total maximal allowed number of CoreXL Firewall instances for a Security
instances_ Gateway that runs Gaia with 64-bit kernel.
64bit Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances_64bit
[Expert@MyGW:0]# echo $?
40
[Expert@MyGW:0]#
min_ Returns the minimal allowed number of IPv4 CoreXL Firewall instances.
instance_ Example
count
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl min_
instance_count
[Expert@MyGW:0]# echo $?
2
[Expert@MyGW:0]#
unsupporte Returns 1 if at least one feature is configured, which CoreXL does not support.
d_features Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl
unsupported_features
corexl unsupported feature: QoS is configured.
[Expert@MyGW:0]# echo $?
1
[Expert@MyGW:0]#
fwboot cpuid
Description
Shows the number of available CPUs and CPU cores on this Security Gateway.
Syntax
Parameters
Parameter Description
No Parameters Shows the IDs of the available CPU cores on this Security Gateway.
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid
3 2 1 0
[Expert@MyGW:0]#
--full Shows a full map of the available CPUs and CPU cores on this Security Gateway.
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid --full
cpuid phys_id core_id thread_id
0 0 0 0
1 2 0 0
2 4 0 0
3 6 0 0
[Expert@MyGW:0]#
Parameter Description
ht_aware Shows the CPU cores in the order of their awareness of Hyper-Threading.
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid ht_aware
3 2 1 0
[Expert@MyGW:0]#
fwboot default
Description
Loads the specified Default Filter policy on this Security Gateway.
Notes:
n You must run this command from the Expert mode.
n This command is the same as the "fwboot default" above
command.
n Refer to these related commands:
l "fw defaultgen" on page 295
l "fwboot bootconf" on page 402
l "control_bootsec" on page 186
l "comp_init_policy" on page 183
Syntax
Parameters
Parameter Description
<Default Filter Policy Specifies the full path and name of the Default Filter policy
File> file.
The default is $FWDIR/boot/default.bin
Example
fwboot fwboot_ipv6
Description
Shows the internal memory address of the hook function for the specified CoreXL Firewall instance.
Syntax
Parameters
Parameter Description
Example
fwboot fwdefault
Description
Loads the specified Default Filter policy on this Security Gateway.
Notes:
n You must run this command from the Expert mode.
n This command is the same as the "fwboot default" on
page 414command.
n Refer to these related commands:
l "fw defaultgen" on page 295
l "fwboot bootconf" on page 402
l "control_bootsec" on page 186
l "comp_init_policy" on page 183
Syntax
Parameters
Parameter Description
<Default Filter Policy Specifies the full path and name of the Default Filter policy
File> file.
The default file is $FWDIR/boot/default.bin
Example
fwboot ha_conf
Description
Configures the cluster mechanism during boot.
Notes:
n You must run this command from the Expert mode.
n Refer to these related commands:
l "fw defaultgen" on page 295
l "fwboot bootconf" on page 402
l "control_bootsec" on page 186
l "comp_init_policy" on page 183
Syntax
fwboot ht
Description
Shows and configures the boot options for the SMT (HyperThreading) feature (sk93000).
Important - This command is for Check Point use only. To configure SMT
(HyperThreading) feature, follow sk93000.
Note - You must run this command from the Expert mode.
Syntax
[Expert@HostName:0]# $FWDIR/boot/fwboot ht
--core_override [<number>]
--disable
--eligible
--enable
--enabled
--supported
Parameters
Parameter Description
Parameter Description
--eligible Returns a number that shows if this system is eligible for the SMT
feature. Run:
[Expert@MyGW:0]# $FWDIR/boot/fwboot ht --
eligible
[Expert@MyGW:0]# echo $?
--supported Returns a number that shows if this system supports the SMT feature.
Run:
[Expert@MyGW:0]# $FWDIR/boot/fwboot ht --
supported
[Expert@MyGW:0]# echo $?
fwboot multik_reg
Description
Shows the internal memory address of the registration function for the specified CoreXL Firewall instance.
Note - You must run this command from the Expert mode.
Syntax
Parameters
Parameter Description
Example
fwboot post_drv
Description
Loads the Firewall driver for CoreXL during boot.
Important:
n This command is for Check Point use only.
n If you run this command, Security Gateway can block all traffic. In such case, you
must connect to the Security Gateway over a console and restart Check Point
services with the "cpstop" on page 227 and "cpstart" on page 219 commands.
Alternatively, you can reboot the Security Gateway.
Note - You must run this command from the Expert mode.
Syntax
Parameters
Parameter Description
sam_alert
Description
For SAM v1, this utility executes Suspicious Activity Monitoring (SAM) actions according to the information
received from the standard input.
