CP R80.40 CLI ReferenceGuide
CP R80.40 CLI ReferenceGuide
CLI
R80.40
Reference Guide
[Classification: Protected]
Check Point Copyright Notice
© 2020 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed
under licensing restricting their use, copying, distribution, and decompilation. No part of this product or
related documentation may be reproduced in any form or by any means without prior written authorization
of Check Point. While every precaution has been taken in the preparation of this book, Check Point
assumes no responsibility for errors or omissions. This publication and features described herein are
subject to change without notice.
TRADEMARKS:
Refer to the Copyright page for a list of our trademarks.
Refer to the Third Party copyright notices for a list of relevant copyrights and third-party licenses.
CLI R80.40 Reference Guide
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date with the
latest functional improvements, stability fixes, security enhancements and protection
against new and evolving attacks.
Certifications
For third party independent certification of Check Point products, see the Check Point
Certifications page.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments.
Revision History
Date Description
Table of Contents
Glossary 30
Introduction 66
Syntax Legend 67
Gaia Commands 70
Security Management Server Commands 71
Managing Security through API 72
API 72
API Tools 72
Configuring the API Server 72
contract_util 74
contract_util check 76
contract_util cpmacro 77
contract_util download 78
contract_util mgmt 80
contract_util print 81
contract_util summary 82
contract_util update 83
contract_util verify 84
cp_conf 85
cp_conf admin 88
cp_conf auto 91
cp_conf ca 93
cp_conf client 95
cp_conf finger 99
cp_conf lic 101
cp_log_export 103
cpca_client 108
cpca_client create_cert 110
cpca_client double_sign 112
cpca_client get_crldp 114
cprinstall 176
cprinstall boot 179
cprinstall cprestart 180
cprinstall cpstart 181
cprinstall cpstop 182
cprinstall delete 183
cprinstall get 184
cprinstall install 185
cprinstall revert 188
cprinstall show 189
cprinstall snapshot 190
cprinstall transfer 191
cprinstall uninstall 192
cprinstall verify 194
cpstart 196
cpstat 197
cpstop 205
cpview 206
Overview of CPView 206
CPView User Interface 206
Using CPView 207
cpwd_admin 208
cpwd_admin config 211
cpwd_admin del 214
cpwd_admin detach 215
cpwd_admin exist 216
cpwd_admin flist 217
cpwd_admin getpid 219
cpwd_admin kill 220
cpwd_admin list 221
cpwd_admin monitor_list 225
cpwd_admin start 226
cpwd_admin start_monitor 228
cp_conf ca 406
cp_conf client 408
cp_conf finger 412
cp_conf lic 414
cp_log_export 416
cpca_client 421
cpca_client create_cert 423
cpca_client double_sign 425
cpca_client get_crldp 427
cpca_client get_pubkey 428
cpca_client init_certs 429
cpca_client lscert 430
cpca_client revoke_cert 433
cpca_client revoke_non_exist_cert 436
cpca_client search 437
cpca_client set_mgmt_tool 440
cpca_client set_sign_hash 443
cpca_create 445
cpinfo 446
cplic 447
cplic check 450
cplic contract 452
cplic db_add 454
cplic db_print 456
cplic db_rm 458
cplic del 459
cplic del <object name> 460
cplic get 461
cplic print 463
cplic put 465
cplic put <object name> 467
cplic upgrade 470
cpmiquerybin 472
cppkg 474
cppkg add 476
ppkg delete 477
cppkg get 479
cppkg getroot 480
cppkg print 481
cppkg setroot 482
cpprod_util 483
cprid 487
cprinstall 488
cprinstall boot 491
cprinstall cprestart 492
cprinstall cpstart 493
cprinstall cpstop 494
cprinstall delete 495
cprinstall get 496
cprinstall install 497
cprinstall revert 500
cprinstall show 501
cprinstall snapshot 502
cprinstall transfer 503
cprinstall uninstall 504
cprinstall verify 506
cpstat 508
cpview 516
Overview of CPView 516
CPView User Interface 516
Using CPView 517
cpwd_admin 518
cpwd_admin config 521
cpwd_admin del 524
cpwd_admin detach 525
cpwd_admin exist 526
stattest 713
threshold_config 716
$MDSVERUTIL 722
$MDSVERUTIL AllCMAs 732
$MDSVERUTIL AllVersions 733
$MDSVERUTIL CMAAddonDir 736
$MDSVERUTIL CMACompDir 737
$MDSVERUTIL CMAFgDir 738
$MDSVERUTIL CMAFw40Dir 739
$MDSVERUTIL CMAFw41Dir 740
$MDSVERUTIL CMAFwConfDir 741
$MDSVERUTIL CMAFwDir 742
$MDSVERUTIL CMAIp 743
$MDSVERUTIL CMAIp6 744
$MDSVERUTIL CMALogExporterDir 745
$MDSVERUTIL CMALogIndexerDir 746
$MDSVERUTIL CMANameByFwDir 747
$MDSVERUTIL CMANameByIp 748
$MDSVERUTIL CMARegistryDir 749
$MDSVERUTIL CMAReporterDir 750
$MDSVERUTIL CMASmartLogDir 751
$MDSVERUTIL CMASvnConfDir 752
$MDSVERUTIL CMASvnDir 753
$MDSVERUTIL ConfDirVersion 754
$MDSVERUTIL CpdbUpParam 755
$MDSVERUTIL CPprofileDir 756
$MDSVERUTIL CPVer 757
$MDSVERUTIL CustomersBaseDir 758
$MDSVERUTIL DiskSpaceFactor 759
$MDSVERUTIL InstallationLogDir 760
$MDSVERUTIL IsIPv6Enabled 761
$MDSVERUTIL IsLegalVersion 762
$MDSVERUTIL IsOsSupportsIPv6 763
fw mergefiles 1023
fw monitor 1026
fw repairlog 1056
fw sam 1057
fw sam_policy 1065
fw sam_policy add 1068
fw sam_policy batch 1081
fw sam_policy del 1083
fw sam_policy get 1086
fw showuptables 1090
fw stat 1091
fw tab 1093
fw unloadlocal 1100
fw up_execute 1104
fw ver 1107
fwboot 1109
fwboot bootconf 1111
fwboot corexl 1116
fwboot cpuid 1123
fwboot default 1125
fwboot fwboot_ipv6 1126
fwboot fwdefault 1127
fwboot ha_conf 1128
fwboot ht 1129
fwboot multik_reg 1132
fwboot post_drv 1134
sam_alert 1135
stattest 1139
usrchk 1142
ClusterXL Commands 1147
ClusterXL Configuration Commands 1148
Configuring the Cluster Member ID Mode in Local Logs 1152
Registering a Critical Device 1153
fw hastat 1226
fwboot ha_conf 1227
The clusterXL_admin Script 1228
The clusterXL_monitor_ips Script 1232
The clusterXL_monitor_process Script 1236
SecureXL Commands 1240
'fwaccel' and 'fwaccel6' 1241
fwaccel cfg 1244
fwaccel conns 1247
fwaccel dbg 1251
fwaccel dos 1257
fwaccel dos blacklist 1259
fwaccel dos config 1261
fwaccel dos pbox 1267
fwaccel dos rate 1272
fwaccel dos stats 1274
fwaccel dos whitelist 1276
fwaccel feature 1281
fwaccel off 1284
fwaccel on 1288
fwaccel ranges 1292
fwaccel stat 1298
fwaccel stats 1304
Description of the Statistics Counters in the "fwaccel stats" Output 1306
Example Outputs on the "fwaccel stats" Commands 1312
fwaccel synatk 1327
fwaccel synatk -a 1330
fwaccel synatk -c <Configuration File> 1331
fwaccel synatk -d 1332
fwaccel synatk -e 1333
fwaccel synatk -g 1334
fwaccel synatk -m 1335
fwaccel synatk -t <Threshold> 1336
/proc/ppk/stats 1419
/proc/ppk/viol_statistics 1420
SecureXL Debug 1421
fwaccel dbg 1422
SecureXL Debug Procedure 1428
SecureXL Debug Modules and Debug Flags 1432
CoreXL Commands 1440
cp_conf corexl 1441
dynamic_split 1443
fw ctl multik 1445
fw ctl multik add_bypass_port 1448
fw ctl multik del_bypass_port 1450
fw ctl multik dynamic_dispatching 1452
fw ctl multik gconn 1453
fw ctl multik get_instance 1458
fw ctl multik print_heavy_conn 1460
fw ctl multik prioq 1462
fw ctl multik show_bypass_ports 1463
fw ctl multik stat 1464
fw ctl multik start 1466
fw ctl multik stop 1467
fw ctl multik utilize 1468
fw ctl affinity 1469
Running the 'fw ctl affinity -l' command in Gateway Mode 1470
Running the 'fw ctl affinity -l' command in VSX Mode 1474
Running the 'fw ctl affinity -s' command in Gateway Mode 1477
Running the 'fw ctl affinity -s' command in VSX Mode 1481
fw -i 1485
fwboot bootconf 1486
fwboot corexl 1491
fwboot cpuid 1498
fwboot ht 1500
fwboot multik_reg 1503
vsenv 1662
vsx 1663
vsx fetch 1665
vsx fetch_all_cluster_policies 1667
vsx fetchvs 1668
vsx get 1669
vsx initmsg 1670
vsx mstat 1671
vsx resctrl 1675
vsx showncs 1678
vsx sicreset 1679
vsx stat 1680
vsx unloadall 1682
vsx vspurge 1683
vsx_util 1684
vsx_util add_member 1687
vsx_util change_interfaces 1689
vsx_util change_mgmt_ip 1692
vsx_util change_mgmt_subnet 1693
vsx_util change_private_net 1694
vsx_util convert_cluster 1695
vsx_util reconfigure 1696
vsx_util remove_member 1701
vsx_util show_interfaces 1702
vsx_util upgrade 1704
vsx_util view_vs_conf 1705
vsx_util vsls 1708
vsx_provisioning_tool 1709
Transactions 1712
vsx_provisioning_tool Commands 1713
Explicit Transaction Commands 1714
Adding a VSX Gateway 1715
Adding a VSX Cluster 1717
Glossary
3
Accelerated Path
Packet flow on the Host appliance, when the packet is completely handled by the
SecureXL device. It is processed and forwarded to the network.
Access Role
Access Role objects let you configure network access according to: Networks, Users
and user groups, Computers and computer groups, Remote Access Clients. After you
activate the Identity Awareness Software Blade, you can create Access Role objects
and use them in the Source and Destination columns of Access Control Policy rules.
Active
State of a Cluster Member that is fully operational: (1) In ClusterXL, this applies to the
state of the Security Gateway component (2) In 3rd party / OPSEC cluster, this applies
to the state of the cluster State Synchronization mechanism.
Active-Active
A cluster mode, where cluster members are located in different geographical areas
(different sites, different availability zones). Administrator configures Dynamic Routing
on each cluster member, so it becomes a router in the applicable area or autonomous
system on the site. The IP addresses of the interfaces on each cluster member are on
different networks (including the Sync interfaces). Each cluster member inspects all
traffic routed to it and synchronizes the recorded connections to its peer cluster
members. The traffic is not balanced between the cluster members.
Active Directory
Microsoft® directory information service. Stores data about user, computer, and service
identities for authentication and access. Acronym: AD.
Active Up
ClusterXL in High Availability mode that was configured as Maintain current active
Cluster Member in the cluster object in SmartConsole: (1) If the current Active member
fails for some reason, or is rebooted (for example, Member_A), then failover occurs
between Cluster Members - another Standby member will be promoted to be Active (for
example, Member_B). (2) When former Active member (Member_A) recovers from a
failure, or boots, the former Standby member (Member_B) will remain to be in Active
state (and Member_A will assume the Standby state).
Active(!)
In ClusterXL, state of the Active Cluster Member that suffers from a failure. A problem
was detected, but the Cluster Member still forwards packets, because it is the only
member in the cluster, or because there are no other Active members in the cluster. In
any other situation, the state of the member is Down. Possible states: ACTIVE(!),
ACTIVE(!F) - Cluster Member is in the freeze state, ACTIVE(!P) - This is the Pivot
Cluster Member in Load Sharing Unicast mode, ACTIVE(!FP) - This is the Pivot Cluster
Member in Load Sharing Unicast mode and it is in the freeze state.
Active/Active
See "Load Sharing".
Active/Standby
See "High Availability".
AD Query
Check Point clientless identity acquisition tool. It is based on Active Directory
integration and it is completely transparent to the user. The technology is based on
querying the Active Directory Security Event Logs and extracting the user and computer
mapping to the network address from them. It is based on Windows Management
Instrumentation (WMI), a standard Microsoft protocol. The Check Point Security
Gateway communicates directly with the Active Directory domain controllers and does
not require a separate server. No installation is necessary on the clients, or on the
Active Directory server.
Administrator
A user with permissions to manage Check Point security products and the network
environment.
Affinity
The assignment of a specified CoreXL Firewall instance, VSX Virtual System, interface,
user space process, or IRQ to one or more specified CPU cores.
Anti-Bot
Check Point Software Blade that inspects network traffic for malicious bot software.
Anti-Virus
Check Point Software Blade that protects networks against self-propagating programs
or processes that can cause damage.
API
In computer programming, an application programming interface (API) is a set of
subroutine definitions, protocols, and tools for building application software. In general
terms, it is a set of clearly defined methods of communication between various software
components.
Appliance
A physical computer manufactured and distributed by Check Point.
ARP Forwarding
Forwarding of ARP Request and ARP Reply packets between Cluster Members by
encapsulating them in Cluster Control Protocol (CCP) packets. Introduced in R80.10
version. For details, see sk111956.
Ask
UserCheck rule action that blocks traffic and files and shows a UserCheck message.
The user can agree to allow the activity.
Audit Log
A record of an action that is done by an Administrator.
Backup
(1) In VRRP Cluster on Gaia OS - State of a Cluster Member that is ready to be
promoted to Master state (if Master member fails). (2) In VSX Cluster configured in
Virtual System Load Sharing mode with three or more Cluster Members - State of a
Virtual System on a third (and so on) VSX Cluster Member. (3) A Cluster Member or
Virtual System in this state does not process any traffic passing through cluster.
Blocking Mode
Cluster operation mode, in which Cluster Member does not forward any traffic (for
example, caused by a failure).
Bond
A virtual interface that contains (enslaves) two or more physical interfaces for
redundancy and load sharing. The physical interfaces share one IP address and one
MAC address. See "Link Aggregation".
Bonding
See "Link Aggregation".
Bot
Malicious software that neutralizes Anti-Virus defenses, connects to a Command and
Control center for instructions from cyber criminals, and carries out the instructions.
Bridge Mode
A Security Gateway or Virtual System that works as a Layer 2 bridge device for easy
deployment in an existing topology.
Browser-Based Authentication
Authentication of users in Check Point Identity Awareness web portal - Captive Portal,
to which users connect with their web browser to log in and authenticate.
Burstiness
Data that is transferred or transmitted in short, uneven spurts. LAN traffic is typically
bursty. Opposite of streaming data.
CA
Certificate Authority. Issues certificates to gateways, users, or computers, to identify
itself to connecting entities with Distinguished Name, public key, and sometimes IP
address. After certificate validation, entities can send encrypted data using the public
keys in the certificates.
Captive Portal
A Check Point Identity Awareness web portal, to which users connect with their web
browser to log in and authenticate, when using Browser-Based Authentication.
CCP
See "Cluster Control Protocol".
Certificate
An electronic document that uses a digital signature to bind a cryptographic public key
to a specific identity. The identity can be an individual, organization, or software entity.
The certificate is used to authenticate one identity to another.
Cisco ISE
Cisco Identity Services Engine is a network administration product that enables the
creation and enforcement of security and access policies for endpoint devices
connected to the company's routers and switches. The purpose is to simplify identity
management across diverse devices and applications.
Cluster
Two or more Security Gateways that work together in a redundant configuration - High
Availability, or Load Sharing.
Cluster Interface
An interface on a Cluster Member, whose Network Type was set as Cluster in
SmartConsole in cluster object. This interface is monitored by cluster, and failure on this
interface will cause cluster failover.
Cluster Member
A Security Gateway that is part of a cluster.
Cluster Mode
Configuration of Cluster Members to work in these redundant modes: (1) One Cluster
Member processes all the traffic - High Availability or VRRP mode (2) All traffic is
processed in parallel by all Cluster Members - Load Sharing.
Cluster Topology
Set of interfaces on all members of a cluster and their settings (Network Objective, IP
address/Net Mask, Topology, Anti-Spoofing, and so on).
ClusterXL
Cluster of Check Point Security Gateways that work together in a redundant
configuration. The ClusterXL both handles the traffic and performs State
Synchronization. These Check Point Security Gateways are installed on Gaia OS: (1)
ClusterXL supports up to 5 Cluster Members, (2) VRRP Cluster supports up to 2 Cluster
Members, (3) VSX VSLS cluster supports up to 13 Cluster Members. Note: In ClusterXL
Load Sharing mode, configuring more than 4 Cluster Members significantly decreases
the cluster performance due to amount of Delta Sync traffic.
Cooperative Enforcement
Integration of Endpoint Security server compliance to verify internal network
connections.
CoreXL
A performance-enhancing technology for Security Gateways on multi-core processing
platforms. Multiple Check Point Firewall instances are running in parallel on multiple
CPU cores.
CoreXL SND
Secure Network Distributer. Part of CoreXL that is responsible for: Processing incoming
traffic from the network interfaces; Securely accelerating authorized packets (if
SecureXL is enabled); Distributing non-accelerated packets between Firewall kernel
instances (SND maintains global dispatching table, which maps connections that were
assigned to CoreXL Firewall instances). Traffic distribution between CoreXL Firewall
instances is statically based on Source IP addresses, Destination IP addresses, and the
IP 'Protocol' type. The CoreXL SND does not really "touch" packets. The decision to
stick to a particular FWK daemon is done at the first packet of connection on a very high
level, before anything else. Depending on the SecureXL settings, and in most of the
cases, the SecureXL can be offloading decryption calculations. However, in some other
cases, such as with Route-Based VPN, it is done by FWK daemon.
Correlation Unit
A SmartEvent software component that analyzes logs and detects events.
CPHA
General term in Check Point Cluster that stands for Check Point High Availability
(historic fact: the first release of ClusterXL supported only High Availability) that is used
only for internal references (for example, inside kernel debug) to designate ClusterXL
infrastructure.
CPUSE
Check Point Upgrade Service Engine for Gaia Operating System. With CPUSE, you
can automatically update Check Point products for the Gaia OS, and the Gaia OS itself.
For details, see sk92449.
Critical Device
Also known as a Problem Notification, or pnote. A special software device on each
Cluster Member, through which the critical aspects for cluster operation are monitored.
When the critical monitored component on a Cluster Member fails to report its state on
time, or when its state is reported as problematic, the state of that member is
immediately changed to Down. The complete list of the configured critical devices
(pnotes) is printed by the 'cphaprob -ia list' command or 'show cluster members pnotes
all' command.
Custom Report
A user defined report for a Check Point product, typically based on a predefined report.
DAIP Gateway
A Dynamically Assigned IP (DAIP) Security Gateway is a Security Gateway where the
IP address of the external interface is assigned dynamically by the ISP.
Data Type
A classification of data. The Firewall classifies incoming and outgoing traffic according
to Data Types, and enforces the Policy accordingly.
Database
The Check Point database includes all objects, including network objects, users,
services, servers, and protection profiles.
Dead
State reported by a Cluster Member when it goes out of the cluster (due to 'cphastop'
command (which is a part of 'cpstop'), or reboot).
Decision Function
A special cluster algorithm applied by each Cluster Member on the incoming traffic in
order to decide, which Cluster Member should process the received packet. Each
Cluster Members maintains a table of hash values generated based on connections
tuple (source and destination IP addresses/Ports, and Protocol number).
Delta Sync
Synchronization of kernel tables between all working Cluster Members - exchange of
CCP packets that carry pieces of information about different connections and operations
that should be performed on these connections in relevant kernel tables. This Delta
Sync process is performed directly by Check Point kernel. While performing Full Sync,
the Delta Sync updates are not processed and saved in kernel memory. After Full Sync
is complete, the Delta Sync packets stored during the Full Sync phase are applied by
order of arrival.
Detect
UserCheck rule action that allows traffic and files to enter the internal network and logs
them.
Distributed Deployment
The Check Point Security Gateway and Security Management Server products are
deployed on different computers.
Domain
A network or a collection of networks related to an entity, such as a company, business
unit or geographical location.
Down
State of a Cluster Member during a failure when one of the Critical Devices reports its
state as "problem": In ClusterXL, applies to the state of the Security Gateway
component; in 3rd party / OPSEC cluster, applies to the state of the State
Synchronization mechanism. A Cluster Member in this state does not process any traffic
passing through cluster.
Dying
State of a Cluster Member as assumed by peer members, if it did not report its state for
0.7 second.
Event
A record of a security or network incident that is based on one or more logs, and on a
customizable set of rules that are defined in the Event Policy.
Event Correlation
A procedure that extracts, aggregates, correlates and analyzes events from the logs.
Event Policy
A set of rules that define the behavior of SmartEvent.
Expert Mode
The name of the full command line shell that gives full system root permissions in the
Check Point Gaia operating system.
External Network
Computers and networks that are outside of the protected network.
External Users
Users defined on external servers. External users are not defined in the Security
Management Server database or on an LDAP server. External user profiles tell the
system how to identify and authenticate externally defined users.
F2F
Denotes non-VPN connections that SecureXL forwarded to firewall. See "Firewall
Path".
Failback in Cluster
Also, Fallback. Recovery of a Cluster Member that suffered from a failure. The state of a
recovered Cluster Member is changed from Down to either Active, or Standby
(depending on Cluster Mode).
Failed Member
A Cluster Member that cannot send or accept traffic because of a hardware or software
problem.
Failover
Also, Fail-over. Transferring of a control over traffic (packet filtering) from a Cluster
Member that suffered a failure to another Cluster Member (based on internal cluster
algorithms).
Failure
A hardware or software problem that causes a Security Gateway to be unable to serve
as a Cluster Member (for example, one of cluster interface has failed, or one of the
monitored daemon has crashed). Cluster Member that suffered from a failure is declared
as failed, and its state is changed to Down (a physical interface is considered Down
only if all configured VLANs on that physical interface are Down).
Firewall
The software and hardware that protects a computer network by analyzing the incoming
and outgoing network traffic (packets).
Firewall Path
Also Slow Path. Packet flow on the Host Security Appliance, when the SecureXL
device is unable to process the packet (see sk32578). The packet is passed to the
CoreXL layer and then to one of the CoreXL Firewall instances for full processing. This
path also processes all packets when SecureXL is disabled.
Flapping
Consequent changes in the state of either cluster interfaces (cluster interface flapping),
or Cluster Members (Cluster Member flapping). Such consequent changes in the state
are seen in the 'Logs & Monitor' > 'Logs' (if in SmartConsole > cluster object, the cluster
administrator set the 'Track changes in the status of cluster members' to 'Log').
Forwarding
Process of transferring of an incoming traffic from one Cluster Member to another
Cluster Member for processing. There are two types of forwarding the incoming traffic
between Cluster Members - Packet forwarding and Chain forwarding. Also see
"Forwarding Layer in Cluster" and "ARP Forwarding in Cluster".
Forwarding Layer
The Forwarding Layer is a ClusterXL mechanism that allows a Cluster Member to pass
packets to peer Cluster Members, after they have been locally inspected by the firewall.
This feature allows connections to be opened from a Cluster Member to an external
host. Packets originated by Cluster Members are hidden behind the Cluster Virtual IP
address. Thus, a reply from an external host is sent to the cluster, and not directly to the
source Cluster Member. This can pose problems in the following situations: (1) The
cluster is working in High Availability mode, and the connection is opened from the
Standby Cluster Member. All packets from the external host are handled by the Active
Cluster Member, instead. (2) The cluster is working in a Load Sharing mode, and the
decision function has selected another Cluster Member to handle this connection. This
can happen since packets directed at a Cluster IP address are distributed between
Cluster Members as with any other connection. If a Cluster Member decides, upon the
completion of the firewall inspection process, that a packet is intended for another
Cluster Member, it can use the Forwarding Layer to hand the packet over to that Cluster
Member. In High Availability mode, packets are forwarded over a Synchronization
network directly to peer Cluster Members. It is important to use secured networks only,
as encrypted packets are decrypted during the inspection process, and are forwarded
as clear-text (unencrypted) data. In Load Sharing mode, packets are forwarded over a
regular traffic network. Packets that are sent on the Forwarding Layer use a special
source MAC address to inform the receiving Cluster Member that they have already
been inspected by another Cluster Member. Thus, the receiving Cluster Member can
safely hand over these packets to the local Operating System, without further inspection.
Full Sync
Process of full synchronization of applicable kernel tables by a Cluster Member from the
working Cluster Member(s) when it tries to join the existing cluster. This process is
meant to fetch a"snapshot" of the applicable kernel tables of already Active Cluster
Member(s). Full Sync is performed during the initialization of Check Point software
(during boot process, the first time the Cluster Member runs policy installation, during
'cpstart', during 'cphastart'). Until the Full Sync process completes successfully, this
Cluster Member remains in the Down state, because until it is fully synchronized with
other Cluster Members, it cannot function as a Cluster Member. Meanwhile, the Delta
Sync packets continue to arrive, and the Cluster Member that tries to join the existing
cluster, stores them in the kernel memory until the Full Sync completes. The whole Full
Sync process is performed by fwd daemons on TCP port 256 over the Sync network (if it
fails over the Sync network, it tries the other cluster interfaces). The information is sent
by fwd daemons in chunks, while making sure they confirm getting the information
before sending the next chunk. Also see "Delta Sync".
Gaia
Check Point security operating system that combines the strengths of both
SecurePlatform and IPSO operating systems.
Gaia Clish
The name of the default command line shell in Check Point Gaia operating system. This
is a restrictive shell (role-based administration controls the number of commands
available in the shell).
Gaia Portal
Web interface for Check Point Gaia operating system.
Global Domain
A Domain on a Multi-Domain Server, on which the Multi-Domain Server administrator
creates and manages objects, security policies and settings that apply to the entire
Multi-Domain Security Management environment.
Global Objects
For Multi-Domain Management, all network and objects defined in the Global Domain.
Global Policy
All Policies defined in the Global Domain that can be assigned to Domains, or to
specified groups of Domains.
HA not started
Output of the 'cphaprob <flag>' command or 'show cluster <option>' command on the
Cluster Member. This output means that Check Point clustering software is not started
on this Security Gateway (for example, this machine is not a part of a cluster, or
'cphastop' command was run, or some failure occurred that prevented the ClusterXL
product from starting correctly).
High Availability
A redundant cluster mode, where only one Cluster Member (Active member) processes
all the traffic, while other Cluster Members (Standby members) are ready to be promoted
to Active state if the current Active member fails. In the High Availability mode, the
Cluster Virtual IP address (that represents the cluster on that network) is associated: (1)
With physical MAC Address of Active member (2) With virtual MAC Address (see
sk50840). Acronym: HA.
Hotfix
A piece of software installed on top of the current software in order to fix some wrong or
undesired behavior.
HTU
Stands for "HA Time Unit". All internal time in ClusterXL is measured in HTUs (the
times in cluster debug also appear in HTUs). Formula in the Check Point software: 1
HTU = 10 x fwha_timer_base_res = 10 x 10 milliseconds = 100 ms.
Hybrid
Starting in R80.20, on Security Gateways with 40 or more CPU cores, Software Blades
run in the user space (as 'fwk' processes). The Hybrid Mode refers to the state when you
upgrade Cluster Members from R80.10 (or below) to R80.20 (or above). The Hybrid
Mode is the state, in which the upgraded Cluster Members already run their Software
Blades in the user space (as fwk processes), while other Cluster Members still run their
Software Blades in the kernel space (represented by the fw_worker processes). In the
Hybrid Mode, Cluster Members are able to synchronize the required information.
ICA
Internal Certificate Authority. A component on Check Point Management Server that
issues certificates for authentication.
ICAP Client
The ICAP Client functionality in your Security Gateway or Cluster enables it to interact
with an ICAP Server responses (see RFC 3507), modify their content, and block the
matched HTTP connections.
ICAP Server
The ICAP Server functionality in your Security Gateway or Cluster enables it to interact
with an ICAP Client requests, send the files for inspection, and return the verdict.
Identity Agent
Check Point dedicated client agent installed on Windows-based user endpoint
computers. This Identity Agent acquires and reports identities to the Check Point Identity
Awareness Security Gateway. The administrator configures the Identity Agents (not the
end users). There are three types of Identity Agents - Full, Light and Custom. You can
download the Full, Light and Custom Identity Agent package from the Captive Portal -
'https://<Gateway_IP_Address>/connect'. You can transfer the Full and Light Identity
Agent package from the Identity Awareness Agents -
'https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_
doGoviewsolutiondetails=&solutionid=sk134312'.
Identity Awareness
Check Point Software Blade that enforces network access and audits data based on
network location, the identity of the user, and the identity of the computer.
Identity Broker
Identity Sharing mechanism between Identity Servers (PDP): (1) Communication
channel between PDPs based on Web-API (2) Identity Sharing capabilities between
PDPs - ability to add, remove, and update the identity session.
Identity Collector
Check Point dedicated client agent installed on Windows Servers in your network.
Identity Collector collects information about identities and their associated IP addresses,
and sends it to the Check Point Security Gateways for identity enforcement. For more
information, see sk108235. You can download the Identity Collector package from the
Identity Awareness Agents -
'https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_
doGoviewsolutiondetails=&solutionid=sk134312'.
Identity Server
Check Point Security Gateway with enabled Identity Awareness Software Blade.
IKE
Internet Key Exchange. An Encryption key management protocol for IPSec that creates
a shared key to encrypt and decrypt IP packets and establishes a VPN tunnel and
Security Association.
Indicator
Pattern of relevant observable malicious activity in an operational cyber domain, with
relevant information on how to interpret it and how to handle it.
Init
State of a Cluster Member in the phase after the boot and until the Full Sync completes.
A Cluster Member in this state does not process any traffic passing through cluster.
Inline Layer
Set of rules used in another rule in Security Policy.
Internal Network
Computers and resources protected by the Firewall and accessed by authenticated
users.
IP Tracking
Collecting and saving of Source IP addresses and Source MAC addresses from
incoming IP packets during the probing. IP tracking is a useful for Cluster Members to
determine whether the network connectivity of the Cluster Member is acceptable.
IP Tracking Policy
Internal setting that controls, which IP addresses should be tracked during IP tracking:
(1) Only IP addresses from the subnet of cluster VIP, or from subnet of physical cluster
interface (this is the default) (2) All IP addresses, also outside the cluster subnet.
IPS
Intrusion Prevention System. Check Point Software Blade that inspects and analyzes
packets and data for numerous types of risks.
IPv4
Internet Protocol Version 4 (see RFC 791). A 32-bit number - 4 sets of numbers, each
set can be from 0 - 255. For example, 192.168.2.1.
IPv6
Internet Protocol Version 6 (see RFC 2460 and RFC 3513). 128-bit number - 8 sets of
hexadecimal numbers, each set can be from 0 - ffff. For example,
FEDC:BA98:7654:3210:FEDC:BA98:7654:3210.
IRQ Affinity
A state of binding an IRQ to one or more CPU cores.
Jitter
Variation in the delay of received packets. On the sending side, packets are spaced
evenly apart and sent in a continuous stream. On the receiving side, the delay between
each packet can vary according to network congestion, improper queuing or
configuration errors.
Kerberos
A computer network authentication protocol that works based on tickets to allow nodes
communicating over a non-secure network to prove their identity to one another in a
secure manner. Kerberos builds on symmetric key cryptography and requires a trusted
third party, and optionally may use public-key cryptography during certain phases of
authentication.
Link Aggregation
Technology that joins multiple physical interfaces together into one virtual interface,
known as a bond interface. Also known as Interface Bonding.
LLQ
Low Latency Queuing is a feature developed by Cisco to bring strict priority queuing
(PQ) to class-based weighted fair queuing (CBWFQ). LLQ allows delay-sensitive data
(such as voice) to be given preferential treatment over other traffic by letting the data to
be dequeued and sent first.
Load Sharing
Also, Load Balancing mode. A redundant cluster mode, where all Cluster Members
process all incoming traffic in parallel. See "Load Sharing Multicast Mode" and "Load
Sharing Unicast Mode". Acronym: LS.
Log
A record of an action that is done by a Software Blade.
Log Server
A dedicated Check Point computer that runs Check Point software to store and process
logs in Security Management Server or Multi-Domain Security Management
environment.
Malware Database
The Check Point database of commonly used signatures, URLs, and their related
reputations, installed on a Security Gateway and used by the ThreatSpect engine.
Management Interface
Interface on Gaia computer, through which users connect to Portal or CLI. Interface on a
Gaia Security Gateway or Cluster member, through which Management Server
connects to the Security Gateway or Cluster member.
Management Server
A Check Point Security Management Server or a Multi-Domain Server.
Master
State of a Cluster Member that processes all traffic in cluster configured in VRRP mode.
Multi-Domain Server
A computer that runs Check Point software to host virtual Security Management Servers
called Domain Management Servers. Acronym: MDS.
Multi-Queue
An acceleration feature on Security Gateway that lets you assign more than one packet
queue and CPU core to an interface.
Multi-Version Cluster
The Multi-Version Cluster (MVC) mechanism lets you synchronize connections
between cluster members that run different versions. This lets you upgrade to a newer
version without a loss in connectivity and lets you test the new version on some of the
cluster members before you decide to upgrade the rest of the cluster members.
MVC
See "Multi-Version Cluster".
NAC
Network Access Control. This is an approach to computer security that attempts to unify
endpoint security technology (such as Anti-Virus, Intrusion Prevention, and Vulnerability
Assessment), user or system authentication and network security enforcement. Check
Point's Network Access Control solution is called Identity Awareness Software Blade.
Network Object
Logical representation of every part of corporate topology (physical machine, software
component, IP Address range, service, and so on).
Network Objective
Defines how the cluster will configure and monitor an interface - Cluster, Sync,
Cluster+Sync, Monitored Private, Non-Monitored Private. Configured in SmartConsole >
cluster object > 'Topology' pane > 'Network Objective'.
Non-Blocking Mode
Cluster operation mode, in which Cluster Member keeps forwarding all traffic.
Non-Monitored Interface
An interface on a Cluster Member, whose Network Type was set as Private in
SmartConsole, in cluster object.
Non-Pivot
A Cluster Member in the Unicast Load Sharing cluster that receives all packets from the
Pivot Cluster Member.
Non-Sticky Connection
A connection is called non-sticky, if the reply packet returns via a different Cluster
Member, than the original packet (for example, if network administrator has configured
asymmetric routing). In Load Sharing mode, all Cluster Members are Active, and in
Static NAT and encrypted connections, the Source and Destination IP addresses
change. Therefore, Static NAT and encrypted connections through a Load Sharing
cluster may be non-sticky.
Observable
An event or a stateful property that can be observed in an operational cyber domain.
Open Server
A physical computer manufactured and distributed by a company, other than Check
Point.
Packet Selection
Distinguishing between different kinds of packets coming from the network, and
selecting, which member should handle a specific packet (Decision Function
mechanism): CCP packet from another member of this cluster; CCP packet from another
cluster or from a Cluster; Member with another version (usually older version of CCP);
Packet is destined directly to this member; Packet is destined to another member of this
cluster; Packet is intended to pass through this Cluster Member; ARP packets.
PDP
Check Point Identity Awareness Security Gateway that acts as Policy Decision Point:
acquires identities from identity sources; shares identities with other gateways.
PEP
Check Point Identity Awareness Security Gateway that acts as Policy Enforcement
Point: receives identities via identity sharing; redirects users to Captive Portal.
Permission Profile
A predefined group of SmartConsole access permissions assigned to Domains and
administrators. With this feature you can configure complex permissions for many
administrators with one definition.
Pingable Host
Some host (that is, some IP address) that Cluster Members can ping during probing
mechanism. Pinging hosts in an interface's subnet is one of the health checks that
ClusterXL mechanism performs. This pingable host will allow the Cluster Members to
determine with more precision what has failed (which interface on which member). On
Sync network, usually, there are no hosts. In such case, if switch supports this, an IP
address should be assigned on the switch (for example, in the relevant VLAN). The IP
address of such pingable host should be assigned per this formula: IP_of_pingable_
host = IP_of_physical_interface_on_member + ~10. Assigning the IP address to
pingable host that is higher than the IP addresses of physical interfaces on the Cluster
Members will give some time to Cluster Members to perform the default health checks.
Example: IP address of physical interface on a given subnet on Member_A is
10.20.30.41; IP address of physical interface on a given subnet on Member_B is
10.20.30.42; IP address of pingable host should be at least 10.20.30.5
Pivot
A Cluster Member in the Unicast Load Sharing cluster that receives all packets. Cluster
Virtual IP addresses are associated with Physical MAC Addresses of this Cluster
Member. This Pivot Cluster Member distributes the traffic between other Non-Pivot
Cluster Members.
Pnote
See "Critical Device".
Policy Layer
A layer (set of rules) in a Security Policy.
Policy Package
A collection of different types of Security Policies, such as Access Control, Threat
Prevention, QoS, and Desktop Security. After installation, Security Gateways enforce all
Policies in the Policy Package.
Preconfigured Mode
Cluster Mode, where cluster membership is enabled on all Cluster Members to be.
However, no policy had been yet installed on any of the Cluster Members - none of
them is actually configured to be primary, secondary, and so on. The cluster cannot
function, if one Cluster Member fails. In this scenario,the "preconfigured mode" takes
place. The preconfigured mode also comes into effect when no policy is yet installed,
right after the Cluster Members came up after boot, or when running the 'cphaconf init'
command.
Predefined Report
A default report included in a Check Point product that you can run right out of the box.
Prevent
UserCheck rule action that blocks traffic and files and can show a UserCheck message.
Primary Up
ClusterXL in High Availability mode that was configured as Switch to higher priority
Cluster Member in the cluster object in SmartConsole: (1) Each Cluster Member is
given a priority (SmartConsole > cluster object > 'Cluster Members' pane). Cluster
Member with the highest priority appears at the top of the table, and Cluster Member
with the lowest priority appears at the bottom of the table. (2) The Cluster Member with
the highest priority will assume the Active state. (3) If the current Active Cluster Member
with the highest priority (for example, Member_A), fails for some reason, or is rebooted,
then failover occurs between Cluster Members. The Cluster Member with the next
highest priority will be promoted to be Active (for example, Member_B). (4) When the
Cluster Member with the highest priority (Member_A) recovers from a failure, or boots,
then additional failover occurs between Cluster Members. The Cluster Member with the
highest priority (Member_A) will be promoted to Active state (and Member_B will return
to Standby state).
Private Interface
An interface on a Cluster Member, whose Network Type was set as 'Private' in
SmartConsole in cluster object. This interface is not monitored by cluster, and failure on
this interface will not cause any changes in Cluster Member's state.
Probing
If a Cluster Member fails to receive status for another member (does not receive CCP
packets from that member) on a given segment, Cluster Member will probe that segment
in an attempt to illicit a response. The purpose of such probes is to detect the nature of
possible interface failures, and to determine which module has the problem. The
outcome of this probe will determine what action is taken next (change the state of an
interface, or of a Cluster Member).
Problem Notification
See "Critical Device".
PSL
Passive Streaming Library. Packets may arrive at Security Gateway out of order, or may
be legitimate retransmissions of packets that have not yet received an acknowledgment.
In some cases, a retransmission may also be a deliberate attempt to evade IPS
detection by sending the malicious payload in the retransmission. Security Gateway
ensures that only valid packets are allowed to proceed to destinations. It does this with
the Passive Streaming Library (PSL) technology. (1) The PSL is an infrastructure layer,
which provides stream reassembly for TCP connections. (2) The Security Gateway
makes sure that TCP data seen by the destination system is the same as seen by code
above PSL. (3) The PSL handles packet reordering, congestion, and is responsible for
various security aspects of the TCP layer, such as handling payload overlaps, some
DoS attacks, and others. (4) The PSL is capable of receiving packets from the Firewall
chain and from the SecureXL. (5) The PSL serves as a middleman between the various
security applications and the network packets. It provides the applications with a
coherent stream of data to work with, free of various network problems or attacks. (6)
The PSL infrastructure is wrapped with well-defined APIs called the Unified Streaming
APIs, which are used by the applications to register and access streamed data. For
more details, see sk95193.
PSLXL
Technology name for combination of SecureXL and PSL (Passive Streaming Library) in
R80.20 and higher versions. In R80.10 and lower versions, this technology was called
PXL (PacketXL).
Publisher PDP
Check Point Identity Awareness Security Gateway that gets identities from an identity
source/remote PDP and shares identities to a remote PDP. The Publisher PDP: (1)
Initiates an HTTPS connection to the Subscriber PDP for each Identity to be shared (2)
Verifies the CN and OU present in the subject field of the certificate presented (3)
Verifies that the CA's certificate matches the certificate that was approved in advance by
the administrator (4) Checks if the certificate presented is revoked (5) Shares identities
including the information about user(s), machine(s) and Access Roles in the form of
HTTP POST requests.
PXL
See "PSLXL".
QoS
Check Point Software Blade that guarantees quality of service for traffic.
RADIUS
Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that
provides centralized Authentication, Authorization, and Accounting (AAA or Triple A)
management for users who connect and use a network service. RADIUS is a
client/server protocol that runs in the application layer, and can use either TCP or UDP
as transport.
RDED
Retransmit Detect Early Drop. The bottleneck that results from the connection of a LAN
to the WAN causes TCP to retransmit packets. RDED prevents inefficiencies by
detecting retransmits in TCP streams and preventing the transmission of redundant
packets when multiple copies of a packet are concurrently queued on the same flow.
Ready
State of a Cluster Member during after initialization and before promotion to the next
required state - Active / Standby / VRRP Master / VRRP Backup (depending on Cluster
Mode). A Cluster Member in this state does not process any traffic passing through
cluster. A member can be stuck in this state due to several reasons - see sk42096.
Report
A summary of network activity and Security Policy enforcement that is generated by
Check Point products such as SmartEvent.
Rule
A set of traffic parameters and other conditions in a Rule Base that cause specified
actions to be taken for a communication session.
Rule Base
Also Rulebase. All rules configured in a given Security Policy.
RX Queue
Receive packet queue. See "Multi-Queue".
SecureXL
Check Point product that accelerates IPv4 and IPv6 traffic. Installed on Security
Gateways for significant performance improvements.
Security Gateway
A computer that runs Check Point software to inspect traffic and enforces Security
Policies for connected network resources.
Security Policy
A collection of rules that control network traffic and enforce organization guidelines for
data protection and access to resources with packet inspection.
Selection
The packet selection mechanism is one of the central and most important components
in the ClusterXL product and State Synchronization infrastructure for 3rd party clustering
solutions. Its main purpose is to decide (to select) correctly what has to be done to the
incoming and outgoing traffic on the Cluster Member. (1) In ClusterXL, the packet is
selected by Cluster Member(s) depending on the cluster mode: In HA modes - by Active
member; In LS Unicast mode - by Pivot member; In LS Multicast mode - by all members.
Then the Cluster Member applies the Decision Function (and the Cluster Correction
Layer). (2) In 3rd party / OPSEC cluster, the 3rd party software selects the packet, and
Check Point software just inspects it (and performs State Synchronization).
Service Account
In Microsoft® Active Directory, a user account created explicitly to provide a security
context for services running on Microsoft® Windows® Server.
SIC
Secure Internal Communication. The Check Point proprietary mechanism with which
Check Point computers that run Check Point software authenticate each other over
SSL, for secure communication. This authentication is based on the certificates issued
by the ICA on a Check Point Management Server.
Single Sign-On
A property of access control of multiple related, yet independent, software systems. With
this property, a user logs in with a single ID and password to gain access to a
connected system or systems without using different usernames or passwords, or in
some configurations seamlessly sign on at each system. This is typically accomplished
using the Lightweight Directory Access Protocol (LDAP) and stored LDAP databases
on (directory) servers. Acronym: SSO.
Slow Path
See "Firewall Path".
SmartConsole
A Check Point GUI application used to manage Security Policies, monitor products and
events, install updates, provision new devices and appliances, and manage a multi-
domain environment and each domain.
SmartDashboard
A legacy Check Point GUI client used to create and manage the security settings in
R77.30 and lower versions.
SmartEvent Server
Server with enabled SmartEvent Software Blade that hosts the events database.
Software Blade
A software blade is a security solution based on specific business needs. Each blade is
independent, modular and centrally managed. To extend security, additional blades can
be quickly added.
SSO
See "Single Sign-On".
Standalone
A Check Point computer, on which both the Security Gateway and Security
Management Server products are installed and configured.
Standby
State of a Cluster Member that is ready to be promoted to Active state (if the current
Active Cluster Member fails). Applies only to ClusterXL High Availability Mode.
State Synchronization
Technology that synchronizes the relevant information about the current connections
(stored in various kernel tables on Check Point Security Gateways) among all Cluster
Members over Synchronization Network. Due to State Synchronization, the current
connections are not cut off during cluster failover.
Sticky Connection
A connection is called sticky, if all packets are handled by a single Cluster Member (in
High Availability mode, all packets reach the Active Cluster Member, so all connections
are sticky).
STIX
Structured Threat Information eXpression™. A language that describes cyber threat
information in a standardized and structured way.
Subscriber PDP
Check Point Identity Awareness Security Gateway that gets identities from a remote
PDP. The Subscriber PDP: (1) Presents the configured SSL certificate to the Publisher
PDP (2) Receives the information from the Publisher PDP after verifying the pre-shared
secret in the POST requests.
Subscribers
User Space processes that are made aware of the current state of the ClusterXL state
machine and other clustering configuration parameters. List of such subscribers can be
obtained by running the 'cphaconf debug_data' command (see sk31499).
Sync Interface
Also, Secured Interface, Trusted Interface. An interface on a Cluster Member, whose
Network Type was set as Sync or Cluster+Sync in SmartConsole in cluster object. This
interface is monitored by cluster, and failure on this interface will cause cluster failover.
This interface is used for State Synchronization between Cluster Members. The use of
more than one Sync Interfaces for redundancy is not supported because the CPU load
will increase significantly due to duplicate tasks performed by all configured
Synchronization Networks. See sk92804.
Synchronization Network
Also, Sync Network, Secured Network, Trusted Network. A set of interfaces on Cluster
Members that were configured as interfaces, over which State Synchronization
information will be passed (as Delta Sync packets ). The use of more than one
Synchronization Network for redundancy is not supported because the CPU load will
increase significantly due to duplicate tasks performed by all configured
Synchronization Networks. See sk92804.
System Counter
SmartView Monitor data or report on status, activity, and resource usage of Check Point
products.
Terminal Server
Microsoft® Windows-based application server that hosts Terminal Servers, Citrix
XenApp, and Citrix XenDesktop services.
Threat Emulation
Check Point Software Blade that emulates files. Virtual computers open files that users
download. These computers are monitored for unusual and malicious behavior.
Threat Extraction
Check Point Software Blade that extracts potentially malicious content from files and
delivers a safe copy to the user.
ThreatCloud IntelliStore
Threat intelligence marketplace where you can select intelligence feeds (in addition to
ThreatCloud feeds) from a range of security vendors that specialize in cyber
intelligence. ThreatCloud translates these feeds into protections which run on Security
Gateways.
ThreatCloud Repository
A cloud database with more than 250 million Command and Control (C&C) IP, URL,
and DNS addresses and over 2,000 different botnet communication patterns, used by
the ThreatSpect engine to classify bots and viruses.
ThreatSpect Engine
A unique multi-tiered engine that analyzes network traffic and correlates data across
multiple layers (reputation, signatures, suspicious mail outbreaks, behavior patterns) to
detect bots and viruses.
Traffic
Flow of data between network devices.
TX queue
Transmit packet queue. See "Multi-Queue".
User Database
Check Point internal database that contains all users defined and managed in
SmartConsole.
User Groups
Named groups of users with related responsibilities.
User Template
Property set that defines a type of user on which a security policy will be enforced.
UserCheck
Gives users a warning when there is a potential risk of data loss or security violation.
This helps users to prevent security incidents and to learn about the organizational
security policy.
Users
Personnel authorized to use network resources and applications.
Virtual Device
A logical object that emulates the functionality of a type of physical network object.
Virtual Router
A Virtual Device on a VSX Gateway or VSX Cluster Member that functions as a
physical router. Acronym: VR.
Virtual Switch
A Virtual Device on a VSX Gateway or VSX Cluster Member that functions as a
physical switch. Acronym: VSW.
Virtual System
A Virtual Device on a VSX Gateway or VSX Cluster Member that implements the
functionality of a Security Gateway. Acronym: VS.
VLAN
Virtual Local Area Network. Open servers or appliances connected to a virtual network,
which are not physically connected to the same network.
VLAN Trunk
A connection between two switches that contains multiple VLANs.
VMAC
Virtual MAC address. When this feature is enabled on Cluster Members, all Cluster
Members in High Availability mode and Load Sharing Unicast mode associate the
same Virtual MAC address with Virtual IP address. This allows avoiding issues when
Gratuitous ARP packets sent by cluster during failover are not integrated into ARP
cache table on switches surrounding the cluster. See sk50840.
VPN
Virtual Private Network. A secure, encrypted connection between networks and remote
clients on a public infrastructure, to give authenticated remote users and sites secured
access to an organization's network and resources.
VPN Community
A named collection of VPN domains, each protected by a VPN gateway.
VPN Tunnel
An encrypted connection between two hosts using standard protocols (such as L2TP) to
encrypt traffic going in and decrypt it coming out, creating an encapsulated network
through which data can be safely shared as though on a physical private line.
VSLS
See "Virtual System Load Sharing".
VSX
Virtual System Extension. Check Point virtual networking solution, hosted on a
computer or cluster with virtual abstractions of Check Point Security Gateways and
other network devices. These Virtual Devices provide the same functionality as their
physical counterparts.
VSX Gateway
Physical server that hosts VSX virtual networks, including all Virtual Devices that
provide the functionality of physical network devices. It holds at least one Virtual
System, which is called VS0.
Warp Link
An interface between a Virtual System and a Virtual Switch or Virtual Router that is
created automatically in a VSX topology.
WFQ
Weighted Fair Queuing. An algorithm to precisely control bandwidth allocation in QoS.
WFRED
Weighted Flow Random Early Drop. A mechanism for managing the packet buffers of
QoS. Adjusting automatically and dynamically to the network traffic situation, WFRED
remains transparent to the user.
Introduction
The CLI Reference Guide provides CLI commands to configure and monitor Check Point Software Blades.
Syntax Legend
Whenever possible, this guide lists commands, parameters and options in the alphabetical order.
This guide uses this convention in the Command Line Interface (CLI) syntax:
Character Description
main command
→ nested subcommand 1
→ → nested subsubcommand 1-1
→ → nested subsubcommand 1-2
→ nested subcommand 2
Example:
cpwd_admin
config
-a <options>
-d <options>
-p
-r
del <options>
n This command:
n Or this command:
n Or this command:
cpwd_admin config -p
n Or this command:
cpwd_admin config -r
n Or this command:
Curly brackets or braces Enclose a list of available commands or parameters, separated by the
vertical bar |.
{ }
User can enter only one of the available commands or parameters.
Character Description
Square brackets or Enclose an optional command or parameter, which user can also enter.
brackets
[ ]
Gaia Commands
See:
n R80.40 Gaia Administration Guide
n R80.40 Gaia Advanced Routing Administration Guide
API
You can configure and control the Management Server through API Requests you send to the API Server
that runs on the Management Server.
The API Server runs scripts that automate daily tasks and integrate the Check Point solutions with third
party systems such as virtualization servers, ticketing systems, and change management systems.
API Tools
You can use these tools to run API scripts on the Management Server:
n Standalone management tool, included with SmartConsole. You can copy this tool to computers that
run Windows or Gaia operating system.
l mgmt_cli.exe (for Windows operating system)
l mgmt_cli (for Gaia operating system)
n Web Services API that allow communication and data exchange between the clients and the
Management Server over the HTTP protocol.
These also let other Check Point processes communicate with the Management Server over the
HTTPS protocol.
To learn more about the management APIs, to see code samples, and to take advantage of user forums,
see:
n The Check Point Management API Reference.
n The Developers Network section of Check Point CheckMates Community.
Select Automatic start to automatically start the API server when you start or reboot the
Management Server.
Notes:
n If the Management Server has more than 4GB of RAM installed, the
Automatic start option is activated by default during Management
Server installation.
n If the Management Server has less than 4GB of RAM, the Automatic
Start option is deactivated.
Select one of these options to configure which clients can connect to the API Server:
n Management server only - Only the Management Server itself can connect to the API
Server. This option only lets you use the mgmt_cli utility to send API requests. You
cannot use SmartConsole or web services to send API requests.
n All IP addresses that can be used for GUI clients - You can send API requests from all
IP addresses that are defined as Trusted Clients in SmartConsole. This includes requests
from SmartConsole, Web services and the mgmt_cli utility.
n All IP addresses - You can send API requests from all IP addresses. This includes
requests from SmartConsole, Web services and the mgmt_cli utility.
api restart
Note - On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server.
contract_util
Description
Works with the Check Point Service Contracts.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
contract_util [-d]
check <options>
cpmacro <options>
download <options>
mgmt
print <options>
summary <options>
update <options>
verify
Parameters
Parameter Description
cpmacro Overwrites the current cp.macro file with the specified cp.macro file.
<options>
See "contract_util cpmacro" on page 77.
download Downloads all associated Check Point Service Contracts from the User Center, or
<options> from a local file.
See "contract_util download" on page 78.
mgmt Delivers the Service Contract information from the Management Server to the
managed Security Gateways.
See "contract_util mgmt" on page 80.
print Shows all the installed licenses and whether the Service Contract covers these
<options> license, which entitles them for upgrade or not.
See "contract_util print" on page 81.
Parameter Description
update Updates Check Point Service Contracts from your User Center account.
<options>
See "contract_util update" on page 83.
contract_util check
Description
Checks whether the Security Gateway is eligible for an upgrade.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
contract_util check
{-h | -help}
hfa
maj_upgrade
min_upgrade
upgrade
Parameters
Parameter Description
hfa Checks whether the Security Gateway is eligible for an upgrade to a higher Hotfix
Accumulator.
maj_ Checks whether the Security Gateway is eligible for an upgrade to a higher Major
upgrade version.
min_ Checks whether the Security Gateway is eligible for an upgrade to a higher Minor
upgrade version.
contract_util cpmacro
Description
Overwrites the current cp.macro file with the specified cp.macro file, if the specified is newer than the
current file.
For more information about the cp.macro file, see sk96217: What is a cp.macro file?
Syntax
Message Description
contract_util download
Description
Downloads all associated Check Point Service Contracts from User Center, or from a local file.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
contract_util download
{-h | -help}
local
{-h | -help}
[{hfa | maj_upgrade | min_upgrade | upgrade}] <Service
Contract File>
uc
{-h | -help}
[-i] [{hfa | maj_upgrade | min_upgrade | upgrade}]
<Username> <Password> [<Proxy Server> [<Proxy Username>:<Proxy
Password>]]
Parameters
Parameter Description
local Specifies to download the Service Contract from the local file.
This is equivalent to the cplic contract putcommand.
<Proxy Server> [<Proxy Specifies that the connection to the User Center goes through
Username>:<Proxy the proxy server.
Password>]
n <Proxy Server> - IP address of resolvable hostname
of the proxy server
n <Proxy Username> - Username for the proxy server.
n <Proxy Password> - Password for the proxy server.
Note - If you do not specify the proxy server explicitly, the
command uses the proxy server configured in the management
database.
<Service Contract File> Path to and the name of the Service Contract file.
First, you must download the Service Contract file from your User
Center account.
contract_util mgmt
Description
Delivers the Service Contract information from the Management Server to the managed Security
Gateways.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
contract_util mgmt
contract_util print
Description
Shows all the installed licenses and whether the Service Contract covers these license, which entitles them
for upgrade or not.
This command can show which licenses are not recognized by the Service Contract file.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
Parameters
Parameter Description
contract_util summary
Description
Shows post-installation summary and whether this Check Point computer is eligible for upgrades.
Syntax
contract_util summary
hfa
maj_upgrade
min_upgrade
upgrade
Parameters
Parameter Description
contract_util update
Description
Updates the Check Point Service Contracts from your User Center account.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
contract_util update
[-proxy <Proxy Server>:<Proxy Port>]
[-ca_path <Path to ca-bundle.crt File>]
Parameters
Parameter Description
-proxy <Proxy Specifies that the connection to the User Center goes through the
Server>:<Proxy Port> proxy server:
n <Proxy Server> - IP address of resolvable hostname of
the proxy server.
n <Proxy Port> - The applicable port on the proxy server.
Note - If you do not specify the proxy explicitly, the command
uses the proxy configured in the management database.
-ca_path <Path to ca- Specifies the path to the Certificate Authority Bundle file (ca-
bundle.crt File> bundle.crt).
contract_util verify
Description
Checks whether the Security Gateway is eligible for an upgrade.
This command is the same as the "contract_util check" on page 76 command, but it also interprets the
return values and shows a meaningful message.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
contract_util verify
cp_conf
Description
Configures or reconfigures a Check Point product installation.
Note - The available options for each Check Point computer depend on the
configuration and installed products.
cp_conf
-h
admin <options>
auto <options>
ca <options>
client <options>
finger <options>
lic <options>
snmp <options>
cp_conf
-h
adv_routing <options>
auto <options>
corexl <options>
fullha <options>
ha <options>
intfs <options>
lic <options>
sic <options>
snmp <options>
Parameters
Parameter Description
admin Configures Check Point system administrators for the Security Management
<options> Server.
See "cp_conf admin" on page 88.
adv_routing Enables or disables the Advanced Routing feature on this Security Gateway.
<options>
Important - Do not use these outdated commands. To configure
Advanced Routing, see the R80.40 Gaia Advanced Routing
Administration Guide.
auto <options> Shows and configures the automatic start of Check Point products during boot.
See "cp_conf auto" on page 91.
ca <options> n Configures the Certificate Authority's (CA) Fully Qualified Domain Name
(FQDN).
n Initializes the Internal Certificate Authority (ICA).
client Configures the GUI clients that can use SmartConsole to connect to the
<options> Security Management Server.
See "cp_conf client" on page 95.
intfs Sets the topology of interfaces on a Security Gateway, which you manage with
<options> SmartProvisioning.
See "cp_conf intfs" on page 887.
Parameter Description
cp_conf admin
Description
Configures Check Point system administrators for the Security Management Server.
Notes:
n Multi-Domain Server does not support this command.
n Only one administrator can be defined in the "cpconfig" on page 133 menu.
To define additional administrators, use SmartConsole.
n This command corresponds to the option Administrator in the "cpconfig" on page 133
menu.
Syntax
cp_conf admin
-h
add [<UserName> <Password> {a | w | r}]
add -gaia [{a | w | r}]
del <UserName1> <UserName2> ...
get
Parameters
Parameter Description
add -gaia [{a | w | r}] Adds the Gaia administrator user admin:
Permissions for all products (Read/[W]rite All, [R]ead Only All, [C]ustomized) c
Permission for SmartUpdate (Read/[W]rite, [R]ead Only, [N]one) w
Permission for Monitoring (Read/[W]rite, [R]ead Only, [N]one) w
cp_conf auto
Description
Shows and controls which of Check Point products start automatically during boot.
Note - This command corresponds to the option Automatic start of Check Point
Products in the "cpconfig" on page 133 menu.
Syntax
cp_conf auto
-h
{enable | disable} <Product1> <Product2> ...
get all
Parameters
Parameter Description
{enable | disable} <Product1> Controls whether the installed Check Point products start
<Product2> ... automatically during boot.
This command is for Check Point use only.
[Expert@MGMT:0]#
[Expert@GW:0]#
cp_conf ca
Description
n Initializes the Internal Certificate Authority (ICA).
n Configures the Certificate Authority's (CA) Fully Qualified Domain Name (FQDN).
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
cp_conf ca
-h
fqdn <FQDN Name>
init
Parameters
Parameter Description
fqdn <FQDN Configures the Certificate Authority's (CA) Fully Qualified Domain Name
Name> (FQDN).
<FQDN Name> is the text string hostname.domainname
Example
[Expert@MyMGMT:0]# hostname
MyMGMT
[Expert@MyMGMT:0]#
[Expert@MyMGMT:0]# domainname
checkpoint.com
[Expert@MyMGMT:0]#
cp_conf client
Description
Configures the GUI clients that are allowed to connect with SmartConsoles to the Security Management
Server.
Notes:
n Multi-Domain Server does not support this command.
n This command corresponds to the option GUI Clients in the "cpconfig" on page 133
menu.
Syntax
cp_conf client
add <GUI Client>
createlist <GUI Client 1> <GUI Client 2> ...
del <GUI Client 1> <GUI Client 2> ...
get
Parameters
Parameter Description
createlist <GUI Client 1> Deletes the current allowed GUI clients and creates a
<GUI Client 2> ... new list of allowed GUI clients.
del <GUI Client 1> <GUI Deletes the specified the GUI clients.
Client 2> ...
Examples
Example 6 - Delete the current list and create a new list of allowed GUI clients
[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#
cp_conf finger
Description
Shows the Internal Certificate Authority's Fingerprint.
This fingerprint is a text string derived from the ICA certificate on the Security Management Server, Multi-
Domain Server, or Domain Management Server.
This fingerprint verifies the identity of the Security Management Server, Multi-Domain Server, or Domain
Management Server when you connect to it with SmartConsole.
mdsenv
Syntax
cp_conf finger
-h
get
Parameters
Parameter Description
Example
cp_conf lic
Description
Shows, adds and deletes Check Point licenses.
Note - This command corresponds to the option Licenses and contracts in the
"cpconfig" on page 133 menu.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
cp_conf lic
-h
add -f <Full Path to License File>
add -m <Host> <Date> <Signature Key> <SKU/Features>
del <Signature Key>
get [-x]
Parameters
Parameter Description
add -f <Full Path to License Adds a license from the specified Check Point license
File> file.
You get this license file in the Check Point User Center.
This is the same command as the "cplic db_add" on
page 144.
cp_log_export
Description
Exports Check Point logs over syslog.
For more information, see sk122323 and R80.40 Logging and Monitoring Administration Guide.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
cp_log_export
Parameters
Parameter Description
<command-name> help Shows the built help for the specified internal command.
Internal Commands
Name Description
reexport Reset the current position and reexport all logs per the configuration.
Required
for
Required "show", Required
Required Required
for "status", for
Name Description for "add" for "set"
"delete" "start", "reexport"
command command
command "stop", command
"restart"
command
Required
for
Required "show", Required
Required Required
for "status", for
Name Description for "add" for "set"
"delete" "start", "reexport"
command command
command "stop", command
"restart"
command
Required
for
Required "show", Required
Required Required
for "status", for
Name Description for "add" for "set"
"delete" "start", "reexport"
command command
command "stop", command
"restart"
command
cpca_client
Description
Execute operations on the Internal Certificate Authority (ICA).
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
cpca_client [-d]
create_cert <options>
double_sign <options>
get_crldp <options>
get_pubkey <options>
init_certs <options>
lscert <options>
revoke_cert <options>
revoke_non_exist_cert <options>
search <options>
set_mgmt_tool <options>
set_sign_hash <options>
Parameters
Parameter Description
create_cert <options> Issues a SIC certificate for the Security Management Server or
Domain Management Server.
See "cpca_client create_cert" on page 110.
Parameter Description
get_crldp <options> Shows how to access a CRL file from a CRL Distribution Point.
See "cpca_client get_crldp" on page 114.
get_pubkey <options> Saves the encoding of the public key of the ICA's certificate to a file.
See "cpca_client get_pubkey" on page 115.
init_certs <options> Imports a list of DNs for users and creates a file with registration
keys for each user.
See "cpca_client init_certs" on page 116.
set_sign_hash Sets the hash algorithm that the CA uses to sign the file hash.
<options>
See "cpca_client set_sign_hash" on page 130.
cpca_client create_cert
Description
Issues a SIC certificate for the Security Management Server or Domain Management Server.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.
-p <CA port Specifies the TCP port on the Security Management Server or Domain
number> Management Server, which is used to connect to the Certificate Authority.
The default TCP port number is 18209.
-f <Full Path to Specifies the PKCS12 file, which stores the certificate and keys.
PKCS12 file>
-c "<Comment for Optional. Specifies the certificate comment (must enclose in double quotes).
Certificate>"
Example
cpca_client double_sign
Description
Creates a second signature for a certificate.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.
-p <CA port Optional. Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.
-o <Full Path to Optional. Saves the certificate into the specified file.
Output File>
Example
[Expert@MGMT:0]#
cpca_client get_crldp
Description
Shows how to access a CRL file from a CRL Distribution Point.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
-p <CA Optional. Specifies the TCP port on the Security Management Server or Domain
port Management Server, which is used to connect to the Certificate Authority.
number>
The default TCP port number is 18209.
Example
cpca_client get_pubkey
Description
Saves the encoding of the public key of the ICA's certificate to a file.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
cpca_client [-d] get_pubkey [-p <CA port number>] <Full Path to Output
File>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
-p <CA port Specifies the TCP port on the Security Management Server or Domain
number> Management Server, which is used to connect to the Certificate Authority.
The default TCP port number is 18209.
<Full Path to Saves the encoding of the public key of the ICA's certificate to the specified file.
Output File>
Example
cpca_client init_certs
Description
Imports a list of Distinguished Names (DN) for users and creates a file with registration keys for each user.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
-p <CA port Optional. Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.
...CN=test1,OU=users...
<Empty Line>
...CN=test2,OU=users...
cpca_client lscert
Description
Shows all certificates issued by the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
-dn <SubString> Optional. Filters the search results to those with a DN that
matches the specified <SubString>.
This command does not support multiple values.
-stat {Pending | Valid | Optional. Filters the search results to those with certificate
Revoked | Expired | status that matches the specified status.
Renewed}
This command does not support multiple values.
-kind {SIC | IKE | User | Optional. Filters the search results to those with certificate
LDAP} kind that matches the specified kind.
This command does not support multiple values.
-ser <Certificate Serial Optional. Filters the search results to those with certificate
Number> serial number that matches the specified serial number.
This command does not support multiple values.
Example
Subject = CN=VSX2,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Revoked Kind = SIC Serial = 5521 DP = 0
Not_Before: Sun Apr 8 14:10:01 2018 Not_After: Sat Apr 8 14:10:01 2023
Subject = CN=VSX1,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Revoked Kind = SIC Serial = 9113 DP = 0
Not_Before: Sun Apr 8 14:09:02 2018 Not_After: Sat Apr 8 14:09:02 2023
cpca_client revoke_cert
Description
Revokes a certificate issued by the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
-p <CA port Optional. Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.
Example
Note - You can use the parameter '-n' only, or together with the
parameter "-s".
Note - You can use the parameter "-s" only, or together with the
parameter "-n".
cpca_client revoke_non_exist_cert
Description
Revokes a non-existent certificate issued by the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parame
Description
ter
-i Specifies the file that contains the list of the certificate to revoke.
<Full
You must create this file in the same format as the "cpca_client lscert" on page 117
Path
command prints its output.
to
Input Example
File>
Subject = CN=cp_mgmt,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 30287 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7
19:40:12 2023
<Empty Line>
Subject = CN=cp_mgmt,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 60870 DP = 0
Not_Before: Sat Apr 7 19:40:13 2018 Not_After: Fri Apr 7
19:40:13 2023
Note - This command saves the error messages in the <Name of Input
File>.failures file.
cpca_client search
Description
Searches for certificates in the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Parameter Description
-where {dn | comment | serial | device_ Optional. Specifies the certificate's field, in
type | device_id | device_name} which to search for the string:
n dn - Certificate DN
n comment - Certificate comment
n serial - Certificate serial number
n device_type - Device type
n device_id - Device ID
n device_name - Device Name
The default is to search in all fields.
-kind {SIC | IKE | User | LDAP} Optional. Specifies the certificate kind to
search.
You can enter multiple values in this format:
-kind <Kind1> <Kind2> <Kind3>
The default is to search for all kinds.
Example 1
[Expert@MGMT:0]# cpca_client search samplecompany -where comment -kind SIC LDAP -stat Pending Valid Renewed
Example 2
Subject = CN=192.168.3.51,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 73455 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
Fingerprint = XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX
Thumbprint = xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx
[Expert@MGMT:0]#
Example 3
Subject = CN=192.168.3.51,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 73455 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
[Expert@MGMT:0]#
cpca_client set_mgmt_tool
Description
Controls the ICA Management Tool.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
See:
n sk30501: Setting up the ICA Management Tool
n sk39915: Invoking the ICA Management Tool
n sk102837: Best Practices - ICA Management Tool configuration
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
add Adds the specified administrator, user, or custom user that is permitted to use the
ICA Management Tool.
remove Removes the specified administrator, user, or custom user that is permitted to
use the ICA Management Tool.
clean Removes all administrators, users, or custom users that are permitted to use the
ICA Management Tool.
Parameter Description
print Shows the configured administrators, users, or custom users that are permitted to
use the ICA Management Tool.
-p <CA port Optional. Specifies the TCP port on the Security Management Server or Domain
number> Management Server, which is used to connect to the Certificate Authority.
The default TCP port number is 18265.
-a < Optional. Specifies the DN of the administrator that is permitted to use the ICA
Administrator Management Tool.
DN>
Must specify the full DN as appears in SmartConsole
Procedure
Example:
-a "CN=ICA_Tool_Admin,OU=users,O=MGMT.s6t98x"
Parameter Description
-u <User DN> Optional. Specifies the DN of the user that is permitted to use the ICA
Management Tool.
Must specify the full DN as appears in SmartConsole:
Procedure
Example:
-u "CN=ICA_Tool_User,OU=users,O=MGMT.s6t98x"
-c <Custom Optional. Specifies the DN for the custom user that is permitted to use the ICA
User DN> Management Tool.
Must specify the full DN as appears in SmartConsole.
Procedure
Example:
-c "CN=ICA_Tool_User,OU=users,O=MGMT.s6t98x"
cpca_client set_sign_hash
Description
Sets the hash algorithm that the CA uses to sign the file hash. Also, see sk103840.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Important - After this change, you must restart the Check Point services with these commands:
n On Security Management Server, run:
1. cpstop
2. cpstart
Parameters
Parameter Description
{sha1 | sha256 | sha384 | The hash algorithms that the CA uses to sign the file
sha512} hash.
The default algorithm is SHA-256.
Example
cpca_create
Description
Creates new Check Point Internal Certificate Authority database.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
-dn <CA DN> Specifies the Certificate Authority Distinguished Name (DN).
cpconfig
Description
This command starts the Check Point Configuration Tool.
This tool lets you configure specific settings for the installed Check Point products.
Syntax
cpconfig
Menu Options
Note - The options shown depend on the configuration and installed products.
Licenses and Manages Check Point licenses and contracts on this server.
contracts
GUI Clients Configures the GUI clients that can use SmartConsole to connect to this
server.
Random Pool Configures the RSA keys, to be used by Gaia Operating System.
Certificate Authority Initializes the Internal Certificate Authority (ICA) and configures the
Certificate Authority's (CA) Fully Qualified Domain Name (FQDN).
Automatic start of Shows and controls which of the installed Check Point products start
Check Point Products automatically during boot.
[Expert@MyMGMT:0]# cpconfig
This program will let you re-configure
your Check Point Security Management Server configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) Administrator
(3) GUI Clients
(4) SNMP Extension
(5) Random Pool
(6) Certificate Authority
(7) Certificate's Fingerprint
(8) Automatic start of Check Point Products
(9) Exit
cpinfo
Description
A utility that collects diagnostics data on your Check Point computer at the time of execution.
It is mandatory to collect these data when you contact Check Point Support about an issue on your Check
Point computer.
For more information, see sk92739.
cplic
Description
The cplic command lets you manage Check Point licenses.
You can run this command in Gaia Clish or in the Expert mode.
License Management is divided into three types of commands:
Licensing
Applies To Description
Commands
Local licensing Management Servers, You execute these commands locally on the Check Point
commands computers.
Security Gateways
and Cluster Members
For more about managing licenses, see the R80.40 Security Management Administration Guide.
cplic [-d]
{-h | -help}
check <options>
contract <options>
del <options>
print <options>
put <options>
Syntax for Remote Licensing on managed Security Gateways and Cluster Members
cplic [-d]
{-h | -help}
del <options>
get <options>
put <options>
upgrade <options>
cplic [-d]
{-h | -help}
db_add <options>
db_print <options>
db_rm <options>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
check <options> Confirms that the license includes the feature on the local Security Gateway or
Management Server.
See "cplic check" on page 140.
contract Manages (deletes and installs) the Check Point Service Contract on the local
<options> Check Point computer.
See "cplic contract" on page 142.
Parameter Description
del <options> Deletes a Check Point license on a host, including unwanted evaluation,
expired, and other licenses.
See "cplic del" on page 149.
del <Object Detaches a Central license from a remote managed Security Gateway or
Name> <options> Cluster Member.
See "cplic del <object name>" on page 150.
print <options> Prints details of the installed Check Point licenses on the local Check Point
computer.
See "cplic print" on page 153.
put <Object Attaches one or more Central or Local licenses to a remote managed Security
Name> <options> Gateways and Cluster Members.
See "cplic put <object name>" on page 157.
cplic check
Description
Confirms that the license includes the feature on the local Security Gateway or Management Server. See
sk66245.
Syntax
cplic [-d] check [-p <Product>] [-v <Version>] [{-c | -count}] [-t
<Date>] [{-r | -routers}] [{-S | -SRusers}] <Feature>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
Parameter Description
cplic contract
Description
Deletes the Check Point Service Contract on the local Check Point computer.
Installs the Check Point Service Contract on the local Check Point computer.
Note
n For more information about Service Contract files, see sk33089: What is a
Service Contract File?
n If you install a Service Contract on a managed Security Gateway / Cluster
Member, you must update the license repository on the applicable Management
Server - either with the "cplic get" on page 151 command, or in SmartUpdate.
Syntax
cplic contract -h
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.
cplic db_add
Description
Adds licenses to the license repository on the Management Server.
When you add Local licenses to the license repository, Management Server automatically attaches them
to the managed Security Gateway / Cluster Member with the matching IP address.
When you add Central licenses, you must manually attach them.
Note - You get the license details in the Check Point User Center.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
<SKU/Features> The SKU of the license summarizes the features included in the license.
For example, CPSUITE-EVAL-3DES-vNG
Example
If the file 192.0.2.11.lic contains one or more licenses, the command "cplic db_add -l
192.0.2.11.lic" produces output similar to:
cplic db_print
Description
Shows the details of Check Point licenses stored in the license repository on the Management Server.
Syntax
cplic [-d] db_print {<Object Name> | -all} [{-n | -noheader}] [-x] [{-
t | -type}] [{-a | -attached}]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
Example
cplic db_rm
Description
Removes a license from the license repository on the Management Server.
After you remove the license from the repository, it can no longer use it.
Warning - You can run this command ONLY after you detach the license with the "cplic
del" on page 149 command.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
Example
[Expert@MGMT:0]# cplic db_rm 2f540abb-d3bcb001-7e54513e-kfyigpwn
cplic del
Description
Deletes a Check Point license on a host, including unwanted evaluation, expired, and other licenses.
This command can delete a license on both local computer, and on remote managed computers.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
<Object Name> The name of the Security Gateway / Cluster Member object as defined in
SmartConsole.
Syntax
cplic [-d] del <Object Name> [-F <Output File>] [-ip <Dynamic IP
Address>] <Signature>
Parameters
Parameter Description
<Object Name> The name of the Security Gateway / Cluster Member object as defined
in SmartConsole.
-ip <Dynamic IP Deletes the license on the DAIP Security Gateway with the specified IP
Address> address.
Note - If this parameter is used, then object name must be a DAIP
Security Gateway.
cplic get
Description
Retrieves all licenses from managed Security Gateways and Cluster Members into the license repository
on the Management Server.
This command helps synchronize the license repository with the managed Security Gateways and Cluster
Members.
When you run this command, it updates the license repository with all local changes.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
-all Retrieves licenses from all Security Gateways and Cluster Members in the managed
network.
<IP The IP address of the Security Gateway / Cluster Member, from which licenses are to be
Address retrieved.
>
<Host The name of the Security Gateway / Cluster Member object as defined in SmartConsole,
Name> from which licenses are to be retrieved.
Example
If the Security Gateway with the object name MyGW contains four Local licenses, and the license repository
contains two other Local licenses, the command "cplic get MyGW" produces output similar to this:
cplic print
Description
Prints details of the installed Check Point licenses on the local Check Point computer.
Note - On a Security Gateway / Cluster Member, this command prints all installed
licenses (both Local and Central).
Syntax
Parameters
Parameter Description
Example 1
Example 2
cplic put
Description
Installs one or more Local licenses on a Check Point computer.
Note - You get the license details in the Check Point User Center.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
{-o | - On a Security Gateway / Cluster Member, this command erases only the local
overwrite} licenses, but not central licenses that are installed remotely.
{-c | - Verifies the license. Checks if the IP of the license matches the Check Point
check-only} computer and if the signature is valid.
{-s | - Selects only the local license whose IP address matches the IP address of the
select} Check Point computer.
{-P | -Pre- Use this option after you have upgraded and before you reboot the Check Point
boot} computer.
Use of this option will prevent certain error messages.
Parameter Description
<Host> Hostname or IP address of the Security Gateway / Cluster Member for a local
license.
Hostname or IP address of the Security Management Server / Domain
Management Server for a central license.
< The SKU of the license summarizes the features included in the license.
SKU/Features
For example: CPSUITE-EVAL-3DES-vNG
>
Copy and paste the parameters from the license received from the User Center:
Parameter Description
SKU/features A string listing the SKU and the Certificate Key of the license.
The SKU of the license summarizes the features included in the license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab
Example
Note
n You get the license details in the Check Point User
Center.
n You can attach more than one license.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.
<Object Name> The name of the Security Gateway / Cluster Member object, as defined in
SmartConsole.
-ip <Dynamic IP Installs the license on the Security Gateway with the specified IP address.
Address>
This parameter is used to install a license on a Security Gateway with
dynamically assigned IP address (DAIP).
Note - If you use this parameter, then the object name must be that
of a DAIP Security Gateway.
<SKU/Features> The SKU of the license summarizes the features included in the license.
For example: CPSUITE-EVAL-3DES-vNG
Copy and paste the parameters from the license received from the User Center:
Parameter Description
SKU/features A string listing the SKU and the Certificate Key of the license.
The SKU of the license summarizes the features included in the license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab
cplic upgrade
Description
Upgrades licenses in the license repository with licenses in the specified license file.
Note - You get this license file in the Check Point User Center.
Syntax
Parameters
Parameter Description
-l Upgrades the licenses in the license repository and Check Point Security Gateways /
<Input Cluster Members to match the licenses in the specified file.
File>
Example
This example explains the procedure to upgrade the licenses in the license repository.
There are two Software Blade licenses in the input file:
n One license does not match any license on a remote managed Security Gateway.
n The other license matches an NGX-version license on a managed Security Gateway that has to be
upgraded.
Workflow in this example:
1. Upgrade the Security Management Server to the latest version.
Ensure that there is connectivity between the Security Management Server and the Security
Gateways with the previous product versions.
2. Import all licenses into the license repository.
You can also do this after you upgrade the products on the remote Security Gateways.
3. Run this command:
Example:
Example:
5. In the Check Point User Center, view the licenses for the products that were upgraded from version
NGX to a Software Blades license.
You can also create new upgraded licenses.
6. Download a file containing the upgraded licenses.
Only download licenses for the products that were upgraded from version NGX to Software Blades.
7. If you did not import the version NGX licenses into the repository, import the version NGX licenses
now.
Use this command:
n The licenses in the downloaded license file and in the license repository are compared.
n If the certificate keys and features match, the old licenses in the repository and in the remote
Security Gateways are updated with the new licenses.
n A report of the results of the license upgrade is printed.
For more about managing licenses, see the R80.40 Security Management Administration Guide.
cppkg
Description
Manages the SmartUpdate software packages repository on the Security Management Server.
Important - Installing software packages with the SmartUpdate is not supported for
Security Gateways running on Gaia OS.
Syntax
cppkg
add <options>
{del | delete} <options>
get
getroot
print
setroot <options>
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the MDS (run
mdsenv).
Parameters
Parameter Description
get Updates the list of the SmartUpdate software packages in the repository.
See "cppkg get" on page 167.
getroot Shows the path to the root directory of the repository (the value of the
environment variable $SUROOT).
setroot <options> Configures the path to the root directory of the repository.
See "cppkg setroot" on page 170.
cppkg add
Description
Adds a SmartUpdate software package to the SmartUpdate software packages repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
n This command does not overwrite existing packages. To overwrite an existing
package, you must first delete the existing package.
n You get the SmartUpdate software packages from the Check Point Support
Center.
Syntax
Parameters
Parameter Description
<Full Path to Specifies the full local path on the computer to the SmartUpdate
Package> software package.
Example - Adding R77.20 HFA_75 (R77.20.75) firmware package for 1100 Appliances
cppkg delete
Description
Deletes SmartUpdate software packages from the SmartUpdate software packages repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
Parameters
Parameter Description
del | When you do not specify optional parameters, the command runs in the interactive
delete mode. The command shows the menu with applicable options.
Notes:
n To see the values for the optional parameters, run the "cppkg print" on page 169
command.
n You must specify all optional parameters, or no parameters.
Select package:
--------------------
(0) Delete all
(1) CP1100 Gaia Embedded Check Point R77.20 R77.20
(e) Exit
You chose to delete 'CP1100 Gaia Embedded Check Point R77.20 R77.20', Is this correct? [y/n] : y
[Expert@MGMT:0]# cppkg delete "Check Point" "CP1100" "R77.20" "Gaia Embedded" "R77.20"
Package was successfully removed from the repository
[Expert@MGMT:0]#
cppkg get
Description
Updates the list of the SmartUpdate software packages in the SmartUpdate software packages repository
based on the real content of the repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
cppkg get
Example
cppkg getroot
Description
Shows the path to the root directory of the SmartUpdate software packages repository (the value of the
environment variable $SUROOT)
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
cppkg getroot
Example
cppkg print
Description
Prints the list of SmartUpdate software packages in the SmartUpdate software packages repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
cppkg print
cppkg setroot
Description
Configures the path to the root directory of the SmartUpdate software packages repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
n The default path is: /var/log/cpupgrade/suroot
n When changing repository root directory:
l This command copies the software packages from the old repository to
the new repository. A package in the new location is overwritten by a
package from the old location, if the packages have the same name.
l This command updates the value of the environment variable $SUROOT
in the Check Point Profile shell scripts ($CPDIR/tmp/.CPprofile.sh
and $CPDIR/tmp/.CPprofile.csh).
Syntax
Example
cpprod_util
Description
This utility lets you work with Check Point Registry ($CPDIR/registry/HKLM_registry.data)
without manually opening it:
n Shows which Check Point products and features are enabled on this Check Point computer.
n Enables and disables Check Point products and features on this Check Point computer.
Syntax
cpprod_util -dump
Parameters
Parameter Description
"< Specifies the configuration parameter for the specified product or feature.
Parameter
>"
"<Value>" Specifies the value of the configuration parameter for the specified product or feature:
Notes
n On a Multi-Domain Server, you must run this command in the context of the relevant Domain
Management Server.
n If you run the cpprod_util command without parameters, it prints:
l The list of all available products and features (for example, "FwIsFirewallMgmt",
"FwIsLogServer", "FwIsStandAlone")
l The type of the expected argument when you configure a product or feature ("no-
parameter", "string-parameter", or "integer-parameter")
l The type of the returned output ("status-output", or "no-output")
n To redirect the output of the cpprod_util command, you need to redirect the stderr to stdout:
Example:
Examples
Example - Showing a list of all installed Check Point Products Packages on a Management
Server
[Expert@MGMT:0]# cpprod_util CPPROD_GetInstalledProducts
CPFC
IDA
MGMT
FW1
SecurePlatform
NGXCMP
EdgeCmp
SFWCMP
SFWR75CMP
SFWR77CMP
FLICMP
R75CMP
R7520CMP
R7540CMP
R76CMP
R77CMP
PROVIDER-1
Reporting Module
SmartLog
CPinfo
VSEC
DIAG
[Expert@MGMT:0]#
Example - Checking if this Check Point computer is configured as a dedicated Log Server
[Expert@MGMT:0]# cpprod_util FwIsLogServer
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the SmartEvent Server blade is enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerServer
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the SmartEvent Correlation Unit blade
is enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerCorrelationUnit
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the Endpoint Policy Management blade
is enabled
[Expert@MGMT:0]# cpprod_util UepmIsInstalled
1
[Expert@MGMT:0]#
Example - Showing a list of all installed Check Point Products Packages on a Security
Gateway
[Expert@MyGW:0]# cpprod_util CPPROD_GetInstalledProducts
CPFC
IDA
MGMT
FW1
SecurePlatform
CPinfo
DIAG
PPACK
CVPN
[Expert@MyGW:0]#
cprid
Description
Manages the Check Point Remote Installation Daemon (cprid).
This daemon is used for remote upgrade and installation of Check Point products on the managed Security
Gateways.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run these commands in the context of the
MDS (run mdsenv).
Commands
Syntax Description
run_cprid_ Stops and then starts the Check Point Remote Installation Daemon
restart (cprid).
cprinstall
Description
Performs installation of Check Point product packages and associated operations on remote managed
Security Gateways.
Important - Installing software packages with this command is not supported for
Security Gateways that run on Gaia OS.
Notes:
n This command requires a license for SmartUpdate.
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
cprinstall
boot <options>
cprestart <options>
cpstart <options>
cpstop <options>
delete <options>
get <options>
install <options>
revert <options>
show <options>
snapshot <options>
transfer <options>
uninstall <options>
verify <options>
Parameters
Parameter Description
Parameter Description
get n Gets details of the products and the operating system installed on the
<options> managed Security Gateway.
n Updates the management database on the Security Management Server.
revert Restores the managed Security Gateway that runs on SecurePlatform OS from a
<options> snapshot saved on that Security Gateway.
See "cprinstall revert" on page 188.
show Displays all snapshot (backup) files on the managed Security Gateway that runs on
<options> SecurePlatform OS.
See "cprinstall show" on page 189.
snapshot Creates a snapshot on the managed Security Gateway that runs on SecurePlatform
<options> OS and saves it on that Security Gateway.
See "cprinstall snapshot" on page 190.
transfer Transfers a software package from the repository to the managed Security
<options> Gateway without installing the package.
See "cprinstall transfer" on page 191.
cprinstall boot
Description
Reboots the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example
[Expert@MGMT]# cprinstall boot MyGW
cprinstall cprestart
Description
Runs the cprestart command on the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n All Check Point products on the managed Security Gateway must be of the same
version.
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example
[Expert@MGMT:0]# cprinstall cprestart MyGW
cprinstall cpstart
Description
Runs the cpstart command on the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n All Check Point products on the managed Security Gateway must be of the same
version.
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example
[Expert@MGMT]# cprinstall cpstart MyGW
cprinstall cpstop
Description
Runs the cpstop command on the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n All Check Point products on the managed Security Gateway must be of the same
version.
Syntax
Parameters
Parameter Description
-proc Kills the Check Point daemons and Security Servers, while it maintains the active
Security Policy running in the Check Point kernel.
Rules with generic Allow, Drop or Reject action based on services, continue to work.
- Kills the Check Point daemons and Security Servers and unloads the Security Policy
nopolicy from the Check Point kernel.
Example
[Expert@MGMT]# cprinstall cpstop -proc MyGW
cprinstall delete
Description
Deletes a snapshot (backup) file on the managed Security Gateway that runs on SecurePlatform OS.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
<Snapshot File> Specifies the name of the snapshot (backup) on SecurePlatform OS.
Example
[Expert@MGMT]# cprinstall delete MyGW Snapshot25Apr2017
cprinstall get
Description
n Gets details of the products and the operating system installed on the managed Security Gateway.
n Updates the management database on the Security Management Server.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example:
cprinstall install
Description
Installs Check Point products on the managed Security Gateway.
Important - Installing software packages with this command is not supported for
Security Gateways that run Gaia OS.
Notes:
n Before transferring the software package, this command runs the "cprinstall
verify" on page 194 command.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n To see the values for the package attributes, run the "cppkg print" on page 169
command.
Syntax
Parameters
Parameter Description
-boot Reboots the managed Security Gateway after installing the package.
Note - Only reboot after ALL products have the same version. Reboot is canceled
in certain scenarios.
-backup Creates a snapshot on the managed Security Gateway before installing the
package.
Note - Only on Security Gateways that runs on SecurePlatform OS.
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example
cprinstall revert
Description
Restores the managed Security Gateway that runs on SecurePlatform OS from a snapshot saved on that
Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
Parameters
Parameter Description
cprinstall show
Description
Displays all snapshot (backup) files on the managed Security Gateway that runs on SecurePlatform OS.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example
cprinstall snapshot
Description
Creates a snapshot on the managed Security Gateway that runs on SecurePlatform OS and saves it on
that Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
Parameters
Parameter Description
cprinstall transfer
Description
Transfers a software package from the repository to the managed Security Gateway without installing the
package.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n To see the values for the package attributes, run the "cppkg print" on page 169
command.
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
cprinstall uninstall
Description
Uninstalls Check Point products on the managed Security Gateway.
Important - Uninstalling software packages with this command is not supported for
Security Gateways running on Gaia OS.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n Before uninstalling product packages, this command runs the "cprinstall verify"
on page 194 command.
n After uninstalling a product package, you must run the "cprinstall get" on
page 184 command.
n To see the values for the package attributes, run the "cppkg print" on page 169
command.
Syntax
Parameters
Parameter Description
-boot Reboots the managed Security Gateway after uninstalling the package.
Note - Reboot is canceled in certain scenarios.
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example
[Expert@MGMT]# cprinstall uninstall MyGW "checkpoint" "firewall" "R75.20" "R75.20"
Uninstalling firewall R75.20 from MyGW...
Info : Removing package from Check Point Gateway
Info : Product was successfully applied.
Operation Success. Please get network object data to complete the operation.
[Expert@MGMT]#
[Expert@MGMT]# cprinstall get
cprinstall verify
Description
Confirms these operations were successful:
n If a specific product can be installed on the managed Security Gateway.
n That the operating system and currently installed products the managed Security Gateway are
appropriate for the software package.
n That there is enough disk space to install the product the managed Security Gateway.
n That there is a CPRID connection with the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n To see the values for the package attributes, run the "cppkg print" on page 169
command.
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
cpstart
Description
Manually starts all Check Point processes and applications.
Notes:
n For the cprid daemon, use the "cprid" on page 175
command.
n For manually starting specific Check Point processes, see
sk97638.
Syntax
cpstart
cpstat
Description
Displays the status and statistics information of Check Point applications.
Syntax
cpstat [-d] [-h <Host>] [-p <Port>] [-s <SICname>] [-f <Flavor>] [-o
<Polling Interval> [-c <Count>] [-e <Period>]] <Application Flag>
Note - You can write the parameters in the syntax in any order.
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
The output shows the SNMP queries and SNMP responses for the applicable SNMP
OIDs.
-h <Host> Optional.
When you run this command on a Management Server, this parameter specifies the
managed Security Gateway.
<Host> is an IPv4 address, a resolvable hostname, or a DAIP object name.
The default is localhost.
-p <Port> Optional.
Port number of the Application Monitoring (AMON) server.
The default port is 18192.
-s Optional.
<SICname>
Secure Internal Communication (SIC) name of the Application Monitoring (AMON)
server.
Parameter Description
-f <Flavor> Optional.
Specifies the type of the information to collect.
If you do not specify a flavor explicitly, the command uses the first flavor in the
<Application Flag>. To see all flavors, run the cpstat command without any
parameters.
-o <Polling Optional.
Interval>
Specifies the polling interval (in seconds) - how frequently the command collects and
shows the information.
Examples:
n 0 - The command shows the results only once and the stops (this is the default
value).
n 5 - The command shows the results every 5 seconds in the loop.
n 30 - The command shows the results every 30 seconds in the loop.
n N - The command shows the results every N seconds in the loop.
Use this parameter together with the "-c <Count>" parameter and the "-e
<Period>" parameter.
Example:
cpstat os -f perf -o 2
-c <Count> Optional.
Specifies how many times the command runs and shows the results before it stops.
You must use this parameter together with the "-o <Polling Interval>"
parameter.
Examples:
n 0 - The command shows the results repeatedly every <Polling
Interval> (this is the default value).
n 10 - The command shows the results 10 times every <Polling
Interval> and then stops.
n 20 - The command shows the results 20 times every <Polling
Interval> and then stops.
n N - The command shows the results N times every <Polling Interval>
and then stops.
Example:
cpstat os -f perf -o 2 -c 2
Parameter Description
-e <Period> Optional.
Specifies the time (in seconds), over which the command calculates the statistics.
You must use this parameter together with the "-o <Polling Interval>"
parameter.
You can use this parameter together with the "-c <Count>" parameter.
Example:
cpstat os -f perf -o 2 -c 2 -e 60
< Mandatory.
Application
See the table below with flavors for the application flags.
Flag>
Note - The available flags depend on the enabled Software Blades. Some flags are
supported only by a Security Gateway, and some flags are supported only by a
Management Server.
Feature or
Software Flag Flavors
Blade
List of enabled blades fw, ips, av, urlf, vpn, cvpn, aspm, dlp,
Software appi, anti_bot, default, content_
Blades awareness, threat-emulation, default
Feature or
Software Flag Flavors
Blade
Anti-Virus ci default
Feature or
Software Flag Flavors
Blade
QoS fg all
Provisioning PA default
Agent
Feature or
Software Flag Flavors
Blade
Examples
Network interfaces
--------------------------------------------------------------------------------------------------------
------------
|Name|IP |Netmask |Flags|Peer name|Remote IP|Topology|Proxy name|Slaves|Ports|IPv6
Address|IPv6 Len|
--------------------------------------------------------------------------------------------------------
------------
|eth0|192.168.30.40|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth1| 172.30.60.80|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth2| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth3| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth4| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth5| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth6| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth7| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
--------------------------------------------------------------------------------------------------------
------------
[Expert@MyGW:0]#
Interface table
---------------------------------------
|Name|Dir|Total |Accept|Deny |Log|
---------------------------------------
|eth0|in | 2393126| 32589| 2360537| 52|
|eth0|out| 33016| 33016| 0| 0|
|eth1|in | 2360350| 0| 2360350| 0|
|eth1|out| 0| 0| 0| 0|
|eth2|in | 2360350| 0| 2360350| 0|
|eth2|out| 0| 0| 0| 0|
|eth3|in | 2348704| 0| 2348704| 1|
|eth3|out| 0| 0| 0| 0|
|eth4|in | 2360350| 0| 2360350| 0|
|eth4|out| 0| 0| 0| 0|
---------------------------------------
| | |11855896| 65605|11790291| 53|
---------------------------------------
[Expert@MyGW:0]#
Example - CPU utilization
[Expert@HostName:0]# cpstat -f cpu os
CPU User Time (%): 1
CPU System Time (%): 0
CPU Idle Time (%): 99
CPU Usage (%): 1
CPU Queue Length: -
CPU Interrupts/Sec: 172
CPUs Number: 8
[Expert@HostName:0]#
Example - Performance
[Expert@HostName:0]# cpstat os -f perf -o 2 -c 2 -e 60
[Expert@HostName:0]#
Connected clients
-------------------------------------------------------
|Client type |Administrator|Host |Database lock|
-------------------------------------------------------
|SmartConsole|admin |JOHNDOE-PC |false |
-------------------------------------------------------
[Expert@MGMT:0]#
cpstop
Description
Manually stops all Check Point processes and applications.
Notes:
n For the cprid daemon, use the "cprid" on page 175
command.
n For manually stopping specific Check Point processes, see
sk97638.
Syntax
cpstop
cpview
Overview of CPView
Description
CPView is a text based built-in utility on a Check Point computer.
CPView Utility shows statistical data that contain both general system information (CPU, Memory, Disk
space) and information for different Software Blades (only on Security Gateway).
The CPView continuously updates the data in easy to access views.
On Security Gateway, you can use this statistical data to monitor the performance.
For more information, see sk101878.
Syntax
cpview --help
Section Description
Header This view shows the time the statistics in the third view are collected.
It updates when you refresh the statistics.
Navigation This menu bar is interactive. Move between menus with the arrow keys and mouse.
A menu can have sub-menus and they show under the menu bar.
Using CPView
Use these keys to navigate the CPView:
Key Description
Q Quits CPView.
Key Description
Use these keys to save statistics, show help, and refresh statistics:
Key Description
C Saves the current page to a file. The file name format is:
cpview_<ID of the cpview process>.cap<Number of the capture>
cpwd_admin
Description
The Check Point WatchDog (cpwd) is a process that invokes and monitors critical processes such as
Check Point daemons on the local computer, and attempts to restart them if they fail.
Among the processes monitored by Watchdog are fwm, fwd, cpd, DAService, and others.
The list of monitored processes depends on the installed and configured Check Point products and
Software Blades.
The Check Point WatchDog writes monitoring information to the $CPDIR/log/cpwd.elg log file.
The cpwd_admin utility shows the status of the monitored processes, and configures the Check Point
WatchDog.
Monitoring Description
Passive WatchDog restarts the process only when the process terminates abnormally.
In the output of the cpwd_admin list command, the MON column shows N for
passively monitored processes.
Syntax
cpwd_admin
config <options>
del <options>
detach <options>
exist
flist <options>
getpid <options>
kill
list <options>
monitor_list
start <options>
start_monitor
stop <options>
stop_monitor
Parameters
Parameter Description
Parameter Description
start_ Starts the active WatchDog monitoring - WatchDog monitors the predefined
monitor processes actively.
See "cpwd_admin start_monitor" on page 228.
stop_ Stops the active WatchDog monitoring - WatchDog monitors all processes only
monitor passively.
