CP R80.30 GA CLI ReferenceGuide
CP R80.30 GA CLI ReferenceGuide
fw up_execute
usrchk
fw monitor
mds_backup
migrate
queryDB_util
vpn debug
fwaccel cfg
fw monitor
migrate
mds_backup
mds_restore
main command
nested subcommand 1
nested subsubcommand 1-1
nested subsubcommand 1-2
nested subcommand 2
cpwd_admin
config
-a <options>
-d <options>
-p
-r
del <options>
mgmt_cli.exe
mgmt_cli
api restart
mgmt_cli
mgmt_cli
mgmt_cli
contract_util [-d]
check <options>
cpmacro <options>
download <options>
mgmt
print <options>
summary <options>
update <options>
verify
mgmt
summary
verify
contract_util check
{-h | -help}
hfa
maj_upgrade
min_upgrade
upgrade
{-h | -help}
hfa
maj_upgrade
min_upgrade
upgrade
cp.macro cp.macro
cp.macro
{-h | -help}
-i
local
cplic contract put (on page )
uc
hfa
maj_upgrade
min_upgrade
upgrade
< >
< >
< >
< >
< >
contract_util mgmt
contract_util [-d] print
{-h | -help}
hfa
maj_upgrade
min_upgrade
upgrade
{-h | -help}
-d
hfa
maj_upgrade
min_upgrade
upgrade
contract_util summary
hfa
maj_upgrade
min_upgrade
upgrade
hfa
maj_upgrade
min_upgrade
upgrade
contract_util update
[-proxy <Proxy Server>:<Proxy Port>]
[-ca_path <Path to ca-bundle.crt File>]
update
-proxy <
>:< >
< >
< >
-ca_path <
> ca-bundle.crt
contract_util check
contract_util verify
mdsenv < >
cpca_client ...
cpca_client [-d]
create_cert <options>
double_sign <options>
get_crldp <options>
get_pubkey <options>
init_certs <options>
lscert <options>
revoke_cert <options>
revoke_non_exist_cert <options>
search <options>
set_mgmt_tool <options>
set_sign_hash <options>
-d cpca_client
create_cert
double_sign
get_crldp
get_pubkey
init_certs
lscert
revoke_cert
revoke_non_exist_cert
search
set_mgmt_tool
set_sign_hash
cpca_client [-d] create_cert [-p <CA port number>] -n "CN=<Common Name>" -f <Full
Path to PKCS12 file> [-w <Password>] [-k {SIC | USER | IKE | ADMIN_PKG}] [-c "<Comment
for Certificate>"]
-d
-p < >
-d
-p < >
-i <
>
-o <
>
[Expert@MGMT:0]#
cpca_client [-d] get_crldp [-p <CA port number>]
-d
-p < >
-d
-p < >
< >
-d
-p < >
-i < >
...CN=test1,OU=users...
<Empty Line>
...CN=test2,OU=users...
-o < >
>.failures
cpca_client [-d] lscert [-dn <SubString>] [-stat {Pending | Valid | Revoked |
Expired | Renewed}] [-kind {SIC | IKE | User | LDAP}] [-ser <Certificate Serial
Number>] [-dp <Certificate Distribution Point>]
-d
-stat {Pending |
Valid | Revoked |
Expired | Renewed}
-ser <
>
-dp <
>
Subject = CN=VSX2,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Revoked Kind = SIC Serial = 5521 DP = 0
Not_Before: Sun Apr 8 14:10:01 2018 Not_After: Sat Apr 8 14:10:01 2023
Subject = CN=VSX1,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Revoked Kind = SIC Serial = 9113 DP = 0
Not_Before: Sun Apr 8 14:09:02 2018 Not_After: Sat Apr 8 14:09:02 2023
-d
-p < >
-n "CN=<
>" cpca_client lscert
Subject =
,O=...