For SAM v2, this utility executes Suspicious Activity Monitoring (SAM) actions with User Defined Alerts
mechanism.
Notes:
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Monitoring (SAM) Rules. See sk79700.
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>
n See the "fw sam" on page 351 and "fw sam_policy" on page 358 commands.
SAM v1 syntax
sam_alert [-v] [-o] [-s <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-C] {-n|-i|-I} {-src|-dst|-any|-srv}
Parameter Description
-o Specifies to print the input of this tool to the standard output (to use with pipes in
a CLI syntax).
-t <Time> Specifies the time (in seconds), during which to enforce the action. The default is
forever.
Parameter Description
-n Specifies to notify every time a connection, which matches the specified criteria,
passes through the Security Gateway.
-I Inhibits (drops or rejects) connections that match the specified criteria and
closes all existing connections that match the specified criteria.
SAM v2 syntax
sam_alert -v2 [-v] [-O] [-S <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-n <Name>] [-c "<Comment">] [-o <Originator>] [-l {r |
a}] -a {d | r| n | b | q | i} [-C] {-ip |-eth} {-src|-dst|-any|-srv}
Parameter Description
-O Specifies to print the input of this tool to the standard output (to use
with pipes in a CLI syntax).
-t <Time> Specifies the time (in seconds), during which to enforce the action.
The default is forever.
-l {r | a} Specifies the log type for connections that match the specified criteria:
n r - Regular
n a - Alert
Default is None.
Parameter Description
Example
See sk110873: How to configure Security Gateway to detect and prevent port scan.
stattest
Description
Check Point AMON client to query SNMP OIDs.
You can use this command as an alternative to the standard SNMP commands for debug purposes - to
make sure the applicable SNMP OIDs provide the requested information.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management
Server>
Syntax
n To query a Regular OID:
stattest get [-d] [-h <Host>] [-p <Port>] [-x <Proxy Server>] [-v <VSID>] [-t <Timeout>] <Regular_OID_1> <Regular_OID_2>
... <Regular_OID_N>
Parameters
Parameter Description
Parameter Description
usrchk
Description
Controls the UserCheck daemon (usrchkd).
Syntax
usrchk
hits <options>
incidents <options>
debug <options>
Note - You can also enter partial names of the sub-commands and their options.
Parameters
Parameter Description
n Database operations:
l Reload hits from the database:
Parameter Description
n Filter which debug logs UserCheck writes to the log file based on the
specified Debug Topics and Severity:
usrchk debug set <Topic Name> <Severity>
The available Debug Topics are:
l all
reported issue
The available Severities are:
l all
l critical
l events
l important
l surprise
Parameter Description
l 1
l 2
l 3
l 4
l 5
Notes:
n To show all UserCheck interaction objects, run:
usrchk hits list all
n You can only run a command that contains "user
<UserName>" if:
l Identity Awareness is enabled on the Security Gateway.
UserCheck objects.
Type Description
Important:
n In Cluster, you must see and configure the same value for the same kernel
parameter on each Cluster Member.
n In VSX Gateway, the configured values of kernel parameters apply to all existing
Virtual Systems and Virtual Routers.
Security Gateway gets the names and the default values of the kernel parameters from these kernel
module files:
n $FWDIR/modules/fw_kern_64.o
n $FWDIR/modules/fw_kern_64_v6.o
n $PPKDIR/modules/sim_kern_64.o
n $PPKDIR/modules/sim_kern_64_v6.o
Type Name
Integer fw_allow_simultaneous_ping
fw_kdprintf_limit
fw_log_bufsize
send_buf_limit
String simple_debug_filter_addr_1
simple_debug_filter_daddr_1
simple_debug_filter_vpn_1
ws_debug_ip_str
fw_lsp_pair1
Step Description
3 Get the list of the available integer kernel parameters and their values:
modinfo -p $FWDIR/boot/modules/fw_kern*.o | sort
-u | grep _type | awk 'BEGIN {FS=":"} ; {print
$1}' | xargs -n 1 fw ctl get int 1>> /var/log/fw_
integer_kernel_parameters.txt 2>> /var/log/fw_
integer_kernel_parameters.txt
Step Description
Step Description
To make a kernel parameter configuration permanent (to survive reboot), you must edit one of the
applicable configuration files:
n For Firewall kernel parameters:
$FWDIR/boot/modules/fwkern.conf
n For VPN kernel parameters:
$FWDIR/boot/modules/vpnkern.conf
The exact instructions are provided in various SK articles in Check Point Support Center, and provided
by Check Point Support.
For more information, see sk26202: Changing the kernel global parameters for Check Point Security
Gateway.
Step Description
Step Description
7 Add the required Firewall kernel parameter with the assigned value in the exact format
specified below.