See "cpwd_admin stop_monitor" on page 231.
cpwd_admin config
Description
Configures the Check Point WatchDog.
Important - After changing the WatchDog configuration parameters, you must restart
the WatchDog process with the cpstop and cpstart commands (which restart all
Check Point processes).
Syntax
cpwd_admin config
-h
-a <options>
-d <options
-p
-r
Parameters
Parameter Description
These are the available configuration parameters and the accepted values:
Configuration Accepted
Description
Parameter Values
default_ Text string up On a VSX Gateway, configures the CTX value that is assigned to
ctx to 128 monitored processes, for which no CTX is specified.
characters
rerun_ n 0 Configures whether the WatchDog restarts processes after they fail:
mode
n 1 n 0 - Does not restart a failed process. Monitor and log only.
(default)
n 1 - Restarts a failed process (this is the default).
reset_ n Range: Configures the time (in seconds) the WatchDog waits after the
startups >0 process starts and before the WatchDog resets the process's
startup_counter to 0.
n Default:
3600 To see the process's startup counter, in the output of the cpwd_
admin list command, refer to the #START column.
sleep_ n Range: If rerun_mode=1, specifies how much time (in seconds) passes
timeout 0 - 3600 from a process failure until WatchDog tries to restart it.
n Default:
60
Configuration Accepted
Description
Parameter Values
stop_ n Range: Configures the time (in seconds) the WatchDog waits for a process
timeout >0 stop command to complete.
n Default:
60
zero_ n Range: After failing no_limit times to restart a process, the WatchDog
timeout >0 waits zero_timeout seconds before it tries again.
n Default: The value of the zero_timeout must be greater than the value of
7200 the timeout.
The WatchDog saves the user defined configuration parameters in the $CPDIR/registry/HKLM_
registry.data file in the ": (Wd_Config" section:
Example
cpwd_admin del
Description
Temporarily deletes a monitored process from the WatchDog database of monitored processes.
Notes:
n WatchDog stops monitoring the detached process, but the process stays alive.
n The "cpwd_admin list" on page 221 command does not show the deleted
process anymore.
n This change applies until all Check Point services restart during boot, or with the
"cpstart" on page 196 command.
Parameters
Parameter Description
< Name of the monitored Check Point process as you see in the output of the "cpwd_
Application admin list" on page 221 command in the leftmost column APP.
Name>
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Example
cpwd_admin detach
Description
Temporarily detaches a monitored process from the WatchDog monitoring.
Notes:
n WatchDog stops monitoring the detached process, but the process stays alive.
n The "cpwd_admin list" on page 221 command does not show the detached
process anymore.
n This change applies until all Check Point services restart during boot, or with the
"cpstart" on page 196 command.
Parameters
Parameter Description
< Name of the monitored Check Point process as you see in the output of the "cpwd_
Application admin list" on page 221 command in the leftmost column APP.
Name>
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Example
cpwd_admin exist
Description
Checks whether the WatchDog process cpwd is alive.
Syntax
cpwd_admin exist
Example
cpwd_admin flist
Description
Prints the status of all WatchDog monitored processes on the screen.
Parameters
Parameter Description
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Output
Column Description
CTX On a VSX Gateway, shows the VSID, in which the monitored process runs.
#START Shows how many times the WatchDog started the monitored process.
START_ Shows the time when the WatchDog started the monitored process for the last time.
TIME
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_limit
configuration parameters (see "cpwd_admin config" on page 211).
MON Shows how the WatchDog monitors this process (see the explanation for the "cpwd_
admin" on page 208):
n Y - Active monitoring
n N - Passive monitoring
COMMAND Shows the command the WatchDog run to start this process.
Example
cpwd_admin getpid
Description
Shows the PID of a WatchDog monitored process.
Parameters
Parameter Description
< Name of the monitored Check Point process as you see in the output of the "cpwd_
Application admin list" on page 221 command in the leftmost column APP.
Name>
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On VSX Gateway, specifies the context of the applicable Virtual System.
Example
cpwd_admin kill
Description
Terminates the WatchDog process cpwd.
Important - Do not run this command unless explicitly instructed by Check Point
Support or R&D to do so.
To restart the WatchDog process, you must restart all Check Point services with the
"cpstop" on page 205 and "cpstart" on page 196 commands.
Syntax
cpwd_admin kill
cpwd_admin list
Description
Prints the status of all WatchDog monitored processes on the screen.
Parameters
Parameter Description
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Output
Column Description
CTX On a VSX Gateway, shows the VSID, in which the monitored process runs.
#START Shows how many times the WatchDog started the monitored process.
START_ Shows the time when the WatchDog started the monitored process for the last time.
TIME
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_limit
configuration parameters (see "cpwd_admin config" on page 211).
MON Shows how the WatchDog monitors this process (see the explanation for the "cpwd_
admin" on page 208):
n Y - Active monitoring
n N - Passive monitoring
COMMAND Shows the command the WatchDog run to start this process.
Examples
cpwd_admin monitor_list
Description
Prints the status of actively monitored processes on the screen.
See the explanation about the active monitoring in "cpwd_admin" on page 208.
Syntax
cpwd_admin monitor_list
Example
cpwd_admin start
Description
Starts a process as monitored by the WatchDog.
Parameters
Parameter Description
-name <Application Name, under which the cpwd_admin list command shows the
Name> monitored process in the leftmost column APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
-path "<Full Path The full path (with or without Check Point environment variables) to the
to Executable>" executable including the executable name.
Must enclose in double-quotes.
Examples:
Parameter Description
-env {inherit | Configures whether to inherit the environment variables from the shell.
<Env_Var>=<Value>}
n inherit - Inherits all the environment variables (WatchDog
supports up to 80 environment variables)
n <Env_Var>=<Value> - Assigns the specified value to the
specified environment variable
Example
For the list of process and the applicable syntax, see sk97638.
cpwd_admin start_monitor
Description
Starts the active WatchDog monitoring. WatchDog monitors the predefined processes actively.
See the explanation for the "cpwd_admin" on page 208 command.
Syntax
cpwd_admin start_monitor
Example
cpwd_admin stop
Description
Stops a WatchDog monitored process.
Parameters
Parameter Description
-name <Application Name under which the cpwd_admin list command shows the
Name> monitored process in the leftmost column APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual
System.
Parameter Description
-path "<Full Path to The full path (with or without Check Point environment variables) to the
Executable>" executable including the executable name.
Must enclose in double-quotes.
Examples:
n For FWM: "$FWDIR/bin/fwm"
n For FWD: "/opt/CPsuite-R80.40/fw1/bin/fw"
n For CPD: "$CPDIR/bin/cpd_admin"
-env {inherit | Configures whether to inherit the environment variables from the shell.
<Env_Var>=<Value>}
n inherit - Inherits all the environment variables (WatchDog
supports up to 80 environment variables)
n <Env_Var>=<Value> - Assigns the specified value to the
specified environment variable
Example
For the list of process and the applicable syntax, see sk97638.
cpwd_admin stop_monitor
Description
Stops the active WatchDog monitoring. WatchDog monitors all processes only passively.
See the explanation for the "cpwd_admin" on page 208 command.
Syntax
cpwd_admin stop_monitor
Example
dbedit
Description
Edits the management database - the $FWDIR/conf/objects_5_0.C file - on the Security
Management Server or Domain Management Server. See skI3301.
Important - Do NOT run this command, unless explicitly instructed by Check Point
Support or R&D to do so. Otherwise, you can corrupt settings in the management
database.
Syntax
dbedit -help
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Parameters
Parameter Description
-globallock When you work with the dbedit utility, it partially locks the management database. If a
user configures objects in SmartConsole at the same time, it causes problems in the
management database.
This option does not let SmartConsole, or a dbedit user to make changes in the
management database.
When you specify this option, the dbedit commands run on a copy of the
management database. After you make the changes with the dbedit commands
and run the savedb command, the dbedit utility saves and commits your changes to
the actual management database.
Parameter Description
-u Specifies the username, with which the dbedit utility connects to the Security
<Username> Management Server.
Mandatory parameter when you specify the "-s <Management_Server>"
parameter.
-c < Specifies the user's certificate file, with which the dbedit utility connects to the
Certificate Security Management Server.
>
Mandatory parameter when you specify the "-s <Management_Server>"
parameter.
-p Specifies the user's password, with which the dbedit utility connects to the Security
<Password> Management Server.
Mandatory parameter when you specify the "-s <Management_Server>" and
"-u <Username>" parameters.
-f <File_ Specifies the file that contains the applicable dbedit internal commands (see the
Name> section "dbedit Internal Commands" below):
n create <object_type> <object_name>
n modify <table_name> <object_name> <field_name>
<value>
n update <table_name> <object_name>
n delete <table_name> <object_name>
n print <table_name> <object_name>
n quit
ignore_ Continues to execute the dbedit internal commands in the file and ignores errors.
script_
You can use it when you specify the "-f <File_Name>" parameter.
failure
-continue_ Continues to update the modified objects, even if the operation fails for some of the
updating objects (ignores the errors and runs the update_all command at the end of the
script).
You can use it when you specify the "-f <File_Name>" parameter.
-r "<Open_ Specifies the reason for opening the database in read-write mode (default mode).
Reason_
Text>"
-d Specifies the name of the database, to which the dbedit utility should connect (for
<Database_ example, mdsdb).
Name>
Parameter Description
-listen The dbedit utility "listens" for changes (use this mode for advanced troubleshooting
with the assistance of Check Point Support).
The dbedit utility prints its internal messages when a change occurs in the
management database.
Note - To see the available tables, class names (object types), attributes and values,
connect to Management Server with GuiDBedit Tool.
-h Description:
Prints the general help.
Syntax:
dbedit> -h
-q Description:
Quits from dbedit.
quit Syntax:
dbedit> -q
Examples:
n Exit the utility and commit the remaining modified objects (interactive mode):
dbedit> quit
n Exit the utility and update all the remaining modified objects:
update Description:
Saves the specified object in the specified table (for example, "network_
objects", "services", "users").
Syntax:
Example:
Save the object My_Service in the table services:
update_all Description:
Saves all the modified objects.
Syntax:
dbedit> update_all
_print_set Description:
Prints the specified object from the specified table (for example, "network_
objects", "services", "users") as it appears in the
$FWDIR/conf/objects_5_0.C file (sets of attributes).
Syntax:
Example:
Print the object My_Obj from the table network_objects:
print Description:
Prints the list of attributes of the specified object from the specified table (for
example, "network_objects", "properties", "services", "users").
Syntax:
Examples:
n Print the object My_Obj from the table network_objects (in "Network
Objects"):
n Print the object firewall_properties from the table properties (in "Global
Properties"):
printxml Description:
Prints in XML format the list of attributes of the specified object from the specified
table (for example, "network_objects", "properties", "services",
"users").
You can export the settings from a Management Server to an XML file that you can
use later with external automation systems.
Syntax:
Examples:
n Print the object My_Obj from the table network_objects:
n Print the object firewall_properties from the table properties (in "Global
Properties"):
printbyuid Description:
Prints the attributes of the object specified by its UID (appears in the
$FWDIR/conf/objects_5_0.C file at the beginning of the object as "chkpf_
uid ({...})").
Syntax:
Example:
Print the attributes of the object with the specified UID:
query Description:
Prints all the objects in the specified table.
Optionally, you can query for objects with specific attribute and value - query is
separated by a comma after "query <table_name>" (spaces are not allowed
between the <attribute> and '<value>').
Syntax:
Examples:
n Print all objects in the table users:
n Print all objects in the table network_objects that are defined as Management
Servers:
n Print all objects in the table services with the name ssh:
n Print all objects in the table services with the port 22:
whereused Description:
Checks where the specified object used in the database.
Prints the number of places, where this object is used and relevant information about
each such place.
Syntax:
Example:
Check where the object My_Obj is used:
create Description:
Creates an object of specified type (with its default values) in the database.
Restrictions apply to the object's name:
n Object names can have a maximum of 100 characters.
n Objects names can contain only ASCII letters, numbers, and dashes.
n Reserved words will be blocked by the Management Server (refer to
sk40179).
Syntax:
Example:
Create the service object My_Service of the type tcp_service (with its default
values):
delete Description:
Deletes an object from the specified table.
Syntax:
Example:
Delete the service object My_Service from the table services:
modify Description:
Modifies the value of specified attribute in the specified object in the specified table
(for example, "network_objects", "services", "users") in the management
database.
Syntax:
Examples:
n Modify the color to red in the object My_Service in the table services:
n Create a new interface on the Security Gateway My_FW and modify its
attributes - set the IP address / Mask and enable Anti-Spoofing on interface
with "Element Index"=3 (check the attributes of the object My_FW in
GuiDBedit Tool):
lock Description:
Locks the specified object (by administrator) in the specified table (for example,
"network_objects", "services", "users") from being modified by other users.
For example, if you connect from a remote computer to this Management Server
with admin1 and lock an object, you are be able to connect with admin2, but are not
able to modify the locked object, until admin1 releases the lock.
Syntax:
Example:
Lock the object My_Service_Obj in the table services in the database:
addelement Description:
Adds a specified multiple field / container (with specified value) to a specified object
in specified table.
Syntax:
Examples:
n Add the element BranchObjectClass with the value Organization to a multiple
field Read in the object My_Obj in the table ldap:
rmelement Description:
Removes a specified multiple field / container (with specified value) from a specified
object in specified table.
Syntax:
Examples:
n Remove the service MyService from the group of services MyServicesGroup
from the table services:
n Remove the element BranchObjectClass with the value Organization from the
multiple field Read in the object My_Obj in the table ldap:
rename Description:
Renames the specified object in specified table.
Syntax:
Example:
Rename the network object london to chicago in the table network_objects:
rmbyindex Description:
Removes an element from a container by element's index.
Syntax:
Example:
Remove the element backup_log_servers from the container log_servers by
element index 1 in the table network_objects:
add_owned_ Description:
remove_name
Adds an owned object (and removes its name) to a specified owned object field (or
container).
Syntax:
Example:
Add the owned object My_Gateway (and remove its name) to the owned object field
(or container) my_external_products:
is_delete_ Description:
allowed
Checks if the specified object can be deleted from the specified table (object cannot
be deleted if it is used by other objects).
Syntax:
Example:
Check if the object MyObj can be deleted from the table network_objects:
set_pass Description:
Sets specified password for specified user.
Notes:
n The password must contain at least 4 characters and no more than 50
characters.
n This command cannot change the administrator's password.
Syntax:
Example:
Set the password 1234 for the user abcd:
savedb Description:
Saves the database. You can run this command only when the database is locked
globally (when you start the dbedit utility with the "dbedit -globallock"
command).
Syntax:
dbedit> savedb
savesession Description:
Saves the session. You can run this command only when you start the dbedit utility in
session mode (with the "dbedit -session" command).
Syntax:
dbedit> savesession
fw
Description
n Performs various operations on Security or Audit log files.
n Kills the specified Check Point processes.
n Manages the Suspicious Activity Monitoring (SAM) rules.
n Manages the Suspicious Activity Policy editor.
Syntax
fw [-d]
fetchlogs <options>
hastat <options>
kill <options>
log <options>
logswitch <options>
lslogs <options>
mergefiles <options>
repairlog <options>
sam <options>
sam_policy <options>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
fetchlogs Fetches the specified Check Point log files - Security ($FWDIR/log/*.log*) or
<options> Audit ($FWDIR/log/*.adtlog*), from the specified Check Point computer.
hastat Shows information about Check Point computers in High Availability configuration and
<options> their states.
See "fw hastat" on page 249.
Parameter Description
log Shows the content of Check Point log files - Security ($FWDIR/log/*.log) or Audit
<options> ($FWDIR/log/*.adtlog).
logswitch Switches the current active Check Point log file - Security ($FWDIR/log/fw.log) or
<options> Audit ($FWDIR/log/fw.adtlog).
lslogs Shows a list of Check Point log files - Security ($FWDIR/log/*.log*) or Audit
<options> ($FWDIR/log/*.adtlog*), located on the local computer or a remote computer.
mergefiles Merges several Check Point log files - Security ($FWDIR/log/*.log) or Audit
<options> ($FWDIR/log/*.adtlog), into a single log file.
repairlog Rebuilds pointer files for Check Point log files - Security ($FWDIR/log/*.log) or
<options> Audit ($FWDIR/log/*.adtlog).
sam_policy Manages the Suspicious Activity Policy editor that lets you work with these type of
<options> rules:
fw fetchlogs
Description
Fetches the specified Security log files ($FWDIR/log/*.log*) or Audit log files
($FWDIR/log/*.adtlog*) from the specified Check Point computer.
Syntax
fw [-d] fetchlogs [-f <Name of Log File 1>] [-f <Name of Log File
2>]... [-f <Name of Log File N>] <Target>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
-f <Name Specifies the name of the log file to fetch. Need to specify name only.
of Log
Notes:
File N>
n If you do not specify the log file name explicitly, the command transfers all Security
log files ($FWDIR/log/*.log*) and all Audit log files
($FWDIR/log/*.adtlog*).
n The specified log file name can include wildcards * and ? (for example, 2017-0?-
*.log).
If you enter a wildcard, you must enclose it in double quotes or single quotes.
n You can specify multiple log files in one command.
You must use the -f parameter for each log file name pattern.
n This command also transfers the applicable log pointer files.
<Target> Specifies the remote Check Point computer, with which this local Check Point computer
has established SIC trust.
n If you run this command on a Security Management Server or Domain
Management Server, then <Target> is the applicable object's name or main IP
address of the Check Point Computer as configured in SmartConsole.
n If you run this command on a Security Gateway or Cluster Member, then
<Target> is the main IP address of the applicable object as configured in
SmartConsole.
Notes:
n This command moves the specified log files from the $FWDIR/log/ directory on the specified
Check Point computer. Meaning, it deletes the specified log files on the specified Check Point
computer after it copies them successfully.
n This command moves the specified log files to the $FWDIR/log/ directory on the local Check Point
computer, on which you run this command.
n This command cannot fetch the active log files $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog.
To fetch these active log files:
1. Perform log switch on the applicable Check Point computer:
2. Fetch the rotated log file from the applicable Check Point computer:
n This command renames the log files it fetched from the specified Check Point computer. The new
log file name is the concatenation of the Check Point computer's name (as configured in
SmartConsole), two underscore (_) characters, and the original log file name (for example: MyGW__
2019-06-01_000000.log).
[Expert@HostName:0]# ls $FWDIR/log/MyGW*
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.log
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.logaccount_ptr
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.loginitial_ptr
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.logptr
[Expert@HostName:0]#
fw hastat
Description
Shows information about Check Point computers in High Availability configuration and their states.
Note - This command is outdated. On cluster members, run the Gaia Clish command
"show cluster state", or the Expert mode command "cphaprob state".
Syntax
Parameters
Parameter Description
[Expert@Member1:0]# fw hastat
HOST NUMBER HIGH AVAILABILITY STATE MACHINE STATUS
192.168.3.52 1 active OK
[Expert@Member1:0]#
fw kill
Description
Kills the specified Check Point processes.
Important - Make sure the killed process is restarted, or restart it manually. See sk97638.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.
Example
fw kill fwd
fw log
Description
Shows the content of Check Point log files - Security ($FWDIR/log/*.log) or Audit
($FWDIR/log/*.adtlog).
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
-b "<Start Shows only entries that were logged between the specified start and end
Timestamp>" times.
"<End
n The <Start Timestamp> and <End Timestamp> may be a date,
Timestamp>"
a time, or both.
n If date is omitted, then the command assumes the current date.
n Enclose the "<Start Timestamp>" and "<End Timestamp> in
single or double quotes (-b 'XX' 'YY", or -b "XX" "YY).
n You cannot use the "-b" parameter together with the "-s" or "-e"
parameters.
n See the date and time format below.
Parameter Description
-c <Action> Shows only events with the specified action. One of these:
n accept
n drop
n reject
n encrypt
n decrypt
n vpnroute
n keyinst
n authorize
n deauthorize
n authcrypt
n ctl
Notes:
n The fw log command always shows the Control (ctl) actions.
n For login action, use the authcrypt.
-e "<End Shows only entries that were logged before the specified time.
Timestamp>"
Notes:
n The <End Timestamp> may be a date, a time, or both.
n Enclose the <End Timestamp> in single or double quotes (-e
'...', or -e "...").
n You cannot use the "-e" parameter together with the "-b" parameter.
n See the date and time format below.
-f This parameter:
1. Shows the saved entries that match the specified conditions.
2. After the command reaches the end of the currently opened log file, it
continues to monitor the log file indefinitely and shows the new entries
that match the specified conditions.
Parameter Description
-h <Origin> Shows only logs that were generated by the Security Gateway with the
specified IP address or object name (as configured in SmartConsole).
-l Shows both the date and the time for each log entry.
The default is to show the date only once above the relevant entries, and then
specify the time for each log entry.
-n Does not perform DNS resolution of the IP addresses in the log file (this is the
default behavior).
This significantly speeds up the log processing.
Parameter Description
-o Shows detailed log chains - shows all the log segments in the log entry.
-p Does not perform resolution of the port numbers in the log file (this is the
default behavior).
This significantly speeds up the log processing.
-s "<Start Shows only entries that were logged after the specified time.
Timestamp>"
Notes:
n The <Start Timestamp> may be a date, a time, or both.
n If the date is omitted, then the command assumed the current date.
n Enclose the <Start Timestamp> in single or double quotes (-s
'...', or -s "...").
n You cannot use the "-s" parameter together with the "-b" parameter.
n See the date and time format below.
-t This parameter:
1. Does not show the saved entries that match the specified conditions.
2. After the command reaches the end of the currently opened log file, it
continues to monitor the log file indefinitely and shows the new entries
that match the specified conditions.
-u <Unification Specifies the path and name of the log unification scheme file.
Scheme File>
The default log unification scheme file is:
$FWDIR/conf/log_unification_scheme.C
-w Shows the flags of each log entry (different bits used to specify the "nature" of
the log - for example, control, audit, accounting, complementary, and so on).
-x <Start Entry Shows only entries from the specified log entry number and below, counting
Number> from the beginning of the log file.
-y <End Entry Shows only entries until the specified log entry number, counting from the
Number> beginning of the log file.
-z In case of an error (for example, wrong field value), continues to show log
entries.
The default behavior is to stop.
Parameter Description
Output
Each output line consists of a single log entry, whose fields appear in this format:
Note - The fields that show depends on the connection type.
ContentVersion Version 5
LogId Log ID 0
Examples
Example 1 - Show all log entries with both the date and the time for each log entry
fw log -l
Example 2 - Show all log entries that start after the specified timestamp
[Expert@MyGW:0]# fw log -l -s "June 12, 2018 12:33:00"
12Jun2018 12:33:00 5 N/A 1 accept MyGW > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; fg-1_client_in_rule_name: Default; fg-1_client_out_rule_name: Default; fg-1_server_in_rule_
name: Host Redirect; fg-1_server_out_rule_name: ; ProductName: FG; ProductFamily: Network;
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_
match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy
Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table:
TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp;
sport_svc: 64933; ProductFamily: Network;
[Expert@MyGW:0]#
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_
match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy
Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table:
TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp;
sport_svc: 64933; ProductFamily: Network;
12Jun2018 12:33:45 5 N/A 1 ctl MyGW > LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; description: Contracts; reason: Could not reach
"https://productcoverage.checkpoint.com/ProductCoverageService". Check DNS and Proxy configuration on the gateway.; Severity:
2; status: Failed; version: 1.0; failure_impact: Contracts may be out-of-date; update_service: 1; ProductName: Security
Gateway/Management; ProductFamily: Network;
[Expert@MyGW:0]#
Example 5 - Show all log entries with action "drop", show all field headers, and show log
flags
[Expert@MyGW:0]# fw log -l -q -w -c drop
HeaderDateHour: 12Jun2018 12:33:39; ContentVersion: 5; HighLevelLogKey: <max_null>; LogUid: ; SequenceNum: 1; Flags: 428292;
Action: drop; Origin: MyGW; IfDir: <; InterfaceName: eth0; Alert: ; LogId: 0; ContextNum: <max_null>; OriginSicName:
CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst:
MyFTPServer; proto: tcp; UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-
9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_
match_table: TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END;
ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933; ProductFamily: Network;
[Expert@MyGW:0]#
Example 6 - Show only log entries from 0 to 10 (counting from the beginning of the log file)
[Expert@MyGW:0]# fw log -l -x 0 -y 10
... ...
[Expert@MyGW:0]#
fw logswitch
Description
Switches the current active log file:
1. Closes the current active log file
2. Renames the current active log file
3. Creates a new active log file with the default name
Notes:
n By default, this command switches the active Security log file -
$FWDIR/log/fw.log
n You can specify to switch the active Audit log file - $FWDIR/log/fw.adtlog
Syntax
fw [-d] logswitch
[-audit] [<Name of Switched Log>]
-h <Target> [[+ | -]<Name of Switched Log>]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
Parameter Description
+ Specifies to copy the active log from the remote computer to the local computer.
Notes:
n If you specify the name of the switched log file, you must write it immediately
after this + (plus) parameter.
n The command copies the active log from the remote computer and saves it in
the $FWDIR/log/ directory on the local computer.
Parameter Description
- Specifies to transfer the active log from the remote computer to the local computer.
Notes:
n The command saves the copied active log file in the $FWDIR/log/ directory
on the local computer and then deletes the switched log file on the remote
computer.
n If you specify the name of the switched log file, you must write it immediately
after this - (minus) parameter.
n The default name of the saved log file is:
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
For example, MyGW__2018-03-26_174455.log
n If you specify the name of the switched log file, then the name of the saved log
file is:
<Gateway_Object_Name>__<Specified_Log_Name>.log
n When this command transfers the log file from the remote computer, it
compresses the file.
n As an alternative, you can use the "fw fetchlogs" on page 247 command.
Compression
When this command transfers the log files from the remote computer, it compresses the file with the gzip
command (see RFC 1950 to RFC 1952 for details). The algorithm is a variation of LZ77 method. The
compression ratio varies with the content of the log file and is difficult to predict. Binary data are not
compressed. Text data, such as user names and URLs, are compressed.
Example - Switching the active Security log on a Security Management Server or Security
Gateway
[Expert@MGMT:0]# fw logswitch
Log file has been switched to: 2018-06-13_182359.log
[Expert@MGMT:0]#
Example - Switching the active Security log on a managed Security Gateway and copying
the switched log
[Expert@MGMT:0]# fw logswitch -h MyGW +
Log file has been switched to: 2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MGMT:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R80.40/fw1/log/fw.log
/opt/CPsuite-R80.40/fw1/log/MyGW__2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MyGW:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R80.40/fw1/log/fw.log
/opt/CPsuite-R80.40/fw1/log/2018-06-13_185451.log
[Expert@MyGW:0]#
fw lslogs
Description
Shows a list of Security log files ($FWDIR/log/*.log) and Audit log files ($FWDIR/log/*.adtlog)
residing on the local computer or a remote computer.
Syntax
fw [-d] lslogs [-f <Name of Log File 1>] [-f <Name of Log File 2>] ...
[-f <Name of Log File N>] [-e] [-r] [-s {name | size | stime | etime}]
[<Target>]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
-f <Name of Specifies the name of the log file to show. Need to specify name only.
Log File>
Notes:
n If the log file name is not specified explicitly, the command shows all Security
log files ($FWDIR/log/*.log).
n File names may include * and ? as wildcards (for example, 2019-0?-*). If
you enter a wildcard, you must enclose it in double quotes or single quotes.
n You can specify multiple log files in one command. You must use the "-f"
parameter for each log file name pattern:
-f <Name of Log File 1> -f <Name of Log File 2> ... -
f <Name of Log File N>
-e Shows an extended file list. It includes the following information for each log file:
n Size - The total size of the log file and its related pointer files
n Creation Time - The time the log file was created
n Closing Time - The time the log file was closed
n Log File Name - The file name
Parameter Description
-s {name | Specifies the sort order of the log files using one of the following sort options:
size |
stime | n name - The file name
etime} n size - The file size
n stime - The time the log file was created (this is the default option)
n etime - The time the log file was closed
<Target> Specifies the remote Check Point computer, with which this local Check Point
computer has established SIC trust.
n If you run this command on a Security Management Server or Domain
Management Server, then <Target> is the applicable object's name or main
IP address of the Check Point Computer as configured in SmartConsole.
n If you run this command on a Security Gateway or Cluster Member, then
<Target> is the main IP address of the applicable object as configured in
SmartConsole.
[Expert@HostName:0]# fw lslogs
Size Log file name
9KB 2019-06-14_000000.log
11KB 2019-06-15_000000.log
9KB 2019-06-16_000000.log
10KB 2019-06-17_000000.log
9KB fw.log
[Expert@HostName:0]#
Example 4 - Showing only log files specified by the patterns and their extended information
Example 5 - Showing only log files specified by the patterns, sorting by name in reverse order
Example 6 - Showing only log files specified by the patterns, from a managed Security Gateway with main
IP address 192.168.3.53
fw mergefiles
Description
Merges several Security log files ($FWDIR/log/*.log) into a single log file.
Merges several Audit log files ($FWDIR/log/*.adtlog) into a single log file.
Important:
n Do not merge the active Security file $FWDIR/log/fw.log with other Security
switched log files.
Switch the active Security file $FWDIR/log/fw.log (with the "fw
logswitch" command) and only then merge it with other Security switched log
files.
n Do not merge the active Audit file $FWDIR/log/fw.adtlog with other Audit
switched log files.
Switch the active Audit file $FWDIR/log/fw.adtlog (with the "fw
logswitch" command) and only then merge it with other Audit switched log
files.
n This command unifies logs entries with the same Unique-ID (UID). If you rotate
the current active log file before all the segments of a specific log arrive, this
command merges the records with the same Unique ID from two different files,
into one fully detailed record.
n If the size of the final merged log file exceeds 2GB, this command creates a list
of merged files, where the size of each merged file size is not more than 2GB.
The user receives this warning:
Syntax
fw [-d] mergefiles [-r] [-s] [-t <Time Conversion File>] <Name of Log
File 1> <Name of Log File 2> ... <Name of Log File N> <Name of Merged
Log File>
Parameters
Parameter Description
-t <Time Conversion File> Specifies a full path and name of a file that instructs this
command how to adjust the times during the merge.
This is required if you merge log files from Log Servers
configured with different time zones.
The file format is:
Notes
n You must specify the absolute path and the
file name.
n The name of the time conversion file cannot
exceed 230 characters.
<Name of Log File 1> ... Specifies the log files to merge.
<Name of Log File N>
Notes:
n You must specify the absolute path and the
name of the input log files.
n The name of the input log file cannot exceed
230 characters.
Parameter Description
<Name of Merged Log File> Specifies the output merged log file.
Notes:
n The name of the merged log file cannot
exceed 230 characters.
n If a file with the specified name already exists,
the command stops and asks you to remove
the existing file, or to specify another name.
n The size of the merged log file cannot exceed
2 GB. In such scenario, the command creates
several merged log files, each not exceeding
the size limit.
[Expert@HostName:0]# ls -l $FWDIR/*.log
-rw-rw-r-- 1 admin root 189497 Sep 7 00:00 2019-09-07_000000.log
-rw-rw-r-- 1 admin root 14490 Sep 9 09:52 2019-09-09_000000.log
-rw-rw-r-- 1 admin root 30796 Sep 10 10:56 2019-09-10_000000.log
-rw-rw-r-- 1 admin root 24503 Sep 10 13:08 fw.log
[Expert@HostName:0]#
[Expert@HostName:0]# fw mergefiles -s $FWDIR/2019-09-07_000000.log $FWDIR/2019-09-09_000000.log
$FWDIR/2019-09-10_000000.log /var/log/2019-Sep-Merged.log
[Expert@HostName:0]#
[Expert@HostName:0]# ls -l /var/log/2019-Sep-Merged.log*
-rw-rw---- 1 admin root 213688 Sep 10 13:18 /var/log/2019-Sep-Merged.log
-rw-rw---- 1 admin root 8192 Sep 10 13:18 /var/log/2019-Sep-Merged.logLuuidDB
-rw-rw---- 1 admin root 80 Sep 10 13:18 /var/log/2019-Sep-Merged.logaccount_ptr
-rw-rw---- 1 admin root 2264 Sep 10 13:18 /var/log/2019-Sep-Merged.loginitial_ptr
-rw-rw---- 1 admin root 4448 Sep 10 13:18 /var/log/2019-Sep-Merged.logptr
[Expert@HostName:0]#
fw repairlog
Description
Check Point Security log file ($FWDIR/log/*.log) and Audit log files ($FWDIR/log/*.adtlog) are
databases, with special pointer files.
If these log pointer files become corrupted (which causes the inability to read the log file), this command
can rebuild them.
Syntax
Parameters
Parameter Description
fw sam
Description
Manages the Suspicious Activity Monitoring (SAM) rules. You can use the SAM rules to block connections
to and from IP addresses without the need to change or reinstall the Security Policy. For more information,
see sk112061.
You can create the Suspicious Activity Rules in two ways:
n In SmartConsole from Monitoring Results
n In CLI with the fw sam command
Notes:
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Monitoring (SAM) Rules. See sk79700.
n See the "fw sam_policy" and "sam_alert" commands.
n SAM rules consume some CPU resources on Security Gateway.
Best Practice - Set an expiration that gives you time to investigate, but
does not affect performance. Keep only the SAM rules that you need.
If you confirm that an activity is risky, edit the Security Policy, educate
users, or otherwise handle the risk.
n Logs for enforced SAM rules (configured with the fw sam command) are stored
in the $FWDIR/log/sam.dat file.
By design, the file is purged when the number of stored entries reaches 100,000.
This data log file contains the records in one of these formats:
<type>,<actions>,<expire>,<ipaddr>
<type>,<actions>,<expire>,<src>,<dst>,<dport>,<ip_p>
n SAM Requests are stored on the Security Gateway in the kernel table sam_
requests.
n IP Addresses that are blocked by SAM rules, are stored on the Security Gateway
in the kernel table sam_blocked_ips.
Syntax
n To add or cancel a SAM rule according to criteria:
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-t <Timeout>] [-l <Log Type>] [-C] [-e
<key=val>]+ [-r] -{n|i|I|j|J} <Criteria>
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] -D
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-r] -M -{i|j|n|b|q} all
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-r] -M -{i|j|n|b|q} <Criteria>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
-s <SAM Specifies the IP address (in the X.X.X.X format) or resolvable HostName of the
Server> Security Gateway that enforces the command.
The default is localhost.
Parameter Description
-S <SIC Specifies the SIC name for the SAM server to be contacted. It is expected that the
Name of SAM SAM server has this SIC name, otherwise the connection fails.
Server>
Notes:
n If you do not explicitly specify the SIC name, the connection
continues without SIC names comparison.
n For more information about enabling SIC, refer to the OPSEC API
Specification.
n On VSX Gateway, run the fw vsx showncs -vs <VSID> command to
show the SIC name for the applicable Virtual System.
Notes:
n You can use this syntax only on Security Management Server or
Domain Management Server.
n VSX Gateways and VSX Cluster Members do not support
Suspicious Activity Monitoring (SAM) Rules. See sk79700.
Parameter Description
-D Cancels all inhibit ("-i", "-j", "-I", "-J") and notify ("-n") parameters.
Notes:
n To "uninhibit" the inhibited connections, run the fw sam command
with the "-C" or "-D" parameters.
n It is also possible to use this command for active SAM requests.
-C Cancels the fw sam command to inhibit connections with the specified parameters.
Notes:
n These connections are no longer inhibited (no longer rejected or
dropped).
n The command parameters must match the parameters in the
original fw sam command, except for the -t <Timeout>
parameter.
-t Specifies the time period (in seconds), during which the action is enforced.
<Timeout>
The default is forever, or until you cancel the fw sam command.
-e Specifies rule information based on the keys and the provided values.
<key=val>+
Multiple keys are separated by the plus sign (+).
Available keys are (each is limited to 100 characters):
n name - Security rule name
n comment - Security rule comment
n originator - Security rule originator's username
Notes:
n This parameter generates an alert when connections that match the
specified services or IP addresses pass through the Security
Gateway.
n This action does not inhibit / close connections.
Parameter Description
Notes:
n Each inhibited connection is logged according to the log type.
n Matching connections are rejected.
-I Inhibits (drops or rejects) new connections with the specified parameters, and closes
all existing connections with the specified parameters.
Notes:
n Matching connections are rejected.
n Each inhibited connection is logged according to the log type.
Notes:
n Matching connections are dropped.
n Each inhibited connection is logged according to the log type.
-J Inhibits new connections with the specified parameters, and closes all existing
connections with the specified parameters.
Notes:
n Matching connections are dropped.
n Each inhibited connection is logged according to the log type.
-M Monitors the active SAM requests with the specified actions and criteria.
all Gets all active SAM requests. This is used for monitoring purposes only.
Parameter Description
Parameter Description
Parameter Description
srv <Src IP> <Dest IP> <Port> Matches the specific Source IP address, Destination IP
<Protocol> address, Service (port number) and Protocol.
subsrv <Src IP> <Netmask> Matches the specific Source IP address, Destination IP
<Dest IP> <Netmask> <Port> address, Service (port number) and Protocol.
<Protocol>
Source and Destination IP addresses are assigned
according to the netmask.
subsrvs <Src IP> <Src Netmask> Matches the specific Source IP address, source
<Dest IP> <Port> <Protocol> netmask, destination netmask, Service (port number)
and Protocol.
subsrvd <Src IP> <Dest IP> Matches specific Source IP address, Destination IP,
<Dest Netmask> <Port> destination netmask, Service (port number) and
<Protocol> Protocol.
dstsrv <Dest IP> <Service> Matches specific Destination IP address, Service (port
<Protocol> number) and Protocol.
subdstsrv <Dest IP> <Netmask> Matches specific Destination IP address, Service (port
<Port> <Protocol> number) and Protocol.
Destination IP address is assigned according to the
netmask.
Parameter Description
fw sam_policy
Description
Manages the Suspicious Activity Policy editor that lets you work with these types of rules:
n Suspicious Activity Monitoring (SAM) rules.
See sk112061: How to create and view Suspicious Activity Monitoring (SAM) Rules.
n Rate Limiting rules.
See sk112454: How to configure Rate Limiting rules for DoS Mitigation.
Also, see these commands:
n "fw sam" on page 271
n "sam_alert" on page 370
Notes:
n You can run these commands interchangeably: 'fw sam_policy' and 'fw
samp'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy
add <options>
batch
del <options>
get <options>
fw [-d] samp
add <options>
batch
del <options>
get <options>
Parameters
Parameter Description
del <options> Deletes one configured Rate Limiting rule one at a time.
See "fw sam_policy del" on page 297.
fw sam_policy add
Description
The 'fw sam_policy add' and 'fw6 sam_policy add' commands let you:
n Add one Suspicious Activity Monitoring (SAM) rule at a time.
n Add one Rate Limiting rule at a time.
Notes:
n You can run these commands interchangeably: 'fw sam_policy add' and
'fw samp add'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] ip <IP Filter Arguments>
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] ip <IP Filter Arguments>
fw [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] quota <Quota Filter Arguments>
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] quota <Quota Filter Arguments
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
-u Optional.
Specifies that the rule category is User-defined.
Default rule category is Auto.
-a {d | n | Mandatory.
b}
Specifies the rule action if the traffic matches the rule conditions:
n d - Drop the connection.
n n - Notify (generate a log) about the connection and let it through.
n b - Bypass the connection - let it through without checking it against the policy
rules.
Note - Rules with action set to Bypass cannot have a log or limit specification.
Bypassed packets and connections do not count towards overall number of
packets and connection for limit enforcement of type ratio.
-l {r | a} Optional.
Specifies which type of log to generate for this rule for all traffic that matches:
n -r - Generate a regular log
n -a - Generate an alert log
Parameter Description
-t Optional.
<Timeout>
Specifies the time period (in seconds), during which the rule will be enforced.
Default timeout is indefinite.
-f <Target> Optional.
Specifies the target Security Gateways, on which to enforce the Rate Limiting rule.
<Target> can be one of these:
n all - This is the default option. Specifies that the rule should be enforced on
all managed Security Gateways.
n Name of the Security Gateway or Cluster object - Specifies that the rule should
be enforced only on this Security Gateway or Cluster object (the object name
must be as defined in the SmartConsole).
n Name of the Group object - Specifies that the rule should be enforced on all
Security Gateways that are members of this Group object (the object name
must be as defined in the SmartConsole).
-n "<Rule Optional.
Name>"
Specifies the name (label) for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write a
backslash (\) character. Example:
-c "<Rule Optional.
Comment>"
Specifies the comment for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write a
backslash (\) character. Example:
Parameter Description
-o "<Rule Optional.
Originator
Specifies the name of the originator for this rule.
>"
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write a
backslash (\) character. Example:
-z "<Zone>" Optional.
Specifies the name of the Security Zone for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
Parameter Description
Important:
n The Quota rules are not applied immediately to the Security
Gateway. They are only registered in the Suspicious Activity
Monitoring (SAM) policy database. To apply all the rules from the
SAM policy database immediately, add "flush true" in the fw
samp add command syntax.
n Explanation:
For new connections rate (and for any rate limiting in general), when
a rule's limit is violated, the Security Gateway also drops all packets
that match the rule.
The Security Gateway computes new connection rates on a per-
second basis.
At the start of the 1-second timer, the Security Gateway allows all
packets, including packets for existing connections.
If, at some point, during that 1 second period, there are too many
new connections, then the Security Gateway blocks all remaining
packets for the remainder of that 1-second interval.
At the start of the next 1-second interval, the counters are reset, and
the process starts over - the Security Gateway allows packets to
pass again up to the point, where the rule’s limit is violated.
Explanation for the IP Filter Arguments syntax for Suspicious Activity Monitoring (SAM) rules
Argument Description
-m <Source Mask> Specifies the Source subnet mask (in dotted decimal format - x.y.z.w).
-M <Destination Specifies the Destination subnet mask (in dotted decimal format -
Mask> x.y.z.w).
-p <Port> Specifies the port number (see IANA Service Name and Port Number
Registry).
Explanation for the Quota Filter Arguments syntax for Rate Limiting rules
Argument Description
flush true Specifies to compile and load the quota rule to the
SecureXL immediately.
Notes:
n Default is: source-negated false
n The source-negated true processes all
source types, except the specified type.
Argument Description
Notes:
n Default is: destination-negated false
n The destination-negated true will
process all destination types except the specified
type
Argument Description
Notes:
n Default is: service-negated false
n The service-negated true will process all
traffic except the traffic with the specified
protocols and ports
Argument Description
Argument Description
Examples
Explanations:
n This rule drops packets for all connections (-a d) that exceed the quota set by this rule,
including packets for existing connections.
n This rule logs packets (-l r) that exceed the quota set by this rule.
n This rule will expire in 3600 seconds (-t 3600).
n This rule limits the rate of creation of new connections to 5 connections per second (new-conn-
rate 5) for any traffic (service any) from the source IP addresses in the range 172.16.7.11
- 172.16.7.13 (source range:172.16.7.11-172.16.7.13).
Note - The limit of the total number of log entries per second is configured with the fwaccel dos
config set -n <rate> command.
n This rule will be compiled and loaded on the SecureXL, together with other rules in the Suspicious
Activity Monitoring (SAM) policy database immediately, because this rule includes the "flush
true" parameter.
Explanations:
n This rule logs and lets through all packets (-a n) that exceed the quota set by this rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to all packets except (service-negated true) the packets with IP protocol
number 1, 50-51, 6 port 443 and 17 port 53 (service 1,50-51,6/443,17/53).
n This rule applies to all packets from source IP addresses that are assigned to the country with
specified country code (cc:QQ).
n This rule does not let any traffic through (byte-rate 0) except the packets with IP protocol
number 1, 50-51, 6 port 443 and 17 port 53.
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to packets from the Autonomous System number 64500 (asn:AS64500).
n This rule applies to packets from source IPv6 addresses FFFF:C0A8:1100/120 (cidr:
[::FFFF:C0A8:1100]/120).
n This rule applies to all traffic (service any).
n This rule does not let any traffic through (pkt-rate 0).
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
Explanations:
n This rule bypasses (-a b) all packets that match this rule.
Note - The Access Control Policy and other types of security policy rules still apply.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to packets from the source IP addresses in the range 172.16.8.17 -
172.16.9.121 (range:172.16.8.17-172.16.9.121).
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not log any packets (the -l r parameter is not specified).
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to all traffic (service any).
n This rule applies to all sources except (source-negated true) the source IP addresses that
are assigned to the country with specified country code (cc:QQ).
n This rule limits the maximal number of concurrent active connections to 655/65536=~1%
(concurrent-conns-ratio 655) for any traffic (service any) except (service-
negated true) the connections from the source IP addresses that are assigned to the country
with specified country code (cc:QQ).
n This rule counts connections, packets, and bytes for traffic only from sources that match this rule,
and not cumulatively for this rule.
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
fw sam_policy batch
Description
The 'fw sam_policy batch' and 'fw6 sam_policy batch' commands let you:
n Add and delete many Suspicious Activity Monitoring (SAM) rules at a time.
n Add and delete many Rate Limiting rules at a time.
Notes:
n You can run these commands interchangeably: 'fw sam_policy batch'
and 'fw samp batch'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all of the
Cluster Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Procedure
n Enter one "add" or "del" command on each line, on as many lines as necessary.
Start each line with only "add" or "del" parameter (not with "fw samp").
n Use the same set of parameters and values as described in these commands:
l fw sam_policy add
l fw sam_policy del
n Terminate each line with a Return (ASCII 10 - Line Feed) character (press Enter).
add -a d -l r -t 3600 -c "Limit\ conn\ rate\ to\ 5\ conn/sec from\ these\ sources" quota service any source
range:172.16.7.13-172.16.7.13 new-conn-rate 5
del <501f6ef0,00000000,cb38a8c0,0a0afffe>
EOF
[Expert@HostName]#
fw sam_policy del
Description
The 'fw sam_policy del' and 'fw6 sam_policy del' commands let you:
n Delete one configured Suspicious Activity Monitoring (SAM) rule at a time.
n Delete one configured Rate Limiting rule at a time.
Notes:
n You can run these commands interchangeably: 'fw sam_policy del' and
'fw samp del'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Parameters
Parameter Description
'<Rule UID>' Specifies the UID of the rule you wish to delete.
Important:
n The quote marks and angle
brackets ('<...>') are
mandatory.
n To see the Rule UID, run the
"fw sam_policy get"
command.
Procedure
1. List all the existing rules in the Suspicious Activity Monitoring policy database
List all the existing rules in the Suspicious Activity Monitoring policy database.
n For IPv4, run:
fw sam_policy get
operation=add uid=<5ac3965f,00000000,3403a8c0,0000264a>
target=all timeout=300 action=notify log=log name=Test\ Rule
comment=Notify\ about\ traffic\ from\ 1.1.1.1 originator=John\
Doe src_ip_addr=1.1.1.1 req_tpe=ip
Explanation:
The fw samp del and fw6 samp del commands only remove a rule from the persistent
database. The Security Gateway continues to enforce the deleted rule until the next time you
compiled and load a policy. To force the rule deletion immediately, you must enter a flush-only
add rule right after the fw samp del and fw6 samp del command. This flush-only add rule
immediately deletes the rule you specified in the previous step, and times out in 2 seconds.
Best Practice - Specify a short timeout period for the flush-only rules. This
prevents accumulation of rules that are obsolete in the database.
fw sam_policy get
Description
The 'fw sam_policy get' and 'fw6 sam_policy get' commands let you:
n Show all the configured Suspicious Activity Monitoring (SAM) rules.
n Show all the configured Rate Limiting rules.
Notes:
n You can run these commands interchangeably: 'fw sam_policy get' and
'fw samp get'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t <Type> [+
{-v '<Value>'}] [-n]]
fw6 [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t <Type>
[+{-v '<Value>'}] [-n]]
Parameters
Note - All these parameters are optional.
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
-u '<Rule Prints the rule specified by its Rule UID or its zero-based rule index.
UID>'
The quote marks and angle brackets ('<...>') are mandatory.
Examples
uid
<5ac3965f,00000000,3403a8c0,0000264a>
target
all
timeout
2147483647
action
notify
log
log
name
Test\ Rule
comment
Notify\ about\ traffic\ from\ 1.1.1.1
originator
John\ Doe
src_ip_addr
1.1.1.1
req_type
ip
fwm
Description
Performs various management operations and shows various management information.
Notes:
n For debug instructions, see the description of the fwm process in sk97638.
n On a Multi-Domain Server, you must run these commands in the context of the
applicable Domain Management Server.
Syntax
fwm [-d]
dbload <options>
exportcert <options>
fetchfile <options>
fingerprint <options>
getpcap <options>
ikecrypt <options>
load [<options>]
logexport <options>
mds <options>
printcert <options>
sic_reset
snmp_trap <options>
unload [<options>]
ver [<options>]
verify <options>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
dbload Downloads the user database and network objects information to the specified
<options> targets
See "fwm dbload" on page 307.
fetchfile Fetches a specified OPSEC configuration file from the specified source
<options> computer.
See "fwm fetchfile" on page 310.
getpcap Fetches the IPS packet capture data from the specified Security Gateway.
<options>
See "fwm getpcap" on page 313.
mds <options> Shows information and performs various operations on Multi-Domain Server.
See "fwm mds" on page 322.
Parameter Description
unload Unloads the policy from the specified managed Security Gateways.
<options>
See "fwm unload" on page 333.
ver <options> Shows the Check Point version of the Management Server.
See "fwm ver" on page 337.
fwm dbload
Description
Downloads the user database and network objects information to the specified Security Gateways.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in
sk97638.
fwm exportcert
Description
Export a SIC certificate of the specified managed object to a file.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
fwm [-d] exportcert -obj <Name of Object> -cert <Name of CA> -file
<Output File> [-withroot] [-pem]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in
sk97638.
<Name of Specifies the name of the managed object, whose certificate you wish to
Object> export.
<Name of CA> Specifies the name of Certificate Authority, whose certificate you wish to
export.
fwm fetchfile
Description
Fetches a specified OPSEC configuration file from the specified source computer.
This command supports only the fwopsec.conf or fwopsec.v4x files.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.
-d <Local Path> Specifies the local directory to save the fetched file.
<Source> Specifies the managed remote source computer, from which to fetch the file.
Note - The local and the remote source computers must have
established SIC trust.
Example
fwm fingerprint
Description
Shows the Check Point fingerprint.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
fwm getpcap
Description
Fetches the IPS packet capture data from the specified Security Gateway.
This command only works with IPS packet captures stored on the Security Gateway in the
$FWDIR/log/captures_repository/ directory.
This command does not work with other Software Blades, such as Anti-Bot and Anti-Virus that store packet
captures in the $FWDIR/log/blob/ directory on the Security Gateway.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in
sk97638.
-g <Security Specifies the main IP address or Name of Security Gateway object as configured
Gateway> in SmartConsole.
-p <Local Specifies the local path to save the specified packet capture file.
Path>
If you do not specify the local directory explicitly, the command saves the packet
capture file in the current working directory.
Example
fwm ikecrypt
Description
Encrypts the password of an Endpoint VPN Client user using IKE. The resulting string must then be stored
in the LDAP database.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in sk97638.
<Key> Specifies the IKE Key as defined in the LDAP Account Unit properties window on the
Encryption tab.
< Specifies the password for the Endpoint VPN Client user.
Password
>
Example
fwm load
Description
Loads a policy on a managed Security Gateway.
Important - This command is obsolete for R80 and above. Use the "mgmt_cli" on
page 358 command to load a policy on a managed Security Gateway.
fwm logexport
Description
Exports a Security log file ($FWDIR/log/*.log) or Audit log file ($FWDIR/log/*.adtlog) to an
ASCII file.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
fwm logexport -h
fwm [-d] logexport [{-d <Delimiter> | -s}] [-t <Table Delimiter>] [-i
<Input File>] [-o <Output File>] [{-f | -e}] [-x <Start Entry Number>]
[-y <End Entry Number>] [-z] [-n] [-p] [-a] [-u <Unification Scheme
File>] [-m {initial | semi | raw}]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in sk97638.
Note - If you do not specify the delimiter explicitly, the default is a semicolon (;).
Parameter Description
-f After reaching the end of the currently opened log file, specifies to continue to
monitor the log file indefinitely and export the new entries as well.
Note - Applies only to the active log file: $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-e After reaching the end of the currently opened log file, continue to monitor the log file
indefinitely and export the new entries as well.
Note - Applies only to the active log file: $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-x <Start Starts exporting the log entries from the specified log entry number and below,
Entry counting from the beginning of the log file.
Number>
-y <End Starts exporting the log entries until the specified log entry number, counting from
Entry the beginning of the log file.
Number>
-z In case of an error (for example, wrong field value), specifies to continue the export
of log entries.
The default behavior is to stop.
-n Specifies not to perform DNS resolution of the IP addresses in the log file (this is the
default behavior).
This significantly speeds up the log processing.
-p Specifies to not to perform resolution of the port numbers in the log file (this is the
default behavior).
This significantly speeds up the log processing.
Parameter Description
-u < Specifies the path and name of the log unification scheme file.
Unification
The default log unification scheme file is:
Scheme
File> $FWDIR/conf/log_unification_scheme.C
Ste
Description
p
[Expert@MGMT:0]# vi $FWDIR/conf/logexport.ini
3 To include or exclude the log fields from the output, add these lines in the configuration file:
[Fields_Info]
included_fields = field1,field2,field3,<REST_OF_
FIELDS>,field100
excluded_fields = field10,field11
Where:
n You can specify only the included_fields parameter, only the excluded_fields
parameter, or both.
n The num field must always appear first. You cannot manipulate this field.
n The <REST_OF_FIELDS> is an optional reserved token that refers to a list of fields.
l If you specify the "-f" parameter, then the <REST_OF_FIELDS> is based on a list
of fields from the $FWDIR/conf/logexport_default.C file.
l If you do not specify the "-f" parameter, then the <REST_OF_FIELDS> is based
on the input log file.
fwm mds
Description
n Shows the Check Point version of the Multi-Domain Server.
n Rebuilds status tree for Global VPN Communities.
mdsenv
Syntax
Parameters
Parameter Description
Example
fwm printcert
Description
Shows a SIC certificate's details.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Item Description
-obj <Name of Object> Specifies the name of the managed object, for which to show the
SIC certificate information.
Examples
defaultCert:
Host Certificate (level 0):
Subject: CN=CXL_192.168.3.244 VPN Certificate,O=MGMT.checkpoint.com.s6t98x
Issuer: O=MGMT.checkpoint.com.s6t98x
Not Valid Before: Sun Jun 3 19:58:19 2018 Local Time
Not Valid After: Sat Jun 3 19:58:19 2023 Local Time
Serial No.: 85021
Public Key: RSA (2048 bits)
Signature: RSA with SHA256
Subject Alternate Names:
IP Address: 192.168.3.244
CRL distribution points:
http://192.168.3.240:18264/ICA_CRL2.crl
CN=ICA_CRL2,O=MGMT.checkpoint.com.s6t98x
Key Usage:
digitalSignature
keyEncipherment
Basic Constraint:
not CA
MD5 Fingerprint:
B1:15:C7:A8:2A:EE:D1:75:92:9F:C7:B4:B9:BE:42:1B
SHA-1 Fingerprints:
1. BC:7A:D9:E2:CD:29:D1:9E:F0:39:5A:CD:7E:A9:0B:F9:6A:A7:2B:85
2. MIRE SANK DUSK HOOD HURD RIDE TROY QUAD LOVE WOOD GRIT WITH
*****
[Expert@MGMT:0]#
Example 4 - Showing the SIC certificate of a managed Cluster object in verbose mode
[Expert@MGMT:0]# fwm printcert -obj CXL_192.168.3.244 -verbose
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] fwa_db_init: called
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] fwa_db_init: closing existing database
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] do_links_getver: strncmp failed. Returning -2
defaultCert:
fwm sic_reset
Description
Resets SIC on the Management Server.
For detailed procedure, see sk65764: How to reset SIC.
Warning:
n Before you run this command, take a Gaia Snapshot and a full backup of
the Management Server.
This command resets SIC between the Management Server and all its
managed objects.
n This operation breaks trust in all Internal CA certificates and SIC trust
across the managed environment.
Therefore, we do not recommend it at all, except for real disaster recovery.
Note
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in sk97638.
fwm snmp_trap
Description
Sends an SNMPv1 Trap to the specified host.
Notes:
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n On a Multi-Domain Server, the SNMP Trap packet is sent from the IP address of
the Leading Interface.
Syntax
fwm [-d] snmp_trap [-v <SNMP OID>] [-g <Generic Trap Number>] [-s
<Specific Trap Number>] [-p <Source Port>] [-c <SNMP Community>]
<Target> ["<Message>"]
Parameters
Parameter Description
-v <SNMP OID> Specifies an optional SNMP OID to bind with the message.
-p <Source Port> Specifies the source port, from which to send the SNMP Trap packets.
<Target> Specifies the managed target host, to which to send the SNMP Trap
packets.
Enter an IP address of a resolvable hostname.
Example - Sending an SNMP Trap from a Management Server and capturing the traffic on the Security
Gateway
[Expert@MyGW_192.168.3.52:0]#
fwm unload
Description
Unloads the policy from the specified managed Security Gateways or Cluster Members.
Warning:
1. The fwm unload command prevents all traffic from passing through the
Security Gateway (Cluster Member), because it disables the IP Forwarding in
the Linux kernel on the specified Security Gateway (Cluster Member).
2. The fwm unload command removes all policies from the specified Security
Gateway (Cluster Member).
This means that the Security Gateway (Cluster Member) accepts all incoming
connections destined to all active interfaces without any filtering or protection
enabled.
Notes:
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n If you need to remove the current policy, but keep the Security Gateway (Cluster
Member) protected, then run the "comp_init_policy" on page 871 command on
the Security Gateway (Cluster Member).
n To load the policies on the Security Gateway (Cluster Member), run one of these
commands on the Security Gateway (Cluster Member), or reboot:
l "fw fetch" on page 998
l "cpstart" on page 911
n In addition, see the "fw unloadlocal" on page 1100 command.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in
sk97638.
<GW1> <GW2> Specifies the managed Security Gateways by their main IP address or Object
... <GWN> Name as configured in SmartConsole.
Example
[Expert@MGMT:0]#
fwm ver
Description
Shows the Check Point version of the Security Management Server.
mdsenv
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in
sk97638.
-f <Output Specifies the name of the output file, in which to save this information.
File>
Example
fwm verify
Important - This command is obsolete for R80 and above. Use the "mgmt_cli" on
page 358 command to verify a policy on a managed Security Gateway.
Description
Verifies the specified policy package without installing it.
Note
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in
sk97638.
Example
inet_alert
Description
Notifies an Internet Service Provider (ISP) when a company's corporate network is under attack. This
command forwards log messages generated by the alert daemon on your Check Point Security Gateway
to an external Management Station. This external Management Station is usually located at the ISP site.
The ISP can then analyze the alert and react accordingly.
This command uses the Event Logging API (ELA) protocol to send the alerts. The Management Station
receiving the alert must be running the ELA Proxy.
If communication with the ELA Proxy is to be authenticated or encrypted, a key exchange must be
performed between the external Management Station running the ELA Proxy at the ISP site and the Check
Point Security Gateway generating the alert.
Procedure
Step Description
3 Click on the [+] near the Log and Alert and click Alerts .
5 Select the next option Run UserDefined script under the above.
6 Enter the applicable inet_alert syntax (see the Syntax section below).
7 Click OK.
Syntax
inet_alert -s <IP Address> [-o] [-a <Auth Type>] [-p <Port>] [-f
<Token> <Value>] [-m <Alert Type>]
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Parameters
Parameter Description
-s <IP The IPv4 address of the ELA Proxy (usually located at the ISP site).
Address>
-p <Port> Specifies the port number on the ELA proxy. Default port is 18187.
Parameter Description
Exist Status
Example
inet_alert -s 10.0.2.4 -a clear -f product cads -m alert
ldapcmd
Description
This is an LDAP utility that controls these features:
Feature Description
Cache LDAP cache operations, such as emptying the cache, as well as providing debug
information.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
Parameters
Parameter Description
-d <Debug Runs the command in debug mode with the specified TDERROR debug level.
Level>
Valid values are from 0 (disabled) to 5 (maximal level, recommended).
-p {<Process Runs on a specified Check Point process, or all supported Check Point
Name> | all} processes.
ldapcompare
Description
This is an LDAP utility that performs compare queries and prints a message whether the result returned a
match or not.
This utility opens a connection to an LDAP directory server, binds, and performs the comparison specified
on the command line or from a specified file.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified TDERROR debug level.
Valid values are from 0 (disabled) to 5 (maximal level, recommended).
Compare options
Option Description
-P <LDAP Protocol Version> Specifies the LDAP protocol version. Default version is 3.
Common options
Option Description
Option Description
Option Description
-n Dry run - shows what would be done, but does not actually do
it.
-p <LDAP Server Port> Specifies the LDAP Server port. Default is 389.
-w <LDAP Admin Password> Specifies the LDAP Server administrator password (for
simple authentication).
ldapmemberconvert
Description
This is an LDAP utility that ports from the "Member" attribute values in LDAP group entries to the
"MemberOf" attribute values in LDAP member (User or Template) entries.
This utility converts the LDAP server data to work in either the "MemberOf" mode, or "Both" mode. The
utility searches through all specified group or template entries that hold one or more "Member" attribute
values and modifies each value. The utility searches through all specified group/template entries and
fetches their "Member" attribute values.
Each value is the DN of a member entry. The entry identified by this DN is added to the "MemberOf"
attribute value of the group/template DN at hand. In addition, the utility delete those "Member" attribute
values from the group/template, unless you run the command in the "Both" mode.
When your run the command, it creates a log file ldapmemberconvert.log in the current working
directory. The command logs all modifications done and errors encountered in that log file.
Important - Back up the LDAP server database before you run this conversion utility.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified TDERROR debug
level.
Valid values are from 0 (disabled) to 5 (maximal level, recommended).
Parameter Description
-h <LDAP Server> Specifies the LDAP Server computer by its IP address or resolvable
hostname.
If you do not specify the LDAP Server explicitly, the command connects
to localhost.
-D <LDAP Admin DN> Specifies the LDAP Server administrator Distinguished Name.
-m <Member Specifies the LDAP attribute name when fetching and (possibly) deleting
Attribute Name> a group Member attribute value.
-o <MemberOf Specifies the LDAP attribute name for adding an LDAP "MemberOf"
Attribute Name> attribute value.
-c <Member Specifies the LDAP "ObjectClass" attribute value that defines, which
ObjectClass Value> type of member to modify.
You can specify multiple attribute values with this syntax:
-f <File> Specifies the file that contains a list of Group DNs separated by a new
line:
<Group DN 1>
<Group DN 2>
...
<Group DN N>
-L <LDAP Server Specifies the Server side time limit for LDAP operations, in seconds.
Timeout>
Default is "never".
Parameter Description
-S <Size> Specifies the Server side size limit for LDAP operations, in number of
entries.
Default is "none".
-T <LDAP Client Specifies the Client side timeout for LDAP operations, in milliseconds.
Timeout>
Default is "never".
Notes
There are two "GroupMembership" modes. You must keep these modes consistent:
n template-to-groups
n user-to-groups
For example, if you apply conversion on LDAP users to include the "MemberOf" attributes for their groups,
then this conversion has to be applied on LDAP defined templates for their groups.
Troubleshooting
Symptom:
A command fails with an error message stating the connection stopped unexpectedly when you run it with
the parameter -M <Number of Updates>.
Root Cause:
The LDAP server could not handle that many LDAP requests simultaneously and closed the connection.
Solution:
Run the command again with a lower value for the "-M" parameter. The default value should be adequate,
but can also cause a connection failure in extreme situations. Continue to reduce the value until the
command runs normally. Each time you run the command with the same set of groups, the command
continues from where it left off.
Examples
Example 1
...
cn=cpGroup
uniquemember="cn=member1,ou=people,ou=cp,c=us"
uniquemember="cn=member2,ou=people,ou=cp,c=us"
...
...
cn=member1
objectclass=fw1Person
...
and:
...
cn=member2
objectclass=fw1Person
...
Run:
[Expert@MGMT:0]# ldapconvert -g cn=cpGroup,ou=groups,ou=cp,c=us -h MyLdapServer -d cn=admin -w secret -m uniquemember -o
memberof -c fw1Person
...
cn=cpGroup
...
...
cn=member1
objectclass=fw1Person
memberof="cn=cpGroup,ou=groups,ou=cp,c=us"
...
and:
...
cn=member2
objectclass=fw1Person
memberof="cn=cpGroup,ou=groups,ou=cp,c=us"
...
If you run the same command with the "-B" parameter, it produces the same result, but the group entry
is not modified.
Example 2
If there is another member attribute value for the same group entry:
uniquemember="cn=template1,ou=people, ou=cp,c=us"
cn=member1
objectclass=fw1Template
Then after running the same command, the template entry stays intact, because of the parameter "-c
fw1Person", but the object class of "template1" is "fw1Template".
ldapmodify
Description
This is an LDAP utility that imports users to an LDAP server. The input file must be in the LDIF format.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
ldapmodify [-d <Debug Level>] [-h <LDAP Server>] [-p <LDAP Server
Port>] [-D <LDAP Admin DN>] [-w <LDAP Admin Password>] [-a] [-b] [-c]
[-F] [-k] [-n] [-r] [-v] [-T <LDAP Client Timeout>] [-Z] [ -f <Input
File> .ldif | < <Entry>]
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified TDERROR debug
level.
Valid values are from 0 (disabled) to 5 (maximal level, recommended).
-h <LDAP Server> Specifies the LDAP Server computer by its IP address or resolvable
hostname.
If you do not specify the LDAP Server explicitly, the command connects
to localhost.
-D <LDAP Admin DN> Specifies the LDAP Server administrator Distinguished Name.
Parameter Description
-n Specifies to print the LDAP "add" operations, but do not actually perform
them.
-T <LDAP Client Specifies the Client side timeout for LDAP operations, in milliseconds.
Timeout>
Default is "never".
ldapsearch
Description
This is an LDAP utility that queries an LDAP directory and returns the results.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
ldapsearch [-d <Debug Level>] [-h <LDAP Server>] [-p <LDAP Port>] [-D
<LDAP Admin DN>] [-w <LDAP Admin Password>] [-A] [-B] [-b <Base DN>]
[-F <Separator>] [-l <LDAP Server Timeout>] [-s <Scope>] [-S <Sort
Attribute>] [-t] [-T <LDAP Client Timeout>] [-u] [-z <Number of Search
Entries>] [-Z] <Filter> [<Attributes>]
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified TDERROR debug
level.
Valid values are from 0 (disabled) to 5 (maximal level, recommended).
-h <LDAP Server> Specifies the LDAP Server computer by its IP address or resolvable
hostname.
If you do not specify the LDAP Server explicitly, the command connects
to localhost.
-D <LDAP Admin DN> Specifies the LDAP Server administrator Distinguished Name.
-b <Base DN> Specifies the Base Distinguished Name (DN) for search.
Parameter Description
-F <Separator> Specifies the print separator character between attribute names and
their values.
The default separator is the equal sign (=).
-l <LDAP Server Specifies the Server side time limit for LDAP operations, in seconds.
Timeout>
Default is "never".
-S <Sort Attribute> Specifies to sort the results by the values of this attribute.
-T <LDAP Client Specifies the Client side timeout for LDAP operations, in milliseconds.
Timeout>
Default is never.
-z <Number of Specifies the maximal number of entries to search on the LDAP Server.
Search Entries>
Example
[Expert@MGMT:0]# ldapsearch -p 18185 -b cn=omi objectclass=fw1host objectclass
mgmt_cli
Description
The mgmt_cli tool lets you work directly with the management database on your Management Server.
cd /d "%ProgramFiles%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
mgmt_cli.exe <Command Name> <Command Parameters> <Optional Switches>
cd /d "%ProgramFiles(x86)%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
mgmt_cli.exe <Command Name> <Command Parameters> <Optional Switches>
Notes
n For a complete list of the mgmt_cli options, enter the mgmt_cli (mgmt_cli.exe) command
and press Enter.
n For more information, see the Check Point Management API Reference.
migrate
Important - This command is used to migrate the management database from R80.10
and lower versions.
For more information, see the R80.40 Installation and Upgrade Guide.
Description
Exports the management database and applicable Check Point configuration.
Imports the exported management database and applicable Check Point configuration.
Notes:
n You must run this command from the Expert mode.
n If you need to back up the current management database, and you do not plan
to import it on a Management Server that runs a higher software version, then
you can use the built-in command in the $FWDIR/bin/upgrade_tools/
directory.
n If you plan to import the management database on a Management Server that
runs a higher software version, then you must use the migrate utility from the
migration tools package created specifically for that higher software version.
See the Installation and Upgrade Guide for that higher software version.
n If this command completes successfully, it creates this log file:
/var/log/opt/CPshrd-R80.40/migrate-<YYYY.MM.DD_
HH.MM.SS>.log
For example: /var/log/opt/CPshrd-R80.40/migrate-2019.06.14_11.03.46.log
n If this command fails, it creates this log file:
$CPDIR/log/migrate-<YYYY.MM.DD_HH.MM.SS>.log
For example: /opt/CPshrd-R80.40/log/migrate-2019.06.14_11.21.39.log
Syntax
n To see the built-in help:
[Expert@MGMT:0]# ./migrate -h
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# yes | nohup ./migrate export [-l | -x] [-n] [--
exclude-uepm-postgres-db] [--include-uepm-msi-files] /<Full
Path>/<Name of Exported File> &
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# yes | nohup ./migrate import [-l | -x] [-n] [--
exclude-uepm-postgres-db] [--include-uepm-msi-files] /<Full
Path>/<Name of Exported File>.tgz &
Parameters
Parameter Description
As a result, when the CLI session closes, the command continues to run in the
background.
See:
n sk133312
n https://linux.die.net/man/1/bash
n https://linux.die.net/man/1/nohup
export Exports the management database and applicable Check Point configuration.
import Imports the management database and applicable Check Point configuration
that were exported from another Management Server.
Parameter Description
-l Exports and imports the Check Point logs without log indexes in the
$FWDIR/log/ directory.
Note - The command can export only closed logs (to which the
information is not currently written).
-x Exports and imports the Check Point logs with their log indexes in the
$FWDIR/log/ directory.
Important:
n This parameter only supports Management Servers and Log
Servers R80.10 and higher.
n The command can export only closed logs (to which the
information is not currently written).
-n Runs silently (non-interactive mode) and uses the default options for each
setting.
Important:
n If you export a management database in this mode and the
specified name of the exported file matches the name of an
existing file, the command overwrites the existing file without
prompting.
n If you import a management database in this mode, the
"migrate import" command runs the "cpstop"
command automatically.
--exclude-uepm- n During the export operation, does not back up the PostgreSQL
postgres-db database from the Endpoint Security Management Server.
n During the import operation, does not restore the PostgreSQL
database on the Endpoint Security Management Server.
--include-uepm- n During the export operation, backs up the MSI files from the Endpoint
msi-files Security Management Server.
n During the import operation, restores the MSI files on the Endpoint
Security Management Server.
<Name of n During the export operation, specifies the name of the output file.
Exported File>
The command automatically adds the *.tgz extension.
n During the import operation, specifies the name of the exported file.
You must manually enter the *.tgz extension in the end.
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# ./migrate export /var/log/Migrate_Export
[Expert@MGMT:0]#
[Expert@MGMT:0]# find / -name migrate-\* -type f
/var/log/opt/CPshrd-R80.40/migrate-2019.06.14_11.03.46.log
[Expert@MGMT:0]#
migrate_server
Important - This command is used to migrate the management database from
R80.20.M1, R80.20, R80.20.M2, R80.30, and higher versions.
For more information, see the R80.40 Installation and Upgrade Guide.
Description
Exports the management database and applicable Check Point configuration.
Imports the exported management database and applicable Check Point configuration.
Notes:
n You must run this command from the Expert mode.
n If you need to back up the current management database, and you do not plan
to import it on a Management Server that runs a higher software version, then
you can use the built-in command in the $FWDIR/scripts/ directory.
n If you plan to import the management database on a Management Server that
runs a higher software version, then you must use the migrate_server utility
from the migration tools package created specifically for that higher software
version. See the Installation and Upgrade Guide for that higher software
version.
n If this command completes successfully, it creates this log file:
/var/log/opt/CPshrd-R80.40/migrate-<YYYY.MM.DD_
HH.MM.SS>.log
For example: /var/log/opt/CPshrd-R80.40/migrate-2019.06.14_11.03.46.log
n If this command fails, it creates this log file:
$CPDIR/log/migrate-<YYYY.MM.DD_HH.MM.SS>.log
For example: /opt/CPshrd-R80.40/log/migrate-2019.06.14_11.21.39.log
Syntax
n To see the built-in help:
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server -h
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server verify -v R80.40 [-skip_upgrade_
tools_check]
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server export -v R80.40 [-skip_upgrade_
tools_check] [-l | -x] [--include-uepm-msi-files] [--exclude-uepm-
postgres-db] /<Full Path>/<Name of Exported File>
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server import -v R80.40 [-skip_upgrade_
tools_check] [-l | -x] [-change_ips_file /<Full Path>/<Name of
JSON File>.json] [--include-uepm-msi-files] [--exclude-uepm-
postgres-db] /<Full Path>/<Name of Exported File>.tgz
Parameters
Paramete
Description
r
export Exports the management database and applicable Check Point configuration.
import Imports the management database and applicable Check Point configuration that were
exported from another Management Server.
Important - This command automatically restarts Check Point services (runs the
"cpstop" and "cpstart" commands).
verify Verifies the management database and applicable Check Point configuration that were
exported from another Management Server.
Paramete
Description
r
-skip_ Does not try to connect to Check Point Cloud to check for a more recent version of the
upgrad Upgrade Tools.
e_
tools_ Best Practice - Use this parameter on the Management Server that is not
check connected to the Internet.
-l Exports and imports the Check Point logs without log indexes in the $FWDIR/log/
directory.
Note - The command can export only closed logs (to which the information is
not currently written).
-x Exports and imports the Check Point logs with their log indexes in the $FWDIR/log/
directory.
Important:
n This parameter only supports Management Servers and Log Servers
R80.10 and higher.
n The command can export only closed logs (to which the information is not
currently written).
- Specifies the absolute path to the special JSON configuration file with new IPv4
change_ addresses.
ips_
This file is mandatory during an upgrade of a Multi-Domain Security Management
file
environment.
/<Full
Path Even if only one of the servers migrates to a new IP address, all the other servers must get
>/<Name this configuration file for the import process.
of JSON Example:
File
>.json [{"name":"MyPrimaryMultiDomainServer","newIpAddress4":"172.
30.40.51"},
{"name":"MySecondaryMultiDomainServer","newIpAddress4":"172
.30.40.52"}]
-- n During the export operation, backs up the MSI files from the Endpoint Security
includ Management Server.
e-uepm-
n During the import operation, restores the MSI files on the Endpoint Security
msi-
Management Server.
files
-- n During the export operation, does not back up the PostgreSQL database from the
exclud Endpoint Security Management Server.
e-uepm-
n During the import operation, does not restore the PostgreSQL database on the
postgre
Endpoint Security Management Server.
s-db
Paramete
Description
r
/<Full Specifies the absolute path to the exported database file. This path must exist.
Path
n During the export operation, specifies the name of the output file.
>/<Name
of The command automatically adds the *.tgz extension.
Exporte
d File> n During the import operation, specifies the name of the exported file.
You must manually enter the *.tgz extension in the end.
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server export /var/log/Migrate_Export
[Expert@MGMT:0]#
[Expert@MGMT:0]# find / -name migrate-\* -type f
/var/log/opt/CPshrd-R80.40/migrate-2019.06.14_11.03.46.log
[Expert@MGMT:0]#
queryDB_util
Description
Searches in the management database for objects or policy rules.
Important - This command is obsolete for R80 and above. Use the "mgmt_cli" on
page 358 command to load a policy on a managed Security Gateway.
rs_db_tool
Description
Manages Dynamically Assigned IP address (DAIP) gateways in a DAIP database.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
n To add an entry to the DAIP database:
Note - You must run this command from the Expert mode.
Parameters
Parameter Description
-ip <IPv4 Address> Specifies the IPv4 address of the DAIP object
-TTL <Time-To- Specifies the relative time interval (in seconds), during which the entry is
Live> valid.
sam_alert
Description
For SAM v1, this utility executes Suspicious Activity Monitoring (SAM) actions according to the information
received from the standard input.
For SAM v2, this utility executes Suspicious Activity Monitoring (SAM) actions with User Defined Alerts
mechanism.
Notes:
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Monitoring (SAM) Rules. See sk79700.
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n See the "fw sam" on page 271 and "fw sam_policy" on page 279 commands.
SAM v1 syntax
sam_alert [-v] [-o] [-s <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-C] {-n|-i|-I} {-src|-dst|-any|-srv}
Parameter Description
-o Specifies to print the input of this tool to the standard output (to use with pipes in
a CLI syntax).
-t <Time> Specifies the time (in seconds), during which to enforce the action. The default is
forever.
Parameter Description
-n Specifies to notify every time a connection, which matches the specified criteria,
passes through the Security Gateway.
-I Inhibits (drops or rejects) connections that match the specified criteria and
closes all existing connections that match the specified criteria.
SAM v2 syntax
sam_alert -v2 [-v] [-O] [-S <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-n <Name>] [-c "<Comment">] [-o <Originator>] [-l {r |
a}] -a {d | r| n | b | q | i} [-C] {-ip |-eth} {-src|-dst|-any|-srv}
Parameter Description
-O Specifies to print the input of this tool to the standard output (to use
with pipes in a CLI syntax).
-t <Time> Specifies the time (in seconds), during which to enforce the action.
The default is forever.
-l {r | a} Specifies the log type for connections that match the specified criteria:
n r - Regular
n a - Alert
Default is None.
Parameter Description
Example
See sk110873: How to configure Security Gateway to detect and prevent port scan.
stattest
Description
Check Point AMON client to query SNMP OIDs.
You can use this command as an alternative to the standard SNMP commands for debug purposes - to
make sure the applicable SNMP OIDs provide the requested information.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
n To query a Regular OID:
stattest get [-d] [-h <Host>] [-p <Port>] [-x <Proxy Server>] [-v <VSID>] [-t <Timeout>] <Regular_OID_1> <Regular_OID_2>
... <Regular_OID_N>
Parameters
Parameter Description
Parameter Description
threshold_config
Description
You can configure a variety of different SNMP thresholds that generate SNMP traps, or alerts.
You can use these thresholds to monitor many system components automatically without requesting
information from each object or device.
You configure these SNMP Monitoring Thresholds only on the Security Management Server, Multi-Domain
Server, or Domain Management Server.
During policy installation, the managed a Security Gateway and Clusters receive and apply these
thresholds as part of their policy.
For more information, see sk90860: How to configure SNMP on Gaia OS.
Procedure
Step Description
3 On a Multi-Domain Server, switch to the context of the applicable Domain Management Server:
[Expert@HostName:0]# threshold_config
Step Description
11 In SmartConsole, install the Access Control Policy on Security Gateways and Clusters.
(1) Show policy Shows the name of the current configured threshold policy.
name
(2) Set policy Configures the name for the threshold policy.
name
If you do not specify it explicitly, then the default name is "Default
Profile".
(3) Save policy Saves the changes in the current threshold policy.
(7) Configure Configures the SNMP Network Management System (NMS), to which the
alert managed Security Gateways and Cluster Members send their SNMP alerts.
destinations
Configure Alert Destinations Options:
-------------------------------------
(1) View alert destinations
(2) Add SNMP NMS
(3) Remove SNMP NMS
(4) Edit SNMP NMS
(8) View Shows a list of all available thresholds and their current settings. These
thresholds include:
overview
n Name
n Category (see the next option "(9)")
Thresholds Categories
Category Sub-Categories
(3) Local Logging Mode Status Local Logging Mode Status Thresholds:
-------------------------------------
(1) Local Logging Mode
Category Sub-Categories
Notes:
n If you run the threshold_config command locally on a Security Gateway or
Cluster Members to configure the SNMP Monitoring Thresholds, then each
policy installation erases these local SNMP threshold settings and reverts them
to the global SNMP threshold settings configured on the Management Server
that manages this Security Gateway or Cluster.
n On a Security Gateway and Cluster Members, you can save the local Threshold
Engine Configuration settings to a file and load it locally later.
n The Threshold Engine Configuration is stored in the
$FWDIR/conf/thresholds.conf file.
n In a Multi-Domain Security Management environment:
l You can configure the SNMP thresholds in the context of Multi-Domain
Server (MDS) and in the context of each individual Domain Management
Server.
l Thresholds that you configure in the context of the Multi-Domain Server
are for the Multi-Domain Server only.
l Thresholds that you configure in the context of a Domain Management
Server are for that Domain Management Server and its managed Security
Gateway and Clusters.
l If an SNMP threshold applies both to the Multi-Domain Server and a
Domain Management Server, then configure the SNMP threshold both in
the context of the Multi-Domain Server and in the context of the Domain
Management Server.
However, in this scenario you can only get alerts from the Multi-Domain
Server, if the monitored object exceeds the threshold.
Example:
If you configure the CPU threshold, then when the monitored value
exceeds the configured threshold, it applies to both the Multi-Domain
Server and the Domain Management Server. However, only the Multi-
Domain Server generates SNMP alerts.
API
You can configure and control the Management Server through API Requests you send to the API Server
that runs on the Management Server.
The API Server runs scripts that automate daily tasks and integrate the Check Point solutions with third
party systems such as virtualization servers, ticketing systems, and change management systems.
API Tools
You can use these tools to run API scripts on the Management Server:
n Standalone management tool, included with SmartConsole. You can copy this tool to computers that
run Windows or Gaia operating system.
l mgmt_cli.exe (for Windows operating system)
l mgmt_cli (for Gaia operating system)
n Web Services API that allow communication and data exchange between the clients and the
Management Server over the HTTP protocol.
These also let other Check Point processes communicate with the Management Server over the
HTTPS protocol.
To learn more about the management APIs, to see code samples, and to take advantage of user forums,
see:
n The Check Point Management API Reference.
n The Developers Network section of Check Point CheckMates Community.
Select Automatic start to automatically start the API server when you start or reboot the
Management Server.
Notes:
n If the Management Server has more than 4GB of RAM installed, the
Automatic start option is activated by default during Management
Server installation.
n If the Management Server has less than 4GB of RAM, the Automatic
Start option is deactivated.
Select one of these options to configure which clients can connect to the API Server:
n Management server only - Only the Management Server itself can connect to the API
Server. This option only lets you use the mgmt_cli utility to send API requests. You
cannot use SmartConsole or web services to send API requests.
n All IP addresses that can be used for GUI clients - You can send API requests from all
IP addresses that are defined as Trusted Clients in SmartConsole. This includes requests
from SmartConsole, Web services and the mgmt_cli utility.
n All IP addresses - You can send API requests from all IP addresses. This includes
requests from SmartConsole, Web services and the mgmt_cli utility.
api restart
Note - On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server.
cma_migrate
Description
On the applicable target Domain Management Server, imports the management database that was
exported from an R7x Domain Management Server.
Note - This command updates the database schema before it imports. First, the
command runs pre-upgrade verification. If no errors are found, migration continues. If
there are errors, you must fix them on the source R7x Domain Management Server
according to instructions in the error messages. Then do this procedure again.
For the complete procedure, see the R80.40 Installation and Upgrade Guide.
Syntax
Example
contract_util
Description
Works with the Check Point Service Contracts.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
contract_util [-d]
check <options>
cpmacro <options>
download <options>
mgmt
print <options>
summary <options>
update <options>
verify
Parameters
Parameter Description
cpmacro Overwrites the current cp.macro file with the specified cp.macro file.
<options>
See "contract_util cpmacro" on page 77.
download Downloads all associated Check Point Service Contracts from the User Center, or
<options> from a local file.
See "contract_util download" on page 78.
mgmt Delivers the Service Contract information from the Management Server to the
managed Security Gateways.
See "contract_util mgmt" on page 80.
print Shows all the installed licenses and whether the Service Contract covers these
<options> license, which entitles them for upgrade or not.
See "contract_util print" on page 81.
Parameter Description
update Updates Check Point Service Contracts from your User Center account.
<options>
See "contract_util update" on page 83.
contract_util check
Description
Checks whether the Security Gateway is eligible for an upgrade.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
contract_util check
{-h | -help}
hfa
maj_upgrade
min_upgrade
upgrade
Parameters
Parameter Description
hfa Checks whether the Security Gateway is eligible for an upgrade to a higher Hotfix
Accumulator.
maj_ Checks whether the Security Gateway is eligible for an upgrade to a higher Major
upgrade version.
min_ Checks whether the Security Gateway is eligible for an upgrade to a higher Minor
upgrade version.
contract_util cpmacro
Description
Overwrites the current cp.macro file with the specified cp.macro file, if the specified is newer than the
current file.
For more information about the cp.macro file, see sk96217: What is a cp.macro file?
Syntax
Message Description
contract_util download
Description
Downloads all associated Check Point Service Contracts from User Center, or from a local file.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
contract_util download
{-h | -help}
local
{-h | -help}
[{hfa | maj_upgrade | min_upgrade | upgrade}] <Service
Contract File>
uc
{-h | -help}
[-i] [{hfa | maj_upgrade | min_upgrade | upgrade}]
<Username> <Password> [<Proxy Server> [<Proxy Username>:<Proxy
Password>]]
Parameters
Parameter Description
local Specifies to download the Service Contract from the local file.
This is equivalent to the cplic contract putcommand.
<Proxy Server> [<Proxy Specifies that the connection to the User Center goes through
Username>:<Proxy the proxy server.
Password>]
n <Proxy Server> - IP address of resolvable hostname
of the proxy server
n <Proxy Username> - Username for the proxy server.
n <Proxy Password> - Password for the proxy server.
Note - If you do not specify the proxy server explicitly, the
command uses the proxy server configured in the management
database.
<Service Contract File> Path to and the name of the Service Contract file.
First, you must download the Service Contract file from your User
Center account.
contract_util mgmt
Description
Delivers the Service Contract information from the Management Server to the managed Security
Gateways.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
contract_util mgmt
contract_util print
Description
Shows all the installed licenses and whether the Service Contract covers these license, which entitles them
for upgrade or not.
This command can show which licenses are not recognized by the Service Contract file.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
Parameters
Parameter Description
contract_util summary
Description
Shows post-installation summary and whether this Check Point computer is eligible for upgrades.
Syntax
contract_util summary
hfa
maj_upgrade
min_upgrade
upgrade
Parameters
Parameter Description
contract_util update
Description
Updates the Check Point Service Contracts from your User Center account.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
contract_util update
[-proxy <Proxy Server>:<Proxy Port>]
[-ca_path <Path to ca-bundle.crt File>]
Parameters
Parameter Description
-proxy <Proxy Specifies that the connection to the User Center goes through the
Server>:<Proxy Port> proxy server:
n <Proxy Server> - IP address of resolvable hostname of
the proxy server.
n <Proxy Port> - The applicable port on the proxy server.
Note - If you do not specify the proxy explicitly, the command
uses the proxy configured in the management database.
-ca_path <Path to ca- Specifies the path to the Certificate Authority Bundle file (ca-
bundle.crt File> bundle.crt).
contract_util verify
Description
Checks whether the Security Gateway is eligible for an upgrade.
This command is the same as the "contract_util check" on page 76 command, but it also interprets the
return values and shows a meaningful message.
For more information about Service Contract files, see sk33089: What is a Service Contract File?
Syntax
contract_util verify
cp_conf
Description
Configures or reconfigures a Check Point product installation.
Note - The available options for each Check Point computer depend on the
configuration and installed products.
cp_conf
-h
admin <options>
auto <options>
ca <options>
client <options>
finger <options>
lic <options>
snmp <options>
cp_conf
-h
adv_routing <options>
auto <options>
corexl <options>
fullha <options>
ha <options>
intfs <options>
lic <options>
sic <options>
snmp <options>
Parameters
Parameter Description
admin Configures Check Point system administrators for the Security Management
<options> Server.
See "cp_conf admin" on page 88.
adv_routing Enables or disables the Advanced Routing feature on this Security Gateway.
<options>
Important - Do not use these outdated commands. To configure
Advanced Routing, see the R80.40 Gaia Advanced Routing
Administration Guide.
auto <options> Shows and configures the automatic start of Check Point products during boot.
See "cp_conf auto" on page 91.
ca <options> n Configures the Certificate Authority's (CA) Fully Qualified Domain Name
(FQDN).
n Initializes the Internal Certificate Authority (ICA).
client Configures the GUI clients that can use SmartConsole to connect to the
<options> Security Management Server.
See "cp_conf client" on page 95.
intfs Sets the topology of interfaces on a Security Gateway, which you manage with
<options> SmartProvisioning.
See "cp_conf intfs" on page 887.
Parameter Description
cp_conf admin
Description
Configures Check Point system administrators for the Security Management Server.
Notes:
n Multi-Domain Server does not support this command.
n Only one administrator can be defined in the "cpconfig" on page 133 menu.
To define additional administrators, use SmartConsole.
n This command corresponds to the option Administrator in the "cpconfig" on page 133
menu.
Syntax
cp_conf admin
-h
add [<UserName> <Password> {a | w | r}]
add -gaia [{a | w | r}]
del <UserName1> <UserName2> ...
get
Parameters
Parameter Description
add -gaia [{a | w | r}] Adds the Gaia administrator user admin:
Permissions for all products (Read/[W]rite All, [R]ead Only All, [C]ustomized) c
Permission for SmartUpdate (Read/[W]rite, [R]ead Only, [N]one) w
Permission for Monitoring (Read/[W]rite, [R]ead Only, [N]one) w
cp_conf auto
Description
Shows and controls which of Check Point products start automatically during boot.
Note - This command corresponds to the option Automatic start of Check Point
Products in the "cpconfig" on page 133 menu.
Syntax
cp_conf auto
-h
{enable | disable} <Product1> <Product2> ...
get all
Parameters
Parameter Description
{enable | disable} <Product1> Controls whether the installed Check Point products start
<Product2> ... automatically during boot.
This command is for Check Point use only.
[Expert@MGMT:0]#
[Expert@GW:0]#
cp_conf ca
Description
n Initializes the Internal Certificate Authority (ICA).
n Configures the Certificate Authority's (CA) Fully Qualified Domain Name (FQDN).
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
cp_conf ca
-h
fqdn <FQDN Name>
init
Parameters
Parameter Description
fqdn <FQDN Configures the Certificate Authority's (CA) Fully Qualified Domain Name
Name> (FQDN).
<FQDN Name> is the text string hostname.domainname
Example
[Expert@MyMGMT:0]# hostname
MyMGMT
[Expert@MyMGMT:0]#
[Expert@MyMGMT:0]# domainname
checkpoint.com
[Expert@MyMGMT:0]#
cp_conf client
Description
Configures the GUI clients that are allowed to connect with SmartConsoles to the Security Management
Server.
Notes:
n Multi-Domain Server does not support this command.
n This command corresponds to the option GUI Clients in the "cpconfig" on page 133
menu.
Syntax
cp_conf client
add <GUI Client>
createlist <GUI Client 1> <GUI Client 2> ...
del <GUI Client 1> <GUI Client 2> ...
get
Parameters
Parameter Description
createlist <GUI Client 1> Deletes the current allowed GUI clients and creates a
<GUI Client 2> ... new list of allowed GUI clients.
del <GUI Client 1> <GUI Deletes the specified the GUI clients.
Client 2> ...
Examples
Example 6 - Delete the current list and create a new list of allowed GUI clients
[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#
cp_conf finger
Description
Shows the Internal Certificate Authority's Fingerprint.
This fingerprint is a text string derived from the ICA certificate on the Security Management Server, Multi-
Domain Server, or Domain Management Server.
This fingerprint verifies the identity of the Security Management Server, Multi-Domain Server, or Domain
Management Server when you connect to it with SmartConsole.
mdsenv
Syntax
cp_conf finger
-h
get
Parameters
Parameter Description
Example
cp_conf lic
Description
Shows, adds and deletes Check Point licenses.
Note - This command corresponds to the option Licenses and contracts in the
"cpconfig" on page 133 menu.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
cp_conf lic
-h
add -f <Full Path to License File>
add -m <Host> <Date> <Signature Key> <SKU/Features>
del <Signature Key>
get [-x]
Parameters
Parameter Description
add -f <Full Path to License Adds a license from the specified Check Point license
File> file.
You get this license file in the Check Point User Center.
This is the same command as the "cplic db_add" on
page 144.
cp_log_export
Description
Exports Check Point logs over syslog.
For more information, see sk122323 and R80.40 Logging and Monitoring Administration Guide.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
cp_log_export
Parameters
Parameter Description
<command-name> help Shows the built help for the specified internal command.
Internal Commands
Name Description
reexport Reset the current position and reexport all logs per the configuration.
Required
for
Required "show", Required
Required Required
for "status", for
Name Description for "add" for "set"
"delete" "start", "reexport"
command command
command "stop", command
"restart"
command
Required
for
Required "show", Required
Required Required
for "status", for
Name Description for "add" for "set"
"delete" "start", "reexport"
command command
command "stop", command
"restart"
command
Required
for
Required "show", Required
Required Required
for "status", for
Name Description for "add" for "set"
"delete" "start", "reexport"
command command
command "stop", command
"restart"
command
cpca_client
Description
Execute operations on the Internal Certificate Authority (ICA).
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
cpca_client [-d]
create_cert <options>
double_sign <options>
get_crldp <options>
get_pubkey <options>
init_certs <options>
lscert <options>
revoke_cert <options>
revoke_non_exist_cert <options>
search <options>
set_mgmt_tool <options>
set_sign_hash <options>
Parameters
Parameter Description
create_cert <options> Issues a SIC certificate for the Security Management Server or
Domain Management Server.
See "cpca_client create_cert" on page 110.
Parameter Description
get_crldp <options> Shows how to access a CRL file from a CRL Distribution Point.
See "cpca_client get_crldp" on page 114.
get_pubkey <options> Saves the encoding of the public key of the ICA's certificate to a file.
See "cpca_client get_pubkey" on page 115.
init_certs <options> Imports a list of DNs for users and creates a file with registration
keys for each user.
See "cpca_client init_certs" on page 116.
set_sign_hash Sets the hash algorithm that the CA uses to sign the file hash.
<options>
See "cpca_client set_sign_hash" on page 130.
cpca_client create_cert
Description
Issues a SIC certificate for the Security Management Server or Domain Management Server.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.
-p <CA port Specifies the TCP port on the Security Management Server or Domain
number> Management Server, which is used to connect to the Certificate Authority.
The default TCP port number is 18209.
-f <Full Path to Specifies the PKCS12 file, which stores the certificate and keys.
PKCS12 file>
-c "<Comment for Optional. Specifies the certificate comment (must enclose in double quotes).
Certificate>"
Example
cpca_client double_sign
Description
Creates a second signature for a certificate.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.
-p <CA port Optional. Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.
-o <Full Path to Optional. Saves the certificate into the specified file.
Output File>
Example
[Expert@MGMT:0]#
cpca_client get_crldp
Description
Shows how to access a CRL file from a CRL Distribution Point.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
-p <CA Optional. Specifies the TCP port on the Security Management Server or Domain
port Management Server, which is used to connect to the Certificate Authority.
number>
The default TCP port number is 18209.
Example
cpca_client get_pubkey
Description
Saves the encoding of the public key of the ICA's certificate to a file.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
cpca_client [-d] get_pubkey [-p <CA port number>] <Full Path to Output
File>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
-p <CA port Specifies the TCP port on the Security Management Server or Domain
number> Management Server, which is used to connect to the Certificate Authority.
The default TCP port number is 18209.
<Full Path to Saves the encoding of the public key of the ICA's certificate to the specified file.
Output File>
Example
cpca_client init_certs
Description
Imports a list of Distinguished Names (DN) for users and creates a file with registration keys for each user.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
-p <CA port Optional. Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.
...CN=test1,OU=users...
<Empty Line>
...CN=test2,OU=users...
cpca_client lscert
Description
Shows all certificates issued by the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
-dn <SubString> Optional. Filters the search results to those with a DN that
matches the specified <SubString>.
This command does not support multiple values.
-stat {Pending | Valid | Optional. Filters the search results to those with certificate
Revoked | Expired | status that matches the specified status.
Renewed}
This command does not support multiple values.
-kind {SIC | IKE | User | Optional. Filters the search results to those with certificate
LDAP} kind that matches the specified kind.
This command does not support multiple values.
-ser <Certificate Serial Optional. Filters the search results to those with certificate
Number> serial number that matches the specified serial number.
This command does not support multiple values.
Example
Subject = CN=VSX2,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Revoked Kind = SIC Serial = 5521 DP = 0
Not_Before: Sun Apr 8 14:10:01 2018 Not_After: Sat Apr 8 14:10:01 2023
Subject = CN=VSX1,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Revoked Kind = SIC Serial = 9113 DP = 0
Not_Before: Sun Apr 8 14:09:02 2018 Not_After: Sat Apr 8 14:09:02 2023
cpca_client revoke_cert
Description
Revokes a certificate issued by the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
-p <CA port Optional. Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.
Example
Note - You can use the parameter '-n' only, or together with the
parameter "-s".
Note - You can use the parameter "-s" only, or together with the
parameter "-n".
cpca_client revoke_non_exist_cert
Description
Revokes a non-existent certificate issued by the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parame
Description
ter
-i Specifies the file that contains the list of the certificate to revoke.
<Full
You must create this file in the same format as the "cpca_client lscert" on page 117
Path
command prints its output.
to
Input Example
File>
Subject = CN=cp_mgmt,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 30287 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7
19:40:12 2023
<Empty Line>
Subject = CN=cp_mgmt,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 60870 DP = 0
Not_Before: Sat Apr 7 19:40:13 2018 Not_After: Fri Apr 7
19:40:13 2023
Note - This command saves the error messages in the <Name of Input
File>.failures file.
cpca_client search
Description
Searches for certificates in the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Parameter Description
-where {dn | comment | serial | device_ Optional. Specifies the certificate's field, in
type | device_id | device_name} which to search for the string:
n dn - Certificate DN
n comment - Certificate comment
n serial - Certificate serial number
n device_type - Device type
n device_id - Device ID
n device_name - Device Name
The default is to search in all fields.