-n
-s
-s <
> cpca_client lscert
-s
-n
-d cpca_client
-i <
> cpca_client lscert
Subject = CN=cp_mgmt,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 30287 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
<Empty Line>
Subject = CN=cp_mgmt,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 60870 DP = 0
Not_Before: Sat Apr 7 19:40:13 2018 Not_After: Fri Apr 7 19:40:13 2023
-d
< >
-stat {Pending |
Valid | Revoked |
Expired | Renewed}
-stat Status1 Status2 Status3
-max <
>
-showfp {y | n}
y
n
Subject = CN=192.168.3.51,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 73455 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
Fingerprint = XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX
Thumbprint = xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx
[Expert@MGMT:0]#
Subject = CN=192.168.3.51,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 73455 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
[Expert@MGMT:0]#
cpca_client [-d] set_mgmt_tool {on | off | add | remove | clean | print} [-p <CA
port number>] {[-a <Administrator DN>] | [-u <User DN>] | [-c <Custom User DN>]}
-d
on
off
add
remove
clean
-p < >
-a < >
-a "CN=ICA_Tool_Admin,OU=users,O=MGMT.s6t98x"
-u < >
-u "CN=ICA_Tool_User,OU=users,O=MGMT.s6t98x"
-c < >
-c "CN=ICA_Tool_User,OU=users,O=MGMT.s6t98x"
cpca_client set_mgmt_tool -a
-u
cpca_client [-d] set_sign_hash {sha1 | sha256 | sha384 | sha512}
cpstop
cpstart
-d
{sha1 | sha256 |
sha384 | sha512}
-h
admin
auto
ca
client
finger
lic
snmp
cpconfig
cpconfig
cp_conf admin
-h
add [<UserName> <Password> {a | w | r}]
add -gaia [{a | w | r}]
del <UserName1> <UserName2> ...
get
-h
< >
a
w
r
add -gaia [{a | w | r}] admin
a
w
r
del
get
get -gaia
admin
[Expert@MGMT:0]# cp_conf admin add
Administrator name: admin
Administrator admin already exists.
Do you want to change Administrator's Permissions (y/n) [n] ? y
Permissions for all products (Read/[W]rite All, [R]ead Only All, [C]ustomized) c
Permission for SmartUpdate (Read/[W]rite, [R]ead Only, [N]one) w
Permission for Monitoring (Read/[W]rite, [R]ead Only, [N]one) w
cp_conf auto
-h
{enable | disable} <Product1> <Product2> ...
get all
-h
{enable | disable}
< > < > ...
get all
[Expert@MGMT:0]#
The Check Point Security Gateway will start automatically at boot time.
[Expert@MyGW:0]#
cpconfig
cp_conf ca
-h
fqdn <FQDN Name>
init
-h
< >
init
[Expert@MyMGMT:0]# hostname
MyMGMT
[Expert@MyMGMT:0]#
[Expert@MyMGMT:0]# domainname
checkpoint.com
[Expert@MyMGMT:0]#
cp_conf client
add <GUI Client>
createlist <GUI Client 1> <GUI Client 2> ...
del <GUI Client 1> <GUI Client 2> ...
get
-h
"Any"
add < >
createlist < >
< > ...
del < ><
> ...
get
cp_conf finger
-h
get
-h
get
cp_conf lic
-h
add -f <Full Path to License File>
add -m <Host> <Date> <Signature Key> <SKU/Features>
del <Signature Key>
get [-x]
-h
add -f <
>
cplic db_add
add -m < > < >
< >
< > cplic db_add
del < >
cplic del
get [-x]
-x
-d
mdsconfig
[Expert@MyMGMT:0]# cpconfig
This program will let you re-configure
your Check Point Security Management Server configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) Administrator
(3) GUI Clients
(4) SNMP Extension
(5) Random Pool
(6) Certificate Authority
(7) Certificate's Fingerprint
(8) Automatic start of Check Point Products
(9) Exit
cplic [-d]
{-h | -help}
check <options>
contract <options>
del <options>
print <options>
put <options>
cplic [-d]
{-h | -help}
del <options>
get <options>
put <options>
upgrade <options>
cplic [-d]
{-h | -help}
db_add <options>
db_print <options>
db_rm <options>
-d
{-h | -help}
{-h | -help}
-d
-p < >
fw1
mgmt
services
cvpn
etm
eps
-v < >
{-c | -count}
-t < >
{-r | -routers}
< >
{-S | -SRusers}