<Name_of_String_Kernel_Parameter>='<String_Text>'
or
<Name_of_String_Kernel_Parameter>="<String_Text>"
Step Description
3 Get the list of the available integer kernel parameters and their values:
modinfo -p $FWDIR/boot/modules/fw_kern*.o | sort
-u | grep 'string param' | awk 'BEGIN {FS=":"} ;
{print $1}' | xargs -n 1 fw ctl get str 1>>
/var/log/fw_string_kernel_parameters.txt 2>>
/var/log/fw_string_kernel_parameters.txt
Step Description
Step Description
Removing the current value from a Firewall string kernel parameter temporarily
Step Description
Type Name
Integer num_of_sxl_devices
sim_ipsec_dont_fragment
tcp_always_keepalive
sim_log_all_frags
simple_debug_filter_dport_1
simple_debug_filter_proto_1
String simple_debug_filter_addr_1
simple_debug_filter_daddr_2
simlinux_excluded_ifs_list
Viewing the list of the available SecureXL integer kernel parameters and their values
Step Description
3 Get the list of the available integer kernel parameters and their values:
modinfo -p $PPKDIR/boot/modules/sim_kern*.o |
sort -u | grep _type | awk 'BEGIN {FS=":"} ;
{print $1}' | xargs -n 1 fw ctl get int 1>>
/var/log/sxl_integer_kernel_parameters.txt 2>>
/var/log/sxl_integer_kernel_parameters.txt
Viewing the list of the available SecureXL string kernel parameters and their values
Step Description
3 Get the list of the available integer kernel parameters and their values:
modinfo -p $PPKDIR/boot/modules/sim_kern*.o |
sort -u | grep 'string param' | awk 'BEGIN
{FS=":"} ; {print $1}' | xargs -n 1 fw ctl get
str 1>> /var/log/sxl_string_kernel_parameters.txt
2>> /var/log/sxl_string_kernel_parameters.txt
For more information, see sk26202: Changing the kernel global parameters for Check Point Security
Gateway.
Step Description
7 Add the required SecureXL kernel parameter with the assigned value in the exact format
specified below.
Important - This configuration file does not support space characters, tabulation
characters, and comments (lines that contain the # character).
<Name_of_SecureXL_String_Kernel_Parameter>='<String_
Text>'
or
<Name_of_SecureXL_String_Kernel_Parameter>="<String_
Text>"
Step Description
Important - In Cluster, you must configure and perform the kernel debug procedure on
all cluster members in the same way.
Note - See the "Kernel Debug Procedure" on page 461, or the "Kernel Debug
Procedure with Connection Life Cycle" on page 463.
1 Configure the applicable In this step, you prepare the kernel debug options:
debug settings:
a. Restore the default debug settings, so that any other
a. Restore the default debug settings do not interfere with the kernel debug.
settings. b. Allocate the kernel debug buffer, in which Security
b. Allocate the debug Gateway holds the applicable debug messages.
buffer.
2 Configure the applicable In this step, you prepare the applicable kernel debug modules
kernel debug modules and and their debug flags, so that Security Gateway collects only
their debug flags. applicable debug messages.
3 Start the collection of the In this step, you configure Security Gateway to write the debug
kernel debug into an output messages from the kernel debug buffer into an output file.
file.
4 Stop the kernel debug. In this step, you configure Security Gateway to stop writing the
debug messages into an output file.
5 Restore the default kernel In this step, you restore the default kernel debug options.
debug settings.
n To reset all debug flags and enable only the default debug flags in all kernel modules:
fw ctl debug 0
n To disable all debug flags including the default flags in all kernel modules:
Best Practice - Do not run this command, because it disables even the basic
default debug messages.
fw ctl debug -x
n General syntax:
Note - The list of kernel modules depends on the Software Blades you
enabled on the Security Gateway.
fw ctl debug -m
fw ctl debug
Parameters
Notes:
n These strings can be any plain text (not a regular
expression) that you see in the debug messages.
n Separate the applicable strings by commas without
spaces:
-d String1,String2,...,StringN
n You can specify up to 10 strings, up to 250
characters in total.
-s "<String to Stop When you specify this parameter, the Security Gateway:
Debug>"
1. Collects the applicable debug messages into the kernel debug
buffer based on the enabled kernel debug modules and their
debug flags.
2. Does not write any of these debug messages from the kernel
debug buffer into the output file.
3. Stops collecting all debug messages when it detects the first
debug message that contains the specified string in the kernel
debug buffer.
4. Writes the entire kernel debug buffer into the output file.
Notes:
n This one string can be any plain text (not a regular
expression) that you see in the debug messages.
n String length is up to 50 characters.