-kind {SIC | IKE | User | LDAP} Optional. Specifies the certificate kind to
search.
You can enter multiple values in this format:
-kind <Kind1> <Kind2> <Kind3>
The default is to search for all kinds.
Example 1
[Expert@MGMT:0]# cpca_client search samplecompany -where comment -kind SIC LDAP -stat Pending Valid Renewed
Example 2
Subject = CN=192.168.3.51,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 73455 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
Fingerprint = XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX
Thumbprint = xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx
[Expert@MGMT:0]#
Example 3
Subject = CN=192.168.3.51,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 73455 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
[Expert@MGMT:0]#
cpca_client set_mgmt_tool
Description
Controls the ICA Management Tool.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
See:
n sk30501: Setting up the ICA Management Tool
n sk39915: Invoking the ICA Management Tool
n sk102837: Best Practices - ICA Management Tool configuration
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
add Adds the specified administrator, user, or custom user that is permitted to use the
ICA Management Tool.
remove Removes the specified administrator, user, or custom user that is permitted to
use the ICA Management Tool.
clean Removes all administrators, users, or custom users that are permitted to use the
ICA Management Tool.
Parameter Description
print Shows the configured administrators, users, or custom users that are permitted to
use the ICA Management Tool.
-p <CA port Optional. Specifies the TCP port on the Security Management Server or Domain
number> Management Server, which is used to connect to the Certificate Authority.
The default TCP port number is 18265.
-a < Optional. Specifies the DN of the administrator that is permitted to use the ICA
Administrator Management Tool.
DN>
Must specify the full DN as appears in SmartConsole
Procedure
Example:
-a "CN=ICA_Tool_Admin,OU=users,O=MGMT.s6t98x"
Parameter Description
-u <User DN> Optional. Specifies the DN of the user that is permitted to use the ICA
Management Tool.
Must specify the full DN as appears in SmartConsole:
Procedure
Example:
-u "CN=ICA_Tool_User,OU=users,O=MGMT.s6t98x"
-c <Custom Optional. Specifies the DN for the custom user that is permitted to use the ICA
User DN> Management Tool.
Must specify the full DN as appears in SmartConsole.
Procedure
Example:
-c "CN=ICA_Tool_User,OU=users,O=MGMT.s6t98x"
cpca_client set_sign_hash
Description
Sets the hash algorithm that the CA uses to sign the file hash. Also, see sk103840.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Important - After this change, you must restart the Check Point services with these commands:
n On Security Management Server, run:
1. cpstop
2. cpstart
Parameters
Parameter Description
{sha1 | sha256 | sha384 | The hash algorithms that the CA uses to sign the file
sha512} hash.
The default algorithm is SHA-256.
Example
cpca_create
Description
Creates new Check Point Internal Certificate Authority database.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
-dn <CA DN> Specifies the Certificate Authority Distinguished Name (DN).
cpinfo
Description
A utility that collects diagnostics data on your Check Point computer at the time of execution.
It is mandatory to collect these data when you contact Check Point Support about an issue on your Check
Point computer.
For more information, see sk92739.
cplic
Description
The cplic command lets you manage Check Point licenses.
You can run this command in Gaia Clish or in the Expert mode.
License Management is divided into three types of commands:
Licensing
Applies To Description
Commands
Local licensing Management Servers, You execute these commands locally on the Check Point
commands computers.
Security Gateways
and Cluster Members
For more about managing licenses, see the R80.40 Security Management Administration Guide.
cplic [-d]
{-h | -help}
check <options>
contract <options>
del <options>
print <options>
put <options>
Syntax for Remote Licensing on managed Security Gateways and Cluster Members
cplic [-d]
{-h | -help}
del <options>
get <options>
put <options>
upgrade <options>
cplic [-d]
{-h | -help}
db_add <options>
db_print <options>
db_rm <options>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
check <options> Confirms that the license includes the feature on the local Security Gateway or
Management Server.
See "cplic check" on page 140.
contract Manages (deletes and installs) the Check Point Service Contract on the local
<options> Check Point computer.
See "cplic contract" on page 142.
Parameter Description
del <options> Deletes a Check Point license on a host, including unwanted evaluation,
expired, and other licenses.
See "cplic del" on page 149.
del <Object Detaches a Central license from a remote managed Security Gateway or
Name> <options> Cluster Member.
See "cplic del <object name>" on page 150.
print <options> Prints details of the installed Check Point licenses on the local Check Point
computer.
See "cplic print" on page 153.
put <Object Attaches one or more Central or Local licenses to a remote managed Security
Name> <options> Gateways and Cluster Members.
See "cplic put <object name>" on page 157.
cplic check
Description
Confirms that the license includes the feature on the local Security Gateway or Management Server. See
sk66245.
Syntax
cplic [-d] check [-p <Product>] [-v <Version>] [{-c | -count}] [-t
<Date>] [{-r | -routers}] [{-S | -SRusers}] <Feature>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
Parameter Description
cplic contract
Description
Deletes the Check Point Service Contract on the local Check Point computer.
Installs the Check Point Service Contract on the local Check Point computer.
Note
n For more information about Service Contract files, see sk33089: What is a
Service Contract File?
n If you install a Service Contract on a managed Security Gateway / Cluster
Member, you must update the license repository on the applicable Management
Server - either with the "cplic get" on page 151 command, or in SmartUpdate.
Syntax
cplic contract -h
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.
cplic db_add
Description
Adds licenses to the license repository on the Management Server.
When you add Local licenses to the license repository, Management Server automatically attaches them
to the managed Security Gateway / Cluster Member with the matching IP address.
When you add Central licenses, you must manually attach them.
Note - You get the license details in the Check Point User Center.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
<SKU/Features> The SKU of the license summarizes the features included in the license.
For example, CPSUITE-EVAL-3DES-vNG
Example
If the file 192.0.2.11.lic contains one or more licenses, the command "cplic db_add -l
192.0.2.11.lic" produces output similar to:
cplic db_print
Description
Shows the details of Check Point licenses stored in the license repository on the Management Server.
Syntax
cplic [-d] db_print {<Object Name> | -all} [{-n | -noheader}] [-x] [{-
t | -type}] [{-a | -attached}]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
Example
cplic db_rm
Description
Removes a license from the license repository on the Management Server.
After you remove the license from the repository, it can no longer use it.
Warning - You can run this command ONLY after you detach the license with the "cplic
del" on page 149 command.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
Example
[Expert@MGMT:0]# cplic db_rm 2f540abb-d3bcb001-7e54513e-kfyigpwn
cplic del
Description
Deletes a Check Point license on a host, including unwanted evaluation, expired, and other licenses.
This command can delete a license on both local computer, and on remote managed computers.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
<Object Name> The name of the Security Gateway / Cluster Member object as defined in
SmartConsole.
Syntax
cplic [-d] del <Object Name> [-F <Output File>] [-ip <Dynamic IP
Address>] <Signature>
Parameters
Parameter Description
<Object Name> The name of the Security Gateway / Cluster Member object as defined
in SmartConsole.
-ip <Dynamic IP Deletes the license on the DAIP Security Gateway with the specified IP
Address> address.
Note - If this parameter is used, then object name must be a DAIP
Security Gateway.
cplic get
Description
Retrieves all licenses from managed Security Gateways and Cluster Members into the license repository
on the Management Server.
This command helps synchronize the license repository with the managed Security Gateways and Cluster
Members.
When you run this command, it updates the license repository with all local changes.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
-all Retrieves licenses from all Security Gateways and Cluster Members in the managed
network.
<IP The IP address of the Security Gateway / Cluster Member, from which licenses are to be
Address retrieved.
>
<Host The name of the Security Gateway / Cluster Member object as defined in SmartConsole,
Name> from which licenses are to be retrieved.
Example
If the Security Gateway with the object name MyGW contains four Local licenses, and the license repository
contains two other Local licenses, the command "cplic get MyGW" produces output similar to this:
cplic print
Description
Prints details of the installed Check Point licenses on the local Check Point computer.
Note - On a Security Gateway / Cluster Member, this command prints all installed
licenses (both Local and Central).
Syntax
Parameters
Parameter Description
Example 1
Example 2
cplic put
Description
Installs one or more Local licenses on a Check Point computer.
Note - You get the license details in the Check Point User Center.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
{-o | - On a Security Gateway / Cluster Member, this command erases only the local
overwrite} licenses, but not central licenses that are installed remotely.
{-c | - Verifies the license. Checks if the IP of the license matches the Check Point
check-only} computer and if the signature is valid.
{-s | - Selects only the local license whose IP address matches the IP address of the
select} Check Point computer.
{-P | -Pre- Use this option after you have upgraded and before you reboot the Check Point
boot} computer.
Use of this option will prevent certain error messages.
Parameter Description
<Host> Hostname or IP address of the Security Gateway / Cluster Member for a local
license.
Hostname or IP address of the Security Management Server / Domain
Management Server for a central license.
< The SKU of the license summarizes the features included in the license.
SKU/Features
For example: CPSUITE-EVAL-3DES-vNG
>
Copy and paste the parameters from the license received from the User Center:
Parameter Description
SKU/features A string listing the SKU and the Certificate Key of the license.
The SKU of the license summarizes the features included in the license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab
Example
Note
n You get the license details in the Check Point User
Center.
n You can attach more than one license.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.
<Object Name> The name of the Security Gateway / Cluster Member object, as defined in
SmartConsole.
-ip <Dynamic IP Installs the license on the Security Gateway with the specified IP address.
Address>
This parameter is used to install a license on a Security Gateway with
dynamically assigned IP address (DAIP).
Note - If you use this parameter, then the object name must be that
of a DAIP Security Gateway.
<SKU/Features> The SKU of the license summarizes the features included in the license.
For example: CPSUITE-EVAL-3DES-vNG
Copy and paste the parameters from the license received from the User Center:
Parameter Description
SKU/features A string listing the SKU and the Certificate Key of the license.
The SKU of the license summarizes the features included in the license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab
cplic upgrade
Description
Upgrades licenses in the license repository with licenses in the specified license file.
Note - You get this license file in the Check Point User Center.
Syntax
Parameters
Parameter Description
-l Upgrades the licenses in the license repository and Check Point Security Gateways /
<Input Cluster Members to match the licenses in the specified file.
File>
Example
This example explains the procedure to upgrade the licenses in the license repository.
There are two Software Blade licenses in the input file:
n One license does not match any license on a remote managed Security Gateway.
n The other license matches an NGX-version license on a managed Security Gateway that has to be
upgraded.
Workflow in this example:
1. Upgrade the Security Management Server to the latest version.
Ensure that there is connectivity between the Security Management Server and the Security
Gateways with the previous product versions.
2. Import all licenses into the license repository.
You can also do this after you upgrade the products on the remote Security Gateways.
3. Run this command:
Example:
Example:
5. In the Check Point User Center, view the licenses for the products that were upgraded from version
NGX to a Software Blades license.
You can also create new upgraded licenses.
6. Download a file containing the upgraded licenses.
Only download licenses for the products that were upgraded from version NGX to Software Blades.
7. If you did not import the version NGX licenses into the repository, import the version NGX licenses
now.
Use this command:
n The licenses in the downloaded license file and in the license repository are compared.
n If the certificate keys and features match, the old licenses in the repository and in the remote
Security Gateways are updated with the new licenses.
n A report of the results of the license upgrade is printed.
For more about managing licenses, see the R80.40 Security Management Administration Guide.
cpmiquerybin
Description
The cpmiquerybin utility connects to a specified database, runs a user-defined query and shows the
query results.
The results can be a collection of Security Gateway sets or a tab-delimited list of specified fields from each
retrieved object.
The default database of the query tool is based on the shell environment settings.
To connect to a Domain Management Server database, run "mdsenv" on page 680 and define the
necessary environment variables.
Use the Domain Management Server name or IP address as the first parameter.
Notes:
n You can see complete documentation of the cpmiquerybin utility, with the full
query syntax, examples, and a list of common attributes in sk65181.
n The MISSING_ATTR string shows when you use an attribute name that does
not exist in the objects in query result.
Syntax
Parameters
Parameter Description
-a < If you use the "query_result_type" parameter, you must specify one or more
attributes_ attributes in a comma-delimited list (without spaces) of object fields.
list>
You can return all object names with the special string: __name__
Return Values
n 0 - Query returns data successfully
n 1 - Query does not return data or there is a query syntax error
cppkg
Description
Manages the SmartUpdate software packages repository on the Security Management Server.
Important - Installing software packages with the SmartUpdate is not supported for
Security Gateways running on Gaia OS.
Syntax
cppkg
add <options>
{del | delete} <options>
get
getroot
print
setroot <options>
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the MDS (run
mdsenv).
Parameters
Parameter Description
get Updates the list of the SmartUpdate software packages in the repository.
See "cppkg get" on page 167.
getroot Shows the path to the root directory of the repository (the value of the
environment variable $SUROOT).
setroot <options> Configures the path to the root directory of the repository.
See "cppkg setroot" on page 170.
cppkg add
Description
Adds a SmartUpdate software package to the SmartUpdate software packages repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
n This command does not overwrite existing packages. To overwrite an existing
package, you must first delete the existing package.
n You get the SmartUpdate software packages from the Check Point Support
Center.
Syntax
Parameters
Parameter Description
<Full Path to Specifies the full local path on the computer to the SmartUpdate
Package> software package.
Example - Adding R77.20 HFA_75 (R77.20.75) firmware package for 1100 Appliances
ppkg delete
Description
Deletes SmartUpdate software packages from the SmartUpdate software packages repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
Parameters
Parameter Description
del | When you do not specify optional parameters, the command runs in the interactive
delete mode. The command shows the menu with applicable options.
Notes:
n To see the values for the optional parameters, run the "cppkg print" on page 169
command.
n You must specify all optional parameters, or no parameters.
Select package:
--------------------
(0) Delete all
(1) CP1100 Gaia Embedded Check Point R77.20 R77.20
(e) Exit
You chose to delete 'CP1100 Gaia Embedded Check Point R77.20 R77.20', Is this correct? [y/n] : y
[Expert@MGMT:0]# cppkg delete "Check Point" "CP1100" "R77.20" "Gaia Embedded" "R77.20"
Package was successfully removed from the repository
[Expert@MGMT:0]#
cppkg get
Description
Updates the list of the SmartUpdate software packages in the SmartUpdate software packages repository
based on the real content of the repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
cppkg get
Example
cppkg getroot
Description
Shows the path to the root directory of the SmartUpdate software packages repository (the value of the
environment variable $SUROOT)
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
cppkg getroot
Example
cppkg print
Description
Prints the list of SmartUpdate software packages in the SmartUpdate software packages repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
cppkg print
cppkg setroot
Description
Configures the path to the root directory of the SmartUpdate software packages repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
n The default path is: /var/log/cpupgrade/suroot
n When changing repository root directory:
l This command copies the software packages from the old repository to
the new repository. A package in the new location is overwritten by a
package from the old location, if the packages have the same name.
l This command updates the value of the environment variable $SUROOT
in the Check Point Profile shell scripts ($CPDIR/tmp/.CPprofile.sh
and $CPDIR/tmp/.CPprofile.csh).
Syntax
Example
cpprod_util
Description
This utility lets you work with Check Point Registry ($CPDIR/registry/HKLM_registry.data)
without manually opening it:
n Shows which Check Point products and features are enabled on this Check Point computer.
n Enables and disables Check Point products and features on this Check Point computer.
Syntax
cpprod_util -dump
Parameters
Parameter Description
"< Specifies the configuration parameter for the specified product or feature.
Parameter
>"
"<Value>" Specifies the value of the configuration parameter for the specified product or feature:
Notes
n On a Multi-Domain Server, you must run this command in the context of the relevant Domain
Management Server.
n If you run the cpprod_util command without parameters, it prints:
l The list of all available products and features (for example, "FwIsFirewallMgmt",
"FwIsLogServer", "FwIsStandAlone")
l The type of the expected argument when you configure a product or feature ("no-
parameter", "string-parameter", or "integer-parameter")
l The type of the returned output ("status-output", or "no-output")
n To redirect the output of the cpprod_util command, you need to redirect the stderr to stdout:
Example:
Examples
Example - Showing a list of all installed Check Point Products Packages on a Management
Server
[Expert@MGMT:0]# cpprod_util CPPROD_GetInstalledProducts
CPFC
IDA
MGMT
FW1
SecurePlatform
NGXCMP
EdgeCmp
SFWCMP
SFWR75CMP
SFWR77CMP
FLICMP
R75CMP
R7520CMP
R7540CMP
R76CMP
R77CMP
PROVIDER-1
Reporting Module
SmartLog
CPinfo
VSEC
DIAG
[Expert@MGMT:0]#
Example - Checking if this Check Point computer is configured as a dedicated Log Server
[Expert@MGMT:0]# cpprod_util FwIsLogServer
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the SmartEvent Server blade is enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerServer
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the SmartEvent Correlation Unit blade
is enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerCorrelationUnit
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the Endpoint Policy Management blade
is enabled
[Expert@MGMT:0]# cpprod_util UepmIsInstalled
1
[Expert@MGMT:0]#
Example - Showing a list of all installed Check Point Products Packages on a Security
Gateway
[Expert@MyGW:0]# cpprod_util CPPROD_GetInstalledProducts
CPFC
IDA
MGMT
FW1
SecurePlatform
CPinfo
DIAG
PPACK
CVPN
[Expert@MyGW:0]#
cprid
Description
Manages the Check Point Remote Installation Daemon (cprid).
This daemon is used for remote upgrade and installation of Check Point products on the managed Security
Gateways.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run these commands in the context of the
MDS (run mdsenv).
Commands
Syntax Description
run_cprid_ Stops and then starts the Check Point Remote Installation Daemon
restart (cprid).
cprinstall
Description
Performs installation of Check Point product packages and associated operations on remote managed
Security Gateways.
Important - Installing software packages with this command is not supported for
Security Gateways that run on Gaia OS.
Notes:
n This command requires a license for SmartUpdate.
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
cprinstall
boot <options>
cprestart <options>
cpstart <options>
cpstop <options>
delete <options>
get <options>
install <options>
revert <options>
show <options>
snapshot <options>
transfer <options>
uninstall <options>
verify <options>
Parameters
Parameter Description
Parameter Description
get n Gets details of the products and the operating system installed on the
<options> managed Security Gateway.
n Updates the management database on the Security Management Server.
revert Restores the managed Security Gateway that runs on SecurePlatform OS from a
<options> snapshot saved on that Security Gateway.
See "cprinstall revert" on page 188.
show Displays all snapshot (backup) files on the managed Security Gateway that runs on
<options> SecurePlatform OS.
See "cprinstall show" on page 189.
snapshot Creates a snapshot on the managed Security Gateway that runs on SecurePlatform
<options> OS and saves it on that Security Gateway.
See "cprinstall snapshot" on page 190.
transfer Transfers a software package from the repository to the managed Security
<options> Gateway without installing the package.
See "cprinstall transfer" on page 191.
cprinstall boot
Description
Reboots the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example
[Expert@MGMT]# cprinstall boot MyGW
cprinstall cprestart
Description
Runs the cprestart command on the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n All Check Point products on the managed Security Gateway must be of the same
version.
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example
[Expert@MGMT:0]# cprinstall cprestart MyGW
cprinstall cpstart
Description
Runs the cpstart command on the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n All Check Point products on the managed Security Gateway must be of the same
version.
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example
[Expert@MGMT]# cprinstall cpstart MyGW
cprinstall cpstop
Description
Runs the cpstop command on the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n All Check Point products on the managed Security Gateway must be of the same
version.
Syntax
Parameters
Parameter Description
-proc Kills the Check Point daemons and Security Servers, while it maintains the active
Security Policy running in the Check Point kernel.
Rules with generic Allow, Drop or Reject action based on services, continue to work.
- Kills the Check Point daemons and Security Servers and unloads the Security Policy
nopolicy from the Check Point kernel.
Example
[Expert@MGMT]# cprinstall cpstop -proc MyGW
cprinstall delete
Description
Deletes a snapshot (backup) file on the managed Security Gateway that runs on SecurePlatform OS.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
<Snapshot File> Specifies the name of the snapshot (backup) on SecurePlatform OS.
Example
[Expert@MGMT]# cprinstall delete MyGW Snapshot25Apr2017
cprinstall get
Description
n Gets details of the products and the operating system installed on the managed Security Gateway.
n Updates the management database on the Security Management Server.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example:
cprinstall install
Description
Installs Check Point products on the managed Security Gateway.
Important - Installing software packages with this command is not supported for
Security Gateways that run Gaia OS.
Notes:
n Before transferring the software package, this command runs the "cprinstall
verify" on page 194 command.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n To see the values for the package attributes, run the "cppkg print" on page 169
command.
Syntax
Parameters
Parameter Description
-boot Reboots the managed Security Gateway after installing the package.
Note - Only reboot after ALL products have the same version. Reboot is canceled
in certain scenarios.
-backup Creates a snapshot on the managed Security Gateway before installing the
package.
Note - Only on Security Gateways that runs on SecurePlatform OS.
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example
cprinstall revert
Description
Restores the managed Security Gateway that runs on SecurePlatform OS from a snapshot saved on that
Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
Parameters
Parameter Description
cprinstall show
Description
Displays all snapshot (backup) files on the managed Security Gateway that runs on SecurePlatform OS.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example
cprinstall snapshot
Description
Creates a snapshot on the managed Security Gateway that runs on SecurePlatform OS and saves it on
that Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
Parameters
Parameter Description
cprinstall transfer
Description
Transfers a software package from the repository to the managed Security Gateway without installing the
package.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n To see the values for the package attributes, run the "cppkg print" on page 169
command.
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
cprinstall uninstall
Description
Uninstalls Check Point products on the managed Security Gateway.
Important - Uninstalling software packages with this command is not supported for
Security Gateways running on Gaia OS.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n Before uninstalling product packages, this command runs the "cprinstall verify"
on page 194 command.
n After uninstalling a product package, you must run the "cprinstall get" on
page 184 command.
n To see the values for the package attributes, run the "cppkg print" on page 169
command.
Syntax
Parameters
Parameter Description
-boot Reboots the managed Security Gateway after uninstalling the package.
Note - Reboot is canceled in certain scenarios.
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
Example
[Expert@MGMT]# cprinstall uninstall MyGW "checkpoint" "firewall" "R75.20" "R75.20"
Uninstalling firewall R75.20 from MyGW...
Info : Removing package from Check Point Gateway
Info : Product was successfully applied.
Operation Success. Please get network object data to complete the operation.
[Expert@MGMT]#
[Expert@MGMT]# cprinstall get
cprinstall verify
Description
Confirms these operations were successful:
n If a specific product can be installed on the managed Security Gateway.
n That the operating system and currently installed products the managed Security Gateway are
appropriate for the software package.
n That there is enough disk space to install the product the managed Security Gateway.
n That there is a CPRID connection with the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n To see the values for the package attributes, run the "cppkg print" on page 169
command.
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway object as configured in SmartConsole.
cpstat
Description
Displays the status and statistics information of Check Point applications.
Syntax
cpstat [-d] [-h <Host>] [-p <Port>] [-s <SICname>] [-f <Flavor>] [-o
<Polling Interval> [-c <Count>] [-e <Period>]] <Application Flag>
Note - You can write the parameters in the syntax in any order.
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
The output shows the SNMP queries and SNMP responses for the applicable SNMP
OIDs.
-h <Host> Optional.
When you run this command on a Management Server, this parameter specifies the
managed Security Gateway.
<Host> is an IPv4 address, a resolvable hostname, or a DAIP object name.
The default is localhost.
-p <Port> Optional.
Port number of the Application Monitoring (AMON) server.
The default port is 18192.
-s Optional.
<SICname>
Secure Internal Communication (SIC) name of the Application Monitoring (AMON)
server.
Parameter Description
-f <Flavor> Optional.
Specifies the type of the information to collect.
If you do not specify a flavor explicitly, the command uses the first flavor in the
<Application Flag>. To see all flavors, run the cpstat command without any
parameters.
-o <Polling Optional.
Interval>
Specifies the polling interval (in seconds) - how frequently the command collects and
shows the information.
Examples:
n 0 - The command shows the results only once and the stops (this is the default
value).
n 5 - The command shows the results every 5 seconds in the loop.
n 30 - The command shows the results every 30 seconds in the loop.
n N - The command shows the results every N seconds in the loop.
Use this parameter together with the "-c <Count>" parameter and the "-e
<Period>" parameter.
Example:
cpstat os -f perf -o 2
-c <Count> Optional.
Specifies how many times the command runs and shows the results before it stops.
You must use this parameter together with the "-o <Polling Interval>"
parameter.
Examples:
n 0 - The command shows the results repeatedly every <Polling
Interval> (this is the default value).
n 10 - The command shows the results 10 times every <Polling
Interval> and then stops.
n 20 - The command shows the results 20 times every <Polling
Interval> and then stops.
n N - The command shows the results N times every <Polling Interval>
and then stops.
Example:
cpstat os -f perf -o 2 -c 2
Parameter Description
-e <Period> Optional.
Specifies the time (in seconds), over which the command calculates the statistics.
You must use this parameter together with the "-o <Polling Interval>"
parameter.
You can use this parameter together with the "-c <Count>" parameter.
Example:
cpstat os -f perf -o 2 -c 2 -e 60
< Mandatory.
Application
See the table below with flavors for the application flags.
Flag>
Note - The available flags depend on the enabled Software Blades. Some flags are
supported only by a Security Gateway, and some flags are supported only by a
Management Server.
Feature or
Software Flag Flavors
Blade
List of enabled blades fw, ips, av, urlf, vpn, cvpn, aspm, dlp,
Software appi, anti_bot, default, content_
Blades awareness, threat-emulation, default
Feature or
Software Flag Flavors
Blade
Anti-Virus ci default
Feature or
Software Flag Flavors
Blade
QoS fg all
Provisioning PA default
Agent
Feature or
Software Flag Flavors
Blade
Examples
Network interfaces
--------------------------------------------------------------------------------------------------------
------------
|Name|IP |Netmask |Flags|Peer name|Remote IP|Topology|Proxy name|Slaves|Ports|IPv6
Address|IPv6 Len|
--------------------------------------------------------------------------------------------------------
------------
|eth0|192.168.30.40|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth1| 172.30.60.80|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth2| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth3| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth4| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth5| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth6| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth7| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
--------------------------------------------------------------------------------------------------------
------------
[Expert@MyGW:0]#
Interface table
---------------------------------------
|Name|Dir|Total |Accept|Deny |Log|
---------------------------------------
|eth0|in | 2393126| 32589| 2360537| 52|
|eth0|out| 33016| 33016| 0| 0|
|eth1|in | 2360350| 0| 2360350| 0|
|eth1|out| 0| 0| 0| 0|
|eth2|in | 2360350| 0| 2360350| 0|
|eth2|out| 0| 0| 0| 0|
|eth3|in | 2348704| 0| 2348704| 1|
|eth3|out| 0| 0| 0| 0|
|eth4|in | 2360350| 0| 2360350| 0|
|eth4|out| 0| 0| 0| 0|
---------------------------------------
| | |11855896| 65605|11790291| 53|
---------------------------------------
[Expert@MyGW:0]#
Example - CPU utilization
[Expert@HostName:0]# cpstat -f cpu os
CPU User Time (%): 1
CPU System Time (%): 0
CPU Idle Time (%): 99
CPU Usage (%): 1
CPU Queue Length: -
CPU Interrupts/Sec: 172
CPUs Number: 8
[Expert@HostName:0]#
Example - Performance
[Expert@HostName:0]# cpstat os -f perf -o 2 -c 2 -e 60
[Expert@HostName:0]#
Connected clients
-------------------------------------------------------
|Client type |Administrator|Host |Database lock|
-------------------------------------------------------
|SmartConsole|admin |JOHNDOE-PC |false |
-------------------------------------------------------
[Expert@MGMT:0]#
cpview
Overview of CPView
Description
CPView is a text based built-in utility on a Check Point computer.
CPView Utility shows statistical data that contain both general system information (CPU, Memory, Disk
space) and information for different Software Blades (only on Security Gateway).
The CPView continuously updates the data in easy to access views.
On Security Gateway, you can use this statistical data to monitor the performance.
For more information, see sk101878.
Syntax
cpview --help
Section Description
Header This view shows the time the statistics in the third view are collected.
It updates when you refresh the statistics.
Navigation This menu bar is interactive. Move between menus with the arrow keys and mouse.
A menu can have sub-menus and they show under the menu bar.
Using CPView
Use these keys to navigate the CPView:
Key Description
Q Quits CPView.
Key Description
Use these keys to save statistics, show help, and refresh statistics:
Key Description
C Saves the current page to a file. The file name format is:
cpview_<ID of the cpview process>.cap<Number of the capture>
cpwd_admin
Description
The Check Point WatchDog (cpwd) is a process that invokes and monitors critical processes such as
Check Point daemons on the local computer, and attempts to restart them if they fail.
Among the processes monitored by Watchdog are fwm, fwd, cpd, DAService, and others.
The list of monitored processes depends on the installed and configured Check Point products and
Software Blades.
The Check Point WatchDog writes monitoring information to the $CPDIR/log/cpwd.elg log file.
The cpwd_admin utility shows the status of the monitored processes, and configures the Check Point
WatchDog.
Monitoring Description
Passive WatchDog restarts the process only when the process terminates abnormally.
In the output of the cpwd_admin list command, the MON column shows N for
passively monitored processes.
Syntax
cpwd_admin
config <options>
del <options>
detach <options>
exist
flist <options>
getpid <options>
kill
list <options>
monitor_list
start <options>
start_monitor
stop <options>
stop_monitor
Parameters
Parameter Description
Parameter Description
start_ Starts the active WatchDog monitoring - WatchDog monitors the predefined
monitor processes actively.
See "cpwd_admin start_monitor" on page 228.
stop_ Stops the active WatchDog monitoring - WatchDog monitors all processes only
monitor passively.
See "cpwd_admin stop_monitor" on page 231.
cpwd_admin config
Description
Configures the Check Point WatchDog.
Important - After changing the WatchDog configuration parameters, you must restart
the WatchDog process with the cpstop and cpstart commands (which restart all
Check Point processes).
Syntax
cpwd_admin config
-h
-a <options>
-d <options
-p
-r
Parameters
Parameter Description
These are the available configuration parameters and the accepted values:
Configuration Accepted
Description
Parameter Values
default_ Text string up On a VSX Gateway, configures the CTX value that is assigned to
ctx to 128 monitored processes, for which no CTX is specified.
characters
rerun_ n 0 Configures whether the WatchDog restarts processes after they fail:
mode
n 1 n 0 - Does not restart a failed process. Monitor and log only.
(default)
n 1 - Restarts a failed process (this is the default).
reset_ n Range: Configures the time (in seconds) the WatchDog waits after the
startups >0 process starts and before the WatchDog resets the process's
startup_counter to 0.
n Default:
3600 To see the process's startup counter, in the output of the cpwd_
admin list command, refer to the #START column.
sleep_ n Range: If rerun_mode=1, specifies how much time (in seconds) passes
timeout 0 - 3600 from a process failure until WatchDog tries to restart it.
n Default:
60
Configuration Accepted
Description
Parameter Values
stop_ n Range: Configures the time (in seconds) the WatchDog waits for a process
timeout >0 stop command to complete.
n Default:
60
zero_ n Range: After failing no_limit times to restart a process, the WatchDog
timeout >0 waits zero_timeout seconds before it tries again.
n Default: The value of the zero_timeout must be greater than the value of
7200 the timeout.
The WatchDog saves the user defined configuration parameters in the $CPDIR/registry/HKLM_
registry.data file in the ": (Wd_Config" section:
Example
cpwd_admin del
Description
Temporarily deletes a monitored process from the WatchDog database of monitored processes.
Notes:
n WatchDog stops monitoring the detached process, but the process stays alive.
n The "cpwd_admin list" on page 221 command does not show the deleted
process anymore.
n This change applies until all Check Point services restart during boot, or with the
"cpstart" on page 196 command.
Parameters
Parameter Description
< Name of the monitored Check Point process as you see in the output of the "cpwd_
Application admin list" on page 221 command in the leftmost column APP.
Name>
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Example
cpwd_admin detach
Description
Temporarily detaches a monitored process from the WatchDog monitoring.
Notes:
n WatchDog stops monitoring the detached process, but the process stays alive.
n The "cpwd_admin list" on page 221 command does not show the detached
process anymore.
n This change applies until all Check Point services restart during boot, or with the
"cpstart" on page 196 command.
Parameters
Parameter Description
< Name of the monitored Check Point process as you see in the output of the "cpwd_
Application admin list" on page 221 command in the leftmost column APP.
Name>
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Example
cpwd_admin exist
Description
Checks whether the WatchDog process cpwd is alive.
Syntax
cpwd_admin exist
Example
cpwd_admin flist
Description
Prints the status of all WatchDog monitored processes on the screen.
Parameters
Parameter Description
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Output
Column Description
CTX On a VSX Gateway, shows the VSID, in which the monitored process runs.
#START Shows how many times the WatchDog started the monitored process.
START_ Shows the time when the WatchDog started the monitored process for the last time.
TIME
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_limit
configuration parameters (see "cpwd_admin config" on page 211).
MON Shows how the WatchDog monitors this process (see the explanation for the "cpwd_
admin" on page 208):
n Y - Active monitoring
n N - Passive monitoring
COMMAND Shows the command the WatchDog run to start this process.
Example
cpwd_admin getpid
Description
Shows the PID of a WatchDog monitored process.
Parameters
Parameter Description
< Name of the monitored Check Point process as you see in the output of the "cpwd_
Application admin list" on page 221 command in the leftmost column APP.
Name>
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On VSX Gateway, specifies the context of the applicable Virtual System.
Example
cpwd_admin kill
Description
Terminates the WatchDog process cpwd.
Important - Do not run this command unless explicitly instructed by Check Point
Support or R&D to do so.
To restart the WatchDog process, you must restart all Check Point services with the
"cpstop" on page 205 and "cpstart" on page 196 commands.
Syntax
cpwd_admin kill
cpwd_admin list
Description
Prints the status of all WatchDog monitored processes on the screen.
Parameters
Parameter Description
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Output
Column Description
CTX On a VSX Gateway, shows the VSID, in which the monitored process runs.
#START Shows how many times the WatchDog started the monitored process.
START_ Shows the time when the WatchDog started the monitored process for the last time.
TIME
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_limit
configuration parameters (see "cpwd_admin config" on page 211).
MON Shows how the WatchDog monitors this process (see the explanation for the "cpwd_
admin" on page 208):
n Y - Active monitoring
n N - Passive monitoring
COMMAND Shows the command the WatchDog run to start this process.
Examples
cpwd_admin monitor_list
Description
Prints the status of actively monitored processes on the screen.
See the explanation about the active monitoring in "cpwd_admin" on page 208.
Syntax
cpwd_admin monitor_list
Example
cpwd_admin start
Description
Starts a process as monitored by the WatchDog.
Parameters
Parameter Description
-name <Application Name, under which the cpwd_admin list command shows the
Name> monitored process in the leftmost column APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
-path "<Full Path The full path (with or without Check Point environment variables) to the
to Executable>" executable including the executable name.
Must enclose in double-quotes.
Examples:
Parameter Description
-env {inherit | Configures whether to inherit the environment variables from the shell.
<Env_Var>=<Value>}
n inherit - Inherits all the environment variables (WatchDog
supports up to 80 environment variables)
n <Env_Var>=<Value> - Assigns the specified value to the
specified environment variable
Example
For the list of process and the applicable syntax, see sk97638.
cpwd_admin start_monitor
Description
Starts the active WatchDog monitoring. WatchDog monitors the predefined processes actively.
See the explanation for the "cpwd_admin" on page 208 command.
Syntax
cpwd_admin start_monitor
Example
cpwd_admin stop
Description
Stops a WatchDog monitored process.
Parameters
Parameter Description
-name <Application Name under which the cpwd_admin list command shows the
Name> monitored process in the leftmost column APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual
System.
Parameter Description
-path "<Full Path to The full path (with or without Check Point environment variables) to the
Executable>" executable including the executable name.
Must enclose in double-quotes.
Examples:
n For FWM: "$FWDIR/bin/fwm"
n For FWD: "/opt/CPsuite-R80.40/fw1/bin/fw"
n For CPD: "$CPDIR/bin/cpd_admin"
-env {inherit | Configures whether to inherit the environment variables from the shell.
<Env_Var>=<Value>}
n inherit - Inherits all the environment variables (WatchDog
supports up to 80 environment variables)
n <Env_Var>=<Value> - Assigns the specified value to the
specified environment variable
Example
For the list of process and the applicable syntax, see sk97638.
cpwd_admin stop_monitor
Description
Stops the active WatchDog monitoring. WatchDog monitors all processes only passively.
See the explanation for the "cpwd_admin" on page 208 command.
Syntax
cpwd_admin stop_monitor
Example
dbedit
Description
Edits the management database - the $FWDIR/conf/objects_5_0.C file - on the Security
Management Server or Domain Management Server. See skI3301.
Important - Do NOT run this command, unless explicitly instructed by Check Point
Support or R&D to do so. Otherwise, you can corrupt settings in the management
database.
Syntax
dbedit -help
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Parameters
Parameter Description
-globallock When you work with the dbedit utility, it partially locks the management database. If a
user configures objects in SmartConsole at the same time, it causes problems in the
management database.
This option does not let SmartConsole, or a dbedit user to make changes in the
management database.
When you specify this option, the dbedit commands run on a copy of the
management database. After you make the changes with the dbedit commands
and run the savedb command, the dbedit utility saves and commits your changes to
the actual management database.
Parameter Description
-u Specifies the username, with which the dbedit utility connects to the Security
<Username> Management Server.
Mandatory parameter when you specify the "-s <Management_Server>"
parameter.
-c < Specifies the user's certificate file, with which the dbedit utility connects to the
Certificate Security Management Server.
>
Mandatory parameter when you specify the "-s <Management_Server>"
parameter.
-p Specifies the user's password, with which the dbedit utility connects to the Security
<Password> Management Server.
Mandatory parameter when you specify the "-s <Management_Server>" and
"-u <Username>" parameters.
-f <File_ Specifies the file that contains the applicable dbedit internal commands (see the
Name> section "dbedit Internal Commands" below):
n create <object_type> <object_name>
n modify <table_name> <object_name> <field_name>
<value>
n update <table_name> <object_name>
n delete <table_name> <object_name>
n print <table_name> <object_name>
n quit
ignore_ Continues to execute the dbedit internal commands in the file and ignores errors.
script_
You can use it when you specify the "-f <File_Name>" parameter.
failure
-continue_ Continues to update the modified objects, even if the operation fails for some of the
updating objects (ignores the errors and runs the update_all command at the end of the
script).
You can use it when you specify the "-f <File_Name>" parameter.
-r "<Open_ Specifies the reason for opening the database in read-write mode (default mode).
Reason_
Text>"
-d Specifies the name of the database, to which the dbedit utility should connect (for
<Database_ example, mdsdb).
Name>
Parameter Description
-listen The dbedit utility "listens" for changes (use this mode for advanced troubleshooting
with the assistance of Check Point Support).
The dbedit utility prints its internal messages when a change occurs in the
management database.
Note - To see the available tables, class names (object types), attributes and values,
connect to Management Server with GuiDBedit Tool.
-h Description:
Prints the general help.
Syntax:
dbedit> -h
-q Description:
Quits from dbedit.
quit Syntax:
dbedit> -q
Examples:
n Exit the utility and commit the remaining modified objects (interactive mode):
dbedit> quit
n Exit the utility and update all the remaining modified objects:
update Description:
Saves the specified object in the specified table (for example, "network_
objects", "services", "users").
Syntax:
Example:
Save the object My_Service in the table services:
update_all Description:
Saves all the modified objects.
Syntax:
dbedit> update_all
_print_set Description:
Prints the specified object from the specified table (for example, "network_
objects", "services", "users") as it appears in the
$FWDIR/conf/objects_5_0.C file (sets of attributes).
Syntax:
Example:
Print the object My_Obj from the table network_objects:
print Description:
Prints the list of attributes of the specified object from the specified table (for
example, "network_objects", "properties", "services", "users").
Syntax:
Examples:
n Print the object My_Obj from the table network_objects (in "Network
Objects"):
n Print the object firewall_properties from the table properties (in "Global
Properties"):
printxml Description:
Prints in XML format the list of attributes of the specified object from the specified
table (for example, "network_objects", "properties", "services",
"users").
You can export the settings from a Management Server to an XML file that you can
use later with external automation systems.
Syntax:
Examples:
n Print the object My_Obj from the table network_objects:
n Print the object firewall_properties from the table properties (in "Global
Properties"):
printbyuid Description:
Prints the attributes of the object specified by its UID (appears in the
$FWDIR/conf/objects_5_0.C file at the beginning of the object as "chkpf_
uid ({...})").
Syntax:
Example:
Print the attributes of the object with the specified UID:
query Description:
Prints all the objects in the specified table.
Optionally, you can query for objects with specific attribute and value - query is
separated by a comma after "query <table_name>" (spaces are not allowed
between the <attribute> and '<value>').
Syntax:
Examples:
n Print all objects in the table users:
n Print all objects in the table network_objects that are defined as Management
Servers:
n Print all objects in the table services with the name ssh:
n Print all objects in the table services with the port 22:
whereused Description:
Checks where the specified object used in the database.
Prints the number of places, where this object is used and relevant information about
each such place.
Syntax:
Example:
Check where the object My_Obj is used:
create Description:
Creates an object of specified type (with its default values) in the database.
Restrictions apply to the object's name:
n Object names can have a maximum of 100 characters.
n Objects names can contain only ASCII letters, numbers, and dashes.
n Reserved words will be blocked by the Management Server (refer to
sk40179).
Syntax:
Example:
Create the service object My_Service of the type tcp_service (with its default
values):
delete Description:
Deletes an object from the specified table.
Syntax:
Example:
Delete the service object My_Service from the table services:
modify Description:
Modifies the value of specified attribute in the specified object in the specified table
(for example, "network_objects", "services", "users") in the management
database.
Syntax:
Examples:
n Modify the color to red in the object My_Service in the table services:
n Create a new interface on the Security Gateway My_FW and modify its
attributes - set the IP address / Mask and enable Anti-Spoofing on interface
with "Element Index"=3 (check the attributes of the object My_FW in
GuiDBedit Tool):
lock Description:
Locks the specified object (by administrator) in the specified table (for example,
"network_objects", "services", "users") from being modified by other users.
For example, if you connect from a remote computer to this Management Server
with admin1 and lock an object, you are be able to connect with admin2, but are not
able to modify the locked object, until admin1 releases the lock.
Syntax:
Example:
Lock the object My_Service_Obj in the table services in the database:
addelement Description:
Adds a specified multiple field / container (with specified value) to a specified object
in specified table.
Syntax:
Examples:
n Add the element BranchObjectClass with the value Organization to a multiple
field Read in the object My_Obj in the table ldap:
rmelement Description:
Removes a specified multiple field / container (with specified value) from a specified
object in specified table.
Syntax:
Examples:
n Remove the service MyService from the group of services MyServicesGroup
from the table services:
n Remove the element BranchObjectClass with the value Organization from the
multiple field Read in the object My_Obj in the table ldap:
rename Description:
Renames the specified object in specified table.
Syntax:
Example:
Rename the network object london to chicago in the table network_objects:
rmbyindex Description:
Removes an element from a container by element's index.
Syntax:
Example:
Remove the element backup_log_servers from the container log_servers by
element index 1 in the table network_objects:
add_owned_ Description:
remove_name
Adds an owned object (and removes its name) to a specified owned object field (or
container).
Syntax:
Example:
Add the owned object My_Gateway (and remove its name) to the owned object field
(or container) my_external_products:
is_delete_ Description:
allowed
Checks if the specified object can be deleted from the specified table (object cannot
be deleted if it is used by other objects).
Syntax:
Example:
Check if the object MyObj can be deleted from the table network_objects:
set_pass Description:
Sets specified password for specified user.
Notes:
n The password must contain at least 4 characters and no more than 50
characters.
n This command cannot change the administrator's password.
Syntax:
Example:
Set the password 1234 for the user abcd:
savedb Description:
Saves the database. You can run this command only when the database is locked
globally (when you start the dbedit utility with the "dbedit -globallock"
command).
Syntax:
dbedit> savedb
savesession Description:
Saves the session. You can run this command only when you start the dbedit utility in
session mode (with the "dbedit -session" command).
Syntax:
dbedit> savesession
fw
Description
n Performs various operations on Security or Audit log files.
n Kills the specified Check Point processes.
n Manages the Suspicious Activity Monitoring (SAM) rules.
n Manages the Suspicious Activity Policy editor.
Syntax
fw [-d]
fetchlogs <options>
hastat <options>
kill <options>
log <options>
logswitch <options>
lslogs <options>
mergefiles <options>
repairlog <options>
sam <options>
sam_policy <options>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
fetchlogs Fetches the specified Check Point log files - Security ($FWDIR/log/*.log*) or
<options> Audit ($FWDIR/log/*.adtlog*), from the specified Check Point computer.
hastat Shows information about Check Point computers in High Availability configuration and
<options> their states.
See "fw hastat" on page 249.
Parameter Description
log Shows the content of Check Point log files - Security ($FWDIR/log/*.log) or Audit
<options> ($FWDIR/log/*.adtlog).
logswitch Switches the current active Check Point log file - Security ($FWDIR/log/fw.log) or
<options> Audit ($FWDIR/log/fw.adtlog).
lslogs Shows a list of Check Point log files - Security ($FWDIR/log/*.log*) or Audit
<options> ($FWDIR/log/*.adtlog*), located on the local computer or a remote computer.
mergefiles Merges several Check Point log files - Security ($FWDIR/log/*.log) or Audit
<options> ($FWDIR/log/*.adtlog), into a single log file.
repairlog Rebuilds pointer files for Check Point log files - Security ($FWDIR/log/*.log) or
<options> Audit ($FWDIR/log/*.adtlog).
sam_policy Manages the Suspicious Activity Policy editor that lets you work with these type of
<options> rules:
fw fetchlogs
Description
Fetches the specified Security log files ($FWDIR/log/*.log*) or Audit log files
($FWDIR/log/*.adtlog*) from the specified Check Point computer.
Syntax
fw [-d] fetchlogs [-f <Name of Log File 1>] [-f <Name of Log File
2>]... [-f <Name of Log File N>] <Target>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
-f <Name Specifies the name of the log file to fetch. Need to specify name only.
of Log
Notes:
File N>
n If you do not specify the log file name explicitly, the command transfers all Security
log files ($FWDIR/log/*.log*) and all Audit log files
($FWDIR/log/*.adtlog*).
n The specified log file name can include wildcards * and ? (for example, 2017-0?-
*.log).
If you enter a wildcard, you must enclose it in double quotes or single quotes.
n You can specify multiple log files in one command.
You must use the -f parameter for each log file name pattern.
n This command also transfers the applicable log pointer files.
<Target> Specifies the remote Check Point computer, with which this local Check Point computer
has established SIC trust.
n If you run this command on a Security Management Server or Domain
Management Server, then <Target> is the applicable object's name or main IP
address of the Check Point Computer as configured in SmartConsole.
n If you run this command on a Security Gateway or Cluster Member, then
<Target> is the main IP address of the applicable object as configured in
SmartConsole.
Notes:
n This command moves the specified log files from the $FWDIR/log/ directory on the specified
Check Point computer. Meaning, it deletes the specified log files on the specified Check Point
computer after it copies them successfully.
n This command moves the specified log files to the $FWDIR/log/ directory on the local Check Point
computer, on which you run this command.
n This command cannot fetch the active log files $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog.
To fetch these active log files:
1. Perform log switch on the applicable Check Point computer:
2. Fetch the rotated log file from the applicable Check Point computer:
n This command renames the log files it fetched from the specified Check Point computer. The new
log file name is the concatenation of the Check Point computer's name (as configured in
SmartConsole), two underscore (_) characters, and the original log file name (for example: MyGW__
2019-06-01_000000.log).
[Expert@HostName:0]# ls $FWDIR/log/MyGW*
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.log
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.logaccount_ptr
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.loginitial_ptr
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.logptr
[Expert@HostName:0]#
fw hastat
Description
Shows information about Check Point computers in High Availability configuration and their states.
Note - This command is outdated. On cluster members, run the Gaia Clish command
"show cluster state", or the Expert mode command "cphaprob state".
Syntax
Parameters
Parameter Description
[Expert@Member1:0]# fw hastat
HOST NUMBER HIGH AVAILABILITY STATE MACHINE STATUS
192.168.3.52 1 active OK
[Expert@Member1:0]#
fw kill
Description
Kills the specified Check Point processes.
Important - Make sure the killed process is restarted, or restart it manually. See sk97638.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.
Example
fw kill fwd
fw log
Description
Shows the content of Check Point log files - Security ($FWDIR/log/*.log) or Audit
($FWDIR/log/*.adtlog).
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
-b "<Start Shows only entries that were logged between the specified start and end
Timestamp>" times.
"<End
n The <Start Timestamp> and <End Timestamp> may be a date,
Timestamp>"
a time, or both.
n If date is omitted, then the command assumes the current date.
n Enclose the "<Start Timestamp>" and "<End Timestamp> in
single or double quotes (-b 'XX' 'YY", or -b "XX" "YY).
n You cannot use the "-b" parameter together with the "-s" or "-e"
parameters.
n See the date and time format below.
Parameter Description
-c <Action> Shows only events with the specified action. One of these:
n accept
n drop
n reject
n encrypt
n decrypt
n vpnroute
n keyinst
n authorize
n deauthorize
n authcrypt
n ctl
Notes:
n The fw log command always shows the Control (ctl) actions.
n For login action, use the authcrypt.
-e "<End Shows only entries that were logged before the specified time.
Timestamp>"
Notes:
n The <End Timestamp> may be a date, a time, or both.
n Enclose the <End Timestamp> in single or double quotes (-e
'...', or -e "...").
n You cannot use the "-e" parameter together with the "-b" parameter.
n See the date and time format below.
-f This parameter:
1. Shows the saved entries that match the specified conditions.
2. After the command reaches the end of the currently opened log file, it
continues to monitor the log file indefinitely and shows the new entries
that match the specified conditions.
Parameter Description
-h <Origin> Shows only logs that were generated by the Security Gateway with the
specified IP address or object name (as configured in SmartConsole).
-l Shows both the date and the time for each log entry.
The default is to show the date only once above the relevant entries, and then
specify the time for each log entry.
-n Does not perform DNS resolution of the IP addresses in the log file (this is the
default behavior).
This significantly speeds up the log processing.
Parameter Description
-o Shows detailed log chains - shows all the log segments in the log entry.
-p Does not perform resolution of the port numbers in the log file (this is the
default behavior).
This significantly speeds up the log processing.
-s "<Start Shows only entries that were logged after the specified time.
Timestamp>"
Notes:
n The <Start Timestamp> may be a date, a time, or both.
n If the date is omitted, then the command assumed the current date.
n Enclose the <Start Timestamp> in single or double quotes (-s
'...', or -s "...").
n You cannot use the "-s" parameter together with the "-b" parameter.
n See the date and time format below.
-t This parameter:
1. Does not show the saved entries that match the specified conditions.
2. After the command reaches the end of the currently opened log file, it
continues to monitor the log file indefinitely and shows the new entries
that match the specified conditions.
-u <Unification Specifies the path and name of the log unification scheme file.
Scheme File>
The default log unification scheme file is:
$FWDIR/conf/log_unification_scheme.C
-w Shows the flags of each log entry (different bits used to specify the "nature" of
the log - for example, control, audit, accounting, complementary, and so on).
-x <Start Entry Shows only entries from the specified log entry number and below, counting
Number> from the beginning of the log file.
-y <End Entry Shows only entries until the specified log entry number, counting from the
Number> beginning of the log file.
-z In case of an error (for example, wrong field value), continues to show log
entries.
The default behavior is to stop.
Parameter Description
Output
Each output line consists of a single log entry, whose fields appear in this format:
Note - The fields that show depends on the connection type.
ContentVersion Version 5
LogId Log ID 0
Examples
Example 1 - Show all log entries with both the date and the time for each log entry
fw log -l
Example 2 - Show all log entries that start after the specified timestamp
[Expert@MyGW:0]# fw log -l -s "June 12, 2018 12:33:00"
12Jun2018 12:33:00 5 N/A 1 accept MyGW > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; fg-1_client_in_rule_name: Default; fg-1_client_out_rule_name: Default; fg-1_server_in_rule_
name: Host Redirect; fg-1_server_out_rule_name: ; ProductName: FG; ProductFamily: Network;
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_
match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy
Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table:
TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp;
sport_svc: 64933; ProductFamily: Network;
[Expert@MyGW:0]#
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_
match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy
Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table:
TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp;
sport_svc: 64933; ProductFamily: Network;
12Jun2018 12:33:45 5 N/A 1 ctl MyGW > LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; description: Contracts; reason: Could not reach
"https://productcoverage.checkpoint.com/ProductCoverageService". Check DNS and Proxy configuration on the gateway.; Severity:
2; status: Failed; version: 1.0; failure_impact: Contracts may be out-of-date; update_service: 1; ProductName: Security
Gateway/Management; ProductFamily: Network;
[Expert@MyGW:0]#
Example 5 - Show all log entries with action "drop", show all field headers, and show log
flags
[Expert@MyGW:0]# fw log -l -q -w -c drop
HeaderDateHour: 12Jun2018 12:33:39; ContentVersion: 5; HighLevelLogKey: <max_null>; LogUid: ; SequenceNum: 1; Flags: 428292;
Action: drop; Origin: MyGW; IfDir: <; InterfaceName: eth0; Alert: ; LogId: 0; ContextNum: <max_null>; OriginSicName:
CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst:
MyFTPServer; proto: tcp; UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-
9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_
match_table: TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END;
ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933; ProductFamily: Network;
[Expert@MyGW:0]#
Example 6 - Show only log entries from 0 to 10 (counting from the beginning of the log file)
[Expert@MyGW:0]# fw log -l -x 0 -y 10
... ...
[Expert@MyGW:0]#
fw logswitch
Description
Switches the current active log file:
1. Closes the current active log file
2. Renames the current active log file
3. Creates a new active log file with the default name
Notes:
n By default, this command switches the active Security log file -
$FWDIR/log/fw.log
n You can specify to switch the active Audit log file - $FWDIR/log/fw.adtlog
Syntax
fw [-d] logswitch
[-audit] [<Name of Switched Log>]
-h <Target> [[+ | -]<Name of Switched Log>]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
Parameter Description
+ Specifies to copy the active log from the remote computer to the local computer.
Notes:
n If you specify the name of the switched log file, you must write it immediately
after this + (plus) parameter.
n The command copies the active log from the remote computer and saves it in
the $FWDIR/log/ directory on the local computer.
Parameter Description
- Specifies to transfer the active log from the remote computer to the local computer.
Notes:
n The command saves the copied active log file in the $FWDIR/log/ directory
on the local computer and then deletes the switched log file on the remote
computer.
n If you specify the name of the switched log file, you must write it immediately
after this - (minus) parameter.
n The default name of the saved log file is:
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
For example, MyGW__2018-03-26_174455.log
n If you specify the name of the switched log file, then the name of the saved log
file is:
<Gateway_Object_Name>__<Specified_Log_Name>.log
n When this command transfers the log file from the remote computer, it
compresses the file.
n As an alternative, you can use the "fw fetchlogs" on page 247 command.
Compression
When this command transfers the log files from the remote computer, it compresses the file with the gzip
command (see RFC 1950 to RFC 1952 for details). The algorithm is a variation of LZ77 method. The
compression ratio varies with the content of the log file and is difficult to predict. Binary data are not
compressed. Text data, such as user names and URLs, are compressed.
Example - Switching the active Security log on a Security Management Server or Security
Gateway
[Expert@MGMT:0]# fw logswitch
Log file has been switched to: 2018-06-13_182359.log
[Expert@MGMT:0]#
Example - Switching the active Security log on a managed Security Gateway and copying
the switched log
[Expert@MGMT:0]# fw logswitch -h MyGW +
Log file has been switched to: 2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MGMT:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R80.40/fw1/log/fw.log
/opt/CPsuite-R80.40/fw1/log/MyGW__2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MyGW:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R80.40/fw1/log/fw.log
/opt/CPsuite-R80.40/fw1/log/2018-06-13_185451.log
[Expert@MyGW:0]#
fw lslogs
Description
Shows a list of Security log files ($FWDIR/log/*.log) and Audit log files ($FWDIR/log/*.adtlog)
residing on the local computer or a remote computer.
Syntax
fw [-d] lslogs [-f <Name of Log File 1>] [-f <Name of Log File 2>] ...
[-f <Name of Log File N>] [-e] [-r] [-s {name | size | stime | etime}]
[<Target>]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
-f <Name of Specifies the name of the log file to show. Need to specify name only.
Log File>
Notes:
n If the log file name is not specified explicitly, the command shows all Security
log files ($FWDIR/log/*.log).
n File names may include * and ? as wildcards (for example, 2019-0?-*). If
you enter a wildcard, you must enclose it in double quotes or single quotes.
n You can specify multiple log files in one command. You must use the "-f"
parameter for each log file name pattern:
-f <Name of Log File 1> -f <Name of Log File 2> ... -
f <Name of Log File N>
-e Shows an extended file list. It includes the following information for each log file:
n Size - The total size of the log file and its related pointer files
n Creation Time - The time the log file was created
n Closing Time - The time the log file was closed
n Log File Name - The file name
Parameter Description
-s {name | Specifies the sort order of the log files using one of the following sort options:
size |
stime | n name - The file name
etime} n size - The file size
n stime - The time the log file was created (this is the default option)
n etime - The time the log file was closed
<Target> Specifies the remote Check Point computer, with which this local Check Point
computer has established SIC trust.
n If you run this command on a Security Management Server or Domain
Management Server, then <Target> is the applicable object's name or main
IP address of the Check Point Computer as configured in SmartConsole.
n If you run this command on a Security Gateway or Cluster Member, then
<Target> is the main IP address of the applicable object as configured in
SmartConsole.
[Expert@HostName:0]# fw lslogs
Size Log file name
9KB 2019-06-14_000000.log
11KB 2019-06-15_000000.log
9KB 2019-06-16_000000.log
10KB 2019-06-17_000000.log
9KB fw.log
[Expert@HostName:0]#
Example 4 - Showing only log files specified by the patterns and their extended information
Example 5 - Showing only log files specified by the patterns, sorting by name in reverse order
Example 6 - Showing only log files specified by the patterns, from a managed Security Gateway with main
IP address 192.168.3.53
fw mergefiles
Description
Merges several Security log files ($FWDIR/log/*.log) into a single log file.
Merges several Audit log files ($FWDIR/log/*.adtlog) into a single log file.
Important:
n Do not merge the active Security file $FWDIR/log/fw.log with other Security
switched log files.
Switch the active Security file $FWDIR/log/fw.log (with the "fw
logswitch" command) and only then merge it with other Security switched log
files.
n Do not merge the active Audit file $FWDIR/log/fw.adtlog with other Audit
switched log files.
Switch the active Audit file $FWDIR/log/fw.adtlog (with the "fw
logswitch" command) and only then merge it with other Audit switched log
files.
n This command unifies logs entries with the same Unique-ID (UID). If you rotate
the current active log file before all the segments of a specific log arrive, this
command merges the records with the same Unique ID from two different files,
into one fully detailed record.
n If the size of the final merged log file exceeds 2GB, this command creates a list
of merged files, where the size of each merged file size is not more than 2GB.
The user receives this warning:
Syntax
fw [-d] mergefiles [-r] [-s] [-t <Time Conversion File>] <Name of Log
File 1> <Name of Log File 2> ... <Name of Log File N> <Name of Merged
Log File>
Parameters
Parameter Description
-t <Time Conversion File> Specifies a full path and name of a file that instructs this
command how to adjust the times during the merge.
This is required if you merge log files from Log Servers
configured with different time zones.
The file format is:
Notes
n You must specify the absolute path and the
file name.
n The name of the time conversion file cannot
exceed 230 characters.
<Name of Log File 1> ... Specifies the log files to merge.
<Name of Log File N>
Notes:
n You must specify the absolute path and the
name of the input log files.
n The name of the input log file cannot exceed
230 characters.
Parameter Description
<Name of Merged Log File> Specifies the output merged log file.
Notes:
n The name of the merged log file cannot
exceed 230 characters.
n If a file with the specified name already exists,
the command stops and asks you to remove
the existing file, or to specify another name.
n The size of the merged log file cannot exceed
2 GB. In such scenario, the command creates
several merged log files, each not exceeding
the size limit.
[Expert@HostName:0]# ls -l $FWDIR/*.log
-rw-rw-r-- 1 admin root 189497 Sep 7 00:00 2019-09-07_000000.log
-rw-rw-r-- 1 admin root 14490 Sep 9 09:52 2019-09-09_000000.log
-rw-rw-r-- 1 admin root 30796 Sep 10 10:56 2019-09-10_000000.log
-rw-rw-r-- 1 admin root 24503 Sep 10 13:08 fw.log
[Expert@HostName:0]#
[Expert@HostName:0]# fw mergefiles -s $FWDIR/2019-09-07_000000.log $FWDIR/2019-09-09_000000.log
$FWDIR/2019-09-10_000000.log /var/log/2019-Sep-Merged.log
[Expert@HostName:0]#
[Expert@HostName:0]# ls -l /var/log/2019-Sep-Merged.log*
-rw-rw---- 1 admin root 213688 Sep 10 13:18 /var/log/2019-Sep-Merged.log
-rw-rw---- 1 admin root 8192 Sep 10 13:18 /var/log/2019-Sep-Merged.logLuuidDB
-rw-rw---- 1 admin root 80 Sep 10 13:18 /var/log/2019-Sep-Merged.logaccount_ptr
-rw-rw---- 1 admin root 2264 Sep 10 13:18 /var/log/2019-Sep-Merged.loginitial_ptr
-rw-rw---- 1 admin root 4448 Sep 10 13:18 /var/log/2019-Sep-Merged.logptr
[Expert@HostName:0]#
fw repairlog
Description
Check Point Security log file ($FWDIR/log/*.log) and Audit log files ($FWDIR/log/*.adtlog) are
databases, with special pointer files.
If these log pointer files become corrupted (which causes the inability to read the log file), this command
can rebuild them.
Syntax
Parameters
Parameter Description
fw sam
Description
Manages the Suspicious Activity Monitoring (SAM) rules. You can use the SAM rules to block connections
to and from IP addresses without the need to change or reinstall the Security Policy. For more information,
see sk112061.
You can create the Suspicious Activity Rules in two ways:
n In SmartConsole from Monitoring Results
n In CLI with the fw sam command
Notes:
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Monitoring (SAM) Rules. See sk79700.
n See the "fw sam_policy" and "sam_alert" commands.
n SAM rules consume some CPU resources on Security Gateway.
Best Practice - Set an expiration that gives you time to investigate, but
does not affect performance. Keep only the SAM rules that you need.
If you confirm that an activity is risky, edit the Security Policy, educate
users, or otherwise handle the risk.
n Logs for enforced SAM rules (configured with the fw sam command) are stored
in the $FWDIR/log/sam.dat file.
By design, the file is purged when the number of stored entries reaches 100,000.
This data log file contains the records in one of these formats:
<type>,<actions>,<expire>,<ipaddr>
<type>,<actions>,<expire>,<src>,<dst>,<dport>,<ip_p>
n SAM Requests are stored on the Security Gateway in the kernel table sam_
requests.
n IP Addresses that are blocked by SAM rules, are stored on the Security Gateway
in the kernel table sam_blocked_ips.
Syntax
n To add or cancel a SAM rule according to criteria:
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-t <Timeout>] [-l <Log Type>] [-C] [-e
<key=val>]+ [-r] -{n|i|I|j|J} <Criteria>
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] -D
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-r] -M -{i|j|n|b|q} all
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-r] -M -{i|j|n|b|q} <Criteria>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
-s <SAM Specifies the IP address (in the X.X.X.X format) or resolvable HostName of the
Server> Security Gateway that enforces the command.
The default is localhost.
Parameter Description
-S <SIC Specifies the SIC name for the SAM server to be contacted. It is expected that the
Name of SAM SAM server has this SIC name, otherwise the connection fails.
Server>
Notes:
n If you do not explicitly specify the SIC name, the connection
continues without SIC names comparison.
n For more information about enabling SIC, refer to the OPSEC API
Specification.
n On VSX Gateway, run the fw vsx showncs -vs <VSID> command to
show the SIC name for the applicable Virtual System.
Notes:
n You can use this syntax only on Security Management Server or
Domain Management Server.
n VSX Gateways and VSX Cluster Members do not support
Suspicious Activity Monitoring (SAM) Rules. See sk79700.
Parameter Description
-D Cancels all inhibit ("-i", "-j", "-I", "-J") and notify ("-n") parameters.
Notes:
n To "uninhibit" the inhibited connections, run the fw sam command
with the "-C" or "-D" parameters.
n It is also possible to use this command for active SAM requests.
-C Cancels the fw sam command to inhibit connections with the specified parameters.
Notes:
n These connections are no longer inhibited (no longer rejected or
dropped).
n The command parameters must match the parameters in the
original fw sam command, except for the -t <Timeout>
parameter.
-t Specifies the time period (in seconds), during which the action is enforced.
<Timeout>
The default is forever, or until you cancel the fw sam command.
-e Specifies rule information based on the keys and the provided values.
<key=val>+
Multiple keys are separated by the plus sign (+).
Available keys are (each is limited to 100 characters):
n name - Security rule name
n comment - Security rule comment
n originator - Security rule originator's username
Notes:
n This parameter generates an alert when connections that match the
specified services or IP addresses pass through the Security
Gateway.
n This action does not inhibit / close connections.
Parameter Description
Notes:
n Each inhibited connection is logged according to the log type.
n Matching connections are rejected.
-I Inhibits (drops or rejects) new connections with the specified parameters, and closes
all existing connections with the specified parameters.
Notes:
n Matching connections are rejected.
n Each inhibited connection is logged according to the log type.
Notes:
n Matching connections are dropped.
n Each inhibited connection is logged according to the log type.
-J Inhibits new connections with the specified parameters, and closes all existing
connections with the specified parameters.
Notes:
n Matching connections are dropped.
n Each inhibited connection is logged according to the log type.
-M Monitors the active SAM requests with the specified actions and criteria.
all Gets all active SAM requests. This is used for monitoring purposes only.
Parameter Description
Parameter Description
Parameter Description
srv <Src IP> <Dest IP> <Port> Matches the specific Source IP address, Destination IP
<Protocol> address, Service (port number) and Protocol.
subsrv <Src IP> <Netmask> Matches the specific Source IP address, Destination IP
<Dest IP> <Netmask> <Port> address, Service (port number) and Protocol.
<Protocol>
Source and Destination IP addresses are assigned
according to the netmask.
subsrvs <Src IP> <Src Netmask> Matches the specific Source IP address, source
<Dest IP> <Port> <Protocol> netmask, destination netmask, Service (port number)
and Protocol.
subsrvd <Src IP> <Dest IP> Matches specific Source IP address, Destination IP,
<Dest Netmask> <Port> destination netmask, Service (port number) and
<Protocol> Protocol.
dstsrv <Dest IP> <Service> Matches specific Destination IP address, Service (port
<Protocol> number) and Protocol.
subdstsrv <Dest IP> <Netmask> Matches specific Destination IP address, Service (port
<Port> <Protocol> number) and Protocol.
Destination IP address is assigned according to the
netmask.
Parameter Description
fw sam_policy
Description
Manages the Suspicious Activity Policy editor that lets you work with these types of rules:
n Suspicious Activity Monitoring (SAM) rules.
See sk112061: How to create and view Suspicious Activity Monitoring (SAM) Rules.
n Rate Limiting rules.
See sk112454: How to configure Rate Limiting rules for DoS Mitigation.
Also, see these commands:
n "fw sam" on page 271
n "sam_alert" on page 370
Notes:
n You can run these commands interchangeably: 'fw sam_policy' and 'fw
samp'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy
add <options>
batch
del <options>
get <options>
fw [-d] samp
add <options>
batch
del <options>
get <options>
Parameters
Parameter Description
del <options> Deletes one configured Rate Limiting rule one at a time.
See "fw sam_policy del" on page 297.
fw sam_policy add
Description
The 'fw sam_policy add' and 'fw6 sam_policy add' commands let you:
n Add one Suspicious Activity Monitoring (SAM) rule at a time.
n Add one Rate Limiting rule at a time.
Notes:
n You can run these commands interchangeably: 'fw sam_policy add' and
'fw samp add'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] ip <IP Filter Arguments>
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] ip <IP Filter Arguments>
fw [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] quota <Quota Filter Arguments>
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] quota <Quota Filter Arguments
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
-u Optional.
Specifies that the rule category is User-defined.
Default rule category is Auto.
-a {d | n | Mandatory.
b}
Specifies the rule action if the traffic matches the rule conditions:
n d - Drop the connection.
n n - Notify (generate a log) about the connection and let it through.
n b - Bypass the connection - let it through without checking it against the policy
rules.
Note - Rules with action set to Bypass cannot have a log or limit specification.
Bypassed packets and connections do not count towards overall number of
packets and connection for limit enforcement of type ratio.
-l {r | a} Optional.
Specifies which type of log to generate for this rule for all traffic that matches:
n -r - Generate a regular log
n -a - Generate an alert log
Parameter Description
-t Optional.
<Timeout>
Specifies the time period (in seconds), during which the rule will be enforced.
Default timeout is indefinite.
-f <Target> Optional.
Specifies the target Security Gateways, on which to enforce the Rate Limiting rule.
<Target> can be one of these:
n all - This is the default option. Specifies that the rule should be enforced on
all managed Security Gateways.
n Name of the Security Gateway or Cluster object - Specifies that the rule should
be enforced only on this Security Gateway or Cluster object (the object name
must be as defined in the SmartConsole).
n Name of the Group object - Specifies that the rule should be enforced on all
Security Gateways that are members of this Group object (the object name
must be as defined in the SmartConsole).
-n "<Rule Optional.
Name>"
Specifies the name (label) for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write a
backslash (\) character. Example:
-c "<Rule Optional.
Comment>"
Specifies the comment for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write a
backslash (\) character. Example:
Parameter Description
-o "<Rule Optional.
Originator
Specifies the name of the originator for this rule.
>"
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write a
backslash (\) character. Example:
-z "<Zone>" Optional.
Specifies the name of the Security Zone for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
Parameter Description
Important:
n The Quota rules are not applied immediately to the Security
Gateway. They are only registered in the Suspicious Activity
Monitoring (SAM) policy database. To apply all the rules from the
SAM policy database immediately, add "flush true" in the fw
samp add command syntax.
n Explanation:
For new connections rate (and for any rate limiting in general), when
a rule's limit is violated, the Security Gateway also drops all packets
that match the rule.
The Security Gateway computes new connection rates on a per-
second basis.
At the start of the 1-second timer, the Security Gateway allows all
packets, including packets for existing connections.
If, at some point, during that 1 second period, there are too many
new connections, then the Security Gateway blocks all remaining
packets for the remainder of that 1-second interval.
At the start of the next 1-second interval, the counters are reset, and
the process starts over - the Security Gateway allows packets to
pass again up to the point, where the rule’s limit is violated.
Explanation for the IP Filter Arguments syntax for Suspicious Activity Monitoring (SAM) rules
Argument Description
-m <Source Mask> Specifies the Source subnet mask (in dotted decimal format - x.y.z.w).
-M <Destination Specifies the Destination subnet mask (in dotted decimal format -
Mask> x.y.z.w).
-p <Port> Specifies the port number (see IANA Service Name and Port Number
Registry).
Explanation for the Quota Filter Arguments syntax for Rate Limiting rules
Argument Description
flush true Specifies to compile and load the quota rule to the
SecureXL immediately.
Notes:
n Default is: source-negated false
n The source-negated true processes all
source types, except the specified type.
Argument Description
Notes:
n Default is: destination-negated false
n The destination-negated true will
process all destination types except the specified
type
Argument Description
Notes:
n Default is: service-negated false
n The service-negated true will process all
traffic except the traffic with the specified
protocols and ports
Argument Description
Argument Description
Examples
Explanations:
n This rule drops packets for all connections (-a d) that exceed the quota set by this rule,
including packets for existing connections.
n This rule logs packets (-l r) that exceed the quota set by this rule.
n This rule will expire in 3600 seconds (-t 3600).
n This rule limits the rate of creation of new connections to 5 connections per second (new-conn-
rate 5) for any traffic (service any) from the source IP addresses in the range 172.16.7.11
- 172.16.7.13 (source range:172.16.7.11-172.16.7.13).
Note - The limit of the total number of log entries per second is configured with the fwaccel dos
config set -n <rate> command.
n This rule will be compiled and loaded on the SecureXL, together with other rules in the Suspicious
Activity Monitoring (SAM) policy database immediately, because this rule includes the "flush
true" parameter.
Explanations:
n This rule logs and lets through all packets (-a n) that exceed the quota set by this rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to all packets except (service-negated true) the packets with IP protocol
number 1, 50-51, 6 port 443 and 17 port 53 (service 1,50-51,6/443,17/53).
n This rule applies to all packets from source IP addresses that are assigned to the country with
specified country code (cc:QQ).
n This rule does not let any traffic through (byte-rate 0) except the packets with IP protocol
number 1, 50-51, 6 port 443 and 17 port 53.
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to packets from the Autonomous System number 64500 (asn:AS64500).
n This rule applies to packets from source IPv6 addresses FFFF:C0A8:1100/120 (cidr:
[::FFFF:C0A8:1100]/120).
n This rule applies to all traffic (service any).
n This rule does not let any traffic through (pkt-rate 0).
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
Explanations:
n This rule bypasses (-a b) all packets that match this rule.
Note - The Access Control Policy and other types of security policy rules still apply.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to packets from the source IP addresses in the range 172.16.8.17 -
172.16.9.121 (range:172.16.8.17-172.16.9.121).
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not log any packets (the -l r parameter is not specified).
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to all traffic (service any).
n This rule applies to all sources except (source-negated true) the source IP addresses that
are assigned to the country with specified country code (cc:QQ).
n This rule limits the maximal number of concurrent active connections to 655/65536=~1%
(concurrent-conns-ratio 655) for any traffic (service any) except (service-
negated true) the connections from the source IP addresses that are assigned to the country
with specified country code (cc:QQ).
n This rule counts connections, packets, and bytes for traffic only from sources that match this rule,
and not cumulatively for this rule.
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
fw sam_policy batch
Description
The 'fw sam_policy batch' and 'fw6 sam_policy batch' commands let you:
n Add and delete many Suspicious Activity Monitoring (SAM) rules at a time.
n Add and delete many Rate Limiting rules at a time.
Notes:
n You can run these commands interchangeably: 'fw sam_policy batch'
and 'fw samp batch'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all of the
Cluster Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Procedure
n Enter one "add" or "del" command on each line, on as many lines as necessary.
Start each line with only "add" or "del" parameter (not with "fw samp").
n Use the same set of parameters and values as described in these commands:
l fw sam_policy add
l fw sam_policy del
n Terminate each line with a Return (ASCII 10 - Line Feed) character (press Enter).
add -a d -l r -t 3600 -c "Limit\ conn\ rate\ to\ 5\ conn/sec from\ these\ sources" quota service any source
range:172.16.7.13-172.16.7.13 new-conn-rate 5
del <501f6ef0,00000000,cb38a8c0,0a0afffe>
EOF
[Expert@HostName]#
fw sam_policy del
Description
The 'fw sam_policy del' and 'fw6 sam_policy del' commands let you:
n Delete one configured Suspicious Activity Monitoring (SAM) rule at a time.
n Delete one configured Rate Limiting rule at a time.
Notes:
n You can run these commands interchangeably: 'fw sam_policy del' and
'fw samp del'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Parameters
Parameter Description
'<Rule UID>' Specifies the UID of the rule you wish to delete.
Important:
n The quote marks and angle
brackets ('<...>') are
mandatory.
n To see the Rule UID, run the
"fw sam_policy get"
command.
Procedure
1. List all the existing rules in the Suspicious Activity Monitoring policy database
List all the existing rules in the Suspicious Activity Monitoring policy database.
n For IPv4, run:
fw sam_policy get
operation=add uid=<5ac3965f,00000000,3403a8c0,0000264a>
target=all timeout=300 action=notify log=log name=Test\ Rule
comment=Notify\ about\ traffic\ from\ 1.1.1.1 originator=John\
Doe src_ip_addr=1.1.1.1 req_tpe=ip
Explanation:
The fw samp del and fw6 samp del commands only remove a rule from the persistent
database. The Security Gateway continues to enforce the deleted rule until the next time you
compiled and load a policy. To force the rule deletion immediately, you must enter a flush-only
add rule right after the fw samp del and fw6 samp del command. This flush-only add rule
immediately deletes the rule you specified in the previous step, and times out in 2 seconds.
Best Practice - Specify a short timeout period for the flush-only rules. This
prevents accumulation of rules that are obsolete in the database.
fw sam_policy get
Description
The 'fw sam_policy get' and 'fw6 sam_policy get' commands let you:
n Show all the configured Suspicious Activity Monitoring (SAM) rules.
n Show all the configured Rate Limiting rules.
Notes:
n You can run these commands interchangeably: 'fw sam_policy get' and
'fw samp get'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t <Type> [+
{-v '<Value>'}] [-n]]
fw6 [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t <Type>
[+{-v '<Value>'}] [-n]]
Parameters
Note - All these parameters are optional.
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
-u '<Rule Prints the rule specified by its Rule UID or its zero-based rule index.
UID>'
The quote marks and angle brackets ('<...>') are mandatory.
Examples
uid
<5ac3965f,00000000,3403a8c0,0000264a>
target
all
timeout
2147483647
action
notify
log
log
name
Test\ Rule
comment
Notify\ about\ traffic\ from\ 1.1.1.1
originator
John\ Doe
src_ip_addr
1.1.1.1
req_type
ip
fwm
Description
Performs various management operations and shows various management information.
Notes:
n For debug instructions, see the description of the fwm process in sk97638.
n On a Multi-Domain Server, you must run these commands in the context of the
applicable Domain Management Server.
Syntax
fwm [-d]
dbload <options>
exportcert <options>
fetchfile <options>
fingerprint <options>
getpcap <options>
ikecrypt <options>
load [<options>]
logexport <options>
mds <options>
printcert <options>
sic_reset
snmp_trap <options>
unload [<options>]
ver [<options>]
verify <options>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
dbload Downloads the user database and network objects information to the specified
<options> targets
See "fwm dbload" on page 307.
fetchfile Fetches a specified OPSEC configuration file from the specified source
<options> computer.
See "fwm fetchfile" on page 310.
getpcap Fetches the IPS packet capture data from the specified Security Gateway.
<options>
See "fwm getpcap" on page 313.
mds <options> Shows information and performs various operations on Multi-Domain Server.
See "fwm mds" on page 322.
Parameter Description
unload Unloads the policy from the specified managed Security Gateways.
<options>
See "fwm unload" on page 333.
ver <options> Shows the Check Point version of the Management Server.
See "fwm ver" on page 337.
fwm dbload
Description
Downloads the user database and network objects information to the specified Security Gateways.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in
sk97638.
fwm exportcert
Description
Export a SIC certificate of the specified managed object to a file.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
fwm [-d] exportcert -obj <Name of Object> -cert <Name of CA> -file
<Output File> [-withroot] [-pem]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in
sk97638.
<Name of Specifies the name of the managed object, whose certificate you wish to
Object> export.
<Name of CA> Specifies the name of Certificate Authority, whose certificate you wish to
export.
fwm fetchfile
Description
Fetches a specified OPSEC configuration file from the specified source computer.
This command supports only the fwopsec.conf or fwopsec.v4x files.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.
-d <Local Path> Specifies the local directory to save the fetched file.
<Source> Specifies the managed remote source computer, from which to fetch the file.
Note - The local and the remote source computers must have
established SIC trust.
Example
fwm fingerprint
Description
Shows the Check Point fingerprint.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
fwm getpcap
Description
Fetches the IPS packet capture data from the specified Security Gateway.
This command only works with IPS packet captures stored on the Security Gateway in the
$FWDIR/log/captures_repository/ directory.
This command does not work with other Software Blades, such as Anti-Bot and Anti-Virus that store packet
captures in the $FWDIR/log/blob/ directory on the Security Gateway.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in
sk97638.
-g <Security Specifies the main IP address or Name of Security Gateway object as configured
Gateway> in SmartConsole.
-p <Local Specifies the local path to save the specified packet capture file.
Path>
If you do not specify the local directory explicitly, the command saves the packet
capture file in the current working directory.
Example
fwm ikecrypt
Description
Encrypts the password of an Endpoint VPN Client user using IKE. The resulting string must then be stored
in the LDAP database.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in sk97638.
<Key> Specifies the IKE Key as defined in the LDAP Account Unit properties window on the
Encryption tab.
< Specifies the password for the Endpoint VPN Client user.
Password
>
Example
fwm load
Description
Loads a policy on a managed Security Gateway.
Important - This command is obsolete for R80 and above. Use the "mgmt_cli" on
page 358 command to load a policy on a managed Security Gateway.
fwm logexport
Description
Exports a Security log file ($FWDIR/log/*.log) or Audit log file ($FWDIR/log/*.adtlog) to an
ASCII file.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
fwm logexport -h
fwm [-d] logexport [{-d <Delimiter> | -s}] [-t <Table Delimiter>] [-i
<Input File>] [-o <Output File>] [{-f | -e}] [-x <Start Entry Number>]
[-y <End Entry Number>] [-z] [-n] [-p] [-a] [-u <Unification Scheme
File>] [-m {initial | semi | raw}]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in sk97638.
Note - If you do not specify the delimiter explicitly, the default is a semicolon (;).
Parameter Description
-f After reaching the end of the currently opened log file, specifies to continue to
monitor the log file indefinitely and export the new entries as well.
Note - Applies only to the active log file: $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-e After reaching the end of the currently opened log file, continue to monitor the log file
indefinitely and export the new entries as well.
Note - Applies only to the active log file: $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-x <Start Starts exporting the log entries from the specified log entry number and below,
Entry counting from the beginning of the log file.
Number>
-y <End Starts exporting the log entries until the specified log entry number, counting from
Entry the beginning of the log file.
Number>
-z In case of an error (for example, wrong field value), specifies to continue the export
of log entries.
The default behavior is to stop.
-n Specifies not to perform DNS resolution of the IP addresses in the log file (this is the
default behavior).
This significantly speeds up the log processing.
-p Specifies to not to perform resolution of the port numbers in the log file (this is the
default behavior).
This significantly speeds up the log processing.
Parameter Description
-u < Specifies the path and name of the log unification scheme file.
Unification
The default log unification scheme file is:
Scheme
File> $FWDIR/conf/log_unification_scheme.C
Ste
Description
p
[Expert@MGMT:0]# vi $FWDIR/conf/logexport.ini
3 To include or exclude the log fields from the output, add these lines in the configuration file:
[Fields_Info]
included_fields = field1,field2,field3,<REST_OF_
FIELDS>,field100
excluded_fields = field10,field11
Where:
n You can specify only the included_fields parameter, only the excluded_fields
parameter, or both.
n The num field must always appear first. You cannot manipulate this field.
n The <REST_OF_FIELDS> is an optional reserved token that refers to a list of fields.
l If you specify the "-f" parameter, then the <REST_OF_FIELDS> is based on a list
of fields from the $FWDIR/conf/logexport_default.C file.
l If you do not specify the "-f" parameter, then the <REST_OF_FIELDS> is based
on the input log file.
fwm mds
Description
n Shows the Check Point version of the Multi-Domain Server.
n Rebuilds status tree for Global VPN Communities.
mdsenv
Syntax
Parameters
Parameter Description
Example
fwm printcert
Description
Shows a SIC certificate's details.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Item Description
-obj <Name of Object> Specifies the name of the managed object, for which to show the
SIC certificate information.
Examples
defaultCert:
Host Certificate (level 0):
Subject: CN=CXL_192.168.3.244 VPN Certificate,O=MGMT.checkpoint.com.s6t98x
Issuer: O=MGMT.checkpoint.com.s6t98x
Not Valid Before: Sun Jun 3 19:58:19 2018 Local Time
Not Valid After: Sat Jun 3 19:58:19 2023 Local Time
Serial No.: 85021
Public Key: RSA (2048 bits)
Signature: RSA with SHA256
Subject Alternate Names:
IP Address: 192.168.3.244
CRL distribution points:
http://192.168.3.240:18264/ICA_CRL2.crl
CN=ICA_CRL2,O=MGMT.checkpoint.com.s6t98x
Key Usage:
digitalSignature
keyEncipherment
Basic Constraint:
not CA
MD5 Fingerprint:
B1:15:C7:A8:2A:EE:D1:75:92:9F:C7:B4:B9:BE:42:1B
SHA-1 Fingerprints:
1. BC:7A:D9:E2:CD:29:D1:9E:F0:39:5A:CD:7E:A9:0B:F9:6A:A7:2B:85
2. MIRE SANK DUSK HOOD HURD RIDE TROY QUAD LOVE WOOD GRIT WITH
*****
[Expert@MGMT:0]#
Example 4 - Showing the SIC certificate of a managed Cluster object in verbose mode
[Expert@MGMT:0]# fwm printcert -obj CXL_192.168.3.244 -verbose
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] fwa_db_init: called
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] fwa_db_init: closing existing database
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] do_links_getver: strncmp failed. Returning -2
defaultCert:
fwm sic_reset
Description
Resets SIC on the Management Server.
For detailed procedure, see sk65764: How to reset SIC.
Warning:
n Before you run this command, take a Gaia Snapshot and a full backup of
the Management Server.
This command resets SIC between the Management Server and all its
managed objects.
n This operation breaks trust in all Internal CA certificates and SIC trust
across the managed environment.
Therefore, we do not recommend it at all, except for real disaster recovery.
Note
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in sk97638.
fwm snmp_trap
Description
Sends an SNMPv1 Trap to the specified host.
Notes:
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n On a Multi-Domain Server, the SNMP Trap packet is sent from the IP address of
the Leading Interface.
Syntax
fwm [-d] snmp_trap [-v <SNMP OID>] [-g <Generic Trap Number>] [-s
<Specific Trap Number>] [-p <Source Port>] [-c <SNMP Community>]
<Target> ["<Message>"]
Parameters
Parameter Description
-v <SNMP OID> Specifies an optional SNMP OID to bind with the message.
-p <Source Port> Specifies the source port, from which to send the SNMP Trap packets.
<Target> Specifies the managed target host, to which to send the SNMP Trap
packets.
Enter an IP address of a resolvable hostname.
Example - Sending an SNMP Trap from a Management Server and capturing the traffic on the Security
Gateway
[Expert@MyGW_192.168.3.52:0]#
fwm unload
Description
Unloads the policy from the specified managed Security Gateways or Cluster Members.
Warning:
1. The fwm unload command prevents all traffic from passing through the
Security Gateway (Cluster Member), because it disables the IP Forwarding in
the Linux kernel on the specified Security Gateway (Cluster Member).
2. The fwm unload command removes all policies from the specified Security
Gateway (Cluster Member).
This means that the Security Gateway (Cluster Member) accepts all incoming
connections destined to all active interfaces without any filtering or protection
enabled.
Notes:
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n If you need to remove the current policy, but keep the Security Gateway (Cluster
Member) protected, then run the "comp_init_policy" on page 871 command on
the Security Gateway (Cluster Member).
n To load the policies on the Security Gateway (Cluster Member), run one of these
commands on the Security Gateway (Cluster Member), or reboot:
l "fw fetch" on page 998
l "cpstart" on page 911
n In addition, see the "fw unloadlocal" on page 1100 command.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in
sk97638.
<GW1> <GW2> Specifies the managed Security Gateways by their main IP address or Object
... <GWN> Name as configured in SmartConsole.
Example
[Expert@MGMT:0]#
fwm ver
Description
Shows the Check Point version of the Security Management Server.
mdsenv
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in
sk97638.
-f <Output Specifies the name of the output file, in which to save this information.
File>
Example
fwm verify
Important - This command is obsolete for R80 and above. Use the "mgmt_cli" on
page 358 command to verify a policy on a managed Security Gateway.
Description
Verifies the specified policy package without installing it.
Note
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
For complete debug instructions, see the description of the fwm process in
sk97638.
Example
inet_alert
Description
Notifies an Internet Service Provider (ISP) when a company's corporate network is under attack. This
command forwards log messages generated by the alert daemon on your Check Point Security Gateway
to an external Management Station. This external Management Station is usually located at the ISP site.
The ISP can then analyze the alert and react accordingly.
This command uses the Event Logging API (ELA) protocol to send the alerts. The Management Station
receiving the alert must be running the ELA Proxy.
If communication with the ELA Proxy is to be authenticated or encrypted, a key exchange must be
performed between the external Management Station running the ELA Proxy at the ISP site and the Check
Point Security Gateway generating the alert.
Procedure
Step Description
3 Click on the [+] near the Log and Alert and click Alerts .
5 Select the next option Run UserDefined script under the above.
6 Enter the applicable inet_alert syntax (see the Syntax section below).
7 Click OK.
Syntax
inet_alert -s <IP Address> [-o] [-a <Auth Type>] [-p <Port>] [-f
<Token> <Value>] [-m <Alert Type>]
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Parameters
Parameter Description
-s <IP The IPv4 address of the ELA Proxy (usually located at the ISP site).
Address>
-p <Port> Specifies the port number on the ELA proxy. Default port is 18187.
Parameter Description
Exist Status
Example
inet_alert -s 10.0.2.4 -a clear -f product cads -m alert
ldapcmd
Description
This is an LDAP utility that controls these features:
Feature Description
Cache LDAP cache operations, such as emptying the cache, as well as providing debug
information.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
Parameters
Parameter Description
-d <Debug Runs the command in debug mode with the specified TDERROR debug level.
Level>
Valid values are from 0 (disabled) to 5 (maximal level, recommended).
-p {<Process Runs on a specified Check Point process, or all supported Check Point
Name> | all} processes.
ldapcompare
Description
This is an LDAP utility that performs compare queries and prints a message whether the result returned a
match or not.
This utility opens a connection to an LDAP directory server, binds, and performs the comparison specified
on the command line or from a specified file.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified TDERROR debug level.
Valid values are from 0 (disabled) to 5 (maximal level, recommended).
Compare options
Option Description
-P <LDAP Protocol Version> Specifies the LDAP protocol version. Default version is 3.
Common options
Option Description
Option Description
Option Description
-n Dry run - shows what would be done, but does not actually do
it.
-p <LDAP Server Port> Specifies the LDAP Server port. Default is 389.
-w <LDAP Admin Password> Specifies the LDAP Server administrator password (for
simple authentication).
ldapmemberconvert
Description
This is an LDAP utility that ports from the "Member" attribute values in LDAP group entries to the
"MemberOf" attribute values in LDAP member (User or Template) entries.
This utility converts the LDAP server data to work in either the "MemberOf" mode, or "Both" mode. The
utility searches through all specified group or template entries that hold one or more "Member" attribute
values and modifies each value. The utility searches through all specified group/template entries and
fetches their "Member" attribute values.
Each value is the DN of a member entry. The entry identified by this DN is added to the "MemberOf"
attribute value of the group/template DN at hand. In addition, the utility delete those "Member" attribute
values from the group/template, unless you run the command in the "Both" mode.
When your run the command, it creates a log file ldapmemberconvert.log in the current working
directory. The command logs all modifications done and errors encountered in that log file.
Important - Back up the LDAP server database before you run this conversion utility.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified TDERROR debug
level.
Valid values are from 0 (disabled) to 5 (maximal level, recommended).
Parameter Description
-h <LDAP Server> Specifies the LDAP Server computer by its IP address or resolvable
hostname.
If you do not specify the LDAP Server explicitly, the command connects
to localhost.
-D <LDAP Admin DN> Specifies the LDAP Server administrator Distinguished Name.
-m <Member Specifies the LDAP attribute name when fetching and (possibly) deleting
Attribute Name> a group Member attribute value.
-o <MemberOf Specifies the LDAP attribute name for adding an LDAP "MemberOf"
Attribute Name> attribute value.
-c <Member Specifies the LDAP "ObjectClass" attribute value that defines, which
ObjectClass Value> type of member to modify.
You can specify multiple attribute values with this syntax:
-f <File> Specifies the file that contains a list of Group DNs separated by a new
line:
<Group DN 1>
<Group DN 2>
...
<Group DN N>
-L <LDAP Server Specifies the Server side time limit for LDAP operations, in seconds.
Timeout>
Default is "never".
Parameter Description
-S <Size> Specifies the Server side size limit for LDAP operations, in number of
entries.
Default is "none".
-T <LDAP Client Specifies the Client side timeout for LDAP operations, in milliseconds.
Timeout>
Default is "never".
Notes
There are two "GroupMembership" modes. You must keep these modes consistent:
n template-to-groups
n user-to-groups
For example, if you apply conversion on LDAP users to include the "MemberOf" attributes for their groups,
then this conversion has to be applied on LDAP defined templates for their groups.
Troubleshooting
Symptom:
A command fails with an error message stating the connection stopped unexpectedly when you run it with
the parameter -M <Number of Updates>.
Root Cause:
The LDAP server could not handle that many LDAP requests simultaneously and closed the connection.
Solution:
Run the command again with a lower value for the "-M" parameter. The default value should be adequate,
but can also cause a connection failure in extreme situations. Continue to reduce the value until the
command runs normally. Each time you run the command with the same set of groups, the command
continues from where it left off.
Examples
Example 1
...
cn=cpGroup
uniquemember="cn=member1,ou=people,ou=cp,c=us"
uniquemember="cn=member2,ou=people,ou=cp,c=us"
...
...
cn=member1
objectclass=fw1Person
...
and:
...
cn=member2
objectclass=fw1Person
...
Run:
[Expert@MGMT:0]# ldapconvert -g cn=cpGroup,ou=groups,ou=cp,c=us -h MyLdapServer -d cn=admin -w secret -m uniquemember -o
memberof -c fw1Person
...
cn=cpGroup
...
...
cn=member1
objectclass=fw1Person
memberof="cn=cpGroup,ou=groups,ou=cp,c=us"
...
and:
...
cn=member2
objectclass=fw1Person
memberof="cn=cpGroup,ou=groups,ou=cp,c=us"
...
If you run the same command with the "-B" parameter, it produces the same result, but the group entry
is not modified.
Example 2
If there is another member attribute value for the same group entry:
uniquemember="cn=template1,ou=people, ou=cp,c=us"
cn=member1
objectclass=fw1Template
Then after running the same command, the template entry stays intact, because of the parameter "-c
fw1Person", but the object class of "template1" is "fw1Template".
ldapmodify
Description
This is an LDAP utility that imports users to an LDAP server. The input file must be in the LDIF format.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
ldapmodify [-d <Debug Level>] [-h <LDAP Server>] [-p <LDAP Server
Port>] [-D <LDAP Admin DN>] [-w <LDAP Admin Password>] [-a] [-b] [-c]
[-F] [-k] [-n] [-r] [-v] [-T <LDAP Client Timeout>] [-Z] [ -f <Input
File> .ldif | < <Entry>]
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified TDERROR debug
level.
Valid values are from 0 (disabled) to 5 (maximal level, recommended).
-h <LDAP Server> Specifies the LDAP Server computer by its IP address or resolvable
hostname.
If you do not specify the LDAP Server explicitly, the command connects
to localhost.
-D <LDAP Admin DN> Specifies the LDAP Server administrator Distinguished Name.
Parameter Description
-n Specifies to print the LDAP "add" operations, but do not actually perform
them.
-T <LDAP Client Specifies the Client side timeout for LDAP operations, in milliseconds.
Timeout>
Default is "never".
ldapsearch
Description
This is an LDAP utility that queries an LDAP directory and returns the results.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
ldapsearch [-d <Debug Level>] [-h <LDAP Server>] [-p <LDAP Port>] [-D
<LDAP Admin DN>] [-w <LDAP Admin Password>] [-A] [-B] [-b <Base DN>]
[-F <Separator>] [-l <LDAP Server Timeout>] [-s <Scope>] [-S <Sort
Attribute>] [-t] [-T <LDAP Client Timeout>] [-u] [-z <Number of Search
Entries>] [-Z] <Filter> [<Attributes>]
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified TDERROR debug
level.
Valid values are from 0 (disabled) to 5 (maximal level, recommended).
-h <LDAP Server> Specifies the LDAP Server computer by its IP address or resolvable
hostname.
If you do not specify the LDAP Server explicitly, the command connects
to localhost.
-D <LDAP Admin DN> Specifies the LDAP Server administrator Distinguished Name.
-b <Base DN> Specifies the Base Distinguished Name (DN) for search.
Parameter Description
-F <Separator> Specifies the print separator character between attribute names and
their values.
The default separator is the equal sign (=).
-l <LDAP Server Specifies the Server side time limit for LDAP operations, in seconds.
Timeout>
Default is "never".
-S <Sort Attribute> Specifies to sort the results by the values of this attribute.
-T <LDAP Client Specifies the Client side timeout for LDAP operations, in milliseconds.
Timeout>
Default is never.
-z <Number of Specifies the maximal number of entries to search on the LDAP Server.
Search Entries>
Example
[Expert@MGMT:0]# ldapsearch -p 18185 -b cn=omi objectclass=fw1host objectclass
mcd
Description
This command lets you go to the specified directory in the $FWDIR directory in the context of a Domain
Management Server.