< >
cplic get
cplic contract -h
cplic [-d] contract
del
-h
<Service Contract ID>
put
-h
[{-o | -overwrite}] <Service Contract File>
{-h | -help}
-d
del $CPDIR/conf/cp.contract
put $CPDIR/conf/cp.contract
< >
{-o | -overwrite}
< >
cplic db_add {-h | -help}
cplic [-d] db_add -l <License File> [<Host>] [<Expiration Date>] [<Signature>]
[<SKU/Features>]
{-h | -help}
-d
-l < >
< >
< >
< >
aa6uwknDc-CE6CRtjhv-zipoVWSnm-z98N7Ck3m
< >
CPSUITE-EVAL-3DES-vNG
{-h | -help}
-d
-all
{-n | -noheader}
-x
{-t | -type}
{-a | -attached}
-all
{-h | -help}
-d
< >
cplic print -x
{-h | -help}
-d
-F < >
< >
cplic print -x
< >
cplic del {-h | -help}
cplic [-d] del <Object Name> [-F <Output File>] [-ip <Dynamic IP Address>]
<Signature>
{-h | -help}
-d
< >
-F < >
-ip <
>
< >
cplic print -x
cplic get {-h | -help}
cplic [-d] get
-all
<IP Address>
<Host Name>
{-h | -help}
-d
-all
< >
< >
MyGW
cplic get MyGW
{-h | -help}
-d
{-n | -noheader}
-x
{-t | -type]
-F < >
{-p | -preatures}
-D
{-h | -help}
-d
{-o | -overwrite}
{-c | -check-only}
{-s | -select}
-F < >
{-P | -Pre-boot}
-l < >
< >
< >
< >
< >
CPSUITE-EVAL-3DES-vNG
host
SKU/features
{-h | -help}
-d
< >
-ip
-F < >
< >
< >
< >
< >
CPSUITE-EVAL-3DES-vNG
host
SKU/features
{-h | -help}
–l < >
cplic get -all
cplic db_print -all -a
cplic get -all
cplic upgrade –l < >
cppkg
add <options>
{del | delete} <options>
get
getroot
print
setroot <options>
mdsenv
get
getroot
$SUROOT
print
<
>
[ ] /mnt/CPR80
del | delete
cppkg print
Select package:
--------------------
(0) Delete all
(1) CP1100 Gaia Embedded Check Point R77.20 R77.20
(e) Exit
You chose to delete 'CP1100 Gaia Embedded Check Point R77.20 R77.20', Is this correct? [y/n] : y
[Expert@MGMT:0]# cppkg delete "Check Point" "CP1100" "R77.20" "Gaia Embedded" "R77.20"
Package was successfully removed from the repository
[Expert@MGMT:0]#
mdsenv
cppkg get
mdsenv
cppkg getroot
cppkg print
$SUROOT
$CPDIR/tmp/.CPprofile.sh
$CPDIR/tmp/.CPprofile.csh
CPPROD_GetValue
CPPROD_SetValue
"< >"
"< >"
"< >"
dump
$CPDIR/registry/HKLM_registry.data
RegDump
cpprod_util
FwIsFirewallMgmt
FwIsLogServer FwIsStandAlone
no-parameter string-parameter integer-parameter
status-output no-output
cpprod_util
mdsenv
cprid
cpridstart
cprid
cpridstop
cprid
run_cprid_restart
cpd
cprid
cprinstall
boot <options>
cprestart <options>
cpstart <options>
cpstop <options>
delete <options>
get <options>
install <options>
revert <options>
show <options>
snapshot <options>
transfer <options>
uninstall <options>
verify <options>
cprinstall boot <Object Name>
-proc
-nopolicy
cppkg print
-boot
-backup
-skip_transfer
checkpoint
Check Point
SVNfoundation
firewall
floodgate
CP1100
VPN-1 Power/UTM
SmartPortal
[Expert@MGMT]# cprinstall install -boot MyGW "checkpoint" "firewall" "R75" "R75.20"
cprinstall
show
cprinstall show <Object Name>
cprinstall
show
cppkg print
checkpoint
Check Point
SVNfoundation
firewall
floodgate
CP1100
cprinstall verify
cprinstall get
cppkg print
-boot
checkpoint
Check Point
SVNfoundation
firewall
floodgate
CP1100
[Expert@MGMT]# cprinstall uninstall MyGW "checkpoint" "firewall" "R75.20" "R75.20"
Uninstalling firewall R75.20 from MyGW...
Info : Removing package from Check Point Gateway
Info : Product was successfully applied.
Operation Success. Please get network object data to complete the operation.
[Expert@MGMT]#
[Expert@MGMT]# cprinstall get
cppkg print
checkpoint
Check Point
SVNfoundation
firewall
floodgate
CP1100
VPN-1 Power/UTM
SmartPortal
[Expert@MGMT]# cprinstall verify MyGW "checkpoint" "SVNfoundation" "R75.20"
Verifying installation of SVNfoundation R75.20 on MyGW...
Info : Testing Check Point Gateway.
Info : Test completed successfully.