-m <Name of Debug Specifies the name of the kernel debug module, for which you print or
Module> configure the debug flags.
{all | + <List of Specifies which debug flags to enable or disable in the specified
Debug Flags> | - kernel debug module:
<List of Debug
n all
Flags>}
Enables all debug flags in the specified kernel debug module.
n + <List of Debug Flags>
Enables the specified debug flags in the specified kernel
debug module.
You must press the space bar key after the plus (+) character:
+ <Flag1> [<Flag2> ... <FlagN>]
Example: + drop conn
n - <List of Debug Flags>
Disables the specified debug flags in the specified kernel
debug module.
You must press the space bar key after the minus (-)
character:
- <Flag1> [<Flag2> ... <FlagN>]
Example: - conn
Notes:
n This parameter is supported only in VSX mode.
n This parameter and the -k parameter are mutually
exclusive.
Notes:
n These are legacy parameters ("-e" and "-i").
n When you use these parameters ("-e" and "-i"),
the Security Gateway cannot apply the specified
INSPECT filter to the accelerated traffic.
n For new debug filters, see "Kernel Debug Filters" on
page 456.
-p <List of Fields> By default, when the Security Gateway prints the debug messages,
the messages start with the applicable CPU ID and CoreXL Firewall
instance ID.
You can print additional fields in the beginning of each debug
message.
Notes:
n These fields are available:
all, proc, pid, date, mid, type, freq, topic,
time, ticks, tid, text, errno, host, vsid,
cpu.
n When you specify the applicable fields, separate
them with commas and without spaces:
Field1,Field2,...,FieldN
n The more fields you specify, the higher the load on
the CPU and on the hard disk.
-f Collects the debug data until you stop the kernel debug in one of
these ways:
n When you press the CTRL+C keys.
n When you run the "fw ctl debug 0" command.
n When you run the "fw ctl debug -x" command.
n When you kill the "fw ctl kdebug" process.
/<Path>/<Name of Specifies the path and the name of the debug output file.
Output File> Best Practice - Always use the largest partition on the disk
- /var/log/. Security Gateway can generate many
debug messages within short time. As a result, the debug
output file can grow to large size very fast.
-o /<Path>/<Name of Saves the collected debug data into cyclic debug output files.
Output File> -m When the size of the current <Name of Output File> reaches
<Number of Cyclic the specified <Size of Each Cyclic File in KB> (more or
Files> [-s <Size of less), the Security Gateway renames the current <Name of
Each Cyclic File in Output File> to <Name of Output File>.0 and creates a
KB>] new <Name of Output File>.
If the <Name of Output File>.0 already exists, the Security
Gateway renames the <Name of Output File>.0 to <Name
of Output File>.1, and so on - until the specified limit
<Number of Cyclic Files>. When the Security Gateway
reaches the <Number of Cyclic Files>, it deletes the oldest
files.
The valid values are:
n <Number of Cyclic Files> - from 1 to 999
n <Size of Each Cyclic File in KB> - from 1 to
2097150
Notes:
n A Security Gateway supports:
l up to five Connection Tuple filters in total (from all types)
n A Security Gateway applies these debug filters to both the non-accelerated and
accelerated traffic.
n A Security Gateway applies these debug filters to "Kernel Debug Procedure with
Connection Life Cycle" on page 463.
Best Practice - It is usually simpler to set the Connection Tuple and Host IP Address
filters from within the "'fw ctl debug' and 'fw ctl kdebug'" on page 279 command. To
filter the kernel debug by a VPN Peer, use the procedure below.
Notes:
1. <N> is an integer between 1 and 5. This number is an index for the configured
kernel parameters of this type.
2. When you specify IP addresses, you must enclose them in double quotes.
3. When you configure kernel parameters with the same index <N>, the debug filter
is a logical "AND" of these kernel parameters.
In this case, the final filter matches only one direction of the processed
connection.
n Example 1 - packets from the source IP address X to the destination IP
address Y:
simple_debug_filter_saddr_1 <Value X>
AND
simple_debug_filter_daddr_1 <Value Y>
n Example 2 - packets from the source IP address X to the destination port
Y:
simple_debug_filter_saddr_1 <Value X>
AND
simple_debug_filter_dport_1 <Value Y>
4. When you configure kernel parameters with the different indices <N>, the debug
filter is a logical "OR" of these kernel parameters.
This means that if it is necessary the final filter matches both directions of the
connection, then it is necessary to configure the applicable debug filters for both
directions.
n Example 1 - packets either from the source IP address X, or to the
destination IP address Y:
simple_debug_filter_saddr_1 <Value X>
OR
simple_debug_filter_daddr_2 <Value Y>
n Example 2 - packets either from the source IP address X, or to the
destination port Y:
simple_debug_filter_saddr_1 <Value X>
OR
simple_debug_filter_dport_2 <Value Y>
5. For information about the Port Numbers, see IANA Service Name and Port
Number Registry.