Syntax
Example
[Expert@MDS:0]# mdsstat
+-----------------------------------------------------------------------------------------------------+
| Processes status checking |
+------+--------------------+-----------------+-------------+-------------+-------------+-------------+
| Type | Name | IP address | FWM | FWD | CPD | CPCA |
+------+--------------------+-----------------+-------------+-------------+-------------+-------------+
| MDS | - | 192.168.3.51 | up 15312 | up 15310 | up 10227 | up 15475 |
+------+--------------------+-----------------+-------------+-------------+-------------+-------------+
| CMA | MyDomain_Server | 192.168.3.240 | up 17225 | up 17208 | up 17101 | up 18402 |
+------+--------------------+-----------------+-------------+-------------+-------------+-------------+
| Total Domain Management Servers checked: 1 1 up 0 down |
| Tip: Run mdsstat -h for legend |
+-----------------------------------------------------------------------------------------------------+
[Expert@MDS:0]#
[Expert@MDS:0]#
[Expert@MDS:0]# mdsenv MyDomain_Server
[Expert@MDS:0]#
[Expert@MDS:0]# mcd
changing to /opt/CPmds-R80.40/customers/MyDomain_Server/CPsuite-R80.40/fw1/
[Expert@MDS:0]#
[Expert@MDS:0]# pwd
/opt/CPmds-R80.40/customers/MyDomain_Server/CPsuite-R80.40/fw1
[Expert@MDS:0]#
[Expert@MDS:0]# ls -1
av
bin
conf
cpm-server
database
doc
hash
lib
libsw
log
scripts
state
tmp
[Expert@MDS:0]#
[Expert@MDS:0]# mcd av
changing to /opt/CPmds-R80.40/customers/MyDomain_Server/CPsuite-R80.40/fw1/av
[Expert@MDS:0]#
[Expert@MDS:0]# mcd bin
changing to /opt/CPmds-R80.40/customers/MyDomain_Server/CPsuite-R80.40/fw1/bin
[Expert@MDS:0]#
[Expert@MDS:0]# mcd conf
changing to /opt/CPmds-R80.40/customers/MyDomain_Server/CPsuite-R80.40/fw1/conf
[Expert@MDS:0]#
[Expert@MDS:0]# mcd log
changing to /opt/CPmds-R80.40/customers/MyDomain_Server/CPsuite-R80.40/fw1/log
[Expert@MDS:0]#
[Expert@MDS:0]# mcd scripts
changing to /opt/CPmds-R80.40/customers/MyDomain_Server/CPsuite-R80.40/fw1/scripts
[Expert@MDS:0]#
mds_backup
Description
The mds_backup command backs up binaries and data from a Multi-Domain Server to a user specified
working directory.
You then copy the backup files from the working directory to external storage.
This command requires Multi-Domain Superuser privileges.
The mds_backup command runs the gtar and dump commands to back up all databases. The collected
information is stored in one *.tar file. The file name is a combination of the backup date and time and is
saved in the current working directory. For example: 13Sep2015-141437.mdsbk.tar
Notes:
n Do not create or delete Domains or Domain Management Servers until the
backup operation completes.
n It is important not to run the mds_backup command from directories that are
not backed up.
For example, when you back up a Multi-Domain Server, do not run the mds_
backup command from the /opt/CPmds-<Current_Release>/
directory, because it is a circular reference (backup of directory, in which you
need to write files).
Run the mds_backup command from a location outside the product directory
tree to be backed up. This becomes the working directory.
n The mds_backup command does not collect the active Security log file
(*.log) and Audit log file (*.adtlog).
This is necessary to prevent inconsistencies during the read-write operations.
Best Practice - Perform a log switch before you start the backup
procedure.
n You can back up the Multi-Domain Server configuration without the log files.
This backup is typically significantly smaller than a full backup with logs.
To back up without log files, add this line to the file $MDSDIR/conf/mds_
exclude.dat configuration file:
log/*
n After the backup completes, copy the backup *.tar file, together with the mds_
restore, and gtar binary files, to your external backup location.
Syntax
mds_backup -h
Parameters
Parameter Description
-v "Dry run" - Shows all files to be backed up, but does not perform the
backup operation.
mds_restore
Description
Use the mds_restore command to restore a Multi-Domain Server / Multi-Domain Log Server that was
backed up with the "mds_backup" on page 670 command.
Important - You must restore on the server that runs same software version, from
which you collected this backup.
Example: If you collected a backup on a server with version "XX" and Jumbo Hotfix
Accumulator Take "YY", then you must restore on a server with version "XX" and
Jumbo Hotfix Accumulator Take "YY".
./mds_restore <backup_file>
5. If you restore on a Multi-Domain Server with a new IP address, configure the new IP address.
mdscmd
Description
In versions lower than R80, this utility executed various commands on the Multi-Domain Server.
Starting from R80, this command is obsolete.
You must use other commands. If there is no alternative command, then perform the applicable action in
SmartConsole.
mgmt_cli assign-global-
assignment
mdsconfig
Description
This command starts the Multi-Domain Server Configuration Program. This tool lets you configure specific
settings for the installed Check Point products.
Note - This command updates the database schema before it imports. First, the
command runs pre-upgrade verification. If no errors are found, migration continues. If
there are errors, you must fix them on the source R7x Domain Management Server
according to instructions in the error messages. Then do this procedure again.
For the complete procedure, see the R80.40 Installation and Upgrade Guide.
Syntax
mdsconfig
Menu Options
Leading VIP Interfaces The Leading VIP Interfaces are real interfaces connected to an
external network.
These interfaces are used when you configure virtual IP
addresses for Domain Management Servers.
Random Pool Configures the RSA keys, to be used by Gaia Operating System.
GUI Clients Configures the GUI clients that can use SmartConsole to connect
to this server.
Automatic Start of Multi- Shows and controls if Multi-Domain Server starts automatically
Domain Server during boot.
Start Multi-Domain Server Configures a password to control the start of the Multi-Domain
Password Server.
IPv6 Support for Multi-Domain Enables or disables the IPv6 Support on the Multi-Domain Server.
Server
Important - R80.40 Multi-Domain Server does not
support IPv6 address configuration (Known Limitation
PMTR-14989).
IPv6 Support for Existing Enables or disables the IPv6 Support on the Domain Management
Domain Management Servers Servers.
[Expert@MyMDS:0]# mdsconfig
Configuration Options:
----------------------
(1) Leading VIP Interfaces
(2) Licenses
(3) Random Pool
(4) Groups
(5) Certificate's Fingerprint
(6) Administrators
(7) GUI clients
(8) Automatic Start of Multi-Domain Server
(9) P1Shell
(10) Start Multi-Domain Server Password
(11) IPv6 Support for Multi-Domain Server
(12) IPv6 Support for Existing Domain Management Servers
(13) Exit
mdsenv
Description
Use the mdsenv command to set shell environment variables to run commands on a specified Domain
Management Server.
When run without an argument, the command sets the shell for Multi-Domain Server level commands
("mdsstart" on page 684, "mdsstop" on page 691, and so on).
Syntax
Parameters
Parameter Description
Example
[Expert@MyMDS:0]# mdsstat
+---------------------------------------------------------------------
--------------------------------+
| Processes status checking
|
+------+--------------------+-----------------+-------------+---------
----+-------------+-------------+
| Type | Name | IP address | FWM | FWD
| CPD | CPCA |
+------+--------------------+-----------------+-------------+---------
----+-------------+-------------+
| MDS | - | 192.168.3.51 | up 10086 | up 11422
| up 5427 | up 11440 |
+------+--------------------+-----------------+-------------+---------
----+-------------+-------------+
| CMA | MyDomain_Server | 192.168.3.240 | up 10891 | up 8199
| up 7670 | up 9536 |
+------+--------------------+-----------------+-------------+---------
----+-------------+-------------+
| Total Domain Management Servers checked: 1 1 up 0 down
|
| Tip: Run mdsstat -h for legend
|
+---------------------------------------------------------------------
--------------------------------+
[Expert@MyMDS:0]#
[Expert@MyMDS:0]# mdsenv MyDomain_Server
[Expert@MyMDS:0]#
[Expert@MyMDS:0]# echo $FWDIR
/opt/CPmds-R80.40/customers/MyDomain_Server/CPsuite-R80.40/fw1
[Expert@MyMDS:0]#
mdsquerydb
Description
The mdsquerydb is an advanced database query tool that lets administrators use shell scripts to get
information from the Multi-Domain Security Management databases.
Use this command to get information from the Multi-Domain Server, Domain Management Server, and
Global databases.
Syntax
Parameters
Parameter Description
<key_name> Query key, which must be defined in the pre-defined queries configuration file.
-f <output_ Send the query results to the specified file name. If this parameter is not
file_name> specified, the data is sent to the standard output.
Example 2 - Send a list of Domains in the Multi-Domain Server database to the standard output
[Expert@MDS:0]# mdsenv
[Expert@MDS:0]# mdsquerydb Domains
Example 3 - Send a list of network objects in the global database to the /tmp/gateways.txt file
[Expert@MDS:0]# mdsenv
[Expert@MDS:0]# mdsquerydb NetworkObjects -f /tmp/gateways.txt
Example 4 - Get a list of gateway objects in the Domain Management Server "DServer1"
mdsstart
Description
Starts the Multi-Domain Server and all Domain Management Servers.
To start a specific Domain Management Server, see the "mdsstart_customer" on page 688 command.
Syntax
Parameters
Parameter Description
-m Optional: Starts only the Multi-Domain Server and not the Domain Management Servers.
This procedure configures the specified value for the environment variable NUM_EXEC_SIMUL in the
current shell (does not survive reboot):
Step Description
Example:
[Expert@MDS:0]# export NUM_EXEC_SIMUL=5
4 Make sure the new value of the environment variable NUM_EXEC_SIMUL is set:
This procedure removes the configured value for the environment variable NUM_EXEC_SIMUL in the
current shell (does not survive reboot):
Parameter Description
This procedure configures the specified value for the environment variable NUM_EXEC_SIMUL for all
shells (survives reboot):
Step Description
[Expert@MDS:0]# cp -v /etc/rc.d/rc.local{,_BKP}
[Expert@MDS:0]# vi /etc/rc.d/rc.local
Important - After this line, you must press Enter to add a new line.
Example:
export NUM_EXEC_SIMUL=5
7 Reboot.
8 Make sure the new value of the environment variable NUM_EXEC_SIMUL is set:
This procedure removes the configured value for the environment variable NUM_EXEC_SIMUL for all
shells (survives reboot):
Step Description
[Expert@MDS:0]# cp -v /etc/rc.d/rc.local{,_BKP_with_
NUM_EXEC_SIMUL}
[Expert@MDS:0]# vi /etc/rc.d/rc.local
7 Reboot.
8 Make sure the new value of the environment variable NUM_EXEC_SIMUL is not set:
mdsstart_customer
Description
Starts the specified Domain Management Server, if it was stopped with the "mdsstop_customer" on
page 695 command.
To start the entire Multi-Domain Server, see the "mdsstart" on page 684 command.
Syntax
Note - If the name of the Domain Management Server includes spaces, you must
surround it with quotes ("Name of Domain Management Server").
mdsstat
Description
This command shows the status of specific processes on the Multi-Domain Server and Domain
Management Servers.
Syntax
Parameters
Parameter Description
Status Description
Example
[Expert@MDS:0]# mdsstat
+--------------------------------------------------------------------------------------+
| Processes status checking |
+-----+----------------+-----------------+------------+----------+----------+----------+
| Type| Name | IP address | FWM | FWD | CPD | CPCA |
+-----+----------------+-----------------+------------+----------+----------+----------+
| MDS | - | 192.168.3.101 | up 17284 | up 17266 | up 17251 | up 17753 |
+-----+----------------+-----------------+------------+----------+----------+----------+
| CMA |DOM211_Server | 192.168.3.211 | up 32227 | up 32212 | up 25725 | up 32482 |
| CMA |DOM212_Server | 192.168.3.212 | up 4248 | up 4184 | up 4094 | up 4441 |
+-----+----------------+-----------------+------------+----------+----------+----------+
| Total Domain Management Servers checked: 2 2 up 0 down |
| Tip: Run mdsstat -h for legend |
+--------------------------------------------------------------------------------------+
[Expert@MDS:0]#
mdsstop
Description
Stops the Multi-Domain Server and all Domain Management Servers.
To stop a specific Domain Management Server, see the "mdsstop_customer" on page 695 command.
Syntax
Parameters
Parameter Description
-m Optional: Stops only the Multi-Domain Server and not the Domain Management Servers.
This procedure configures the specified value for the environment variable NUM_EXEC_SIMUL in the
current shell (does not survive reboot):
Step Description
Example:
[Expert@MDS:0]# export NUM_EXEC_SIMUL=5
4 Make sure the new value of the environment variable NUM_EXEC_SIMUL is set:
This procedure removes the configured value for the environment variable NUM_EXEC_SIMUL in the
current shell (does not survive reboot):
Parameter Description
This procedure configures the specified value for the environment variable NUM_EXEC_SIMUL for all
shells (survives reboot):
Step Description
[Expert@MDS:0]# cp -v /etc/rc.d/rc.local{,_BKP}
[Expert@MDS:0]# vi /etc/rc.d/rc.local
Important - After this line, you must press Enter to add a new line.
Example:
export NUM_EXEC_SIMUL=5
7 Reboot.
8 Make sure the new value of the environment variable NUM_EXEC_SIMUL is set:
This procedure removes the configured value for the environment variable NUM_EXEC_SIMUL for all
shells (survives reboot):
Step Description
[Expert@MDS:0]# cp -v /etc/rc.d/rc.local{,_BKP_with_
NUM_EXEC_SIMUL}
[Expert@MDS:0]# vi /etc/rc.d/rc.local
7 Reboot.
8 Make sure the new value of the environment variable NUM_EXEC_SIMUL is not set:
mdsstop_customer
Description
Stops the specified Domain Management Server.
To stop the entire Multi-Domain Server, see the "mdsstop" on page 691 command.
Syntax
Notes:
n If the name of the Domain Management Server includes spaces, you must
surround it with quotes ("Name of Domain Management Server").
n To start the specified Domain Management Server, run the "mdsstart_
customer" on page 688 command.
mgmt_cli
Description
The mgmt_cli tool lets you work directly with the management database on your Management Server.
cd /d "%ProgramFiles%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
mgmt_cli.exe <Command Name> <Command Parameters> <Optional Switches>
cd /d "%ProgramFiles(x86)%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
mgmt_cli.exe <Command Name> <Command Parameters> <Optional Switches>
Notes
n For a complete list of the mgmt_cli options, enter the mgmt_cli (mgmt_cli.exe) command
and press Enter.
n For more information, see the Check Point Management API Reference.
migrate
Important - This command is used to migrate the management database from R80.10
and lower versions.
For more information, see the R80.40 Installation and Upgrade Guide.
Description
Exports the management database and applicable Check Point configuration.
Imports the exported management database and applicable Check Point configuration.
Notes:
n You must run this command from the Expert mode.
n If you need to back up the current management database, and you do not plan
to import it on a Management Server that runs a higher software version, then
you can use the built-in command in the $FWDIR/bin/upgrade_tools/
directory.
n If you plan to import the management database on a Management Server that
runs a higher software version, then you must use the migrate utility from the
migration tools package created specifically for that higher software version.
See the Installation and Upgrade Guide for that higher software version.
n If this command completes successfully, it creates this log file:
/var/log/opt/CPshrd-R80.40/migrate-<YYYY.MM.DD_
HH.MM.SS>.log
For example: /var/log/opt/CPshrd-R80.40/migrate-2019.06.14_11.03.46.log
n If this command fails, it creates this log file:
$CPDIR/log/migrate-<YYYY.MM.DD_HH.MM.SS>.log
For example: /opt/CPshrd-R80.40/log/migrate-2019.06.14_11.21.39.log
Syntax
n To see the built-in help:
[Expert@MGMT:0]# ./migrate -h
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# yes | nohup ./migrate export [-l | -x] [-n] [--
exclude-uepm-postgres-db] [--include-uepm-msi-files] /<Full
Path>/<Name of Exported File> &
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# yes | nohup ./migrate import [-l | -x] [-n] [--
exclude-uepm-postgres-db] [--include-uepm-msi-files] /<Full
Path>/<Name of Exported File>.tgz &
Parameters
Parameter Description
As a result, when the CLI session closes, the command continues to run in the
background.
See:
n sk133312
n https://linux.die.net/man/1/bash
n https://linux.die.net/man/1/nohup
export Exports the management database and applicable Check Point configuration.
import Imports the management database and applicable Check Point configuration
that were exported from another Management Server.
Parameter Description
-l Exports and imports the Check Point logs without log indexes in the
$FWDIR/log/ directory.
Note - The command can export only closed logs (to which the
information is not currently written).
-x Exports and imports the Check Point logs with their log indexes in the
$FWDIR/log/ directory.
Important:
n This parameter only supports Management Servers and Log
Servers R80.10 and higher.
n The command can export only closed logs (to which the
information is not currently written).
-n Runs silently (non-interactive mode) and uses the default options for each
setting.
Important:
n If you export a management database in this mode and the
specified name of the exported file matches the name of an
existing file, the command overwrites the existing file without
prompting.
n If you import a management database in this mode, the
"migrate import" command runs the "cpstop"
command automatically.
--exclude-uepm- n During the export operation, does not back up the PostgreSQL
postgres-db database from the Endpoint Security Management Server.
n During the import operation, does not restore the PostgreSQL
database on the Endpoint Security Management Server.
--include-uepm- n During the export operation, backs up the MSI files from the Endpoint
msi-files Security Management Server.
n During the import operation, restores the MSI files on the Endpoint
Security Management Server.
<Name of n During the export operation, specifies the name of the output file.
Exported File>
The command automatically adds the *.tgz extension.
n During the import operation, specifies the name of the exported file.
You must manually enter the *.tgz extension in the end.
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# ./migrate export /var/log/Migrate_Export
[Expert@MGMT:0]#
[Expert@MGMT:0]# find / -name migrate-\* -type f
/var/log/opt/CPshrd-R80.40/migrate-2019.06.14_11.03.46.log
[Expert@MGMT:0]#
migrate_server
Important - This command is used to migrate the management database from
R80.20.M1, R80.20, R80.20.M2, R80.30, and higher versions.
For more information, see the R80.40 Installation and Upgrade Guide.
Description
Exports the management database and applicable Check Point configuration.
Imports the exported management database and applicable Check Point configuration.
Notes:
n You must run this command from the Expert mode.
n If you need to back up the current management database, and you do not plan
to import it on a Management Server that runs a higher software version, then
you can use the built-in command in the $FWDIR/scripts/ directory.
n If you plan to import the management database on a Management Server that
runs a higher software version, then you must use the migrate_server utility
from the migration tools package created specifically for that higher software
version. See the Installation and Upgrade Guide for that higher software
version.
n If this command completes successfully, it creates this log file:
/var/log/opt/CPshrd-R80.40/migrate-<YYYY.MM.DD_
HH.MM.SS>.log
For example: /var/log/opt/CPshrd-R80.40/migrate-2019.06.14_11.03.46.log
n If this command fails, it creates this log file:
$CPDIR/log/migrate-<YYYY.MM.DD_HH.MM.SS>.log
For example: /opt/CPshrd-R80.40/log/migrate-2019.06.14_11.21.39.log
Syntax
n To see the built-in help:
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server -h
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server verify -v R80.40 [-skip_upgrade_
tools_check]
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server export -v R80.40 [-skip_upgrade_
tools_check] [-l | -x] [--include-uepm-msi-files] [--exclude-uepm-
postgres-db] /<Full Path>/<Name of Exported File>
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server import -v R80.40 [-skip_upgrade_
tools_check] [-l | -x] [-change_ips_file /<Full Path>/<Name of
JSON File>.json] [--include-uepm-msi-files] [--exclude-uepm-
postgres-db] /<Full Path>/<Name of Exported File>.tgz
Parameters
Paramete
Description
r
export Exports the management database and applicable Check Point configuration.
import Imports the management database and applicable Check Point configuration that were
exported from another Management Server.
Important - This command automatically restarts Check Point services (runs the
"cpstop" and "cpstart" commands).
verify Verifies the management database and applicable Check Point configuration that were
exported from another Management Server.
Paramete
Description
r
-skip_ Does not try to connect to Check Point Cloud to check for a more recent version of the
upgrad Upgrade Tools.
e_
tools_ Best Practice - Use this parameter on the Management Server that is not
check connected to the Internet.
-l Exports and imports the Check Point logs without log indexes in the $FWDIR/log/
directory.
Note - The command can export only closed logs (to which the information is
not currently written).
-x Exports and imports the Check Point logs with their log indexes in the $FWDIR/log/
directory.
Important:
n This parameter only supports Management Servers and Log Servers
R80.10 and higher.
n The command can export only closed logs (to which the information is not
currently written).
- Specifies the absolute path to the special JSON configuration file with new IPv4
change_ addresses.
ips_
This file is mandatory during an upgrade of a Multi-Domain Security Management
file
environment.
/<Full
Path Even if only one of the servers migrates to a new IP address, all the other servers must get
>/<Name this configuration file for the import process.
of JSON Example:
File
>.json [{"name":"MyPrimaryMultiDomainServer","newIpAddress4":"172.
30.40.51"},
{"name":"MySecondaryMultiDomainServer","newIpAddress4":"172
.30.40.52"}]
-- n During the export operation, backs up the MSI files from the Endpoint Security
includ Management Server.
e-uepm-
n During the import operation, restores the MSI files on the Endpoint Security
msi-
Management Server.
files
-- n During the export operation, does not back up the PostgreSQL database from the
exclud Endpoint Security Management Server.
e-uepm-
n During the import operation, does not restore the PostgreSQL database on the
postgre
Endpoint Security Management Server.
s-db
Paramete
Description
r
/<Full Specifies the absolute path to the exported database file. This path must exist.
Path
n During the export operation, specifies the name of the output file.
>/<Name
of The command automatically adds the *.tgz extension.
Exporte
d File> n During the import operation, specifies the name of the exported file.
You must manually enter the *.tgz extension in the end.
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server export /var/log/Migrate_Export
[Expert@MGMT:0]#
[Expert@MGMT:0]# find / -name migrate-\* -type f
/var/log/opt/CPshrd-R80.40/migrate-2019.06.14_11.03.46.log
[Expert@MGMT:0]#
migrate_global_policies
Description
This utility transfers (and upgrades, if necessary) the global configuration database from one Multi-Domain
Server to another Multi-Domain Server.
Notes:
n You can only use this command when the target Multi-Domain Server does not
have global configurations defined.
n This utility replaces all existing global configurations. Each existing global
configuration is saved with a *.pre_migrate extension.
n If you migrate only the global configurations (without the Domain Management
Servers) to a new Multi-Domain Server, disable all Security Gateways that are
enabled for global use.
Important - You cannot export an R80.X global configuration database and then use
this utility on an R80.X Multi-Domain Server.
Syntax
migrate_global_policies <Path>
Parameters
Parameter Description
<Path> The fully qualified path to the directory where the global policies files, originally exported
from the source Multi-Domain Server ($MDSDIR/conf/), are located.
Example
[email protected]_MDS:0]# migrate_global_policies /var/log/exported_global_db.22Jul2019-124547.tgz
queryDB_util
Description
Searches in the management database for objects or policy rules.
Important - This command is obsolete for R80 and above. Use the "mgmt_cli" on
page 358 command to load a policy on a managed Security Gateway.
rs_db_tool
Description
Manages Dynamically Assigned IP address (DAIP) gateways in a DAIP database.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
n To add an entry to the DAIP database:
Note - You must run this command from the Expert mode.
Parameters
Parameter Description
-ip <IPv4 Address> Specifies the IPv4 address of the DAIP object
-TTL <Time-To- Specifies the relative time interval (in seconds), during which the entry is
Live> valid.
sam_alert
Description
For SAM v1, this utility executes Suspicious Activity Monitoring (SAM) actions according to the information
received from the standard input.
For SAM v2, this utility executes Suspicious Activity Monitoring (SAM) actions with User Defined Alerts
mechanism.
Notes:
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Monitoring (SAM) Rules. See sk79700.
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n See the "fw sam" on page 271 and "fw sam_policy" on page 279 commands.
SAM v1 syntax
sam_alert [-v] [-o] [-s <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-C] {-n|-i|-I} {-src|-dst|-any|-srv}
Parameter Description
-o Specifies to print the input of this tool to the standard output (to use with pipes in
a CLI syntax).
-t <Time> Specifies the time (in seconds), during which to enforce the action. The default is
forever.
Parameter Description
-n Specifies to notify every time a connection, which matches the specified criteria,
passes through the Security Gateway.
-I Inhibits (drops or rejects) connections that match the specified criteria and
closes all existing connections that match the specified criteria.
SAM v2 syntax
sam_alert -v2 [-v] [-O] [-S <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-n <Name>] [-c "<Comment">] [-o <Originator>] [-l {r |
a}] -a {d | r| n | b | q | i} [-C] {-ip |-eth} {-src|-dst|-any|-srv}
Parameter Description
-O Specifies to print the input of this tool to the standard output (to use
with pipes in a CLI syntax).
-t <Time> Specifies the time (in seconds), during which to enforce the action.
The default is forever.
-l {r | a} Specifies the log type for connections that match the specified criteria:
n r - Regular
n a - Alert
Default is None.
Parameter Description
Example
See sk110873: How to configure Security Gateway to detect and prevent port scan.
stattest
Description
Check Point AMON client to query SNMP OIDs.
You can use this command as an alternative to the standard SNMP commands for debug purposes - to
make sure the applicable SNMP OIDs provide the requested information.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
n To query a Regular OID:
stattest get [-d] [-h <Host>] [-p <Port>] [-x <Proxy Server>] [-v <VSID>] [-t <Timeout>] <Regular_OID_1> <Regular_OID_2>
... <Regular_OID_N>
Parameters
Parameter Description
Parameter Description
threshold_config
Description
You can configure a variety of different SNMP thresholds that generate SNMP traps, or alerts.
You can use these thresholds to monitor many system components automatically without requesting
information from each object or device.
You configure these SNMP Monitoring Thresholds only on the Security Management Server, Multi-Domain
Server, or Domain Management Server.
During policy installation, the managed a Security Gateway and Clusters receive and apply these
thresholds as part of their policy.
For more information, see sk90860: How to configure SNMP on Gaia OS.
Procedure
Step Description
3 On a Multi-Domain Server, switch to the context of the applicable Domain Management Server:
[Expert@HostName:0]# threshold_config
Step Description
11 In SmartConsole, install the Access Control Policy on Security Gateways and Clusters.
(1) Show policy Shows the name of the current configured threshold policy.
name
(2) Set policy Configures the name for the threshold policy.
name
If you do not specify it explicitly, then the default name is "Default
Profile".
(3) Save policy Saves the changes in the current threshold policy.
(7) Configure Configures the SNMP Network Management System (NMS), to which the
alert managed Security Gateways and Cluster Members send their SNMP alerts.
destinations
Configure Alert Destinations Options:
-------------------------------------
(1) View alert destinations
(2) Add SNMP NMS
(3) Remove SNMP NMS
(4) Edit SNMP NMS
(8) View Shows a list of all available thresholds and their current settings. These
thresholds include:
overview
n Name
n Category (see the next option "(9)")
Thresholds Categories
Category Sub-Categories
(3) Local Logging Mode Status Local Logging Mode Status Thresholds:
-------------------------------------
(1) Local Logging Mode
Category Sub-Categories
Notes:
n If you run the threshold_config command locally on a Security Gateway or
Cluster Members to configure the SNMP Monitoring Thresholds, then each
policy installation erases these local SNMP threshold settings and reverts them
to the global SNMP threshold settings configured on the Management Server
that manages this Security Gateway or Cluster.
n On a Security Gateway and Cluster Members, you can save the local Threshold
Engine Configuration settings to a file and load it locally later.
n The Threshold Engine Configuration is stored in the
$FWDIR/conf/thresholds.conf file.
n In a Multi-Domain Security Management environment:
l You can configure the SNMP thresholds in the context of Multi-Domain
Server (MDS) and in the context of each individual Domain Management
Server.
l Thresholds that you configure in the context of the Multi-Domain Server
are for the Multi-Domain Server only.
l Thresholds that you configure in the context of a Domain Management
Server are for that Domain Management Server and its managed Security
Gateway and Clusters.
l If an SNMP threshold applies both to the Multi-Domain Server and a
Domain Management Server, then configure the SNMP threshold both in
the context of the Multi-Domain Server and in the context of the Domain
Management Server.
However, in this scenario you can only get alerts from the Multi-Domain
Server, if the monitored object exceeds the threshold.
Example:
If you configure the CPU threshold, then when the monitored value
exceeds the configured threshold, it applies to both the Multi-Domain
Server and the Domain Management Server. However, only the Multi-
Domain Server generates SNMP alerts.
$MDSVERUTIL
Description
This utility returns information about the Multi-Domain Server and Domain Management Servers.
This utility is intended for internal use by Check Point scripts on the Multi-Domain Server.
You can use this utility to get some information about the Multi-Domain Server and Domain Management
Servers (for example, the names of all Domain Management Servers).
Syntax
$MDSVERUTIL help
$MDSVERUTIL
AllCMAs <options>
AllVersions
CMAAddonDir <options>
CMACompDir <options>
CMAFgDir <options>
CMAFw40Dir <options>
CMAFw41Dir <options>
CMAFwConfDir <options>
CMAFwDir <options>
CMAIp <options>
CMAIp6 <options>
CMALogExporterDir <options>
CMALogIndexerDir <options>
CMANameByFwDir <options>
CMANameByIp <options>
CMARegistryDir <options>
CMAReporterDir <options>
CMASmartLogDir <options>
CMASvnConfDir <options>
CMASvnDir <options>
ConfDirVersion <options>
CpdbUpParam <options>
CPprofileDir <options>
CPVer <options>
CustomersBaseDir <options>
DiskSpaceFactor <options>
InstallationLogDir <options>
IsIPv6Enabled
IsLegalVersion <options>
IsOsSupportsIPv6
LatestVersion
MDSAddonDir <options>
MDSCompDir <options>
MDSDir <options>
MDSFgDir <options>
MDSFwbcDir <options>
MDSFwDir <options>
MDSIp <options>
MDSIp6 <options>
MDSLogExporterDir <options>
MDSLogIndexerDir <options>
MDSPkgName <options>
MDSRegistryDir <options>
MDSReporterDir <options>
MDSSmartLogDir <options>
MDSSvnDir <options>
MDSVarCompDir <options>
MDSVarDir <options>
MDSVarFwbcDir <options>
MDSVarFwDir <options>
MDSVarSvnDir <options>
MSP <options>
OfficialName <options>
OptionPack <options>
ProductName <options>
RegistryCurrentVer <options>
ShortOfficialName <options>
SmartCenterPuvUpgradeParam <options>
SP <options>
SVNPkgName <options>
SvrDirectory <options>
SvrParam <options>
Parameters
Parameter Description
Parameter Description
CMAAddonDir <options> Returns the path to the Management Addon directory in the
context of the specified Domain Management Server.
See "$MDSVERUTIL CMAAddonDir" on page 736.
CMACompDir <options> Returns the full path for the specified Backward Compatibility
Package in the context of the specified Domain Management
Server.
See "$MDSVERUTIL CMACompDir" on page 737.
CMAFgDir <options> Returns the full path for the $FGDIR directory in the context of
the specified Domain Management Server.
See "$MDSVERUTIL CMAFgDir" on page 738.
CMAFw40Dir <options> Returns the full path for the $FWDIR directory for FireWall-1
4.0 in the context of the specified Domain Management
Server.
See "$MDSVERUTIL CMAFw40Dir" on page 739.
CMAFw41Dir <options> Returns the full path for the $FWDIR directory for Edge
devices (that are based on FireWall-1 4.1) in the context of the
specified Domain Management Server.
CMAFwConfDir <options> Returns the full path for the $FWDIR/conf/ directory in the
context of the specified Domain Management Server.
See "$MDSVERUTIL CMAFwConfDir" on page 741.
CMAFwDir <options> Returns the full path for the $FWDIR directory in the context of
the specified Domain Management Server.
See "$MDSVERUTIL CMAFwDir" on page 742.
Parameter Description
CMAIp <options> Returns the IPv4 address of the Domain Management Server
specified by its name.
See "$MDSVERUTIL CMAIp" on page 743.
CMAIp6 <options> Returns the IPv6 address of the Domain Management Server
specified by its name.
See "$MDSVERUTIL CMAIp6" on page 744.
CMALogExporterDir Returns the full path for the $EXPORTERDIR directory in the
<options> context of the specified Domain Management Server.
See "$MDSVERUTIL CMALogExporterDir" on page 745.
CMALogIndexerDir <options> Returns the full path for the $INDEXERDIR directory in the
context of the specified Domain Management Server.
See "$MDSVERUTIL CMALogIndexerDir" on page 746.
CMANameByFwDir <options> Returns the name of the Domain Management Server based
on the context of the current $FWDIR directory.
CMANameByIp <options> Returns the name of the Domain Management Server based
on the specified IPv4 address.
See "$MDSVERUTIL CMANameByIp" on page 748.
CMARegistryDir <options> Returns the full path for the $CPDIR/registry/ directory in
the context of the specified Domain Management Server.
See "$MDSVERUTIL CMARegistryDir" on page 749.
CMAReporterDir <options> Returns the full path for the $RTDIR directory in the context of
the specified Domain Management Server.
See "$MDSVERUTIL CMAReporterDir" on page 750.
CMASmartLogDir <options> Returns the full path for the $SMARTLOGDIR directory in the
context of the specified Domain Management Server.
See "$MDSVERUTIL CMASmartLogDir" on page 751.
CMASvnConfDir <options> Returns the full path for the $CPDIR/conf/ directory in the
context of the specified Domain Management Server.
See "$MDSVERUTIL CMASvnConfDir" on page 752.
CMASvnDir <options> Returns the full path for the $CPDIR directory in the context of
the specified Domain Management Server.
See "$MDSVERUTIL CMASvnDir" on page 753.
Parameter Description
ConfDirVersion <options> Returns the internal Version ID based on the context of the
current $FWDIR/conf/ directory.
CpdbUpParam <options> Returns internal version numbers from the internal database.
See "$MDSVERUTIL CpdbUpParam" on page 755.
CPprofileDir <options> Returns the path to the directory that contains the
.CPprofile.sh and the .CPprofile.csh shell scripts.
See "$MDSVERUTIL CPprofileDir" on page 756.
InstallationLogDir Returns the full path for directory with all installation logs
<options> (/opt/CPInstLog/).
Parameter Description
MDSAddonDir <options> Returns the path to the Management Addon directory in the
MDS context.
See "$MDSVERUTIL MDSAddonDir" on page 765.
MDSCompDir <options> Returns the full path for the specified Backward Compatibility
Package in the MDS context.
See "$MDSVERUTIL MDSCompDir" on page 766.
MDSDir <options> Returns the full path in the /opt/ directory to the $MDSDIR
directory.
See "$MDSVERUTIL MDSDir" on page 767.
MDSFgDir <options> Returns the full path for the $FGDIR directory in the MDS
context.
See "$MDSVERUTIL MDSFgDir" on page 768.
MDSFwbcDir <options> Returns the full path in the /opt/ directory (in the MDS
context) for the Backward Compatibility directory for Edge
devices.
See "$MDSVERUTIL MDSFwbcDir" on page 769.
MDSFwDir <options> Returns the full path in the /opt/ directory for the $FWDIR
directory in the MDS context.
See "$MDSVERUTIL MDSFwDir" on page 770.
MDSLogExporterDir Returns the full path for the $EXPORTERDIR directory in the
<options> MDS context.
See "$MDSVERUTIL MDSLogExporterDir" on page 773.
MDSLogIndexerDir <options> Returns the full path for the $INDEXERDIR directory in the
MDS context.
See "$MDSVERUTIL MDSLogIndexerDir" on page 774.
Parameter Description
MDSRegistryDir <options> Returns the full path for the $CPDIR/registry/ directory in
the MDS context.
See "$MDSVERUTIL MDSRegistryDir" on page 776.
MDSReporterDir <options> Returns the full path for the $RTDIR directory in the MDS
context.
See "$MDSVERUTIL MDSReporterDir" on page 777.
MDSSmartLogDir <options> Returns the full path for the $SMARTLOGDIR directory in the
MDS context.
See "$MDSVERUTIL MDSSmartLogDir" on page 778.
MDSSvnDir <options> Returns the full path in the /opt/ directory for the $CPDIR
directory in the MDS context.
See "$MDSVERUTIL MDSSvnDir" on page 779.
MDSVarCompDir <options> Returns the full path in the /var/opt/ directory for the
specified Backward Compatibility Package in the MDS context.
See "$MDSVERUTIL MDSVarCompDir" on page 780.
MDSVarDir <options> Returns the full path in the /var/opt/ directory to the
$MDSDIR directory.
See "$MDSVERUTIL MDSVarCompDir" on page 780.
MDSVarFwbcDir <options> Returns the full path in the /var/opt/ directory (in the MDS
context) for the Backward Compatibility directory for Edge
devices.
See "$MDSVERUTIL MDSVarFwbcDir" on page 782.
MDSVarFwDir <options> Returns the full path in the /var/opt/ directory for the
$FWDIR directory in the MDS context.
See "$MDSVERUTIL MDSVarFwDir" on page 783.
MDSVarSvnDir <options> Returns the full path in the /var/opt/ directory for the
$CPDIR directory in the MDS context.
See "$MDSVERUTIL MDSVarSvnDir" on page 784.
Parameter Description
ProductName <options> Returns the official name of the Multi-Domain Server product.
See "$MDSVERUTIL ProductName" on page 788.
SVNPkgName <options> Returns the name of the Secure Virtual Network (SVN)
package.
See "$MDSVERUTIL SVNPkgName" on page 793.
SvrDirectory <options> Returns the full path for the SmartReporter directory.
See "$MDSVERUTIL SvrDirectory" on page 794.
$MDSVERUTIL AllCMAs
Description
Returns the list of names of the configured Domain Management Servers.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL AllVersions
Description
Returns the internal representation of versions, this Multi-Domain Server recognizes.
You can you these internal version strings in other commands.
In addition, see these commands:
n "$MDSVERUTIL IsLegalVersion" on page 762
n "$MDSVERUTIL OfficialName" on page 786
Syntax
$MDSVERUTIL AllVersions
Mapping
VID_94 R80.40
VID_93 R80.30
VID_92 R80.20
VID_91 R80
VID_90 R77.X
VID_89 R76
VID_88 R75.40VS
VID_87 R75.40
VID_86 R75.30
VID_85 R75.20
VID_84 R75
VID_83 R71.X
VID_80 R70.X
VID_541_A NG AI R55W
VID_541 NG AI R55
VID_54_VSX_R2 VSX NG AI R2
VID_54 NG AI R54
VID_53_VSX VSX NG AI
VID_53 NG FP3
VID_52 NG FP2
VID_51 NG FP1
VID_41 4.1
Example
$MDSVERUTIL CMAAddonDir
Description
Returns the path to the Management Addon directory in the context of the specified Domain Management
Server. Applies only to NG AI R55W version.
In addition, see the "$MDSVERUTIL MDSAddonDir" on page 765 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMACompDir
Description
Returns the full path for the specified Backward Compatibility Package in the context of the specified
Domain Management Server.
In addition, see these commands:
n "$MDSVERUTIL MDSCompDir" on page 766
n "$MDSVERUTIL MDSVarCompDir" on page 780
Syntax
Parameters
Parameter Description
ls -1 $MDSDIR/customers/<Name of Domain
Management Server>/ | grep CMP
Example
$MDSVERUTIL CMAFgDir
Description
Returns the full path for the $FGDIR directory in the context of the specified Domain Management Server.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CMAFw40Dir
Description
Returns the full path for the $FWDIR directory for FireWall-1 4.0 in the context of the specified Domain
Management Server.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CMAFw41Dir
Note - R80.40 does not support UTM-1 Edge and Safe@Office devices. The
information about this command is provided only to describe the existing syntax option
until it is removed completely.
Description
Returns the full path for the $FWDIR directory for UTM-1 Edge devices (that are based on FireWall-1 4.1)
in the context of the specified Domain Management Server.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CMAFwConfDir
Description
Returns the full path for the $FWDIR/conf/ directory in the context of the specified Domain Management
Server.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CMAFwDir
Description
Returns the full path for the $FWDIR directory in the context of the specified Domain Management Server.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CMAIp
Description
Returns the IPv4 address of the Domain Management Server specified by its name.
In addition, see the "$MDSVERUTIL MDSIp" on page 771 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMAIp6
Description
Returns the IPv6 address of the Domain Management Server specified by its name.
In addition, see the "$MDSVERUTIL MDSIp6" on page 772 command.
Syntax
Parameters
Parameter Description
$MDSVERUTIL CMALogExporterDir
Description
Returns the full path for the $EXPORTERDIR directory in the context of the specified Domain Management
Server.
In addition, see the "$MDSVERUTIL MDSLogExporterDir" on page 773 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMALogIndexerDir
Description
Returns the full path for the $INDEXERDIR directory in the context of the specified Domain Management
Server.
In addition, see the "$MDSVERUTIL MDSLogIndexerDir" on page 774 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMANameByFwDir
Description
Returns the name of the Domain Management Server based on the context of the current $FWDIR
directory.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMANameByIp
Description
Returns the name of the Domain Management Server based on the specified IPv4 address.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMARegistryDir
Description
Returns the full path for the $CPDIR/registry/ directory in the context of the specified Domain
Management Server.
In addition, see the "$MDSVERUTIL MDSRegistryDir" on page 776 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMAReporterDir
Description
Returns the full path for the $RTDIR directory in the context of the specified Domain Management Server.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMASmartLogDir
Description
Returns the full path for the $SMARTLOGDIR directory in the context of the specified Domain Management
Server.
In addition, see the "$MDSVERUTIL MDSSmartLogDir" on page 778 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMASvnConfDir
Description
Returns the full path for the $CPDIR/conf/ directory in the context of the specified Domain Management
Server.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMASvnDir
Description
Returns the full path for the $CPDIR directory in the context of the specified Domain Management Server.
In addition, see these commands:
n "$MDSVERUTIL MDSSvnDir" on page 779
n "$MDSVERUTIL MDSVarSvnDir" on page 784
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL ConfDirVersion
Description
Returns the internal Version ID based on the context of the current $FWDIR/conf/ directory.
For information about the internal Version ID, see the "$MDSVERUTIL AllVersions" on page 733
command.
Syntax
Example
$MDSVERUTIL CpdbUpParam
Description
Returns internal version numbers from the internal database.
In addition, see these commands:
n "$MDSVERUTIL MSP" on page 785
n "$MDSVERUTIL SP" on page 792
Syntax
Parameters
Parameter Description
Example 1
Example 2
Example 3
$MDSVERUTIL CPprofileDir
Description
Returns the path to the directory that contains the .CPprofile.sh and the .CPprofile.csh shell
scripts.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CPVer
Description
Returns internal Check Point version number.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CustomersBaseDir
Description
Returns the full path for the $MDSDIR/customers/ directory.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL DiskSpaceFactor
Description
Returns the disk-space factor. The mds_setup command uses this value during an upgrade.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL InstallationLogDir
Description
Returns the full path for directory with all installation logs (/opt/CPInstLog/).
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL IsIPv6Enabled
Description
Returns true, if IPv6 is enabled in Gaia OS.
Returns false, if IPv6 is disabled in Gaia OS.
Syntax
$MDSVERUTIL IsIPv6Enabled
$MDSVERUTIL IsLegalVersion
Description
Returns 0, if the specified internal Version ID is legal.
Returns 1, if the specified internal Version ID is illegal.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL IsOsSupportsIPv6
Description
Returns true, if the OS supports IPv6.
Returns false, if the OS does not support IPv6.
Syntax
$MDSVERUTIL IsOsSupportsIPv6
$MDSVERUTIL LatestVersion
Description
Returns the internal Version ID of the latest installed version.
Syntax
$MDSVERUTIL LatestVersion
Example
$MDSVERUTIL MDSAddonDir
Description
Returns the path to the Management Addon directory in the MDS context.
In addition, see the "$MDSVERUTIL CMAAddonDir" on page 736 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL MDSCompDir
Description
Returns the full path for the specified Backward Compatibility Package in the MDS context.
In addition, see these commands:
n "$MDSVERUTIL CMACompDir" on page 737
n "$MDSVERUTIL MDSVarCompDir" on page 780
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL MDSDir
Description
Returns the full path in the /opt/ directory to the $MDSDIR directory.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSFgDir
Description
Returns the full path for the $FGDIR directory in the MDS context.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSFwbcDir
Note - R80.40 does not support UTM-1 Edge and Safe@Office devices. The
information about this command is provided only to describe the existing syntax option
until it is removed completely.
Description
Returns the full path in the /opt/ directory (in the MDS context) for the Backward Compatibility directory
for UTM-1 Edge devices.
This Backward Compatibility directory contains the applicable files to install policy on UTM-1 Edge devices.
In addition, see the "$MDSVERUTIL MDSVarFwbcDir" on page 782 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSFwDir
Description
Returns the full path in the /opt/ directory for the $FWDIR directory in the MDS context.
In addition, see these commands:
n "$MDSVERUTIL MDSVarFwDir" on page 783
n "$MDSVERUTIL CMAFwDir" on page 742
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSIp
Description
Returns the IPv4 address of Multi-Domain Server.
In addition, see the "$MDSVERUTIL CMAIp" on page 743 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL MDSIp6
Description
Returns the IPv6 address of Multi-Domain Server.
In addition, see the "$MDSVERUTIL CMAIp6" on page 744 command.
Syntax
Parameters
Parameter Description
$MDSVERUTIL MDSLogExporterDir
Description
Returns the full path for the $EXPORTERDIR directory in the MDS context.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSLogIndexerDir
Description
Returns the full path for the $INDEXERDIR directory in the MDS context.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSPkgName
Description
Returns the name of the MDS software package.
In addition, see the "$MDSVERUTIL SVNPkgName" on page 793 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSRegistryDir
Description
Returns the full path for the $CPDIR/registry/ directory in the MDS context.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSReporterDir
Description
Returns the full path for the $RTDIR directory in the MDS context.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSSmartLogDir
Description
Returns the full path for the $SMARTLOGDIR directory in the MDS context.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSSvnDir
Description
Returns the full path in the /opt/ directory for the $CPDIR directory in the MDS context.
In addition, see these commands:
n "$MDSVERUTIL CMASvnDir" on page 753
n "$MDSVERUTIL MDSVarSvnDir" on page 784
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSVarCompDir
Description
Returns the full path in the /var/opt/ directory for the specified Backward Compatibility Package in the
MDS context.
In addition, see these commands:
n "$MDSVERUTIL CMACompDir" on page 737
n "$MDSVERUTIL MDSCompDir" on page 766
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL MDSVarDir
Description
Returns the full path in the /var/opt/ directory to the $MDSDIR directory.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSVarFwbcDir
Note - R80.40 does not support UTM-1 Edge and Safe@Office devices. The
information about this command is provided only to describe the existing syntax option
until it is removed completely.
Description
Returns the full path in the /var/opt/ directory (in the MDS context) for the Backward Compatibility
directory for UTM-1 Edge devices.
This Backward Compatibility directory contains the applicable files to install policy on UTM-1 Edge devices.
In addition, see the "$MDSVERUTIL MDSFwbcDir" on page 769 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSVarFwDir
Description
Returns the full path in the /var/opt/ directory for the $FWDIR directory in the MDS context.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSVarSvnDir
Description
Returns the full path in the /var/opt/ directory for the $CPDIR directory in the MDS context.
In addition, see these commands:
n "$MDSVERUTIL CMASvnDir" on page 753
n "$MDSVERUTIL MDSSvnDir" on page 779
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MSP
Description
Returns the Minor Service Pack version.
In addition, see these commands:
n "$MDSVERUTIL SP" on page 792
n "$MDSVERUTIL CpdbUpParam" on page 755
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL OfficialName
Description
Returns the official version name.
In addition, see the "$MDSVERUTIL ShortOfficialName" on page 790 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
Example 3
$MDSVERUTIL OptionPack
Description
Returns the internal Option Pack version.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL ProductName
Description
Returns the official name of the Multi-Domain Server product.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL RegistryCurrentVer
Description
Returns the current internal version of Check Point Registry.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL ShortOfficialName
Description
Returns the short (without spaces) official version name.
In addition, see the "$MDSVERUTIL OfficialName" on page 786 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL SmartCenterPuvUpgradeParam
Description
Returns the version to the Pre-Upgrade Verifier (PUV) in order for it to upgrade to that version.
Syntax
Parameters
Parameter Description
Example 1
Example 2
Example 3
[Expert@MDS:0]# $MDSVERUTIL SmartCenterPuvUpgradeParam -v VID_65
NGX_R65
[Expert@MDS:0]#
$MDSVERUTIL SP
Description
Returns the Service Pack version.
In addition, see these commands:
n "$MDSVERUTIL MSP" on page 785
n "$MDSVERUTIL CpdbUpParam" on page 755
Syntax
Parameters
Parameter Description
Example 1
[Expert@MDS:0]# $MDSVERUTIL SP
4
[Expert@MDS:0]#
Example 2
$MDSVERUTIL SVNPkgName
Description
Returns the name of the Secure Virtual Network (SVN) package. Applies to versions NGX R60 and above.
In addition, see the "$MDSVERUTIL MDSPkgName" on page 775 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL SvrDirectory
Description
Returns the full path for the SmartReporter directory.
Syntax
Parameters
Parameter Description
$MDSVERUTIL SvrParam
Description
Returns the SmartReporter version.
Syntax
Parameters
Parameter Description
4. Connect with SmartConsole to the new Domain Management Server to configure the applicable
settings.
SmartProvisioning Commands
For more information about SmartProvisioning, see the R80.40 SmartProvisioning Administration Guide.
In addition, see Security Management Server Commands.
API
You can configure and control the Management Server through API Requests you send to the API Server
that runs on the Management Server.
The API Server runs scripts that automate daily tasks and integrate the Check Point solutions with third
party systems such as virtualization servers, ticketing systems, and change management systems.
API Tools
You can use these tools to run API scripts on the Management Server:
n Standalone management tool, included with SmartConsole. You can copy this tool to computers that
run Windows or Gaia operating system.
l mgmt_cli.exe (for Windows operating system)
l mgmt_cli (for Gaia operating system)
n Web Services API that allow communication and data exchange between the clients and the
Management Server over the HTTP protocol.
These also let other Check Point processes communicate with the Management Server over the
HTTPS protocol.
To learn more about the management APIs, to see code samples, and to take advantage of user forums,
see:
n The Check Point Management API Reference.
n The Developers Network section of Check Point CheckMates Community.
Select Automatic start to automatically start the API server when you start or reboot the
Management Server.
Notes:
n If the Management Server has more than 4GB of RAM installed, the
Automatic start option is activated by default during Management
Server installation.
n If the Management Server has less than 4GB of RAM, the Automatic
Start option is deactivated.
Select one of these options to configure which clients can connect to the API Server:
n Management server only - Only the Management Server itself can connect to the API
Server. This option only lets you use the mgmt_cli utility to send API requests. You
cannot use SmartConsole or web services to send API requests.
n All IP addresses that can be used for GUI clients - You can send API requests from all
IP addresses that are defined as Trusted Clients in SmartConsole. This includes requests
from SmartConsole, Web services and the mgmt_cli utility.
n All IP addresses - You can send API requests from all IP addresses. This includes
requests from SmartConsole, Web services and the mgmt_cli utility.
api restart
Note - On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server.
Notes:
n LSMcli can run from hosts other than SmartConsole clients. Make sure to define
the hosts, from which you run the LSMcli as GUI clients.
n The first time you run the LSMcli from a client, it shows the Management
Server's fingerprint. Confirm the fingerprint.
n In the LSMcli, commands can use the abbreviation ROBO (Remote
Office/Branch Office) gateways.
In SmartProvisioning GUI, these gateways are called SmartLSM Security
Gateways.
Syntax
Parameters
Parameter Description
<Mgmt Specifies the Security Management Server or Domain Management Server by its
Server> Name or IPv4 address.
<Username> Specifies the username used in the standard Check Point authentication method.
<Password> Specifies the password used in the standard Check Point authentication method.
<Action> Specifies the function performed (see the next sub-sections for a complete list of
actions).
Syntax Notation
Square brackets ([ ]) are used in the LSMcli utility syntax. These brackets are correct and syntactically
necessary.
This is an example of how they are used:
n A [b [c]] - means that for parameter A, you can provide b. If you provide b, you can provide c .
n A [b] [c] - means that for parameter A, you can provide b, c , or b and c .
n A [b c] - means that for parameter A, you can provide b and c .
Syntax
Parameters
Parameter Description
Parameter Description
Example 1
This command adds a new SmartLSM Security GatewayMyRoboand assigns it the specified SmartLSM
Security Profile AnyProfile.
A SIC password and an IP address are supplied, so the SIC Activation Key can be sent to the new
SmartLSM Security Gateway.
A Dynamic Object called FirstDO is resolved to an IP address for this Security Gateway.
Example 2
Syntax
Parameters
Parameter Description
<Mgmt Server> Name or IP address of the Security Management Server or Domain Management
Server.
< Name of the already defined SmartLSM Security Gateway that is to participate in
OtherROBOName the Cluster with the newly created Security Gateway (if the "-RoboCluster"
> argument is provided).
Parameter Description
-KeepDOs Keeps all existing dynamic objects in the dynamic objects list when you add new
dynamic objects.
If a dynamic object already exists in the list, its IP resolution is updated.
If this flag is not specified, the dynamic objects list is deleted when you use the
LSMcli command to add new dynamic objects.
Example
This example resolves Dynamic Objects for the given Security Gateway.
LSMcli ModifyROBOManualVPNDomain
Description
This command modifies the SmartLSM VPN Domain, to take effect when the VPN Domain becomes
defined as Manual.
Syntax
Parameters
Parameter Description
- Optional.
IfOverlappingIPRangesDetected
Determines the course of action, if overlapping IP address
ranges are detected: exit, ignore, or show a warning.
Example 1
Example 2
Syntax
Parameters
Parameter Description
Example
Syntax
Parameters
Parameter Description
- Optional.
IfOverlappingIPRangesDetected
Determines the course of action, if overlapping IP address
ranges are detected: exit, ignore, or show a warning.
Example
Syntax
Parameters
Parameter Description
Example
Syntax
Parameters
Parameter Description
Example
LSMcli ExportIke
Description
This command exports the IKE Certificate into a P12 file(encrypted with a provided password) from
SmartLSM Security Gateway, SmartLSM Cluster, or SmartLSM Cluster Member.
The default location of the exported file is the $FWDIR/conf/ directory.
Syntax
Parameters
Parameter Description
< Name of the SmartLSM Security Gateway, SmartLSM Cluster, or SmartLSM Cluster
RoboName Member, whose certificate is exported.
>
Example
LSMcli ResetIke
Description
This command resets the IKE Certificate of a SmartLSM Security Gateway, SmartLSM Cluster, or
SmartLSM Cluster Member.
This action revokes the existing IKE certificate and creates a new one.
Syntax
Parameters
Parameter Description
<CaName> Name of the Trusted CA object (created from SmartConsole) the IKE
certificate request is sent to this CA.
Example
LSMcli Remove
Description
This command deletes a SmartLSM Security Gateway.
This action revokes all the certificates used by the SmartLSM Security Gateway, releases all the licenses
and, finally, removes the SmartLSM Security Gateway.
Syntax
Parameters
Parameter Description
Example
LSMcli ResetSic
Description
This command resets the SIC Certificate of a SmartLSM Security Gateway or SmartLSM Cluster Member.
This action revokes the Security Gateway's SIC certificate and creates a new one with the one-time
password provided by the user.
If an IP address is supplied for the SmartLSM Security Gateway, the SIC certificate is pushed to the
SmartLSM Security Gateway, in which case the SmartLSM Security Gateway SIC one-time password must
be initialized first.
Otherwise, if no IP address is given, the SIC certificate is later pulled from the SmartLSM Security
Gateway.
Syntax
Parameters
Parameter Description
<Mgmt Server> Name or IP address of the Security Management Server or Domain Management
Server.
< One-time password for the Secure Internal Communications with the SmartLSM
ActivationKey Security Gateway.
>
<IPAddress> IP address of Security Gateway (for this action, the certificate is pushed to the
Security Gateway).
Example 1
Example 2
LSMcli Show
Description
This command displays a list of existing Security Gateways.
Syntax
Parameters
Parameter Description
-F=< You can use these flags to filter the printed information:
FilterFlags
> n b - ID
n c - Cluster ID
n d - List of Dynamic Objects assigned to this SmartLSM Security Gateways
n g - Gateway status
n i - IP address
n k - IKE DN
n l - Policy status
n n - Name
n p - SmartLSM Security Profile
n s - SIC DN
n t - Type
n v - Version
Note - To specify more than one filter flag, write them together. Example: -F=bn
Example 1
Example 2
LSMcli ShowROBOTopology
Description
This command displays the Topology information of the SmartLSM Security Gateway.
It lists the defined Interfaces and their respective IP Addresses and Network Masks, and the VPN Domain
configuration.
You can use the indexes of the manually defined VPN domain IP address ranges, on the displayed list,
when you request to delete a range, with the "LSMcli ModifyROBOManualVPNDomain" on page 807
command.
Syntax
Parameters
Parameter Description
Example
LSMcli UpdateCO
Description
This command updates a Corporate Office (CO) Security Gateway.
This action updates the CO Security Gateway with up-to-date available information about the VPN
Domains of the SmartLSM Security Gateways.
Perform this action after you add a new SmartLSM Security Gateway to enable the CO gateway to initiate a
VPN tunnel to the new SmartLSM Security Gateway.
Alternatively, you can Install Policy on the CO gateway to obtain updated VPN Domain information.
Syntax
Parameters
Parameter Description
Example
SmartUpdate Actions
This section describes commands that perform SmartUpdate actions on SmartLSM Gateways.
Before you can install software on gateways, you must first load it to the Security Management Server.
Best Practice - Run the "LSMcli VerifyInstall" on page 825 command to make sure
that the software is compatible.
LSMcli Install
Description
This command installs the specified software on the SmartLSM Security Gateway or SmartLSM Cluster
Member.
Note - Before you can install software on SmartLSM Security Gateways, you must first
load it to the Security Management Server.
Best Practice - Run the "LSMcli VerifyInstall" on page 825 command to make sure
that the software is compatible.
Syntax
Parameters
Parameter Description
- Optional.
DoNotDistribute
Install previously distributed packages.
Example
LSMcli mySrvr name pass Install MyRobo firewall checkpoint NG_AI fcs -
P=AnyProfile -boot
LSMcli Uninstall
Description
This command uninstalls the specified package from the SmartLSM Security Gateway or SmartLSM
Cluster Member.
You can use the "LSMcli ShowInfo" on page 829 command to see what products are installed on the
SmartLSM Security Gateway.
Syntax
Parameters
Parameter Description
Example
LSMcli mySrvr name pass Uninstall MyRobo firewall checkpoint NG_AI fcs
-boot
LSMcli Distribute
Description
This command distributes a package from the Repository to the SmartLSM Security Gateway or
SmartLSM Cluster Member, but does not install it.
Syntax
Parameters
Parameter Description
Example
LSMcli mySrvr name pass Distribute MyRobo fw1 checkpoint NG_AI R54
LSMcli VerifyInstall
Description
This command makes sure that the software is compatible to install on the SmartLSM Security Gateway or
SmartLSM Cluster Member.
Best Practice - Run this command before you install the software on the SmartLSM
Security Gateway.
Syntax
Parameters
Parameter Description
Example
LSMcli VerifyUpgrade
Description
This command verifies if you can upgrade a selected software on the SmartLSM Security Gateway or
SmartLSM Cluster Member.
Best Practice - Run this command before you run the "LSMcli Upgrade" on page 827
command.
Syntax
Parameters
Parameter Description
Example
LSMcli Upgrade
Description
This command upgrades all the (appropriate) available software packages on the SmartLSM Security
Gateway or SmartLSM Cluster Member.
Best Practice - Run the "LSMcli VerifyUpgrade" on page 826 command before you
run this command.
Syntax
Parameters
Parameter Description
boot Reboot the SmartLSM Security Gateway after the installation is finished.
Example
LSMcli GetInfo
Description
This command collects product information from the SmartLSM Security Gateway or SmartLSM Cluster
Member.
Important - If you upgrade any package manually instead of using SmartUpdate, you
must run this command before you run the "LSMcli ShowInfo" on page 829 command.
Syntax
Parameters
Parameter Description
Example
LSMcli ShowInfo
Description
This command displays product information for the list of the products installed on the SmartLSM Security
Gateway or SmartLSM Cluster Member.
Important - Before you run this command, run the "LSMcli GetInfo" on page 828
command to make sure the information is up-to-date.
Syntax
Parameters
Parameter Description
Example
LSMcli ShowRepository
Description
This command shows the list of the available products on the Management Server.
Use SmartUpdate to manage the products, load new products, remove products, and so on.
Syntax
Parameters
Parameter Description
Example
LSMcli Stop
Description
This command stops Security Gateway services on the selected gateway.
Notes:
n The CPRID services must run on the selected gateway. See "cprid" on
page 175.
n This command supports Security Gateways, SmartLSM Security Gateways, and
SmartLSM Cluster Members.
Syntax
Parameters
Parameter Description
Example
LSMcli Start
Description
This command starts Security Gateway services on the selected gateway.
Notes:
n The CPRID services must run on the selected gateway. See "cprid" on
page 175.
n This command supports Security Gateways, SmartLSM Security Gateways, and
SmartLSM Cluster Members.
Syntax
Parameters
Parameter Description
Example
LSMcli Restart
Description
This command restarts Security Gateway services on the selected gateway.
Notes:
n The CPRID services must run on the selected gateway. See "cprid" on
page 175.
n This command supports Security Gateways, SmartLSM Security Gateways, and
SmartLSM Cluster Members.
Syntax
Parameters
Parameter Description
Example
LSMcli Reboot
Description
This command reboots the selected gateway.
Notes:
n The CPRID services must run on the selected gateway. See "cprid" on
page 175.
n This command supports Security Gateways, SmartLSM Security Gateways, and
SmartLSM Cluster Members.
Syntax
Parameters
Parameter Description
Example
LSMcli PushPolicy
Description
This command pushes a policy to the selected gateway.
Notes:
n The CPRID services must run on the selected gateway. See "cprid" on
page 175.
n This command supports Security Gateways, SmartLSM Security Gateways, and
SmartLSM Clusters.
Syntax
Parameters
Parameter Description
Example
LSMcli PushDOs
Description
This command updates a Dynamic Object's information on the SmartLSM Security Gateway or SmartLSM
Cluster Member.
Note - This command does not remove/release the IP address range for the deleted
Dynamic Object, but only adds new ones. To overcome this difficulty, run the "LSMcli
PushPolicy" on page 836 command.
Syntax
Parameters
Parameter Description
Example
LSMcli GetStatus
Description
This command fetches various statistics from the selected gateway.
Note - This command supports Security Gateways, SmartLSM Security Gateways, and
Gateway or SmartLSM Cluster Members.
Syntax
Parameters
Parameter Description
Example
Syntax
Parameters
Parameter Description
LSMenabler -r off
LSMenabler on
Example 1
Example 2
Syntax
Parameters
Parameter Description
<Profile> Assign a different SmartLSM Security Profile (already defined in SmartConsole) after
conversion.
-NoRestart Do not restart Check Point services, on the remote Security Gateway, after convert
operation completed.
Parameter Description
LSMenabler -r on
Example
LSMcli mySrvr name pass Convert Gateway VPN1 MyGW MyProfile -E=eth0 -
I=eth1 -D=eth2 -Force
Syntax
Parameters
Parameters
Parameter Description
Note - When the VPN domain is set to Manual, the IP address ranges are those set in
the SmartProvisioning GUI, or with the "LSMcli ModifyROBOManualVPNDomain" on
page 807 command.
Syntax
Parameters
Parameter Description
Syntax
Parameters
Parameter Description
<Mgmt Server> Name or IP address of the Security Management Server or Domain Management
Server.
-DMZAccess Specifies whether this interfaces leads to DMZ (true), or not (false).
Parameter Description
-AllowedGroup If Anti-Spoofing is performed, specifies the Network Group object, from which
packets are not checked.
n If "-TopologyType=external", this parameter defines a group, from
which packets are not checked if Anti-Spoofing is performed
n If "-TopologyType=internal", this parameter explicitly defines the
networks behind the internal interface.
Notes:
n If there is a set override value, and you want to change it, then use only the
"LSMcli ModifyClusterSubnetOverride VPN1Cluster" on page 853 command.
n If the override value you want to set is not defined (except at the Profile level),
because it was never defined or because it was deleted, then use only this
"AddClusterSubnetOverride" command.
n To cancel a value and return to the value set by the Profile, use the "LSMcli
DeleteClusterSubnetOverride VPN1Cluster" on page 855 command.
n To define overrides for a private (monitored or non-monitored) interface, use
one of these commands:
l "LSMcli AddPrivateSubnetOverride VPN1ClusterMember" on page 857
l "LSMcli ModifyPrivateSubnetOverride VPN1ClusterMember" on
page 859
l "LSMcli DeletePrivateSubnetOverride VPN1ClusterMember" on
page 861
Syntax
n "-MNet"
n "-CIP" and "-CNetMask"
Parameters
Parameter Description
Notes:
n If there is a set override value, and you want to change it, then use only this
"ModifyClusterSubnetOverride" command.
n If the override value you want to set is not defined (except at the Profile level),
because it was never defined or because it was deleted, then use only the
"LSMcli AddClusterSubnetOverride VPN1Cluster" on page 851 command.
n To cancel a value and return to the value set by the Profile, use the "LSMcli
DeleteClusterSubnetOverride VPN1Cluster" on page 855 command.
n To define overrides for a private (monitored or non-monitored) interface, use
one of these commands:
l "LSMcli AddPrivateSubnetOverride VPN1ClusterMember" on page 857
l "LSMcli ModifyPrivateSubnetOverride VPN1ClusterMember" on
page 859
l "LSMcli DeletePrivateSubnetOverride VPN1ClusterMember" on
page 861
Syntax
Parameters
Parameter Description
Notes:
n If there is a set override value, and you want to change it, then use only this
"LSMcli ModifyClusterSubnetOverride VPN1Cluster" on page 853 command.
n If the override value you want to set is not defined (except at the Profile level),
because it was never defined or because it was deleted, then use only the
"LSMcli AddClusterSubnetOverride VPN1Cluster" on page 851 command.
n To cancel a value and return to the value set by the Profile, use this
"DeleteClusterSubnetOverride" command.
n To define overrides for a private (monitored or non-monitored) interface, use
one of these commands:
l "LSMcli AddPrivateSubnetOverride VPN1ClusterMember" on page 857
l "LSMcli ModifyPrivateSubnetOverride VPN1ClusterMember" on
page 859
l "LSMcli DeletePrivateSubnetOverride VPN1ClusterMember" on
page 861
Syntax
Parameters
Parameter Description
Notes:
n If there is a set override value, and you want to change it, then use only the
"LSMcli ModifyPrivateSubnetOverride VPN1ClusterMember" on page 859
command.
n If the override value you want to set is not defined (except at the Profile level),
because it was never defined or because it was deleted, then use only this
"AddPrivateSubnetOverride" command.
n To cancel a value and return to the value set by the Profile, use the "LSMcli
DeletePrivateSubnetOverride VPN1ClusterMember" on page 861 command.
n To define overrides for a cluster interface, use one of these commands:
l "LSMcli AddClusterSubnetOverride VPN1Cluster" on page 851
l "LSMcli ModifyClusterSubnetOverride VPN1Cluster" on page 853
l "LSMcli DeleteClusterSubnetOverride VPN1Cluster" on page 855
Syntax
Parameters
Parameter Description
< Name of cluster member private interface, as defined in the Profile topology.
InterfaceName>
Notes:
n If there is a set override value, and you want to change it, then use only the
"ModifyPrivateSubnetOverride" command.
n If the override value you want to set is not defined (except at the Profile level),
because it was never defined or because it was deleted, then use only the
"LSMcli AddPrivateSubnetOverride VPN1ClusterMember" on page 857
command.
n To cancel a value and return to the value set by the Profile, use the "LSMcli
DeletePrivateSubnetOverride VPN1ClusterMember" on page 861 command.
n To define overrides for a cluster interface, use one of these commands:
l "LSMcli AddClusterSubnetOverride VPN1Cluster" on page 851
l "LSMcli ModifyClusterSubnetOverride VPN1Cluster" on page 853
l "LSMcli DeleteClusterSubnetOverride VPN1Cluster" on page 855
Syntax
Parameters
Parameter Description
< Name of cluster member private interface, as defined in the Profile topology.
InterfaceName>
Notes:
n If there is a set override value, and you want to change it, then use only the
"LSMcli ModifyPrivateSubnetOverride VPN1ClusterMember" on page 859
command.
n If the override value you want to set is not defined (except at the Profile level),
because it was never defined or because it was deleted, then use only the
"LSMcli AddPrivateSubnetOverride VPN1ClusterMember" on page 857
command.
n To cancel a value and return to the value set by the Profile, use the
"DeletePrivateSubnetOverride" command.
n To define overrides for a cluster interface, use one of these commands:
l "LSMcli AddClusterSubnetOverride VPN1Cluster" on page 851
l "LSMcli ModifyClusterSubnetOverride VPN1Cluster" on page 853
l "LSMcli DeleteClusterSubnetOverride VPN1Cluster" on page 855
Syntax
Parameters
Parameter Description
< Name of cluster member private interface, as defined in the Profile topology.
InterfaceName>
LSMcli RemoveCluster
Description
This command:
1. Revokes all the certificates used by the SmartLSM cluster and its members.
2. Releases all the licenses.
3. Deletes the SmartLSM cluster and member objects.
Syntax
Parameters
Parameter Description
Syntax
Parameters
Parameter Description
Examples
n To add a 1100 appliance Security Gateway:
Syntax
Parameters
Parameter Description
<SubstitutedName A part of the Profile name to be replaced by the suffix in the previous field.
Part>
Example
To add a 1450 cluster:
For example, change the profile (see "LSMcli ModifyROBO VPN1" on page 805):
l For a 1100 Security Gateway:
n For all other commands on Small Office Appliance clusters, replace the "VPN1Cluster" with the
"CPSG80Cluster", for all appliance types (for example, in "LSMcli ModifyROBO VPN1Cluster" on
page 847).
comp_init_policy
Description
Generates, loads, or removes the Initial Policy on a Security Gateway, or a Cluster Member.
Until the Security Gateway or cluster administrator installs the user-defined Security Policy on the Security
Gateway or Cluster Members for the first time, security is enforced by an Initial Policy.
The Initial Policy operates by adding "implied rules" to the Default Filter.
These rules forbid most of the communication, but allow the communication needed for the installation of
the Security Policy.
The Initial Policy also protects a Security Gateway or Cluster Members in these cases:
n During Check Point product upgrades
n When a SIC certificate is reset on the Security Gateway or Cluster Member
n When Check Point product license expires
The Initial Policy is enforced until a policy is installed, and is never loaded again. In subsequent boots, the
regular policy is loaded immediately after the Default Filter.
Important - In Cluster, you must configure all the Cluster Members in the same way.
Notes:
n You must run this command from the Expert mode.
n The Initial Policy overwrites the user-defined policy.
n Output of the "cpstat -f policy fw" command (see "cpstat" on
page 912) shows the name of this policy as "InitialPolicy".
n Security Gateway, or Cluster Member stores the installed Access Control Policy
in these directories:
l $FWDIR/state/__tmp/FW1/
l $FWDIR/state/local/FW1/
l $FWDIR/state/<Name of Cluster Object>/FW1/
n Refer to these related commands:
l "control_bootsec" on page 874
l "fwboot bootconf" on page 1111
l "fw defaultgen" on page 996
l "fwboot default" on page 1125
Syntax
Parameters
Parameter Description
Example
[Expert@GW:0]# cd $FWDIR/state/local/FW1/
[Expert@GW:0]#
[Expert@GW:0]# pwd
/opt/CPsuite-R80.40/fw1/state/local/FW1
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 7744
-rw-r--r-- 1 admin root 20166 Jun 13 16:34 install_policy_report.txt
-rw-r--r-- 1 admin root 55 Jun 13 16:34 install_policy_report_timing.txt
-rw-r--r-- 1 admin root 37355 Jun 13 16:34 local.Sandbox-persistence.xml
... output was cut for brevity ...
-rw-r--r-- 1 admin root 2278 Jun 13 16:34 local.vsx_cluster_netobj
-rw-r--r-- 1 admin root 5172 Jun 13 16:34 local.{939922F7-DF98-4988-B776-B70B9B8340F3}
-rw-r--r-- 1 admin root 10328 Jun 13 16:34 local.{B9D14722-3936-4B33-814B-F87EA4062BEB}
-rw-r----- 1 admin root 14743 Jun 13 16:34 manifest.C
-rw-r--r-- 1 admin root 7381 Jun 13 16:34 policy.info
-rw-r--r-- 1 admin root 2736 Jun 13 16:34 policy.map
-rw-r--r-- 1 admin root 51 Jun 13 16:34 sig.map
[Expert@GW:0]#
[Expert@GW:0]# comp_init_policy -u
erasing local state..
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 0
[Expert@GW:0]#
[Expert@GW:0]# comp_init_policy -g
initial_module:
Compiled OK.
initial_module:
Compiled OK.
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 56
-rw-rw---- 1 admin root 8 Jul 19 19:51 local.ctlver
-rw-rw---- 1 admin root 4514 Jul 19 19:51 local.fc
-rw-rw---- 1 admin root 4721 Jul 19 19:51 local.fc6
-rw-rw---- 1 admin root 235 Jul 19 19:51 local.ft
-rw-rw---- 1 admin root 317 Jul 19 19:51 local.ft6
-rw-rw---- 1 admin root 135 Jul 19 19:51 local.fwrl.conf
-rw-rw---- 1 admin root 14 Jul 19 19:51 local.ifs
-rw-rw---- 1 admin root 833 Jul 19 19:51 local.inspect.lf
-rw-rw---- 1 admin root 243 Jul 19 19:51 local.lg
-rw-rw---- 1 admin root 243 Jul 19 19:51 local.lg6
-rw-rw---- 1 admin root 0 Jul 19 19:51 local.magic
-rw-rw---- 1 admin root 3 Jul 19 19:51 local.set
-rw-rw---- 1 admin root 51 Jul 19 19:51 sig.map
[Expert@GW:0]#
control_bootsec
Description
Controls the boot security - loading of both the Default Filter policy (defaultfilter) and the Initial
Policy (InitialPolicy) during boot on a Security Gateway, or a Cluster Member.
Warning - If you disable the boot security, you leave your Security Gateway, or a
Cluster Member without any protection during the boot. Before you disable the boot
security, we recommend to disconnect your Security Gateway, or a Cluster Member
from the network completely.
Important - In Cluster, you must configure all the Cluster Members in the same way.
Notes:
n You must run this command from the Expert
mode.
n The changes made with this command survive
reboot.
n Refer to these related commands:
l comp_init_policy
l fwboot bootconf
l fw defaultgen
l fwboot default
Syntax
Parameters
Parameter Description
[Expert@GW:0]# cd $FWDIR/state/local/FW1/
[Expert@GW:0]#
[Expert@GW:0]# pwd
/opt/CPsuite-R80.40/fw1/state/local/FW1
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 7736
-rw-rw---- 1 admin root 11085 Jul 19 20:16 install_policy_report.txt
-rw-rw---- 1 admin root 56 Jul 19 20:16 install_policy_report_timing.txt
-rw-rw---- 1 admin root 37355 Jul 19 20:16 local.Sandbox-persistence.xml
-rw-rw---- 1 admin root 3 Jul 19 20:16 local.ad_query_profiles
... ... ...
-rw-r----- 1 admin root 14743 Jul 19 20:16 manifest.C
-rw-rw---- 1 admin root 7381 Jul 19 20:16 policy.info
-rw-rw---- 1 admin root 2736 Jul 19 20:16 policy.map
-rw-rw---- 1 admin root 51 Jul 19 20:16 sig.map
[Expert@GW:0]#
[Expert@GW:0]# $FWDIR/bin/control_bootsec -r
Disabling boot security
FW-1 will not load a default filter on boot
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 0
[Expert@GW:0]#
[Expert@GW:0]# cd $FWDIR/state/local/FW1/
[Expert@GW:0]#
[Expert@GW:0]# pwd
/opt/CPsuite-R80.40/fw1/state/local/FW1
[Expert@GW:0]#
[Expert@GW:0]# control_bootsec -g
Enabling boot security
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 56
-rw-rw---- 1 admin root 8 Jul 19 20:22 local.ctlver
-rw-rw---- 1 admin root 4514 Jul 19 20:22 local.fc
-rw-rw---- 1 admin root 4721 Jul 19 20:22 local.fc6
-rw-rw---- 1 admin root 235 Jul 19 20:22 local.ft
-rw-rw---- 1 admin root 317 Jul 19 20:22 local.ft6
-rw-rw---- 1 admin root 135 Jul 19 20:22 local.fwrl.conf
-rw-rw---- 1 admin root 14 Jul 19 20:22 local.ifs
-rw-rw---- 1 admin root 833 Jul 19 20:22 local.inspect.lf
-rw-rw---- 1 admin root 243 Jul 19 20:22 local.lg
-rw-rw---- 1 admin root 243 Jul 19 20:22 local.lg6
-rw-rw---- 1 admin root 0 Jul 19 20:22 local.magic
-rw-rw---- 1 admin root 3 Jul 19 20:22 local.set
-rw-rw---- 1 admin root 51 Jul 19 20:22 sig.map
[Expert@GW:0]#
cp_conf
Description
Configures or reconfigures a Check Point product installation.
Note - The available options for each Check Point computer depend on the
configuration and installed products.
cp_conf
-h
admin <options>
auto <options>
ca <options>
client <options>
finger <options>
lic <options>
snmp <options>
cp_conf
-h
adv_routing <options>
auto <options>
corexl <options>
fullha <options>
ha <options>
intfs <options>
lic <options>
sic <options>
snmp <options>
Parameters
Parameter Description
admin Configures Check Point system administrators for the Security Management
<options> Server.
See "cp_conf admin" on page 88.
adv_routing Enables or disables the Advanced Routing feature on this Security Gateway.
<options>
Important - Do not use these outdated commands. To configure
Advanced Routing, see the R80.40 Gaia Advanced Routing
Administration Guide.
auto <options> Shows and configures the automatic start of Check Point products during boot.
See "cp_conf auto" on page 91.
ca <options> n Configures the Certificate Authority's (CA) Fully Qualified Domain Name
(FQDN).
n Initializes the Internal Certificate Authority (ICA).
client Configures the GUI clients that can use SmartConsole to connect to the
<options> Security Management Server.
See "cp_conf client" on page 95.
intfs Sets the topology of interfaces on a Security Gateway, which you manage with
<options> SmartProvisioning.
See "cp_conf intfs" on page 887.
Parameter Description
cp_conf auto
Description
Shows and controls which of Check Point products start automatically during boot.
Note - This command corresponds to the option Automatic start of Check Point
Products in the "cpconfig" on page 133 menu.
Syntax
cp_conf auto
-h
{enable | disable} <Product1> <Product2> ...
get all
Parameters
Parameter Description
{enable | disable} <Product1> Controls whether the installed Check Point products start
<Product2> ... automatically during boot.
This command is for Check Point use only.
[Expert@MGMT:0]#
[Expert@GW:0]#
cp_conf corexl
Description
Enables or disables CoreXL.
For more information, see the R80.40 Performance Tuning Administration Guide.
Important:
n This command is for Check Point use only.
To configure CoreXL, use the Check Point CoreXL option in the "cpconfig" on page 892
menu.
n After all changes in CoreXL configuration on the Security Gateway, you must reboot it.
n In Custer, you must configure all the Cluster Members in the same way.
Syntax
n To enable CoreXL with 'n' IPv4 Firewall instances and optionally 'k' IPv6 Firewall instances:
n To disable CoreXL:
Parameters
Parameter Description
Example
Currently, the Security Gateway runs two IP4v CoreXL Firewall instances (KERN_INSTANCE_NUM = 2).
We change the number of IP4v CoreXL Firewall instances to three.
cp_conf fullha
Description
Manages the state of the Full High Availability Cluster:
n Enables the Full High Availability Cluster
n Disables the Full High Availability Cluster
n Deletes the Full High Availability peer
n Shows the Full High Availability state
Important - To configure a Full High Availability cluster, follow the R80.40 Installation
and Upgrade Guide.
Syntax
cp_conf fullha
enable
del_peer
disable
state
Parameters
Parameter Description
del_peer Deletes the Full High Availability peer from the configuration.
Example
cp_conf ha
Description
Enables or disables cluster membership on this Security Gateway.
Important - This command is for Check Point use only. To configure cluster
membership, you must use the "cpconfig" on page 892 command.
For more information, see the R80.40 ClusterXL Administration Guide.
Syntax
Parameters
Parameter Description
norestart Optional: Specifies to apply the configuration change without the restart of Check Point
services. The new configuration takes effect only after reboot.
Example 1 - Enable the cluster membership without restart of Check Point services
[Expert@MyGW:0]#
Example 2 - Disable the cluster membership without restart of Check Point services
[Expert@MyGW:0]#
cp_conf intfs
Description
Sets the topology of interfaces on a Security Gateway, which you manage with SmartProvisioning.
For more information, see the R80.40 SmartProvisioning Administration Guide.
Syntax
cp_conf intfs
get
set
auxiliary <Name of Interface>
DMZ <Name of Interface>
external <Name of Interface>
internal <Name of Interface>
Parameters
Parameter Description
cp_conf lic
Description
Shows, adds and deletes Check Point licenses.
Note - This command corresponds to the option Licenses and contracts in the
"cpconfig" on page 133 menu.
Note:
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Syntax
cp_conf lic
-h
add -f <Full Path to License File>
add -m <Host> <Date> <Signature Key> <SKU/Features>
del <Signature Key>
get [-x]
Parameters
Parameter Description
add -f <Full Path to License Adds a license from the specified Check Point license
File> file.
You get this license file in the Check Point User Center.
This is the same command as the "cplic db_add" on
page 144.
cp_conf sic
Description
Manages SIC on the Security Gateway.
For additional information, see sk65764: How to reset SIC.
Syntax
cp_conf
-h
sic
cert_pull <Management Server> <DAIP GW object>
init <Activation Key> [norestart]
state
Parameters
Parameter Description
cert_pull <Management For DAIP Security Gateways, pulls a SIC certificate from the
Server> <DAIP GW specified Management Server for the specified DAIP Security
object> Gateway:
n <Management Server> - IPv4 address or HostName of the
Security Management Server or Domain Management
Server
n <DAIP GW object> - Name of the DAIP Security Gateway
object as configured in SmartConsole
Example
[Expert@MyGW:0]#
cpconfig
Description
This command starts the Check Point Configuration Tool.
This tool lets you configure specific settings for the installed Check Point products.
Important - In Cluster, you must configure all the Cluster Members in the same way.
Syntax
cpconfig
Menu Options
Note - The options shown depend on the configuration and installed products.
Licenses and contracts Manages Check Point licenses and contracts on this Security
Gateway or Cluster Member.
Random Pool Configures the RSA keys, to be used by Gaia Operating System.
Secure Internal Communication Manages SIC on the Security Gateway or Cluster Member.
This change requires a restart of Check Point services on the
Security Gateway or Cluster Member.
For more information, see:
n The R80.40 Security Management Administration Guide.
n sk65764: How to reset SIC.
Enable cluster membership for Enables the cluster membership on the Security Gateway.
this gateway
This change requires a reboot of the Security Gateway.
For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Disable cluster membership for Disables the cluster membership on the Security Gateway.
this gateway
This change requires a reboot of the Security Gateway.
For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Enable Check Point Per Virtual Enables Virtual System Load Sharing on the VSX Cluster
System State Member.
For more information, see the R80.40 VSX Administration Guide.
Disable Check Point Per Virtual Disables Virtual System Load Sharing on the VSX Cluster
System State Member.
For more information, see the R80.40 VSX Administration Guide.
Enable Check Point ClusterXL Enables Check Point ClusterXL for Bridge mode.
for Bridge Active/Standby
This change requires a reboot of the Cluster Member.
For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Disable Check Point ClusterXL Disables Check Point ClusterXL for Bridge mode.
for Bridge Active/Standby
This change requires a reboot of the Cluster Member.
For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Check Point CoreXL Manages CoreXL on the Security Gateway or Cluster Member.
After all changes in CoreXL configuration, you must reboot the
Security Gateway or Cluster Member.
For more information, see the R80.40 Performance Tuning
Administration Guide.
Automatic start of Check Point Shows and controls which of the installed Check Point products
Products start automatically during boot.
[Expert@MySingleGW:0]# cpconfig
This program will let you re-configure
your Check Point products configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) SNMP Extension
(3) PKCS#11 Token
(4) Random Pool
(5) Secure Internal Communication
(6) Enable cluster membership for this gateway
(7) Check Point CoreXL
(8) Automatic start of Check Point Products
(9) Exit
[Expert@MyClusterMember:0]# cpconfig
This program will let you re-configure
your Check Point products configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) SNMP Extension
(3) PKCS#11 Token
(4) Random Pool
(5) Secure Internal Communication
(6) Disable cluster membership for this gateway
(7) Enable Check Point Per Virtual System State
(8) Enable Check Point ClusterXL for Bridge Active/Standby
(9) Check Point CoreXL
(10) Automatic start of Check Point Products
(11) Exit
cpinfo
Description
A utility that collects diagnostics data on your Check Point computer at the time of execution.
It is mandatory to collect these data when you contact Check Point Support about an issue on your Check
Point computer.
For more information, see sk92739.
cplic
Description
The cplic command lets you manage Check Point licenses.
You can run this command in Gaia Clish or in the Expert Mode.
License Management is divided into three types of commands:
Licensing
Applies To Description
Commands
Local Management You execute these commands locally on the Check Point computers.
licensing Servers,
commands
Security
Gateways and
Cluster
Members
Remote Management You execute these commands on the Security Management Server or
licensing Servers only Domain Management Server. These changes affect the managed
commands Security Gateways and Cluster Members.
License Management You execute these commands on the Security Management Server or
Repository Servers only Domain Management Server. These changes affect the licenses
commands stored in the local license repository.
For more about managing licenses, see the R80.40 Security Management Administration Guide.
cplic [-d]
{-h | -help}
check <options>
contract <options>
del <options>
print <options>
put <options>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
check Confirms that the license includes the feature on the local Security Gateway or
<options> Security Management Server.
See "cplic check" on page 898.
contract Manages (deletes and installs) the Check Point Service Contract on the local
<options> Check Point computer.
See "cplic contract" on page 900.
del <options> Deletes a Check Point license on a host, including unwanted evaluation, expired,
and other licenses.
See "cplic del" on page 902.
print Prints details of the installed Check Point licenses on the local Check Point
<options> computer.
See "cplic print" on page 903.
cplic check
Description
Confirms that the license includes the feature on the local Security Gateway or Management Server. See
sk66245.
Syntax
cplic [-d] check [-p <Product>] [-v <Version>] [{-c | -count}] [-t
<Date>] [{-r | -routers}] [{-S | -SRusers}] <Feature>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
Parameter Description
cplic contract
Description
Deletes the Check Point Service Contract on the local Check Point computer.
Installs the Check Point Service Contract on the local Check Point computer.
Note
n For more information about Service Contract files, see sk33089: What is a
Service Contract File?
n If you install a Service Contract on a managed Security Gateway / Cluster
Member, you must update the license repository on the applicable Management
Server - either with the "cplic get" on page 151 command, or in SmartUpdate.
Syntax
cplic contract -h
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.
cplic del
Description
Deletes a Check Point license on a host, including unwanted evaluation, expired, and other licenses.
This command can delete a license on both local computer, and on remote managed computers.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
<Object Name> The name of the Security Gateway / Cluster Member object as defined in
SmartConsole.
cplic print
Description
Prints details of the installed Check Point licenses on the local Check Point computer.
Note - On a Security Gateway / Cluster Member, this command prints all installed
licenses (both Local and Central).
Syntax
Parameters
Parameter Description
Example 1
Example 2
cplic put
Description
Installs one or more Local licenses on a Check Point computer.
Note - You get the license details in the Check Point User Center.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
{-o | - On a Security Gateway / Cluster Member, this command erases only the local
overwrite} licenses, but not central licenses that are installed remotely.
{-c | - Verifies the license. Checks if the IP of the license matches the Check Point
check-only} computer and if the signature is valid.
{-s | - Selects only the local license whose IP address matches the IP address of the
select} Check Point computer.
{-P | -Pre- Use this option after you have upgraded and before you reboot the Check Point
boot} computer.
Use of this option will prevent certain error messages.
Parameter Description
<Host> Hostname or IP address of the Security Gateway / Cluster Member for a local
license.
Hostname or IP address of the Security Management Server / Domain
Management Server for a central license.
< The SKU of the license summarizes the features included in the license.
SKU/Features
For example: CPSUITE-EVAL-3DES-vNG
>
Copy and paste the parameters from the license received from the User Center:
Parameter Description
SKU/features A string listing the SKU and the Certificate Key of the license.
The SKU of the license summarizes the features included in the license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab
Example
cpprod_util
Description
This utility lets you work with Check Point Registry ($CPDIR/registry/HKLM_registry.data)
without manually opening it:
n Shows which Check Point products and features are enabled on this Check Point computer.
n Enables and disables Check Point products and features on this Check Point computer.
Syntax
cpprod_util -dump
Parameters
Parameter Description
"< Specifies the configuration parameter for the specified product or feature.
Parameter
>"
"<Value>" Specifies the value of the configuration parameter for the specified product or feature:
Notes
n On a Multi-Domain Server, you must run this command in the context of the relevant Domain
Management Server.
n If you run the cpprod_util command without parameters, it prints:
l The list of all available products and features (for example, "FwIsFirewallMgmt",
"FwIsLogServer", "FwIsStandAlone")
l The type of the expected argument when you configure a product or feature ("no-
parameter", "string-parameter", or "integer-parameter")
l The type of the returned output ("status-output", or "no-output")
n To redirect the output of the cpprod_util command, you need to redirect the stderr to stdout:
Example:
Examples
Example - Showing a list of all installed Check Point Products Packages on a Management
Server
[Expert@MGMT:0]# cpprod_util CPPROD_GetInstalledProducts
CPFC
IDA
MGMT
FW1
SecurePlatform
NGXCMP
EdgeCmp
SFWCMP
SFWR75CMP
SFWR77CMP
FLICMP
R75CMP
R7520CMP
R7540CMP
R76CMP
R77CMP
PROVIDER-1
Reporting Module
SmartLog
CPinfo
VSEC
DIAG
[Expert@MGMT:0]#
Example - Checking if this Check Point computer is configured as a dedicated Log Server
[Expert@MGMT:0]# cpprod_util FwIsLogServer
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the SmartEvent Server blade is enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerServer
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the SmartEvent Correlation Unit blade
is enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerCorrelationUnit
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the Endpoint Policy Management blade
is enabled
[Expert@MGMT:0]# cpprod_util UepmIsInstalled
1
[Expert@MGMT:0]#
Example - Showing a list of all installed Check Point Products Packages on a Security
Gateway
[Expert@MyGW:0]# cpprod_util CPPROD_GetInstalledProducts
CPFC
IDA
MGMT
FW1
SecurePlatform
CPinfo
DIAG
PPACK
CVPN
[Expert@MyGW:0]#
cpstart
Description
Manually starts all Check Point processes and applications.
Syntax
Parameters
Important - These parameters are for Check Point internal use. Do not use them,
unless explicitly instructed by Check Point Support or R&D to do so.
Parameter Description
-fwflag - Starts Check Point processes and loads the Default Filter policy
default (defaultfilter).
cpstat
Description
Displays the status and statistics information of Check Point applications.
Syntax
cpstat [-d] [-h <Host>] [-p <Port>] [-s <SICname>] [-f <Flavor>] [-o
<Polling Interval> [-c <Count>] [-e <Period>]] <Application Flag>
Note - You can write the parameters in the syntax in any order.
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
The output shows the SNMP queries and SNMP responses for the applicable SNMP
OIDs.
-h <Host> Optional.
When you run this command on a Management Server, this parameter specifies the
managed Security Gateway.
<Host> is an IPv4 address, a resolvable hostname, or a DAIP object name.
The default is localhost.
-p <Port> Optional.
Port number of the Application Monitoring (AMON) server.
The default port is 18192.
-s Optional.
<SICname>
Secure Internal Communication (SIC) name of the Application Monitoring (AMON)
server.
Parameter Description
-f <Flavor> Optional.
Specifies the type of the information to collect.
If you do not specify a flavor explicitly, the command uses the first flavor in the
<Application Flag>. To see all flavors, run the cpstat command without any
parameters.
-o <Polling Optional.
Interval>
Specifies the polling interval (in seconds) - how frequently the command collects and
shows the information.
Examples:
n 0 - The command shows the results only once and the stops (this is the default
value).
n 5 - The command shows the results every 5 seconds in the loop.
n 30 - The command shows the results every 30 seconds in the loop.
n N - The command shows the results every N seconds in the loop.
Use this parameter together with the "-c <Count>" parameter and the "-e
<Period>" parameter.
Example:
cpstat os -f perf -o 2
-c <Count> Optional.
Specifies how many times the command runs and shows the results before it stops.
You must use this parameter together with the "-o <Polling Interval>"
parameter.
Examples:
n 0 - The command shows the results repeatedly every <Polling
Interval> (this is the default value).
n 10 - The command shows the results 10 times every <Polling
Interval> and then stops.
n 20 - The command shows the results 20 times every <Polling
Interval> and then stops.
n N - The command shows the results N times every <Polling Interval>
and then stops.
Example:
cpstat os -f perf -o 2 -c 2
Parameter Description
-e <Period> Optional.
Specifies the time (in seconds), over which the command calculates the statistics.
You must use this parameter together with the "-o <Polling Interval>"
parameter.
You can use this parameter together with the "-c <Count>" parameter.
Example:
cpstat os -f perf -o 2 -c 2 -e 60
< Mandatory.
Application
See the table below with flavors for the application flags.
Flag>
Note - The available flags depend on the enabled Software Blades. Some flags are
supported only by a Security Gateway, and some flags are supported only by a
Management Server.
Feature or
Software Flag Flavors
Blade
List of enabled blades fw, ips, av, urlf, vpn, cvpn, aspm, dlp,
Software appi, anti_bot, default, content_
Blades awareness, threat-emulation, default
Feature or
Software Flag Flavors
Blade
Anti-Virus ci default
Feature or
Software Flag Flavors
Blade
QoS fg all
Provisioning PA default
Agent
Feature or
Software Flag Flavors
Blade
Examples
Network interfaces
--------------------------------------------------------------------------------------------------------
------------
|Name|IP |Netmask |Flags|Peer name|Remote IP|Topology|Proxy name|Slaves|Ports|IPv6
Address|IPv6 Len|
--------------------------------------------------------------------------------------------------------
------------
|eth0|192.168.30.40|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth1| 172.30.60.80|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth2| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth3| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth4| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth5| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth6| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth7| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
--------------------------------------------------------------------------------------------------------
------------
[Expert@MyGW:0]#
Interface table
---------------------------------------
|Name|Dir|Total |Accept|Deny |Log|
---------------------------------------
|eth0|in | 2393126| 32589| 2360537| 52|
|eth0|out| 33016| 33016| 0| 0|
|eth1|in | 2360350| 0| 2360350| 0|
|eth1|out| 0| 0| 0| 0|
|eth2|in | 2360350| 0| 2360350| 0|
|eth2|out| 0| 0| 0| 0|
|eth3|in | 2348704| 0| 2348704| 1|
|eth3|out| 0| 0| 0| 0|
|eth4|in | 2360350| 0| 2360350| 0|
|eth4|out| 0| 0| 0| 0|
---------------------------------------
| | |11855896| 65605|11790291| 53|
---------------------------------------
[Expert@MyGW:0]#
Example - CPU utilization
[Expert@HostName:0]# cpstat -f cpu os
CPU User Time (%): 1
CPU System Time (%): 0
CPU Idle Time (%): 99
CPU Usage (%): 1
CPU Queue Length: -
CPU Interrupts/Sec: 172
CPUs Number: 8
[Expert@HostName:0]#
Example - Performance
[Expert@HostName:0]# cpstat os -f perf -o 2 -c 2 -e 60
[Expert@HostName:0]#
Connected clients
-------------------------------------------------------
|Client type |Administrator|Host |Database lock|
-------------------------------------------------------
|SmartConsole|admin |JOHNDOE-PC |false |
-------------------------------------------------------
[Expert@MGMT:0]#
cpstop
Description
Manually stops all Check Point processes and applications.
Syntax
Parameters
Important - These parameters are for Check Point internal use. Do not use them,
unless explicitly instructed by Check Point Support or R&D to do so.
Parameter Description
Note - Only security rules that do not use user space processes continue to work.
Example
See these articles:
n sk35496
n sk113045
cpview
Overview of CPView
Description
CPView is a text based built-in utility on a Check Point computer.
CPView Utility shows statistical data that contain both general system information (CPU, Memory, Disk
space) and information for different Software Blades (only on Security Gateway).
The CPView continuously updates the data in easy to access views.
On Security Gateway, you can use this statistical data to monitor the performance.
For more information, see sk101878.
Syntax
cpview --help
Section Description
Header This view shows the time the statistics in the third view are collected.
It updates when you refresh the statistics.
Navigation This menu bar is interactive. Move between menus with the arrow keys and mouse.
A menu can have sub-menus and they show under the menu bar.
Using CPView
Use these keys to navigate the CPView:
Key Description
Q Quits CPView.
Key Description
Use these keys to save statistics, show help, and refresh statistics:
Key Description
C Saves the current page to a file. The file name format is:
cpview_<ID of the cpview process>.cap<Number of the capture>
dynamic_objects
Description
Manages dynamic objects and their applicable ranges of IP addresses on the Security Gateway.