Info : Installation Verified, The product can be installed.
cpstart
cpstat [-d] [-h <Host>] [-p <Port>] [-s <SICname>] [-f <Flavor>] [-o <Polling
Interval> [-c <Count>] [-e <Period>]] <Application Flag>
-d
-h < >
< >
localhost
-p < >
-s < >
-f < >
-c < >
cpstat os -f perf -o 2
-c < >
-o < >
<
>
<
>
<
>
<
>
cpstat os -f perf -o 2 -c 2
-e < >
-o < >
-c < >
cpstat os -f perf -o 2 -c 2 -e 60
< >
os
persistency
thresholds
threshold_config
ci
https_inspection
cvpn
fw
vsx
vpn
blades
identityServer
appi
urlf
dlp
ctnt
antimalware
threat-emulation
scrub
gx
fg
ha
polsrv
ca
mg
cpsemd
cpsead
ls
PA
--------------------------------------------------------------
|Flag |Flavours |
--------------------------------------------------------------
|os |default, ifconfig, routing, routing6, |
| |memory, old_memory, cpu, disk, perf, |
| |multi_cpu, multi_disk, raidInfo, sensors, |
| |power_supply, hw_info, all, average_cpu, |
| |average_memory, statistics, updates, |
| |licensing, connectivity, vsx |
--------------------------------------------------------------
|persistency |product, TableConfig, SourceConfig |
--------------------------------------------------------------
|thresholds |default, active_thresholds, destinations, |
| |error |
--------------------------------------------------------------
|ci |default |
--------------------------------------------------------------
|https_inspection |default, hsm_status, all |
--------------------------------------------------------------
|cvpn |cvpnd, sysinfo, products, overall |
--------------------------------------------------------------
|fw |default, interfaces, policy, perf, hmem, |
| |kmem, inspect, cookies, chains, |
| |fragments, totals, totals64, ufp, http, |
| |ftp, telnet, rlogin, smtp, pop3, sync, |
| |log_connection, all |
--------------------------------------------------------------
|vsx |default, stat, traffic, conns, cpu, all, |
| |memory, cpu_usage_per_core |
--------------------------------------------------------------
|vpn |default, product, IKE, ipsec, traffic, |
| |compression, accelerator, nic, |
| |statistics, watermarks, all |
--------------------------------------------------------------
|blades |fw, ips, av, urlf, vpn, cvpn, aspm, dlp, |
| |appi, anti_bot, default, |
| |content_awareness, threat-emulation, |
| |default |
--------------------------------------------------------------
|identityServer |default, authentication, logins, ldap, |
| |components, adquery |
--------------------------------------------------------------
|appi |default, subscription_status, |
| |update_status, RAD_status, top_last_hour, |
| |top_last_day, top_last_week, |
| |top_last_month |
--------------------------------------------------------------
|urlf |default, subscription_status, |
| |update_status, RAD_status, top_last_hour, |
| |top_last_day, top_last_week, |
| |top_last_month |
--------------------------------------------------------------
|dlp |default, dlp, exchange_agents, fingerprint|
--------------------------------------------------------------
|ctnt |default |
--------------------------------------------------------------
|antimalware |default, scanned_hosts, scanned_mails, |
| |subscription_status, update_status, |
| |ab_prm_contracts, av_prm_contracts, |
| |ab_prm_contracts, av_prm_contracts |
--------------------------------------------------------------
|threat-emulation |default, general_statuses, update_status, |
| |scanned_files, malware_detected, |
| |scanned_on_cloud, malware_on_cloud, |
| |average_process_time, emulated_file_size, |
| |queue_size, peak_size, |
| |file_type_stat_file_scanned, |
| |file_type_stat_malware_detected, |
| |file_type_stat_cloud_scanned, |
| |file_type_stat_cloud_malware_scanned, |
| |file_type_stat_filter_by_analysis, |
| |file_type_stat_cache_hit_rate, |
| |file_type_stat_error_count, |
| |file_type_stat_no_resource_count, |
| |contract, downloads_information_current, |
| |downloading_file_information, |
| |queue_table, history_te_incidents, |
| |history_te_comp_hosts |
--------------------------------------------------------------