6. For information about the Protocol Numbers, see IANA Protocol Numbers.
Notes:
1. <N> is an integer between 1 and 3.
This number is an index for the configured kernel parameters of this type.
2. You can configure one, two, or three of these kernel parameters at the same
time.
n Example 1:
Configure one IP address (simple_debug_filter_addr_1).
n Example 2:
Configure two IP addresses (simple_debug_filter_addr_1 and
simple_debug_filter_addr_2).
This would match packets, where any of these IP addresses appears,
either as a source or a destination.
3. You must enclose the IP addresses in double quotes.
Usage Example
It is necessary to show in the kernel debug the information about the connection from Source IP address
192.168.20.30 from any Source Port to Destination IP address 172.16.40.50 to Destination Port 80
(192.168.20.30:<Any> --> 172.16.40.50:80).
Run these commands before you start the kernel debug:
Important - In the above example, two Connection Tuple filters are used ("..._1" and
"..._2") - one for each direction, because we want the debug filter to match both
directions of this connection.
Important:
n Kernel debug increases the load on the Security Gateway CPU. Schedule a
maintenance window.
n In Cluster, you must perform these steps on all the Cluster Members in the same
way.
Step Description
6 Allocate the kernel debug buffer for every CoreXL Firewall instance:
fw ctl debug -buf 8200
9 Examine the list of the debug flags that are enabled in the specified kernel modules:
fw ctl debug -m <module>
Step Description
Important - You must use this tool in the Expert mode together with the regular kernel
debug flags (see "Kernel Debug Modules and Debug Flags" on page 470).
Syntax
n To start the debug capture:
n To stop the debug capture and prepare the formatted debug output:
Parameters
Table: Parameters of the 'conn_life_cycle.sh' script
Parameter Description
-a start Mandatory.
-a stop Specifies the action:
n start - Starts the debug capture based on the debug
flags you enabled and debug filters you specified.
n stop - Stops the debug capture, resets the kernel
debug options, resets the kernel debug filters.
-t | -T Optional.
Specifies the resolution of a time stamp in front of each debug
message:
n -t - Prints the time stamp in milliseconds.
n -T - Prints the time stamp in microseconds.
-f "<Filter>" Optional.
Specifies which connections and packets to capture.
For additional information, see "Kernel Debug Filters" on
page 456.
Important - If you do not specify filters, then the tool
prints debug messages for all traffic. This causes
high load on the CPU and increases the time to
format the debug output file.
Each filter must contain these five numbers (5-tuple) separated
with commas:
"<Source IP Address>,<Source
Port>,<Destination IP
Address>,<Destination Port>,<Protocol
Number>"
Example of capturing traffic from IP 192.168.20.30 from any
port to IP 172.16.40.50 to port 22 over the TCP protocol:
-f "192.168.20.30,0,172.16.40.50,22,6"
Notes:
n The tool supports up to five of such filters.
n The tool treats the value 0 (zero) as "any".
n If you specify two or more filters, the tool
performs a logical "OR" of all the filters on each
packet.
If the packet matches at least one filter, the
tool prints the debug messages for this packet.
n "<Source IP Address>" and
"<Destination IP Address>" - IPv4 or
IPv6 address
n "<Source Port>" and "<Destination
Port>" - integers from 1 to 65535 (see IANA
Service Name and Port Number Registry)
n <Protocol Number> - integer from 0 to
254 (see IANA Protocol Numbers)
-o /<Path>/<Name of Mandatory.
Formatted Debug Output Specifies the absolute path and the name of the formatted
File> debug output file (to analyze by an administrator).
Example:
-o /var/log/kernel_debug_formatted.txt
Procedure
Important - In cluster, you must perform these steps on all the Cluster Members in the
same way.
Step Description
4 Examine the list of the debug flags that are enabled in the specified kernel modules:
fw ctl debug -m <module>
7 Stop the debug capture and prepare the formatted debug output:
conn_life_cycle.sh -a stop -o /var/log/kernel_debug_
formatted.txt
8 Transfer the formatted debug output file from your Security Gateway to your desktop or laptop
computer:
/var/log/kernel_debug_formatted.txt
9 Examine the formatted debug output file in an advanced text editor like Notepad++ (click
Language > R > Ruby ), or any other Ruby language viewer.
Example
Collecting the kernel debug for TCP connection from IP 172.20.168.15 (any port) to IP
192.168.3.53 and port 22
[Expert@GW:0]# fw ctl debug -m fw + conn drop
Updated kernel's debug variable for module fw
Debug flags updated.