Important - In Cluster, you must configure all the Cluster Members in the same way.
Workflow
Step Description
1 In SmartConsole:
1. Define the applicable dynamic object.
2. Install the Access Control Policy on the Security Gateway.
Syntax
n To show all configured dynamic objects and their ranges of IP addresses:
dynamic_objects -l
n To update the specific existing dynamic object (and assign a different range of IP addresses to it):
dynamic_objects -c
n To delete the specific existing dynamic object (and all ranges of IP addresses assigned to it):
n To delete all the existing dynamic objects (and all ranges of IP addresses assigned to them):
dynamic_objects -e
Parameters
Parameter Description
Example 1 - Create a new dynamic object named "bigserver" and assign to it the range of IP addresses
192.168.2.30-192.168.2.40
Run either these two commands:
dynamic_objects -n bigserver
dynamic_objects -o bigserver -r 192.168.2.30 192.168.2.40 -a
Example 2 - Update the ranges of IP addresses assigned to the dynamic object named "bigserver" from
the current range to the new range 192.168.2.60-192.168.2.80
dynamic_objects -u bigserver -r 192.168.2.60 192.168.2.80
cpwd_admin
Description
The Check Point WatchDog (cpwd) is a process that invokes and monitors critical processes such as
Check Point daemons on the local computer, and attempts to restart them if they fail.
Among the processes monitored by Watchdog are fwm, fwd, cpd, DAService, and others.
The list of monitored processes depends on the installed and configured Check Point products and
Software Blades.
The Check Point WatchDog writes monitoring information to the $CPDIR/log/cpwd.elg log file.
The cpwd_admin utility shows the status of the monitored processes, and configures the Check Point
WatchDog.
Monitoring Description
Passive WatchDog restarts the process only when the process terminates abnormally.
In the output of the cpwd_admin list command, the MON column shows N for
passively monitored processes.
Syntax
cpwd_admin
config <options>
del <options>
detach <options>
exist
flist <options>
getpid <options>
kill
list <options>
monitor_list
start <options>
start_monitor
stop <options>
stop_monitor
Parameters
Parameter Description
Parameter Description
start_ Starts the active WatchDog monitoring - WatchDog monitors the predefined
monitor processes actively.
See "cpwd_admin start_monitor" on page 228.
stop_ Stops the active WatchDog monitoring - WatchDog monitors all processes only
monitor passively.
See "cpwd_admin stop_monitor" on page 231.
cpwd_admin config
Description
Configures the Check Point WatchDog.
Important - After changing the WatchDog configuration parameters, you must restart
the WatchDog process with the cpstop and cpstart commands (which restart all
Check Point processes).
Syntax
cpwd_admin config
-h
-a <options>
-d <options
-p
-r
Parameters
Parameter Description
These are the available configuration parameters and the accepted values:
Configuration Accepted
Description
Parameter Values
default_ Text string up On a VSX Gateway, configures the CTX value that is assigned to
ctx to 128 monitored processes, for which no CTX is specified.
characters
rerun_ n 0 Configures whether the WatchDog restarts processes after they fail:
mode
n 1 n 0 - Does not restart a failed process. Monitor and log only.
(default)
n 1 - Restarts a failed process (this is the default).
reset_ n Range: Configures the time (in seconds) the WatchDog waits after the
startups >0 process starts and before the WatchDog resets the process's
startup_counter to 0.
n Default:
3600 To see the process's startup counter, in the output of the cpwd_
admin list command, refer to the #START column.
sleep_ n Range: If rerun_mode=1, specifies how much time (in seconds) passes
timeout 0 - 3600 from a process failure until WatchDog tries to restart it.
n Default:
60
Configuration Accepted
Description
Parameter Values
stop_ n Range: Configures the time (in seconds) the WatchDog waits for a process
timeout >0 stop command to complete.
n Default:
60
zero_ n Range: After failing no_limit times to restart a process, the WatchDog
timeout >0 waits zero_timeout seconds before it tries again.
n Default: The value of the zero_timeout must be greater than the value of
7200 the timeout.
The WatchDog saves the user defined configuration parameters in the $CPDIR/registry/HKLM_
registry.data file in the ": (Wd_Config" section:
Example
Description
Configures the Check Point WatchDog.
Important - After changing the WatchDog configuration parameters, you must restart
the WatchDog process with the cpstop and cpstart commands (which restart all
Check Point processes).
Syntax
cpwd_admin config
-h
-a <options>
-d <options
-p
-r
Parameters
Parameter Description
These are the available configuration parameters and the accepted values:
Configuration Accepted
Description
Parameter Values
default_ Text string up On a VSX Gateway, configures the CTX value that is assigned to
ctx to 128 monitored processes, for which no CTX is specified.
characters
rerun_ n 0 Configures whether the WatchDog restarts processes after they fail:
mode
n 1 n 0 - Does not restart a failed process. Monitor and log only.
(default)
n 1 - Restarts a failed process (this is the default).
reset_ n Range: Configures the time (in seconds) the WatchDog waits after the
startups >0 process starts and before the WatchDog resets the process's
startup_counter to 0.
n Default:
3600 To see the process's startup counter, in the output of the cpwd_
admin list command, refer to the #START column.
sleep_ n Range: If rerun_mode=1, specifies how much time (in seconds) passes
timeout 0 - 3600 from a process failure until WatchDog tries to restart it.
n Default:
60
Configuration Accepted
Description
Parameter Values
stop_ n Range: Configures the time (in seconds) the WatchDog waits for a process
timeout >0 stop command to complete.
n Default:
60
zero_ n Range: After failing no_limit times to restart a process, the WatchDog
timeout >0 waits zero_timeout seconds before it tries again.
n Default: The value of the zero_timeout must be greater than the value of
7200 the timeout.
The WatchDog saves the user defined configuration parameters in the $CPDIR/registry/HKLM_
registry.data file in the ": (Wd_Config" section:
Example
cpwd_admin del
Description
Temporarily deletes a monitored process from the WatchDog database of monitored processes.
Notes:
n WatchDog stops monitoring the detached process, but the process stays alive.
n The "cpwd_admin list" on page 221 command does not show the deleted
process anymore.
n This change applies until all Check Point services restart during boot, or with the
"cpstart" on page 196 command.
Parameters
Parameter Description
< Name of the monitored Check Point process as you see in the output of the "cpwd_
Application admin list" on page 221 command in the leftmost column APP.
Name>
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Example
cpwd_admin detach
Description
Temporarily detaches a monitored process from the WatchDog monitoring.
Notes:
n WatchDog stops monitoring the detached process, but the process stays alive.
n The "cpwd_admin list" on page 221 command does not show the detached
process anymore.
n This change applies until all Check Point services restart during boot, or with the
"cpstart" on page 196 command.
Parameters
Parameter Description
< Name of the monitored Check Point process as you see in the output of the "cpwd_
Application admin list" on page 221 command in the leftmost column APP.
Name>
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Example
cpwd_admin exist
Description
Checks whether the WatchDog process cpwd is alive.
Syntax
cpwd_admin exist
Example
cpwd_admin flist
Description
Prints the status of all WatchDog monitored processes on the screen.
Parameters
Parameter Description
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Output
Column Description
CTX On a VSX Gateway, shows the VSID, in which the monitored process runs.
#START Shows how many times the WatchDog started the monitored process.
START_ Shows the time when the WatchDog started the monitored process for the last time.
TIME
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_limit
configuration parameters (see "cpwd_admin config" on page 211).
MON Shows how the WatchDog monitors this process (see the explanation for the "cpwd_
admin" on page 208):
n Y - Active monitoring
n N - Passive monitoring
COMMAND Shows the command the WatchDog run to start this process.
Example
cpwd_admin getpid
Description
Shows the PID of a WatchDog monitored process.
Parameters
Parameter Description
< Name of the monitored Check Point process as you see in the output of the "cpwd_
Application admin list" on page 221 command in the leftmost column APP.
Name>
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On VSX Gateway, specifies the context of the applicable Virtual System.
Example
cpwd_admin kill
Description
Terminates the WatchDog process cpwd.
Important - Do not run this command unless explicitly instructed by Check Point
Support or R&D to do so.
To restart the WatchDog process, you must restart all Check Point services with the
"cpstop" on page 205 and "cpstart" on page 196 commands.
Syntax
cpwd_admin kill
cpwd_admin list
Description
Prints the status of all WatchDog monitored processes on the screen.
Parameters
Parameter Description
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Output
Column Description
CTX On a VSX Gateway, shows the VSID, in which the monitored process runs.
#START Shows how many times the WatchDog started the monitored process.
START_ Shows the time when the WatchDog started the monitored process for the last time.
TIME
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_limit
configuration parameters (see "cpwd_admin config" on page 211).
MON Shows how the WatchDog monitors this process (see the explanation for the "cpwd_
admin" on page 208):
n Y - Active monitoring
n N - Passive monitoring
COMMAND Shows the command the WatchDog run to start this process.
Examples
cpwd_admin monitor_list
Description
Prints the status of actively monitored processes on the screen.
See the explanation about the active monitoring in "cpwd_admin" on page 208.
Syntax
cpwd_admin monitor_list
Example
cpwd_admin start
Description
Starts a process as monitored by the WatchDog.
Parameters
Parameter Description
-name <Application Name, under which the cpwd_admin list command shows the
Name> monitored process in the leftmost column APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
-path "<Full Path The full path (with or without Check Point environment variables) to the
to Executable>" executable including the executable name.
Must enclose in double-quotes.
Examples:
Parameter Description
-env {inherit | Configures whether to inherit the environment variables from the shell.
<Env_Var>=<Value>}
n inherit - Inherits all the environment variables (WatchDog
supports up to 80 environment variables)
n <Env_Var>=<Value> - Assigns the specified value to the
specified environment variable
Example
For the list of process and the applicable syntax, see sk97638.
cpwd_admin start_monitor
Description
Starts the active WatchDog monitoring. WatchDog monitors the predefined processes actively.
See the explanation for the "cpwd_admin" on page 208 command.
Syntax
cpwd_admin start_monitor
Example
cpwd_admin stop
Description
Stops a WatchDog monitored process.
Parameters
Parameter Description
-name <Application Name under which the cpwd_admin list command shows the
Name> monitored process in the leftmost column APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual
System.
Parameter Description
-path "<Full Path to The full path (with or without Check Point environment variables) to the
Executable>" executable including the executable name.
Must enclose in double-quotes.
Examples:
n For FWM: "$FWDIR/bin/fwm"
n For FWD: "/opt/CPsuite-R80.40/fw1/bin/fw"
n For CPD: "$CPDIR/bin/cpd_admin"
-env {inherit | Configures whether to inherit the environment variables from the shell.
<Env_Var>=<Value>}
n inherit - Inherits all the environment variables (WatchDog
supports up to 80 environment variables)
n <Env_Var>=<Value> - Assigns the specified value to the
specified environment variable
Example
For the list of process and the applicable syntax, see sk97638.
cpwd_admin stop_monitor
Description
Stops the active WatchDog monitoring. WatchDog monitors all processes only passively.
See the explanation for the "cpwd_admin" on page 208 command.
Syntax
cpwd_admin stop_monitor
Example
fw
Description
n Fetches and unloads Threat Prevention policy.
n Controls the Firewall module.
n Generates the Default Filter policy files.
n Fetches the policy from the Management Server, peer Cluster Member, or local directory.
n Fetches the specified Security or Audit log files from the specified Check Point computer.
n Shows the list of interfaces and their IP addresses.
n Shows information about Check Point computers in High Availability configuration and their states.
n Controls ISP links in ISP Redundancy configuration.
n Kills the specified Check Point processes.
n Shows a list of hosts protected by the Security Gateway.
n Shows the content of Check Point log files.
n Switches the current active log file.
n Shows a list of Security or Audit log files.
n Merges several input log files into a single log file.
n Runs FW Monitor to capture the traffic that passes through the Security Gateway.
n Rebuilds pointer files for Security or Audit log files.
n Manages the Suspicious Activity Monitoring (SAM) rules.
n Manages the Suspicious Activity Policy editor.
n Shows the contents of the Unified Policy kernel tables.
n Shows the currently installed policy.
n Shows and deletes the contents of the specified kernel tables.
n Executes the offline Unified Policy.
n Removes all policies from the Security Gateway or Cluster Member.
n Shows the Security Gateway major and minor version number and build number.
Syntax
fw [-d] [-i]
amw <options>
ctl <options>
defaultgen
fetch <options>
fetchlogs <options>
getifs
hastat <options>
isp_link <options>
kill <options>
lichosts <options>
log <options>
logswitch <options>
lslogs <options>
mergefiles <options>
repairlog <options>
sam <options>
sam_policy <options>
showuptables <options>
stat
tab <options>
unloadlocal
up_execute <options>
ver <options>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
Parameter Description
fetch Fetches the policy from the Management Server, peer Cluster Member, or local
<options> directory.
See "fw fetch" on page 998.
fetchlogs Fetches the specified Security log files ($FWDIR/log/*.log*) or Audit log files
<options> ($FWDIR/log/*.adtlog*) from the specified Check Point computer.
hastat Shows information about Check Point computers in High Availability configuration
<options> and their states.
See "fw hastat" on page 1003.
log Shows the content of Check Point log files - Security ($FWDIR/log/*.log) or
<options> Audit ($FWDIR/log/*.adtlog).
Parameter Description
logswitch Switches the current active log file - Security ($FWDIR/log/fw.log) or Audit
<options> ($FWDIR/log/fw.adtlog).
lslogs Shows a list of Security log files ($FWDIR/log/*.log*) or Audit log files
<options> ($FWDIR/log/*.adtlog*) residing on the local computer or a remote
computer.
See "fw lslogs" on page 1020.
monitor Runs FW Monitor to capture the traffic that passes through the Security Gateway.
<options>
See "fw monitor" on page 1026.
repairlog Rebuilds pointer files for Security log files ($FWDIR/log/*.log) or Audit
<options> ($FWDIR/log/*.adtlog) log files.
tab Shows and deletes the contents of the specified kernel tables.
<options>
See "fw tab" on page 1093.
unloadlocal Uninstalls all policies from the Security Gateway or Cluster Member.
See "fw unloadlocal" on page 1100.
ver Shows the Security Gateway major and minor version number and build number.
<options>
See "fw ver" on page 1107.
fw -i
Description
By default, the "fw" on page 954 commands apply to the entire Security Gateway.
The fw commands show aggregated information for all CoreXL Firewall instances.
The fw -i commands apply to the specified CoreXL Firewall instance.
Syntax
Parameters
Parameter Description
For details and additional parameters for any of these commands, refer
to the corresponding entry for each command.
fw amw
Description
Fetches and unloads Threat Prevention policy.
Threat Prevention policy applies to these Software Blades:
n Anti-Bot
n Anti-Spam
n Anti-Virus
n IPS
n Threat Emulation
n Threat Extraction
Syntax
n To fetch the Threat Prevention policy from the Management Server:
n To fetch the Threat Prevention policy from a peer Cluster Member, and, if it fails, then from the
Management Server:
n To fetch the Threat Prevention policy from the specified Check Point computer(s):
fw [-d] amw fetch [-i] [-n] [-r] <Master 1> [<Master 2> ...]
n To fetch the Threat Prevention policy stored locally on the Security Gateway:
n To fetch the Threat Prevention policy stored locally on the Security Gateway in the specified
directory:
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
fw amw fetch Fetches the Threat Prevention policy from the specified Check Point computer(s).
These can be a Management Server, or a peer Cluster Member.
fw amw fetch Fetches the Threat Prevention policy that is stored locally on the Security
local Gateway in the $FWDIR/state/local/AMW/ directory.
fw amw fetch
localhost
fw amw Fetches the Threat Prevention policy that stored locally on the Security Gateway
fetchlocal in the specified directory.
fw amw Unloads the current Threat Prevention policy from the Security Gateway.
unload
Important - This significantly decreases the security on the Security
Gateway. This is the same as if you disable the Threat Prevention
Software Blades on the Security Gateway.
-c Specifies that you fetch the policy from a peer Cluster Member.
Notes:
n Must also use the "-f" parameter.
n Works only in cluster.
-f Specifies that you fetch the policy from a Management Server listed in the
$FWDIR/conf/masters file.
-lu Specifies to perform a late update - to load signatures just after the Security
Gateway copies the policy files to the local directory
$FWDIR/state/local/AMW/.
-n Specifies not to load the fetched policy, if it is the same as the policy already
located on the Security Gateway.
Parameter Description
<Master 1> Specifies the Check Point computer(s), from which to fetch the Threat Prevention
[<Master 2> policy.
...]
You can fetch the Threat Prevention policy from the Management Server, or a
peer Cluster Member.
Notes:
n If you fetch the Threat Prevention policy from the Management
Server, you can enter one of these:
l The main IP address of the Management Server object.
l The object name of the Management Server.
l The hostname that the Security Gateway resolves to the
main IP address of the Management Server.
n If you fetch the Threat Prevention policy from a peer Cluster
Member, you can enter one of these:
l The main IP address of the Cluster Member object.
l The IP address of the Sync interface on the Cluster
Member.
n If the fetch from the first specified <Master> fails, the Security
Gateway fetches the policy from the second specified <Master>
, and so on. If the Security Gateway fails to connect to each
specified <Masters>, the Security Gateway fetches the policy
from the localhost.
n If you do not specify the <Masters> explicitly, the Security
Gateway fetches the policy from the localhost.
-d <Full Specifies local directory on the Security Gateway, from which to fetch the Threat
Path to Prevention policy files.
Directory>
Example
fw ctl
Description
Controls the Firewall kernel module.
Important - In Cluster, you must configure all the Cluster Members in the same way.
Syntax
fw [-d] ctl
arp <options>
bench <options>
block <options>
chain
conn
conntab <options>
cpasstat <options>
debug <options>
get <options>
iflist
install
kdebug <options>
pstat <options>
set <options>
tcpstrstat <options>
uninstall
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
Parameter Description
arp <options> Shows the configured Proxy ARP entries based on the
$FWDIR/conf/local.arp file on the Security Gateway.
See "fw ctl arp" on page 965.
bench Runs the CPU benchmark tests that collect these statistics:
<options>
n FireWall Lock Statistics
n Outbound Packets Statistics
n Inbound Packets Statistics
block Blocks all connections to, from, and through the Security Gateway.
<options>
See "fw ctl block" on page 968.
conntab Shows formatted list of current connections from the Connections kernel table
<options> (ID 8158).
See "fw ctl conntab" on page 973.
cpasstat Generates statistics report about Check Point Active Streaming (CPAS).
<options>
See "fw ctl cpasstat" on page 977.
debug Generates kernel debug messages from Check Point Firewall kernel to a debug
<options> buffer.
See "'fw ctl debug' and 'fw ctl kdebug'" on page 978.
dlpkstat Generates statistics report about Data Loss Prevention kernel module.
<options>
See "fw ctl dlpkstat" on page 979.
Parameter Description
kdebug Generates kernel debug messages from Check Point Firewall kernel to a debug
<options> buffer.
See "'fw ctl debug' and 'fw ctl kdebug'" on page 978.
set <options> Configures the specified value for the specified kernel parameter.
See "fw ctl set" on page 991.
uninstall Tells the operating system to stop passing packets to Firewall, and unloads the
current Security Policy.
See "fw ctl uninstall" on page 995.
fw ctl arp
Description
Shows the configured Proxy ARP entries based on the $FWDIR/conf/local.arp file on the Security
Gateway.
For more information about the Proxy ARP, see sk30197.
Syntax
Parameters
Parameter Description
fw ctl bench
Description
The benchmark mechanism provides a way to measure the time spent in the code between two points.
This command runs the CPU benchmark tests that collect these statistics:
n FireWall Lock Statistics
n Outbound Packets Statistics
n Inbound Packets Statistics.
Note - This command writes the output of these tests to the dmesg.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
Parameter Description
lock Runs the lock benchmark that collects the FireWall Lock Statistics.
[ioctl[ Available options:
<Limit>]]
n No parameters - Starts the lock benchmark.
[packet
n ioctl - Calculates the IOCTL flow statistics.
[<Limit>]]
n packet - Calculates the packet flow statistics.
[stop]
n <Limit> - Specifies the time limit (in seconds) for the benchmark to
run. Default is 10 seconds. Maximum is 200 seconds.
n stop - Stops the current lock benchmark.
packet Runs the packet benchmark test that collects these statistics:
[{<Limit> |
n Outbound Packets Statistics
stop}]
n Inbound Packets Statistics
Available options:
n No parameters - Starts the packet benchmark.
n <Limit> - Specifies the time limit (in seconds) for the benchmark to
run. Default is 10 seconds. Maximum is 200 seconds.
n stop - Stops the current packet benchmark.
fw ctl block
Description
Blocks all connections to, from, and through the Security Gateway.
Important - The "fw ctl block on" command immediately blocks all connections
without a prompt and regardless the currently installed policy. To unblock the
connections, you must either reboot the Security Gateway, or connect to the Security
Gateway over a serial console (or Lights Out Management Card) and run the "fw ctl
block off" command.
Syntax
Parameters
Parameter Description
fw ctl chain
Description
Shows the list of Firewall Chain Modules.
This list shows various inspection Chain Modules, through which the traffic passes on this Security
Gateway.
The available Chain Modules depend on the configuration and enabled Software Blades.
Important - In Cluster, outputs of this command must be the same on all the Cluster Members.
Syntax
Parameters
Parameter Description
Example
fw ctl conn
Description
Shows the list of Firewall Connection Modules.
This list shows various inspection Connection Modules, through which the traffic passes on this Security
Gateway.
The available Connection Modules depend on the configuration and enabled Software Blades.
Important - In Cluster, outputs of this command must be the same on all the Cluster Members.
Syntax
Parameters
Parameter Description
Example
fw ctl conntab
Description
Shows formatted list of current connections from the Connections kernel table (ID 8158).
Use this command if you want to see the simplified information about the current connections.
Best Practices:
n Use the "fw ctl conntab" command to see the simplified information about
the current connections.
n Use the "fw tab -t connections -f" command ("fw tab" on page 1093)
to see the detailed (and more technical) information about the current
connections.
Syntax
Parameters
Parameter Description
Parameter Description
-sport=<Port Number in Decimal Filters the output by the specified Source Port
Format> number.
See IANA Service Name and Port Number Registry.
-dport=<Port Number in Decimal Filters the output by the specified Destination Port
Format> number.
See IANA Service Name and Port Number Registry.
-rule=<Rule Number in Decimal See your Rule Base in SmartConsole, or in the output
Format> of the command.
Examples
Example 10 - Formatted detailed output from the Connections table (for comparison)
[Expert@MyGW:0]# fw tab -t connections -f
localhost:
Date: Sep 10, 2018
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv;
: (+)====================================(+); Table_Name: connections; : (+); Attributes: dynamic, id 8158, attributes: keep,
sync, aggressive aging, kbufs 21 22 23 24 25 26 27 28 29 30 31 32 33 34, expires 25, refresh, , hashsize 2097152, unlimited;
LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv;
: -----------------------------------(+); Direction: 1; Source: 192.168.204.40; SPort: 54201; Dest: 192.168.204.1; DPort: 53;
Protocol: udp; CPTFMT_sep: ;; Type: 131073; Rule: 0; Timeout: 335; Handler: 0; Ifncin: -1; Ifncout: -1; Ifnsin: -1; Ifnsout:
1; Bits: 0000780000000000; Expires: 23/40; LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1;
ProductFamily: Network;
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv;
: -----------------------------------(+); Direction: 0; Source: 192.168.204.1; SPort: 53; Dest: 192.168.204.40; DPort: 54201;
Protocol: udp; CPTFMT_sep_1: ->; Direction_1: 1; Source_1: 192.168.204.40; SPort_1: 54201; Dest_1: 192.168.204.1; DPort_1:
53; Protocol_1: udp; FW_symval: 2054; LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1; ProductFamily:
Network;
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv;
: -----------------------------------(+); Direction: 1; Source: 192.168.204.40; SPort: 22; Dest: 192.168.204.1; DPort: 54201;
Protocol: tcp; CPTFMT_sep_1: ->; Direction_2: 0; Source_2: 192.168.204.1; SPort_2: 54201; Dest_2: 192.168.204.40; DPort_2:
22; Protocol_2: tcp; FW_symval: 2053; LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1; ProductFamily:
Network;
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv;
: -----------------------------------(+); Direction: 0; Source: 192.168.204.1; SPort: 54201; Dest: 192.168.204.40; DPort: 22;
Protocol: tcp; CPTFMT_sep: ;; Type: 114689; Rule: 2; Timeout: 481; Handler: 0; Ifncin: 1; Ifncout: 1; Ifnsin: -1; Ifnsout: -
1; Bits: 02007800000f9000; Expires: 3596/3600; LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1;
ProductFamily: Network;
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv;
: -----------------------------------(+); Direction: 0; Source: 192.168.204.1; SPort: 53; Dest: 192.168.204.40; DPort: 44966;
Protocol: udp; CPTFMT_sep_1: ->; Direction_1: 1; Source_1: 192.168.204.40; SPort_1: 44966; Dest_1: 192.168.204.1; DPort_1:
53; Protocol_1: udp; FW_symval: 2054; LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1; ProductFamily:
Network;
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv;
: -----------------------------------(+); Direction: 1; Source: 192.168.204.40; SPort: 44966; Dest: 192.168.204.1; DPort: 53;
Protocol: udp; CPTFMT_sep: ;; Type: 131073; Rule: 0; Timeout: 335; Handler: 0; Ifncin: -1; Ifncout: -1; Ifnsin: 1; Ifnsout:
1; Bits: 0000780000000000; Expires: 23/40; LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1;
ProductFamily: Network;
[Expert@MyGW:0]#
fw ctl cpasstat
Description
Generates statistics report about Check Point Active Streaming (CPAS).
Syntax
Parameters
Parameter Description
Description
These commands generate kernel debug messages from Check Point Firewall kernel to a debug buffer.
For more information, see the R80.40 Next Generation Security Gateway Guide - Chapter Kernel Debug
on Security Gateway.
fw ctl dlpkstat
Description
Generates statistics report about Data Loss Prevention, inspected HTTP requests, and Identity Awareness
Captive Portal.
This report contains these statistics:
Category Information
Identity Awareness - Captive Portal HTTP requests redirected to the Captive Portal
Syntax
Parameters
Parameter Description
fw ctl get
Description
Shows the current value of the specified kernel parameter.
Important:
n In Cluster, you must configure all the Cluster Members in the same way.
n In VSX Gateway, the configured values of kernel parameters apply to all existing
Virtual Systems and Virtual Routers.
Notes:
n Kernel parameters let you change the advanced behavior of your Security
Gateway.
n There are two types of kernel parameters - integer and string.
n Security Gateway gets the names and the default values of the kernel
parameters from these kernel module files:
l $FWDIR/boot/modules/fw_kern_64.o
l $FWDIR/boot/modules/fw_kern_64_v6.o
l $FWDIR/boot/modules/fw_kern_64_3_10_64.o
l $FWDIR/boot/modules/fw_kern_64_3_10_64_v6.o
l $PPKDIR/boot/modules/sim_kern_64.o
l $PPKDIR/boot/modules/sim_kern_64_v6.o
l $PPKDIR/boot/modules/sim_kern_64_3_10_64.o
l $PPKDIR/boot/modules/sim_kern_64_3_10_64_v6.o
n Refer to the related command "fw ctl set" on page 991.
n Refer to the related article sk33156: Creating a file with all the kernel
parameters and their values
Syntax
Parameters
Parameter Description
<Name of Integer Kernel Specifies the name of the integer kernel parameter.
Parameter>
<Name of String Kernel Specifies the name of the string kernel parameter.
Parameter>
fw ctl iflist
Description
Shows the list with this information:
n The name of interfaces, to which the Check Point Firewall kernel attached.
n The internal numbers of the interfaces in the Check Point Firewall kernel.
Notes:
n This list shows all detected interfaces, even if there are no IP addresses
assigned on them.
n You use this list when you analyze a kernel debug, which shows only the internal
numbers of the interfaces (for example, ifn=2).
n Related "cpstat" on page 912 commands:
l cpstat -f ifconfig os
l cpstat -f interfaces fw
Syntax
Parameters
Parameter Description
Example
fw ctl install
Description
Tells the operating system to start passing packets to Firewall.
This command runs automatically when the Security Gateway or an administrator runs the "cpstart" on
page 911 command.
Warning
If you run the "fw ctl uninstall" on page 995 command and then the "fw ctl install" command, it
does not restore the Security Policy.
You must run one of these commands: "fw fetch" on page 998, or "cpstart" on page 911.
Syntax
Parameters
Parameter Description
fw ctl leak
Description
Generates leak detection report. This report is for Check Point use only.
Important - This command save the report into the active /var/log/messages file
and the dmesg buffer.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.
Parameter Description
-o <Internal Specifies to perform leak detection for the specified internal object ID.
Object ID>
-t <Internal Specifies the internal object types, for which to perform leak detection.
Object Type>
Available internal object types are:
n chain
n connh
n cookie
n kbuf
n num
If you do not specify the internal object type explicitly, the command performs
leak detection for all internal object types.
Procedure
Step Description
[Expert@GW_HostName:0]# cp -v
/var/log/messages{,_BKP}
[Expert@GW_HostName:0]# dmesg -c
Step Description
6 Generate the leak detection report (see the Syntax section above):
[Expert@GW_HostName:0]# dmesg
[Expert@GW_HostName:0]# cat
/var/log/messages
[Expert@GW_HostName:0]# cp -v
/var/log/messages{,_LEAK_DETECTION}
/var/log/messages_LEAK_DETECTION
Example
[Expert@MyGW:0]# cp -v /var/log/messages{,_BKP}
`/var/log/messages' -> `/var/log/messages_BKP'
[Expert@MyGW:0]#
[Expert@MyGW:0]# echo '' > /var/log/messages
[Expert@MyGW:0]#
[Expert@MyGW:0]# dmesg -c
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw ctl leak -s
[Expert@MyGW:0]#
[Expert@MyGW:0]# dmesg
[fw4_0];fwleak_report: type chain - 0 objects
[fw4_0];fwleak_report: type cookie - 0 objects
[fw4_0];fwleak_report: type kbuf - 0 objects
[fw4_0];fwleak_report: type connh - 0 objects
[fw4_1];fwleak_report: type chain - 0 objects
[fw4_1];fwleak_report: type cookie - 0 objects
[fw4_1];fwleak_report: type kbuf - 0 objects
[fw4_1];fwleak_report: type connh - 0 objects
[fw4_2];fwleak_report: type chain - 0 objects
[fw4_2];fwleak_report: type cookie - 0 objects
[fw4_2];fwleak_report: type kbuf - 0 objects
[fw4_2];fwleak_report: type connh - 0 objects
[Expert@MyGW:0]#
[Expert@MyGW:0]# cat /var/log/messages
Sep 12 16:09:50 2019 MyGW kernel: [fw4_0];fwleak_report: type chain - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_0];fwleak_report: type cookie - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_0];fwleak_report: type kbuf - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_0];fwleak_report: type connh - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_1];fwleak_report: type chain - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_1];fwleak_report: type cookie - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_1];fwleak_report: type kbuf - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_1];fwleak_report: type connh - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_2];fwleak_report: type chain - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_2];fwleak_report: type cookie - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_2];fwleak_report: type kbuf - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_2];fwleak_report: type connh - 0 objects
[Expert@MyGW:0]
[Expert@MyGW:0]# cp -v /var/log/messages{,_LEAK_DETECTION}
`/var/log/messages' -> `/var/log/messages_LEAK_DETECTION'
[Expert@MyGW:0]#
fw ctl pstat
Description
Shows Security Gateway various internal statistics:
n System Capacity Summary
n Hash kernel memory (hmem) statistics
n System kernel memory (smem) statistics
n Kernel memory (kmem) statistics
n Cookies
n Connections
n Fragments
n NAT
n Handles
Syntax
fw [-d] ctl pstat [-c] [-h] [-k] [-l] [-m] [-o] [-s] [-v {4 | 6}]
Parameters
Parameter Description
Parameter Description
-v 4 Shows statistics for IPv4 (-v 4) traffic only, or for IPv6 (-v 4) traffic only.
-v 6 Default is to show statistics for both IPv4 and IPv6 traffic.
Examples
Cookies:
91808 total, 0 alloc, 0 free,
2 dup, 91808 get, 0 put,
182258 len, 909 cached len, 0 chain alloc,
0 chain free
Connections:
0 total, 0 TCP, 0 UDP, 0 ICMP,
0 other, 0 anticipated, 0 recovered, -3 concurrent,
0 peak concurrent
Fragments:
0 fragments, 0 packets, 0 expired, 0 short,
0 large, 0 duplicates, 0 failures
NAT:
0/0 forw, 0/0 bckw, 0 tcpudp,
0 icmp, 0-0 alloc
[Expert@MyGW:0]#
fw ctl set
Description
Configures the specified value for the specified kernel parameter.
Important:
n In Cluster, you must configure all the Cluster Members in the same way.
n In VSX Gateway, the configured values of kernel parameters apply to all existing
Virtual Systems and Virtual Routers.
n The configuration made with this command does not survive reboot.
To make this configuration permanent, you must edit one of the applicable
configuration files:
l $FWDIR/boot/modules/fwkern.conf
l $FWDIR/boot/modules/vpnkern.conf
l $PPKDIR/conf/simkern.conf.
For more information, see sk26202.
Notes:
n Kernel parameters let you change the advanced behavior of your Security
Gateway.
n There are two types of kernel parameters - integer and string.
n Security Gateway gets the names and the default values of the kernel
parameters from these kernel module files:
l $FWDIR/boot/modules/fw_kern_64.o
l $FWDIR/boot/modules/fw_kern_64_v6.o
l $FWDIR/boot/modules/fw_kern_64_3_10_64.o
l $FWDIR/boot/modules/fw_kern_64_3_10_64_v6.o
l $PPKDIR/boot/modules/sim_kern_64.o
l $PPKDIR/boot/modules/sim_kern_64_v6.o
l $PPKDIR/boot/modules/sim_kern_64_3_10_64.o
l $PPKDIR/boot/modules/sim_kern_64_3_10_64_v6.o
n Refer to the related command "fw ctl get" on page 980.
n Refer to the related article sk33156: Creating a file with all the kernel
parameters and their values
Syntax
Parameters
Parameter Description
<Name of Integer Kernel Specifies the name of the integer kernel parameter.
Parameter>
<Integer Value> Specifies the integer value for the integer kernel
parameter.
<Name of String Kernel Specifies the name of the string kernel parameter.
Parameter>
'<String Value>' Specifies the string value for the string kernel
parameter.
fw ctl tcpstrstat
Description
Generates statistics report about TCP Streaming.
Syntax
Parameters
Parameter Description
General Counters:
=================
Connections:
Concurrent num of connections ............. 0
Concurrent num of si connections .......... 0
Packets:
Total num of packets ...................... 2567
Total packets in bytes .................... 202394
Concurrent num of async packets ........... 0
Memory:
Allocated memory in bytes ................. 0
Referenced skbuffs num .................... 0
Referenced skbuffs size in bytes .......... 0
External packet references................. 0
Allocated memory per connection ........... 0
Rejected packets/connections:
Total num of rejected packets ............. 0
Dropped packets/connections:
Total num of dropped packets .............. 0
Stripped/Truncated packets:
Total num of stripped packets ............. 0
Total num of truncated packets ............ 0
Paused packets:
Total num of c2s|s2c paused packets ....... 0 | 0
Concurrent num of UDP held packets ........ 0
Applications Counters:
======================
Application Name: ASPII_MT
Connections:
Total num of connections .................. 954
Concurrent num of connections ............. 0
Total num of c2s|s2c connections .......... 954 | 954
Concurrent num of c2s|s2c connections ..... 0 | 0
Packets:
Total num of c2s|s2c data packets ......... 2567 | 0
Total c2s|s2c data packets in bytes ....... 130518 | 0
FastForward Counters:
=====================
FF connection:
Total num of c2s|s2c FFconns .............. 0 | 0
Total num of c2s|s2c saved packets ........ 0 | 0
Total num of c2s|s2c bytes requests ....... 0 | 0
Total num of c2s|s2c saved bytes .......... 0 | 0
[Expert@MyGW:0]#
fw ctl uninstall
Description
1. Tells the operating system to stop passing packets to Firewall.
2. Unloads the current Security Policy.
3. Unloads the current Firewall Chain Modules (see "fw ctl chain" on page 969).
4. Unloads the current Firewall Connection Modules except for RTM (see "fw ctl conn" on page 971).
Warnings
1. If you run the "fw ctl uninstall" command, the networks behind the Security Gateway
become unprotected.
2. If you run the "fw ctl uninstall" command and then the "fw ctl install" on page 983
command, it does not restore the Security Policy.
You must run one of these commands: "fw fetch" on page 998, or "cpstart" on page 911.
Syntax
Parameters
Parameter Description
fw defaultgen
Description
Manually generates the Default Filter policy files.
Refer to these related commands:
n "comp_init_policy" on page 871
n "control_bootsec" on page 874
n "fwboot default" on page 1125
n "fwboot bootconf" on page 1111
Syntax
fw [-d] defaultgen
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
$FWDIR/state/default.bin
$FWDIR/state/default.bin6
If the Default Filter policy file already exists, the command creates a backup copy
($FWDIR/state/default.bin.bak and
$FWDIR/state/default.bin6.bak).
Example
[Expert@MyGW:0]# fw defaultgen
Generating default filter
defaultfilter:
Compiled OK.
defaultfilter:
Compiled OK.
Backing up default.bin as default.bin.bak
hostaddr(MyGW) failed
Backing up default.bin6 as default.bin6.bak
[Expert@MyGW:0]#
fw fetch
Description
Fetches the Security Policy from the specified host and installs it to the kernel.
Syntax
n To fetch the policy from the Management Server:
n To fetch the policy from a peer Cluster Member, and, if it fails, then from the Management Server:
fw [-d] fetch [-i] [-n] [-r] <Master 1> [<Master 2> ...]
n To fetch the policy stored locally on the Security Gateway in the specified directory:
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.
-c Specifies that you fetch the policy from a peer Cluster Member.
Notes:
n Must also use the "-f" parameter.
n Works only in cluster.
-f Specifies that you fetch the policy from a Management Server listed in the
$FWDIR/conf/masters file.
Parameter Description
-n Specifies not to load the fetched policy, if it is the same as the policy already
located on the Security Gateway.
<Master 1> Specifies the Check Point computer(s), from which to fetch the policy.
[<Master 2> ...]
You can fetch the policy from the Management Server, or a peer Cluster
Member.
Notes:
n If you fetch the policy from the Management Server, you
can enter one of these:
l The main IP address of the Management Server
object.
l The object name of the Management Server.
l The hostname that the Security Gateway resolves to
the main IP address of the Management Server.
n If you fetch the policy from a peer Cluster Member, you can
enter one of these:
l The main IP address of the Cluster Member object.
l The IP address of the Sync interface on the Cluster
Member.
n If the fetch from the first specified <Master> fails, the
Security Gateway fetches the policy from the second
specified <Master> , and so on. If the Security Gateway
fails to connect to each specified <Masters>, the Security
Gateway fetches the policy from the localhost.
n If you do not specify the <Masters> explicitly, the Security
Gateway fetches the policy from the localhost.
-d <Full Path to Specifies the local directory on the Security Gateway, from which to fetch the
Directory> policy files.
fw fetchlogs
Description
Fetches the specified Security log files ($FWDIR/log/*.log*) or Audit log files
($FWDIR/log/*.adtlog*) from the specified Check Point computer.
Syntax
fw [-d] fetchlogs [-f <Name of Log File 1>] [-f <Name of Log File
2>]... [-f <Name of Log File N>] <Target>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
-f <Name Specifies the name of the log file to fetch. Need to specify name only.
of Log
Notes:
File N>
n If you do not specify the log file name explicitly, the command transfers all Security
log files ($FWDIR/log/*.log*) and all Audit log files
($FWDIR/log/*.adtlog*).
n The specified log file name can include wildcards * and ? (for example, 2017-0?-
*.log).
If you enter a wildcard, you must enclose it in double quotes or single quotes.
n You can specify multiple log files in one command.
You must use the -f parameter for each log file name pattern.
n This command also transfers the applicable log pointer files.
<Target> Specifies the remote Check Point computer, with which this local Check Point computer
has established SIC trust.
n If you run this command on a Security Management Server or Domain
Management Server, then <Target> is the applicable object's name or main IP
address of the Check Point Computer as configured in SmartConsole.
n If you run this command on a Security Gateway or Cluster Member, then
<Target> is the main IP address of the applicable object as configured in
SmartConsole.
Notes:
n This command moves the specified log files from the $FWDIR/log/ directory on the specified
Check Point computer. Meaning, it deletes the specified log files on the specified Check Point
computer after it copies them successfully.
n This command moves the specified log files to the $FWDIR/log/ directory on the local Check Point
computer, on which you run this command.
n This command cannot fetch the active log files $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog.
To fetch these active log files:
1. Perform log switch on the applicable Check Point computer:
2. Fetch the rotated log file from the applicable Check Point computer:
n This command renames the log files it fetched from the specified Check Point computer. The new
log file name is the concatenation of the Check Point computer's name (as configured in
SmartConsole), two underscore (_) characters, and the original log file name (for example: MyGW__
2019-06-01_000000.log).
[Expert@HostName:0]# ls $FWDIR/log/MyGW*
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.log
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.logaccount_ptr
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.loginitial_ptr
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.logptr
[Expert@HostName:0]#
fw getifs
Description
Shows the list with this information:
n The name of interfaces, to which the Check Point Firewall kernel attached.
n The IP addresses assigned to the interfaces.
Notes:
n This list shows only interfaces that have IP addresses assigned
on them.
n Related "cpstat" on page 912 commands:
l cpstat -f ifconfig os
l cpstat -f interfaces fw
Syntax
fw [-d] getifs
Parameters
Parameter Description
Example
[Expert@MyGW:0]# fw getifs
localhost eth0 192.168.30.40 255.255.255.0
localhost eth1 172.30.60.80 255.255.255.0
[Expert@MyGW:0]#
fw hastat
Description
Shows information about Check Point computers in High Availability configuration and their states.
Note - This command is outdated. On cluster members, run the Gaia Clish command
"show cluster state", or the Expert mode command "cphaprob state".
Syntax
Parameters
Parameter Description
[Expert@Member1:0]# fw hastat
HOST NUMBER HIGH AVAILABILITY STATE MACHINE STATUS
192.168.3.52 1 active OK
[Expert@Member1:0]#
fw isp_link
Description
Controls the state of ISP Links in the ISP Redundancy configuration on Security Gateway.
See the R80.40 Next Generation Security Gateway Guide.
Syntax
fw [-d] isp_link
{-h | -help}
[<Name of Object>] <Name of ISP Link>
down
up
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
<Name of The name of the ISP Link as defined in the Security Gateway or Cluster object:
ISP Link>
1. In SmartConsole, from the left navigation panel, click Gateways & Servers .
2. Open the Security Gateway or Cluster object.
3. From the left tree, click Other > ISP Redundancy .
fw kill
Description
Kills the specified Check Point processes.
Important - Make sure the killed process is restarted, or restart it manually. See sk97638.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output
to a file, or use the script command to save the entire CLI
session.
Example
fw kill fwd
fw lichosts
Description
Shows IP addresses of internal hosts that Security Gateway detected and counted based on the installed
license.
Syntax
Parameters
Parameter Description
Example
[Expert@MyGW:0]# fw lichosts
License allows an unlimited number of hosts
[Expert@MyGW:0]
Related SK article
sk10200 - 'too many internal hosts' error in /var/log/messages on Security Gateway.
fw log
Description
Shows the content of Check Point log files - Security ($FWDIR/log/*.log) or Audit
($FWDIR/log/*.adtlog).
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to
a file, or use the script command to save the entire CLI session.
-b "<Start Shows only entries that were logged between the specified start and end
Timestamp>" times.
"<End
n The <Start Timestamp> and <End Timestamp> may be a date,
Timestamp>"
a time, or both.
n If date is omitted, then the command assumes the current date.
n Enclose the "<Start Timestamp>" and "<End Timestamp> in
single or double quotes (-b 'XX' 'YY", or -b "XX" "YY).
n You cannot use the "-b" parameter together with the "-s" or "-e"
parameters.
n See the date and time format below.
Parameter Description
-c <Action> Shows only events with the specified action. One of these:
n accept
n drop
n reject
n encrypt
n decrypt
n vpnroute
n keyinst
n authorize
n deauthorize
n authcrypt
n ctl
Notes:
n The fw log command always shows the Control (ctl) actions.
n For login action, use the authcrypt.
-e "<End Shows only entries that were logged before the specified time.
Timestamp>"
Notes:
n The <End Timestamp> may be a date, a time, or both.
n Enclose the <End Timestamp> in single or double quotes (-e
'...', or -e "...").
n You cannot use the "-e" parameter together with the "-b" parameter.
n See the date and time format below.
-f This parameter:
1. Shows the saved entries that match the specified conditions.
2. After the command reaches the end of the currently opened log file, it
continues to monitor the log file indefinitely and shows the new entries
that match the specified conditions.
Parameter Description
-h <Origin> Shows only logs that were generated by the Security Gateway with the
specified IP address or object name (as configured in SmartConsole).
-l Shows both the date and the time for each log entry.
The default is to show the date only once above the relevant entries, and then
specify the time for each log entry.
-n Does not perform DNS resolution of the IP addresses in the log file (this is the
default behavior).
This significantly speeds up the log processing.
Parameter Description
-o Shows detailed log chains - shows all the log segments in the log entry.
-p Does not perform resolution of the port numbers in the log file (this is the
default behavior).
This significantly speeds up the log processing.
-s "<Start Shows only entries that were logged after the specified time.
Timestamp>"
Notes:
n The <Start Timestamp> may be a date, a time, or both.
n If the date is omitted, then the command assumed the current date.
n Enclose the <Start Timestamp> in single or double quotes (-s
'...', or -s "...").
n You cannot use the "-s" parameter together with the "-b" parameter.
n See the date and time format below.
-t This parameter:
1. Does not show the saved entries that match the specified conditions.
2. After the command reaches the end of the currently opened log file, it
continues to monitor the log file indefinitely and shows the new entries
that match the specified conditions.
-u <Unification Specifies the path and name of the log unification scheme file.
Scheme File>
The default log unification scheme file is:
$FWDIR/conf/log_unification_scheme.C
-w Shows the flags of each log entry (different bits used to specify the "nature" of
the log - for example, control, audit, accounting, complementary, and so on).
-x <Start Entry Shows only entries from the specified log entry number and below, counting
Number> from the beginning of the log file.
-y <End Entry Shows only entries until the specified log entry number, counting from the
Number> beginning of the log file.
-z In case of an error (for example, wrong field value), continues to show log
entries.
The default behavior is to stop.
Parameter Description
Output
Each output line consists of a single log entry, whose fields appear in this format:
Note - The fields that show depends on the connection type.
ContentVersion Version 5
LogId Log ID 0
Examples
Example 1 - Show all log entries with both the date and the time for each log entry
fw log -l
Example 2 - Show all log entries that start after the specified timestamp
[Expert@MyGW:0]# fw log -l -s "June 12, 2018 12:33:00"
12Jun2018 12:33:00 5 N/A 1 accept MyGW > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; fg-1_client_in_rule_name: Default; fg-1_client_out_rule_name: Default; fg-1_server_in_rule_
name: Host Redirect; fg-1_server_out_rule_name: ; ProductName: FG; ProductFamily: Network;
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_
match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy
Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table:
TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp;
sport_svc: 64933; ProductFamily: Network;
[Expert@MyGW:0]#
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_
match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy
Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table:
TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp;
sport_svc: 64933; ProductFamily: Network;
12Jun2018 12:33:45 5 N/A 1 ctl MyGW > LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; description: Contracts; reason: Could not reach
"https://productcoverage.checkpoint.com/ProductCoverageService". Check DNS and Proxy configuration on the gateway.; Severity:
2; status: Failed; version: 1.0; failure_impact: Contracts may be out-of-date; update_service: 1; ProductName: Security
Gateway/Management; ProductFamily: Network;
[Expert@MyGW:0]#
Example 5 - Show all log entries with action "drop", show all field headers, and show log
flags
[Expert@MyGW:0]# fw log -l -q -w -c drop
HeaderDateHour: 12Jun2018 12:33:39; ContentVersion: 5; HighLevelLogKey: <max_null>; LogUid: ; SequenceNum: 1; Flags: 428292;
Action: drop; Origin: MyGW; IfDir: <; InterfaceName: eth0; Alert: ; LogId: 0; ContextNum: <max_null>; OriginSicName:
CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst:
MyFTPServer; proto: tcp; UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-
9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_
match_table: TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END;
ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933; ProductFamily: Network;
[Expert@MyGW:0]#
Example 6 - Show only log entries from 0 to 10 (counting from the beginning of the log file)
[Expert@MyGW:0]# fw log -l -x 0 -y 10
... ...
[Expert@MyGW:0]#
fw logswitch
Description
Switches the current active log file:
1. Closes the current active log file
2. Renames the current active log file
3. Creates a new active log file with the default name
Notes:
n By default, this command switches the active Security log file -
$FWDIR/log/fw.log
n You can specify to switch the active Audit log file - $FWDIR/log/fw.adtlog
Syntax
fw [-d] logswitch
[-audit] [<Name of Switched Log>]
-h <Target> [[+ | -]<Name of Switched Log>]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
Parameter Description
+ Specifies to copy the active log from the remote computer to the local computer.
Notes:
n If you specify the name of the switched log file, you must write it immediately
after this + (plus) parameter.
n The command copies the active log from the remote computer and saves it in
the $FWDIR/log/ directory on the local computer.
Parameter Description
- Specifies to transfer the active log from the remote computer to the local computer.
Notes:
n The command saves the copied active log file in the $FWDIR/log/ directory
on the local computer and then deletes the switched log file on the remote
computer.
n If you specify the name of the switched log file, you must write it immediately
after this - (minus) parameter.
n The default name of the saved log file is:
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
For example, MyGW__2018-03-26_174455.log
n If you specify the name of the switched log file, then the name of the saved log
file is:
<Gateway_Object_Name>__<Specified_Log_Name>.log
n When this command transfers the log file from the remote computer, it
compresses the file.
n As an alternative, you can use the "fw fetchlogs" on page 247 command.
Compression
When this command transfers the log files from the remote computer, it compresses the file with the gzip
command (see RFC 1950 to RFC 1952 for details). The algorithm is a variation of LZ77 method. The
compression ratio varies with the content of the log file and is difficult to predict. Binary data are not
compressed. Text data, such as user names and URLs, are compressed.
Example - Switching the active Security log on a Security Management Server or Security
Gateway
[Expert@MGMT:0]# fw logswitch
Log file has been switched to: 2018-06-13_182359.log
[Expert@MGMT:0]#
Example - Switching the active Security log on a managed Security Gateway and copying
the switched log
[Expert@MGMT:0]# fw logswitch -h MyGW +
Log file has been switched to: 2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MGMT:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R80.40/fw1/log/fw.log
/opt/CPsuite-R80.40/fw1/log/MyGW__2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MyGW:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R80.40/fw1/log/fw.log
/opt/CPsuite-R80.40/fw1/log/2018-06-13_185451.log
[Expert@MyGW:0]#
fw lslogs
Description
Shows a list of Security log files ($FWDIR/log/*.log) and Audit log files ($FWDIR/log/*.adtlog)
residing on the local computer or a remote computer.
Syntax
fw [-d] lslogs [-f <Name of Log File 1>] [-f <Name of Log File 2>] ...
[-f <Name of Log File N>] [-e] [-r] [-s {name | size | stime | etime}]
[<Target>]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
-f <Name of Specifies the name of the log file to show. Need to specify name only.
Log File>
Notes:
n If the log file name is not specified explicitly, the command shows all Security
log files ($FWDIR/log/*.log).
n File names may include * and ? as wildcards (for example, 2019-0?-*). If
you enter a wildcard, you must enclose it in double quotes or single quotes.
n You can specify multiple log files in one command. You must use the "-f"
parameter for each log file name pattern:
-f <Name of Log File 1> -f <Name of Log File 2> ... -
f <Name of Log File N>
-e Shows an extended file list. It includes the following information for each log file:
n Size - The total size of the log file and its related pointer files
n Creation Time - The time the log file was created
n Closing Time - The time the log file was closed
n Log File Name - The file name
Parameter Description
-s {name | Specifies the sort order of the log files using one of the following sort options:
size |
stime | n name - The file name
etime} n size - The file size
n stime - The time the log file was created (this is the default option)
n etime - The time the log file was closed
<Target> Specifies the remote Check Point computer, with which this local Check Point
computer has established SIC trust.
n If you run this command on a Security Management Server or Domain
Management Server, then <Target> is the applicable object's name or main
IP address of the Check Point Computer as configured in SmartConsole.
n If you run this command on a Security Gateway or Cluster Member, then
<Target> is the main IP address of the applicable object as configured in
SmartConsole.
[Expert@HostName:0]# fw lslogs
Size Log file name
9KB 2019-06-14_000000.log
11KB 2019-06-15_000000.log
9KB 2019-06-16_000000.log
10KB 2019-06-17_000000.log
9KB fw.log
[Expert@HostName:0]#
Example 4 - Showing only log files specified by the patterns and their extended information
Example 5 - Showing only log files specified by the patterns, sorting by name in reverse order
Example 6 - Showing only log files specified by the patterns, from a managed Security Gateway with main
IP address 192.168.3.53
fw mergefiles
Description
Merges several Security log files ($FWDIR/log/*.log) into a single log file.
Merges several Audit log files ($FWDIR/log/*.adtlog) into a single log file.
Important:
n Do not merge the active Security file $FWDIR/log/fw.log with other Security
switched log files.
Switch the active Security file $FWDIR/log/fw.log (with the "fw
logswitch" command) and only then merge it with other Security switched log
files.
n Do not merge the active Audit file $FWDIR/log/fw.adtlog with other Audit
switched log files.
Switch the active Audit file $FWDIR/log/fw.adtlog (with the "fw
logswitch" command) and only then merge it with other Audit switched log
files.
n This command unifies logs entries with the same Unique-ID (UID). If you rotate
the current active log file before all the segments of a specific log arrive, this
command merges the records with the same Unique ID from two different files,
into one fully detailed record.
n If the size of the final merged log file exceeds 2GB, this command creates a list
of merged files, where the size of each merged file size is not more than 2GB.
The user receives this warning:
Syntax
fw [-d] mergefiles [-r] [-s] [-t <Time Conversion File>] <Name of Log
File 1> <Name of Log File 2> ... <Name of Log File N> <Name of Merged
Log File>
Parameters
Parameter Description
-t <Time Conversion File> Specifies a full path and name of a file that instructs this
command how to adjust the times during the merge.
This is required if you merge log files from Log Servers
configured with different time zones.
The file format is:
Notes
n You must specify the absolute path and the
file name.
n The name of the time conversion file cannot
exceed 230 characters.
<Name of Log File 1> ... Specifies the log files to merge.
<Name of Log File N>
Notes:
n You must specify the absolute path and the
name of the input log files.
n The name of the input log file cannot exceed
230 characters.
Parameter Description
<Name of Merged Log File> Specifies the output merged log file.
Notes:
n The name of the merged log file cannot
exceed 230 characters.
n If a file with the specified name already exists,
the command stops and asks you to remove
the existing file, or to specify another name.
n The size of the merged log file cannot exceed
2 GB. In such scenario, the command creates
several merged log files, each not exceeding
the size limit.
[Expert@HostName:0]# ls -l $FWDIR/*.log
-rw-rw-r-- 1 admin root 189497 Sep 7 00:00 2019-09-07_000000.log
-rw-rw-r-- 1 admin root 14490 Sep 9 09:52 2019-09-09_000000.log
-rw-rw-r-- 1 admin root 30796 Sep 10 10:56 2019-09-10_000000.log
-rw-rw-r-- 1 admin root 24503 Sep 10 13:08 fw.log
[Expert@HostName:0]#
[Expert@HostName:0]# fw mergefiles -s $FWDIR/2019-09-07_000000.log $FWDIR/2019-09-09_000000.log
$FWDIR/2019-09-10_000000.log /var/log/2019-Sep-Merged.log
[Expert@HostName:0]#
[Expert@HostName:0]# ls -l /var/log/2019-Sep-Merged.log*
-rw-rw---- 1 admin root 213688 Sep 10 13:18 /var/log/2019-Sep-Merged.log
-rw-rw---- 1 admin root 8192 Sep 10 13:18 /var/log/2019-Sep-Merged.logLuuidDB
-rw-rw---- 1 admin root 80 Sep 10 13:18 /var/log/2019-Sep-Merged.logaccount_ptr
-rw-rw---- 1 admin root 2264 Sep 10 13:18 /var/log/2019-Sep-Merged.loginitial_ptr
-rw-rw---- 1 admin root 4448 Sep 10 13:18 /var/log/2019-Sep-Merged.logptr
[Expert@HostName:0]#
fw monitor
Description
Firewall Monitor is the Check Point traffic capture tool.
In a Security Gateway, traffic passes through different inspection points - Chain Modules in the Inbound
direction and then in the Outbound direction (see "fw ctl chain" on page 969).
The FW Monitor tool captures the traffic at each Chain Module in both directions.
You can later analyze the captured traffic with the same FW Monitor tool, or with special tools like
Wireshark.
Notes:
n Only one instance of "fw monitor" can run at a time.
n You can stop the "fw monitor" instance in one of these ways:
l In the shell, in which the "fw monitor" instance runs, press CTRL + C
keys
l In another shell, run this command: fw monitor -U
n Each time you run the FW Monitor, it compiles its temporary policy files
($FWDIR/tmp/monitorfilter.*).
n From R80.20, the FW Monitor is able to show the traffic accelerated with
SecureXL.
n For more information, see sk30583 and How to use FW Monitor.
fw6 monitor [-d] [-D] [-ci <Number of Inbound Packets>] [-co <Number
of Outbound Packets>] [-e <INSPECT Expression> | -f {<INSPECT Filter
File> | -}] [-F "<Source IP>,<Source Port>,<Dest IP>,<Dest
Port>,<Protocol Number>"] [-i] [-l <Length>] [-m {i,I,o,O,e,E}] [-o
<Output File> [-w]] [[-pi <Position>] [-pI <Position>] [-po
<Position>] [-pO <Position>] | -p all [-a]] [-T] [-u | -s] [-U] [-v
<VSID>] [-x <Offset>[,<Length>] [-w]]
Parameters
Parameter Description
-d Runs the command in debug mode and shows some information about
how the FW Monitor starts and compiles the specified INSPECT filter:
-D
n -d
Simple debug output.
n -D
Verbose output.
Best Practice - You can use the "-ci" and the "-co"
parameters together. This is especially useful during large
volumes of traffic. In such scenarios, FW Monitor may bind so
many resources (for writing to the console, or to a file) that
recognizing the break sequence (CTRL+C) might take a very
long time.
Parameter Description
Notes:
n Refer to the $FWDIR/lib/fwmonitor.def file for
useful macro definitions.
n See syntax examples below ("Examples for the "-e"
parameter" on page 1042).
-F "<Source Specifies the capture filter (for both accelerated and non-accelerated
IP>,<Source traffic):
Port>,<Dest
n <Source IP> - Specifies the source IP address
IP>,<Dest
Port>,<Protocol n <Source Port> - Specifies the source Port Number (see IANA
Number>" Service Name and Port Number Registry)
n <Dest IP> - Specifies the destination IP address
n <Dest Port> - Specifies the destination Port Number (see IANA
Service Name and Port Number Registry)
n <Protocol Number> - Specifies the Protocol Number (see
IANA Protocol Numbers)
Parameter Description
Notes:
n See syntax examples below ("Examples for the "-F"
parameter" on page 1054).
n The "-F" parameter uses these Kernel Debug Filters:
simple_debug_filter_saddr_<N>
"<IP Address>"
simple_debug_filter_sport_<N>
<1-65535>
simple_debug_filter_daddr_<N>
"<IP Address>"
simple_debug_filter_dport_<N>
<1-65535>
command_simple_debug_filter_
proto_<N> <0-254>
Parameter Description
-l <Length> Specifies the maximal length of the captured packets. FW Monitor reads
only the specified number of bytes from each packet.
Notes:
n This parameter is optional.
n This parameter lets you capture only the headers from
each packet (for example, IP and TCP) and omit the
payload. This decreases the size of the output file. This
also helps the internal FW Monitor buffer not to fill too
fast.
n Make sure to capture the minimal required number of
bytes, to capture the Layer 3 IP header and Layer 4
Transport header.
Parameter Description
-m {i, I, o, O, e, Specifies the capture mask (inspection point) in relation to Chain Modules,
E} in which the FW Monitor captures the traffic.
These are the inspection points, through which each packet passes on a
Security Gateway.
n -m i
Pre-Inbound only (before the packet enters a Chain Module in the
inbound direction)
n -m I
Post-Inbound only (after the packet passes a Chain Module in the
inbound direction)
n -m o
Pre-Outbound only (before the packet enters a Chain Module in the
outbound direction)
n -m O
Post-Outbound only (after the packet passes through a Chain
Module in the outbound direction)
n -m e
Pre-Outbound VPN only (before the packet enters a VPN Chain
Module in the outbound direction)
n -m E
Post-Outbound VPN only (after the packet passes through a VPN
Chain Module in the outbound direction)
Parameter Description
Notes:
n You can specify several capture masks (for example, to see NAT on
the egress packets, enter "... -m o O ...").
n You can use this capture mask parameter "-m {i, I, o, O,
e, E}" together with the chain module position parameter "-p{i
| I | o | O}".
n In the inbound direction:
l All chain positions before the FireWall Virtual Machine
module (the "fw ctl chain" on page 969 command shows it as
fw VM inbound) are Pre-Inbound.
l All chain modules after the FireWall Virtual Machine module
are Post-Inbound.
n In the outbound direction:
l All chain position before the FireWall Virtual Machine module
are Pre-Outbound.
l All chain modules after the FireWall Virtual Machine module
are Post-Outbound.
n By default, the FW Monitor captures the traffic only in the FireWall
Virtual Machine module.
n The packet direction relates to each specific packet, and not to the
connection's direction.
n The letters "q" and "Q" after the inspection point mean that the QoS
policy is applied to the interface.
Parameter Description
-o <Output File> Specifies the output file, to which FW Monitor writes the captured raw
data.
-pi <Position> Inserts the FW Monitor Chain Module at the specified position between
the kernel Chain Modules (see the "fw ctl chain" on page 969).
-pI <Position>
If the FW Monitor writes the captured data to the specified output file (with
-po <Position> the parameter "-o <Output File>"), it also writes the position of the
-pO <Position> FW Monitor chain module as one of the fields.
or You can insert the FW Monitor Chain Module in these positions only:
Parameter Description
Notes:
n <Position> can be one of these:
l A relative position number
In the output of the "fw ctl chain" on page 969 command,
refer to the numbers in the leftmost column (for example, 0,
5, 14).
l A relative position alias
In the output of the "fw ctl chain" on page 969 command,
refer to the internal chain module names in the rightmost
column in the parentheses (for example, sxl_in, fw,
cpas).
l An absolute position
In the output of the "fw ctl chain" on page 969 command,
refer to the numbers in the second column from the left (for
example, -7fffffff, -1fffff8, 7f730000). In the syntax, you must
write these numbers in the hexadecimal format (for example,
-0x7fffffff, -0x1fffff8, 0x7f730000).
n You can use this chain module position parameter "-p{i | I| o
| O} ..." together with the capture mask parameter "-m {i,
I, o, O, e, E}".
n In the inbound direction:
l All chain positions before the FireWall Virtual Machine
module (the "fw ctl chain" on page 969 command shows it as
"fw VM inbound") are Pre-Inbound.
l All chain modules after the FireWall Virtual Machine module
are Post-Inbound.
n In the outbound direction:
l All chain position before the FireWall Virtual Machine module
are Pre-Outbound.
l All chain modules after the FireWall Virtual Machine module
are Post-Outbound.
n By default, the FW Monitor captures the traffic only in the FireWall
Virtual Machine module.
n The chain module position parameters "-p{i | I| o | O}
..." parameters do not apply to the accelerated traffic, which is still
monitored at the default inbound and outbound positions.
n For more information about the inspection points, see the
applicable table below.
Parameter Description
Best Practice - Use this parameter if you do not save the output
to a file, but print it on the screen.
-u Shows UUID for each packet (it is only possible to print either the UUID, or
the SUUID - not both):
or
n -u
-s
Prints connection's Universal-Unique-ID (UUID) for each packet
n -s
Prints connection's Session UUID (SUUID) for each packet
-v <VSID> On a VSX Gateway or VSX Cluster Member, captures the packets on the
specified Virtual System or Virtual Router.
By default, FW Monitor captures the packets on all Virtual Systems and
Virtual Routers.
Example:
Parameter Description
-x <Offset> Specifies the position in each packet, where the FW Monitor starts to
[,<Length>] capture the data from each packet.
Optionally, it is also possible to limit the amount of data the FW Monitor
captures.
n <Offset>
Specifies how many bytes to skip from the beginning of each
packet. FW Monitor starts to capture the data from each packet only
after the specified number of bytes.
n <Length>
Specifies the maximal length of the captured packets. FW Monitor
reads only the specified number of bytes from each packet.
For example, to skip over the IP header and TCP header, enter "-x
52,96"
n Inbound
n Outbound
Generic Examples
Example 3 - Capturing only three Pre-Inbound packets at the FireWall Virtual Machine
module
[Expert@MyGW:0]# fw monitor -m i -ci 3
monitor: getting filter (from command line)
monitor: compiling
monitorfilter:
Compiled OK.
monitor: loading
monitor: monitoring (control-C to stop)
[vs_0][fw_1] eth0:i[40]: 192.168.204.1 -> 192.168.204.40 (TCP) len=40 id=31905
TCP: 53901 -> 22 ....A. seq=76111bb5 ack=f92e683b
[vs_0][fw_1] eth0:i[40]: 192.168.204.1 -> 192.168.204.40 (TCP) len=40 id=31906
TCP: 53901 -> 22 ....A. seq=76111bb5 ack=f92e68ef
[vs_0][fw_1] eth0:i[40]: 192.168.204.1 -> 192.168.204.40 (TCP) len=40 id=31907
TCP: 53901 -> 22 ....A. seq=76111bb5 ack=f92e69a3
monitor: unloading
Read 3 inbound packets and 0 outbound packets
[Expert@MyGW:0]#
Example 4 - Inserting the FW Monitor chain is before the chain #2 and capture only three
Pre-Inbound packets
Example 5 - Showing list of Chain Modules with the FW Monitor, when you do not change
the default capture positions
[Expert@MyGW:0]# fw ctl chain
in chain (17):
0: -7fffffff (0000000000000000) (00000000) SecureXL inbound (sxl_in)
1: -7ffffffe (0000000000000000) (00000000) SecureXL inbound CT (sxl_ct)
2: -7f800000 (ffffffff8b6718c0) (ffffffff) IP Options Strip (in) (ipopt_strip)
3: -70000000 (ffffffff8b6774d0) (ffffffff) fwmonitor (i/f side)
4: - 1fffff8 (ffffffff8b66f6f0) (00000001) Stateless verifications (in) (asm)
5: - 1fffff7 (ffffffff8b66f210) (00000001) fw multik misc proto forwarding
6: 0 (ffffffff8b8506a0) (00000001) fw VM inbound (fw)
7: 2 (ffffffff8b671d10) (00000001) fw SCV inbound (scv)
8: 4 (ffffffff8b061ed0) (00000003) QoS inbound offload chain module
9: 5 (ffffffff8b564d30) (00000003) fw offload inbound (offload_in)
10: 10 (ffffffff8b842710) (00000001) fw post VM inbound (post_vm)
11: 100000 (ffffffff8b7fd6c0) (00000001) fw accounting inbound (acct)
12: 22000000 (ffffffff8b0638d0) (00000003) QoS slowpath inbound chain mod (fg_sched)
13: 70000000 (ffffffff8b6774d0) (ffffffff) fwmonitor (IP side)
14: 7f730000 (ffffffff8b3c40b0) (00000001) passive streaming (in) (pass_str)
15: 7f750000 (ffffffff8b0e5b40) (00000001) TCP streaming (in) (cpas)
16: 7f800000 (ffffffff8b671870) (ffffffff) IP Options Restore (in) (ipopt_res)
out chain (16):
0: -7f800000 (ffffffff8b6718c0) (ffffffff) IP Options Strip (out) (ipopt_strip)
1: -70000000 (ffffffff8b6774d0) (ffffffff) fwmonitor (i/f side)
2: - 1fffff0 (ffffffff8b0d0190) (00000001) TCP streaming (out) (cpas)
3: - 1ffff50 (ffffffff8b3c40b0) (00000001) passive streaming (out) (pass_str)
4: - 1f00000 (ffffffff8b66f6f0) (00000001) Stateless verifications (out) (asm)
5: - 1ff (ffffffff8aeec0a0) (00000001) NAC Packet Outbound (nac_tag)
6: 0 (ffffffff8b8506a0) (00000001) fw VM outbound (fw)
7: 10 (ffffffff8b842710) (00000001) fw post VM outbound (post_vm)
8: 15000000 (ffffffff8b062540) (00000003) QoS outbound offload chain modul (fg_pol)
9: 21000000 (ffffffff8b0638d0) (00000003) QoS slowpath outbound chain mod (fg_sched)
10: 70000000 (ffffffff8b6774d0) (ffffffff) fwmonitor (IP side)
11: 7f000000 (ffffffff8b7fd6c0) (00000001) fw accounting outbound (acct)
12: 7f700000 (ffffffff8b0e4660) (00000001) TCP streaming post VM (cpas)
13: 7f800000 (ffffffff8b671870) (ffffffff) IP Options Restore (out) (ipopt_res)
14: 7f900000 (0000000000000000) (00000000) SecureXL outbound (sxl_out)
15: 7fa00000 (0000000000000000) (00000000) SecureXL deliver (sxl_deliver)
[Expert@MyGW:0]#
n Capture everything between hosts X,Z and hosts Y,Z in all Firewall kernel chains:
Note - You must specify protocol numbers in Decimal format. Refer to the
/etc/protocols file on the Security Gateway, or to IANA Protocol Numbers.
Examples:
l To specify TCP protocol with byte offset, use "ip_p=6"
Examples:
l To specify TCP protocol with byte offset, use "accept [9:1]=6"
l To specify UDP protocol with byte offset, use "accept [9:1]=11"
l To specify ICMP protocol with byte offset, use "accept [9:1]=1"
n In addition, you can explicitly use these expressions to specify protocols:
Summary Table
Example filters:
n Filter to capture everything on protocol X:
IANA Protocol Number (either in Dec ip_p = <IANA_ Example for TCP:
or in Hex) encapsulated in the IPv4 Protocol_
fw monitor -e "ip_p =
packet Number>
6, accept;"
Examples for UDP:
fw monitor -e "ip_p =
17, accept;"
fw monitor -e "ip_p =
0x11, accept;"
Example for ICMPv4:
fw monitor -e "ip_p =
1, accept;"
ACK fw monitor -
(0x10) e "th_flags
= 0x10,
accept;"
PSH fw monitor -
(0x8) e "th_flags
= 0x8,
accept;"
RST fw monitor -
(0x4) e "th_flags
= 0x4,
accept;"
URG fw monitor -
(0x20) e "th_flags
= 0x20,
accept;"
SYN + fw monitor -
ACK e "th_flags
= 0x12,
accept;"
PSH + fw monitor -
ACK e "th_flags
= 0x18,
accept;"
FIN + fw monitor -
ACK e "th_flags
= 0x11,
accept;"
TCP Flag Example
RST + fw monitor -
ACK e "th_flags
= 0x14,
accept;"
Option
Expression Example
Description
Syntax:
Parameters:
Parameter Explanation
<Offset> Specifies the offset relative to the beginning of the IP packet from where the
value should be read.
<Relational- Relational operator to express the relation between the packet data and the
Operator value:
n < - less than
n > - greater than
n <= - less than or equal to
n >= - greater than
n = or is - equal to
n != or is not - not equal to
<Value> One of the data types known to INSPECT (for example, an IP address, or
an integer).
Explanations:
n The IP-based protocols are stored in the IP packet as a byte at offset 9.
l To filter based on a Protocol encapsulated into IP, use this syntax:
n The Layer 3 IP Addresses are stored in the IP packet as double words at offset 12 (Source
address) and at offset 16 (Destination address).
n The Layer 4 Ports are stored in the IP packet as a word at offset 20 (Source port) and at offset 22
(Destination port).
l To filter based on a Source port, use this syntax:
Example filters:
n Capture everything between host X and host Y:
You must specify the network address and length of network mask (number of bits).
There are 3 options:
Example filters:
n Capture all traffic from Source IP x.x.x.x (any port) to Destination IP y.y.y.y (any port), over all
protocols:
n Capture all traffic between Host x.x.x.x (any port) and Host y.y.y.y (any port), over all protocols:
n Capture traffic from any Source IP from Source Port X to any Destination IP to Destination Port Y,
over all protocols:
n Capture traffic between all hosts, between Port X and Port Y, over all protocols:
n Capture traffic between all hosts, between all ports, over a Protocol with assigned number X:
Example 5 - Capture traffic between specific hosts between specific ports over specific
protocol
To capture only HTTP traffic between the Client 1.1.1.1 and the Server 2.2.2.2:
fw repairlog
Description
Check Point Security log file ($FWDIR/log/*.log) and Audit log files ($FWDIR/log/*.adtlog) are
databases, with special pointer files.
If these log pointer files become corrupted (which causes the inability to read the log file), this command
can rebuild them.
Syntax
Parameters
Parameter Description
fw sam
Description
Manages the Suspicious Activity Monitoring (SAM) rules. You can use the SAM rules to block connections
to and from IP addresses without the need to change or reinstall the Security Policy. For more information,
see sk112061.
You can create the Suspicious Activity Rules in two ways:
n In SmartConsole from Monitoring Results
n In CLI with the fw sam command
Notes:
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Monitoring (SAM) Rules. See sk79700.
n See the "fw sam_policy" and "sam_alert" commands.
n SAM rules consume some CPU resources on Security Gateway.
Best Practice - Set an expiration that gives you time to investigate, but
does not affect performance. Keep only the SAM rules that you need.
If you confirm that an activity is risky, edit the Security Policy, educate
users, or otherwise handle the risk.
n Logs for enforced SAM rules (configured with the fw sam command) are stored
in the $FWDIR/log/sam.dat file.
By design, the file is purged when the number of stored entries reaches 100,000.
This data log file contains the records in one of these formats:
<type>,<actions>,<expire>,<ipaddr>
<type>,<actions>,<expire>,<src>,<dst>,<dport>,<ip_p>
n SAM Requests are stored on the Security Gateway in the kernel table sam_
requests.
n IP Addresses that are blocked by SAM rules, are stored on the Security Gateway
in the kernel table sam_blocked_ips.
Syntax
n To add or cancel a SAM rule according to criteria:
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-t <Timeout>] [-l <Log Type>] [-C] [-e
<key=val>]+ [-r] -{n|i|I|j|J} <Criteria>
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] -D
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-r] -M -{i|j|n|b|q} all
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-r] -M -{i|j|n|b|q} <Criteria>
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
-s <SAM Specifies the IP address (in the X.X.X.X format) or resolvable HostName of the
Server> Security Gateway that enforces the command.
The default is localhost.
Parameter Description
-S <SIC Specifies the SIC name for the SAM server to be contacted. It is expected that the
Name of SAM SAM server has this SIC name, otherwise the connection fails.
Server>
Notes:
n If you do not explicitly specify the SIC name, the connection
continues without SIC names comparison.
n For more information about enabling SIC, refer to the OPSEC API
Specification.
n On VSX Gateway, run the fw vsx showncs -vs <VSID> command to
show the SIC name for the applicable Virtual System.
Notes:
n You can use this syntax only on Security Management Server or
Domain Management Server.
n VSX Gateways and VSX Cluster Members do not support
Suspicious Activity Monitoring (SAM) Rules. See sk79700.
Parameter Description
-D Cancels all inhibit ("-i", "-j", "-I", "-J") and notify ("-n") parameters.
Notes:
n To "uninhibit" the inhibited connections, run the fw sam command
with the "-C" or "-D" parameters.
n It is also possible to use this command for active SAM requests.
-C Cancels the fw sam command to inhibit connections with the specified parameters.
Notes:
n These connections are no longer inhibited (no longer rejected or
dropped).
n The command parameters must match the parameters in the
original fw sam command, except for the -t <Timeout>
parameter.
-t Specifies the time period (in seconds), during which the action is enforced.
<Timeout>
The default is forever, or until you cancel the fw sam command.
-e Specifies rule information based on the keys and the provided values.
<key=val>+
Multiple keys are separated by the plus sign (+).
Available keys are (each is limited to 100 characters):
n name - Security rule name
n comment - Security rule comment
n originator - Security rule originator's username
Notes:
n This parameter generates an alert when connections that match the
specified services or IP addresses pass through the Security
Gateway.
n This action does not inhibit / close connections.
Parameter Description
Notes:
n Each inhibited connection is logged according to the log type.
n Matching connections are rejected.
-I Inhibits (drops or rejects) new connections with the specified parameters, and closes
all existing connections with the specified parameters.
Notes:
n Matching connections are rejected.
n Each inhibited connection is logged according to the log type.
Notes:
n Matching connections are dropped.
n Each inhibited connection is logged according to the log type.
-J Inhibits new connections with the specified parameters, and closes all existing
connections with the specified parameters.
Notes:
n Matching connections are dropped.
n Each inhibited connection is logged according to the log type.
-M Monitors the active SAM requests with the specified actions and criteria.
all Gets all active SAM requests. This is used for monitoring purposes only.
Parameter Description
Parameter Description
Parameter Description
srv <Src IP> <Dest IP> <Port> Matches the specific Source IP address, Destination IP
<Protocol> address, Service (port number) and Protocol.
subsrv <Src IP> <Netmask> Matches the specific Source IP address, Destination IP
<Dest IP> <Netmask> <Port> address, Service (port number) and Protocol.
<Protocol>
Source and Destination IP addresses are assigned
according to the netmask.
subsrvs <Src IP> <Src Netmask> Matches the specific Source IP address, source
<Dest IP> <Port> <Protocol> netmask, destination netmask, Service (port number)
and Protocol.
subsrvd <Src IP> <Dest IP> Matches specific Source IP address, Destination IP,
<Dest Netmask> <Port> destination netmask, Service (port number) and
<Protocol> Protocol.
dstsrv <Dest IP> <Service> Matches specific Destination IP address, Service (port
<Protocol> number) and Protocol.
subdstsrv <Dest IP> <Netmask> Matches specific Destination IP address, Service (port
<Port> <Protocol> number) and Protocol.
Destination IP address is assigned according to the
netmask.
Parameter Description
fw sam_policy
Description
Manages the Suspicious Activity Policy editor that lets you work with these types of rules:
n Suspicious Activity Monitoring (SAM) rules.
See sk112061: How to create and view Suspicious Activity Monitoring (SAM) Rules.
n Rate Limiting rules.
See sk112454: How to configure Rate Limiting rules for DoS Mitigation.
Also, see these commands:
n "fw sam" on page 271
n "sam_alert" on page 370
Notes:
n You can run these commands interchangeably: 'fw sam_policy' and 'fw
samp'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy
add <options>
batch
del <options>
get <options>
fw [-d] samp
add <options>
batch
del <options>
get <options>
Parameters
Parameter Description
del <options> Deletes one configured Rate Limiting rule one at a time.
See "fw sam_policy del" on page 297.
fw sam_policy add
Description
The 'fw sam_policy add' and 'fw6 sam_policy add' commands let you:
n Add one Suspicious Activity Monitoring (SAM) rule at a time.
n Add one Rate Limiting rule at a time.
Notes:
n You can run these commands interchangeably: 'fw sam_policy add' and
'fw samp add'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] ip <IP Filter Arguments>
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] ip <IP Filter Arguments>
fw [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] quota <Quota Filter Arguments>
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] quota <Quota Filter Arguments
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
-u Optional.
Specifies that the rule category is User-defined.
Default rule category is Auto.
-a {d | n | Mandatory.
b}
Specifies the rule action if the traffic matches the rule conditions:
n d - Drop the connection.
n n - Notify (generate a log) about the connection and let it through.
n b - Bypass the connection - let it through without checking it against the policy
rules.
Note - Rules with action set to Bypass cannot have a log or limit specification.
Bypassed packets and connections do not count towards overall number of
packets and connection for limit enforcement of type ratio.
-l {r | a} Optional.
Specifies which type of log to generate for this rule for all traffic that matches:
n -r - Generate a regular log
n -a - Generate an alert log
Parameter Description
-t Optional.
<Timeout>
Specifies the time period (in seconds), during which the rule will be enforced.
Default timeout is indefinite.
-f <Target> Optional.
Specifies the target Security Gateways, on which to enforce the Rate Limiting rule.
<Target> can be one of these:
n all - This is the default option. Specifies that the rule should be enforced on
all managed Security Gateways.
n Name of the Security Gateway or Cluster object - Specifies that the rule should
be enforced only on this Security Gateway or Cluster object (the object name
must be as defined in the SmartConsole).
n Name of the Group object - Specifies that the rule should be enforced on all
Security Gateways that are members of this Group object (the object name
must be as defined in the SmartConsole).
-n "<Rule Optional.
Name>"
Specifies the name (label) for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write a
backslash (\) character. Example:
-c "<Rule Optional.
Comment>"
Specifies the comment for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write a
backslash (\) character. Example:
Parameter Description
-o "<Rule Optional.
Originator
Specifies the name of the originator for this rule.
>"
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write a
backslash (\) character. Example:
-z "<Zone>" Optional.
Specifies the name of the Security Zone for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
Parameter Description
Important:
n The Quota rules are not applied immediately to the Security
Gateway. They are only registered in the Suspicious Activity
Monitoring (SAM) policy database. To apply all the rules from the
SAM policy database immediately, add "flush true" in the fw
samp add command syntax.
n Explanation:
For new connections rate (and for any rate limiting in general), when
a rule's limit is violated, the Security Gateway also drops all packets
that match the rule.
The Security Gateway computes new connection rates on a per-
second basis.
At the start of the 1-second timer, the Security Gateway allows all
packets, including packets for existing connections.
If, at some point, during that 1 second period, there are too many
new connections, then the Security Gateway blocks all remaining
packets for the remainder of that 1-second interval.
At the start of the next 1-second interval, the counters are reset, and
the process starts over - the Security Gateway allows packets to
pass again up to the point, where the rule’s limit is violated.
Explanation for the IP Filter Arguments syntax for Suspicious Activity Monitoring (SAM) rules
Argument Description
-m <Source Mask> Specifies the Source subnet mask (in dotted decimal format - x.y.z.w).
-M <Destination Specifies the Destination subnet mask (in dotted decimal format -
Mask> x.y.z.w).
-p <Port> Specifies the port number (see IANA Service Name and Port Number
Registry).
Explanation for the Quota Filter Arguments syntax for Rate Limiting rules
Argument Description
flush true Specifies to compile and load the quota rule to the
SecureXL immediately.
Notes:
n Default is: source-negated false
n The source-negated true processes all
source types, except the specified type.
Argument Description
Notes:
n Default is: destination-negated false
n The destination-negated true will
process all destination types except the specified
type
Argument Description
Notes:
n Default is: service-negated false
n The service-negated true will process all
traffic except the traffic with the specified
protocols and ports
Argument Description
Argument Description
Examples
Explanations:
n This rule drops packets for all connections (-a d) that exceed the quota set by this rule,
including packets for existing connections.
n This rule logs packets (-l r) that exceed the quota set by this rule.
n This rule will expire in 3600 seconds (-t 3600).
n This rule limits the rate of creation of new connections to 5 connections per second (new-conn-
rate 5) for any traffic (service any) from the source IP addresses in the range 172.16.7.11
- 172.16.7.13 (source range:172.16.7.11-172.16.7.13).
Note - The limit of the total number of log entries per second is configured with the fwaccel dos
config set -n <rate> command.
n This rule will be compiled and loaded on the SecureXL, together with other rules in the Suspicious
Activity Monitoring (SAM) policy database immediately, because this rule includes the "flush
true" parameter.
Explanations:
n This rule logs and lets through all packets (-a n) that exceed the quota set by this rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to all packets except (service-negated true) the packets with IP protocol
number 1, 50-51, 6 port 443 and 17 port 53 (service 1,50-51,6/443,17/53).
n This rule applies to all packets from source IP addresses that are assigned to the country with
specified country code (cc:QQ).
n This rule does not let any traffic through (byte-rate 0) except the packets with IP protocol
number 1, 50-51, 6 port 443 and 17 port 53.
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to packets from the Autonomous System number 64500 (asn:AS64500).
n This rule applies to packets from source IPv6 addresses FFFF:C0A8:1100/120 (cidr:
[::FFFF:C0A8:1100]/120).
n This rule applies to all traffic (service any).
n This rule does not let any traffic through (pkt-rate 0).
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
Explanations:
n This rule bypasses (-a b) all packets that match this rule.
Note - The Access Control Policy and other types of security policy rules still apply.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to packets from the source IP addresses in the range 172.16.8.17 -
172.16.9.121 (range:172.16.8.17-172.16.9.121).
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not log any packets (the -l r parameter is not specified).
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to all traffic (service any).
n This rule applies to all sources except (source-negated true) the source IP addresses that
are assigned to the country with specified country code (cc:QQ).
n This rule limits the maximal number of concurrent active connections to 655/65536=~1%
(concurrent-conns-ratio 655) for any traffic (service any) except (service-
negated true) the connections from the source IP addresses that are assigned to the country
with specified country code (cc:QQ).
n This rule counts connections, packets, and bytes for traffic only from sources that match this rule,
and not cumulatively for this rule.
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
fw sam_policy batch
Description
The 'fw sam_policy batch' and 'fw6 sam_policy batch' commands let you:
n Add and delete many Suspicious Activity Monitoring (SAM) rules at a time.
n Add and delete many Rate Limiting rules at a time.
Notes:
n You can run these commands interchangeably: 'fw sam_policy batch'
and 'fw samp batch'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all of the
Cluster Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Procedure
n Enter one "add" or "del" command on each line, on as many lines as necessary.
Start each line with only "add" or "del" parameter (not with "fw samp").
n Use the same set of parameters and values as described in these commands:
l fw sam_policy add
l fw sam_policy del
n Terminate each line with a Return (ASCII 10 - Line Feed) character (press Enter).
add -a d -l r -t 3600 -c "Limit\ conn\ rate\ to\ 5\ conn/sec from\ these\ sources" quota service any source
range:172.16.7.13-172.16.7.13 new-conn-rate 5
del <501f6ef0,00000000,cb38a8c0,0a0afffe>
EOF
[Expert@HostName]#
fw sam_policy del
Description
The 'fw sam_policy del' and 'fw6 sam_policy del' commands let you:
n Delete one configured Suspicious Activity Monitoring (SAM) rule at a time.
n Delete one configured Rate Limiting rule at a time.
Notes:
n You can run these commands interchangeably: 'fw sam_policy del' and
'fw samp del'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Parameters
Parameter Description
'<Rule UID>' Specifies the UID of the rule you wish to delete.
Important:
n The quote marks and angle
brackets ('<...>') are
mandatory.
n To see the Rule UID, run the
"fw sam_policy get"
command.
Procedure
1. List all the existing rules in the Suspicious Activity Monitoring policy database
List all the existing rules in the Suspicious Activity Monitoring policy database.
n For IPv4, run:
fw sam_policy get
operation=add uid=<5ac3965f,00000000,3403a8c0,0000264a>
target=all timeout=300 action=notify log=log name=Test\ Rule
comment=Notify\ about\ traffic\ from\ 1.1.1.1 originator=John\
Doe src_ip_addr=1.1.1.1 req_tpe=ip
Explanation:
The fw samp del and fw6 samp del commands only remove a rule from the persistent
database. The Security Gateway continues to enforce the deleted rule until the next time you
compiled and load a policy. To force the rule deletion immediately, you must enter a flush-only
add rule right after the fw samp del and fw6 samp del command. This flush-only add rule
immediately deletes the rule you specified in the previous step, and times out in 2 seconds.
Best Practice - Specify a short timeout period for the flush-only rules. This
prevents accumulation of rules that are obsolete in the database.
fw sam_policy get
Description
The 'fw sam_policy get' and 'fw6 sam_policy get' commands let you:
n Show all the configured Suspicious Activity Monitoring (SAM) rules.
n Show all the configured Rate Limiting rules.
Notes:
n You can run these commands interchangeably: 'fw sam_policy get' and
'fw samp get'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t <Type> [+
{-v '<Value>'}] [-n]]
fw6 [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t <Type>
[+{-v '<Value>'}] [-n]]
Parameters
Note - All these parameters are optional.
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
-u '<Rule Prints the rule specified by its Rule UID or its zero-based rule index.
UID>'
The quote marks and angle brackets ('<...>') are mandatory.
Examples
uid
<5ac3965f,00000000,3403a8c0,0000264a>
target
all
timeout
2147483647
action
notify
log
log
name
Test\ Rule
comment
Notify\ about\ traffic\ from\ 1.1.1.1
originator
John\ Doe
src_ip_addr
1.1.1.1
req_type
ip
fw showuptables
Description
Shows the formatted contents of the Unified Policy kernel tables.
Syntax
fw [-d] showuptables
[-h]
[-i]
Parameters
Parameter Description
fw stat
Description
Shows the following information about the policy on the Security Gateway:
n Name of the installed policy.
n Date of the last policy installation.
n Names of the interfaces protected by the installed policy, and in which direction the policy protects
them.
Important - This command is outdated and exists only for backward compatibility with
very old versions. Use the "cpstat -f policy fw" command instead (see
"cpstat" on page 912).
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
Parameter Description
<Name of Specifies the name of the Security Gateway or Cluster Member object (as defined in
Object> SmartConsole), from which to show the information. Use this parameter only on the
Management Server.
This requires the established SIC with that Check Point computer.
[Expert@MyGW:0]# fw stat
HOST POLICY DATE
localhost MyGW_Policy 10Sep2018 14:01:25 : [>eth0] [<eth0] [>eth1]
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw stat -s
HOST IF POLICY DATE
localhost >eth0 MyGW_Policy 10Sep2018 14:01:25 :
localhost <eth0 MyGW_Policy 10Sep2018 14:01:25 :
localhost >eth1 MyGW_Policy 10Sep2018 14:01:25 :
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw stat -l
HOST IF POLICY DATE TOTAL REJECT DROP ACCEPT LOG
localhost >eth0 MyGW_Policy 10Sep2018 14:01:25 : 14377 0 316 14061 1
localhost <eth0 MyGW_Policy 10Sep2018 14:01:25 : 60996 0 0 60996 0
localhost >eth1 MyGW_Policy 10Sep2018 14:01:25 : 304 0 304 0 0
[Expert@MyGW:0]#
fw tab
Description
Shows data from the specified Security Gateway kernel tables.
This command also lets you change the content of dynamic kernel tables. You cannot change the content
of static kernel tables.
Kernel tables (also known as State tables) store data that the Firewall and other Software Blades use to
inspect packets. These kernel tables are a critical component of Stateful Inspection.
Best Practices:
n Use the "fw tab -t connections -f" command to see the detailed (and
more technical) information about the current connections in the Connections
kernel table (ID 8158).
n Use the "fw ctl conntab" on page 973 command to see the simplified information
about the current connections in the Connections kernel table (ID 8158).
Syntax
fw [-d]
{-h | -help}
[-v] [-t <Table>] [-c | -s] [-f] [-o <Output File>] [-r] [-u | -
m <Limit>] [-a -e "<Entry>"] [ -x [-e "<Entry>"]] [-y] [<Name of
Object>]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
Parameter Description
fw tab -s
Because the output of this command is very long, we recommend to redirect it to a file.
For example:
Warning - If you add a wrong entry, you can make your Security Gateway
unresponsive.
-c Shows formatted kernel table data in the common format. This is the default.
Important - If the specified kernel table is large, this consumes a large amount
of RAM. This can make your Security Gateway unresponsive.
-o Saves the output in the specified file in the CL format as a Check Point Firewall log.
<Output
You can later open this file with the "fw log" on page 1007 command.
File>
If you do not specify the full path explicitly, this command saves the output file in the
current working directory.
Parameter Description
Important - If the specified kernel table is large, this consumes a large amount
of RAM. This can make your Security Gateway unresponsive.
-v Shows the CoreXL Firewall instance number as a prefix for each line.
-x [-e Deletes all entries or the specified entry from the specified kernel table.
<
You can use this parameter only on the local Security Gateway.
Entry>]
Warning - If you delete a wrong entry, you can break the current connections
through your Security Gateway. This includes the remote SSH connection.
<Name Specifies the name of the Security Gateway or Cluster Member object (as defined in
of SmartConsole), from which to show the information. Use this parameter only on the
Object> Management Server.
This requires the established SIC with that Check Point computer.
If you do not use this parameter, the default is localhost.
[Expert@MyGW:0]# fw tab -s
HOST NAME ID #VALS #PEAK #SLINKS
localhost vsx_firewalled 0 1 1 0
localhost firewalled_list 1 2 2 0
localhost external_firewalled_list 2 0 0 0
localhost management_list 3 2 2 0
localhost external_management_list 4 0 0 0
localhost log_server_list 5 0 0 0
localhost ips1_sensors_list 6 0 0 0
localhost all_tcp_services 7 141 141 0
localhost tcp_services 8 1 1 0
... ...
localhost connections 8158 2 56 2
... ...
localhost up_251_rule_to_clob_uuid 14083 0 0 0
... ...
localhost urlf_cache_tbl 29 0 0 0
localhost proxy_outbound_conn_tbl 30 0 0 0
localhost dns_cache_tbl 31 0 0 0
localhost appi_referrer_table 32 0 0 0
localhost uc_hits_htab 33 0 0 0
localhost uc_cache_htab 34 0 0 0
localhost uc_incident_to_instance_htab 35 0 0 0
localhost fwx_cntl_dyn_ghtab 36 0 0 0
localhost frag_table 37 0 0 0
localhost dos_blacklist_notifs 38 0 0 0
[Expert@MyGW:0]#
localhost:
Date: Sep 10, 2018
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName:
cn=cp_mgmt,o=MyGW..44jkyv; : (+)====================================(+); Table_Name: connections; : (+);
Attributes: dynamic, id 8158, attributes: keep, sync, aggressive aging, kbufs 21 22 23 24 25 26 27 28 29 30
31 32 33 34, expires 25, refresh, , hashsize 2097152, unlimited; LastUpdateTime: 10Sep2018 20:30:48;
ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName:
cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction: 1; Source: 192.168.204.40;
SPort: 55411; Dest: 192.168.204.1; DPort: 53; Protocol: udp; CPTFMT_sep: ;; Type: 131073; Rule: 0; Timeout:
335; Handler: 0; Ifncin: -1; Ifncout: -1; Ifnsin: 1; Ifnsout: 1; Bits: 0000780000000000; Expires: 2/40;
LastUpdateTime: 10Sep2018 20:30:48; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName:
cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction: 0; Source: 192.168.204.1;
SPort: 53901; Dest: 192.168.204.40; DPort: 22; Protocol: tcp; CPTFMT_sep: ;; Type: 114689; Rule: 2;
Timeout: 481; Handler: 0; Ifncin: 1; Ifncout: 1; Ifnsin: -1; Ifnsout: -1; Bits: 02007800000f9000; Expires:
2002/3600; LastUpdateTime: 10Sep2018 20:30:48; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName:
cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction: 1; Source: 192.168.204.40;
SPort: 22; Dest: 192.168.204.1; DPort: 53901; Protocol: tcp; CPTFMT_sep_1: ->; Direction_1: 0; Source_1:
192.168.204.1; SPort_1: 53901; Dest_1: 192.168.204.40; DPort_1: 22; Protocol_1: tcp; FW_symval: 2053;
LastUpdateTime: 10Sep2018 20:30:48; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName:
cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction: 0; Source: 192.168.204.1;
SPort: 51702; Dest: 192.168.204.40; DPort: 22; Protocol: tcp; CPTFMT_sep: ;; Type: 114689; Rule: 2;
Timeout: 481; Handler: 0; Ifncin: 1; Ifncout: 1; Ifnsin: -1; Ifnsout: -1; Bits: 02007800000f9000; Expires:
3600/3600; LastUpdateTime: 10Sep2018 20:30:48; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName:
cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction: 1; Source: 192.168.204.40;
SPort: 22; Dest: 192.168.204.1; DPort: 51702; Protocol: tcp; CPTFMT_sep_1: ->; Direction_1: 0; Source_1:
192.168.204.1; SPort_1: 51702; Dest_1: 192.168.204.40; DPort_1: 22; Protocol_1: tcp; FW_symval: 2053;
LastUpdateTime: 10Sep2018 20:30:48; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName:
cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction: 0; Source: 192.168.204.1;
SPort: 53; Dest: 192.168.204.40; DPort: 55411; Protocol: udp; CPTFMT_sep_1: ->; Direction_2: 1; Source_2:
192.168.204.40; SPort_2: 55411; Dest_2: 192.168.204.1; DPort_2: 53; Protocol_2: udp; FW_symval: 2054;
LastUpdateTime: 10Sep2018 20:30:48; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
[Expert@MyGW:0]#
Example 5 - Show the raw data from the Connections table and show the IDs of CoreXL Firewall instances
for each entry
fw unloadlocal
Description
Uninstalls all policies from the Security Gateway or Cluster Member.
Warning
1. The "fw unloadlocal" command prevents all traffic from passing through the Security
Gateway (Cluster Member), because it disables the IP Forwarding in the Linux kernel on the
Security Gateway (Cluster Member).
2. The "fw unloadlocal" command removes all policies from the Security Gateway (Cluster
Member). This means that the Security Gateway (Cluster Member) accepts all incoming
connections destined to all active interfaces without any filtering or protection enabled.
