00 Kernel R80.40 2020
00 Kernel R80.40 2020
& DEBUGGING
• Debug
• Each parameter has a type description after the ‘:’ sign. This will
indicate us what kind of input it can receive: string param (text), int
param (whole numbers only) etc.
• For example, The parameter ‘accel_pm_context_simulate_job’ can
have the value ‘Hello World’ while the parameter
‘accel_pm_simulate_result_collection’ will have a whole number
value ‘1’.
• In order to read or write from / to a parameter we will use a system
call command:
• ‘ fw ctl get / set <type> <parameter name> <optional value> -a ‘
I o
The packet enters the Kernel and goes through the inbound chain (i - I)
Kernel
i O
The packet leaves the Gateway
Hardware
The packet is being forwarded to the Kernel
• And reply:
Inbound: Server -> Client
Outbound: Server -> Client
• Those links will help the firewall to identify the connection on each
of the VM chains.
• For NATed connections, additional S-Links are created (amount of
S-Links depend on NAT method and whether source / destination /
both are NATed).
• The reply entry (S-Link) of the DNS request connection will be:
• CPView Utility is a text based built-in utility that can be run ('cpview'
command) on Security Gateway / Security Management Server /
Multi-Domain Security Management Server.
• CPView Utility shows statistical data that contain both general
system information (CPU, Memory, Disk space) and information for
different Software Blades (only on Security Gateway).
• This data is also saved in history ( a few months back ) and can be
accessed at any time.
• Captures packets while they are traversing the Check Point Kernel.
• Allows tracking of packets as they go though the Chains.
• Allows to understand which specific chain is causing a potential
issue.
• Allows capturing and displaying packets going through SecureXL
or VPN.
• Compatible with WireShark.
• For each kernel / SecureXL module, there are various flags which
provide us with different information.
• For example, the ‘conn’ flag of the ‘fw’ module will provide us an
output for each packet which enters and leaves the kernel.
• Each flag adds to CPU load, some flags require low CPU usage
(like ‘drop’ flag) and some have high CPU impact (like ‘ld’ flag).
• Both Firewall and SecureXL modules can be debugged.
• All flags can be seen running the command:
# fw ctl debug –m
# fwaccel dbg
©2020 Check Point Software Technologies Ltd. 46
Debug Buffer
• Defaulting all kernel debug properties (Use before and after debug):
# fw ctl debug 0
• Define a kernel debug buffer:
# fw ctl debug -buf <buffer size>
• Check which debug flags are on:
# fw ctl debug -m <module name>
• Add the flags you want to debug on the required FW module:
# fw ctl debug -m <module name> + flag1 flag2 flag3
* Adding the flag ‘all’ will add all flags for this module
• Remove flag:
# fw ctl debug -m <module name> - flag1
©2020 Check Point Software Technologies Ltd. 49
Debug Commands