[Expert@GW:0]#
[Expert@GW:0]# fw ctl debug -m fw
Kernel debugging buffer size: 50KB
HOST:
Module: fw
Enabled Kernel debugging options: error warning conn drop
Messaging threshold set to type=Info freq=Common
[Expert@GW:0]#
[Expert@GW:0]# conn_life_cycle.sh -a start -o /var/log/kernel_debug.txt -T -f
"172.20.168.15,0,192.168.3.53,22,6"
Set operation succeeded
Set operation succeeded
Set operation succeeded
Set operation succeeded
Set operation succeeded
Set operation succeeded
Set operation succeeded
Initialized kernel debugging buffer to size 8192K
Set operation succeeded
Capturing started...
[Expert@GW:0]#
... ... Replicate the issue, or wait for the issue to occur ... ...
[Expert@GW:0]#
[Expert@GW:0]# conn_life_cycle.sh -a stop -o /var/log/kernel_debug_formatted.txt
Set operation succeeded
Defaulting all kernel debugging options
Debug state was reset to default.
Set operation succeeded
doing unification...
Openning host debug file /tmp/tmp.KiWmF18217... OK
New unified debug file: /tmp/tmp.imzMZ18220... OK
prepare unification
performing unification
Done :-)
doing grouping...
wrapping connections and packets...
Some of packets lack description, probably because they were already handled when the feature was
enabled.
[Expert@GW:0]#
[Expert@GW:0]# fw ctl debug -m fw
Kernel debugging buffer size: 50KB
HOST:
Module: fw
Enabled Kernel debugging options: error warning
Messaging threshold set to type=Info freq=Common
[Expert@GW:0]
[Expert@GW:0] ls -l /var/log/kernel_debug.*
-rw-rw---- 1 admin root 40960 Nov 26 13:02 /var/log/kernel_debug.txt
-rw-rw---- 1 admin root 24406 Nov 26 13:02 /var/log/kernel_debug_formatted.txt
[Expert@GW:0]
Everything is collapsed:
Opened the second hierarchy level to see the packets of this connection:
fw ctl debug -m
Flag Description
cmi_lite Messages from the lite Context Management Interface / Infrastructure module
Flag Description
Flag Description
module Operations in the Application Control module (initialization, module loading, calls to
the module, policy loading, and so on)
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
stat Statistics
Flag Description
av Anti-Virus inspection
module Operations in the Content Inspection module (initialization, module loading, calls to the
module, policy loading, and so on)
profile Basic information about the Content Inspection module (initialization, destroying,
freeing)
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
track Use only for very limited important debug prints, so it can be used in a loaded
environment -
Content-Disposition, Content-Type, extension validation, extension matching
Flag Description
Streaming)" on page 481
n To print the contents of the packets in HEX format in the debug output (as "FW-
1: fwha_print_packet: Buffer ..."), before you start the kernel
debug, set this kernel parameter on each Cluster Member:
fw ctl set int fwha_dprint_io 1
n To print all network checks in the debug output, before you start the kernel
debug, set this kernel parameter on each Cluster Member:
fw ctl set int fwha_dprint_all_net_check 1
Flag Description
drop Connections dropped by the cluster Decision Function (DF) module (does not include
CCP packets)
forward Forwarding Layer messages (when Cluster Members send and receive a forwarded
packet)
if Interface tracking and validation (all the operations and checks on interfaces)
Flag Description
Note - Also enable the debug flag "log" in "Module 'fw' (Firewall)" on
page 495.
Note - Also enable the debug flags "conf" and "if" in this debug module
mmagic Operations on "MAC magic" (getting, setting, updating, initializing, dropping, and so
on)
subs Subscriber module (set of APIs, which enable user space processes to be aware of
the current state of the ClusterXL state machine and other clustering configuration
parameters)
trap Sending trap messages from the cluster kernel to the RouteD daemon about Master
change
Flag Description
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
Note - Also see the debug flag "sync" in "Module 'fw' (Firewall)"
on page 495.
Flag Description
Syntax:
Important - Also enable the debug flag "cpsshi" in "Module 'fw' (Firewall)" on page 495.