Notes
n If you need to remove the current policy, but keep the Security Gateway (Cluster Member)
protected, then run the "comp_init_policy" on page 871 command on the Security Gateway (Cluster
Member).
n To load the policies on the Security Gateway (Cluster Member), run one of these commands on the
Security Gateway (Cluster Member), or reboot:
l "fw fetch" on page 998
l "cpstart" on page 911
n See the related command "fwm unload" on page 333.
Syntax
fw [-d] unloadlocal
Parameters
Parameter Description
Example
[Expert@MyGW:0]# fw unloadlocal
net.ipv4.conf.default.mc_forwarding = 0
net.ipv4.conf.default.forwarding = 0
net.ipv4.conf.all.mc_forwarding = 0
net.ipv4.conf.all.forwarding = 0
[Expert@MyGW:0]#
fw up_execute
Description
Executes the offline Unified Policy.
Syntax
Parameters
Parameter Description
For example:
n TCP = 6
n UDP = 17
n ICMP = 1
Parameter Description
Example 1
Per Layer:
------------
Layer name: Network
Layer id: 0
Match status: MATCH
Match action: Accept
Matched rule: 2
Possible rules: 2 16777215
[Expert@MyGW:0]#
Example 2
Per Layer:
------------
Layer name: Network
Layer id: 0
Match status: MATCH
Match action: Accept
Matched rule: 2
Possible rules: 2 16777215
[Expert@MyGW:0]#
fw ver
Description
Shows this information about the Security Gateway software:
n Major version
n Minor version
n Build number
n Kernel build number
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
ver Shows:
n Major version
n Minor version
n Build number
-k n Shows:
n Major version
n Minor version
n Build number
n Kernel build number
Example 1
[Expert@MyGW:0]# fw ver -k
This is Check Point's software version R80.40 - Build 123
[Expert@MyGW:0]#
Example 2
[Expert@MyGW:0]# fw ver -k
This is Check Point's software version R80.40 - Build 456
[Expert@MyGW:0]#
fwboot
Description
Configures Check Point boot options.
Important - Most of these commands are for Check Point use only.
Syntax
[Expert@HostName:0]# $FWDIR/boot/fwboot
bootconf <options>
corexl <options>
cpuid <options>
default <options>
fwboot_ipv6 <options>
fwdefault <options>
ha_conf <options>
ht <options>
multik_reg <options>
post_drv <options>
Parameters
Parameter Description
cpuid <options> Shows the number of available CPUs and CPU cores on this Security
Gateway.
See "fwboot cpuid" on page 1123.
default Loads the specified Default Filter policy on this Security Gateway.
<options>
Se e "fwboot default" on page 1125.
Parameter Description
fwboot_ipv6 Shows the internal memory address of the hook function for the specified
<options> CoreXL Firewall instance.
See "fwboot fwboot_ipv6" on page 1126.
fwdefault Loads the specified Default Filter policy on this Security Gateway.
<options>
See "fwboot fwdefault" on page 1127.
ht <options> Shows and configures the SMT (HyperThreading) feature (sk93000) boot
options.
See "fwboot ht" on page 1129.
multik_reg Shows the internal memory address of the registration function for the
<options> specified CoreXL Firewall instance.
See "fwboot multik_reg" on page 1132.
fwboot bootconf
Description
Configures boot security options.
Notes:
n You must run this command from the Expert mode.
n The settings are saved in the
$FWDIR/boot/boot.conf file.
Parameters
Parameter Description
get_def Shows the configured path and the name of the Default Filter policy file
(default is $FWDIR/boot/default.bin).
Parameter Description
Notes:
n In the $FWDIR/boot/boot.conf file, refer to the value
of the COREXL_INSTALLED.
n To configure CoreXL, use the "cpconfig" on page 892
menu.
Parameter Description
set_def Configures the path and the name of the Default Filter policy file (default is
[< $FWDIR/boot/default.bin).
/path/filename>]
Notes:
n In the $FWDIR/boot/boot.conf file, refer to the value
of the DEFAULT_FILTER_PATH.
n If you do not specify the path and the name explicitly, then
the value of the DEFAULT_FILTER_PATH is set to 0.
As a result, Security Gateway does not load a Default Filter
during boot.
Notes:
n In the $FWDIR/boot/boot.conf file, refer to the value
of the IPV6_INSTALLED.
n Configure the IPv6 Support in Gaia Portal, or Gaia Clish.
See the R80.40 Gaia Administration Guide.
Parameter Description
fwboot corexl
Description
Configures and monitors the CoreXL.
Important:
n The configuration commands are for Check Point use only. To configure
CoreXL, use the Check Point CoreXL option in the "cpconfig" on page 892
menu.
n After all changes in CoreXL configuration on the Security Gateway, you must
reboot it.
n In Cluster, you must configure all the Cluster Members in the same way
Parameters
Parameter Description
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl core_count
[Expert@MyGW:0]# echo $?
4
[Expert@MyGW:0]#
[Expert@MyGW:0]# cat /proc/cpuinfo | grep processor
processor : 0
processor : 1
processor : 2
processor : 3
[Expert@MyGW:0]#
Parameter Description
curr_ Returns the current configured number of IPv4 CoreXL Firewall instances.
instance4_
count Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl curr_
instance4_count
[Expert@MyGW:0]# echo $?
3
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 11 | 18
1 | Yes | 2 | 12 | 18
2 | Yes | 1 | 13 | 18
[Expert@MyGW:0]#
curr_ Returns the current configured number of IPv6 CoreXL Firewall instances.
instance6_
count Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl curr_
instance6_count
[Expert@MyGW:0]# echo $?
2
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw6 ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 11 | 18
1 | Yes | 2 | 12 | 18
[Expert@MyGW:0]#
def_by_ Sets the default configuration for CoreXL according to the specified allowed number
allowed of CPU cores.
[n]
def_ Returns the default number of IPv4 CoreXL Firewall instances for this Security
instance4_ Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl def_
instance4_count
[Expert@MyGW:0]# echo $?
3
[Expert@MyGW:0]#
Parameter Description
def_ Returns the default number of IPv4 CoreXL Firewall instances for this Security
instance6_ Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl def_
instance6_count
[Expert@MyGW:0]# echo $?
2
[Expert@MyGW:0]#
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl eligible
[Expert@MyGW:0]# echo $?
1
[Expert@MyGW:0]#
[-v] Enables CoreXL with 'n' IPv4 Firewall instances and optionally 'k' IPv6 Firewall
enable [n] instances.
[-6 k]
n -v - Leaves the high memory (vmalloc) unchanged.
n n - Denotes the number of IPv4 CoreXL Firewall instances.
n k - Denotes the number of IPv6 CoreXL Firewall instances.
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl installed
[Expert@MyGW:0]# echo $?
1
[Expert@MyGW:0]#
Parameter Description
max_ Returns the maximal allowed number of IPv4 CoreXL Firewall instances for this
instance4_ Security Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instance4_count
[Expert@MyGW:0]# echo $?
4
[Expert@MyGW:0]#
max_ Returns the maximal allowed number of IPv4 CoreXL Firewall instances for a
instances Security Gateway that runs Gaia with 32-bit kernel.
4_32bit
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances4_32bit
[Expert@MyGW:0]# echo $?
14
[Expert@MyGW:0]#
max_ Returns the maximal allowed number of IPv4 CoreXL Firewall instances for a
instances Security Gateway that runs Gaia with 64-bit kernel.
4_64bit
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances4_64bit
[Expert@MyGW:0]# echo $?
38
[Expert@MyGW:0]#
max_ Returns the maximal allowed number of IPv6 CoreXL Firewall instances for this
instance6_ Security Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instance6_count
[Expert@MyGW:0]# echo $?
3
[Expert@MyGW:0]#
Parameter Description
max_ Returns the total maximal allowed number of CoreXL Firewall instances (IPv4 and
instances_ IPv6) for this Security Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances_count
[Expert@MyGW:0]# echo $?
40
[Expert@MyGW:0]#
max_ Returns the total maximal allowed number of CoreXL Firewall instances for a Security
instances_ Gateway that runs Gaia with 32-bit kernel.
32bit
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances_32bit
[Expert@MyGW:0]# echo $?
16
[Expert@MyGW:0]#
max_ Returns the total maximal allowed number of CoreXL Firewall instances for a Security
instances_ Gateway that runs Gaia with 64-bit kernel.
64bit
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances_64bit
[Expert@MyGW:0]# echo $?
40
[Expert@MyGW:0]#
min_ Returns the minimal allowed number of IPv4 CoreXL Firewall instances.
instance_
count Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl min_
instance_count
[Expert@MyGW:0]# echo $?
2
[Expert@MyGW:0]#
Parameter Description
unsupporte Returns 1 if at least one feature is configured, which CoreXL does not support.
d_features
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl
unsupported_features
corexl unsupported feature: QoS is configured.
[Expert@MyGW:0]# echo $?
1
[Expert@MyGW:0]#
fwboot cpuid
Description
Shows the number of available CPUs and CPU cores on this Security Gateway.
Syntax
Parameters
Parameter Description
No Parameters Shows the IDs of the available CPU cores on this Security Gateway.
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid
3 2 1 0
[Expert@MyGW:0]#
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid -c
[Expert@MyGW:0]# echo $?
4
[Expert@MyGW:0]#
Parameter Description
--full Shows a full map of the available CPUs and CPU cores on this Security Gateway.
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid --full
cpuid phys_id core_id thread_id
0 0 0 0
1 2 0 0
2 4 0 0
3 6 0 0
[Expert@MyGW:0]#
ht_aware Shows the CPU cores in the order of their awareness of Hyper-Threading.
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid ht_aware
3 2 1 0
[Expert@MyGW:0]#
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid -n
[Expert@MyGW:0]# echo $?
4
[Expert@MyGW:0]#
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid --
possible
[Expert@MyGW:0]# echo $?
4
[Expert@MyGW:0]#
fwboot default
Description
Loads the specified Default Filter policy on this Security Gateway.
Notes:
n You must run this command from the Expert mode.
n This command is the same as the "fwboot default" above
command.
n Refer to these related commands:
l "fw defaultgen" on page 996
l "fwboot bootconf" on page 1111
l "control_bootsec" on page 874
l "comp_init_policy" on page 871
Syntax
Parameters
Parameter Description
<Default Filter Policy Specifies the full path and name of the Default Filter policy
File> file.
The default is $FWDIR/boot/default.bin
Example
fwboot fwboot_ipv6
Description
Shows the internal memory address of the hook function for the specified CoreXL Firewall instance.
Syntax
Parameters
Parameter Description
Example
fwboot fwdefault
Description
Loads the specified Default Filter policy on this Security Gateway.
Notes:
n You must run this command from the Expert mode.
n This command is the same as the "fwboot default" on
page 1125command.
n Refer to these related commands:
l "fw defaultgen" on page 996
l "fwboot bootconf" on page 1111
l "control_bootsec" on page 874
l "comp_init_policy" on page 871
Syntax
Parameters
Parameter Description
<Default Filter Policy Specifies the full path and name of the Default Filter policy
File> file.
The default file is $FWDIR/boot/default.bin
Example
fwboot ha_conf
Description
Configures the cluster mechanism during boot.
Notes:
n You must run this command from the Expert mode.
n Refer to these related commands:
l "fw defaultgen" on page 996
l "fwboot bootconf" on page 1111
l "control_bootsec" on page 874
l "comp_init_policy" on page 871
n To install a cluster, see the R80.40 Installation and Upgrade Guide.
n To configure a cluster , see the R80.40 Installation and Upgrade Guide and
R80.40 ClusterXL Administration Guide.
Syntax
fwboot ht
Description
Shows and configures the boot options for the SMT (HyperThreading) feature (sk93000).
Important - This command is for Check Point use only. To configure SMT
(HyperThreading) feature, follow sk93000.
Note - You must run this command from the Expert mode.
Syntax
[Expert@HostName:0]# $FWDIR/boot/fwboot ht
--core_override [<number>]
--disable
--eligible
--enable
--enabled
--supported
Parameters
Parameter Description
Parameter Description
--eligible Returns a number that shows if this system is eligible for the SMT
feature. Run:
[Expert@MyGW:0]# $FWDIR/boot/fwboot ht --
eligible
[Expert@MyGW:0]# echo $?
[Expert@MyGW:0]# $FWDIR/boot/fwboot ht --
enabled
[Expert@MyGW:0]# echo $?
Parameter Description
--supported Returns a number that shows if this system supports the SMT feature.
Run:
[Expert@MyGW:0]# $FWDIR/boot/fwboot ht --
supported
[Expert@MyGW:0]# echo $?
fwboot multik_reg
Description
Shows the internal memory address of the registration function for the specified CoreXL Firewall instance.
Note - You must run this command from the Expert mode.
Syntax
Parameters
Parameter Description
Example
fwboot post_drv
Description
Loads the Firewall driver for CoreXL during boot.
Important:
n This command is for Check Point use only.
n If you run this command, Security Gateway can block all traffic. In such case, you
must connect to the Security Gateway over a console and restart Check Point
services with the "cpstop" on page 920 and "cpstart" on page 911 commands.
Alternatively, you can reboot the Security Gateway.
Note - You must run this command from the Expert mode.
Syntax
Parameters
Parameter Description
sam_alert
Description
For SAM v1, this utility executes Suspicious Activity Monitoring (SAM) actions according to the information
received from the standard input.
For SAM v2, this utility executes Suspicious Activity Monitoring (SAM) actions with User Defined Alerts
mechanism.
Notes:
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Monitoring (SAM) Rules. See sk79700.
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
n See the "fw sam" on page 271 and "fw sam_policy" on page 279 commands.
SAM v1 syntax
sam_alert [-v] [-o] [-s <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-C] {-n|-i|-I} {-src|-dst|-any|-srv}
Parameter Description
-o Specifies to print the input of this tool to the standard output (to use with pipes in
a CLI syntax).
-t <Time> Specifies the time (in seconds), during which to enforce the action. The default is
forever.
Parameter Description
-n Specifies to notify every time a connection, which matches the specified criteria,
passes through the Security Gateway.
-I Inhibits (drops or rejects) connections that match the specified criteria and
closes all existing connections that match the specified criteria.
SAM v2 syntax
sam_alert -v2 [-v] [-O] [-S <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-n <Name>] [-c "<Comment">] [-o <Originator>] [-l {r |
a}] -a {d | r| n | b | q | i} [-C] {-ip |-eth} {-src|-dst|-any|-srv}
Parameter Description
-O Specifies to print the input of this tool to the standard output (to use
with pipes in a CLI syntax).
-t <Time> Specifies the time (in seconds), during which to enforce the action.
The default is forever.
-l {r | a} Specifies the log type for connections that match the specified criteria:
n r - Regular
n a - Alert
Default is None.
Parameter Description
Example
See sk110873: How to configure Security Gateway to detect and prevent port scan.
stattest
Description
Check Point AMON client to query SNMP OIDs.
You can use this command as an alternative to the standard SNMP commands for debug purposes - to
make sure the applicable SNMP OIDs provide the requested information.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
n To query a Regular OID:
stattest get [-d] [-h <Host>] [-p <Port>] [-x <Proxy Server>] [-v <VSID>] [-t <Timeout>] <Regular_OID_1> <Regular_OID_2>
... <Regular_OID_N>
Parameters
Parameter Description
Parameter Description
usrchk
Description
Controls the UserCheck daemon (usrchkd).
Syntax
usrchk
hits <options>
incidents <options>
debug <options>
Note - You can also enter partial names of the sub-commands and their options.
Parameters
Parameter Description
n Database operations:
l Reload hits from the database:
Parameter Description
usrchk debug on
Parameter Description
n Filter which debug logs UserCheck writes to the log file based on the
specified Debug Topics and Severity:
usrchk debug
Parameter Description
Notes:
n To show all UserCheck interaction objects, run:
ClusterXL Commands
For more information about Check Point cluster, see the R80.40 ClusterXL Administration Guide.
Important:
n We do not recommend that you run these commands. These commands must
be run automatically only by the Security Gateway or the Check Point Support.
n In Cluster, you must configure all the Cluster Members in the same way
Syntax
Notes:
n In Gaia Clish:
Enter the set cluster<ESC><ESC> to see all the available commands.
n In Expert mode:
Run the cphaconf command see all the available commands.
You can run the cphaconf commands only from the Expert mode.
n Syntax legend:
1. Curly brackets or braces { }:
Enclose a list of available commands or parameters, separated by the
vertical bar |, from which user can enter only one.
2. Angle brackets < > :
Enclose a variable - a supported value user needs to specify explicitly.
3. Square brackets or brackets [ ]:
Enclose an optional command or parameter, which user can also enter.
n You can include these commands in scripts to run them automatically.
The meaning of each command is explained in the next sections.
Table: ClusterXL Configuration Commands
Description Command in Command in
of Command Gaia Clish Expert Mode
Configure how to show the Cluster Member in set cphaconf mem_id_mode {id
local ClusterXL logs - by its Member ID or its cluster | name}
Member Name (see "Configuring the Cluster member
Member ID Mode in Local Logs" on page 1152) idmode {id
| name}
Configure the Cluster Forwarding Layer on the set cphaconf forward {off |
Cluster Member (controls the forwarding of cluster on}
traffic between Cluster Members) member
forwarding
Note - For Check Point use only.
{off | on}
Important - In Cluster, you must configure all the Cluster Members in the same way.
Description
This command lets you configure how to show the Cluster Member in the local ClusterXL logs - by its
Member ID (default), or its Member Name.
This configuration affects these local logs:
n /var/log/messages
n dmesg
n $FWDIR/log/fwd.elg
See "Viewing the Cluster Member ID Mode in Local Logs" on page 1210.
Syntax
Shell Command
Example
[Expert@Member1:0]#
[Expert@Member1:0]# cphaconf mem_id_mode name
[Expert@Member1:0]#
[Expert@Member1:0]# cphaprob names
[Expert@Member1:0]#
Important - In Cluster, you must configure all the Cluster Members in the same way.
Description
You can add a user-defined critical device to the default list of critical devices. Use this command to
register <device> as a critical process, and add it to the list of devices that must run for the Cluster Member
to be considered active. If <device> fails, then the Cluster Member is seen as failed.
If a Critical Device fails to report its state to the Cluster Member in the defined timeout, the Critical Device,
and by design the Cluster Member, are seen as failed.
Define the status of the Critical Device that is reported to ClusterXL upon registration.
This initial status can be one of these:
n ok - Critical Device is alive.
n init - Critical Device is initializing. The Cluster Member is Down. In this state, the Cluster Member
cannot become Active.
n problem - Critical Device failed. If this state is reported to ClusterXL, the Cluster Member
immediately goes Down. This causes a failover.
Syntax
Shell Command
Gaia N/A
Clish
Notes:
n For no timeout, use the value 0.
n The "-p" flag makes these changes permanent.
After you reboot the Cluster Member, the status of critical devices that were
registered with this flag is saved.
n The "-g" flag applies the command to all configured Virtual Systems.
Restrictions
n Total number of critical devices (pnotes) on Cluster Member is limited to 16.
n Name of any critical device (pnote) on Cluster Member is limited to 15 characters, and must not
include white spaces.
Related topics
n "Viewing Critical Devices" on page 1180
n "Reporting the State of a Critical Device" on page 1156
n "Registering Critical Devices Listed in a File" on page 1157
n "Unregistering a Critical Device" on page 1155
n "Unregistering All Critical Devices" on page 1159
Important - In Cluster, you must configure all the Cluster Members in the same way.
Description
This command lets you unregister a user-defined Critical Device (Pnote). This means that this device is no
longer considered critical.
If a Critical Device was registered with a state "problem", before you ran this command, then after you
run this command, the status of the Cluster Member depends only on the states of the remaining Critical
Devices.
Syntax
Shell Command
Notes:
n The "-p" flag makes these changes permanent.
This means that after you reboot, these Critical Devices remain
unregistered.
n The "-g" flag applies the command to all configured Virtual Systems.
Related topics
n "Viewing Critical Devices" on page 1180
n "Reporting the State of a Critical Device" on page 1156
n "Registering a Critical Device" on page 1153
n "Registering Critical Devices Listed in a File" on page 1157
n "Unregistering All Critical Devices" on page 1159
Important - In Cluster, you must configure all the Cluster Members in the same way.
Description
This command lets you report (change) manually the state of a Critical Device to ClusterXL.
The reported state can be one of these:
n ok - Critical Device is alive.
n init - Critical Device is initializing. The Cluster Member is Down. In this state, the Cluster Member
cannot become Active.
n problem - Critical Device failed. If this state is reported to ClusterXL, the Cluster Member
immediately goes Down. This causes a failover.
If a Critical Device fails to report its state to the Cluster Member within the defined timeout, the Critical
Device, and by design the Cluster Member, are seen as failed. This is true only for Critical Devices with
timeouts. If a Critical Device is registered with the "-t 0" parameter, there is no timeout. Until the Critical
Device reports otherwise, the state of the Critical Device is considered to be the last reported state.
Syntax
Shell Command
Gaia N/A
Clish
Notes:
n The "-g" flag applies the command to all configured Virtual Systems.
n If the "<Name of Critical Device>" reports its state as "problem", then
the Cluster Member reports its state as failed.
Related topics
n "Viewing Critical Devices" on page 1180
n "Registering a Critical Device" on page 1153
n "Registering Critical Devices Listed in a File" on page 1157
n "Unregistering a Critical Device" on page 1155
n "Unregistering All Critical Devices" on page 1159
Important - In Cluster, you must configure all the Cluster Members in the same way.
Description
This command lets you register all the user-defined Critical Devices listed in the specified file.
This file must be a plain-text ASCII file, with each Critical Device defined on a separate line.
Each definition must contain three parameters, which must be separated by a space or a tab character:
Where:
Parameter Description
< If the Critical Device <Name of Device> fails to report its state to the Cluster Member
Timeout within this specified number of seconds, the Critical Device (and by design the Cluster
> Member), are seen as failed.
For no timeout, use the value 0 (zero).
< The Critical Device <Name of Device> reports one of these statuses to the Cluster
Status> Member:
n ok - Critical Device is alive.
n init- Critical Device is initializing. The Cluster Member is Down. In this state, the
Cluster Member cannot become Active.
n problem - Critical Device failed. If this state is reported to ClusterXL, the Cluster
Member immediately goes Down. This causes a failover.
Syntax
Shell Command
Note - The "-g" flag applies the command to all configured Virtual Systems.
Related topics
n "Viewing Critical Devices" on page 1180
n "Reporting the State of a Critical Device" on page 1156
n "Registering a Critical Device" on page 1153
n "Unregistering a Critical Device" on page 1155
n "Unregistering All Critical Devices" on page 1159
Important - In Cluster, you must configure all the Cluster Members in the same way.
Description
This command lets you unregister all critical devices from the Cluster Member.
Syntax
Shell Command
Notes:
n The "-a" flag specifies that all Pnotes must be unregistered
n The "-g" flag applies the command to all configured Virtual
Systems
Related topics
n "Viewing Critical Devices" on page 1180
n "Reporting the State of a Critical Device" on page 1156
n "Registering a Critical Device" on page 1153
n "Registering Critical Devices Listed in a File" on page 1157
n "Unregistering a Critical Device" on page 1155
Important - In Cluster, you must configure all the Cluster Members in the same way.
Description
Cluster Members configure the Cluster Control Protocol (CCP) mode automatically.
You can configure the Cluster Control Protocol (CCP) Encryption on the Cluster Members.
See "Viewing the Cluster Control Protocol (CCP) Settings" on page 1215.
Shell Command
Syntax
Shell Command
Example
... ...
[Expert@Member1:0]#
[Expert@Member1:0]#
[Expert@Member1:0]# clusterXL_admin up
This command does not survive reboot. To make the change permanent, please run 'set cluster member admin
down/up permanent' in clish or add '-p' at the end of the command in expert mode
Setting member to normal operation ...
Member current state is STANDBY
[Expert@Member1:0]#
[Expert@Member1:0]#
Important - In Cluster, you must configure all the Cluster Members in the same way.
Description
This command configures the minimal number of required slave interfaces for the specified bond interface
in Load Sharing mode.
This command saves the configuration in the $FWDIR/conf/cpha_bond_ls_config.conf file.
Syntax
Shell Command
Example
[Expert@Member1:0]#
bond1 2
[Expert@Member1:0]#
[Expert@Member1:0]#
[Expert@Member1:0]#
Important - In Cluster, you must configure all the Cluster Members in the same way.
Description
This procedure lets you configure the Cluster Member to monitor only the physical link on the cluster
interfaces (instead of monitoring the Cluster Control Protocol (CCP) packets):
n If a link disappears on the configured interface, the Cluster Member changes the interface's state to
DOWN.
This causes the Cluster Member to change its state to DOWN.
n If a link appears again on the configured interface, the Cluster Member changes the interface's state
back to UP.
This causes the Cluster Member to change its state back to ACTIVE or STANDBY.
See "Viewing Cluster State" on page 1175.
Procedure
Step Instructions
stat $FWDIR/conf/cpha_link_monitoring.conf
cp -v $FWDIR/conf/cpha_link_monitoring.conf{,_BKP}
touch $FWDIR/conf/cpha_link_monitoring.conf
vi $FWDIR/conf/cpha_link_monitoring.conf
eth2
eth4
all
Step Instructions
Best Practices:
Important:
n The MVC Mechanism is disabled by default.
n For limitations of the MVC Mechanism, see the R80.40 Installation and Upgrade
Guide > Chapter Upgrading Gateways and Clusters > Section Upgrading
ClusterXL, VSX Cluster, VRRP Cluster > Section Multi-Version Cluster
Upgrade.
Syntax
Shell Command
Parameters
Parameter Description
Notes:
n This command does not provide an output. To view the current state of the MVC
Mechanism, see "Viewing the State of the Multi-Version Cluster Mechanism" on
page 1217.
n The change made with this command survives reboot.
n If a specific scenario requires you to disable the MVC Mechanism before the first
start of an R80.40 Cluster Member (for example, immediately after an upgrade
to R80.40), then disable it before the first policy installation on this Cluster
Member.
Syntax
Notes:
n In Gaia Clish:
Enter the show cluster<ESC><ESC> to see all the available commands.
n In Expert mode:
Run the cphaprob command see all the available commands.
You can run the cphaprob commands from Gaia Clish as well.
n Syntax legend:
1. Curly brackets or braces { }:
Enclose a list of available commands or parameters, separated by the
vertical bar |, from which user can enter only one.
2. Angle brackets < > :
Enclose a variable - a supported value user needs to specify explicitly.
3. Square brackets or brackets [ ]:
Enclose an optional command or parameter, which user can also enter.
n You can include these commands in scripts to run them automatically.
The meaning of each command is explained in the next sections.
Table: ClusterXL Monitoring Commands
Description Command in Command in
of Command Gaia Clish Expert Mode
Show states of Cluster Members and their names (see show cluster cphaprob [-
"Viewing Cluster State" on page 1175) state vs <VSID>]
state
Show Critical Devices (Pnotes) and their states on the show cluster cphaprob [-
Cluster Member (see "Viewing Critical Devices" on members pnotes l] [-ia] [-
page 1180) {all | problem} e] list
Show cluster interfaces on the cluster member (see show cluster cphaprob [-
"Viewing Cluster Interfaces" on page 1187) members vs all] [-a]
interfaces {all [-m] if
| secured |
virtual |
vlans}
Show cluster bond configuration on the Cluster Member show cluster cphaprob
(see "Viewing Bond Interfaces" on page 1192) bond {all | show_bond
name <bond_ [<bond_
name>} name>]
Show (and reset) cluster failover statistics on the Cluster show cluster cphaprob [-
Member (see "Viewing Cluster Failover Statistics" on failover [reset reset {-c |
page 1197) {count | -h}] [-l
history}] <count>]
show_
failover
Show information about the software version (including show cluster cphaprob
hotfixes) on the local Cluster Member and its release release
matches/mismatches with other Cluster Members (see
"Viewing Software Versions on Cluster Members" on
page 1199)
Show Delta Sync statistics on the Cluster Member (see show cluster cphaprob [-
"Viewing Delta Synchronization" on page 1200) statistics sync reset]
[reset] syncstat
Show Delta Sync statistics for the Connections table on show cluster cphaprob [-
the Cluster Member (see "Viewing Cluster Delta Sync statistics reset]
Statistics for Connections Table" on page 1208) transport ldstat
[reset]
Show the Cluster Control Protocol (CCP) mode on the show cluster cphaprob [-
Cluster Member (see "Viewing Cluster Interfaces" on members vs all] -a
page 1187) interfaces if
virtual
Show the IGMP membership of the Cluster Member show cluster cphaprob
(see "Viewing IGMP Status" on page 1207) members igmp igmp
Show cluster unique IP's table on the Cluster Member show cluster cphaprob
(see "Viewing Cluster IP Addresses" on page 1209) members ips tablestat
Show the Cluster Member ID Mode in local logs - by show cluster cphaprob
Member ID (default) or Member Name (see "Viewing members idmode names
the Cluster Member ID Mode in Local Logs" on
page 1210)
Show interfaces, which the RouteD monitors on the show ospf cphaprob
Cluster Member when you configure OSPF (see interfaces routedifcs
"Viewing Interfaces Monitored by RouteD" on [detailed]
page 1211)
Show the Cluster Control Protocol (CCP) mode (see show cluster cphaprob -a
"Viewing the Cluster Control Protocol (CCP) Settings" members if
on page 1215) interfaces
virtual
Show the Cluster Control Protocol (CCP) Encryption show cluster cphaprob
settings (see "Viewing the Cluster Control Protocol members ccpenc ccp_encrypt
(CCP) Settings" on page 1215)
show cluster
bond
all
name <Name of Bond>
failover
members
ccpenc
idmode
igmp
interfaces
all
secured
virtual
vlans
ips
mvc
pnotes
all
problem
release
roles
state
statistics
sync [reset]
transport [reset]
Syntax
Shell Command
Example
Member1>
Assigned n In the ClusterXL High Availability mode - shows the Active Cluster Member with
Load 100% load, and all other Standby Cluster Members with 0% load.
n In ClusterXL Load Sharing modes (Unicast and Multicast) - shows all Active
Cluster Members with 100% load.
State n In the ClusterXL High Availability mode, only one Cluster Member in a fully-
functioning cluster must be ACTIVE, and the other Cluster Members must be in
the STANDBY state.
n In the ClusterXL Load Sharing modes (Unicast and Multicast), all Cluster
Members in a fully-functioning cluster must be ACTIVE.
n In 3rd-party clustering configuration, all Cluster Members in a fully-functioning
cluster must be ACTIVE. This is because this command only reports the status
of the Full Synchronization process.
See the summary table below.
Active Shows the Critical Devices that report theirs states as "problem" (see "Viewing
PNOTEs Critical Devices" on page 1180).
Last member Shows information about the last time this Cluster Member changed its cluster state.
state change
event
State change Shows the previous cluster state and the new cluster state of this Cluster Member.
Reason for Shows the reason why this Cluster Member changed its cluster state.
state change
Event time Shows the date and the time when this Cluster Member changed its cluster state.
Last cluster Shows information about the last time a cluster failover occurred.
failover
event
Event time Shows the date and the time of the last cluster failover.
Time of Shows the date and the time of the last counter reset, and the reset initiator.
counter reset
When you examine the state of the Cluster Member, consider whether it forwards packets, and whether it
has a problem that prevents it from forwarding packets. Each state reflects the result of a test on critical
devices. This table shows the possible cluster states, and whether or not they represent a problem.
Table: Description of the cluster states
Is this
Cluster Forwarding
Description state a
State packets?
problem?
ACTIVE(!) A problem was detected, but the Cluster Member still Yes Yes
forwards packets, because it is the only member in the
ACTIVE cluster, or because there are no other Active members in the
(!F) cluster. In any other situation, the state of the member is
ACTIVE Down.
(!P) n ACTIVE(!) - See above.
ACTIVE n ACTIVE(!F) - See above. Cluster Member is in the
(!FP) freeze state.
n ACTIVE(!P) - See above. This is the Pivot Cluster
Member in Load Sharing Unicast mode.
n ACTIVE(!FP) - See above. This is the Pivot Cluster
Member in Load Sharing Unicast mode and it is in the
freeze state.
DOWN One of the Critical Devices reports its state as "problem" No Yes
(see "Viewing Critical Devices" on page 1180).
LOST The peer Cluster Member lost connectivity to this local No Yes
Cluster Member (for example, while the peer Cluster Member
is rebooted).
READY State Ready means that the Cluster Member recognizes itself No No
as a part of the cluster and is literally ready to go into action,
but, by design, something prevents it from taking action.
Possible reasons that the Cluster Member is not yet Active
include:
n Not all required software components were loaded and
initialized yet and/or not all configuration steps finished
successfully yet. Before a Cluster Member becomes
Active, it sends a message to the rest of the Cluster
Members, to check if it can become Active. In High
Availability mode it checks if there is already an Active
member and in Load Sharing Unicast mode it checks if
there is a Pivot member already. The member remains
in the Ready state until it receives the response from
the rest of the Cluster Members and decides which,
which state to choose next (Active, Standby, Pivot, or
non-Pivot).
n Software installed on this Cluster Member has a higher
version than all the other Cluster Members. For
example, when a cluster is upgraded from one version
of Check Point Security Gateway to another, and the
Cluster Members have different versions of Check
Point Security Gateway, the Cluster Members with the
new version have the Ready state, and the Cluster
Members with the previous version have the
Active/Active Attention state.
This applies only when the Multi-Version Cluster
Mechanism is disabled (see "Viewing the State of the
Multi-Version Cluster Mechanism" on page 1217).
See sk42096 for a solution.
INIT The Cluster Member is in the phase after the boot and until No No
the Full Sync completes.
Problem Monitors all the Critical Devices. None of the At least one of the
Notification Critical Devices Critical Devices on this
on this Cluster Cluster Member
Member report its reports its state as
state as problem.
problem.
Interface Monitors the state of cluster All cluster At least one of the
Active Check interfaces. interfaces on this cluster interfaces on
Cluster Member this Cluster Member is
are up (CCP down (CCP packets
packets are sent are not sent and/or
and received on received on time).
all cluster
interfaces).
Fullsync Monitors if Full Sync on this This Cluster This Cluster Member
Cluster Member completed Member was not able to
successfully. completed Full complete Full Sync.
Sync
successfully.
Policy Monitors if the Security Policy is This Cluster Security Policy is not
installed. Member currently installed on
successfully this Cluster Member.
installed Security
Policy.
fwd Monitors the Security Gateway fwd daemon on fwd daemon on this
process called fwd. this Cluster Cluster Member did
Member reported not report its state on
its state on time. time.
routed Monitors the Gaia process called routed daemon routed daemon on
routed. on this Cluster this Cluster Member
Member reported did not report its state
its state on time. on time.
cvpnd Monitors the Mobile Access back- cvpnd daemon cvpnd daemon on
end process called cvpnd. on this Cluster this Cluster Member
This pnote appears if Mobile Member reported did not report its state
Access Software Blade is enabled. its state on time. on time.
ted Monitors the Threat Emulation ted daemon on ted daemon on this
process called ted. this Cluster Cluster Member did
Member reported not report its state on
its state on time. time.
VSX Monitors all Virtual Systems in VSX On VS0, means Minimum of blocking
Cluster. that states of all states of all Virtual
Virtual Systems Systems is not "active"
are not Down on (the VSIDs will be
this Cluster printed on the line
Member. Problematic
VSIDs:) on this
On other Virtual
Cluster Member.
Systems, means
that VS0 is alive
on this Cluster
Member.
host_monitor Monitors the Critical Device All monitored IP At least one of the
host_monitor. addresses on this monitored IP
Cluster Member addresses on this
User executed the replied to pings. Cluster Member did
$FWDIR/bin/clusterXL_ not reply to at least
monitor_ips script. one ping.
See "The clusterXL_monitor_ips
Script" on page 1232.
A name of a user User executed the All monitored At least one of the
space process $FWDIR/bin/clusterXL_ user space monitored user space
(except fwd, monitor_process script. processes on this on this Cluster
routed, cvpnd, See "The clusterXL_monitor_ Cluster Member Member processes is
ted) process Script" on page 1236. are running. not running.
Syntax
Shell Command
Where:
Command Description
show cluster Prints the list of all the "Built-in Devices" and the "Registered
members pnotes Devices"
problem
cphaprob -l Prints the list of all the "Built-in Devices" and the "Registered
Devices"
cphaprob -i list When there are no issues on the Cluster Member, shows:
There are no pnotes in problem state
When a Critical Device reports a problem, prints only the Critical Device that
reports its state as "problem".
cphaprob -ia When there are no issues on the Cluster Member, shows:
list There are no pnotes in problem state
When a Critical Device reports a problem, prints the Critical Device
"Problem Notification" and the Critical Device that reports its state
as "problem"
cphaprob -e list When there are no issues on the Cluster Member, shows:
There are no pnotes in problem state
When a Critical Device reports a problem, prints only the Critical Device that
reports its state as "problem"
Related topics
n "Reporting the State of a Critical Device" on page 1156
n "Registering a Critical Device" on page 1153
n "Registering Critical Devices Listed in a File" on page 1157
n "Unregistering a Critical Device" on page 1155
n "Unregistering All Critical Devices" on page 1159
Examples
Critical Device fwd reports its state as problem because the fwd process is down.
Built-in Devices:
Registered Devices:
[Expert@Member1:0]#
Critical Device CoreXL Configuration reports its state as problem because the numbers of
CoreXL Firewall instances do not match between the Cluster Members.
Built-in Devices:
Registered Devices:
[Expert@Member1:0]#
Syntax
Shell Command
Where:
Command Description
show cluster members interfaces Shows full list of all cluster interfaces:
all
n including the number of required interfaces
n including Network Objective
n including VLAN monitoring mode, or list of
monitored VLAN interfaces
show cluster members interfaces Shows only cluster interfaces (Cluster and Sync) and
secured their states:
n without Network Objective
n without VLAN monitoring mode
n without monitored VLAN interfaces
show cluster members interfaces Shows full list of cluster virtual interfaces and their
virtual states:
n including the number of required interfaces
n including Network Objective
n without VLAN monitoring mode
n without monitored VLAN interfaces
cphaprob -a -m if Shows full list of all cluster interfaces and their states:
n including the number of required interfaces
n including Network Objective
n including VLAN monitoring mode, or list of
monitored VLAN interfaces
Output
The output of these commands must be identical to the configuration in the cluster object's Network
Management page in SmartConsole.
Example
[Expert@Member1:0]# cphaprob -a -m if
eth0 UP
eth1 (S) UP
eth2 (LM) UP
bond1 (LS) UP
eth0 192.168.3.247
eth2 44.55.66.247
bond1 77.88.99.247
[Expert@Member1:0]#
Required interfaces Shows the total number of monitored cluster interfaces, including
the Sync interface.
This number is based on the configuration of the cluster object >
Network Management page.
Required secured interfaces Shows the total number of the required Sync interfaces.
This number is based on the configuration of the cluster object >
Network Management page.
Non-Monitored This means that Cluster Member does not monitor the state of this
interface.
In SmartConsole, in the cluster object > Network Management
page, administrator configured the Network Type Private for this
interface.
UP This means that Cluster Member monitors the state of this interface.
The current cluster state of this interface is UP, which means this
interface can send and receive CCP packets.
In SmartConsole, in the cluster object > Network Management
page, administrator configured one of these Network Types for this
interface: Cluster, Sync , or Cluster + Sync .
DOWN This means that Cluster Members monitors the state of this
interface.
The current cluster state of this interface is DOWN, which means
this interface cannot send CCP packets, receive CCP packets, or
both.
In SmartConsole, in the cluster object > Network Management
page, administrator configured one of these Network Types for this
interface: Cluster, Sync , or Cluster + Sync .
Virtual cluster interfaces Shows the total number of the configured virtual cluster interfaces.
This number is based on the configuration of the cluster object >
Network Management page.
No VLANs are monitored on Shows the VLAN monitoring mode - there are no VLAN interfaces
the member configured on the cluster interfaces.
Monitoring mode is Monitor Shows the VLAN monitoring mode - there are some VLAN interfaces
all VLANs: All VLANs are configured on the cluster interfaces, and Cluster Member monitors
monitored all VLAN IDs.
Monitoring mode is Monitor Shows the VLAN monitoring mode - there are some VLAN interfaces
specific VLAN: Only specified configured on the cluster interfaces, and Cluster Member monitors
VLANs are monitored only specific VLAN IDs.
Syntax
Shell Command
Where:
Command Description
show cluster bond all Shows configuration of all configured bond interfaces
show bonding groups
cphaprob show_bond
show cluster bond name <bond_ Shows configuration of the specified bond interface
name>
cphaprob show_bond <bond_name>
Examples
Legend:
-------
UP! - Bond interface state is UP, yet attention is required
Slaves configured - number of slave interfaces configured on the bond
Slaves link up - number of operational slaves
Slaves required - minimal number of operational slaves required for bond to be UP
[Expert@Member2:0]#
Description of the output fields for the "cphaprob show_bond" and "show cluster bond all"
commands:
Table: Description of the output fields
Field Description
Slaves Total number of physical slave interfaces configured in this Gaia bonding group.
configured
Slaves link Number of operational physical slave interfaces in this Gaia bonding group.
up
Slaves Minimal number of operational physical slave interfaces required for the state of this
required Gaia bonding group to be UP.
[Expert@Member2:0]#
Description of the output fields for the "cphaprob show_bond <bond_name>" and "show
cluster bond name <bond_name>" commands:
Table: Description of the output fields
Field Description
Configured Total number of physical slave interfaces configured in this Gaia bonding group.
slave
interfaces
In use Number of operational physical slave interfaces in this Gaia bonding group.
slave
interfaces
Required Minimal number of operational physical slave interfaces required for the state of this
slave Gaia bonding group to be UP.
interfaces
Slave Names of physical slave interfaces configured in this Gaia bonding group.
name
Link State of the physical link on the physical slave interfaces in this Gaia bonding group.
One of these:
n Yes - Link is present
n No - Link is lost
Legend:
---------
Bonds in group - a list of the bonds in the bond group
Required active bonds - number of required active bonds
[Expert@Member2:0]#
Required active bonds Number of required active bonds in this Group of Bonds.
Bonds in group Names of the Gaia bond interfaces configured in this Group of Bonds.
Shell Command
Shell Command
Parameters
Parameter Description
-l <number> Specifies how many of last failover events to show (between 1 and 50)
Example
Cluster failover history (last 20 failovers since reboot/reset on Sun Sep 8 16:08:34 2019):
[Expert@Member1:0]#
Syntax
Shell Command
Example
ID SW release
[Expert@Member1:0]#
Shell Command
Shell Command
Example output of the "show cluster statistics sync" and "cphaprob syncstat"
commands from a Cluster Member:
Sync status: OK
Drops:
Lost updates................................. 0
Lost bulk update events...................... 0
Oversized updates not sent................... 0
Sync at risk:
Sent reject notifications.................... 0
Received reject notifications................ 0
Sent messages:
Total generated sync messages................ 26079
Sent retransmission requests................. 0
Sent retransmission updates.................. 0
Peak fragments per update.................... 1
Received messages:
Total received updates....................... 3710
Received retransmission requests............. 0
Sync Interface:
Name......................................... eth1
Link speed................................... 1000Mb/s
Rate......................................... 46000 [Bps]
Peak rate.................................... 46000 [Bps]
Link usage................................... 0%
Total........................................ 376827[KB]
Timers:
Delta Sync interval (ms)..................... 100
This section shows the status of the Delta Sync mechanism. One of these:
n Sync status: OK
n Sync status: Off - Full-sync failure
n Sync status: Off - Policy installation failure
n Sync status: Off - Cluster module not started
n Sync status: Off - SIC failure
n Sync status: Off - Full-sync checksum error
n Sync status: Off - Full-sync received queue is full
n Sync status: Off - Release version mismatch
This section shows statistics for drops on the Delta Sync network.
Lost Shows how many Delta Sync updates this Cluster Member considers as lost (based on
updates sequence numbers in CCP packets).
If this counter shows a value greater than 0, this Cluster Member lost Delta Sync
updates.
Possible mitigation:
Increase the size of the Sending Queue and the size of the Receiving Queue:
n Increase the size of the Sending Queue, if the counter Received reject
notification is increasing.
n Increase the size of the Receiving Queue, if the counter Received reject
notification is not increasing.
Lost bulk Shows how many times this Cluster Member missed Delta Sync updates.
update
(bulk update = twice the size of the local receiving queue)
events
This counter increases when this Cluster Member receives a Delta Sync update with a
sequence number much greater than expected. This probably indicates some
networking issues that cause massive packet drops.
This counter increases when the amount of missed Delta Sync updates is more than
twice the local Receiving Queue Size.
Possible mitigation:
n If the counter's value is steady, this might indicate a one-time synchronization
problem that can be resolved by running manual Full Sync. See sk37029.
n If the counter's value keeps increasing, probable there are some networking
issues. Increase the sizes of both the Receiving Queue and Sending Queue.
Oversized Shows how many oversized Delta Sync updates were discarded before sending them.
updates
This counter increases when Delta Sync update is larger than the local Fragments
not sent
Queue Size.
Possible mitigation:
n If the counter's value is steady, increase the size of the Sending Queue.
n If the counter's value keeps increasing, contact Check Point Support.
This section shows statistics that the Sending Queue is at full capacity and rejects Delta Sync
retransmission requests.
Table: Description of the output fields
Field Description
Sent reject Shows how many times this Cluster Member rejected Delta Sync retransmission
notifications requests from its peer Cluster Members, because this Cluster Member does not hold
the requested Delta Sync update anymore.
Received Shows how many reject notifications this Cluster Member received from its peer
reject Cluster Members.
notification
This section shows statistics for Delta Sync updates sent by this Cluster Member to its peer Cluster
Members.
Table: Description of the output fields
Field Description
Sent Shows how many times this Cluster Member asked its peer Cluster Members to
retransmission retransmit specific Delta Sync update(s).
requests
Retransmission requests are sent when certain Delta Sync updates (with a
specified sequence number) are missing, while the sending Cluster Member
already received Delta Sync updates with advanced sequences.
Note - Compare the number of Sent retransmission requests to the Total
generated sync messages of the other Cluster Members.
A large counter's value can imply connectivity problems. If the counter's value is
unreasonably high (more than 30% of the Total generated sync messages of
other Cluster Members), contact Check Point Support equipped with the entire
output and a detailed description of the network topology and configuration.
Sent Shows how many times this Cluster Member retransmitted specific Delta Sync
retransmission update(s) at the requests from its peer Cluster Members.
updates
Peak Shows the peak amount of fragments in the Fragments Queue on this Cluster
fragments per Member (usually, should be 1).
update
This section shows statistics for Delta Sync updates that were received by this Cluster Member from its
peer Cluster Members.
Table: Description of the output fields
Field Description
Total received Shows the total number of Delta Sync updates this Cluster Member received from
updates its peer Cluster Members.
This counts only Delta Sync updates (not Retransmission Requests,
Retransmission Acknowledgments, and others).
Received Shows how many retransmission requests this Cluster Member received from its
retransmission peer Cluster Members.
requests
A large counter's value can imply connectivity problems. If the counter's value is
unreasonably high (more than 30% of the Total generated sync messages on
this Cluster Member), contact Check Point Support equipped with the entire
output and a detailed description of the network topology and configuration.
Sending Shows the size of the cyclic queue, which buffers all the Delta Sync updates that were
queue already sent until it receives an acknowledgment from the peer Cluster Members.
size
This queue is needed for retransmitting the requested Delta Sync updates.
Each Cluster Member has one Sending Queue.
Default: 512 Delta Sync updates, which is also the minimal value.
Receiving Shows the size of the cyclic queue, which buffers the received Delta Sync updates in
queue two cases:
size
n When Delta Sync updates are missing, this queue is used to hold the remaining
received Delta Sync updates until the lost Delta Sync updates are retransmitted
(Cluster Members must keep the order, in which they save the Delta Sync
updates in the kernel tables).
n This queue is used to re-assemble a fragmented Delta Sync update.
Each Cluster Member has one Receiving Queue.
Default: 256 Delta Sync updates, which is also the minimal value.
Fragments Shows the size of the queue, which is used to prepare a Delta Sync update before
queue moving it to the Sending Queue.
size
Notes:
n This queue must be smaller than the Sending Queue.
n This queue must be significantly smaller than the Receiving Queue.
Default: 50 Delta Sync updates, which is also the minimal value.
Field Description
Delta Sync Shows the interval at which this Cluster Member sends the Delta Sync updates
interval (ms) from its Sending Queue.
The base time unit is 100ms (or 1 tick).
Default: 100 ms, which is also the minimum value.
See Increasing the Sync Timer.
Syntax
Shell Command
Example
[Expert@Member1:0]#
Syntax
Shell Command
The "reset" flag resets the kernel statistics, which were collected since the last reboot or reset.
Example
[Expert@Member1:0]#
Syntax
Shell Command
Example
(Local)
0 1 192.168.3.245
0 2 11.22.33.245
0 3 44.55.66.245
1 1 192.168.3.246
1 2 11.22.33.246
1 3 44.55.66.246
------------------------------------------
[Expert@Member1:0]#
[Expert@Member1:0]# fw ctl iflist
1 : eth0
2 : eth1
3 : eth2
[Expert@Member1:0]#
Syntax
Shell Command
Example
[Expert@Member1:0]#
Syntax
Shell Command
Example 1
[Expert@Member1:0]#
Example 2
eth0
[Expert@Member1:0]#
Notes:
n In ClusterXL High Availability, the RouteD daemon must run as a Master only on
the Active Cluster Member.
n In ClusterXL Load Sharing, the RouteD daemon must run as a Master only on
one of the Active Cluster Members and as a Non-Master on all other Cluster
Members.
n In VRRP Cluster, the RouteD daemon must run as a Master only on the VRRP
Master Cluster Member.
Syntax
Shell Command
Example
ID Role
1 (local) Master
2 Non-Master
[Expert@Member1:0]#
Note - For more information about CoreXL, see the R80.40 Performance Tuning
Administration Guide.
Syntax
Shell Command
Where:
Command Description
cphaprob -d corr Shows Cluster Correction Statistics for CoreXL SND only.
cphaprob -f corr Shows Cluster Correction Statistics for CoreXL Firewall instances only.
Shell Command
Shell Command
Syntax
Shell Command
Example
id 2
Latency | Drop
[msec] | rate
eth0 0.000 0%
eth1 0.000 0%
eth2 0.000 0%
[Expert@Member1:0]#
Syntax
Shell Command
Example
ON
Member1>
Syntax
Shell Command
Example
During FCU....................... no
Connection module map............ none
[Expert@Member1:0]#
cpconfig
Description
This command starts the Check Point Configuration Tool.
This tool lets you configure specific settings for the installed Check Point products.
Important - In Cluster, you must configure all the Cluster Members in the same way.
Syntax
cpconfig
Menu Options
Note - The options shown depend on the configuration and installed products.
Licenses and contracts Manages Check Point licenses and contracts on this Security
Gateway or Cluster Member.
Random Pool Configures the RSA keys, to be used by Gaia Operating System.
Secure Internal Communication Manages SIC on the Security Gateway or Cluster Member.
This change requires a restart of Check Point services on the
Security Gateway or Cluster Member.
For more information, see:
n The R80.40 Security Management Administration Guide.
n sk65764: How to reset SIC.
Enable cluster membership for Enables the cluster membership on the Security Gateway.
this gateway
This change requires a reboot of the Security Gateway.
For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Disable cluster membership for Disables the cluster membership on the Security Gateway.
this gateway
This change requires a reboot of the Security Gateway.
For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Enable Check Point Per Virtual Enables Virtual System Load Sharing on the VSX Cluster
System State Member.
For more information, see the R80.40 VSX Administration Guide.
Disable Check Point Per Virtual Disables Virtual System Load Sharing on the VSX Cluster
System State Member.
For more information, see the R80.40 VSX Administration Guide.
Enable Check Point ClusterXL Enables Check Point ClusterXL for Bridge mode.
for Bridge Active/Standby
This change requires a reboot of the Cluster Member.
For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Disable Check Point ClusterXL Disables Check Point ClusterXL for Bridge mode.
for Bridge Active/Standby
This change requires a reboot of the Cluster Member.
For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Check Point CoreXL Manages CoreXL on the Security Gateway or Cluster Member.
After all changes in CoreXL configuration, you must reboot the
Security Gateway or Cluster Member.
For more information, see the R80.40 Performance Tuning
Administration Guide.
Automatic start of Check Point Shows and controls which of the installed Check Point products
Products start automatically during boot.
[Expert@MySingleGW:0]# cpconfig
This program will let you re-configure
your Check Point products configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) SNMP Extension
(3) PKCS#11 Token
(4) Random Pool
(5) Secure Internal Communication
(6) Enable cluster membership for this gateway
(7) Check Point CoreXL
(8) Automatic start of Check Point Products
(9) Exit
[Expert@MyClusterMember:0]# cpconfig
This program will let you re-configure
your Check Point products configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) SNMP Extension
(3) PKCS#11 Token
(4) Random Pool
(5) Secure Internal Communication
(6) Disable cluster membership for this gateway
(7) Enable Check Point Per Virtual System State
(8) Enable Check Point ClusterXL for Bridge Active/Standby
(9) Check Point CoreXL
(10) Automatic start of Check Point Products
(11) Exit
cphastart
Description
Starts the cluster configuration on a Cluster Member after it was stopped with the "cphastop" on page 1223
command.
Best Practice - To start a Cluster Member, use the "cpstart" on page 911 command.
Note - This command does not initiate a Full Synchronization on the Cluster Member.
Syntax
cphastart
[-h]
[-d]
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
Refer to:
n These lines in the output file:
prepare_command_args: -D ... start
/opt/CPsuite-R80.40/fw1/bin/cphaconf clear-secured
/opt/CPsuite-R80.40/fw1/bin/cphaconf -D ...(truncated
here for brevity)... start
n The $FWDIR/log/cphastart.elg log file.
cphastop
Description
Stops the cluster software on a Cluster Member.
Best Practice - To stop a Cluster Member, use the "cpstop" on page 920 command.
Notes:
n This command stops the Cluster Member from passing traffic.
n This command stops the State Synchronization between this Cluster Member
and its peer Cluster Members.
n After you run this command, you can still open connections directly to this
Cluster Member.
n To start the cluster software, run the "cphastart" on page 1222 command.
Syntax
cphastop
cp_conf fullha
Description
Manages the state of the Full High Availability Cluster:
n Enables the Full High Availability Cluster
n Disables the Full High Availability Cluster
n Deletes the Full High Availability peer
n Shows the Full High Availability state
Important - To configure a Full High Availability cluster, follow the R80.40 Installation
and Upgrade Guide.
Syntax
cp_conf fullha
enable
del_peer
disable
state
Parameters
Parameter Description
del_peer Deletes the Full High Availability peer from the configuration.
Example
cp_conf ha
Description
Enables or disables cluster membership on this Security Gateway.
Important - This command is for Check Point use only. To configure cluster
membership, you must use the "cpconfig" on page 892 command.
For more information, see the R80.40 ClusterXL Administration Guide.
Syntax
Parameters
Parameter Description
norestart Optional: Specifies to apply the configuration change without the restart of Check Point
services. The new configuration takes effect only after reboot.
Example 1 - Enable the cluster membership without restart of Check Point services
[Expert@MyGW:0]#
Example 2 - Disable the cluster membership without restart of Check Point services
[Expert@MyGW:0]#
fw hastat
Description
Shows information about Check Point computers in High Availability configuration and their states.
Note - This command is outdated. On cluster members, run the Gaia Clish command
"show cluster state", or the Expert mode command "cphaprob state".
Syntax
Parameters
Parameter Description
[Expert@Member1:0]# fw hastat
HOST NUMBER HIGH AVAILABILITY STATE MACHINE STATUS
192.168.3.52 1 active OK
[Expert@Member1:0]#
fwboot ha_conf
Description
Configures the cluster mechanism during boot.
Notes:
n You must run this command from the Expert mode.
n Refer to these related commands:
l "fw defaultgen" on page 996
l "fwboot bootconf" on page 1111
l "control_bootsec" on page 874
l "comp_init_policy" on page 871
n To install a cluster, see the R80.40 Installation and Upgrade Guide.
n To configure a cluster , see the R80.40 Installation and Upgrade Guide and
R80.40 ClusterXL Administration Guide.
Syntax
$FWDIR/bin/clusterXL_admin
Script Workflow
This shell script does one of these:
n Registers a Critical Device called "admin_down" and reports the state of that Critical Device as
"problem".
This gracefully changes the state of the Cluster Member to "DOWN".
n Reports the state of the registered Critical Device "admin_down" as "ok".
This gracefully changes the state of the Cluster Member to "UP".
Then, the script unregisters the Critical Device "admin_down".
Example
#! /bin/csh -f
#
# The script will cause the machine to get into down state, thus the member will not filter packets.
# It will supply a simple way to initiate a failover by registering a new device in problem state when
# a failover is required and will unregister the device when wanting to return to normal operation.
# USAGE:
# clusterXL_admin <up|down>
# Inform the user that the command can run with persistent mode.
if ("$PERSISTENT" != "-p") then
echo "This command does not survive reboot. To make the change permanent, please run 'set cluster
member admin down/up permanent' in clish or add '-p' at the end of the command in expert mode"
endif
sleep 1
$FWDIR/bin/clusterXL_monitor_ips
Script Workflow
1. Registers a Critical Device called "host_monitor" with the status "ok".
2. Starts to send pings to the list of predefined IP addresses in the $FWDIR/conf/cpha_hosts file.
3. While the script receives responses to its pings, it does not change the status of that Critical Device.
4. If the script does not receive a response to even one ping, it reports the state of that Critical Device
as "problem".
This gracefully changes the state of the Cluster Member to DOWN.
If the script receives responses to its pings again, it changes the status of that Critical Device to "ok"
again.
For more information, see sk35780.
Example
#!/bin/sh
#
# The script tries to ping the hosts written in the file $FWDIR/conf/cpha_hosts. The names (must be
resolveable) ot the IPs of the hosrs must be written in seperate lines.
# the file must not contain anything else.
# We ping the given hosts every number of seconds given as parameter to the script.
# USAGE:
# cpha_monitor_ips X silent
# where X is the number of seconds between loops over the IPs.
# if silent is set to 1, no messages will appear on the console
#
# We initially register a pnote named "host_monitor" in the problem notification mechanism
# when we detect that a host is not responding we report the pnote to be in "problem" state.
# when ping succeeds again - we report the pnote is OK.
silent=0
fi
$FWDIR/bin/cphaconf set_pnote -d host_monitor -s problem report
else
if [ $silent = 0 ]
then
echo " Cluster member seems fine!"
fi
$FWDIR/bin/cphaconf set_pnote -d host_monitor -s ok report
fi
if [ "$silent" = 0 ]
then
echo "sleeping"
fi
sleep $1
echo "sleep $1"
done
$FWDIR/bin/clusterXL_monitor_process
Script Workflow
1. Registers Critical Devices (with the status "ok") called as the names of the processes you specified
in the $FWDIR/conf/cpha_proc_list file.
2. While the script detects that the specified process runs, it does not change the status of the
corresponding Critical Device.
3. If the script detects that the specified process do not run anymore, it reports the state of the
corresponding Critical Device as "problem".
This gracefully changes the state of the Cluster Member to "DOWN".
If the script detects that the specified process runs again, it changes the status of the corresponding
Critical Device to "ok" again.
Example
#!/bin/sh
#
# This script monitors the existance of processes in the system. The process names should be written
# in the $FWDIR/conf/cpha_proc_list file one every line.
#
# USAGE :
# cpha_monitor_process X silent
# where X is the number of seconds between process probings.
# if silent is set to 1, no messages will appear on the console.
#
#
# We initially register a pnote for each of the monitored processes
# (process name must be up to 15 charachters) in the problem notification mechanism.
# when we detect that a process is missing we report the pnote to be in "problem" state.
# when the process is up again - we report the pnote is OK.
if [ "$2" -le 1 ]
then
silent=$2
else
silent=0
fi
if [ -f $FWDIR/conf/cpha_proc_list ]
then
procfile=$FWDIR/conf/cpha_proc_list
else
echo "No process file in $FWDIR/conf/cpha_proc_list "
exit 0
fi
arch=`uname -s`
while [ 1 ]
do
result=1
status=$?
if [ $status = 0 ]
then
if [ $silent = 0 ]
then
echo " $process is alive"
fi
# echo "3, $FWDIR/bin/cphaconf set_pnote -d $process -s ok report"
$FWDIR/bin/cphaconf set_pnote -d $process -s ok report
else
if [ $silent = 0 ]
then
echo " $process is down"
fi
done
if [ $result = 0 ]
then
if [ $silent = 0 ]
then
echo " One of the monitored processes is down!"
fi
else
if [ $silent = 0 ]
then
echo " All monitored processes are up "
fi
fi
if [ "$silent" = 0 ]
then
echo "sleeping"
fi
sleep $1
done
SecureXL Commands
For more information about SecureXL, see:
n R80.40 Performance Tuning Administration Guide - Chapter SecureXL.
n sk98722 - ATRG: SecureXL.
fwaccel help
fwaccel6 help
fwaccel6
conns <options>
dbg <options>
dos <options>
feature <options>
off <options>
on <options>
ranges <options>
stat <options>
stats <options>
synatk <options>
tab <options>
templates <options>
ver
dos <options> Controls the Rate Limiting for DoS Mitigation in SecureXL.
See "fwaccel dos" on page 1257.
off <options> Stops the acceleration on-the-fly. This does not survive reboot.
See "fwaccel off" on page 1284.
fwaccel cfg
Description
The fwaccel cfg command controls the SecureXL acceleration parameters.
Important - In Cluster, you must configure all the Cluster Members in the same way
Syntax
fwaccel cfg
-h
-a {<Number of Interface> | <Name of Interface> | reset}
-b {on | off}
-c <Number>
-d <Number>
-e <Number>
-i {on | off}
-l <Number>
-m <Seconds>
-p {on | off}
-r <Number>
-v <Seconds>
-w {on | off}
Important:
n These commands do not provide output. You cannot see the currently configured
values.
n Changes made with these commands do not survive reboot.
Parameters
Parameter Description
Parameter Description
Notes:
n This command does not support Falcon Acceleration Cards.
n To see the required information about the interfaces, run these
commands in the specified order:
"fw getifs" on page 1002
"fw ctl iflist" on page 982
n To see if the "fwaccel cfg -a ..." command failed, run this
command:
tail -n 10 /var/log/messages
-c <Number> Configures the maximal number of connections, when SecureXL disables the
templates.
Parameter Description
-l <Number> Configures the maximal number of entries in the SecureXL templates database.
Valid values are:
n 0 - To disable the limit (this is the default).
n Between 10 and 524288 - To configure the limit.
Important - If you configure a limit, you must stop and start the
acceleration for this change to take effect. Run the "fwaccel off" on
page 1284 command and then the "fwaccel on" on page 1288
command.
-m <Seconds> Configures the timeout for entries in the SecureXL templates database.
Valid values are:
n 0 - To disable the timeout (this is the default).
n Between 10 and 524288 - To configure the timeout.
-r <Number> Configures the maximal number of retries for SecureXL API calls.
-w {on | Configures the support for warnings about the IPS protection Sequence Verifier:
off}
n on - Enable the support for these warnings.
n off - Disables the support for these warnings.
fwaccel conns
Description
The fwaccel conns and fwaccel6 conns commands show the list of the SecureXL connections on the local
Security Gateway, or Cluster Member.
Warning - If the number of concurrent connections is large, when you run these
commands, they can consume memory and CPU at very high level (see sk118716).
fwaccel6 conns
-h
-f <Filter>
-m <Number of Entries>
-s
Parameters
Parameter Description
Parameter Description
-f <Filter> Show the SecureXL Connections Table entries based on the specified filter
flags.
Notes:
n To see the available filter flags, run:
fwaccel conns -h
Parameter Description
Parameter Description
Idx Interface
--- ---------
0 lo
1 eth0
2 eth1
fwaccel dbg
Description
The fwaccel dbg command controls the SecureXL debug. See "SecureXL Debug" on page 1421.
Important - In Cluster, you must configure all the Cluster Members in the same way
Syntax
fwaccel dbg
-h
-m <Name of SecureXL Debug Module>
all
+ <Debug Flags>
- <Debug Flags>
reset
-f {"<5-Tuple Debug Filter>" | reset}
list
resetall
Parameters
Parameter Description
fwaccel dbg
all Enables all debug flags for the specified debug module.
Parameter Description
+ <Debug Flags> Enables the specified debug flags for the specified debug module:
Syntax:
Note - You must press the space bar key after the plus
(+) character.
- <Debug Flags> Disables all debug flags for the specified debug module.
Syntax:
Note - You must press the space bar key after the minus
(-) character.
reset Resets all debug flags for the specified debug module to their
default state.
-f "<5-Tuple Debug Configures the debug filter to show only debug messages that
Filter>" contain the specified connection.
The filter is a string of five numbers separated with commas:
"<Source IP Address>,<Source
Port>,<Destination IP Address>,<Destination
Port>,<Protocol Number>"
Notes:
n You can configure only one debug filter at one
time.
n You can use the asterisk "*" as a wildcard for an
IP Address, Port number, or Protocol number.
n For more information, see IANA Service Name
and Port Number Registry and IANA Protocol
Numbers.
resetall Reset all debug flags for all debug modules to their default state.
Module: db
err get save del tmpl tmo init ant profile nmr nmt
Module: api
err init add update del acct conf stat vpn notif tmpl sv pxl qos gtp infra tmpl_info upd_conf upd_if_inf
add_sa del_sa del_all_sas misc get_features get_tab get_stat reset_stat tag long_ver del_all_tmpl get_state
upd_link_sel
Module: pkt
err f2f frag spoof acct notif tcp_state tcp_state_pkt sv cpls routing drop pxl qos user deliver vlan pkt
nat wrp corr caf
Module: infras
err reorder pm
Module: tmpl
err dtmpl_get dtmpl_notif tmpl
Module: vpn
err vpnpkt linksel routing vpn
Module: nac
err db db_get pkt pkt_ex signature offload idnt ioctl nac
Module: cpaq
init client server exp cbuf opreg transport transport_utils error
Module: synatk
init conf conn err log pkt proxy state msg
Module: adp
err rt nh eth heth wrp inf mbs bpl bplinf mbeinf if drop bond xmode ipsctl xnp
Module: dos
fw1-cfg fw1-pkt sim-cfg sim-pkt err detailed drop
[Expert@MyGW:0]#
Module: db (1)
err
Module: db (1)
err
Example 4 - Configuring debug filter for an SSH connection from 192.168.20.30 to 172.16.40.50
... ...
fwaccel dos
Description
The fwaccel dos and fwaccel6 dos commands control the Rate Limiting for DoS mitigation techniques in
SecureXL on the local Security Gateway, or Cluster Member.
Important:
n On VSX Gateway, first go to the context of an applicable Virtual
System.
In Gaia Clish, run: set virtual-system <VSID>
In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure all the Cluster Members in the
same way
fwaccel6 dos
blacklist <options>
config <options>
rate <options>
stats <options>
Parameters
Parameter Description
Parameter Description
rate <options> Shows and installs the Rate Limiting policy in SecureXL.
See "fwaccel dos rate" on page 1272.
stats <options> Shows and clears the DoS real-time statistics in SecureXL.
See "fwaccel dos stats" on page 1274.
whitelist Configures the whitelist for source IP addresses in the SecureXL Penalty
<options> Box.
See "fwaccel dos whitelist" on page 1276.
Description
The fwaccel dos blacklist and fwaccel6 dos blacklist commands control the IP blacklist in SecureXL.
The blacklist blocks all traffic to and from the specified IP addresses.
The blacklist drops occur in SecureXL, which is more efficient than an Access Control Policy to drop the
packets.
Important:
n On VSX Gateway, first go to the context of an applicable Virtual System.
In Gaia Clish, run: set virtual-system <VSID>
In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
n To enforce the IP blacklist in SecureXL, you must first enable the IP blacklists.
See these commands:
l "fwaccel dos config" on page 1261
l "fw sam_policy" on page 1375 (let you configure more granular rules)
Parameters
Parameter Description
Description
The fwaccel dos config and fwaccel6 dos config commands control the global configuration
parameters of the Rate Limiting for DoS mitigation in SecureXL.
These global parameters apply to all configured Rate Limiting rules.
Important:
n On VSX Gateway, first go to the context of an applicable Virtual
System.
In Gaia Clish, run: set virtual-system <VSID>
In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure all the Cluster Members in the
same way
--disable-drop- Disables the drops of all fragmented packets. This is the default configuration.
frags
Important - This option applies to only VSX, and only for traffic that
arrives at a Virtual System through a Virtual Switch (packets
received through a Warp interface). From R80.20, IP Fragment
reassembly occurs in SecureXL before the Warp-jump from a Virtual
Switch to a Virtual System. To block IP fragments, the Virtual Switch
must be configured with this option. Otherwise, this has no effect,
because the IP fragments would already be reassembled when they
arrive at the Virtual System's Warp interface.
--disable-log- Disables the notifications when the DoS module drops a packet due to rate
drops limiting policy.
--disable- Disables the acceptance of all packets that otherwise would be dropped.
monitor
This is the default configuration.
--enable-log- Enables the notifications when the DoS module drops a packet due to rate
drops limiting policy.
This is the default configuration.
--enable-log- Enables the notifications when administrator adds an IP address to the penalty
pbox box.
This is the default configuration.
--enable- Enables the acceptance of all packets that otherwise would be dropped.
monitor
-n <NOTIF_RATE> Configures the maximal number of drop notifications per second for each
SecureXL device.
--notif-rate
<NOTIF_RATE> Range: 0 - (232-1)
Default: 100
-p <PBOX_RATE> Configures the minimal number of reported dropped packets before SecureXL
adds a source IPv4 address to the penalty box.
--pbox-rate
<PBOX_RATE> Range: 0 - (232-1)
Default: 500
-t <PBOX_TMO> Configures the number of seconds until SecureXL removes an IP is from the
penalty box.
--pbox-tmo
<PBOX_TMO> Range: 0 - (232-1)
Default: 180
File Description
$FWDIR/conf/fwaccel_dos_ This shell script for IPv4 must contain only the fwaccel
rate_on_install dos config set commands:
#!/bin/bash
fwaccel dos config set <options>
$FWDIR/conf/fwaccel6_dos_ This shell script for IPv6 must contain only the fwaccel6
rate_on_install dos config set commands:
#!/bin/bash
fwaccel6 dos config set <options>
Notes:
n To create or edit these files, log in to the Expert mode.
n If these files do not already exist, create them with one of these commands:
l touch $FWDIR/conf/<Name of File>
l vi $FWDIR/conf/<Name of File>
n On VSX Gateway, before you create these files, go to the context of an
applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n These files must start with the "#!/bin/bash" line.
n These files must end with a new empty line.
n After you create these files, you must assign the execute permission to them:
chmod +x $FWDIR/conf/<Name of File>
!/bin/bash
fwaccel dos config set --enable-internal
fwaccel dos config set --enable-pbox
Description
The fwaccel dos pbox command controls the Penalty Box whitelist in SecureXL.
The SecureXL Penalty Box is a mechanism that performs an early drop of packets that arrive from
suspected sources. The purpose of this feature is to allow the Security Gateway to cope better under high
traffic load, possibly caused by a DoS/DDoS attack.
The SecureXL Penalty Box detects clients that send packets, which the Access Control Policy drops, and
clients that violate the IPS protections. If the SecureXL Penalty Box detects a specific client frequently, it
puts that client in a penalty box. From that point, SecureXL drops all packets that arrive from the blocked
source IP address.
The Penalty Box whitelist in SecureXL lets you configure the source IP addresses, which the SecureXL
Penalty Box never blocks.
Important:
n This command supports only IPv4.
n On VSX Gateway, first go to the context of an applicable Virtual System.
In Gaia Clish, run: set virtual-system <VSID>
In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
n To enforce the Penalty Box in SecureXL, you must first enable the Penalty Box.
See these commands:
l "fwaccel dos config" on page 1261
l "fwaccel dos whitelist" on page 1276
l "fwaccel synatk whitelist" on page 1347
Parameters
Parameter Description
flush Removes (flushes) all source IP addresses from the Penalty Box.
whitelist <options> Configures the whitelist for source IP addresses in the SecureXL
Penalty Box.
-a <IPv4 Address> Adds the specified IP address to the Penalty Box whitelist.
[/<Subnet Prefix>]
n <IPv4 Address> - Can be an IP address of a network or a
host.
n <Subnet Prefix> - Must specify the length of the subnet
mask in the format /<bits>.
Optional for a host IP address.
Mandatory for a network IP address.
Range - from /1 to /32.
Examples:
n For a host:
192.168.20.30
192.168.20.30/32
n For a network:
192.168.20.0/24
Parameter Description
-d <IPv4 Address> Removes the specified IP address from the Penalty Box whitelist.
[/<Subnet Prefix>]
n <IPv4 Address> - Can be an IP address of a network or a
host.
n <Subnet Prefix> - Optional. Must specify the length of the
subnet mask in the format /<bits>.
Optional for a host IP address.
Mandatory for a network IP address.
Range - from /1 to /32.
-l /<Path>/<Name of Loads the Penalty Box whitelist entries from the specified plain-text
File> file.
Important:
n You must manually create and configure this file with
the touch or vi command.
n You must assign at least the read permission to this
file with the chmod +x command.
Parameter Description
-L Loads the Penalty Box whitelist entries from the plain-text file with a
predefined name:
$FWDIR/conf/pbox-whitelist-v4.conf
Security Gateway automatically runs this command fwaccel dos
pbox whitelist -L during each boot.
Important:
n This file does not exist by default.
n You must manually create and configure this file with
the touch or vi command.
n You must assign at least the read permission to this
file with the chmod +x command..
n Each entry in this file must be on a separate line.
n Each entry in this file must be in this format:
<IPv4 Address>[/<Subnet Prefix>]
n SecureXL ignores empty lines and lines that start
with the # character in this file.
Description
The fwaccel dos rate and fwaccel6 dos rate commands show and install the Rate Limiting policy in
SecureXL.
Important:
n On VSX Gateway, first go to the context of an applicable Virtual System.
In Gaia Clish, run: set virtual-system <VSID>
In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
Parameters
Parameter Description
get '<Rule Shows information about the rule specified by its Rule UID or its zero-based rule
UID>' index.
The quote marks and angle brackets ('<...>') are mandatory.
For more information about the fw sam_policy command, see "fw sam_
policy" on page 1375.
Notes
n If you install a new rate limiting policy with more than one rule, it automatically enables the rate
limiting feature.
To disable the rate limiting feature manually, run this command (see "fwaccel dos config" on
page 1261):
n To delete the current rate limiting policy, install a new policy with zero rules.
Description
The fwaccel dos stats and fwaccel6 dos stats commands show and clear the DoS real-time statistics in
SecureXL.
Important:
n On VSX Gateway, first go to the context of an applicable Virtual System.
In Gaia Clish, run: set virtual-system <VSID>
In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
Parameters
Parameter Description
Description
The fwaccel dos whitelist command configures the whitelist for source IP addresses in the SecureXL
Penalty Box.
This whitelist overrides which packet the SecureXL Penalty Box drops.
Notes:
n This command supports only IPv4.
n On VSX Gateway, first go to the context of an applicable Virtual System.
In Gaia Clish, run: set virtual-system <VSID>
In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
n This whitelist overrides entries in the blacklist. Before you use a 3rd-party or
automatic blacklists, add trusted networks and hosts to the whitelist to avoid
outages.
n This whitelist unblocks IP Options and IP fragments from trusted sources when
you explicitly configure one these SecureXL features:
l --enable-drop-opts
l --enable-drop-frags
See the "fwaccel dos config" on page 1261 command.
n To whitelist the Rate Limiting policy, refer to the bypass action of the fw samp
command. For example, fw samp -a b ...
For more information about the fw sam_policy command, see the R80.40
Performance Tuning Administration Guide - Section Rate Limiting for DoS
Mitigation - Section 'fw sam_policy' and 'fw6 sam_policy'.
n This command is similar to the "fwaccel dos pbox whitelist"
command (see "fwaccel dos pbox" on page 1267).
n Also, see the "fwaccel synatk whitelist" on page 1347 command.
Parameters
Parameter Description
-a <IPv4 Address> Adds the specified IP address to the Penalty Box whitelist.
[/<Subnet Prefix>]
n <IPv4 Address> - Can be an IPv4 address of a network or a
host.
n <Subnet Prefix> - Must specify the length of the subnet mask
in the format /<bits>.
Optional for a host IPv4 address.
Mandatory for a network IPv4 address.
Range - from /1 to /32.
Important - If you do not specify the subnet prefix explicitly, this
command uses the subnet prefix /32.
Examples:
n For a host:
192.168.20.30
192.168.20.30/32
n For a network:
192.168.20.0/24
Parameter Description
-d <IPv4 Address> Removes the specified IPv4 address from the Penalty Box whitelist.
[/<Subnet Prefix>]
n <IPv4 Address> - Can be an IPv4 address of a network or a
host.
n <Subnet Prefix> - Optional. Must specify the length of the
subnet mask in the format /<bits>.
Optional for a host IPv4 address.
Mandatory for a network IPv4 address.
Range - from /1 to /32.
Important - If you do not specify the subnet prefix explicitly, this
command uses the subnet prefix /32.
-l /<Path>/<Name Loads the Penalty Box whitelist entries from the specified plain-text file.
of File>
Note - To replace the current whitelist with the contents of a new file, use
both the -F and -l parameters on the same command line.
Important:
n You must manually create and configure this file with the touch or
vi command.
n You must assign at least the read permission to this file with the
chmod +x command.
n Each entry in this file must be on a separate line.
n Each entry in this file must be in this format:
<IPv4 Address>[/<Subnet Prefix>]
n SecureXL ignores empty lines and lines that start with the #
character in this file.
Parameter Description
-L Loads the Penalty Box whitelist entries from the plain-text file with a
predefined name:
$FWDIR/conf/pbox-whitelist-v4.conf
Security Gateway automatically runs this command fwaccel dos
pbox whitelist -L during each boot.
Note - To replace the current whitelist with the contents of a new file, use
both the -F and -L parameters on the same command line.
Important:
n This file does not exist by default.
n You must manually create and configure this file with the touch or
vi command.
n You must assign at least the read permission to this file with the
chmod +x command..
n Each entry in this file must be on a separate line.
n Each entry in this file must be in this format:
<IPv4 Address>[/<Subnet Prefix>]
n SecureXL ignores empty lines and lines that start with the #
character in this file.
fwaccel feature
Description
The fwaccel feature and fwaccel6 feature commands enable and disable the specified SecureXL features.
Important:
n If you disable a SecureXL feature, SecureXL does not accelerate the applicable traffic
anymore.
n This change does not survive reboot.
n In VSX Gateway, this change is global and applies to all Virtual Systems.
n In Cluster, you must configure the SecureXL in the same way on all the Cluster Members.
Parameters
Parameter Description
fwaccel off
Description
The fwaccel off and fwaccel6 off commands stop the SecureXL on-the-fly.
Starting from R80.20, you can stop the SecureXL only temporarily. The SecureXL starts automatically
when you start Check Point services (with the "cpstart" on page 911 command), or reboot the Security
Gateway.
Important:
n Disable the SecureXL only for debug purposes, if Check Point Support explicitly
instructs you to do so.
n If you disable the SecureXL, this change does not survive reboot.
SecureXL remains disabled until you enable it again on-the-fly, or reboot the
Security Gateway.
n If you disable the SecureXL, this change applies only to new connections that
arrive after you disable the acceleration.
SecureXL continues to accelerate the connections that are already accelerated.
Other non-connection oriented processing continues to function (for example,
virtual defragmentation, VPN decrypt).
n On VSX Gateway:
l If you wish to stop the acceleration only for a specific Virtual System, go to
the context of that Virtual System.
In Gaia Clish, run: set virtual-system <VSID>
Parameters
Parameter Description
ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy | SIC Stat
-----+---------------------+-----------------------+-----------------+--------------------------+---------
1 | S VS1 | VS1_Policy | 17Sep2018 12:47 | <No Policy> | Trust
2 | S VS2 | VS2_Policy | 17Sep2018 12:47 | <No Policy> | Trust
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel stat -t
+-----------------------------------------------------------------------------+
|Id|Name |Status |Interfaces |Features |
+-----------------------------------------------------------------------------+
|0 |SND |enabled |eth1,eth2,eth3 |Acceleration,Cryptography |
+-----------------------------------------------------------------------------+
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]#
ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy | SIC Stat
-----+---------------------+-----------------------+-----------------+--------------------------+---------
1 | S VS1 | VS1_Policy | 17Sep2018 12:47 | <No Policy> | Trust
2 | S VS2 | VS2_Policy | 17Sep2018 12:47 | <No Policy> | Trust
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel off -a
SecureXL device disabled. (Virtual ID 0)
SecureXL device disabled. (Virtual ID 1)
SecureXL device disabled. (Virtual ID 2)
[Expert@MyVSXGW:1]#
fwaccel on
Description
The fwaccel on and fwaccel6 on commands start the acceleration on-the-fly, if it was previously stopped
with the fwaccel off or fwaccel6 off command (see "fwaccel off" on page 1284).
Important:
n On VSX Gateway:
l If you wish to start the acceleration only for a specific Virtual System, go to
the context of that Virtual System.
In Gaia Clish, run: set virtual-system <VSID>
In Expert mode, run: vsenv <VSID>
l If you wish to start the acceleration for all Virtual Systems, you must use
the -a parameter.
In this case, it does not matter from which Virtual System context you run
this command.
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
Parameters
Parameter Description
[Expert@MyGW:0]# fwaccel on
SecureXL device is enabled.
[Expert@MyGW:0]#
ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy | SIC Stat
-----+---------------------+-----------------------+-----------------+--------------------------+---------
1 | S VS1 | VS1_Policy | 17Sep2018 12:47 | <No Policy> | Trust
2 | S VS2 | VS2_Policy | 17Sep2018 12:47 | <No Policy> | Trust
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel stat -t
+-----------------------------------------------------------------------------+
|Id|Name |Status |Interfaces |Features |
+-----------------------------------------------------------------------------+
|0 |SND |disabled |eth1,eth2,eth3 |Acceleration,Cryptography |
+-----------------------------------------------------------------------------+
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel on
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel stat -t
+-----------------------------------------------------------------------------+
|Id|Name |Status |Interfaces |Features |
+-----------------------------------------------------------------------------+
|0 |SND |enabled |eth1,eth2,eth3 |Acceleration,Cryptography |
+-----------------------------------------------------------------------------+
[Expert@MyVSXGW:1]#
ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy | SIC Stat
-----+---------------------+-----------------------+-----------------+--------------------------+---------
1 | S VS1 | VS1_Policy | 17Sep2018 12:47 | <No Policy> | Trust
2 | S VS2 | VS2_Policy | 17Sep2018 12:47 | <No Policy> | Trust
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel on -a
[Expert@MyVSXGW:1]#
fwaccel ranges
Description
The fwaccel ranges and fwaccel6 ranges commands show the SecureXL loaded ranges:
n Ranges of Rule Base source IP addresses
n Ranges of Rule Base destination IP addresses
n Ranges of Rule Base destination ports and protocols
The Security Gateway creates these ranges during the policy installation. The Firewall creates and
offloads ranges to SecureXL when any of these feature is enabled:
n Rulebase ranges for Drop Templates
n Anti-Spoofing enforcement ranges on per-interface basis
n NAT64 ranges
n NAT46 ranges
These ranges are related to matching of connections to SecureXL Drop Templates. These ranges
represent the Source, Destination and Service columns of the Rule Base.
These ranges are not exactly the same as the Rule Base, because as there are objects that cannot be
represented as real (deterministic) IP addresses. For example, Domain objects and Dynamic objects. The
Security Gateway converts such non-deterministic objects to "Any" IP address.
In addition, implied rules are represented in these ranges, except for some specific implied rules.
You can use these commands for troubleshooting.
fwaccel6 ranges
-h
-a
-l
-p <Range ID>
-s <Range ID>
Parameters
Parameter Description
or Note - In the list of SecureXL Drop Templates (output of the "fwaccel templates" on
page 1356 command), each Drop Template is assembled from ranges indexes. To see
No mapping between range index and the range itself, run this command fwaccel
Parameters
ranges -a. This lets you understand better the practical ranges for Drop Templates
and when it is appropriate to use them.
Examples
Example 2 - Show the full information for all loaded ranges from a non-VSX Gateway
[Expert@MyGW:0]# fwaccel ranges
SecureXL device 0:
Rule base source ranges (ip):
(0) 0.0.0.0 - 192.168.204.0
(1) 192.168.204.1 - 192.168.204.1
(2) 192.168.204.2 - 192.168.204.39
(3) 192.168.204.40 - 192.168.204.40
(4) 192.168.204.41 - 192.168.254.39
(5) 192.168.254.40 - 192.168.254.40
(6) 192.168.254.41 - 255.255.255.255
Rule base destination ranges (ip):
(0) 0.0.0.0 - 192.168.204.0
(1) 192.168.204.1 - 192.168.204.1
(2) 192.168.204.2 - 192.168.204.39
(3) 192.168.204.40 - 192.168.204.40
(4) 192.168.204.41 - 192.168.254.39
(5) 192.168.254.40 - 192.168.254.40
(6) 192.168.254.41 - 255.255.255.255
Rule base dport ranges (port, proto):
(0) 0, 0 - 138, 6
(1) 139, 6 - 139, 6
(2) 140, 6 - 18189, 6
(3) 18190, 6 - 18190, 6
(4) 18191, 6 - 18191, 6
(5) 18192, 6 - 18192, 6
(6) 18193, 6 - 19008, 6
(7) 19009, 6 - 19009, 6
(8) 19010, 6 - 136, 17
(9) 137, 17 - 138, 17
(10) 139, 17 - 65535, 65535
[Expert@MyGW:0]#
Example 3 - Show the full information for the specified range from a non-VSX Gateway
[Expert@MyGW:0]# fwaccel ranges -p 0
SecureXL device 0:
Rule base source ranges (ip):
(0) 0.0.0.0 - 192.168.204.0
(1) 192.168.204.1 - 192.168.204.1
(2) 192.168.204.2 - 192.168.204.39
(3) 192.168.204.40 - 192.168.204.40
(4) 192.168.204.41 - 192.168.254.39
(5) 192.168.254.40 - 192.168.254.40
(6) 192.168.254.41 - 255.255.255.255
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel ranges -p 1
SecureXL device 0:
Rule base destination ranges (ip):
(0) 0.0.0.0 - 192.168.204.0
(1) 192.168.204.1 - 192.168.204.1
(2) 192.168.204.2 - 192.168.204.39
(3) 192.168.204.40 - 192.168.204.40
(4) 192.168.204.41 - 192.168.254.39
(5) 192.168.254.40 - 192.168.254.40
(6) 192.168.254.41 - 255.255.255.255
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel ranges -p 2
SecureXL device 0:
Rule base dport ranges (port, proto):
(0) 0, 0 - 138, 6
(1) 139, 6 - 139, 6
(2) 140, 6 - 18189, 6
(3) 18190, 6 - 18190, 6
(4) 18191, 6 - 18191, 6
(5) 18192, 6 - 18192, 6
(6) 18193, 6 - 19008, 6
(7) 19009, 6 - 19009, 6
(8) 19010, 6 - 136, 17
(9) 137, 17 - 138, 17
(10) 139, 17 - 65535, 65535
[Expert@MyGW:0]#
Example 4 - Show the summary information for the specified range from a non-VSX
Gateway
[Expert@MyGW:0]# fwaccel ranges -s 0
SecureXL device 0:
List name "Rule base source ranges (ip):", ID 0, Number of ranges 7
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel ranges -s 1
SecureXL device 0:
List name "Rule base destination ranges (ip):", ID 1, Number of ranges 7
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel ranges -s 2
SecureXL device 0:
List name "Rule base dport ranges (port, proto):", ID 2, Number of ranges 11
[Expert@MyGW:0]#
Example 6 - Show the full information for all loaded ranges from a VSX Gateway
[Expert@MyVSXGW:2]# vsenv 0
Context is set to Virtual Device VSX2_192.168.3.242 (ID 0).
[Expert@MyVSXGW:0]# fwaccel ranges
SecureXL device 0:
Anti spoofing ranges eth0:
(0) 0.0.0.0 - 10.20.29.255
(1) 10.20.31.0 - 126.255.255.255
(2) 128.0.0.0 - 192.168.2.255
(3) 192.168.3.1 - 192.168.3.241
(4) 192.168.3.243 - 192.168.3.254
(5) 192.168.4.0 - 223.255.255.255
(6) 240.0.0.0 - 255.255.255.254
Anti spoofing ranges eth1:
(0) 10.20.30.1 - 10.20.30.241
(1) 10.20.30.243 - 10.20.30.254
[Expert@MyVSXGW:0]#
[Expert@MyVSXGW:1]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]# fwaccel ranges
SecureXL device 0:
Anti spoofing ranges eth3:
(0) 40.50.60.0 - 40.50.60.255
(1) 192.168.196.17 - 192.168.196.17
(2) 192.168.196.19 - 192.168.196.30
Anti spoofing ranges eth2.52:
(0) 70.80.90.0 - 70.80.90.255
(1) 192.168.196.1 - 192.168.196.1
(2) 192.168.196.3 - 192.168.196.14
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 2
Context is set to Virtual Device VS2 (ID 2).
[Expert@MyVSXGW:2]# fwaccel ranges
SecureXL device 0:
Anti spoofing ranges eth4:
(0) 100.100.100.0 - 100.100.100.255
(1) 192.168.196.17 - 192.168.196.17
(2) 192.168.196.19 - 192.168.196.30
Anti spoofing ranges eth2.53:
(0) 192.168.196.1 - 192.168.196.1
(1) 192.168.196.3 - 192.168.196.14
(2) 200.200.200.0 - 200.200.200.255
[Expert@MyVSXGW:2]#
Example 7 - Show the summary information for the specified range from a VSX Gateway
[Expert@MyVSXGW:2]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel ranges -s 0
SecureXL device 0:
List name "Anti spoofing ranges eth3:", ID 0, Number of ranges 3
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel ranges -s 1
SecureXL device 0:
List name "Anti spoofing ranges eth2.52:", ID 1, Number of ranges 3
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel ranges -s 2
SecureXL device 0:
The requested range table is empty
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 2
Context is set to Virtual Device VS2 (ID 2).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:2]# fwaccel ranges -s 0
SecureXL device 0:
List name "Anti spoofing ranges eth4:", ID 0, Number of ranges 3
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:2]# fwaccel ranges -s 1
SecureXL device 0:
List name "Anti spoofing ranges eth2.53:", ID 1, Number of ranges 3
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:2]# fwaccel ranges -s 2
SecureXL device 0:
The requested range table is empty
[Expert@MyVSXGW:2]#
fwaccel stat
Description
The fwaccel stat and fwaccel6 stat commands show the SecureXL status, the list of the accelerated
interfaces and the list of the accelerated features on the local Security Gateway, or Cluster Member.
Parameters
Parameter Description
[Expert@MyGW:0]#
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel stat
+---------------------------------------------------------------------
--------+
|Id|Name |Status |Interfaces |Features
|
+---------------------------------------------------------------------
--------+
|0 |SND |enabled |eth1,eth2,eth3
|Acceleration,Cryptography |
| | | | |Crypto:
Tunnel,UDPEncap,MD5, |
| | | |
|SHA1,NULL,3DES,DES,CAST, |
| | | | |CAST-40,AES-128,AES-
256,ESP, |
| | | |
|LinkSelection,DynamicVPN, |
| | | | |NatTraversal,AES-
XCBC,SHA256 |
+---------------------------------------------------------------------
--------+
fwaccel stats
Description
The fwaccel stats and fwaccel6 stats commands show acceleration statistics for IPv4 on the local Security
Gateway, or Cluster Member.
fwaccel6 stats
[-c]
[-d]
[-l]
[-m]
[-n]
[-o]
[-p]
[-q]
[-r]
[-s]
[-x]
Parameters
Parameter Description
In addition, see:
n "Description of the Statistics Counters in the "fwaccel stats" Output" on page 1306
n "Example Outputs on the "fwaccel stats" Commands" on page 1312
Counter Description
C non TCP conns Number of non-TCP connections the SecureXL currently handles.
Counter Description
Counter Description
Counter Description
Counter Description
Counter Description
Counter Description
Enqueued OUT packets Number of waiting packets in Firewall QoS outbound queue.
Dequeued OUT packets Number of processed packets in Firewall QoS outbound queue.
Enqueued OUT bytes Number of waiting bytes in Firewall QoS outbound queue.
Dequeued OUT bytes Number of processed bytes in Firewall QoS outbound queue.
Counter Description
Enqueued OUT packets Number of waiting packets in SecureXL QoS outbound queue.
Dequeued OUT packets Number of processed packets in SecureXL QoS outbound queue.
Enqueued OUT bytes Number of waiting bytes in SecureXL QoS outbound queue.
Dequeued OUT bytes Number of processed bytes in SecureXL QoS outbound queue.
Counter Description
F2F packets Number of packets that SecureXL forwarded to the Firewall kernel in Slow
Path.
F2F bytes Number of bytes that SecureXL forwarded to the Firewall kernel in Slow Path.
F2V conn Number of packets that matched a SecureXL connection and SecureXL
match pkts forwarded to the Firewall kernel.
F2V packets Number of packets that SecureXL forwarded to the Firewall kernel and the
Firewall re-injected back to SecureXL.
F2V bytes Number of bytes that SecureXL forwarded to the Firewall kernel and the
Firewall re-injected back to the SecureXL.
Counter Description
gtp f2f pkts Number of GTP packets the SecureXL forwarded to the Firewall
kernel.
gtp apn err pkts Number of GTP packets with APN errors.
Counter Description
C tcp handshake Number of current TCP connections that are not yet established.
conn
C tcp closed Number of closed TCP connections the SecureXL currently handles.
conns
C tcp pxl Number of not yet established PXL TCP connections the SecureXL
handshake currently handles.
C tcp pxl Number of established PXL TCP connections the SecureXL currently
establishe handles.
C tcp pxl closed Number of closed PXL TCP connections the SecureXL currently handles.
con
Accelerated Path
--------------------------------------------------------------------
------------------
accel packets 0 accel bytes
0
outbound packets 0 outbound bytes
0
conns created 0 conns deleted
0
C total conns 0 C TCP conns
0
C non TCP conns 0 nat conns
0
dropped packets 0 dropped bytes
0
fragments received 0 fragments transmit
0
fragments dropped 0 fragments expired
0
IP options stripped 0 IP options restored
0
IP options dropped 0 corrs created
0
corrs deleted 0 C corrections
0
corrected packets 0 corrected bytes
0
0
CPASXL async packets 0 PSLXL async packets
0
CPASXL bytes 0 PSLXL bytes
0
C CPASXL conns 0 C PSLXL conns
0
CPASXL conns created 0 PSLXL conns created
0
PXL FF conns 0 PXL FF packets
0
PXL FF bytes 0 PXL FF acks
0
PXL no conn drops 0
QoS Paths
--------------------------------------------------------------------
------------------
QoS General Information:
------------------------
Total QoS Conns 0 QoS Classify Conns
0
QoS Classify flow 0 Reclassify QoS policy
0
Firewall Path
--------------------------------------------------------------------
------------------
F2F packets 35324 F2F bytes
1797781
TCP violations 0 F2V conn match pkts
0
F2V packets 0 F2V bytes
0
GTP
--------------------------------------------------------------------
------------------
gtp tunnels created 0 gtp tunnels
0
gtp accel pkts 0 gtp f2f pkts
0
gtp spoofed pkts 0 gtp in gtp pkts
0
gtp signaling pkts 0 gtp tcpopt pkts
0
gtp apn err pkts 0
General
--------------------------------------------------------------------
------------------
memory used 38798784 C tcp handshake conns
0
C tcp established conns 0 C tcp closed conns
0
C tcp pxl handshake conns 0 C tcp pxl established
conns 0
C tcp pxl closed conns 0 outbound cpasxl
packets 0
outbound pslxl packets 0 outbound cpasxl bytes
0
outbound pslxl bytes 0 DNS DoR stats
0
0
PXL FF packets 0 PXL FF bytes
0
PXL FF acks 0 PXL no conn drops
0
PSL Inline packets 0 PSL Inline bytes
0
CPAS Inline packets 0 CPAS Inline bytes
0
Total QoS Conns 0 QoS Classify Conns
0
QoS Classify flow 0 Reclassify QoS policy
0
Enqueued IN packets 0 Enqueued OUT packets
0
Dequeued IN packets 0 Dequeued OUT packets
0
Enqueued IN bytes 0 Enqueued OUT bytes
0
Dequeued IN bytes 0 Dequeued OUT bytes
0
Enqueued IN packets 0 Enqueued OUT packets
0
Dequeued IN packets 0 Dequeued OUT packets
0
Enqueued IN bytes 0 Enqueued OUT bytes
0
Dequeued IN bytes 0 Dequeued OUT bytes
0
F2F packets 35383 F2F bytes
1801493
TCP violations 0 F2V conn match pkts
0
F2V packets 0 F2V bytes
0
gtp tunnels created 0 gtp tunnels
0
gtp accel pkts 0 gtp f2f pkts
0
gtp spoofed pkts 0 gtp in gtp pkts
0
gtp signaling pkts 0 gtp tcpopt pkts
0
gtp apn err pkts 0 memory used
38798784
C tcp handshake conns 0 C tcp established conns
0
C tcp closed conns 0 C tcp pxl handshake
conns 0
C tcp pxl established conns 0 C tcp pxl closed conns
0
outbound cpasxl packets 0 outbound pslxl packets
0
Appliaction: F2V
Statistic Value
----------------------------------- --------------------
Queued pkts 0
Max queued pkts 0
Timer triggered 0
Callback hahndling unhold 0
Callback hahndling unhold and drop 0
Callback hahndling reset 0
Dequeued pkts resumed 0
Queue ent allocated 0
Queue ent freed 0
Queues allocated 0
Queues freed 0
Ack notif sent 0
Ack respones handling 0
Dequeued pkts dropped 0
Reached max queued pkt limit 0
Set timer failed 0
Error already held 0
Queue ent alloc failed 0
Queue alloc failed 0
Ack notif failed 0
Ack respones handling failed 0
----------------------------------------------------
Appliaction: Route
Statistic Value
----------------------------------- --------------------
Queued pkts 0
Max queued pkts 0
Timer triggered 0
Callback hahndling unhold 0
Callback hahndling unhold and drop 0
Callback hahndling reset 0
Dequeued pkts resumed 0
Queue ent allocated 0
Queue ent freed 0
Queues allocated 0
Queues freed 0
Ack notif sent 0
Ack respones handling 0
Dequeued pkts dropped 0
Reached max queued pkt limit 0
Set timer failed 0
Error already held 0
Queue ent alloc failed 0
Queue alloc failed 0
Ack notif failed 0
Ack respones handling failed 0
----------------------------------------------------
Queued pkts 0
Max queued pkts 0
Timer triggered 0
Callback hahndling unhold 0
Callback hahndling unhold and drop 0
Callback hahndling reset 0
Dequeued pkts resumed 0
Queue ent allocated 0
Queue ent freed 0
Queues allocated 0
Queues freed 0
Ack notif sent 0
Ack respones handling 0
Dequeued pkts dropped 0
Reached max queued pkt limit 0
Set timer failed 0
Error already held 0
Queue ent alloc failed 0
Queue alloc failed 0
Ack notif failed 0
Ack respones handling failed 0
----------------------------------------------------
Appliaction: F2P
Statistic Value
----------------------------------- --------------------
Queued pkts 0
Max queued pkts 0
Timer triggered 0
Callback hahndling unhold 0
Callback hahndling unhold and drop 0
Callback hahndling reset 0
Dequeued pkts resumed 0
Queue ent allocated 0
Queue ent freed 0
Queues allocated 0
Queues freed 0
Ack notif sent 0
Ack respones handling 0
Dequeued pkts dropped 0
Reached max queued pkt limit 0
Set timer failed 0
Error already held 0
Queue ent alloc failed 0
Queue alloc failed 0
Ack notif failed 0
Ack respones handling failed 0
----------------------------------------------------
F2F packets:
--------------
Violation Packets Violation
Packets
-------------------- --------------- -------------------- -----
----------
pkt has IP options 0 ICMP miss conn
3036
TCP-SYN miss conn 8 TCP-other miss conn
32224
UDP miss conn 3772 other miss conn
0
VPN returned F2F 0 uni-directional viol
0
possible spoof viol 0 TCP state viol
0
out if not def/accl 0 bridge, src=dst
0
routing decision err 0 sanity checks failed
0
fwd to non-pivot 0 broadcast/multicast
0
cluster message 0 cluster forward
0
chain forwarding 0 F2V conn match pkts
0
general reason 0 route changes
0
fwaccel synatk
Description
The fwaccel synatk and fwaccel6 synatk commands control the Accelerated SYN Defender on the local
Security Gateway, or Cluster Member.