|scrub |default, subscription_status, |
| |threat_extraction_statistics |
--------------------------------------------------------------
|gx |default, contxt_create_info, |
| |contxt_delete_info, contxt_update_info, |
| |contxt_path_mng_info, GXSA_GPDU_info, |
| |contxt_initiate_info, gtpv2_create_info, |
| |gtpv2_delete_info, gtpv2_update_info, |
| |gtpv2_path_mng_info, gtpv2_cmd_info, all |
--------------------------------------------------------------
|fg |all |
--------------------------------------------------------------
|ha |default, all |
--------------------------------------------------------------
|polsrv |default, all |
--------------------------------------------------------------
|ca |default, all, cert, crl, user |
--------------------------------------------------------------
|mg |default |
--------------------------------------------------------------
|cpsemd |default |
--------------------------------------------------------------
|cpsead |default |
--------------------------------------------------------------
|ls |default |
--------------------------------------------------------------
|PA |default |
--------------------------------------------------------------
Network interfaces
--------------------------------------------------------------------------------------------------
------------------
|Name|IP |Netmask |Flags|Peer name|Remote IP|Topology|Proxy name|Slaves|Ports|IPv6
Address|IPv6 Len|
--------------------------------------------------------------------------------------------------
------------------
|eth0|192.168.30.40|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth1| 172.30.60.80|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth2| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth3| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth4| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth5| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth6| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth7| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
--------------------------------------------------------------------------------------------------
------------------
[Expert@MyGW:0]#
Interface table
---------------------------------------
|Name|Dir|Total |Accept|Deny |Log|
---------------------------------------
|eth0|in | 2393126| 32589| 2360537| 52|
|eth0|out| 33016| 33016| 0| 0|
|eth1|in | 2360350| 0| 2360350| 0|
|eth1|out| 0| 0| 0| 0|
|eth2|in | 2360350| 0| 2360350| 0|
|eth2|out| 0| 0| 0| 0|
|eth3|in | 2348704| 0| 2348704| 1|
|eth3|out| 0| 0| 0| 0|
|eth4|in | 2360350| 0| 2360350| 0|
|eth4|out| 0| 0| 0| 0|
---------------------------------------
| | |11855896| 65605|11790291| 53|
---------------------------------------
[Expert@MyGW:0]#
[Expert@MyGW:0]#
cprid cpridstop
cpstop
cpview --help
cpview_< >.cap< >
cpwd
$CPDIR/log/cpwd.elg log
cpwd_admin
cpwd_admin
config <options>
del <options>
detach <options>
exist
flist <options>
getpid <options>
kill
list <options>
monitor_list
start <options>
start_monitor
stop <options>
stop_monitor
config
del
detach
exist cpwd
flist
$CPDIR/tmp/cpwd_list_<Epoch Timestamp>.lst
getpid
kill cpwd
list
monitor_list
start
start_monitor
stop
stop_monitor
cpstop
cpwd_admin config
-h
-a <Configuration_Parameter_1>=<Value_1>
<Configuration_Parameter_2>=<Value_2> ... <Configuration_Parameter_N>=<Value_N>
-d <Configuration_Parameter_1> <Configuration_Parameter_2> ...
<Configuration_Parameter_N>
-p
-r
-h
-a
< >=<
>
< >=<
> ...
< >=<
>
-d < >
< > ... cpwd_admin config -a
< >
-p
cpwd_admin config -a
-r
default_ctx
display_ctx
CTX
cpwd_admin list APP
PID
CTX
CTX
no_limit rerun_mode=1
num_of_procs
rerun_mode
reset_startups
startup_counter
cpwd_admin list
#START
sleep_mode
sleep_timeout
sleep_timeout rerun_mode=1
stop_timeout
zero_timeout no_limit
zero_timeout
zero_timeout
timeout
$CPDIR/registry/HKLM_registry.data : (Wd_Config
("CheckPoint Repository Set"
: (SOFTWARE
: (CheckPoint
: (CPshared
:CurrentVersion (6.0)
: (6.0
... ...
: (reserved
... ...
: (Wd
: (Wd_Config
:Configuration_Parameter_1 ("[4]Value_1")
:Configuration_Parameter_2 ("[4]Value_2")
)
)
... ...