Flag Description
Flag Description
Flag Description
Flag Description
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
Flag Description
Flag Description
module Initiation / removal of the Data Loss Prevention User Space modules' infrastructure
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
module Operations in the Domain Objects module (initialization, module loading, calls to the
module, policy loading, and so on)
Flag Description
chain Tracing each packet through FloodGate-1 stages in the cookie chain
chainq Internal Chain Queue mechanism - holding and releasing of packets during critical
actions (policy installation and uninstall)
dropsv Dropped packets due to WFRED policy - with additional debug information (verbose)
rates Rule and connection rates (IQ Engine behavior and status)
Flag Description
Flag Description
Flag Description
module Operations in the FILEAPP module (initialization, module loading, calls to the module,
and so on)
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
acct Accounting data in logs for Application Control (also enable the debug of "Module
'APPI' (Application Control Inspection)" on page 474)
advp Advanced Patterns (signatures over port ranges) - runs under ASPII and CMI
caf Mirror and Decrypt feature - only mirror operations on all traffic
connstats Connections statistics for Evaluation of Heavy Connections in CPView (see sk105762)
context Operations on Memory context and CPU context in "Module 'kiss' (Kernel
Infrastructure)" on page 506
cookie Virtual de-fragmentation , cookie issues (cookies in the data structure that holds the
packets)
Flag Description
Important - Also enable all the debug flags in "Module 'CPSSH' (SSH
Inspection)" on page 483.
cptls CRYPTO-PRO Transport Layer Security (HTTPS Inspection) - Russian VPN GOST
crypt Encryption and decryption of packets (algorithms and keys are printed in clear text
and cipher text)
dfilter Operations in the debug filters (see "Kernel Debug Filters" on page 456)
driver Check Point kernel attachment (access to kernel is shown as log entries)
filter Packet filtering performed by the Check Point kernel and all data loaded into kernel
ftp Processing of FTP Data connections (used to call applications over FTP Data - i.e.,
Anti-Virus)
Flag Description
highavail Cluster configuration - changes in the configuration and information about interfaces
during
traffic processing
install Driver installation - NIC attachment (actions performed by the "fw ctl install"
and "fw ctl uninstall" commands)
ioctl IOCTL control messages (communication between kernel and daemons, loading and
unloading of the FireWall)
kbuf Kernel-buffer memory pool (for example, encryption keys use these memory
allocations)
Warning - Security Gateway can freeze or hang due to very high CPU load!.
Warning - Security Gateway can freeze or hang due to very high CPU load!.
Flag Description
misc Miscellaneous helpful information (not shown with other debug flags)
monitor Prints output similar to the "fw monitor" command (see "fw monitor" on page 322)
monitorall Prints output similar to the "fw monitor -p all" command (see "fw monitor" on
page 322)
mrtsync Synchronization between cluster members of Multicast Routes that are added when
working with Dynamic Routing Multicast protocols
multik CoreXL-related
Note - This debug flag enables all the debug flags in the "Module 'multik'
(Multi-Kernel Inspection - CoreXL)" on page 511, except for the debug flag
"packet".
nat_sync NAT issues - NAT port allocation operations in Check Point cluster
nat64 NAT issues - 6in4 tunnels (IPv6 over IPv4) and 4in6 tunnels (IPv4 over IPv6)
Flag Description
rad Resource Advisor policy (for Application Control, URL Filtering, and others)
Flag Description
Note - Also see the debug flag "sync" in "Module 'CPAS' (Check Point
Active Streaming)" on page 481.
te Prints the name of an interface for incoming connection from Threat Emulation
Machine
user User Space communication with Kernel Space (most useful for configuration and VSX
debug)
Flag Description
Flag Description
Important - This debug flag is not included when you use the syntax "fw ctl
debug -m h323 all"
h225 H225 call signaling messages (SETUP, CONNECT, RELEASE COMPLETE, and so on)
h245 H245 control signaling messages (OPEN LOGICAL CHANNEL, END SESSION
COMMAND, and so on)
Flag Description
daf_cmi Mirror and Decrypt of HTTPS traffic - operations related to the Context Management
Interface / Infrastructure Loader
daf_ Mirror and Decrypt of HTTPS traffic - operations related to the ICAP Client module
module
daf_ Mirror and Decrypt of HTTPS traffic - operations related to policy installation
policy
daf_tcp Mirror and Decrypt of HTTPS traffic - internal processing of TCP connections
module Operations in the ICAP Client module (initialization, module loading, calls to the module,
and so on)
Flag Description
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
data Portal, IP address matching for Terminal Servers Identity Agent, session handling
module Removal of the Identity Awareness API debug module's infrastructure, failure to
convert to Base64, failure to append Source to Destination, and so on
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
cookie Virtual de-fragmentation , cookie issues (cookies in the data structure that holds the
packets)
ioctl IOCTL control messages (communication between the kernel and daemons)
Flag Description
memprof Memory allocation operations in the Memory Profiler (when the kernel parameter fw_
conn_mem_prof_enabled=1)
rem Regular Expression Matcher - Pattern Matcher 2nd tier (slow path)
thread Kernel thread that supplies low level APIs to the kernel thread
Flag Description
Flag Description
Flag Description
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Note - When you enable the debug flag 'multik' in the "Module 'fw' (Firewall)" on
page 495, it enables all the debug flags in this debug module, except for the debug flag
'packet'.