Important - See sk120476 for information about the 'SYN Attack' protection in SmartConsole.
fwaccel synatk
-a
-c <options>
-d
-e
-g
-m
-t <options>
config
monitor <options>
state <options>
whitelist <options>
fwaccel6 synatk
-a
-c <options>
-d
-e
-g
-m
-t <options>
config
monitor <options>
state <options>
whitelist <options>
Parameters
Parameter Description
Parameter Description
-m Enables the Accelerated SYN Defender in Monitor (Detect only) mode on all
interfaces.
In this state, the Accelerated SYN Defender only sends a log when it recognizes a
TCP SYN Flood attack.
See "fwaccel synatk -m" on page 1335.
-t <options> Configures the threshold numbers of half-opened TCP connections that trigger
the Accelerated SYN Defender.
See "fwaccel synatk -t <Threshold>" on page 1336.
fwaccel synatk -a
Description
The fwaccel synatk -a and fwaccel6 synatk -a commands apply the Accelerated SYN Defender
configuration from the default $FWDIR/conf/synatk.conf file.
Notes:
n Both IPv4 and IPv6 use the same configuration file.
n Interface specific state settings that you define in the configuration file, override
the settings that you define with these commands:
l "fwaccel synatk -d" on page 1332
l "fwaccel synatk -e" on page 1333
l "fwaccel synatk -g" on page 1334
l "fwaccel synatk -m" on page 1335
fwaccel synatk -a
fwaccel6 synatk -a
Description
The fwaccel synatk -c <Configuration File> and fwaccel6 synatk -c <Configuration File> commands apply
the Accelerated SYN Defender configuration from the specified file.
Important - If you use this parameter, then it must be the first parameter in the syntax.
Notes:
n Both IPv4 and IPv6 use the same configuration file.
n Interface specific state settings that you define in the configuration file, override
the settings that you define with these commands:
l "fwaccel synatk -d" on page 1332
l "fwaccel synatk -e" on page 1333
l "fwaccel synatk -g" on page 1334
l "fwaccel synatk -m" on page 1335
Parameters
Parameter Description
<Configuration File> Specifies the full path and the name of the file.
For reference, see the default file:
$FWDIR/conf/synatk.conf
fwaccel synatk -d
Description
The fwaccel synatk -d and fwaccel6 synatk -d commands disable the Accelerated SYN Defender on all
interfaces.
Notes:
n This command:
1. Modifies the default configuration file $FWDIR/conf/synatk.conf, or
the configuration file specified with the -c parameter.
2. Loads the modified file.
n Output of the "fwaccel synatk monitor" on page 1340 command shows:
l Configuration: Disabled
l Enforce: Disable
l State: Disable
n Output of the "fwaccel synatk config" on page 1337 command shows:
l enabled 0
l enforce 0
fwaccel synatk -d
fwaccel6 synatk -d
fwaccel synatk -e
Description
The fwaccel synatk -e and fwaccel6 synatk -e commands:
n Enable the Accelerated SYN Defender on interfaces with topology "External".
n Enable the Accelerated SYN Defender in Monitor (Detect only) mode on interfaces with topology
"Internal".
Notes:
n This command:
1. Modifies the default configuration file $FWDIR/conf/synatk.conf, or
the configuration file specified with the -c parameter.
2. Loads the modified file.
n Output of the "fwaccel synatk monitor" on page 1340 command shows for
"External" interfaces:
l Configuration: Enforcing
l Enforce: Prevent
l State: Ready (may change later depending on what the SYN Defender
detects)
n Output of the "fwaccel synatk monitor" on page 1340 command shows for
"Internal" interfaces:
l Configuration: Enforcing
l Enforce: Detect
l State: Monitor
n Output of the "fwaccel synatk config" on page 1337 command shows:
l enabled 1
l enforce 1
fwaccel synatk -e
fwaccel6 synatk -e
fwaccel synatk -g
Description
The fwaccel synatk -g and fwaccel6 synatk -g commands enable the Accelerated SYN Defender on all
interfaces.
Notes:
n This command:
1. Modifies the default configuration file $FWDIR/conf/synatk.conf, or
the configuration file specified with the -c parameter.
2. Loads the modified file.
n Output of the "fwaccel synatk monitor" on page 1340 command shows for
"External" interfaces:
l Configuration: Enforcing
l Enforce: Prevent
l State: Ready (may change later depending on what the SYN Defender
detects)
n Output of the "fwaccel synatk monitor" on page 1340 command shows for
"Internal" interfaces:
l Configuration: Enforcing
l Enforce: Detect
l State: Monitor
fwaccel synatk -g
fwaccel6 synatk -g
fwaccel synatk -m
Description
The fwaccel synatk -m and fwaccel6 synatk -m commands enable the Accelerated SYN Defender in
Monitor (Detect only) mode on all interfaces.
In this state, the Accelerated SYN Defender only sends a log when it recognizes a TCP SYN Flood attack.
Notes:
n This command:
1. Modifies the default configuration file $FWDIR/conf/synatk.conf, or
the configuration file specified with the -c parameter.
2. Loads the modified file.
n Output of the "fwaccel synatk monitor" on page 1340 command shows:
l Configuration: Monitoring
l Enforce: Detect
l State: Monitor
n Outputs of the 'fwaccel synatk config' and 'fwaccel6 synatk
config' commands show:
Output of the "fwaccel synatk config" on page 1337 command shows:
l enabled 1
l enforce 0
fwaccel synatk -m
fwaccel6 synatk -m
Description
The fwaccel synatk -t <Threshold> and fwaccel6 synatk -t <Threshold> commands configure the
threshold numbers of half-opened TCP connections that trigger the Accelerated SYN Defender.
Notes:
n This command:
1. Modifies the default configuration file $FWDIR/conf/synatk.conf, or
the configuration file specified with the -c parameter.
2. Loads the modified file.
n Threshold values are independent for IPv4 and IPv6.
Thresholds
n The Global high attack threshold number is configured to the specified value <Threshold>.
This is the number of half-open TCP connections on all interfaces required for the Accelerated SYN
Defender to engage.
l Valid values: 100 and greater
l Default: 10000
n The High attack threshold number is configured to 1/2 of the specified value <Threshold>.
This is the high number of half-open TCP connections on an interface required for the Accelerated
SYN Defender to engage.
l Valid values: (Low attack threshold) < (High attack threshold) <= (Global high attack
threshold)
l Default: 5000
n The Low attack threshold number is configured to 1/10 of the specified value <Threshold>.
This is the low number of half-open TCP connections on an interface required for the Accelerated
SYN Defender to engage.
l Valid values: 10 and greater
l Default: 1000
Description
The fwaccel synatk config and fwaccel6 synatk config commands show the current Accelerated SYN
Defender configuration.
Example
Parameter Description
enforce When the Accelerated SYN Defender is enabled, shows it enforces the protection.
Valid values:
n 0 - The Accelerated SYN Defender is in Monitor (Detect only) mode on all
interfaces.
n 1 - The Accelerated SYN Defender is engaged only on external interfaces
when the number of half-open TCP connections exceeds the threshold.
n 2 - The Accelerated SYN Defender is engaged on both external and internal
interfaces when the number of half-open TCP connections exceeds the
threshold.
min_frag_sz During the TCP SYN Flood attack, the Accelerated SYN Defender prevents TCP
fragments smaller than this minimal size value.
n Valid values: 80 and greater
n Default: 80
Parameter Description
monitor_log_ Interval, in milliseconds, between successive warning logs in the Monitor (Detect
interval only) mode.
(msec)
n Valid values: 1000 and greater
n Default: 60000
grace_ Maximal time, in milliseconds, to stay in the Grace state (which is a transitional
timeout state between Ready and Active ).
(msec)
In the Grace state, the Accelerated SYN Defender stops challenging Clients for
TCP SYN Cookie, but continues to validate TCP SYN Cookies it receives from
Clients.
n Valid values: 10000 and greater
n Default: 30000
Description
The fwaccel synatk monitor and fwaccel6 synatk monitor commands show the Accelerated SYN Defender
status.
Important - To enable the Accelerated SYN Defender in Monitor (Detect only) mode on
all interfaces, you must run the "fwaccel synatk -m" on page 1335 command.
Parameters
Important - You can specify only one of these options: -a, -s, or -v.
Parameter Description
-p Shows the Accelerated SYN Defender status for each SecureXL instance ("PPAK ID:
0" is the Host Security Appliance).
[-p] -a Shows the Accelerated SYN Defender statistics for all interfaces (for each SecureXL
instance).
[-p] -s Shows the attack state in short form (for each SecureXL instance).
[-p] -v Shows the attack state in verbose form (for each SecureXL instance).
Examples
Example 1 - Default output before and after enabling the Accelerated SYN Defender
[Expert@MyGW:0]# fwaccel synatk monitor
+-----------------------------------------------------------------------------+
| SYN Defender status |
+-----------------------------------------------------------------------------+
| Configuration Disabled |
| Status Normal |
| Non established connections 0 |
| Global Threshold 10000 |
| Interface Threshold 5000 |
+-----------------------------------------------------------------------------+
| IF | Topology | Enforce | State (sec) | Non-established conns |
| | | | | Peak | Current |
+-----------------------------------------------------------------------------+
| eth0 | External | Disable | Disable | N/A | N/A |
| eth1 | Internal | Disable | Disable | N/A | N/A |
+-----------------------------------------------------------------------------+
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel synatk -m
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel synatk monitor
+-----------------------------------------------------------------------------+
| SYN Defender status |
+-----------------------------------------------------------------------------+
| Configuration Monitoring |
| Status Normal |
| Non established connections 0 |
| Global Threshold 10000 |
| Interface Threshold 5000 |
+-----------------------------------------------------------------------------+
| IF | Topology | Enforce | State (sec) | Non-established conns |
| | | | | Peak | Current |
+-----------------------------------------------------------------------------+
| eth0 | External | Detect | Monitor | 0 | 0 |
| eth1 | Internal | Detect | Monitor | 0 | 0 |
+-----------------------------------------------------------------------------+
[Expert@MyGW:0]#
Example 2 - Showing the Accelerated SYN Defender status for each SecureXL instance
[Expert@MyGW:0]# fwaccel synatk monitor -p
+-----------------------------------------------------------------------------+
| SYN Defender status |
+-----------------------------------------------------------------------------+
| Configuration Monitoring |
| Status Normal |
| Non established connections 0 |
| Global Threshold 10000 |
| Interface Threshold 5000 |
+-----------------------------------------------------------------------------+
| IF | Topology | Enforce | State (sec) | Non-established conns |
| | | | | Peak | Current |
+-----------------------------------------------------------------------------+
| eth0 | External | Detect | Monitor | 0 | 0 |
| eth1 | Internal | Detect | Monitor | 0 | 0 |
+-----------------------------------------------------------------------------+
PPAK ID: 0
----------
+-----------------------------------------------------------------------------+
| SYN Defender status |
+-----------------------------------------------------------------------------+
| Configuration Monitoring |
| Status Normal |
| Non established connections 0 |
| Global Threshold 10000 |
| Interface Threshold 5000 |
+-----------------------------------------------------------------------------+
| IF | Topology | Enforce | State (sec) | Non-established conns |
| | | | | Peak | Current |
+-----------------------------------------------------------------------------+
| eth0 | External | Detect | Monitor | 0 | 0 |
| eth1 | Internal | Detect | Monitor | 0 | 0 |
+-----------------------------------------------------------------------------+
[Expert@MyGW:0]#
Example 3 - Showing the Accelerated SYN Defender statistics for all interfaces and for
each SecureXL instance.
[Expert@MyGW:0]# fwaccel synatk monitor -p -a
Global:
status attached
nr_active 0
Firewall
----------
Per-interface:
eth0 eth1
---------- ----------
topology External Internal
state Monitor Monitor
syn ready 0 0
syn active prev 0 0
syn active curr 0 0
active_score 0 0
msec grace 0 0
msec active 0 0
sent cookies 0 0
fail validations 0 0
succ validations 0 0
early packets 0 0
no conn data 0 0
bogus syn 0 0
peak non-estab 0 0
int sent cookies 0 0
int succ validations 0 0
msec interval 0 0
PPAK ID: 0
----------
Per-interface:
eth0 eth1
---------- ----------
topology External Internal
state Monitor Monitor
syn ready 0 0
syn active prev 0 0
syn active curr 0 0
active_score 0 0
msec grace 0 0
msec active 0 0
sent cookies 0 0
fail validations 0 0
succ validations 0 0
early packets 0 0
no conn data 0 0
bogus syn 0 0
peak non-estab 0 0
int sent cookies 0 0
int succ validations 0 0
msec interval 0 0
[Expert@MyGW:0]#
Example 4 - Showing the attack state in short form (for each SecureXL instance)
[Expert@MyGW:0]# fwaccel synatk monitor -p -s
M,N,0,0
PPAK ID: 0
----------
M,N,0,0
[Expert@MyGW:0]#
Example 5 - Showing the attack state in verbose form (for each SecureXL instance)
[Expert@MyGW:0]# fwaccel synatk monitor -p -v
+-----------------------------------------------------------------------------+
| SYN Defender statistics |
+-----------------------------------------------------------------------------+
| Status Normal |
| Spoofed SYN/sec 0 |
+-----------------------------------------------------------------------------+
PPAK ID: 0
----------
+-----------------------------------------------------------------------------+
| SYN Defender statistics |
+-----------------------------------------------------------------------------+
| Status Normal |
| Spoofed SYN/sec 0 |
+-----------------------------------------------------------------------------+
[Expert@MyGW:0]#
Description
The fwaccel synatk state and fwaccel6 synatk state commands control the Accelerated SYN Defender
states.
The states are independent for IPv4 and IPv6.
Important - This command is not intended for end-user usage. State transitions
(between Ready, Grace and Active) occur automatically. This command provides a
way to force temporarily a state transition on an interface or group of interfaces.
Parameters
Important - You can specify only one of these parameters: -a, -d, -g, -m, or -r.
Parameter Description
Description
The fwaccel synatk whitelist and fwaccel6 synatk whitelist commands control the Accelerated SYN
Defender whitelist.
Notes:
n This whitelist overrides which packet the Accelerated SYN Defender drops.
Before you use a 3rd-party or automatic blacklists, add trusted networks and
hosts to the whitelist to avoid outages.
n Also, see the "fwaccel dos whitelist" on page 1276 command.
Important - In Cluster, you must configure the Rate Limiting in the same way on all the
Cluster Members.
Parameters
Parameter Description
-a <IPv4 Address> Adds the specified IPv4 address to the Accelerated SYN Defender
[/<Subnet Prefix>] whitelist.
n <IPv4 Address> - Can be an IPv4 address of a network or a
host.
n <Subnet Prefix> - Must specify the length of the subnet mask
in the format /<bits>.
Optional for a host IPv4 address.
Mandatory for a network IPv4 address.
Range - from /1 to /32.
Examples:
n For a host:
192.168.20.30
192.168.20.30/32
n For a network:
192.168.20.0/24
Parameter Description
-a <IPv6 Address> Adds the specified IPv6 address to the Accelerated SYN Defender
[/<Subnet Prefix>] whitelist.
n <IPv6 Address> - Can be an IPv6 address of a network or a
host.
n <Subnet Prefix> - Must specify the length of the subnet mask
in the format /<bits>.
Optional for a host IPv6 address.
Mandatory for a network IPv6 address.
Range - from /1 to /128.
Examples:
n For a host:
2001:0db8:85a3:0000:0000:8a2e:0370:7334
2001:0db8:85a3:0000:0000:8a2e:0370:7334/128
n For a network:
2001:cdba:9abc:5678::/64
-d <IPv4 Address> Removes the specified IPv4 address from the Accelerated SYN
[/<Subnet Prefix>] Defender whitelist.
n <IPv4 Address> - Can be an IPv4 address of a network or a
host.
n <Subnet Prefix> - Optional. Must specify the length of the
subnet mask in the format /<bits>.
Optional for a host IPv4 address.
Mandatory for a network IPv4 address.
Range - from /1 to /32.
Parameter Description
-d <IPv6 Address> Removes the specified IPv6 address from the Accelerated SYN
[/<Subnet Prefix>] Defender whitelist.
n <IPv6 Address> - Can be an IPv6 address of a network or a
host.
n <Subnet Prefix> - Optional. Must specify the length of the
subnet mask in the format /<bits>.
Optional for a host IPv6 address.
Mandatory for a network IPv6 address.
Range - from /1 to /128.
-l /<Path>/<Name of Loads the Accelerated SYN Defender whitelist entries from the specified
File> plain-text file.
Important:
n You must manually create and configure this file with the
touch or vi command.
n You must assign at least the read permission to this file
with the chmod +x command.
n Each entry in this file must be on a separate line.
n Each entry in this file must be in this format:
<IPv4 Address>[/<Subnet Prefix>]
n SecureXL ignores empty lines and lines that start with
the # character in this file.
Parameter Description
-L Loads the Accelerated SYN Defender whitelist entries from the plain-text
file with a predefined name:
$FWDIR/conf/synatk-whitelist-v4.conf
Security Gateway automatically runs these commands {fwaccel |
fwaccel6} synatk whitelist -L during each boot.
Important:
n This file does not exist by default.
n You must manually create and configure this file with the
touch or vi command.
n You must assign at least the read permission to this file
with the chmod +x command..
n Each entry in this file must be on a separate line.
n Each entry in this file must be in this format:
<IPv4 Address>[/<Subnet Prefix>]
n SecureXL ignores empty lines and lines that start with
the # character in this file.
Example
fwaccel tab
Description
The fwaccel tab and fwaccel6 tab commands show the contents of the specified SecureXL kernel table.
Notes:
n Dynamic tables, such as the connections table can change while this
command prints their contents.
This may cause some values to be missed or reported twice.
n For some tables, the command prints their contents on the screen.
n For some tables, the command prints their contents to the
/var/log/messages file.
n Also, see the "fw tab" on page 1093 command.
fwaccel [-i <SecureXL ID>] tab [-f] [-m <Number of Rows>] -t <Name of
Kernel Table>
Parameters
Parameter Description
-m <Number of Rows> Specifies how many rows to show from the kernel table.
Note - The command counts from the top of the table.
Default : 1000
Parameter Description
Examples
[Expert@MyGW:0]# fwaccel tab -f -m 200 -t connections
Table connections is empty
[Expert@MyGW:0]#
fwaccel templates
Description
The fwaccel templates and fwaccel6 templates commands show the contents of the SecureXL templates
tables:
n Accept Templates
n Drop Templates
Important - Based on the number of current templates, these commands can consume
memory at very high level.
fwaccel6 templates
[-h]
[-d]
[-m <Number of Rows>]
[-s]
[-S]
Parameters
Parameter Description
No Parameters Shows the contents of the SecureXL Accept Templates table (Table Name -
cphwd_tmpl, Table ID - 8111).
-m <Number of Specifies how many rows to show from the templates table.
Rows>
Note - The command counts from the top of the table.
Default : 1000
Flag Description
B Connection is created for a rule that contains an Identity Awareness object, or for a rule below
that rule.
D Connection is created for a rule that contains a Domain object, or for a rule below that rule.
N Connection is NATed.
O Connection is created for a rule that contains a Dynamic object, or for a rule below that rule.
R Connection is created for a rule that contains a Traceroute object, or for a rule below that rule.
S PXL (combination of SecureXL and PSL (Passive Streaming Library)) is enabled for this
connection.
T Connection is created for a rule that contains a Time object, or for a rule below that rule.
U Connection is unidirectional.
Z Connection is created for a rule that contains a Security Zone object, or for a rule below that rule.
Flag Description
Examples
Templates stats:
[Expert@MyGW:0]#
fwaccel ver
Description
Shows this information:
n Firewall Version and Build
n Accelerator Version
n Firewall API version
n Accelerator API version
Syntax
fwaccel ver
Example
sim6
affinity <options>
affinityload
ctl get <options>
ctl set <options>
enable_aesni
if
nonaccel <options>
ver <options>
Parameters
Parameter Description
Parameter Description
ctl get To get a value of a kernel parameter, follow "Working with Kernel Parameters on
<options> Security Gateway" on page 1769.
ctl set To set a value of a kernel parameter, follow "Working with Kernel Parameters on
<options> Security Gateway" on page 1769.
sim affinity
Description
Controls the SecureXL affinity settings of network interfaces to CPU cores.
Important - SecureXL can affine network interfaces only to CPU cores that run as
CoreXL SND. For more information, see sk98737 - ATRG: CoreXL.
sim6 affinity
-a
-h
-l
-s
Parameters
Parameter Description
Options:
-l -
-s - set affinity settings manually
-a - set affinity settings automatically
-h - this help message
[Expert@MyGW:0]#
sim affinityload
Description
Configures the SecureXL affinity settings of network interfaces to CPU cores in 'Automatic' mode.
This command is the same as the "sim affinity" on page 1363 command.
sim6 affinityload
Parameters
Parameter Description
Example
sim enable_aesni
Description
Enables SecureXL support for AES Instruction Set (AES-NI), if this computer supports it.
sim6 enable_aesni
Parameters
Parameter Description
Example
sim if
Description
Shows the list of interfaces that SecureXL uses.
sim6 if
Parameters
Parameter Description
Example
[Expert@MyGW:0]# sim if
Name | Address | Netmask | CXL Address | CXL Netmask | MTU | F | SIM F | IRQ |
IFN:FWN:DVN | Dev
-----------------------------------------------------------------------------------------------------------
-------------------------
eth0 | 192.168.3.242 | 0.0.0.0 | 192.168.3.243 | 255.255.255.0 | 1500 | 039 | 00080 | 67 |
2: 1: 2 | 0x0x3e836000
eth1 | 10.20.30.242 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 1500 | 029 | 00088 | 75 |
3: 2: 3 | 0x0x3d508000
eth2 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 1500 | 001 | 00080 | 59 |
4: 3: 4 | 0x0x3d6b4000
eth3 | 192.168.196.18 | 0.0.0.0 | 40.50.60.52 | 0.0.0.0 | 1500 | 029 | 00080 | 67 |
5: 4: 5 | 0x0x3dbc1000
eth4 | 192.168.196.18 | 0.0.0.0 | 100.100.100.53 | 0.0.0.0 | 1500 | 029 | 00080 | 83 |
6: 5: 6 | 0x0x3d678000
eth5 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 1500 | 001 | 00080 | 75 |
7: 6: 7 | 0x0x3c6ba000
eth6 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 0.0.0.0 | 1500 | 001 | 00080 | 59 |
8: 7: 8 | 0x0x3e370000
eth2.53 | 192.168.196.2 | 0.0.0.0 | 200.200.200.53 | 0.0.0.0 | 1500 | 029 | 00580 | 0 |
11: 10: 11 | 0x0x2ca90000
eth2.52 | 192.168.196.2 | 0.0.0.0 | 70.80.90.52 | 0.0.0.0 | 1500 | 029 | 00580 | 0 |
12: 11: 12 | 0x0x2c980000
[Expert@MyGW:0]#
Explanation about the configuration flags in the "F" and "SIM F" columns
The "F" column shows the internal configuration flags that Firewall set on these interfaces.
The "SIM F" column shows the internal configuration flags that SecureXL set on these interfaces.
Flag Description
0x001 If this flag is set, the SecureXL drops the packet at the end of the inbound inspection, if the
packet is a "cut-through" packet. In outbound, SecureXL forwards all the packets to the
network.
0x002 If this flag is set, the SecureXL sends an appropriate notification whenever a TCP state
change occurs (connection is established / torn down).
0x004 If this flag is set, the SecureXL it sets the UDP header's checksum field correctly when the
SecureXL encapsulates an encrypted packet (UDP encapsulation).
If this flag is not set, SecureXL sets the UDP header's checksum field to zero. It is safe to
ignore this flag, if it is set to 0 (SecureXL still calculates the UDP packet's checksum).
0x008 If this flag is set, the SecureXL does not create new connections that match a template, and
SecureXL drops the packet that matches the template, when the Connections Table reaches
the specified limit.
If this flag is not set, the SecureXL forwards the packet to the Firewall.
0x010 If this flag is set, the SecureXL forwards fragments to the Firewall.
0x020 If this flag is set, the SecureXL does not create connections from TCP templates anymore.
The Firewall can still offload connections to SecureXL.
This flag only disables only the creation of TCP templates.
0x040 If this flag is set, the SecureXL periodically notifies the Firewall, so it refreshes the
accelerated connections in the Firewall kernel tables.
0x080 If this flag is set, the SecureXL does not create connections from non-TCP templates
anymore.
The Firewall can still offload connections to SecureXL.
This flag only disables only the creation of non-TCP templates.
0x100 If this flag is set, the SecureXL allows sequence verification violations for connections that did
not complete the TCP 3-way handshake process (otherwise, SecureXL must forward the
violating packets to the Firewall).
0x200 If this flag is set, the SecureXL allows sequence verification violations for connections that
completed the TCP 3-way handshake process (otherwise, SecureXL must forward the
violating packets to the Firewall).
0x400 If this flag is set, the SecureXL forwards TCP [RST] packets to the Firewall.
0x0001 If this flag is set, the SecureXL notifies the Firewall about HitCount data.
0x0002 If this flag is set, the VSX Virtual System acts as a junction, rather than a normal Virtual
System (only the local Virtual System flag is applicable).
0x0004 If this flag is set, the SecureXL disables the reply counter of inbound encrypted traffic.
This makes SecureXL kernel module act in the same way as the VPN kernel module does.
Flag Description
0x0008 If this flag is set, the SecureXL enables the MSS Clamping.
Refer to the kernel parameters 'fw_clamp_tcp_mss' and 'fw_clamp_vpn_mss' in
sk101219.
0x0010 If this flag is set, the SecureXL disables the "No Match Ranges" (NMR) Templates (see
sk117755).
0x0020 If this flag is set, the SecureXL disables the "No Match Time" (NMT) Templates (see
sk117755).
0x0040 If this flag is set, the SecureXL does not send Drop Templates notifications (about dropped
packets) to the Firewall (to maintain the drop counters).
For example, if you set the value of the kernel parameter 'activate_optimize_drops_
support_now' to 1, it disables the Drop Templates notifications.
0x0080 If this flag is set, the SecureXL enables the MultiCore support for IPsec VPN (see sk118097).
0x0100 If this flag is set, the SecureXL enables the support for CoreXL Dynamic Dispatcher (see
sk105261).
0x0800 If this flag is set, the SecureXL does not enforce the Path MTU Discovery for IP multicast
packets.
0x1000 If this flag is set, the SecureXL disables the SIM "drop_templates" feature.
0x2000 If this flag is set, it indicates that an administrator enabled the Link Selection Load Sharing
feature.
0x4000 If this flag is set, the SecureXL disables the asynchronous notification feature.
0x8000 If this flag is set, it indicates that the Firewall Connections Table capacity is unlimited.
Examples:
Value Description
sim nonaccel
Description
n Sets the specified interfaces as non-accelerated.
n Clears the specified interfaces from non-accelerated state.
sim6 nonaccel
-c <Name of Interface 1> [<Name of Interface 2> ... <Name of
Interface N>]
-s <Name of Interface 1> [<Name of Interface 2> ... <Name of
Interface N>]
Parameters
Parameter Description
Example
Note: Changes will not take affect until the next time acceleration
is started or the relevant interface(s) are restarted.
[Expert@MyGW:0]#
Note: Changes will not take affect until the next time acceleration
is started or the relevant interface(s) are restarted.
[Expert@MyGW:0]#
sim ver
Description
Shows this information:
n SecureXL (Performance Pack) version
n Kernel version
Parameters
Parameter Description
Example
fw sam_policy
Description
Manages the Suspicious Activity Policy editor that lets you work with these types of rules:
n Suspicious Activity Monitoring (SAM) rules.
See sk112061: How to create and view Suspicious Activity Monitoring (SAM) Rules.
n Rate Limiting rules.
See sk112454: How to configure Rate Limiting rules for DoS Mitigation.
Also, see these commands:
n "fw sam" on page 271
n "sam_alert" on page 370
Notes:
n You can run these commands interchangeably: 'fw sam_policy' and 'fw
samp'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy
add <options>
batch
del <options>
get <options>
fw [-d] samp
add <options>
batch
del <options>
get <options>
Parameters
Parameter Description
del <options> Deletes one configured Rate Limiting rule one at a time.
See "fw sam_policy del" on page 297.
fw sam_policy add
Description
The 'fw sam_policy add' and 'fw6 sam_policy add' commands let you:
n Add one Suspicious Activity Monitoring (SAM) rule at a time.
n Add one Rate Limiting rule at a time.
Notes:
n You can run these commands interchangeably: 'fw sam_policy add' and
'fw samp add'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] ip <IP Filter Arguments>
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] ip <IP Filter Arguments>
fw [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] quota <Quota Filter Arguments>
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f
<Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] quota <Quota Filter Arguments
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file,
or use the script command to save the entire CLI session.
-u Optional.
Specifies that the rule category is User-defined.
Default rule category is Auto.
-a {d | n | Mandatory.
b}
Specifies the rule action if the traffic matches the rule conditions:
n d - Drop the connection.
n n - Notify (generate a log) about the connection and let it through.
n b - Bypass the connection - let it through without checking it against the policy
rules.
Note - Rules with action set to Bypass cannot have a log or limit specification.
Bypassed packets and connections do not count towards overall number of
packets and connection for limit enforcement of type ratio.
-l {r | a} Optional.
Specifies which type of log to generate for this rule for all traffic that matches:
n -r - Generate a regular log
n -a - Generate an alert log
Parameter Description
-t Optional.
<Timeout>
Specifies the time period (in seconds), during which the rule will be enforced.
Default timeout is indefinite.
-f <Target> Optional.
Specifies the target Security Gateways, on which to enforce the Rate Limiting rule.
<Target> can be one of these:
n all - This is the default option. Specifies that the rule should be enforced on
all managed Security Gateways.
n Name of the Security Gateway or Cluster object - Specifies that the rule should
be enforced only on this Security Gateway or Cluster object (the object name
must be as defined in the SmartConsole).
n Name of the Group object - Specifies that the rule should be enforced on all
Security Gateways that are members of this Group object (the object name
must be as defined in the SmartConsole).
-n "<Rule Optional.
Name>"
Specifies the name (label) for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write a
backslash (\) character. Example:
-c "<Rule Optional.
Comment>"
Specifies the comment for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write a
backslash (\) character. Example:
Parameter Description
-o "<Rule Optional.
Originator
Specifies the name of the originator for this rule.
>"
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must write a
backslash (\) character. Example:
-z "<Zone>" Optional.
Specifies the name of the Security Zone for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
Parameter Description
Important:
n The Quota rules are not applied immediately to the Security
Gateway. They are only registered in the Suspicious Activity
Monitoring (SAM) policy database. To apply all the rules from the
SAM policy database immediately, add "flush true" in the fw
samp add command syntax.
n Explanation:
For new connections rate (and for any rate limiting in general), when
a rule's limit is violated, the Security Gateway also drops all packets
that match the rule.
The Security Gateway computes new connection rates on a per-
second basis.
At the start of the 1-second timer, the Security Gateway allows all
packets, including packets for existing connections.
If, at some point, during that 1 second period, there are too many
new connections, then the Security Gateway blocks all remaining
packets for the remainder of that 1-second interval.
At the start of the next 1-second interval, the counters are reset, and
the process starts over - the Security Gateway allows packets to
pass again up to the point, where the rule’s limit is violated.
Explanation for the IP Filter Arguments syntax for Suspicious Activity Monitoring (SAM) rules
Argument Description
-m <Source Mask> Specifies the Source subnet mask (in dotted decimal format - x.y.z.w).
-M <Destination Specifies the Destination subnet mask (in dotted decimal format -
Mask> x.y.z.w).
-p <Port> Specifies the port number (see IANA Service Name and Port Number
Registry).
Explanation for the Quota Filter Arguments syntax for Rate Limiting rules
Argument Description
flush true Specifies to compile and load the quota rule to the
SecureXL immediately.
Notes:
n Default is: source-negated false
n The source-negated true processes all
source types, except the specified type.
Argument Description
Notes:
n Default is: destination-negated false
n The destination-negated true will
process all destination types except the specified
type
Argument Description
Notes:
n Default is: service-negated false
n The service-negated true will process all
traffic except the traffic with the specified
protocols and ports
Argument Description
Argument Description
Examples
Explanations:
n This rule drops packets for all connections (-a d) that exceed the quota set by this rule,
including packets for existing connections.
n This rule logs packets (-l r) that exceed the quota set by this rule.
n This rule will expire in 3600 seconds (-t 3600).
n This rule limits the rate of creation of new connections to 5 connections per second (new-conn-
rate 5) for any traffic (service any) from the source IP addresses in the range 172.16.7.11
- 172.16.7.13 (source range:172.16.7.11-172.16.7.13).
Note - The limit of the total number of log entries per second is configured with the fwaccel dos
config set -n <rate> command.
n This rule will be compiled and loaded on the SecureXL, together with other rules in the Suspicious
Activity Monitoring (SAM) policy database immediately, because this rule includes the "flush
true" parameter.
Explanations:
n This rule logs and lets through all packets (-a n) that exceed the quota set by this rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to all packets except (service-negated true) the packets with IP protocol
number 1, 50-51, 6 port 443 and 17 port 53 (service 1,50-51,6/443,17/53).
n This rule applies to all packets from source IP addresses that are assigned to the country with
specified country code (cc:QQ).
n This rule does not let any traffic through (byte-rate 0) except the packets with IP protocol
number 1, 50-51, 6 port 443 and 17 port 53.
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to packets from the Autonomous System number 64500 (asn:AS64500).
n This rule applies to packets from source IPv6 addresses FFFF:C0A8:1100/120 (cidr:
[::FFFF:C0A8:1100]/120).
n This rule applies to all traffic (service any).
n This rule does not let any traffic through (pkt-rate 0).
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
Explanations:
n This rule bypasses (-a b) all packets that match this rule.
Note - The Access Control Policy and other types of security policy rules still apply.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to packets from the source IP addresses in the range 172.16.8.17 -
172.16.9.121 (range:172.16.8.17-172.16.9.121).
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not log any packets (the -l r parameter is not specified).
n This rule does not expire (the timeout parameter is not specified). To cancel it, you must delete
it explicitly.
n This rule applies to all traffic (service any).
n This rule applies to all sources except (source-negated true) the source IP addresses that
are assigned to the country with specified country code (cc:QQ).
n This rule limits the maximal number of concurrent active connections to 655/65536=~1%
(concurrent-conns-ratio 655) for any traffic (service any) except (service-
negated true) the connections from the source IP addresses that are assigned to the country
with specified country code (cc:QQ).
n This rule counts connections, packets, and bytes for traffic only from sources that match this rule,
and not cumulatively for this rule.
n This rule will not be compiled and installed on the SecureXL immediately, because it does not
include the "flush true" parameter.
fw sam_policy batch
Description
The 'fw sam_policy batch' and 'fw6 sam_policy batch' commands let you:
n Add and delete many Suspicious Activity Monitoring (SAM) rules at a time.
n Add and delete many Rate Limiting rules at a time.
Notes:
n You can run these commands interchangeably: 'fw sam_policy batch'
and 'fw samp batch'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all of the
Cluster Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Procedure
n Enter one "add" or "del" command on each line, on as many lines as necessary.
Start each line with only "add" or "del" parameter (not with "fw samp").
n Use the same set of parameters and values as described in these commands:
l fw sam_policy add
l fw sam_policy del
n Terminate each line with a Return (ASCII 10 - Line Feed) character (press Enter).
add -a d -l r -t 3600 -c "Limit\ conn\ rate\ to\ 5\ conn/sec from\ these\ sources" quota service any source
range:172.16.7.13-172.16.7.13 new-conn-rate 5
del <501f6ef0,00000000,cb38a8c0,0a0afffe>
EOF
[Expert@HostName]#
fw sam_policy del
Description
The 'fw sam_policy del' and 'fw6 sam_policy del' commands let you:
n Delete one configured Suspicious Activity Monitoring (SAM) rule at a time.
n Delete one configured Rate Limiting rule at a time.
Notes:
n You can run these commands interchangeably: 'fw sam_policy del' and
'fw samp del'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Parameters
Parameter Description
'<Rule UID>' Specifies the UID of the rule you wish to delete.
Important:
n The quote marks and angle
brackets ('<...>') are
mandatory.
n To see the Rule UID, run the
"fw sam_policy get"
command.
Procedure
1. List all the existing rules in the Suspicious Activity Monitoring policy database
List all the existing rules in the Suspicious Activity Monitoring policy database.
n For IPv4, run:
fw sam_policy get
operation=add uid=<5ac3965f,00000000,3403a8c0,0000264a>
target=all timeout=300 action=notify log=log name=Test\ Rule
comment=Notify\ about\ traffic\ from\ 1.1.1.1 originator=John\
Doe src_ip_addr=1.1.1.1 req_tpe=ip
Explanation:
The fw samp del and fw6 samp del commands only remove a rule from the persistent
database. The Security Gateway continues to enforce the deleted rule until the next time you
compiled and load a policy. To force the rule deletion immediately, you must enter a flush-only
add rule right after the fw samp del and fw6 samp del command. This flush-only add rule
immediately deletes the rule you specified in the previous step, and times out in 2 seconds.
Best Practice - Specify a short timeout period for the flush-only rules. This
prevents accumulation of rules that are obsolete in the database.
fw sam_policy get
Description
The 'fw sam_policy get' and 'fw6 sam_policy get' commands let you:
n Show all the configured Suspicious Activity Monitoring (SAM) rules.
n Show all the configured Rate Limiting rules.
Notes:
n You can run these commands interchangeably: 'fw sam_policy get' and
'fw samp get'.
n You can run these commands in Gaia Clish, or Expert mode.
n Security Gateway stores the SAM Policy rules in the
$FWDIR/database/sam_policy.db file.
n The SAM Policy management file is $FWDIR/database/sam_policy.mng.
Important:
n Configuration you make with these commands, survives reboot.
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Policy configured in SmartView Monitor. See sk79700.
n On VSX Gateway, you must run these commands from the context of an
applicable Virtual System:
l In Gaia Clish, run: set virtual-system <VSID>
l In Expert mode, run: vsenv <VSID>
n In Cluster, you must configure the SecureXL in the same way on all the Cluster
Members.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the SAM Policy rules that you need. If you confirm that
an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t <Type> [+
{-v '<Value>'}] [-n]]
fw6 [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t <Type>
[+{-v '<Value>'}] [-n]]
Parameters
Note - All these parameters are optional.
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a
file, or use the script command to save the entire CLI session.
-u '<Rule Prints the rule specified by its Rule UID or its zero-based rule index.
UID>'
The quote marks and angle brackets ('<...>') are mandatory.
Examples
uid
<5ac3965f,00000000,3403a8c0,0000264a>
target
all
timeout
2147483647
action
notify
log
log
name
Test\ Rule
comment
Notify\ about\ traffic\ from\ 1.1.1.1
originator
John\ Doe
src_ip_addr
1.1.1.1
req_type
ip
Files
File Description
affinity Contains status and the thresholds for SecureXL New Affinity mechanism.
See "/proc/ppk/affinity" on page 1402.
File Description
nac Contains SecureXL statistics for Identity Awareness Network Access Control
(NAC) traffic.
See "/proc/ppk/nac" on page 1413.
notify_ Contains SecureXL statistics for notifications SecureXL sent to Firewall about
statistics accelerated connections.
See "/proc/ppk/notify_statistics" on page 1414.
profile_cpu_ Contains IDs of the CPU cores and status of Traffic Profiling
stat
See "/proc/ppk/profile_cpu_stat" on page 1415.
rlc Contains SecureXL statistics for drops due to Rate Limiting for DoS Mitigation.
See "/proc/ppk/rlc" on page 1416.
stats Contains the IRQ numbers and names of interfaces the SecureXL uses.
See "/proc/ppk/stats" on page 1419.
viol_ Contains SecureXL statistics for violations - packets SecureXL forwarded (F2F)
statistics to the Firewall.
See "/proc/ppk/viol_statistics" on page 1420.
/proc/ppk/affinity
Description
Contains the number of accelerated packets per second and rate of encrypted bytes.
/proc/ppk/conf
Description
Contains the SecureXL configuration and basic statistics.
Debug flags :
0 : 0x1
1 : 0x1
2 : 0x1
3 : 0x1
4 : 0x1
5 : 0x1
6 : 0x1
7 : 0x1
8 : 0x100
9 : 0x8
10 : 0x1
11 : 0x10
[Expert@MyGW:0]#
/proc/ppk/conns
Description
Contains the list of the SecureXL connections.
Important - This file is for future use. Refer to the "fwaccel conns" on page 1247 command.
/proc/ppk/cpls
Description
Contains SecureXL configuration for ClusterXL Load Sharing (CPLS).
Important - This file is for future use. Refer to the "fwaccel cfg -h" command (see
"fwaccel cfg" on page 1244).
/proc/ppk/cqstats
Description
Contains statistics for SecureXL connections queue.
/proc/ppk/drop_statistics
Description
Contains SecureXL statistics for dropped packets.
Note - This is the same information that the "fwaccel stats -d" command shows
(see "fwaccel stats" on page 1304).
/proc/ppk/ifs
Description
Contains the list of interfaces that SecureXL uses.
Explanation about the configuration flags in the "F" and "SIM F" columns
The "F" column shows the internal configuration flags that Firewall set on these interfaces.
The "SIM F" column shows the internal configuration flags that SecureXL set on these interfaces.
Flag Description
0x001 If this flag is set, the SecureXL drops the packet at the end of the inbound inspection, if the
packet is a "cut-through" packet. In outbound, SecureXL forwards all the packets to the
network.
0x002 If this flag is set, the SecureXL sends an appropriate notification whenever a TCP state
change occurs (connection is established / torn down).
0x004 If this flag is set, the SecureXL it sets the UDP header's checksum field correctly when the
SecureXL encapsulates an encrypted packet (UDP encapsulation).
If this flag is not set, SecureXL sets the UDP header's checksum field to zero. It is safe to
ignore this flag, if it is set to 0 (SecureXL still calculates the UDP packet's checksum).
0x008 If this flag is set, the SecureXL does not create new connections that match a template, and
SecureXL drops the packet that matches the template, when the Connections Table reaches
the specified limit.
If this flag is not set, the SecureXL forwards the packet to the Firewall.
0x010 If this flag is set, the SecureXL forwards fragments to the Firewall.
0x020 If this flag is set, the SecureXL does not create connections from TCP templates anymore.
The Firewall can still offload connections to SecureXL.
This flag only disables only the creation of TCP templates.
0x040 If this flag is set, the SecureXL periodically notifies the Firewall, so it refreshes the
accelerated connections in the Firewall kernel tables.
0x080 If this flag is set, the SecureXL does not create connections from non-TCP templates
anymore.
The Firewall can still offload connections to SecureXL.
This flag only disables only the creation of non-TCP templates.
0x100 If this flag is set, the SecureXL allows sequence verification violations for connections that did
not complete the TCP 3-way handshake process (otherwise, SecureXL must forward the
violating packets to the Firewall).
0x200 If this flag is set, the SecureXL allows sequence verification violations for connections that
completed the TCP 3-way handshake process (otherwise, SecureXL must forward the
violating packets to the Firewall).
0x400 If this flag is set, the SecureXL forwards TCP [RST] packets to the Firewall.
0x0001 If this flag is set, the SecureXL notifies the Firewall about HitCount data.
Flag Description
0x0002 If this flag is set, the VSX Virtual System acts as a junction, rather than a normal Virtual
System (only the local Virtual System flag is applicable).
0x0004 If this flag is set, the SecureXL disables the reply counter of inbound encrypted traffic.
This makes SecureXL kernel module act in the same way as the VPN kernel module does.
0x0008 If this flag is set, the SecureXL enables the MSS Clamping.
Refer to the kernel parameters 'fw_clamp_tcp_mss' and 'fw_clamp_vpn_mss' in
sk101219.
0x0010 If this flag is set, the SecureXL disables the "No Match Ranges" (NMR) Templates (see
sk117755).
0x0020 If this flag is set, the SecureXL disables the "No Match Time" (NMT) Templates (see
sk117755).
0x0040 If this flag is set, the SecureXL does not send Drop Templates notifications (about dropped
packets) to the Firewall (to maintain the drop counters).
For example, if you set the value of the kernel parameter 'activate_optimize_drops_
support_now' to 1, it disables the Drop Templates notifications.
0x0080 If this flag is set, the SecureXL enables the MultiCore support for IPsec VPN (see sk118097).
0x0100 If this flag is set, the SecureXL enables the support for CoreXL Dynamic Dispatcher (see
sk105261).
0x0800 If this flag is set, the SecureXL does not enforce the Path MTU Discovery for IP multicast
packets.
0x1000 If this flag is set, the SecureXL disables the SIM "drop_templates" feature.
0x2000 If this flag is set, it indicates that an administrator enabled the Link Selection Load Sharing
feature.
0x4000 If this flag is set, the SecureXL disables the asynchronous notification feature.
0x8000 If this flag is set, it indicates that the Firewall Connections Table capacity is unlimited.
Examples:
Value Description
/proc/ppk/mcast_statistics
Description
Contains SecureXL statistics for multicast traffic.
Note - This is the same information that the "fwaccel stats -m" command shows
(see "fwaccel stats" on page 1304).
/proc/ppk/nac
Description
Contains SecureXL statistics for Identity Awareness Network Access Control (NAC) traffic.
Note - This is the same information that the "fwaccel stats -n" command shows
(see "fwaccel stats" on page 1304).
/proc/ppk/notify_statistics
Description
Contains SecureXL statistics for notifications SecureXL sent to Firewall about accelerated connections.
/proc/ppk/profile_cpu_stat
Description
This file is for Check Point use only.
Contains IDs of the CPU cores and status of Traffic Profiling:
n The first column shows the IDs of the CPU cores.
n The second column shows the status of Traffic Profiling for the applicable CPU core.
/proc/ppk/rlc
Description
Contains SecureXL statistics for drops due to Rate Limiting for DoS Mitigation.
/proc/ppk/statistics
Description
Contains SecureXL overall statistics.
To see these statistics in a better way, run the "fwaccel stats" on page 1304 command.
/proc/ppk/stats
Description
Contains the IRQ numbers and names of interfaces the SecureXL uses.
/proc/ppk/viol_statistics
Description
Contains SecureXL statistics for violations - packets SecureXL forwarded (F2F) to the Firewall.
Note - This is the same information that the "fwaccel stats -p" command shows
(see "fwaccel stats" on page 1304).
[Expert@MyGW:0]#
SecureXL Debug
To understand how SecureXL processes the traffic, enable the SecureXL debug while the traffic passes
through the Security Gateway.
Warning - Debug increases the load on Security Gateway's CPU. We recommend you
schedule a maintenance window to debug the SecureXL.
fwaccel dbg
Description
The fwaccel dbg command controls the SecureXL debug. See "SecureXL Debug" on page 1421.
Important - In Cluster, you must configure all the Cluster Members in the same way
Syntax
fwaccel dbg
-h
-m <Name of SecureXL Debug Module>
all
+ <Debug Flags>
- <Debug Flags>
reset
-f {"<5-Tuple Debug Filter>" | reset}
list
resetall
Parameters
Parameter Description
fwaccel dbg
all Enables all debug flags for the specified debug module.
Parameter Description
+ <Debug Flags> Enables the specified debug flags for the specified debug module:
Syntax:
Note - You must press the space bar key after the plus
(+) character.
- <Debug Flags> Disables all debug flags for the specified debug module.
Syntax:
Note - You must press the space bar key after the minus
(-) character.
reset Resets all debug flags for the specified debug module to their
default state.
-f "<5-Tuple Debug Configures the debug filter to show only debug messages that
Filter>" contain the specified connection.
The filter is a string of five numbers separated with commas:
"<Source IP Address>,<Source
Port>,<Destination IP Address>,<Destination
Port>,<Protocol Number>"
Notes:
n You can configure only one debug filter at one
time.
n You can use the asterisk "*" as a wildcard for an
IP Address, Port number, or Protocol number.
n For more information, see IANA Service Name
and Port Number Registry and IANA Protocol
Numbers.
resetall Reset all debug flags for all debug modules to their default state.
Module: db
err get save del tmpl tmo init ant profile nmr nmt
Module: api
err init add update del acct conf stat vpn notif tmpl sv pxl qos gtp infra tmpl_info upd_conf upd_if_inf
add_sa del_sa del_all_sas misc get_features get_tab get_stat reset_stat tag long_ver del_all_tmpl get_state
upd_link_sel
Module: pkt
err f2f frag spoof acct notif tcp_state tcp_state_pkt sv cpls routing drop pxl qos user deliver vlan pkt
nat wrp corr caf
Module: infras
err reorder pm
Module: tmpl
err dtmpl_get dtmpl_notif tmpl
Module: vpn
err vpnpkt linksel routing vpn
Module: nac
err db db_get pkt pkt_ex signature offload idnt ioctl nac
Module: cpaq
init client server exp cbuf opreg transport transport_utils error
Module: synatk
init conf conn err log pkt proxy state msg
Module: adp
err rt nh eth heth wrp inf mbs bpl bplinf mbeinf if drop bond xmode ipsctl xnp
Module: dos
fw1-cfg fw1-pkt sim-cfg sim-pkt err detailed drop
[Expert@MyGW:0]#
Module: db (1)
err
Module: db (1)
err
Example 4 - Configuring debug filter for an SSH connection from 192.168.20.30 to 172.16.40.50
... ...
Note - For more information, see the R80.40 Next Generation Security Gateway
Guide - Chapter Kernel Debug on Security Gateway.
Important:
n We strongly recommend to schedule a full maintenance window to minimize the
impact on your production traffic.
n We strongly recommend to connect over serial console to your Security
Gateway.
This is to avoid a possible issue when you cannot work with the CLI because of a
high load on the CPU.
n In cluster, you must collect this debug from all Cluster Members in the same
way.
n Debug the specific SecureXL instance only when you are sure that only that
SecureXL instance processes the traffic.
Procedure
expert
Run:
fw ctl debug 0
4. Reset all the SecureXL debug flags in all SecureXL debug modules
Run:
6. Make sure the Security Gateway allocated the kernel debug buffer
Run:
7. Configure the applicable kernel debug modules and kernel debug flags
Run:
8. Configure the applicable SecureXL debug modules and SecureXL debug flags
Run:
fw ctl debug
10. Examine the SecureXL debug configuration for SecureXL debug modules
11. Remove all entries from both the Firewall Connections table and SecureXL
Connections table
Run:
fw tab -t connections -x -y
Important:
n This step makes sure that you collect the debug of the real issue that is
not affected by the existing connections.
n This command deletes all existing connections. This interrupts all
connections, including the SSH.
Run this command only if you are connected over a serial console to
your Security Gateway.
Run:
fw tab -t cphwd_tmpl -x -y
Note - This command does not interrupt the existing connections. This step
makes sure that you collect the debug of the real issue that is not affected by
the existing connection templates.
Run:
Perform the steps that cause the issue to occur, or wait for it to occur.
Press CTRL+C.
16. Reset all kernel debug flags in all kernel debug modules
Run:
fw ctl debug 0
17. Reset all the SecureXL debug flags in all SecureXL debug modules
18. Examine the kernel debug configuration to make sure it returned to the default
Run:
fw ctl debug
19. Examine the SecureXL debug configuration to make sure it returned to the default
/var/log/kernel_debug.txt
Best Practice - Compress this file with the tar -zxvf command and
transfer it from the Security Gateway to your computer. If you transfer to an
FTP server, do so in the binary mode.
Module "default"
Flag Description
init Initialization
ioctl Changes in the configuration, which were initiated from the user space
Flag Description
tag Tags that were added to the packets by the SecureXL before forwarding them to the
Firewall
util Utilization
Flag Description
Flag Description
Flag Description
nmr "No Match Ranges" templates, which allow SecureXL Accept Templates for rules that
contain Dynamic objects or Domain objects (or for rules located below such rules)
nmt "No Match Time" templates, which allow SecureXL Accept Templates for rules that
contain Time objects (or for rules located below such rules)
Flag Description
Flag Description
Flag Description
tag Tags that were added to the packets by the SecureXL before forwarding them to
the Firewall
upd_if_inf Prints some text that shows if SecureXL updated information about interfaces
Module "adp"
Flag Description
pm Pattern Matcher
Flag Description
Flag Description
ioctl Changes in the configuration, which were initiated from the user space
pkt Forwarding of connections to Firewall (when identity is not found or revoked, or NAC
packet tagging verification failed)
Flag Description
Flag Description
Flag Description
Flag Description
detailed Detailed tracing of DoS Rate Limiting logic in the packet flow.
Important - This debug flag is not suitable for large traffic volumes because it prints a
large number of messages. This causes high load on the CPU.
fw1-cfg Information about DoS Rate Limiting configuration in the Firewall kernel module
fw1-pkt Information about DoS Rate Limiting packet flow in the Firewall kernel module
sim-cfg Information about DoS Rate Limiting configuration in the SecureXL kernel module
sim-pkt Information about DoS Rate Limiting packet flow in the SecureXL kernel module
Flag Description
log Prints time of the last sent monitor log and interval between the monitor logs
msg Information about internal messages in the Accelerated SYN Defender module
Flag Description
CoreXL Commands
For more information about CoreXL, see the R80.40 Performance Tuning Administration Guide - Chapter
CoreXL.
cp_conf corexl
Description
Enables or disables CoreXL.
For more information, see the R80.40 Performance Tuning Administration Guide.
Important:
n This command is for Check Point use only.
To configure CoreXL, use the Check Point CoreXL option in the "cpconfig" on page 892
menu.
n After all changes in CoreXL configuration on the Security Gateway, you must reboot it.
n In Custer, you must configure all the Cluster Members in the same way.
Syntax
n To enable CoreXL with 'n' IPv4 Firewall instances and optionally 'k' IPv6 Firewall instances:
n To disable CoreXL:
Parameters
Parameter Description
Example
Currently, the Security Gateway runs two IP4v CoreXL Firewall instances (KERN_INSTANCE_NUM = 2).
We change the number of IP4v CoreXL Firewall instances to three.
dynamic_split
Description
On Check Point Appliances, R80.40 added the ability to change the number of CoreXL Firewall and SND
instances without reboot (Dynamic Split).
Important:
n By default, this feature is disabled.
n We do not recommend manual configuration of CoreXL Firewall and SND
instances, because such configuration disables the CoreXL Dynamic Split.
To enable the CoreXL Dynamic Split again, you must disable it and enable it.
n CoreXL Dynamic Split does not support:
l Check Point Appliances with less than 8 CPU cores.
l Check Point Appliances that run in VSX mode (regardless of the number
of CPU cores).
l Open Servers or Virtual Machines.
The dynamic_split command controls the Dynamic Split of CoreXL Firewall and SND instances on the local
Security Gateway, or Cluster Member.
For more information, see R80.40 Performance Tuning Administration Guide - Chapter CoreXL.
Syntax
dynamic_split
-o disable
-o enable
-o start
-o stop
Important:
n You must run these commands in the Expert mode.
n In Cluster, you must configure all the Cluster Members in the
same way
Parameters
Parameter Description
Parameter Description
Important:
n When you disable this feature, the
CoreXL configuration returns to the
default.
n After you disable this feature, the
Security Gateway requires a reboot.
The command shows the applicable
message.
Important:
n After you enable this feature, the
Security Gateway requires a reboot.
The command shows the applicable
message.
n After the boot, you can stop and
start this feature without reboot.
Important:
n When you start this feature, the
Security Gateway continues to
change the CoreXL split
configuration automatically based
on the CPU utilization.
n This change survives the reboot.
Important:
n When you stop this feature, the
Security Gateway uses the last
CoreXL split configuration.
n This change does not survive the
reboot.
fw ctl multik
Description
The fw ctl multik and fw6 ctl multik commands control CoreXL for IPv4 and IPv6, respectively.
fw ctl multik
add_bypass_port <options>
del_bypass_port <options>
dynamic_dispatching <options>
gconn <options>
get_instance <options>
print_heavy_conn
prioq <options>
show_bypass_ports
stat
start
stop
utilize
Parameters
Parameter Description
add_bypass_port Adds the specified TCP and UDP ports to the CoreXL Dynamic Dispatcher
<options> bypass list.
See "fw ctl multik add_bypass_port" on page 1448.
del_bypass_port Removes the specified TCP and UDP ports from the CoreXL Dynamic
<options> Dispatcher bypass list.
See "fw ctl multik del_bypass_port" on page 1450.
get_instance Shows CoreXL Firewall instance that processes the specified IPv4
<options> connection.
See "fw ctl multik get_instance" on page 1458.
Parameter Description
print_heavy_conn Shows the table with Heavy Connections (that consume the most CPU
resources) in the CoreXL Dynamic Dispatcher.
See "fw ctl multik print_heavy_conn" on page 1460.
prioq <options> Configures the CoreXL Firewall Priority Queues (see sk105762).
See "fw ctl multik prioq" on page 1462.
show_bypass_ports Shows the TCP and UDP ports configured in the bypass port list of the
CoreXL Dynamic Dispatcher.
See "fw ctl multik show_bypass_ports" on page 1463.
utilize Shows the CoreXL queue utilization for each CoreXL Firewall instance.
See "fw ctl multik utilize" on page 1468.
Syntax
Parameters
Parameter Description
<Port Number> Specifies the numbers of TCP and UDP ports to add to the list.
Example
Syntax
Parameters
Parameter Description
<Port Number> Specifies the numbers of TCP and UDP ports to remove from the list.
Example
Parameters
Parameter Description
Example
Notes:
n This command does not
support VSX.
n This command does not
support IPv6.
Syntax
Parameters
Parameter Description
Best Practice - If you use this parameter, then redirect the output to a file, or
use the script command to save the entire CLI session.
none Shows the interactive menu for the CoreXL Firewall Priority Queues.
Parameter Description
-p Shows the additional information about each CoreXL Firewall instance, including the
information about Firewall Priority Queues:
n I/O (In or Out)
n Inst. ID (CoreXL Firewall instance ID)
n Flags
n Seq (Sequence)
n Hold_ref (Hold reference)
n Prio (Firewall Priority Queues mode)
n last_enq_jiff (Jiffies since last enqueue)
n queue_indx (Queue index number)
n conn_tokens (Connection Tokens)
-sec Shows the additional information about each CoreXL Firewall instance:
n I/O (In or Out)
n Inst. ID (CoreXL Firewall instance ID)
n Flags
n Seq (Sequence)
n Hold_ref (Hold reference)
-seg Shows the default information about the specified Global Connections Segment.
<Number>
===========================================================================================================
===============
| Segm | Src IP | S.port | Dst IP | D.port | Proto | Flags | PP |Ref Cnt(I/O)|Inst|PPAK ID|clstr mem
ID|Rec. ref|Rec. Type|
===========================================================================================================
===============
| 0 | 192.168.3.52 | 18192 | 192.168.3.240 | 46082 | 6 |FP .. ..| No | 0/0 | 1 | 32 | 0 |
0 | UNDEF |
| 0 | 192.168.3.52 | 54216 | 192.168.3.240 | 257 | 6 |FP .. ..| No | 0/0 | 1 | 32 | 0 |
0 | UNDEF |
| 0 | 192.168.3.240 | 53925 | 192.168.3.53 | 18192 | 6 |FP .. ..| No | 0/0 | 0 | 32 | 1 |
0 | UNDEF |
| 0 | 192.168.3.240 | 257 | 192.168.3.52 | 54216 | 6 |FP .. ..| No | 0/0 | 1 | 32 | 0 |
0 | UNDEF |
| 0 | 192.168.3.53 | 18192 | 192.168.3.240 | 64216 | 6 |FP .. ..| No | 0/0 | 1 | 32 | 15 |
0 | UNDEF |
| 0 | 0.0.0.0 | 8116 | 192.168.3.53 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 | 1 |
0 | UNDEF |
| 0 | 0.0.0.0 | 8116 | 192.168.3.52 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 | 0 |
0 | UNDEF |
| 0 | 192.168.3.240 | 64216 | 192.168.3.53 | 18192 | 6 |FP .. ..| No | 0/0 | 1 | 32 | 15 |
0 | UNDEF |
| 0 | 192.168.3.52 | 8116 | 0.0.0.0 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 | 0 |
0 | UNDEF |
| 0 | 172.20.168.16 | 63800 | 192.168.3.53 | 22 | 6 |FP .. ..| No | 0/0 | 0 | 32 | 1 |
0 | UNDEF |
| 0 | 192.168.3.240 | 46082 | 192.168.3.52 | 18192 | 6 |FP .. ..| No | 0/0 | 1 | 32 | 0 |
0 | UNDEF |
| 0 | 192.168.3.53 | 8116 | 0.0.0.0 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 | 1 |
0 | UNDEF |
| 0 | 192.168.3.53 | 22 | 172.20.168.16 | 63800 | 6 |FP .. ..| No | 0/0 | 0 | 32 | 1 |
0 | UNDEF |
| 0 | 192.168.3.53 | 18192 | 192.168.3.240 | 53925 | 6 |FP .. ..| No | 0/0 | 0 | 32 | 1 |
0 | UNDEF |
===========================================================================================================
===============
FP - from pool. T - temporary connection. PP - pending pernament.
[Expert@MyGW:0]#
Example 3 - Additional information about each CoreXL Firewall instance, including the information about
Firewall Priority Queues
===========================================================================================================
============================================================================================
| Segm | Src IP | S.port | Dst IP | D.port | Proto | Flags | PP |Ref Cnt(I/O)|Inst|PPAK ID|clstr mem
ID|Rec. ref|Rec. Type|Inst. Section: I/O|Inst. ID|Flags| Seq | Hold_ref |Prio:|last_enq_jiff|queue_
indx|conn_tokens
===========================================================================================================
============================================================================================
| 0 | 192.168.3.52 | 18192 | 192.168.3.240 | 46082 | 6 |FP .. ..| No | 0/0 | 1 | 32 | 0 |
0 | UNDEF |Inst. Section: Out | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.240 | 53925 | 192.168.3.53 | 18192 | 6 |FP .. ..| No | 0/0 | 0 | 32 | 1 |
0 | UNDEF |Inst. Section: In | 0 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.240 | 257 | 192.168.3.52 | 35883 | 6 |FP .. ..| No | 0/0 | 1 | 32 | 0 |
0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.53 | 18192 | 192.168.3.240 | 64216 | 6 |FP .. ..| No | 0/0 | 1 | 32 | 15 |
0 | UNDEF |Inst. Section: Out | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 0.0.0.0 | 8116 | 192.168.3.53 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 | 1 |
0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 0.0.0.0 | 8116 | 192.168.3.52 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 | 0 |
0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.240 | 64216 | 192.168.3.53 | 18192 | 6 |FP .. ..| No | 0/0 | 1 | 32 | 15 |
0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.52 | 8116 | 0.0.0.0 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 | 0 |
0 | UNDEF |Inst. Section: Out | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 172.20.168.16 | 63800 | 192.168.3.53 | 22 | 6 |FP .. ..| No | 0/0 | 0 | 32 | 1 |
0 | UNDEF |Inst. Section: In | 0 | Perm | 494 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.240 | 46082 | 192.168.3.52 | 18192 | 6 |FP .. ..| No | 0/0 | 1 | 32 | 0 |
0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.52 | 35883 | 192.168.3.240 | 257 | 6 |FP .. ..| No | 0/0 | 1 | 32 | 0 |
0 | UNDEF |Inst. Section: Out | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.53 | 8116 | 0.0.0.0 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 | 1 |
0 | UNDEF |Inst. Section: Out | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.53 | 22 | 172.20.168.16 | 63800 | 6 |FP .. ..| No | 0/0 | 0 | 32 | 1 |
0 | UNDEF |Inst. Section: Out | 0 | Perm | 280 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.53 | 18192 | 192.168.3.240 | 53925 | 6 |FP .. ..| No | 0/0 | 0 | 32 | 1 |
0 | UNDEF |Inst. Section: Out | 0 | Perm | 219 | 0 |Prio:| 0 | -1 | 0 |
===========================================================================================================
============================================================================================
FP - from pool. T - temporary connection. PP - pending pernament. In - inbound. Out - outbound.
[Expert@MyGW:0]#
===========================================================================================================
===========================================================
| Segm | Src IP | S.port | Dst IP | D.port | Proto | Flags | PP |Ref Cnt(I/O)|Inst|PPAK ID|clstr mem
ID|Rec. ref|Rec. Type|Inst. Section: I/O|Inst. ID|Flags| Seq | Hold_ref |
===========================================================================================================
===========================================================
| 0 | 192.168.3.52 | 18192 | 192.168.3.240 | 46082 | 6 |FP .. ..| No | 0/0 | 1 | 32 | 0 |
0 | UNDEF |Inst. Section: Out | 1 | Perm | 0 | 0 |
| 0 | 192.168.3.52 | 52864 | 192.168.3.240 | 257 | 6 |FP .. ..| No | 0/0 | 2 | 32 | 0 |
0 | UNDEF |Inst. Section: Out | 2 | Perm | 0 | 0 |
| 0 | 192.168.3.240 | 53925 | 192.168.3.53 | 18192 | 6 |FP .. ..| No | 0/0 | 0 | 32 | 1 |
0 | UNDEF |Inst. Section: In | 0 | Perm | 0 | 0 |
| 0 | 192.168.3.53 | 18192 | 192.168.3.240 | 64216 | 6 |FP .. ..| No | 0/0 | 1 | 32 | 15 |
0 | UNDEF |Inst. Section: Out | 1 | Perm | 0 | 0 |
| 0 | 192.168.3.53 | 60186 | 192.168.3.240 | 257 | 6 |FP .. ..| No | 0/0 | 1 | 32 | 1 |
0 | UNDEF |Inst. Section: Out | 1 | Perm | 76 | 0 |
| 0 | 0.0.0.0 | 8116 | 192.168.3.53 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 | 1 |
0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |
| 0 | 0.0.0.0 | 8116 | 192.168.3.52 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 | 0 |
0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |
| 0 | 192.168.3.240 | 64216 | 192.168.3.53 | 18192 | 6 |FP .. ..| No | 0/0 | 1 | 32 | 15 |
0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |
| 0 | 192.168.3.52 | 8116 | 0.0.0.0 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 | 0 |
0 | UNDEF |Inst. Section: Out | 1 | Perm | 0 | 0 |
| 0 | 172.20.168.16 | 63800 | 192.168.3.53 | 22 | 6 |FP .. ..| No | 0/0 | 0 | 32 | 1 |
0 | UNDEF |Inst. Section: In | 0 | Perm | 479 | 0 |
| 0 | 192.168.3.240 | 46082 | 192.168.3.52 | 18192 | 6 |FP .. ..| No | 0/0 | 1 | 32 | 0 |
0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |
| 0 | 192.168.3.53 | 8116 | 0.0.0.0 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 | 1 |
0 | UNDEF |Inst. Section: Out | 1 | Perm | 0 | 0 |
| 0 | 192.168.3.240 | 257 | 192.168.3.52 | 52864 | 6 |FP .. ..| No | 0/0 | 2 | 32 | 0 |
0 | UNDEF |Inst. Section: In | 2 | Perm | 0 | 0 |
| 0 | 192.168.3.53 | 22 | 172.20.168.16 | 63800 | 6 |FP .. ..| No | 0/0 | 0 | 32 | 1 |
0 | UNDEF |Inst. Section: Out | 0 | Perm | 257 | 0 |
| 0 | 192.168.3.53 | 18192 | 192.168.3.240 | 53925 | 6 |FP .. ..| No | 0/0 | 0 | 32 | 1 |
0 | UNDEF |Inst. Section: Out | 0 | Perm | 219 | 0 |
| 0 | 192.168.3.240 | 257 | 192.168.3.53 | 60186 | 6 |FP .. ..| No | 0/0 | 1 | 32 | 1 |
0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |
===========================================================================================================
===========================================================
FP - from pool. T - temporary connection. PP - pending pernament. In - inbound. Out - outbound.
[Expert@MyGW:0]#
Important - This command works only if the CoreXL Dynamic Dispatcher is disabled
(see sk105261).
Syntax
n To show the CoreXL Firewall instance that processes the specified IPv4 connection:
n To show the CoreXL Firewall instance that processes the specified range of IPv4 connections:
Parameters
Parameter Description
<Source IPv4 Address Start> First source IPv4 address of the specified range of IPv4
addresses
<Source IPv4 Address End> Last source IPv4 address of the specified range of IPv4
addresses
<Destination IPv4 Address First destination IPv4 address of the specified range of IPv4
Start> addresses
<Destination IPv4 Address Last destination IPv4 address of the specified range of IPv4
End> addresses
Notes:
n This command shows the suspected heavy connections even if they are already
closed.
n In the "cpview" on page 921 utility, go to CPU > Top-Connections >
InstancesX-Y > InstanceZ. Refer to the Top Connections section.
Syntax
Parameters
Parameter Description
Example
Parameters
Parameter Description
No Shows the interactive menu for configuration of the CoreXL Firewall Priority Queues.
Parameters
2 Enables the CoreXL Firewall Priority Queues in the Eviluator-only mode (evaluation of
"evil" connections).
Example
Available modes:
0. Off
1. Eviluator-only
2. On
Syntax
Example
Parameters
Parameter Description
Example
Example
Important - To start all CoreXL Firewall instances on-the-fly, run the "fw ctl multik start"
on page 1466 command.
Example
Example
fw ctl affinity
The fw ctl affinity command shows and configures the CoreXL affinity settings for:
n Interfaces
n User-space processes
n CoreXL FW instances
Syntax
n To see the built-in help:
fw ctl affinity
n To show the number of system CPU cores allowed by the installed CoreXL license:
Parameters
Parameter Description
-k <CoreXL Firewall Shows the affinity for the specified CoreXL Firewall instance.
instance ID>
-p <Process ID> Shows the affinity for the Check Point user-space process (for
example: fwd, vpnd) specified by its PID.
-n <Process Name> Shows the affinity for the Check Point user-space process (for
example: fwd, vpnd) specified by its name.
all Shows the affinity for all CPU cores (numbers start from zero).
<CPU ID0> ... <CPU Shows the affinity for the specified CPU cores (numbers start from
IDn> zero).
Example 1
Example 2
Example 3
Example 4
[Expert@MyGW:0]# fw ctl affinity -l -i eth0
eth0: CPU 0
[Expert@MyGW:0]#
Example 5
Example 6
Example 7
Syntax
n To show the affinities in VSX mode (you can combine the optional parameters):
fw ctl affinity -l -x
[-vsid <VSID ranges>]
[-cpu <CPU ID ranges>]
[-flags {e | k | t | n | h | o}]
n To show the number of system CPU cores allowed by the installed CoreXL license:
Parameters
Parameter Description
Example 1
Example 2
Notes:
n Changes you make with this command do not survive the Security Gateway
reboot.
If you want the settings to survive reboot, do one of these:
l Manually edit the $FWDIR/conf/fwaffinity.conf configuration
file.
l Run the sim affinity -s command (configures the affinity for
interfaces only).
n The fw ctl affinity -s command cannot configure affinity for interfaces,
if you already configured affinity for interfaces with the SecureXL sim
affinity command (in Automatic or Static mode).
Syntax
n To see the built-in help:
fw ctl affinity
Parameters
Parameter Description
-k <CoreXL Firewall Configures the affinity for the specified CoreXL Firewall instance.
instance ID>
-p <Process ID> Configures the affinity for the Check Point user-space process (for
example: fwd, vpnd) specified by its PID.
-n <Process Name> Configures the affinity for the Check Point user-space process (for
example: fwd, vpnd) specified by its name.
all Configures the affinity for all CPU cores (numbers start from zero).
<CPU ID0> ... <CPU Configures the affinity for the specified CPU cores (numbers start from
IDn> zero).
Example 3 - Affine the process CPD by its PID to the CPU core #2
Example 4 - Affine the process CPD by its name to the CPU core #2
Syntax
n To see the built-in help:
fw ctl affinity
fw ctl affinity
-vsx_factory_defaults
-vsx_factory_defaults_no_prompt
Important
n These settings do not survive a reboot of the VSX Gateway.
To make these settings permanent, manually edit the $FWDIR/conf/fwaffinity.conf configuration
file.
n When you configure affinity of an interface, it automatically configures the affinities of all other
interfaces that share the same IRQ to the same CPU core.
Parameters
Parameter Description
-pname <Process Configures the affinity for the Check Point daemon specified by its name
Name> (for example: fwd, vpnd).
Parameter Description
-fwkall <Number of Configures the affinity for all running FWK daemon instances to the
CPUs> specified number of CPU cores.
If you need to affine all running FWK daemon instances to all CPU cores,
enter the number of all available CPU cores.
-vsx_factory_ Deletes all existing affinity settings and creates the default affinity
defaults settings during the next reboot.
-vsx_factory_ Deletes all current affinity settings and creates the default affinity settings
defaults_no_prompt during the next reboot.
Example 1 - Affine the Virtual Devices #0,1,2,4,7,8 to the CPU cores #0,1,2,4
Example 2 - Affine the process CPD by its name for Virtual Devices #0-12 to the CPU core #7
Example 3 - Affine the FWK daemon instances #0,2,4 to the CPU core #5
Example 4 - Affine all FWK daemon instances to the last two CPU cores
fw -i
Description
By default, the "fw" on page 954 commands apply to the entire Security Gateway.
The fw commands show aggregated information for all CoreXL Firewall instances.
The fw -i commands apply to the specified CoreXL Firewall instance.
Syntax
Parameters
Parameter Description
For details and additional parameters for any of these commands, refer
to the corresponding entry for each command.
fwboot bootconf
Description
Configures boot security options.
Notes:
n You must run this command from the Expert mode.
n The settings are saved in the
$FWDIR/boot/boot.conf file.
Parameters
Parameter Description
get_def Shows the configured path and the name of the Default Filter policy file
(default is $FWDIR/boot/default.bin).
Parameter Description
Notes:
n In the $FWDIR/boot/boot.conf file, refer to the value
of the COREXL_INSTALLED.
n To configure CoreXL, use the "cpconfig" on page 892
menu.
Parameter Description
set_def Configures the path and the name of the Default Filter policy file (default is
[< $FWDIR/boot/default.bin).
/path/filename>]
Notes:
n In the $FWDIR/boot/boot.conf file, refer to the value
of the DEFAULT_FILTER_PATH.
n If you do not specify the path and the name explicitly, then
the value of the DEFAULT_FILTER_PATH is set to 0.
As a result, Security Gateway does not load a Default Filter
during boot.
Notes:
n In the $FWDIR/boot/boot.conf file, refer to the value
of the IPV6_INSTALLED.
n Configure the IPv6 Support in Gaia Portal, or Gaia Clish.
See the R80.40 Gaia Administration Guide.
Parameter Description
fwboot corexl
Description
Configures and monitors the CoreXL.
Important:
n The configuration commands are for Check Point use only. To configure
CoreXL, use the Check Point CoreXL option in the "cpconfig" on page 892
menu.
n After all changes in CoreXL configuration on the Security Gateway, you must
reboot it.
n In Cluster, you must configure all the Cluster Members in the same way
Parameters
Parameter Description
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl core_count
[Expert@MyGW:0]# echo $?
4
[Expert@MyGW:0]#
[Expert@MyGW:0]# cat /proc/cpuinfo | grep processor
processor : 0
processor : 1
processor : 2
processor : 3
[Expert@MyGW:0]#
Parameter Description
curr_ Returns the current configured number of IPv4 CoreXL Firewall instances.
instance4_
count Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl curr_
instance4_count
[Expert@MyGW:0]# echo $?
3
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 11 | 18
1 | Yes | 2 | 12 | 18
2 | Yes | 1 | 13 | 18
[Expert@MyGW:0]#
curr_ Returns the current configured number of IPv6 CoreXL Firewall instances.
instance6_
count Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl curr_
instance6_count
[Expert@MyGW:0]# echo $?
2
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw6 ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 11 | 18
1 | Yes | 2 | 12 | 18
[Expert@MyGW:0]#
def_by_ Sets the default configuration for CoreXL according to the specified allowed number
allowed of CPU cores.
[n]
def_ Returns the default number of IPv4 CoreXL Firewall instances for this Security
instance4_ Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl def_
instance4_count
[Expert@MyGW:0]# echo $?
3
[Expert@MyGW:0]#
Parameter Description
def_ Returns the default number of IPv4 CoreXL Firewall instances for this Security
instance6_ Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl def_
instance6_count
[Expert@MyGW:0]# echo $?
2
[Expert@MyGW:0]#
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl eligible
[Expert@MyGW:0]# echo $?
1
[Expert@MyGW:0]#
[-v] Enables CoreXL with 'n' IPv4 Firewall instances and optionally 'k' IPv6 Firewall
enable [n] instances.
[-6 k]
n -v - Leaves the high memory (vmalloc) unchanged.
n n - Denotes the number of IPv4 CoreXL Firewall instances.
n k - Denotes the number of IPv6 CoreXL Firewall instances.
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl installed
[Expert@MyGW:0]# echo $?
1
[Expert@MyGW:0]#
Parameter Description
max_ Returns the maximal allowed number of IPv4 CoreXL Firewall instances for this
instance4_ Security Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instance4_count
[Expert@MyGW:0]# echo $?
4
[Expert@MyGW:0]#
max_ Returns the maximal allowed number of IPv4 CoreXL Firewall instances for a
instances Security Gateway that runs Gaia with 32-bit kernel.
4_32bit
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances4_32bit
[Expert@MyGW:0]# echo $?
14
[Expert@MyGW:0]#
max_ Returns the maximal allowed number of IPv4 CoreXL Firewall instances for a
instances Security Gateway that runs Gaia with 64-bit kernel.
4_64bit
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances4_64bit
[Expert@MyGW:0]# echo $?
38
[Expert@MyGW:0]#
max_ Returns the maximal allowed number of IPv6 CoreXL Firewall instances for this
instance6_ Security Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instance6_count
[Expert@MyGW:0]# echo $?
3
[Expert@MyGW:0]#
Parameter Description
max_ Returns the total maximal allowed number of CoreXL Firewall instances (IPv4 and
instances_ IPv6) for this Security Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances_count
[Expert@MyGW:0]# echo $?
40
[Expert@MyGW:0]#
max_ Returns the total maximal allowed number of CoreXL Firewall instances for a Security
instances_ Gateway that runs Gaia with 32-bit kernel.
32bit
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances_32bit
[Expert@MyGW:0]# echo $?
16
[Expert@MyGW:0]#
max_ Returns the total maximal allowed number of CoreXL Firewall instances for a Security
instances_ Gateway that runs Gaia with 64-bit kernel.
64bit
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances_64bit
[Expert@MyGW:0]# echo $?
40
[Expert@MyGW:0]#
min_ Returns the minimal allowed number of IPv4 CoreXL Firewall instances.
instance_
count Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl min_
instance_count
[Expert@MyGW:0]# echo $?
2
[Expert@MyGW:0]#
Parameter Description
unsupporte Returns 1 if at least one feature is configured, which CoreXL does not support.
d_features
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl
unsupported_features
corexl unsupported feature: QoS is configured.
[Expert@MyGW:0]# echo $?
1
[Expert@MyGW:0]#
fwboot cpuid
Description
Shows the number of available CPUs and CPU cores on this Security Gateway.
Syntax
Parameters
Parameter Description
No Parameters Shows the IDs of the available CPU cores on this Security Gateway.
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid
3 2 1 0
[Expert@MyGW:0]#
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid -c
[Expert@MyGW:0]# echo $?
4
[Expert@MyGW:0]#
Parameter Description
--full Shows a full map of the available CPUs and CPU cores on this Security Gateway.
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid --full
cpuid phys_id core_id thread_id
0 0 0 0
1 2 0 0
2 4 0 0
3 6 0 0
[Expert@MyGW:0]#
ht_aware Shows the CPU cores in the order of their awareness of Hyper-Threading.
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid ht_aware
3 2 1 0
[Expert@MyGW:0]#
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid -n
[Expert@MyGW:0]# echo $?
4
[Expert@MyGW:0]#
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid --
possible
[Expert@MyGW:0]# echo $?
4
[Expert@MyGW:0]#
fwboot ht
Description
Shows and configures the boot options for the SMT (HyperThreading) feature (sk93000).
Important - This command is for Check Point use only. To configure SMT
(HyperThreading) feature, follow sk93000.
Note - You must run this command from the Expert mode.
Syntax
[Expert@HostName:0]# $FWDIR/boot/fwboot ht
--core_override [<number>]
--disable
--eligible
--enable
--enabled
--supported
Parameters
Parameter Description
Parameter Description
--eligible Returns a number that shows if this system is eligible for the SMT
feature. Run:
[Expert@MyGW:0]# $FWDIR/boot/fwboot ht --
eligible
[Expert@MyGW:0]# echo $?
[Expert@MyGW:0]# $FWDIR/boot/fwboot ht --
enabled
[Expert@MyGW:0]# echo $?
Parameter Description
--supported Returns a number that shows if this system supports the SMT feature.
Run:
[Expert@MyGW:0]# $FWDIR/boot/fwboot ht --
supported
[Expert@MyGW:0]# echo $?
fwboot multik_reg
Description
Shows the internal memory address of the registration function for the specified CoreXL Firewall instance.
Note - You must run this command from the Expert mode.
Syntax
Parameters
Parameter Description
Example
fwboot post_drv
Description
Loads the Firewall driver for CoreXL during boot.
Important:
n This command is for Check Point use only.
n If you run this command, Security Gateway can block all traffic. In such case, you
must connect to the Security Gateway over a console and restart Check Point
services with the "cpstop" on page 920 and "cpstart" on page 911 commands.
Alternatively, you can reboot the Security Gateway.
Note - You must run this command from the Expert mode.
Syntax
Parameters
Parameter Description
Multi-Queue Commands
For more information about Multi-Queue, see the R80.40 Performance Tuning Administration Guide -
Chapter Multi-Queue.
mq_mng
Description
The mq_mng utility shows and configures the Multi-Queue on supported interfaces.
Multi-Queue only supports interfaces that use these drives:
n igb
n ixgbe
n i40e
n mlx5_core
Syntax
n To see the built-in help
Important - You must reboot the Security Gateway after all changes in the Multi-
Queue configuration.
Parameters
Parameter Description
-v | - Verbose output.
vv
Important - Change in the Multi-Queue mode may cause short packet loss.
Parameter Description
Notes:
n To specify interfaces:
l Use this syntax:
{-i | --interface} <Names of Interfaces>
l If you do not specify interfaces, then the configuration applies to all
supported interfaces.
l To specify a specific interface, enter its name (for example: -i
eth2).
l To specify several interfaces, enter their names separates with
spaces (for example: -i eth2 eth4).
n To specify CPU cores:
l Use this syntax:
{-c | --core} <IDs of CPU Cores that run
CoreXL SND Instances>
l To specify a specific CPU core, enter its ID number (for example: -
c 1).
l To specify several nonconsecutive CPU cores, enter their
ID numbers separated with spaces (for example: -c 1 3) or
commas (for example: -c 1,3).
l To specify several consecutive CPU cores, enter their first and last
ID numbers separated with a hyphen (for example: -c 3-6).
n To see the current CoreXL affinity configuration, run the "fw ctl affinity" on
page 1469 command (with applicable parameters).
n To see the CoreXL Firewall Instances and which CPU cores they use, run
the "fw ctl multik stat" on page 1464 command.
n To see all available CPU cores, run:
Term Description
ADLOG The module responsible for the acquisition of identities of entities (users or computers) from
the Active Directory.
The adlog runs on:
The adlog is the command line process used to control and monitor the ADLOG feature.
The command line tool helps control users' statuses, as well as troubleshoot and monitor
the system.
The PEP and PDP processes are key components of the system. Through them, administrators control
user access and network protection.
adlog
Description
Provides commands to control and monitor the AD Query process.
Syntax
n When the adlog runs on a Security Gateway, the AD Query serves the Identity Awareness
Software Blade, which enforces policy and logs identities.
In this case, the command syntax is:
Note - Parameters for the "adlog a" and "adlog l" commands are identical.
Parameters
Parameter Description
Parameter Description
statistics Shows statistics about NT Event logs received by adlog, for each IP
address and total.
Also shows the number of identified IP addresses.
See "adlog statistics" on page 1518.
adlog control
Description
Sends control commands to the AD Query.
Syntax
adlog {a | l} control
muh <options>
reconf
srv_accounts <options>
stop
Parameters
Parameter Description
Parameter Description
adlog dc
Description
Shows the status of a connection to the AD domain controller.
Syntax
adlog a dc
adlog l dc
adlog debug
Description
Enables and disables the adlog debug output.
Syntax
adlog {a | l} debug
extended
mode
off
on
Parameters
Parameter Description
adlog query
Description
Shows the database of identities acquired by the AD Query, according to the specified filter.
Syntax
adlog {a | l} query
all
ip <IP Address>
machine <Computer Name>
string <String>
user <Username>
Parameters
Parameter Description
machine <Computer Name> Filters identity mappings based on the specified computer name.
string <String> Filters identity mappings based on the specified text string.
Example - Show the entry that contains the string "jo" in the user name
adlog statistics
Description
Shows statistics about NT Event logs received by adlog, for each IP address and total.
Also shows the number of identified IP addresses.
Syntax
adlog a statistics
adlog l statistics
pdp
Description
These commands control and monitor the pdpd process.
Syntax
Commands
Parameter Description
ad <parameter> For the AD Query, adds (or removes) an identity to the Identity
<option> Awareness database on the Security Gateway.
See "pdp ad" on page 1521.
connections Shows the PDP connections with the PEP gateways, Terminal
<parameter> Servers, and Identity Collectors.
See "pdp connections" on page 1533.
Parameter Description
status <parameter> Shows PDP status information, such as start time or configuration
time.
See "pdp status" on page 1552.
vpn <parameter> Shows connected VPN gateways that send identity data from VPN
Remote Access Clients.
See "pdp vpn" on page 1558.
pdp ad
General Syntax
pdp ad
associate <options>
disassociate <options>
Description
For the AD Query, adds an identity to the Identity Awareness database on the Security Gateway.
The group data must be in the AD.
Syntax
Parameters
Parameter Description
Description
For the AD Query, removes the identity from the Identity Awareness database on the Security Gateway.
Identity Awareness does not authenticate a user that is removed.
Syntax
Parameters
Parameter Description
m <Computer Name> Specifies the computer that is defined for the identity.
r {override | probed | Specifies the reason to show in SmartConsole on the Logs &
timeout} Monitor > Logs tab.
pdp auth
Description
Configures authentication/authorization options for PDP.
Syntax
pdp auth
allow_empty_result <options>
count_in_non_ldap_group <options>
fetch_by_sid <options>
force_domain <options>
kerberos_any_domain <options>
kerberos_encryption <options>
reauth_agents_after_policy <options>
recovery_interval <options>
username_password <options>
Parameters
Parameter Description
allow_empty_ Shows the current configuration of fetching of local groups from the AD
result <options> server based on SID.
Configures that the fetching of local groups from the AD server based on
SID should succeed, even if all SIDs are foreign.
The available <options> are:
Parameter Description
fetch_by_sid Shows and configures the fetching of local groups from the AD server
<options> based on SID.
The available <options> are:
force_domain Shows and configures the PDP to match the identity's source, based on the
<options> reported domain and authorization domain.
The available <options> are:
Parameter Description
kerberos_any_ Shows and configures the use of all available Kerberos principles.
domain <options>
The available <options> are:
Parameter Description
recovery_interval Shows and configures the frequency of attempts to connect back to the
<options> higher-priority PDP gateway.
The available <options> are:
pdp broker
Description
These commands control the PDP Identity Broker.
Syntax
pdp broker
debug {set | unset} <options>
discard <options>
reconnect <options>
status [-e]
sync <options>
Parameters
Parameter Description
Parameter Description
Parameter Description
Notes:
n For more information about the debug, see "pdp debug"
on page 1535.
n To see the HTTP related issues, run this command to
enable the debug on the Publisher PDP side:
discard <option> Controls the timeout for discarding sessions received from the specified
Publisher PDP during a disconnection.
The available <options> are:
Best Practice - You can use this command when a long time
passed since the PDP disconnected, and you need to establish
the connection again immediately.
Parameter Description
status [-e] Shows the status of remote Publisher PDPs and Subscriber PDPs.
The option "-e" flag adds more information (Subscriber PDP port and the
last error time and description).
sync <option> Synchronizes identities with the specified Publisher PDPs or Subscriber
PDPs.
The available <options> are:
pdp conciliation
Description
Controls the session conciliation mechanism.
Syntax
pdp conciliation
adq_single_user <option>
api_multiple_users <option>
idc_multiple_users <option>
rad_multiple_users <option>
Parameters
Parameter Description
adq_single_user Shows and controls the assumption that single AD Query user is
<option> connected on each computer.
The available <options> are:
Parameter Description
api_multiple_users Shows and controls the assumption that multiple Web-API users are
<option> connected on each computer.
The available <options> are:
idc_multiple_users Shows and controls the assumption that multiple Identity Collector users
<option> are connected on each computer.
The available <options> are:
rad_multiple_users Shows and controls the assumption that multiple RADIUS users are
<option> connected on each computer.
The available <options> are:
pdp connections
Description
Shows the PDP connections with PEP gateways, Terminal Servers, and Identity Collectors.
Syntax
pdp connections
idc
pep
ts
Parameters
Parameter Description
pep Shows the connection status of all the PEPs, which the current PDP should update.
pdp control
Description
Provides commands to control the PDP.
Syntax
pdp control
revoke_ip <IP address>
sync
Parameters
Parameter Description
revoke_ip <IP Logs out the session that is related to the specified IP address.
address>
sync Forces an initiated synchronization operation between the PDPs and the PEPs.
When you run this command, the PDP informs its related PEPs of the up-to-date
information of all connected sessions.
At the end of this operation, the PDP and the PEPs contain the same and latest
session information.
pdp debug
Description
Controls the debug of the PDP.
Syntax
pdp debug
async1
ccc {off | on}
memory
off
on
reset
rotate
set <Topic Name> <Severity>
spaces [<0 - 5>]
stat
unset <Topic Name>
Parameters
Parameter Description
async1 Tests the async command line with the echo command for 30
seconds.
ccc {off | on} Configures whether to write the CCC debug logs into the PDP log file -
$FWDIR/log/pdpd.elg
Parameter Description
reset Resets the PDP debug options for Debug Topic and Severity.
rotate Rotates the PDP log files - increases the index of each log file:
1. $FWDIR/log/pdpd.elg becomes
$FWDIR/log/pdpd.elg.0
2. $FWDIR/log/pdpd.elg.0 becomes
$FWDIR/log/pdpd.elg.1
3. And so on.
set <Topic Name> Filters which debug logs PDP writes to the log file based on the specified
<Severity> Debug Topics and Severity:
The available Debug Topics are:
n all
n Check Point Support provides more specific topics, based on the
reported issue
The available Severities are:
n all
n critical
n events
n important
n surprise
spaces [<0 - 5>] Shows and configures the number of indentation spaces in the
$FWDIR/log/pdpd.elg file.
You can specify the number of spaces:
Parameter Description
Important - When you enable the debug, it affects the performance of the pdpd
daemon. Make sure to disable the debug after you complete your troubleshooting.
pdp idc
Description
Operations related to Identity Collector.
Syntax
pdp idc
groups_consolidation <options>
muh <options>
service_accounts
status
Parameters
Parameter Description
Parameter Description
pdp idp
Description
Operations related to SAML-based authentication.
Syntax
Parameters
Parameter Description
groups Shows and configures the consolidation of external groups with the fetched groups.
<
The available <options> are:
options
> n Configure the authorization behavior for user groups:
l only - Considers only groups the Identity Provider sends. Ignore groups
received from configured User Directories.
l prefer -Prefers groups the Identity Provider sends. Considers groups
received from configured User Directories only if the Identity Provider sends
no group. This is the default.
l union - Considers both groups received from configured User Directories
and groups the Identity Provider sends.
l ignore - Considers only groups received from configured User Directories.
Ignores groups the Identity Provider sends.
n Shows the configured behavior:
pdp ifmap
Description
Controls the Interface to Metadata Access Points (IF-MAP) sessions.
Syntax
pdp ifmap
connect <options>
disconnect <options>
revoke <options>
status <options>
Parameters
Parameter Description
Parameter Description
pdp monitor
Description
Monitors the status of connected PDP sessions.
You can run different queries with the commands below to get the output, in which you are interested.
Syntax
pdp monitor
all
client_type <Client Type>
cv_ge <Version>
cv_le <Version>
groups <Group Name>
ip <IP address>
machine <Computer Name>
machine_exact
mad
network
s_port
summary
user <Username>
user_exact
Parameters
Parameter Description
client_type Shows all sessions that connect through the specified client type.
<Client Type>
Possible client types are:
Parameter Description
cv_ge <Version> Shows all sessions that are connected with a client version that is higher than
(or equal to) the specified version.
cv_le <Version> Shows all sessions that are connected through a client version that is lower
than (or equal to) the specified version.
groups <Group Shows all sessions of users or computers that are members of the specified
Name> group.
s_port Shows sessions filtered by the assigned source port (MUH sessions only).
user <Username> Shows session information for the specified user name.
Note - The last field "Published" indicates whether the session information was
already published to the Gateway PEPs, whose IP addresses are listed.
pdp muh
Description
Shows Multi-User Hosts (MUHs).
Syntax
pdp nested_groups
Description
Defines and shows LDAP Nested groups configuration.
Syntax
pdp nested_groups
clear
depth <options>
disable
enable
show
status
__set_state <options>
Parameters
Parameter Description
clear Clears the list of users, for which the depth was not enough.
depth <1 - 40> Sets the nested groups depth (between 1 and 40).
show Shows a list of users, for which the depth was not enough.
pdp network
Description
Shows information about network related features.
Syntax
Parameters
Parameter Description
registered Shows the mapping of a network address to the registered gateways (PEP module).
pdp radius
Description
Shows and configures the RADIUS accounting options.
Syntax
pdp radius
ip
reset
set <options>
groups
fetch <options>
reset
set <options>
parser
reset
set <options>
roles
fetch <options>
reset
set <options>
status
Parameters
Parameter Description
Parameter Description
Parameter Description
pdp status
Description
Shows PDP status information, such as start time or configuration time.
Syntax
Parameters
Parameter Description
pdp tasks_manager
Description
Shows the status of the PDP tasks (current running, previous, and pending tasks).
Syntax
Parameters
Parameter Description
pdp timers
Description
Shows PDP timers information for each PDP session.
Syntax
Parameters
Parameter Description
pdp topology_map
Description
Shows topology of all PDP and PEP addresses.
Syntax
pdp topology_map
pdp tracker
Description
During the PDP debug, adds the TRACKER debug topic to the PDP logs (this is enabled by default).
This is very useful when you monitor the PDP-to-PEP identity sharing and other communication in
distributed environments.
You can set this manually if you add the TRACKER topic to the PDP debug.
Syntax
Parameters
Parameter Description
pdp update
Description
Initiates a recalculation of group membership for all users and computers.