< >
cpwd_admin list APP
FWM
FWD
CPD
CPM
-ctx < >
< >
cpwd_admin list APP
FWM
FWD
CPD
CPM
-ctx < >
cpwd_admin exist
-full
APP
PID
STAT
E
T
#START
START_TIME
MON
cpwd_admin
Y
N
COMMAND
< >
cpwd_admin list APP
FWM
FWD
CPD
CPM
-ctx < >
cpstop cpstart
cpwd_admin kill
cpwd_admin list [-full]
-full
APP
PID
STAT
E
T
#START
START_TIME
MON
cpwd_admin
Y
N
COMMAND
cpwd_admin monitor_list
FWM
FWD
CPD
CPM
-ctx < >
-path "<
>"
$FWDIR/bin/fwm
/opt/CPsuite-R80.30/fw1/bin/fw
$CPDIR/bin/cpd
/opt/CPsuite-R80.30/fw1/scripts/cpm.sh"
/opt/CPshrd-R80.30/bin/cptnl
-command "<
>"
fwm
fwm mds
fwd
cpd
/opt/CPsuite-R80.30/fw1/scripts/cpm.sh -s"
/opt/CPshrd-R80.30/bin/cptnl -c
"/opt/CPuepm-R80.30/engine/conf/cptnl_srv.co
nf"
-env {inherit |
< >=< >}
inherit
-slp_timeout sleep_timeout
< >
cpwd_admin config
-retry_limit no_limit
{< > | u} cpwd_admin config
< >
u
cpwd_admin
cpwd_admin start_monitor
FWM
FWD
CPD
CPM
-ctx < >
-path "<
>"
$FWDIR/bin/fwm
/opt/CPsuite-R80.30/fw1/bin/fw
$CPDIR/bin/cpd_admin
-command "<
>"
fw kill fwm
fw kill fwd
cpd_admin stop
-env {inherit |
< >=< >}
inherit
cpwd_admin stop_monitor
dbedit -help
dbedit [-globallock] [{-local | -s <Management_Server>}] [{-u <User> | -c
<Certificate>}] [-p <Password>] [-f <File_Name> [ignore_script_failure]
[-continue_updating]] [-r "<Open_Reason_Text>"] [-d <Database_Name>] [-listen]
[-readonly] [-session]
-help
-globallock
savedb
-local
-s < >
-u < >
-s
< >
-c < >
-s
< >
-p < >
-s
< > -u < >
-f < >
ignore_script_failure
-f < >
-continue_updating
update_all
-f < >
-r "< >"
-d < >
mdsdb
-listen
-readonly
-session
dbedit
-h
dbedit> -h
-q
quit
dbedit> -q
dbedit> quit [-update_all | -noupdate]
dbedit> quit
dbedit> quit -update_all
dbedit> quit -no_update
update
dbedit> update_all
_print_set
network_objects properties
services users
dbedit> printxml network_objects my_obj
$FWDIR/conf/objects_5_0.C
chkpf_uid ({...})
query <table_name>
<attribute> '<value>'
dbedit> query users
dbedit> modify services My_Service color red
dbedit> modify network_objects MyObj comments "Created by
fwadmin with dbedit"
dbedit
-globallock
dbedit> savedb
savesession
dbedit -session
dbedit> savesession
fw [-d]
fetchlogs <options>
hastat <options>
kill <options>
log <options>
logswitch <options>
lslogs <options>
mergefiles <options>
repairlog <options>
sam <options>
sam_policy <options>
-d
fetchlogs $FWDIR/log/*.log*
$FWDIR/log/*.adtlog*
hastat
kill
log
$FWDIR/log/*.log $FWDIR/log/*.adtlog
logswitch $FWDIR/log/fw.log
$FWDIR/log/fw.adtlog
lslogs $FWDIR/log/*.log*
$FWDIR/log/*.adtlog*
mergefiles $FWDIR/log/*.log
$FWDIR/log/*.adtlog
repairlog $FWDIR/log/*.log
$FWDIR/log/*.adtlog
sam
sam_policy
samp
$FWDIR/log/*.log*
$FWDIR/log/*.adtlog*
fw [-d] fetchlogs [-f <Name of Log File 1>] [-f <Name of Log File 2>]... [-f <Name
of Log File N>] <Target>
-d
-f < >
$FWDIR/log/*.log*
$FWDIR/log/*.adtlog*
2017-0?-*.log
-f
<
< >
< >
$FWDIR/log/
$FWDIR/log/
$FWDIR/log/fw.log
$FWDIR/log/fw.adtlog
MyGW__2018-06-01_000000.log
[Expert@HostName:0]# ls $FWDIR/log/MyGW*
/opt/CPsuite-R80.30/fw1/log/MyGW__2018-06-01_000000.log
/opt/CPsuite-R80.30/fw1/log/MyGW__2018-06-01_000000.logaccount_ptr
/opt/CPsuite-R80.30/fw1/log/MyGW__2018-06-01_000000.loginitial_ptr
/opt/CPsuite-R80.30/fw1/log/MyGW__2018-06-01_000000.logptr
[Expert@HostName:0]#
[Expert@MGMT:0]# fw hastat
[Expert@Member1:0]# fw hastat
HOST NUMBER HIGH AVAILABILITY STATE MACHINE STATUS
192.168.3.52 1 active OK
[Expert@Member1:0]#
fw [-d] kill [-t <Signal Number>] <Name of Process>
-d
-t <
> kill -l
kill signal
SIGTERM
< >
fw kill fwd
$FWDIR/log/*.log
$FWDIR/log/*.adtlog
{-h | -help}
-d
script
-a
-b "< >"
"< >"
< > < >
fw log ctl
authcrypt
-e "< >"
< >
< >
-e '...' -e "..."