Flag Description
lock Obtaining and releasing the fw_lock on multiple CoreXL Firewall instances
message Cross-instance messages (used for local sync and port scanning)
packet For each packet, shows the CoreXL SND dispatching decision (CoreXL Firewall instance
and reason)
packet_ Invalid packets, for CoreXL SND could not make a dispatching decision
err
state Starting and stopping of CoreXL Firewall instances, establishment of relationship between
CoreXL Firewall instances
Flag Description
Syntax:
Flag Description
misc Miscellaneous helpful information (not shown with other debug flags)
tol Test Object List algorithm (to determine whether an application is malicious or not)
Flag Description
ws Web Intelligence
Flag Description
module Operations in the NRB module (initialization, module loading, calls to the module,
contexts, and so on)
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
Note - Also see "Module 'MUX' (Multiplexer for Applications Traffic)" on page 513.
Flag Description
Flag Description
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
accel Prints SecureXL information about the accelerated packets, connections, and so on
chain Prints information about chain registration and about the E2E (Virtual Link) chain
function actions
Note - This important debug flag helps you know, whether the E2E
identifies the Virtual Link packets
con_conn Prints messages for each connection (when a new connection is handled by the
RTM module)
The same debug flags as 'per_conn'
driver Check Point kernel attachment (access to kernel is shown as log entries)
import Importing of the data from other kernel modules (FireWall, QoS)
netmasks Information about how the RTM handles netmasks, if you are monitoring an object of
type Network
per_conn Prints messages for each connection (when a new connection is handled by the
RTM module)
The same debug flags as 'con_conn'
per_pckt Prints messages for each packet (when a new packet arrives)
Warning - Prints many messages, which increases the load on the CPU
policy Prints messages about loading and unloading on the FireWall module (indicates that
the RTM module received the FireWall callback)
Flag Description
special Information about how the E2E modifies the E2ECP protocol packets
wd WebDefense views
Flag Description
Flag Description
Flag Description
Syntax:
Flag Description
Flag Description
module Operations in the UserCheck module (initialization, UserCheck table hits, finding User
ID in cache, removal of UserCheck debug module's infrastructure)
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
module Operations in the Unified Policy module (initialization, module loading, calls to the
module, and so on)
Flag Description
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
Flag Description
module Operations in the Unified Policy Infrastructure module (initialization, module loading,
calls to the module, and so on)
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
topo Information about topology and Anti-Spoofing of interfaces; about Address Range
objects
Flag Description
driver Check Point kernel attachment (access to kernel is shown as log entries)
err Errors that should not happen, or errors that critical to the working of the VPN module
ifnotify Notifications about the changes in interface status - up or down (as received from OS)
ike Enables all IKE kernel debug in respect to moving the IKE to the interface, where it will
eventually leave and the modification of the source IP of the IKE packet, depending on
the configuration
init Initializes the VPN kernel and kernel data structures, when kernel is up, or when policy
is installed (it will also print the values of the flags that are set using the CPSET upon
policy reload)
nat NAT issues , cluster IP manipulation (Cluster Virtual IP address <=> Member IP
address)
Flag Description
packet Events that can happen for every packet, unless covered by more specific debug flags
policy Events that can happen only for a special packet in a connection, usually related to
policy decisions or logs / traps
ref Reference counting for MSA / MSPI, when storing or deleting Security Associations
(SAs)
resolver VPN Link Selection table and Certificate Revocation List (CRL), which is also part of the
peer resolving mechanism
tagging Sets the VPN policy of a connection according to VPN communities, VPN Policy related
information
tcpt Information related to TCP Tunnel (Visitor mode - FireWall traversal on TCP port 443)
Flag Description
event Events
Flag Description
ioctl IOCTL control messages (communication between the kernel and daemons, loading
and unloading of the FireWall)
module Operations in the Web Intelligence module (initialization, module loading, calls to the
module, policy loading, and so on)
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
event Events
ioctl IOCTL control messages (communication between the kernel and daemons, loading
and unloading of the FireWall)
module Operations in the Web Intelligence VoIP SIP Parser module (initialization, module
loading, calls to the module, policy loading, and so on)
Flag Description
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
Flag Description
decoder Decoder for the content transfer encoding (UUEncode, UTF-8, HTML encoding &#)
timestamp Prints the timestamp for each debug message (changes when you enable the debug
flag 'coverage')
#!/bin/bash
source /etc/profile.d/CP.sh
<Check Point commands>
[mandatory last new line]