Syntax
Parameters
Parameter Description
pdp vpn
Description
Shows the connected VPN gateways that send VPN Remote Access Client identity data.
Syntax
pdp vpn
show
Parameters
Parameter Description
pep
Description
Provides commands to control and monitor the PEPD process (see below for options).
Syntax
Commands
Command Description
tracker <parameter> During the PEP debug, adds the TRACKER debug topic to the
PEP logs.
See "pep tracker" on page 1566.
pep control
Description
Provides commands to control the PEP.
Syntax
pep control
extended_info_storage <options>
portal_dual_stack <options>
tasks_manager status <options>
Parameters
Parameter Description
portal_dual_stack Controls the support for portal dual stack (IPv4 and IPv6).
<options>
The available <options> are:
tasks_manager <options> Shows the status of the PEP tasks (current running, previous,
and pending tasks).
The available <options> are:
pep debug
Description
Controls the debug of the PEP.
Syntax
pep debug
memory
off
on
reset
rotate
set <options>
spaces [<options>]
stat
unset <options>
Parameters
Parameter Description
reset Resets the PEP debug options for Debug Topics and Severities.
Parameter Description
rotate Rotates the PEP log files - increases the index of each log file:
n $FWDIR/log/pepd.elg becomes
$FWDIR/log/pepd.elg.0,
n $FWDIR/log/pepd.elg.0 becomes
$FWDIR/log/pepd.elg.1
n And so on.
set <Topic Name> Filters which debug logs PEP writes to the log file based on the
<Severity> specified Debug Topics and Severity.
Available Debug Topics are:
n all
n Check Point Support provides more specific topics, based on the
reported issue
Available Severities are:
n all
n critical
n events
n important
n surprise
Important - When you enable the debug, it affects the performance of the pepd
daemon. Make sure to turn off the debug after you complete your troubleshooting.
pep show
Description
Shows information about PEP.
Syntax
pep show
conciliation_clashes
all
clear
ip <Session IP Address>
network
pdp
registration
pdp
all
id <ID of PDP>
stat
topology_map
user
all
query
cid <IP[,ID]>
cmp <Compliance>
mchn <Computer Name>
mgrp <Group>
pdp <IP[,ID]>
role <Identity Role>
ugrp <Group>
uid <UID String>
usr <Username>
Parameters
Parameter Description
pdp <options> Shows the communication channel between the PEP and the PDP.
Available <options> are:
stat Shows the last time the pepd daemon was started and the last time a
policy was received.
Parameter Description
pep tracker
Description
During the PEP debug, adds the TRACKER debug topic to the PEP logs (this is enabled by default).
This is very useful when you monitor the PDP-to-PEP identity sharing and other communication in
distributed environments.
You can set this manually if you add the TRACKER topic to the PEP debug.
Syntax
Parameters
Parameter Description
test_ad_connectivity
Description
This utility runs connectivity tests from the Security Gateway to an AD domain controller.
You can define the parameters for this utility in one of these ways:
n In the command line as specified below
n In the $FWDIR/conf/test_ad_connectivity.conf configuration file.
Parameters you define in the $FWDIR/conf/test_ad_connectivity.conf file cannot
contain white spaces and cannot be within quotation marks.
Important:
n Parameters you define in the command line override the parameters you define
in the configuration file.
n This utility saves its output in the file you specify with the -o parameter.
In addition, examine the $FWDIR/log/test_ad_connectivity.elg file.
Syntax
[Expert@HostName:0]# $FWDIR/bin/test_ad_connectivity -h
Parameters
Mandatory /
Parameter Description
Optional
Mandatory /
Parameter Description
Optional
-D <User DN> Mandatory Overrides the LDAP user DN (the utility does not try to figure
out the DN automatically).
-L <Timeout> Optional Specifies the timeout (in milliseconds) for the LDAP test
only.
If this timeout expires, and the LDAP test still runs, then both
LDAP connectivity and WMI connectivity tests fail.
Mandatory /
Parameter Description
Optional
-t <Timeout> Optional Specifies the total timeout (in milliseconds) for both LDAP
connectivity and WMI connectivity tests.
Example
IPv4 of AD 192.168.230.240
DC
Domain mydc.local
Username Administrator
Password aaaa
Note - In order to know the output is authentic, pay attention that the timestamp is the
same as the local time.
VPN Commands
VPN commands generate status information regarding VPN processes, or are used to stop and start
specific VPN services.
All VPN commands are executed on the Security Gateway and Cluster Members.
For more information about VPN, see the:
n R80.40 Site to Site VPN Administration Guide.
n R80.40 Remote Access VPN Administration Guide.
vpn
Description
Configures VPN settings.
Shows VPN information.
Syntax
vpn
check_ttm
compreset
compstat
crl_zap
crlview
debug
dll
drv
dump_psk
ipafile_check
ipafile_users_capacity
macutil
mep_refresh
neo_proto
nssm_topology
overlap_encdom
rim_cleanup
rll
set_slim_server
set_snx_encdom_groups
set_trac
shell
show_tcpt
sw_topology
{tunnelutil | tu}
ver
Parameters
Parameter Description
Parameter Description
crl_zap Erases all Certificate Revocation Lists (CRLs) from the cache.
See "vpn crl_zap" on page 1579.
crlview Retrieves the Certificate Revocation List (CRL) from various distribution
points and shows it for the user.
See "vpn crlview" on page 1580.
macutil Shows a generated MAC address for each user name when you use Remote
Access VPN with Office Mode.
See "vpn macutil" on page 1591.
Parameter Description
set_slim_server Deprecated.
See "vpn set_slim_server" on page 1598.
set_snx_encdom_ Controls the encryption domain per usergroup feature for SSL Network
groups Extender.
See "vpn set_snx_encdom_groups" on page 1599.
tunnelutil | tu Launches the TunnelUtil tool, which is used to control VPN tunnels.
ver Shows the major version number and build number of the VPN kernel module.
See "vpn ver" on page 1620.
vpn check_ttm
Description
Makes sure the specified TTM file contains valid syntax.
Syntax
Parameters
Parameter Description
<Path to TTM file> Specifies the full path and name of the TTM file.
Example
[Expert@MyGW:0]#
vpn compreset
Description
Resets compression and decompression statistics counters.
Syntax
vpn compreset
Example
vpn compstat
Description
Shows compression and decompression statistics counters.
Syntax
vpn compstat
Example
Compression:
============
Bytes before compression : 0
Bytes after compression : 0
Compression overhead (bytes) : 0
Bytes that were not compressed : 0
Compressed packets : 0
Packets that were not compressed : 0
Compression errors : 0
Decompression:
==============
Bytes before decompression : 0
Bytes after decompression : 0
Decompression overhead (bytes) : 0
Decompressed packets : 0
Decompression errors : 0
Pure decompression ratio : 0.000000
[Expert@MyGW:0]#
vpn crl_zap
Description
Erases all Certificate Revocation Lists (CRLs) from the cache.
Syntax
vpn crl_zap
Return Values
n 0 (zero) for success
n any other value for failure
vpn crlview
Description
Retrieves the Certificate Revocation List (CRL) from various distribution points and shows it for the user.
Syntax
Parameters
Parameter Description
-obj <Network Object Name> Specifies the name of the CA network object.
-cert <Certificate Object Name> Specifies the name of the certificate object.
-f <Certificate File> Specifies the path and the name of the certificate file.
Return Values
n 0 (zero) for success
n any other value for failure
Example 1
vpn crlview -obj <MyCA> -cert <MyCert>
1. The VPN daemon contacts the Certificate Authority called MyCA and locates the certificate called
MyCert.
2. The VPN daemon extracts the certificate distribution point from the certificate.
3. The VPN daemon goes to the distribution point and retrieves the CRL. The distribution point can be
an LDAP or HTTP server.
4. The VPN daemon shows it to the standard output.
Example 2
vpn crlview -f /var/log/MyCert
1. The VPN daemon extracts the certificate distribution point from the certificate file called MyCert.
2. The VPN daemon goes to the distribution point and retrieves the CRL. The distribution point can be
an LDAP or HTTP server.
3. The VPN daemon shows the CRL to the standard output.
Example 3
vpn crlview -view <Lastest CRL>
If the CRL was retrieved in the past, this command instructs the VPN daemon to show the contents to the
standard output.
vpn debug
Description
Instructs the VPN daemon vpnd to write debug messages to the $FWDIR/log/vpnd.elg* and
$FWDIR/log/ike.elg* log files.
Debugging of the VPN daemon takes place according to Debug Topics and Debug Levels:
n A Debug Topic is a specific area, on which to perform debugging. For example, if the Debug Topic is
LDAP, all traffic between the VPN daemon and the LDAP server is written to the log file.
We recommend to debug all available topics - use TDERROR_ALL_ALL.
Check Point Support provides the specific Debug Topics when needed.
n Debug Levels range from 1 (least informative) to 5 (most informative - write all debug messages).
For more information, see sk89940: How to debug VPND daemon.
Syntax
vpn debug
on [<Debug_Topic>=<Debug_Level>]
off
ikeon [-s <Size_in_MB>]
ikeoff
trunc [<Debug_Topic>=<Debug_Level>]
truncon [<Debug_Topic>=<Debug_Level>]
truncoff
timeon [<Seconds>]
timeoff
ikefail [-s <Size_in_MB>]
mon
moff
say ["String"]
tunnel [<Level>]
Parameters
Parameter Description
Parameter Description
Best Practice - Run one of these commands to stop the VPND debug:
Parameter Description
timeoff Disables the timestamp in the log files every number of seconds.
Warning - The output file may contain user X-Auth passwords. Make
sure the file is protected.
say "String" Saves the specified text string in the $FWDIR/log/vpnd.elg file.
For example, run: vpn debug say "BEGIN TEST"
Notes:
n Run this command after you start the VPN debug (with one of
these commands: "vpn debug on", "vpn debug trunc",
or "vpn debug truncon").
n The length of the string is limited to 255 characters.
Return Values
n 0 (zero) for success
n any other value for failure (typically, -1 or 1)
vpn dll
Description
Works with VPN DNS Lookup Layer:
n Save the DNS Lookup Layer information to the specified file.
n Resolve the specified hostname.
Syntax
vpn dll
dump <File>
resolve <HostName>
Parameters
Parameter Description
dump <File> Saves the DNS Lookup Layer information (DNS Names and IP Addresses) to
the specified file.
vpn drv
Description
Controls the VPN kernel module.
Syntax
Parameters
Parameter Description
Example
vpn dump_psk
Description
Shows hash (SHA256) of peers' pre-shared-keys.
Syntax
vpn dump_psk
vpn ipafile_check
Description
Verifies a candidate for the $FWDIR/conf/ipassignment.conf file.
Syntax
Parameters
Parameter Description
<File> Specifies the full path and name of the candidate file.
{err | warn | detail} Specifies the how much information to show about the candidate file:
n err - Only errors
n warn - Only warnings
n detail - All details
vpn ipafile_users_capacity
Description
n Shows the current capacity in the $FWDIR/conf/ipassignment.conf file.
n Configures the new capacity in the $FWDIR/conf/ipassignment.conf file.
Syntax
Parameters
Parameter Description
set <128-32768> Configures the new capacity to the specified number of users.
Notes:
n The default is 1024 entries.
n This command configures the amount of
memory reserved to store usernames.
Example
vpn macutil
Description
Shows a generated MAC address for each user name when you use Remote Access VPN with Office
Mode.
This command is applicable only when allocating IP addresses through DHCP.
Remote Access VPN users in Office Mode receive an IP address, which is mapped to a hardware or MAC
address.
Syntax
Example
# vpn macutil John
20-0C-EB-26-80-7D, "John"
vpn mep_refresh
Description
Initiates MEP re-decision.
Used in "backup stickiness" configuration to initiate MEP re-decision (fail back to primary Security
Gateway, if possible).
Syntax
vpn mep_refresh
vpn neo_proto
Description
Controls the NEO client protocol.
Syntax
Parameters
Parameter Description
vpn nssm_toplogy
Description
Generates and uploads a topology in NSSM format to an NSSM server.
Syntax
Parameters
Parameter Description
-dn <"dn"> Distinguished Name of the NSSM server (needed to establish an SSL
connection).
-action Specifies the action that the Symbian client should take, if the packet is not
{bypass | destined for an IP address in the VPN domain.
drop}
Bypass is the default.
vpn overlap_encdom
Description
Shows all overlapping VPN domains.
Some IP addresses might belong to two or more VPN domains.
The command alerts for overlapping encryption domains if one or both of the following conditions exist:
n The same VPN domain is defined for both Security Gateways.
n If the Security Gateway has multiple interfaces, and one or more of the interfaces has the same IP
address and netmask.
Syntax
Parameters
Parameter Description
communities Shows all pairs of objects with overlapping VPN domains, only if the objects (that
represent VPN sites) are included in the same VPN community.
This parameter is also used, if the same destination IP can be reached through more
than one VPN community.
Example
The objects Paris and Chicago have overlapping encryption domains. The overlapping domain is:
10.8.8.1 - 10.8.8.1
- Same destination address can be reached in more than one community (MyIntranet, NewStar). This
configuration is not supported.
vpn rim_cleanup
Description
Cleans RIM routes.
Syntax
vpn rim_cleanup
vpn rll
Description
Controls the VPN Route Lookup Layer:
n Saves the Route Lookup Layer information to the specified file.
n Synchronizes the routing table.
Syntax
vpn rll
dump <File>
sync
Parameters
Parameter Description
dump <File> Saves the Route Lookup Layer information to the specified file:
n ISP Redundancy Default Routes (Next Hop, Interface,
Metric)
n Route Shadow (Interface and Metric, IP/Mask, Next
Hop)
n Monitored IP Addresses (Data, IP/Mask)
vpn set_slim_server
Description
This command is deprecated.
Delete the $FWDIR/conf/slim.conf file and use the Management Server to configure SSL Network
Extender.
As long as the $FWDIR/conf/slim.conf file exists, it overrides the settings you configure on the
Management Server.
vpn set_snx_encdom_groups
Description
Controls the encryption domain per usergroup feature for SSL Network Extender.
Syntax
vpn set_snx_encdom_groups
off
on
Parameters
Parameter Description
vpn set_trac
Description
Controls the TRAC server.
Syntax
vpn set_trac
disable
enable
Parameters
Parameter Description
Example
vpn shell
Description
VPN Command Line Interface.
vpn shell
vpn6 shell
Menu Options
Menu Sub-Options
interface
add
modify
delete
show
show
interface
tunnels
IKE
all
peer <Internal Peer IP>
IPsec
all
peer <Internal Peer IP>
tunnels
show
IKE
all
peer <Internal Peer IP>
IPsec
all
peer <Internal Peer IP>
delete
IKE
peer <Security Gateway>
user <Username>
all
IPsec
peer <Security Gateway>
user <Username>
all
all
IKE
IPsec
license
scm
status
list
Option Description
quit Quits the VPN shell (available only in the main level).
Option Description
show > tunnels > IKE > peer <Internal Peer IP>
Note - This sub-option is the same as:
o In the main "vpn tu" on page 1610 menu, the option (1)
List all IKE SAs .
o The "vpn tu [-w] list peer_ike <IP
Address>" command (see "vpn tu list" on page 1615).
l Show all IPsec SAs
show > tunnels > IPsec > peer <Internal Peer IP>
Note - This sub-option is the same as:
o In the main "vpn tu" on page 1610 menu, the option (4)
List all IPsec SAs for a given peer (GW).
o The "vpn tu [-w] list peer_ipsec <IP
Address>" command (see "vpn tu list" on page 1615).
Option Description
tunnels > show > IKE > peer <Internal Peer IP>
Note - This sub-option is the same as:
o In the main "vpn tu" on page 1610 menu, the option (3)
List all IKE SAs for a given peer (GW).
o The "vpn tu [-w] list peer_ike <IP
Address>" command (see "vpn tu list" on page 1615).
l Show all IPsec SAs:
tunnels > show > IPsec > peer <Internal Peer IP>
Note - This sub-option is the same as:
o In the main "vpn tu" on page 1610 menu, the option (4)
List all IPsec SAs for a given peer (GW).
o The "vpn tu [-w] list peer_ipsec <IP
Address>" command (see "vpn tu list" on page 1615).
Option Description
tunnels > delete > IKE > peer <Internal Peer IP>
Option Description
vpn show_tcpt
Description
Shows users connected in Visitor Mode.
Syntax
vpn show_tcpt
vpn sw_topology
Note - R80.40 does not support UTM-1 Edge and Safe@Office devices. The
information about this command is provided only to describe the existing syntax option
until it is removed completely.
Description
Downloads the topology for a UTM-1 Edge or Safe@Office device.
Syntax
Parameters
Parameter Description
-profile Name of the UTM-1 Edge or Safe@Office profile, for which the topology is
<profile> created.
vpn tu
Description
Launches the TunnelUtil tool, which is used to control VPN tunnels.
General Syntax
vpn tu
vpn tunnelutil
Menu Options
[Expert@MyGW:0]# vpn tu
(Q) Quit
*******************************************
Note - When you view Security Associations for a specific VPN peer, you must specify
the IP address in dotted decimal notation.
Advanced Syntax
vpn tu
help
del <options>
list <options>
mstats
tlist <options>
Parameters
Parameter Description
mstats Shows distribution of VPN tunnels (SPIs) between CoreXL Firewall instances.
See "vpn tu mstats" on page 1617.
vpn tu del
Description
Deletes IPsec Security Associations (SAs) and IKE Security Associations (SAs).
Parameters
Parameter Description
all Deletes all IPsec SAs and IKE SAs for all VPN peers and users.
Parameter Description
n Delete all IPsec SAs for the specified VPN peer and the specified
user:
Notes:
l This command is the same as:
o In the main "vpn tu" on page 1610 menu,
the option (6) Delete all IPsec SAs for a
given User (Client).
o In the "vpn shell" on page 1601 menu, the
option tunnels > delete > IPsec > user
< Username> .
l This command does not support IPv6 addresses.
Parameter Description
<IP Address> Deletes all IPsec SAs and IKE SAs for the specified VPN peer.
Note - This command is the same as the option (7) Delete all
IPsec+IKE SAs for a given peer (GW) in the main "vpn tu"
on page 1610 menu.
<IP Address> Deletes all IPsec SAs and IKE SAs for the specified VPN peer and the
<Username> specified user.
Note - This command is the same as the option (8) Delete all
IPsec+IKE SAs for a given User (Client) in the main "vpn
tu" on page 1610 menu.
vpn tu list
Description
Shows IPsec SAs and IKE SAs.
Parameters
Parameter Description
Parameter Description
peer_ike <IP Address> Shows all IKE SAs for the specified VPN peer.
peer_ipsec <IP Address> Shows all IPsec SAs for the specified VPN peer.
vpn tu mstats
Description
Shows the distribution of VPN traffic between CoreXL Firewall instances.
For more information, see sk118097 - MultiCore Support for IPsec VPN in R80.10 and above.
Parameters
Item Description
[Expert@MyGW:0]#
[Expert@MyGW:0]#
vpn tu tlist
Description
Shows information about VPN tunnels.
Parameters
Parameter Description
Parameter Description
For example: -v -t -b -r
n Write the options together:
... -<option1><option2><option3>
vpn ver
Description
Shows the major version number and build number of the VPN kernel module.
Syntax
Parameters
Parameter Description
-k Shows the version name and build number and the kernel build number.
Example
mcc
Description
The VPN Multi-Certificate CA (MCC) commands let you manage certificates and Certificate Authorities on
a Security Management Server or Domain Management Server:
n Shows Certificate Authorities
n Shows certificates
n Adds certificates
n Deletes certificates
Important:
n Before you run this command, you must close all SmartConsole clients,
GuiDBedit Tool clients (see sk13009), and "dbedit" clients (see skI3301) to
prevent a lock of the management database. The only exceptions are the "mcc
lca" and "mcc show" commands.
n The mcc commands require the cpca process to be up and running. Run this
command:
ps auxw | egrep "cpca|COMMAND"
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
Syntax
mcc
-h
add <options>
add2main <options>
del <options>
lca
main2add <options>
show <options>
Parameters
Parameter Description
mcc add
Description
Adds a certificate stored in DER format in a specified file, as an additional certificate to the specified CA.
The new certificate receives an index number higher by one than the highest existing certificate index
number.
The new certificate receives an index number higher by one than the highest existing certificate index
number.
Syntax
Note
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Important - Before you run this command, you must close all SmartConsole clients,
GuiDBedit Tool clients (see sk13009), and "dbedit" clients (see skI3301) to prevent a
lock of the management database.
Parameters
Parameter Description
<CA Name> Specifies the name of the CA, as defined in the Management Server
database.
<Certificate Specifies the path and the name of the certificate file.
File>
To show the main certificate of a CA, omit this parameter.
Example - Add the certificate stored in the /var/log/Mycert.cer file to the CA called "MyCA"
mcc add2main
Description
Copies the additional certificate of the specified index number of the specified CA to the main position and
overwrites the previous main certificate.
Syntax
Note
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Important - Before you run this command, you must close all SmartConsole clients,
GuiDBedit Tool clients (see sk13009), and "dbedit" clients (see skI3301) to prevent a
lock of the management database.
Parameters
Parameter Description
<CA Name> Specifies the name of the CA, as defined in the Management Server
database.
mcc del
Description
Removes the additional certificate of the specified index number from the specified CA.
Greater index numbers (of other additional certificates) are reduced by one.
Syntax
Note
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Important - Before you run this command, you must close all SmartConsole clients,
GuiDBedit Tool clients (see sk13009), and "dbedit" clients (see skI3301) to prevent a
lock of the management database.
Parameters
Parameter Description
<CA Name> Specifies the name of the CA, as defined in the Management Server
database.
mcc lca
Description
Shows all Certificate Authorities (CAs) defined in the Management Server database, with the number of
additional CA certificates for each CA.
Syntax
mcc lca
Note
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Example
mcc main2add
Description
Copies the main certificate of the specified CA to an additional position.
The copied certificate receives an index number higher by one than the highest existing certificate index
number.
Syntax
Note
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Important - Before you run this command, you must close all SmartConsole clients,
GuiDBedit Tool clients (see sk13009), and "dbedit" clients (see skI3301) to prevent a
lock of the management database.
Parameters
Parameter Description
<CA Name> Specifies the name of the CA, as defined in the Management Server database.
Example
The CA called "MyCA" has a main certificate and one additional certificate.
If you run this command, then the CA will have two additional certificates, and additional certificate #2 will
be identical to the main certificate:
mcc main2add MyCA
mcc show
Description
Shows details for a specified certificate of a specified CA.
Syntax
Note
On a Multi-Domain Server, you must run this command in the context of the applicable
Domain Management Server:
Parameters
Parameter Description
<CA Name> Specifies the name of the CA, as defined in the Management Server
database.
[Expert@MGMT:0]#
admin_wizard
Description
Runs the administration client wizard to test connectivity to websites, Exchange server services, or
LDAP server.
Syntax
admin_wizard
cancel
estimation
exchange_wizard <Exchange Server Address> <User Name> <Password>
[<Options>]
ldap <LDAP server>
wizard <Web Site Address>
Parameters
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Example 3 - Check accessibility for username 'user1' to ActiveSync and EWS on the Exchange server
'exchange.example.com'
cvpnd_admin
Description
Changes the behavior of the Mobile Access cvpnd process.
Syntax
cvpnd_admin
appMonitor status
clear_kernel_tables
clear_portal_cache
debug <options>
ics_update
isEnabled
license <options>
policy [{graceful | hard}]
revoke <Certificate Serial Number>
Parameters
Parameter Description
clear_portal_cache Clears the cache for the applications presented in the Mobile Access
Portal for all open sessions.
Parameter Description
debug set TDERROR_ Enables all cvpnd debug output for the running cvpnd process.
ALL_ALL=5
The output is in the $CVPNDIR/log/cvpnd.elg file.
Note - When you enable all debug topics, it might impact the
performance. Debug topics are provided by Check Point
Support.
debug trace on The TraceLogger feature generates full captures of incoming and
outgoing authenticated Mobile Access traffic.
debug trace
users=<Username> The output is saved in the $CVPNDIR/log/trace_log/ directory.
Important:
n The TraceLogger feature has a major effect on
performance, because all traffic is saved as files.
n The TraceLogger feature uses a lot of disk space,
because all traffic is saved as files. After a maximum
number of files is saved, the oldest files are removed
from the disk, which also has a performance cost.
n The TraceLogger feature creates a security concern:
end-user passwords that are sent to internal resources
might appear in the capture files.
ics_update Updates the Mobile Access services after you published a new ICS
update.
Parameter Description
policy [{graceful Updates the Mobile Access services according to the current policy:
| hard}]
n policy - For Apache services, each httpd process waits until its
current request is finished, then exits.
n policy graceful - For Apache services, each httpd process
waits until its current request is finished, then exits.
n policy hard - For Apache services, all httpd processes exit
immediately, terminating all current http requests.
cvpnd_settings
Description
Changes a Mobile Access Gateway local configuration file $CVPNDIR/conf/cvpnd.C.
The cvpnd_settings commands allow to get attribute values or set them in order to configure the
cvpnd process.
Important - Changes made by with the cvpnd_settings command are not saved
during the Mobile Access Gateway upgrade. Keep a backup of your
$CVPNDIR/conf/cvpnd.C file after you make manual changes.
Warning - The cvpnd process may not start, if you make a mistake in the syntax -
attribute names or their values.
General Syntax
Parameters
Run this command to see the full explanation of the parameters: cvpnd_settings -h
Parameter Description
< Specifies the path and the name of configuration file to change.
Configuration
File>
Parameter Description
Examples 3 - Empty the value of the attribute 'myFlag', or create a new attribute/list 'myFlag'
cvpnd_settings set myFlag
Examples 4 - Add the attribute 'myFlag' with the value 'a.example.com' to a list
cvpnd_settings listAdd myFlag a.example.com
cvpn_ver
Description
Shows the version of the Mobile Access Software Blade.
Best Practice - Run the "fw ver -k" command to get all version details (see "fw
ver" on page 1107).
Syntax
cvpn_ver
Example
[Expert@MyGW:0]# cvpn_ver
This is Check Point Mobile Access R80.40 - Build 123
[Expert@MyGW:0]#
cvpnrestart
Description
Restarts all Mobile Access blade services.
Warning - While this command does not terminate sessions, it closes all TCP
connections. End-users might lose their work.
Syntax
cvpnrestart [--with-pinger]
Parameters
Parameter Description
--with- Restarts the Pinger service, responsible for ActiveSync and Outlook Web Access
pinger push mail notifications.
cvpnstart
Description
Starts all Mobile Access blade services, after you stopped them with the "cvpnstop" on page 1643
command.
Syntax
cvpnstart
cvpnstop
Description
Stops all Mobile Access blade services.
Warning - While this command does not terminate sessions, it closes all TCP
connections. End-users might lose their work.
Syntax
cvpnstop
deleteUserSettings
Description
Deletes all persistent settings (favorites, cookies, credentials) of one or more end-users.
Syntax
Parameters
Parameter Description
Notes:
n When you refer to an internal user, use its
username.
n When you refer to an LDAP user, use the
full DN according to your LDAP settings.
fwpush
Description
Sends command interrupts to the fwpushd process on the Mobile Access Gateway.
Note - Users get the push notifications only while they are logged in.
Syntax
fwpush
debug <options>
del <options>
info
print
send <options>
unsub <options>
Parameters
Parameter Description
debug {off | on | reset | set all all Controls the debug of the Mobile Access
| stat} Push Notifications daemon.
For more information, see sk109039.
del {-token <Token> | -uid <User-UID>} Deletes a specified token, or all tokens
for a specified user.
The available options are:
n Delete the specified token for all
users:
Parameter Description
Parameter Description
or
UserSettingsUtil show_exchange_registered_users
Example output:
Notes:
n To use the "<Token>" parameter in the "fwpush" commands, use the value of the
Push Token attribute.
In the above example:
xxxxxxxxxxxxx65b48e424023ebxxxxxxxxca22ea788cfb3cxxxxxxxxxx
n To use the "<Username>" parameter in the "fwpush" commands, use the value of
the CN attribute.
In the above example: JohnD
n To use the "<User-UID>" parameter in the "fwpush" commands, use the value of
the User Settings id attribute.
In the above example: c4b6c6fbb0c4xxxxxxxx265e93e0e372
Example
[Expert@MyGW:0]# fwpush send -uid JohnD -msg "Hello - push"
ics_updates_script
Description
Manually starts an Endpoint Security on Demand (ESOD) update on the Mobile Access Gateway.
For more information, see the contents of the $CVPNDIR/bin/ics_updates_script file.
Syntax
Parameters
Parameter Description
<Path to ICS Updates Package> Specifies the full path of the ICS Updates package.
Do not specify the name of the ICS Updates package.
Notes
n Usually, it is not necessary to run this command, and you start the ESOD updates from
SmartConsole:
1. In SmartConsole, from the left navigation panel, click Manage & Settings .
2. In the Mobile Access section, click Configure in SmartDashboard.
3. The SmartDashboard opens on the Mobile Access tab.
4. From the left tree, click Endpoint Security on Demand > Endpoint Compliance Updates .
5. Click Update Database Now.
6. Enter the applicable User Center credentials.
7. Click Next.
8. Select the applicable Mobile Access Gateways.
9. Click Finish.
10. Close the SmartDashboard.
n Make sure to run only one instance of this command at a time.
listusers
Description
Shows a list of end-users connected to the Mobile Access Gateway, along with their source IP addresses.
Syntax
listusers
Example
[Expert@MyGW:0]# listusers
------------------------------
UserName | IP
------------------------------
Tom , 192.168.0.51
John , 192.168.0.130
Jane , 192.168.0.7
[Expert@MyGW:0]#
rehash_ca_bundle
Description
Imports all of the Certificate Authority (CA) files from the $CVPNDIR/var/ssl/ca-bundle/ directory
into the Mobile Access trusted CA bundle.
The trusted CA bundle is used when the Mobile Access Gateway accesses an internal server (such as
OWA) through HTTPS.
If the SSL server certificate of the internal server is not trusted by the Mobile Access Gateway, the Mobile
Access Gateway responds based on the settings for the Internal Web Server Verification feature. The
default setting is Monitor.
To accept certificates from a specified server, add its server certificate CA to the CA bundle.
Syntax
rehash_ca_bundle
Example
[Expert@MyGW:0]# rehash_ca_bundle
Doing /opt/CPcvpn-R80.40/var/ssl/ca-bundle/
AC_Ra__z_Certic__mara_S.A..pem => 6f2c1157.0
AOL_Time_Warner_Root_Certification_Authority_1.pem => ed9bb25c.0
... ... ...
beTRUSTed_Root_CA_-_RSA_Implementation.pem => 16b3fe3c.0
thawte_Primary_Root_CA.pem => 2e4eed3c.0
[Expert@MyGW:0]#
UserSettingsUtil
Description
Shows details of users connected to the Mobile Access Gateway.
Syntax
Parameters
Parameter Description
Notes:
n When you
refer to an
internal
user, use
its
username.
n When you
refer to an
LDAP
user, use
the full DN
according
to your
LDAP
settings.
dlpcmd
Description
Control the Data Loss Prevention Engine on Security Gateway.
dlpcmd [-s]
action_by_admin <options>
getquarantined
getquarantinedcount
getquarantinedsize
ramdisk <options>
Parameters
Parameter Description
action_by_admin Sends or deletes the specified quarantined email by its public GUID
<options> from quarantine.
The available options are:
n Send (Release) the specified quarantined email:
Notes:
n You must enclose the email ID in curly brackets {}.
n You can see this action in Audit Logs in
SmartConsole. For example, see sk117753.
Example
VSX Commands
For more information about VSX, see the R80.40 VSX Administration Guide.
cpconfig
Description
This command starts the Check Point Configuration Tool.
This tool lets you configure specific settings for the installed Check Point products.
Important - In Cluster, you must configure all the Cluster Members in the same way.
Syntax
cpconfig
Menu Options
Note - The options shown depend on the configuration and installed products.
Licenses and contracts Manages Check Point licenses and contracts on this Security
Gateway or Cluster Member.
Random Pool Configures the RSA keys, to be used by Gaia Operating System.
Secure Internal Communication Manages SIC on the Security Gateway or Cluster Member.
This change requires a restart of Check Point services on the
Security Gateway or Cluster Member.
For more information, see:
n The R80.40 Security Management Administration Guide.
n sk65764: How to reset SIC.
Enable cluster membership for Enables the cluster membership on the Security Gateway.
this gateway
This change requires a reboot of the Security Gateway.
For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Disable cluster membership for Disables the cluster membership on the Security Gateway.
this gateway
This change requires a reboot of the Security Gateway.
For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Enable Check Point Per Virtual Enables Virtual System Load Sharing on the VSX Cluster
System State Member.
For more information, see the R80.40 VSX Administration Guide.
Disable Check Point Per Virtual Disables Virtual System Load Sharing on the VSX Cluster
System State Member.
For more information, see the R80.40 VSX Administration Guide.
Enable Check Point ClusterXL Enables Check Point ClusterXL for Bridge mode.
for Bridge Active/Standby
This change requires a reboot of the Cluster Member.
For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Disable Check Point ClusterXL Disables Check Point ClusterXL for Bridge mode.
for Bridge Active/Standby
This change requires a reboot of the Cluster Member.
For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Check Point CoreXL Manages CoreXL on the Security Gateway or Cluster Member.
After all changes in CoreXL configuration, you must reboot the
Security Gateway or Cluster Member.
For more information, see the R80.40 Performance Tuning
Administration Guide.
Automatic start of Check Point Shows and controls which of the installed Check Point products
Products start automatically during boot.
[Expert@MySingleGW:0]# cpconfig
This program will let you re-configure
your Check Point products configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) SNMP Extension
(3) PKCS#11 Token
(4) Random Pool
(5) Secure Internal Communication
(6) Enable cluster membership for this gateway
(7) Check Point CoreXL
(8) Automatic start of Check Point Products
(9) Exit
[Expert@MyClusterMember:0]# cpconfig
This program will let you re-configure
your Check Point products configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) SNMP Extension
(3) PKCS#11 Token
(4) Random Pool
(5) Secure Internal Communication
(6) Disable cluster membership for this gateway
(7) Enable Check Point Per Virtual System State
(8) Enable Check Point ClusterXL for Bridge Active/Standby
(9) Check Point CoreXL
(10) Automatic start of Check Point Products
(11) Exit
vsenv
Description
Changes the shell's current context to the specified Virtual Device.
Syntax
Parameters
Parameter Description
Note - To see the configured Virtual Devices, run the "vsx stat -v" command.
[Expert@MyVsxGW:0]# vsenv
Context is set to Virtual Device VSX2_192.168.3.242 (ID 0).
[Expert@MyVsxGW:0]#
[Expert@MyVsxGW:0]# vsenv 2
Context is set to Virtual Device VS2 (ID 2).
[Expert@MyVsxGW:2]#
vsx
Description
n Shows VSX configuration.
n Fetches VSX configuration.
n Shows and configures CPU Resource Control.
n Shows and configures Memory Resource Control.
Syntax
vsx
fetch <options>
fetch_all_cluster_policies
fetchvs <options>
get
initmsg <options>
mstat <options>
resctrl <options>
showncs <options>
sicreset
stat <options>
unloadall
vspurge
Parameters
Parameter Description
fetch_all_cluster_ Fetches security policy for all Virtual Systems and Virtual Routers
policies from cluster peers.
See "vsx fetch_all_cluster_policies" on page 1667.
Parameter Description
showncs <options> Shows Check Point Network Configuration Script (NCS) for Virtual
Device.
See "vsx showncs" on page 1678.
sicreset Resets SIC for Virtual System or Virtual Router in the current VSX
context.
See "vsx sicreset" on page 1679.
unloadall Unloads security policy for all Virtual Systems and Virtual Routers.
See "vsx unloadall" on page 1682.
vsx fetch
Description
Fetches the most current configuration files from the Security Management Server or Main Domain
Management Server, and applies it to the VSX Gateway.
Syntax
Parameters
Parameter Description
-f Fetches the specified configuration with NCS commands file instead of the
< default local.vsall file.
Configuration
File>
<Management Fetches the local.vsall from the specified Management Server (by
Server> resolvable hostname, or IP address), replaces and runs it.
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
Example
vsx fetch_all_cluster_policies
Description
Fetches security policy for all Virtual Systems and Virtual Routers from cluster peers.
Syntax
Parameters
Parameter Description
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
vsx fetchvs
Description
Fetches configuration file for the specified Virtual Device based on information stored locally on the VSX
Gateway.
Syntax
Parameters
Parameter Description
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
Example
[Expert@MyVsxGW:0]# vsx fetchvs 2
vsx get
Description
Shows the information about the current VSX context.
Syntax
vsx get
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
Example
vsx initmsg
Description
Sends VSX initialization message - to initialize the CPD messaging in Virtual Systems.
Syntax
Parameters
Parameter Description
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
Example
vsx mstat
Description
Shows and configures Memory Resource Control.
Output shows these global memory resources:
Resource Description
Syntax
vsx mstat
[-vs <VSID>] [unit <Unit>] [sort {<Number> | all}]
debug
disable
enable
status
swap <Minutes>
Parameters
Parameter Description
No Parameters Shows the total memory consumption for each Virtual System.
Parameter Description
Note - You can combine all the available options (separate them with
spaces). Example: -vs 1 4-6
unit <Unit> Specifies the memory measurement unit shown in the command output:
n B - bytes
n K - kilobytes
n M - megabytes (default)
n G - gigabytes
sort Sorts the Virtual Systems in the output by their memory size.
{<Number> |
Specifies the number of Virtual Systems shown in the command output.
all}
Use all to show all Virtual Systems.
If you do not specify this flag, the Virtual Systems in the output are sorted by their
VSID.
debug Shows memory consumption debug information for each Virtual System by fields,
which are defined in the configuration file.
Note - This change applies immediately and does not require a reboot.
Parameter Description
Notes:
n Swap-in sample rate is a system-wide Linux setting.
When you change the value for memory monitoring, all the
swap-in rates are calculated according to the new value.
n When you enable the monitoring memory resources feature, the
swap-in rate setting is saved.
When you disable the feature, the system restores the saved
setting.
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
Example 1
[Expert@MyVsxGW:0]#
Example 2
[Expert@MyVsxGW:0]#
Example 3
======+===============+===============+=================+================+=============+==================+
=================+===========
0 | 34456.00 KB | 182104.00 KB | 6.09 KB | 0.00 KB | 51071.91 KB | 0.00 KB |
0.00 KB | 0.00 KB
1 | 0.00 KB | 0.00 KB | 0.00 KB | 0.00 KB | 0.00 KB | 0.00 KB |
0.00 KB | 0.00 KB
Note: To add a field to memory table please uncomment the required field (delete the leading '#')
To remove a field from memory table please comment out the required field (add a leading '#')
Configuration is done in the file /opt/CPsuite-R80.30/fw1/conf/memoryinfo.conf
[Expert@MyVsxGW:0]#
vsx resctrl
Description
Shows and configures the CPU Resource Control.
Note - You must enable VSX Resource Control Monitoring (vsx resctrl
monitor enable) to see data about CPU usage for each Virtual System over
SNMP.
Syntax
vsx resctrl
-d stat
-d -q stat
-u stat
load_configuration
monitor <options>
reset
stop
Parameters
Parameter Description
-d stat Shows CPU consumption for each Virtual Device - raw information including CPU
ticks (but only after 24 hours of active monitoring)
-d -q stat Shows CPU consumption for each Virtual Device - raw information without header
line (but only after 24 hours of active monitoring).
-u stat Shows CPU consumption for each Virtual Device - for each CPU core.
Parameter Description
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
Notes
n For systems with more than one CPU, time is an average for all CPUs.
To see the usage for each Virtual Device per CPU, run the "vsx resctrl -u" stat command.
n Total Virtual System CPU Usage includes the total for all Virtual Devices: Virtual Routers, Virtual
Switches, Virtual Systems, and the VSX Gateway.
Example 1
Example 2
Number of CPUs: 4
Monitoring active time: 2m 32s
[Expert@MyVsxGW:0]#
vsx showncs
Description
Shows Check Point Network Configuration Script (NCS) for a Virtual Device.
Syntax
Parameters
Parameter Description
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
vsx sicreset
Description
Resets SIC for Virtual System or Virtual Router in the current VSX context.
Notes:
n This operation is not supported for the context of VSX Gateway itself (VS0).
n On the Management Server, run the cpca_client revoke_cert command to
cancel the old certificate.
n In SmartConsole, open the Virtual System object and immediately click OK.
This action creates a new certificate, and transfers the certificate to the VSX
Gateway.
Syntax
Parameters
Parameter Description
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
vsx stat
Description
Shows status information for VSX Gateway.
Syntax
Parameters
Parameter Description
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy | SIC Stat
-----+-------------+-----------------------+-----------------+--------------------------+---------
1 | S VS1 | VS_Policy | 20Sep2019 22:07 | <No Policy> | Trust
2 | S VS2 | VS_Policy | 20Sep2019 22:07 | <No Policy> | Trust
[Expert@MyVsxGW:2]#
Example 2 - Show a list of all Virtual Devices and their applicable information.
VSID: 0
VRID: 0
Type: VSX Gateway
Name: VSX1_192.168.3.241
Security Policy: VSX_Cluster_VSX
Installed at: 20Sep2019 22:06:33
SIC Status: Trust
Connections number: 5
Connections peak: 43
Connections limit: 14900
VSID: 1
VRID: 1
Type: Virtual System
Name: VS1
Security Policy: VS_Policy
Installed at: 20Sep2019 22:07:03
SIC Status: Trust
Connections number: 0
Connections peak: 3
Connections limit: 14900
VSID: 2
VRID: 2
Type: Virtual System
Name: VS2
Security Policy: VS_Policy
Installed at: 20Sep2019 22:07:01
SIC Status: Trust
Connections number: 0
Connections peak: 2
Connections limit: 14900
[Expert@MyVsxGW:2]#
VSID: 2
VRID: 2
Type: Virtual System
Name: VS2
Security Policy: VS_Policy
Installed at: 20Sep2019 22:07:01
SIC Status: Trust
Connections number: 0
Connections peak: 2
Connections limit: 14900
[Expert@MyVsxGW:2]#
vsx unloadall
Description
Unloads security policy for all Virtual Systems and Virtual Routers.
See sk33065: Unloading policy from a VSX Security Gateway.
Syntax
vsx unloadall
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
vsx vspurge
Description
Removes Virtual Devices that are no longer defined in the management database, but were not removed
from the VSX Gateway, because the VSX Gateway was down or disconnected when the management
server pushed the updated VSX configuration.
This command cleans all unused Virtual Devices entries (from the NCS local.vskeep) and fetches the
VSX configuration file (NCS local.vskeep) again.
Syntax
Parameters
Parameter Description
-f <purge_ Specifies the path and the name of the file, in which the command saves the
file> purged information.
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
vsx_util
Description
Performs various VSX maintenance tasks.
You run this command from the Expert mode on the Management Server (Security Management Server,
or a Main Domain Management Server on Multi-Domain Server).
Syntax
vsx_util -h
vsx_util <Command> [-s <Mgmt Server>] [-u <UserName>] [-c <Name of VSX
Object>] [-m <Name of VSX Cluster Member>]
Parameters
Parameter Description
-c <Name of VSX Specifies the name of the VSX Gateway or VSX Cluster object.
Object>
-m <Name of VSX Specifies the name of the VSX Gateway or VSX Cluster Member object.
Cluster Member>
Sub-command Description
vsx_util add_ Adds a new Cluster Member to a VSX Cluster and pushes the VSX Cluster
member configuration to the new VSX Cluster Member.
See "vsx_util add_member" on page 1687.
vsx_util Changes the VSX Management IP address (within the same subnet) of a VSX
change_mgmt_ip Gateway or VSX Cluster Member.
See "vsx_util change_mgmt_ip" on page 1692.
vsx_util Changes (or adds) the VSX Management IP address of a VSX Gateway or
change_mgmt_ VSX Cluster Member to a new subnet.
subnet
See "vsx_util change_mgmt_subnet" on page 1693.
vsx_util Converts the VSX Cluster mode between High Availability (default) and Virtual
convert_cluster System Load Sharing.
See "vsx_util convert_cluster" on page 1695.
vsx_util Upgrades the version of a VSX Gateway or VSX Cluster in the management
upgrade database.
See "vsx_util upgrade" on page 1704.
vsx_util view_ Shows configuration of a Virtual Device on the Management Server versus the
vs_conf VSX Gateway or VSX Cluster.
See "vsx_util view_vs_conf" on page 1705.
Sub-command Description
vsx_util vsls Shows the configuration menu for Virtual System Load Sharing - see status,
redistribute, export and import configuration.
See "vsx_util vsls" on page 1708.
Notes
n This command writes its messages to the vsx_util_YYYYMMDD_HH_MM.log file on the
Management Server:
l On a Security Management Server:
$FWDIR/log/vsx_util_YYYYMMDD_HH_MM.log
/opt/CPsuite-R80.40/fw1/log/vsx_util_YYYYMMDD_HH_MM.log
n If you need to exit from the vsx_util command's menu, press the CTRL C keys.
Important - Do not press these keys, it this command already started to perform
a change. If you press these keys during the operation, the command does not
save its log file.
vsx_util add_member
Description
Adds a new Cluster Member to a VSX Cluster and pushes the VSX Cluster configuration to the new VSX
Cluster Member.
Syntax
vsx_util add_member
Required Input
n The applicable VSX Cluster object.
n Name of the new VSX Cluster Member.
n IP address for the management interface.
n IP address for the synchronization interface.
n The one-time Activation Key (SIC activation key)
Comments
n Execute the command and follow the instructions on the screen.
n After the command adds a new Cluster Member to the management database, the command
prompts you to reconfigure the new VSX Cluster Member (to push the VSX Cluster configuration to
it).
l If you enter "y " to reconfigure the new VSX Cluster Member at this time, then the "vsx_util
reconfigure" on page 1696 operation starts automatically on the new VSX Cluster Member.
Important - You must reboot the new VSX Cluster Member after the
reconfigure operation finishes.
l If you enter "n" to cancel the reconfigure operation on the new VSX Cluster Member at this
time, then later you must manually run the "vsx_util reconfigure" on page 1696 command for
the new VSX Cluster Member.
vsx_util change_interfaces
Description
Automatically replaces designated existing interfaces with new interfaces on all Virtual Devices, to which
the existing interfaces connect.
This command is useful when converting a deployment to use Link Aggregation, especially where VLANs
connect to many Virtual Devices.
Syntax
vsx_util change_interfaces
Required Input
n The applicable VSX Gateway or VSX Cluster object.
n Where to apply the change (Management Server only, or Management Server and VSX Gateway /
VSX Cluster Members).
n Name of the interface to be replaced.
n Name of the new (replacement) interface.
Comments
n Execute the command and follow the instructions on the screen.
n This command supports the resume feature.
n You can use this command to migrate a VSX deployment from an Open Server to a Check Point
appliance by using the Management Only mode.
n Refer to the Notes section below for additional information.
Procedure
Step Description
1 Close all SmartConsole clients that are connected to the Security Management Server or
Domain Management Servers.
4 On Multi-Domain Server, go to the context of the Main Domain Management Server that
manages the applicable VSX Gateway (VSX Cluster) object:
Step Description
5 Run:
vsx_util change_interfaces
6 Enter the IP address of the Security Management Server or Main Domain Management Server.
a. You can optionally add a new interface, if you select the A new interface name option.
This interface must physically exist on the VSX Gateway (all VSX Cluster Members).
Otherwise, the operation fails.
b. At the prompt, enter the new interface name.
If the new interface is a Bond interface, the interface name must match the name of the
configured Bond interface exactly.
13 If you selected the option Apply changes to the management database only , you can remove
the old (replaced) interfaces from the management database.
When prompted, enter y :
Would you like to remove the old interfaces from the database?
(y|n) [n]: y
Step Description
Notes
n The option "Apply changes to the management database and to the VSX Gateway/Cluster
members immediately " verifies connectivity between the Management Server and the VSX
Gateway or VSX Cluster Members. In the event of a connectivity failure one of the following actions
occur:
1. If all of the newly changed interfaces fail to establish connectivity, the process terminates
unsuccessfully.
2. If one or more interfaces successfully establish connectivity, while one or more other
interfaces fail, you may optionally continue the process.
In this case, those interfaces for which connectivity was established successfully will be
changed.
For those interfaces that failed, you must then resolve the issue and then run the "vsx_util
reconfigure" on page 1696 command to complete the process.
n If you select the option "Apply changes to the management database only ", you can select one of
these:
l Another interface from list (if any are available).
l Option to add a new interface.
vsx_util change_mgmt_ip
Description
Changes the VSX Management IP address of a VSX Gateway or VSX Cluster Member.
This command changes the Management IP address within the same subnet.
For more information, see sk92425.
Syntax
vsx_util change_mgmt_ip
Required Input
n The applicable VSX Cluster object.
n The applicable VSX Cluster Member object.
n New management IP address.
Comments
n Execute the command and follow the instructions on the screen.
vsx_util change_mgmt_subnet
Description
Changes the VSX Management IP address of a VSX Gateway or VSX Cluster Member.
This command changes the Management IP address from the current subnet to a different subnet.
For more information, see sk92425.
Syntax
vsx_util change_mgmt_subnet
Required Input
n The applicable VSX Gateway or VSX Cluster object.
n New management IPv4 address.
n New management IPv4 netmask.
n New management IPv6 address.
n New management IPv6 prefix.
n New IPv4 default gateway.
n New IPv6 default gateway.
Comments
n Execute the command and follow the instructions on the screen.
n This command updated only routes that were automatically generate.
You must remove and/or change all manually created routes that use the previous management
subnet.
n You must reboot the VSX Gateway (all VSX Cluster Members) after the command finishes.
vsx_util change_private_net
Description
Changes the IP address of the Internal Communication Network in a VSX Cluster (cluster private network).
Syntax
vsx_util change_private_net
Required Input
n The applicable VSX Cluster object.
n New IPv4 address for the cluster private network.
n New IPv4 netmask for the cluster private network.
n New IPv6 address and prefix for the cluster private network.
Comments
n Run the command and follow the instructions on the screen.
n The IP address of the Internal Communication Network must be unique.
This IP address must not be used anywhere in your environment, including the Virtual Devices on
this VSX Cluster.
n The illegal IPv4 addresses are: 0.0.0.0, 127.0.0.0, and 255.255.255.255
n For IPv4 address, the network mask must be one of these:
l 255.255.224.0, or /20
l 255.255.240.0, or /21
l 255.255.252.0, or /22 (this is the default)
n For IPv6 address, the new prefix must be /80.
vsx_util convert_cluster
Description
Converts the VSX Cluster mode between High Availability (default) and Virtual System Load Sharing.
Syntax
vsx_util convert_cluster
Required Input
n The applicable VSX Cluster object.
n The ClusterXL mode (case sensitive).
Comments
n Execute the command and follow the instructions on the screen.
n When you convert from Virtual System Load Sharing to High Availability:
l All Virtual Systems are Active on the same VSX Cluster Member by default.
l Peer Virtual Systems are Standby on other VSX Cluster Members.
n When you convert from High Availability to Virtual System Load Sharing:
l All VSX Cluster Members must be in the Check Point Per Virtual System State:
a. Run the "cpconfig" on page 1659 command.
b. Select the option Enable Check Point Per Virtual System State.
vsx_util reconfigure
Description
Restores VSX configuration on a VSX Gateway or VSX Cluster Member (for example, after you perform
clean install after a system failure).
Syntax
vsx_util reconfigure
Important - Before you run this command on the Management Server, you must
configure specific settings on the cleanly installed VSX Gateway or VSX Cluster
Member as they were:
n IP address of Gaia management interface
n Enable IPv6 support in Gaia
n Configure the applicable interfaces (Bond, VLAN, and so on)
n Configure kernel parameters and their values:
l $FWDIR/boot/modules/fwkern.conf
l $FWDIR/boot/modules/vpnkern.conf
l $PPKDIR/conf/simkern.conf
n Configure CoreXL:
l Number of CoreXL Firewall instances (for IPv4 and IPv6) in the context of
VS0 (run the cpconfig command and select the option Check Point
CoreXL)
l $FWDIR/conf/fwaffinity.conf
Required Input
n The applicable VSX Gateway or VSX Cluster object.
n The one-time Activation Key (SIC activation key).
Comments
n Execute the command and follow the instructions on the screen.
n The new VSX Gateway or VSX Cluster Member:
l Must be a new installation.
You cannot use a VSX Gateway or VSX Cluster Member with a previous VSX configuration.
l Must have the same hardware specifications as the original.
Most importantly, it must have at least the same number of interfaces.
l Must have the same Gaia OS configuration as the original.
Most importantly, it must have the same VSX Management IP address.
Limitations
The reconfigure process does not restore the local configuration that was performed on VSX Gateway or
VSX cluster member itself (because this configuration is not stored on the Management Server).
Important - After the reconfigure process is complete and you rebooted VSX Gateway
or VSX cluster member, you must manually configure these settings from scratch or
from backed up files.
These settings and files are not restored during the reconfigure process and you must manually configure
them again:
n Any OS configuration (for example, DNS, NTP, DHCP, Dynamic Routing, DHCP Relay, and so on).
n Backup files and Gaia snapshots saved in the past on the VSX Gateway or VSX cluster member.
n Any settings manually defined in various configuration files on the VSX Gateway or VSX cluster
member.
n Any Check Point configuration files.
Note - Some of these files do not exist by default. Some files are configured on
each VSX Gateway and VSX cluster member, and some files are configured for
each Virtual System.
l $FWDIR/boot/modules/fwkern.conf
l $FWDIR/boot/modules/vpnkern.conf
l $FWDIR/conf/fwaffinity.conf
l $FWDIR/conf/fwauthd.conf
l $FWDIR/conf/local.arp
l $FWDIR/conf/discntd.if
l $FWDIR/conf/cpha_bond_ls_config.conf
l $FWDIR/conf/resctrl
l $FWDIR/conf/vsaffinity_exception.conf
l $FWDIR/database/qos_policy.C
l simkern.conf:
o In R80.20 and higher: $PPKDIR/conf/simkern.conf
o In R80.10 and lower: $PPKDIR/boot/modules/simkern.conf
l sim_aff.conf:
o In R80.20 and higher: $PPKDIR/conf/sim_aff.conf
o In R80.10 and lower: $PPKDIR/boot/modules/sim_aff.conf
l /var/ace/sdconf.rec
l /var/ace/sdopts.rec
l /var/ace/sdstatus.12
l /var/ace/securid
Example
This example shows how the VSX configuration is restored on a VSX Cluster Member.
******************************************************************************************
* Note: the operation you are about to perform changes the information in the management *
* database. Back up the database before continuing. *
******************************************************************************************
Enter Security Management Server/main Domain Management Server IP address (Hit 'ENTER' for 'localhost'):
192.168.3.240
Enter Administrator Name: ******
Enter Administrator Password: ******
Select VSX gateway/cluster object name:
1) VSX_Cluster
Select: 1
************************************************************
IMPORTANT:
When you are managing a VSX cluster,
make sure that the new reconfigured member has the same number of
IPv4, and IPv6 firewall instances as the other VSX cluster members.
Run cpconfig command to show and edit CoreXL settings.
NOTE:
In case of adding a new cluster member to a VSX Cluster,
while using 'ClusterXL Virtual System Load Sharing'
make sure to run 'vsx_util vsls' after rebooting the
gateway in order for the Virtual Systems to become active
on the newly added VSX cluster member.
************************************************************
[Expert@MDS:0]#
vsx_util remove_member
Description
Removes a Cluster Member from a VSX Cluster.
Syntax
vsx_util remove_member
Required Input
n The applicable VSX Cluster object.
n The applicable VSX Cluster Member object.
Comments
n Before you run this command:
l Make sure to remove (detach) the license from the VSX Cluster Member.
l Make sure to run the cphastop command to avoid unexpected failover from the VSX Cluster
Member.
l Make sure to disconnect the VSX Cluster Member from all networks, except from the
Management Server.
n Execute the command and follow the instructions on the screen.
vsx_util show_interfaces
Description
Shows configuration of selected interfaces - interface types, connections to Virtual Devices, and IP
addresses.
The command shows the information on the screen and also saves it to the interfacesconfig.csv
file in the current working directory.
Syntax
vsx_util show_interfaces
Required Input
n The applicable VSX Gateway or VSX Cluster object.
n Which interfaces to show:
4) A Specific Interface Prompts you to enter the name of the specific interface to show.
Example
[Expert@MGMT:0]# vsx_util show_interfaces
Enter Security Management Server/main Domain Management Server IP address (Hit 'ENTER' for 'localhost'):
172.16.16.240
Enter Administrator Name: admin
Enter Administrator Password:
+-------------------+---------------------+----+-----------------------------------------------------+
| Type & Interface | Virtual Device Name |VSID| IP / Mask length |
+-------------------+---------------------+----+-----------------------------------------------------+
|M eth0 |VSX_Cluster_1 |0 |v4 172.16.16.98/24 v6 2001:0DB8::98/64 |
+-------------------+---------------------+----+-----------------------------------------------------+
|S eth1 |VSX_Cluster_1 |0 |v4 10.0.0.0/24 |
+-------------------+---------------------+----+-----------------------------------------------------+
|U eth2 |VS1 |1 |v4 192.0.2.2/24 v6 2001:0DB8:c::1/64 |
+-------------------+---------------------+----+-----------------------------------------------------+
|U eth3 |VS1 |1 |v4 192.168.3.3/24 v6 2001:0DB8:b::1/64 |
+-------------------+---------------------+----+-----------------------------------------------------+
|A eth4 | | | |
+-------------------+---------------------+----+-----------------------------------------------------+
|U eth5 |VS2 |2 |v4 10.10.10.10/24 v6 2001:0DB8:a::1/64 |
+-------------------+---------------------+----+-----------------------------------------------------+
|A eth6 | | | |
+-------------------+---------------------+----+-----------------------------------------------------+
[Expert@MGMT:0]#
[Expert@MGMT:0]# cat interfacesconfig.csv
Interface Name , Type ,Virtual Device Name , VSID , IPv4 Address , IPv4 mask length, IPv6 Address, IPv6
mask length
eth0,M,VSX_Cluster_1,0,172.16.16.98,24,2001:0DB8::98,64
eth1,S,VSX_Cluster_1,0,10.0.0.0,24,,
eth2,U,VS1,192.0.2.2,24,2001:0DB8:c::1,64
eth3,U,VS1,192.168.3.3,24,2001:0DB8:b::1,64
eth4,A
eth5,U,VS2,10.10.10.10,24,2001:0DB8:a::1,64
eth6,A
[Expert@MGMT:0]#
vsx_util upgrade
Description
Upgrades the version of a VSX Gateway or VSX Cluster in the management database.
Syntax
vsx_util upgrade
Required Input
n The applicable VSX Gateway or VSX Cluster object.
n The applicable Check Point version.
Comments
n Execute the command and follow the instructions on the screen.
n After the command finishes, you must run the "vsx_util reconfigure" on page 1696 command.
vsx_util view_vs_conf
Description
Compares the configuration of all Virtual Devices on the Management Server and the actual configuration
on the VSX Gateway or VSX Cluster Members.
Syntax
vsx_util view_vs_conf
Required Input
n The applicable VSX Gateway or VSX Cluster object.
n The applicable Virtual Device object.
Example
[Expert@MGMT:0]# vsx_util show_interfaces
Enter Security Management Server/main Domain Management Server IP address (Hit 'ENTER' for 'localhost'):
172.16.16.240
Enter Administrator Name: admin
Enter Administrator Password:
+---------------------------------------------------+-----+-------------------+
|Interfaces |Mgmt |VSX GW(s) |
+----------+----------------------------------------+-----+---------+---------+
|Name |IP / Mask length | |mem 1 |mem2 |
+----------+----------------------------------------+-----+---------+---------+
|eth2 |v4 10.0.0.0/24 v6 2001:db8::abc::1/64 | V | V | V |
|eth3 |v4 10.10.10.10/24 v6 2001:db8::3121/64 | V | V | V |
+----------+----------------------------------------+-----+---------+---------+
V - Interface exists on the gateway and matches management information (if defined on the management).
- - Interface does not exist on the gateway.
N/A - Fetching Virtual Device configuration from the gateway failed.
!IP - Interface exists on the gateway, but there is an IP address mismatch.
!MASK - Interface exists on the gateway, but there is a Net Mask mismatch.
Routing table:
+----------------------------------------------------------+-----+-------------+
|Ipv4 Routes |Mgmt |VSX GW(s) |
+--------------------------+--------------------+----------+-----+------+------+
|Destination / Mask Length |Gateway |Interface | |mem1 |mem2 |
+--------------------------+--------------------+----------+-----+------+------+
|2.2.2.0/24 | |eth2 | V | V | V |
|3.3.3.0/24 | |eth3 | V | V | V |
+--------------------------+--------------------+----------+-----+------+------+
+--------------------------+--------------------+----------+-----+------+------+
+----------------------------------------------------------+-----+-------------+
|Ipv6 Routes |Mgmt |VSX GW(s) |
+--------------------------+--------------------+----------+-----+------+------+
|Destination / Mask Length |Gateway |Interface | |mem1 |mem2 |
+--------------------------+--------------------+----------+-----+------+------+
|2001:db8::abc::/64 | |eth2 | V | !NH | !NH |
|2001:db8:0a::/64 | |eth3 | V | !NH | !NH |
+--------------------------+--------------------+----------+-----+------+------+
|2001:db8::1ffe:0:0:0/112 | |eth2 | - | V | V |
|2001:db8::fd9a:0:1:0/112 | |eth3 | - | V | V |
+--------------------------+--------------------+----------+-----+------+------+
V - Route exists on the gateway and matches management information (if defined on the management).
- - Route does not exist on the gateway.
N/A - Fetching Virtual Device configuration from the gateway failed.
!NH - Route exists on the gateway, but there is a Next Hop mismatch.
Note: Routes can be created automatically on the gateways by the Operating System.
Therefore, routes that appear on all gateways, but are not defined on the management,
do not necessarily indicate a problem.
[Expert@MGMT:0]#
vsx_util vsls
Description
Shows the configuration menu for Virtual System Load Sharing - status, redistribute, export, and import of
configuration.
Syntax
vsx_util vsls
Required Input
n The applicable VSX Cluster object.
n The applicable redistribution option.
Comments
n Execute the command and follow the instructions on the screen.
n If the command output shows "Operation not allowed. Object is not a Virtual
System Load Sharing cluster.", then run the "vsx_util convert_cluster" on page 1695
command.
Example
vsx_provisioning_tool
This section describes the VSX Provisioning Tool (the vsx_provisioning_tool command).
Description
This tool allows the VSX administrator to add and remove Virtual Devices (Virtual Systems, Virtual Routers,
Virtual Switches), interfaces and routes from the command line of a Security Management Server or
Domain Management Server.
This allows the automation of the required VSX Provisioning operations in the environment.
Syntax
vsx_provisioning_tool -h
Parameters
Parameter Description
-s <Mgmt Specifies the Security Management Server or the applicable Domain Management
Server> Server.
Enter the IPv4 or IPv6 address, or the resolvable hostname name.
This parameter is mandatory when you run the utility:
n From a SmartConsole computer
n On a Multi-Domain Server.
-c < Specifies the path and the name for the Management Server administrator's
Certificate certificate file.
>
Parameter Description
-f <Input Specifies the path and the name for the file with the commands to execute.
File>
The utility treats all text begins with a hash sign (#) as a comment and ignores it.
This lets you add comments on separate lines, or in-line.
-l <Line> Specifies the line number in <Input File>, from which to start to execute the
commands.
You can use this "-l" parameter only together with the "-f" parameter.
-a Specifies that before the utility executes the specified commands, it must make sure
it can connect to all VSX Gateways.
Note - This does not guarantee that a VSX Gateway can successfully
apply all the specified commands.
Exit Codes
Exit
Description
Code
0 The utility successfully applied all changes, on all VSX Cluster Members.
1 The utility successfully applied all changes to the management database, but not to all VSX
Cluster Members.
2 The utility successfully applied all changes, but SIC communication failed to establish with at
least one VSX Cluster Member.
3 Connectivity test failed with at least one VSX Cluster Member (if you used the "-a"
parameter).
The utility did not apply changes to the management database, or to the VSX Cluster
Member.
4 The utility failed to apply changes (due to internal error, syntax error, or another reason).
Note - If commands are executed from a file with multiple transactions, the exit code
refers to the last transaction processed.
Example 1
Run the utility on the Security Management Server.
Execute the commands from the text /var/log/vsx.txt file.
Example 2
Run the utility on the Multi-Domain Server in the context of the Domain Management Server called
MyDomain.
Create a new Virtual System object called VS1 on the VSX Cluster object called VSXCluster1
In the new Virtual System object, on the interface eth4, add a VLAN interface with VLAN ID 100 and IPv4
address 1.1.1.1/24.
mdsenv MyDomain
vsx_provisioning_tool -s localhost -u admin -p mypassword -o add vd name VS1 vsx VSXCluster1, add interface name eth4.100 ip
1.1.1.1/24
Transactions
Notes:
n A transaction is a set of operations performed on one Virtual Device.
n The utility commits all operations to the management database together when
the transaction ends.
If the transaction fails, the utility discards all its commands.
n You must specify the name of the Virtual Device with a parameter in the first
command.
You do not need to specify this name again in other commands of the same
transaction.
n You cannot send operations to different Virtual Devices in one transaction.
n You cannot start a new transaction until you exit the one before.
n When you send commands with the "-o" parameter, you can enter multiple
commands (for example: add a Virtual System and then add interfaces and
routes to it).
Separate the commands with a comma ( , ).
All the commands are one transaction.
The "-o" parameter does not support explicit transaction commands.
n When you send commands with the "-f" parameter, you can use explicit
transaction commands (see "vsx_provisioning_tool Commands" on page 1713).
n Commands from a file can be one or more transactions:
l If not inside a transaction, the current line is one transaction, which the
utility automatically commits.
You can write multiple commands in one line (as one transaction),
separated with a comma ( , ).
l If currently inside a transaction, the utility processes the lines, but does
not take action until the transaction ends.
vsx_provisioning_tool Commands
All vsx_provisioning_tool commands are pairs of a key and a value.
The first two words in each command must appear in the correct order.
Other pairs can be written in any order.
Note - SIC with the Virtual System is established automatically. If it fails, operations
continue, and the transaction returns error code 2.
Description
This command lets you add a new VSX Gateway object.
Syntax
add vsx type gateway name <Object Name> version <Version> main_ip
<Main IPv4 Address> main_ip6 <Main IPv6 Address> sic_otp <Activation
Key> [rule_snmp {enable|disable}] [rule_ssh {enable|disable}] [rule_
ping {enable|disable} [rule_ping6 {enable|disable}] [rule_https
{enable|disable}] [rule_drop {enable|disable}]
Note - In this transaction, you can only add the set physical interface command.
Parameters
type gateway You must use the value "gateway" to add a new VSX
Gateway object.
name <Object Object name Specifies the name of the VSX Gateway object.
Name>
You cannot use spaces of Check Point reserved words.
version Check Point Specifies the Check Point version of the VSX Gateway
<Version> version object.
You must enter the exact version as appears in
SmartConsole (case-sensitive).
main_ip <Main IPv4 Address Specifies the main IPv4 Address of the VSX Gateway
IPv4 Address> object.
main_ip6 <Main IPv6 Address Specifies the main IPv6 Address of the VSX Gateway
IPv6 Address> object.
sic_otp SIC password You must enter the same Activation Key you entered
<Activation Key> during the First Time Configuration Wizard of the VSX
Gateway.
rule_snmp n enable Controls how to process all SNMP packets sent to the VSX
{enable | Gateway:
n disable
disable}
n enable - Allows all SNMP packets
n disable - Drops all SNMP packets (default)
rule_ssh n enable Controls how to process all SSH packets sent to the VSX
{enable | Gateway:
n disable
disable}
n enable - Allows all SSH packets
n disable - Drops all SSH packets (default)
rule_ping n enable Controls how to process all ICMP Echo Request (ping)
{enable | packets sent to the VSX Gateway:
n disable
disable}
n enable - Allows all IPv4 ping packets
n disable - Drops all IPv4 ping packets (default)
rule_ping6 n enable Controls how to process all ICMPv6 Echo Request (ping)
{enable | packets sent to the VSX Gateway:
n disable
disable}
n enable - Allows all IPv6 ping packets
n disable - Drops all IPv6 ping packets (default)
rule_https n enable Controls how to process all HTTPS packets sent to the
{enable | VSX Gateway:
n disable
disable}
n enable - Allows all HTTPS packets
n disable - Drops all HTTPS packets (default)
rule_drop n enable Controls how to process all packets (other than SNMP,
{enable | SSH, ICMP, ICMPv6, HTTPS) sent to the VSX Gateway:
n disable
disable}
n enable - Drops all other packets (default)
n disable - Allows all other packets
Example
vsx_provisioning_tool -s localhost -u admin -p mypassword -o add vsx name VSX_GW1 type gateway main_ip 192.168.20.1 version
R80.40 sic_otp ABCDEFG rule_ssh enable rule_ping enable
Description
This command lets you add a new VSX Cluster object.
Syntax
add vsx type cluster name <Object Name> version <Version> main_ip
<Main Virtual IPv4 Address> main_ip6 <Main Virtual IPv6 Address>
cluster_type {vsls|ha|crbm} sync_if_name <Sync Interface Name> sync_
netmask <Sync Interface Netmask> [rule_snmp {enable|disable}] [rule_
snmp {enable|disable}] [rule_ssh {enable|disable}] [rule_ping
{enable|disable} [rule_ping6 {enable|disable}] [rule_http
{enable|disable}] [rule_drop {enable|disable}]
Important - You must run the "add vsx_member" command for each VSX Cluster
Member in the same transaction as the "add vsx" command.
Parameters
type cluster You must use the value "cluster" to add a new
cluster object.
name <Object Object name Specifies the name of the VSX Cluster object.
Name>
You cannot use spaces of Check Point reserved
words.
version <Version> Check Point Specifies the Check Point version of the VSX Cluster
version object.
You must enter the exact version as appears in
SmartConsole (case-sensitive).
main_ip <Main IPv4 Address Specifies the main IPv4 Virtual Address of the VSX
Virtual IPv4 Cluster object.
Address>
main_ip6 <Main IPv6 Address Specifies the main IPv6 Virtual Address of the VSX
Virtual IPv6 Cluster object.
Address>
rule_snmp {enable n enable Controls how to process all SNMP packets sent to the
| disable} VSX Cluster Members:
n disable
n enable - Allows all SNMP packets
n disable - Drops all SNMP packets (default)
rule_ssh {enable n enable Controls how to process all SSH packets sent to the
| disable} VSX Cluster Members:
n disable
n enable - Allows all SSH packets
n disable - Drops all SSH packets (default)
rule_ping {enable n enable Controls how to process all ICMP Echo Request (ping)
| disable} packets sent to the VSX Cluster Members:
n disable
n enable - Allows all IPv4 ping packets
n disable - Drops all IPv4 ping packets (default)
rule_https n enable Controls how to process all HTTPS packets sent to the
{enable | VSX Cluster Members:
n disable
disable}
n enable - Allows all HTTPS packets
n disable - Drops all HTTPS packets (default)
rule_drop {enable n enable Controls how to process all packets (other than SNMP,
| disable} SSH, ICMP, ICMPv6, HTTPS) sent to the VSX Cluster
n disable Members:
n enable - Drops all other packets (default)
n disable - Allows all other packets
Example
vsx_provisioning_tool -s localhost -u admin -p mypassword -o add vsx name VSX1 type cluster cluster_type vsls main_ip 192.168.1.1
version R80.40 sync_if_name eth3 sync_netmask 255.255.255.0 rule_ssh enable rule_ping enable
Description
This command lets you add a new Virtual Device object:
n Virtual System
n Virtual System in Bridge Mode
n Virtual Switch
n Virtual Router
Syntax
add vd name <Device Object Name> vsx <VSX GW or Cluster Object Name>
[type {vs|vsbm|vsw|vr}] [vs_mtu <MTU>] [instances <Number of IPv4
CoreXL Firewall instances>] [instances6 <Number of IPv6 CoreXL
Firewall instances>] [main_ip <Main IPv4 Address>] [main_ip6 <Main
IPv6 Address>] [calc_topo_auto {true | false}]
Parameters
name <Device Object Object name Specifies the name of the Virtual Device object.
Name>
Mandatory parameter, if this is the first
command in a transaction.
vsx <VSX GW or Cluster Parent object Specifies the name of the applicable VSX
Object Name> name Gateway or VSX Cluster object, in which you
create this Virtual Device.
You cannot use spaces or Check Point reserved
words.
Mandatory parameter.
type {vs | vsbm | vsw | Type of Specifies the type of the Virtual Device:
vr} Virtual
Device n vs - Virtual System (default)
n vsbm - Virtual System in Bridge Mode
n vsw - Virtual Switch
n vr - Virtual Router
vs_mtu <MTU> Integer Specifies the Global MTU value for all interfaces.
This parameter is applicable only for a:
n Virtual System in Bridge Mode (type
vsbm)
n Virtual Switch (type vsw)
main_ip <Main IPv4 IPv4 Address Specifies the main IPv4 Address of the Virtual
Address> Device object.
This parameter is applicable only for a:
n Virtual System (type vs)
n Virtual Router (type vr)
main_ip6 <Main IPv6 IPv6 Address Specifies the main IPv6 Address of the Virtual
Address> Device object.
This parameter is applicable only for a:
n Virtual System (type vs)
n Virtual Router (type vr)
Example
vsx_provisioning_tool -s localhost -u admin -p mypassword -o add vd name VirtSwitch1 vsx VSX_GW1 type vsw
Description
This command lets you delete a Virtual Device object:
n Virtual System
n Virtual System in Bridge Mode
n Virtual Switch
n Virtual Router
You cannot delete a Virtual Device if:
n It is referenced by a policy rule.
n It is referenced by other objects.
n It is enabled for global use in a Multi-Domain Security Management environment.
Important - After you delete a Virtual Device, you cannot have more commands in the
same transaction.
Syntax
Parameters
name <Device Object Object Specifies the name of the Virtual Device object.
Name> name
Mandatory parameter, if this is the first command in a
transaction.
Example
vsx_provisioning_tool -s localhost -u admin -p mypassword -o remove vd name VirtSwitch1
Description
This command lets you modify settings of an existing Virtual Device object:
n Virtual System
n Virtual System in Bridge Mode
n Virtual Switch
n Virtual Router
Syntax
Parameters
name <Device Object Name> Object name Specifies the name of the Virtual Device
object.
Mandatory parameter, if this is the first
command in a transaction.
vs_mtu <MTU> Integer Specifies the Global MTU value for all
interfaces.
This parameter is applicable only for a:
n Virtual System in Bridge Mode
n Virtual Switch
Default is 1500 bytes.
main_ip <Main IPv4 Address> IPv4 Address Specifies the main IPv4 Address of the
Virtual Device object.
This parameter is applicable only for a:
n Virtual System
n Virtual Router
main_ip6 <Main IPv6 IPv6 Address Specifies the main IPv6 Address of the
Address> Virtual Device object.
This parameter is applicable only for a:
n Virtual System
n Virtual Router
Example
vsx_provisioning_tool -s localhost -u admin -p mypassword -o set vd name VS1 instances 8 main_ip 192.0.2.6 calc_topo_auto false
Description
This command lets you add an interface to an existing Virtual Device object:
n Virtual System
n Virtual System in Bridge Mode
n Virtual Switch
n Virtual Router
Syntax
Parameters
vd <Device Object name Specifies the name of the Virtual Device object.
Object Name>
Mandatory parameter, if this is the first command in a
transaction.
name Interface name Specifies the name of the physical or VLAN interface.
<Interface>
Note - You must use the "name" or "leads_
to" parameter, but not both.
leads_to <VSW Object name Specifies the name of the Virtual Switch or Virtual Router
or VR Object object, to which this interface connects.
Name>
This parameter is applicable only for a Virtual System.
n Virtual System
n Virtual System in Bridge Mode
n Virtual Router
mtu <MTU> Integer Specifies the MTU value for this interface.
Default is 1500 bytes.
This parameter is applicable only for a:
n Virtual System
n Virtual Router
Example - Add VLAN interface eth4.100 with IPv4 1.1.1.1/24 to the Virtual System 'VirtSystem1'
vsx_provisioning_tool-s localhost -u admin -p mypassword -o add interface vd VirtSystem1 name eth4.100 ip 1.1.1.1/24
Description
This command lets you remove an interface from an existing Virtual Device object:
n Virtual System
n Virtual System in Bridge Mode
n Virtual Switch
n Virtual Router
Important - If the interface you remove leads to a Virtual Router, all routes through that
interface are removed automatically.
Note - If there are routes that have a next-hop IP address, which would become
inaccessible without this interface, the transaction fails.
Syntax
Parameters
vd <Device Object Object Specifies the name of the Virtual Device object.
Name> name
Mandatory parameter, if this is the first command in a
transaction.
name <Interface> Interface Specifies the name of the physical or VLAN interface.
name
Note - You must use the "name" or "leads_to"
parameter, but not both.
leads_to <VSW or VR Object Specifies the name of the Virtual Switch or Virtual Router
Object Name> name object, to which this interface connects.
This parameter is applicable only for a Virtual System.
Example
vsx_provisioning_tool -s localhost -u admin -p mypassword -o remove interface vd VS1 name eth4.100
Description
This command lets you modify the settings of an interface that belongs to an existing Virtual Device object:
n Virtual System
n Virtual System in Bridge Mode
n Virtual Switch
n Virtual Router
Syntax
Parameters
vd <Device Object Name> Object name Specifies the name of the Virtual Device
object.
Mandatory parameter, if this is the first
command in a transaction.
name <Interface> Interface name Specifies the name of the physical or VLAN
interface.
new_name <Interface> Interface name You can change the name, but not the type
of interface.
leads_to <VSW or VR Object name Specifies the name of the Virtual Switch or
Object Name> Virtual Router object, to which this
interface connects.
This parameter is applicable only for a
Virtual System.
new_leads_to <VSW or VR Object name You can where the interface leads:
Object Name>
n You can change an interface that
leads to a Virtual Switch only to lead
to a different Virtual Switch.
n You can change an interface that
leads to a Virtual Router only to lead
to a different Virtual Router.
propagate {true | false} n true Controls how to propagate the IPv4 routes
to adjacent Virtual Devices:
n false
n true - Propagate the IPv4 routes
n false - Do not propagate the IPv4
routes (default)
mtu <MTU> Integer Specifies the MTU value for this interface.
Default is 1500 bytes.
This parameter is applicable only for:
n Virtual System
n Virtual Router
Example - On a Virtual System VS1, change the VLAN interface eth4.10 to the physical interface eth5
vsx_provisioning_tool -s localhost -u admin -p mypassword -o set interface vd VS1 name eth4.100 new_name eth5 propagate true
topology internal_specific specific_group NYGWs
Adding a Route
Description
This command lets you add an IPv4 or IPv6 route to an existing Virtual System or Virtual Router object.
Syntax
Parameters
vd <Device Object Object name Specifies the name of the Virtual System or Virtual Router
Name> object.
Mandatory parameter, if this is the first command in a
transaction.
next_hop <Next Hop IP Address Specifies the IP address of the next hop of the route.
IP Address>
Notes:
n This IP address must be on a subnet of
an existing interface.
n You must use the "next_hop" or
"leads_to" parameter, but not both.
leads_to <VS or VR Object name Specifies the name of the Virtual System or Virtual Router
Object Name> object, which is the next hop for the configured route.
Example - Add route on a Virtual System VS1 that uses the default IPv4 route as a destination and Virtual
Router VR3 as a next hop
vsx_provisioning_tool -s localhost -u admin -p mypassword -o add route vd VS1 destination default leads_to VR3
Removing a Route
Description
This command lets you remove an IPv4 or IPv6 route from an existing Virtual System or Virtual Router
object.
Syntax
Parameters
vd <Device Object Object Specifies the name of the Virtual System or Virtual Router
Name> name object.
Mandatory parameter, if this is the first command in a
transaction.
Example - Remove a route from a Virtual System VS1 that uses the default IPv6 route as a destination
vsx_provisioning_tool -s localhost -u admin -p mypassword -o remove route vd VS1 destination default6
Description
This command lets you show the information about an existing Virtual Device object.
Syntax
Parameters
vd <Device Object Name of the Virtual Specifies the name of the Virtual Device
Name> Device object.
Mandatory parameter.
Comments
n The command shows only non-automatic routes.
n The command does not show routes that are created automatically with route propagation.
n For a Virtual Router and Virtual Switch: The command does not show the wrpj interfaces (created
automatically) that connect to Virtual Systems.
Script Examples
Note - Line numbers in the left column are written only to make it easier to read the
script examples.
Example 1
Create a Virtual System connected to a Virtual Router.
Add a default route on the Virtual System that routes the traffic to the Virtual Router.
Add applicable routes on the Virtual Router to route the traffic to the Virtual System.
Line Command
1 transaction begin
4 transaction end
5 transaction begin
8 transaction end
9 transaction begin
15 transaction end
Example 2
Create a Virtual System connected to a Virtual Switch, with manual topology.
Line Command
1 transaction begin
4 transaction end
5 transaction begin
11 transaction end
Example 3
Add CoreXL Firewall instances to the Virtual System made in the last example.
Turn on automatic calculation of topology.
Change the name of the internal interface, and decrease its MTU.
Line Command
1 transaction begin
4 transaction end
QoS Commands
For more information about QoS, see the R80.40 QoS Administration Guide.
etmstart
Description
Starts the QoS Software Blade on the Security Gateway - starts the QoS daemon fgd50, and fetches the
QoS policy from the Management Servers configured in the $FWDIR/conf/masters file on the Security
Gateway.
For more information, see:
n R80.40 QoS Administration Guide
n sk41585: How to control and debug FloodGate-1 (QoS)
Syntax
etmstart
Example
[Expert@MyGW:0]# etmstart
FloodGate-1: Starting fgd50
eth0(inbound), eth0(outbound).
Download OK.
Done.
FloodGate-1 started
[Expert@MyGW:0]#
etmstop
Description
Stops the QoS Software Blade on the Security Gateway - kills the QoS daemon fgd50 and then unloads
the QoS policy.
For more information, see:
n R80.40 QoS Administration Guide
n sk41585: How to control and debug FloodGate-1 (QoS)
Syntax
etmstop
Example
[Expert@CXL1_192.168.3.52:0]# etmstop
Unloading QoS Policy:
Target(s): CXL1_192.168.3.52
CXL1_192.168.3.52: QoS policy unloaded successfully.
Done.
FloodGate-1 stopped
[Expert@CXL1_192.168.3.52:0]#
fgate
This section describes:
Description
Installs and uninstalls the QoS policy on the managed Security Gateways.
Shows the status of the QoS Software Blade on the managed Security Gateways.
For more information, see:
n R80.40 QoS Administration Guide
n sk41585: How to control and debug FloodGate-1 (QoS)
Syntax
fgate [-d]
load <Name of QoS Policy>.F <GW1> <GW2> ... <GWN>
stat
-h
<GW1> <GW2> ... <GWN>
unload <GW1> <GW2> ... <GWN>
ver
Parameters
Parameter Description
Parameter Description
Notes:
n The maximal supported length of the <Name of
QoS Policy> string is 32 characters.
n To specify a Security Gateway, enter the main IP
address of the name of its object as configured in
SmartConsole. You can specify several Security
Gateways or cluster members in the same
command.
stat <GW1> <GW2> ... Shows the status of the QoS Software Blade and policy on the
<GWN> managed Security Gateways.
unload <GW1> <GW2> Uninstalls the QoS Policy from the specified Security Gateways
... <GWN> <GW1> <GW2> ... <GWN>.
Examples
Example 1 - Installing the QoS policy on one Security Gateway specified by its IP
address
[Expert@MGMT:0]# fgate load MyPolicy.F 192.168.3.52
QoS rules verified OK!
Downloading QoS Policy: MyPolicy.F...
Target(s): MyGW
MyGW: QoS policy transferred to module: MyGW.
MyGW: QoS policy installed succesfully.
Done.
[Expert@MGMT:0]#
Example 2 - Installing the QoS policy on two cluster members specified by their object
names
[Expert@MGMT:0]# fgate load MyPolicy.F MyClusterMember1 MyClusterMember2
QoS rules verified OK!
Downloading QoS Policy: MyPolicy.F...
MyClusterMember1: QoS policy transferred to module: MyClusterMember1.
MyClusterMember1: QoS policy installed succesfully.
MyClusterMember2: QoS policy transferred to module: MyClusterMember2.
MyClusterMember2: QoS policy installed succesfully.
Done.
[Expert@MGMT:0]#
Example 3 - Viewing the QoS status on one Security Gateway specified by its object
name
[Expert@MGMT:0]# fgate stat MyGW
Interface table
----------------------------------------------------------------
|Name|Dir|Limit (Bps)|Avg Rate (Bps)|Conns|Pend pkts|Pend bytes|
----------------------------------------------------------------
|eth0|in | 1250000000| 0| 0| 0| 0|
|eth0|out| 1250000000| 0| 0| 0| 0|
----------------------------------------------------------------
[Expert@MGMT:0]#
Description
Installs and uninstalls the QoS policy on the managed Security Gateways.
Shows the status of the QoS Software Blade on the managed Security Gateways.
Controls the QoS debug.
For more information, see:
n R80.40 QoS Administration Guide
n sk41585: How to control and debug FloodGate-1 (QoS)
Syntax
fgate [-d]
ctl
-h
<QoS Module> {on | off}
debug
on
off
fetch
-f
<Management Server>
kill [-t <Signal Number>] <Name of QoS Process>
load
log
on
off
stat
stat [-h]
ver [-k]
unload
Parameters
Parameter Description
ctl -h Shows the expected syntax and the list of the available QoS
modules.
debug {on | off} Controls the debug mode of the QoS user space daemon
fgd50 (see sk41585):
n on - Enables the debug
n off - Disables the debug (default)
This sends additional debugging information to the fgd50
daemon's log file $FGDIR/log/fgd.elg.
fetch -f Fetches and installs the QoS Policy from all the Management
Servers configured in the $FWDIR/conf/masters file.
fetch <Management Fetches and installs the QoS Policy from the specified
Server> Management Server.
Enter the main IP address or the name of the Management
Server object as configured in SmartConsole.
Parameter Description
kill [-t <Signal Sends the specified signal to the specified QoS user space
Number>] <Name of QoS process.
Process>
Notes:
n In R80.40, the only available QoS user space
process is fgd50.
n The QoS fgd50 daemon, upon its startup,
writes the PIDs of the applicable QoS user
spaces processes to the
$FWDIR/tmp/<Name of QoS
Process>.pid files.
For example: $FWDIR/tmp/fgd50.pid
n If the file $FWDIR/tmp/<Name of QoS
Process>.pid exists, then this command
sends the specified Signal Number to the PID
in that file.
n If you do not specify the signal explicitly, the
command sends Signal 15 (SIGTERM).
n For the list of available signals and their
numbers, run the kill -l command. For
information about the signals, see the manual
pages for the kill and signal.
n To restart the QoS fgd50 daemon manually,
run the "etmstop" on page 1745 and then
"etmstart" on page 1744 commands.
log {on | off | stat} Controls the state of QoS logging in the Security Gateway
kernel:
n on - Enables the QoS logging (default)
n off - Disables the QoS logging
n stat - Shows the current QoS logging status
You can disable the QoS logging to save resources without
reinstalling the QoS policy.
Parameter Description
stat [-h] Shows the status of the QoS Software Blade and policy on the
Security Gateway.
The -h parameter shows the built-in usage for the "stat"
parameter.
Examples
eth0(inbound), eth0(outbound).
Download OK.
Done.
[Expert@MyGW]#
Example 2 - Fetching the QoS policy from the Management Server specified by its IP
address
[Expert@MyGW]# fgate fetch 192.168.3.240
Fetching QoS Software Blade Policy:
Received Policy. Downloading...
eth0(inbound), eth0(outbound).
Download OK.
Done.
[Expert@MyGW]#
Interface table
----------------------------------------------------------------
|Name|Dir|Limit (Bps)|Avg Rate (Bps)|Conns|Pend pkts|Pend bytes|
----------------------------------------------------------------
|eth0|in | 1250000000| 0| 0| 0| 0|
|eth0|out| 1250000000| 0| 0| 0| 0|
----------------------------------------------------------------
[Expert@MyGW]#
IPS Commands
For more information about IPS, see the R80.40 Threat Prevention Administration Guide.
IPS commands let you configure and show the IPS on the Security Gateway without installing a new policy.
Important - Changes in the IPS configuration made with these commands are not persistent. If you install a
policy or restart the Security Gateway, the changes are deleted.
ips
Description
Shows various information about the IPS Software Blade.
Controls the IPS Software Blade.
Syntax
ips
bypass <options>
debug <options>
off
on
pmstats <options>
refreshcap
stat
stats <options>
Parameters
Parameter Description
Parameter Description
stats <options> Shows statistics for the IPS performance and Pattern Matcher.
See "ips stats" on page 1765.
ips bypass
Description
Controls the IPS Bypass mode:
n When CPU and/or Memory utilization reaches the configured higher threshold, IPS Software Blade
disables itself.
n When CPU and/or Memory utilization goes down to the configured lower threshold, IPS Software
Blade enables itself.
Syntax
ips bypass
off
on
set <options>
stat
Parameters
Parameter Description
Parameter Description
set Configures the utilization thresholds (in per cent), at which to engage (higher threshold)
< or disengage (lower threshold) the IPS Bypass mode.
options>
The available options are:
n Configure the lower CPU threshold:
Example:
ips debug
Description
Collects the IPS debug information.
Note - For information about the kernel debug, see the R80.40 Next Generation
Security Gateway Guide - Chapter Kernel Debug on Security Gateway.
Syntax
Parameters
Parameter Description
-o <Output Specifies the path and the name of the output debug file.
File>
Example
ips debug -o /var/log/IPS_debug.txt
ips off
Description
Disables the IPS Software Blade on-the-fly.
Syntax
ips off
Example 1
[Expert@MyGW:0]# ips off
IPS is disabled
Please note that for the configuration to apply for connections from existing templates, you have to run this command with -n
flag which deletes existing templates.
Without '-n', it will fully take effect in a few minutes.
[Expert@MyGW:0]#
Example 2
[Expert@MyGW:0]# ips off -n
IPS is disabled
Deleting templates
ips on
Description
Enables the IPS Software Blade on-the-fly, if it was disabled with the ""ips off" on page 1760" command.
Syntax
ips on [-n]
Example 1
[Expert@MyGW:0]# ips on
IPS is enabled
Please note that for the configuration to apply for connections from existing templates, you have to run this command with -n
flag which deletes existing templates.
Without '-n', it will fully take effect in a few minutes.
[Expert@MyGW:0]#
Example 2
[Expert@MyGW:0]# ips on -n
IPS is enabled
Deleting templates
ips pmstats
Description
Collects statistics about the IPS Pattern Matcher.
Syntax
ips pmstats
-o <Output File>
reset
Parameters
Parameter Description
-o <Output File> Specifies the path and the name of the output file.
Example
ips refreshcap
Description
After you install a new policy, the IPS Software Blade captures the first packet for each IPS protection and
saves it in the packet capture repository.
This command refreshes the packet capture repository.
The IPS designates the next packet of each IPS protection as the first packet.
The new first packet replaces the previous one in the packet capture repository.
Syntax
ips refreshcap
Example
ips stat
Description
Shows this information:
n IPS Status (Enabled or Disabled)
n IPS Update Version
n Global Detect (On or Off)
n Bypass Under Load (On or Off)
Syntax
ips stat
Example
ips stats
Description
This tool generates a report that includes both IPS and Pattern Matcher statistics.
The report can help administrators and protection writers analyze, which IPS protections or IPS
components cause performance issues.
The output files are located in the $FWDIR/ips/statistics_results/ directory.
On a Standalone, the tool creates a directory for each specified IP address.
The output files are:
File Description
ips.dbg Contains the raw report, which contains all the information.
tier1_output_file.csv Contains the statistics for the Pattern Matcher first tier.
tier2_output_file.csv Contains the statistics for the Pattern Matcher second tier.
Syntax
ips stats -h
ips stats
Important - To generate a report on a VSX Gateway, you must use the Manual Mode.
Parameters
Parameter Description
Parameter Description
Collects the IPS and Pattern Matcher statistics during the specified
number of seconds.
The output file is /ips_tar.tgz (in the root partition)
For analysis, you must copy this file to the root partition on the
Management Server.
ips stats <IP Collects the IPS and Pattern Matcher statistics for the Security
Address of Gateway> Gateway with the main specified IP address during 20 seconds.
ips stats <IP Collects the IPS and Pattern Matcher statistics for the Security
Address of Gateway> Gateway with the main specified IP address during the specified
<Seconds> number of seconds.
Related SK article
sk43733: How to measure CPU time consumed by IPS protections.
Example 1 - Collect the statistics on the Security Gateway with IP address 192.168.20.14 during 40
seconds
ips_stats 192.168.20.14 40
Example 2- Collect the statistics on the current Security Gateway during 30 seconds
ips_stats -g 30
Example - Analyze the statistics you collected from the Security Gateway with IP address 192.168.20.14
ips_stats 192.168.20.14 -m
#!/bin/bash
source /etc/profile.d/CP.sh
<Check Point commands>
[mandatory last new line]
Type Description
Important:
n In Cluster, you must see and configure the same value for the same kernel
parameter on each Cluster Member.
n In VSX Gateway, the configured values of kernel parameters apply to all existing
Virtual Systems and Virtual Routers.
Security Gateway gets the names and the default values of the kernel parameters from these kernel
module files:
n $FWDIR/modules/fw_kern_64.o
n $FWDIR/modules/fw_kern_64_v6.o
n $PPKDIR/modules/sim_kern_64.o
n $PPKDIR/modules/sim_kern_64_v6.o
Type Name
Integer fw_allow_simultaneous_ping
fw_kdprintf_limit
fw_log_bufsize
send_buf_limit
String simple_debug_filter_addr_1
simple_debug_filter_daddr_1
simple_debug_filter_vpn_1
ws_debug_ip_str
fw_lsp_pair1
Step Description
3 Get the list of the available integer kernel parameters and their values:
/var/log/fw_integer_kernel_parameters.txt
Step Description
Example:
Step Description
Example:
Example:
To make a kernel parameter configuration permanent (to survive reboot), you must edit one of the
applicable configuration files:
n For Firewall kernel parameters:
$FWDIR/boot/modules/fwkern.conf
n For VPN kernel parameters:
$FWDIR/boot/modules/vpnkern.conf
The exact instructions are provided in various SK articles in Check Point Support Center, and provided
by Check Point Support.
For more information, see sk26202: Changing the kernel global parameters for Check Point Security
Gateway.
Step Description
ls -l $FWDIR/boot/modules/fwkern.conf
ls -l $FWDIR/boot/modules/vpnkern.conf
touch $FWDIR/boot/modules/fwkern.conf
touch $FWDIR/boot/modules/vpnkern.conf
cp -v $FWDIR/boot/modules/fwkern.conf{,_BKP}
cp -v $FWDIR/boot/modules/vpnkern.conf{,_BKP}
Step Description
vi $FWDIR/boot/modules/fwkern.conf
vi $FWDIR/boot/modules/vpnkern.conf
7 Add the required Firewall kernel parameter with the assigned value in the exact format
specified below.
<Name_of_Integer_Kernel_Parameter>=<Integer_Value>
<Name_of_String_Kernel_Parameter>='<String_Text>'
or
<Name_of_String_Kernel_Parameter>="<String_Text>"
Step Description
Step Description
3 Get the list of the available integer kernel parameters and their values:
/var/log/fw_string_kernel_parameters.txt
Step Description
Example:
Step Description
or
Example:
Example:
Removing the current value from a Firewall string kernel parameter temporarily
Step Description
or
Example:
Example:
Type Name
Integer num_of_sxl_devices
sim_ipsec_dont_fragment
tcp_always_keepalive
sim_log_all_frags
simple_debug_filter_dport_1
simple_debug_filter_proto_1
String simple_debug_filter_addr_1
simple_debug_filter_daddr_2
simlinux_excluded_ifs_list
Viewing the list of the available SecureXL integer kernel parameters and their values
Step Description
3 Get the list of the available integer kernel parameters and their values:
modinfo -p $PPKDIR/boot/modules/sim_kern*.o |
sort -u | grep _type | awk 'BEGIN {FS=":"} ;
{print $1}' | xargs -n 1 fw ctl get int 1>>
/var/log/sxl_integer_kernel_parameters.txt 2>>
/var/log/sxl_integer_kernel_parameters.txt
/var/log/sxl_integer_kernel_parameters.txt
Viewing the list of the available SecureXL string kernel parameters and their values
Step Description
3 Get the list of the available integer kernel parameters and their values:
modinfo -p $PPKDIR/boot/modules/sim_kern*.o |
sort -u | grep 'string param' | awk 'BEGIN
{FS=":"} ; {print $1}' | xargs -n 1 fw ctl get
str 1>> /var/log/sxl_string_kernel_parameters.txt
2>> /var/log/sxl_string_kernel_parameters.txt
/var/log/sxl_string_kernel_parameters.txt
For more information, see sk26202: Changing the kernel global parameters for Check Point Security
Gateway.
Step Description
ls -l $PPKDIR/conf/simkern.conf
touch $PPKDIR/conf/simkern.conf
cp -v $PPKDIR/conf/simkern.conf{,_BKP}
vi $PPKDIR/conf/simkern.conf
Step Description
7 Add the required SecureXL kernel parameter with the assigned value in the exact format
specified below.
Important - This configuration file does not support space characters, tabulation
characters, and comments (lines that contain the # character).
<Name_of_SecureXL_Integer_Kernel_Parameter>=<Integer_
Value>
<Name_of_SecureXL_String_Kernel_Parameter>='<String_
Text>'
or
<Name_of_SecureXL_String_Kernel_Parameter>="<String_
Text>"