-e -b
-f
$FWDIR/log/fw.log
$FWDIR/log/fw.adtlog
-g
-H
-h < >
-i
-k {< > |
all}
< >
alert
mail
snmp_trap
spoof
user_alert
user_auth
all
-l
-m
initial
-f
semi
semi
raw
-n
-o
-p
-q
-S
-s "< >"
< >
< >
-s '...' -s "..."
-s -b
-t
$FWDIR/log/fw.log
$FWDIR/log/fw.adtlog
-u <
>
$FWDIR/conf/log_unification_scheme.C
-w
-x < >
-y < >
-z
-#
< >
$FWDIR/log/fw.log
MMM DD, YYYY June 11, 2018
HH:MM:SS 14:20:00
Action accept
dropreject
encrypt
decrypt
vpnroute
keyinst
authorize
deauthorize
authcrypt
ctl
Origin MyGW
IfDir <
>
<
>
InterfaceName eth0
daemon
N/A
daemon
LogId 0
Alert
alert
mail
snmp_trap
spoof
user_alert
user_auth
OriginSicName CN=MyGW,O=MyDomain_Server.check
point.com.s6t98x
inzone Local
outzone External
service_id ftp
src MyHost
dst MyFTPServer
proto tcp
sport_svc 64933
fw log -l
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>;
OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone: Local;
outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp;
UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid:
4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid:
802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table:
TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0;
UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc:
64933; ProductFamily: Network;
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw log -l -b "June 12, 2018 12:33:00" 'June 12, 2018 12:34:00'
12Jun2018 12:33:00 5 N/A 1 accept MyGW > N/A LogId: <max_null>; ContextNum:
<max_null>; OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x;
fg-1_client_in_rule_name: Default; fg-1_client_out_rule_name: Default;
fg-1_server_in_rule_name: Host Redirect; fg-1_server_out_rule_name: ;
ProductName: FG; ProductFamily: Network;
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>;
OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone: Local;
outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp;
UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid:
4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid:
802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table:
TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0;
UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc:
64933; ProductFamily: Network;
[Expert@MyGW:0]# fw log -l -x 0 -y 10
... ...
[Expert@MyGW:0]#
$FWDIR/log/fw.log
$FWDIR/log/fw.adtlog
fw [-d] logswitch
[-audit] [<Name of Switched Log>]
-h <Target> [[+ | -]<Name of Switched Log>]
-d
-audit $FWDIR/log/fw.adtlog
-h < >
<
>
<YYYY-MM-DD_HHMMSS>.log
<YYYY-MM-DD_HHMMSS>.adtlog
<Specified_Log_Name>.log
<Specified_Log_Name>.adtlog
$FWDIR/log/
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
<Gateway_Object_Name>__<Specified_Log_Name>.log
-
$FWDIR/log/
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
<Gateway_Object_Name>__<Specified_Log_Name>.log
fw fetchlogs
gzip
[Expert@MGMT:0]# fw logswitch
Log file has been switched to: 2018-06-13_182359.log
[Expert@MGMT:0]#
fw [-d] lslogs [-f <Name of Log File 1>] [-f <Name of Log File 2>] ... [-f <Name
of Log File N>] [-e] [-r] [-s {name | size | stime | etime}] [<Target>]
-d
script
-f < >
$FWDIR/log/*.log
2017-0?-*
-f
-e
Size
Creation Time
Closing Time
Log File Name
-r
-s {name | size |
stime | etime}
name
size
stime
etime
< >
< >
< >
[Expert@MGMT:0]# fw lslogs
Size Log file name
9KB 2018-06-14_000000.log
11KB 2018-06-15_000000.log
9KB 2018-06-16_000000.log
10KB 2018-06-17_000000.log
9KB fw.log
[Expert@MGMT:0]#
$FWDIR/log/fw.log
$FWDIR/log/fw.log
fw logswitch
$FWDIR/log/fw.adtlog
$FWDIR/log/fw.adtlog
fw logswitch
fw [-d] mergefiles [-s] [-r] [-t <Time Conversion File>] <Name of Log File 1> <Name
of Log File 2> ... <Name of Log File N> <Name of Merged Log File>
-d
-s
-r
-t <
>
<
<
>
-u
< >
fw repairlog -u 2018-06-17_000000.adtlog
fw sam
fw sam_policy sam_alert
fw sam
$FWDIR/log/sam.dat
<type>,<actions>,<expire>,<ipaddr>
<type>,<actions>,<expire>,<src>,<dst>,<dport>,<ip_p>
sam_blocked_ips
[Expert@HostName:0]# fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-t <Timeout>] [-l <Log Type>] [-C] [-e <key=val>]+ [-r]
-{n|i|I|j|J} <Criteria>
[Expert@HostName:0]# fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] -D
[Expert@HostName:0]# fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-r] -M -{i|j|n|b|q} all
[Expert@HostName:0]# fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-r] -M -{i|j|n|b|q} <Criteria>
-d
-v
-s < >
localhost
-S <
>
-f <
> < >
fw sam
-D -i -j -I -J -n
fw sam
-C -D
-C fw sam
fw sam -t <Timeout>
-t < >
fw sam
-l < >
nolog
short_noalert
short_alert
long_noalert
long_alert
-e < >+
name
comment
originator
-r
-n
-i
-I
-j
-J
-b
-q
-M
all
< >
service=gtp
imsi
msisdn
apn
tunl_dst
tunl_dport
tunl_proto
fw sam
sam_alert
fw sam_policy fw samp
$FWDIR/database/sam_policy.db
$FWDIR/database/sam_policy.mng
set virtual-system < >
vsenv < >
fw [-d] sam_policy
add <options>
batch
del <options>
get <options>
fw [-d] samp
add <options>
batch
del <options>
get <options>
-d
batch
del < >
fwm [-d]
dbload <options>
exportcert <options>
fetchfile <options>
fingerprint <options>
getpcap <options>
ikecrypt <options>
load [<options>]
logexport <options>
mds <options>
printcert <options>
sic_reset
snmp_trap <options>
unload [<options>]
ver [<options>]
verify <options>
-d
dbload
exportcert
fetchfile
fingerprint
getpcap
ikecrypt
load
mgmt_cli
logexport $FWDIR/log/*.log
$FWDIR/log/*.adtlog
mds
printcert
sic_reset
snmp_trap
unload
ver
verify
mdsenv < >
-d
fwm
-a
$FWDIR/conf/sys.conf
-c < >
localhost
mdsenv < >
fwm [-d] exportcert -obj <Name of Object> -cert <Name of CA> -file <Output File>
[-withroot] [-pem]
-d
fwm
< >
<
< >
-withroot
-pem
fwopsec.conf fwopsec.v4x
-d
fwm
conf/fwopsec.conf
conf/fwopsec.v4x
-d < >
< >
-d
fwm -d
fwm
fwm
fingerprint -d
< >
< >
$FWDIR/log/blob/
-d
fwm
-g < >
-u '{< >}'
-p < >
-d
fwm
fwm logexport -h
fwm [-d] logexport [{-d <Delimiter> | -s}] [-t <Table Delimiter>] [-i <Input File>]
[-o <Output File>] [{-f | -e}] [-x <Start Entry Number>] [-y <End Entry Number>]
[-z] [-n] [-p] [-a] [-u <Unification Scheme File>] [-m {initial | semi | raw}]
-d
fwm
-d < > | -s
-d < >
-s
;
-t < >
,
-i < >
$FWDIR/log/*.log
$FWDIR/log/*.adtlog
$FWDIR/log/fw.log
-o < >
-f
$FWDIR/log/fw.log
$FWDIR/log/fw.adtlog
-e
$FWDIR/log/fw.log
$FWDIR/log/fw.adtlog
-x < >
-y < >
-z
-n
-p
-a
-u <
>
$FWDIR/conf/log_unification_scheme.C
-m {initial | semi |
raw}
initial
-f
semi
semi
raw
fwm logexport
;;
fwm logexport
$FWDIR/conf/logexport.ini
[Expert@MGMT:0]# touch $FWDIR/conf/logexport.ini
$FWDIR/conf/logexport.ini
[Expert@MGMT:0]# vi $FWDIR/conf/logexport.ini
[Fields_Info]
included_fields = field1,field2,field3,<REST_OF_FIELDS>,field100
excluded_fields = field10,field11
num
<REST_OF_FIELDS>
-f <REST_OF_FIELDS>
$FWDIR/conf/logexport_default.C
-f <REST_OF_FIELDS>
included_fields excluded_fields
fwm logexport
-d
fwm
ver
rebuild_global_
communities_sta
tus all
missing
-d
fwm
-f <
>
-verbose
defaultCert:
Host Certificate (level 0):
Subject: CN=CXL_192.168.3.244 VPN Certificate,O=MGMT.checkpoint.com.s6t98x
Issuer: O=MGMT.checkpoint.com.s6t98x
Not Valid Before: Sun Jun 3 19:58:19 2018 Local Time
Not Valid After: Sat Jun 3 19:58:19 2023 Local Time
Serial No.: 85021
Public Key: RSA (2048 bits)
Signature: RSA with SHA256
Subject Alternate Names:
IP Address: 192.168.3.244
CRL distribution points:
http://192.168.3.240:18264/ICA_CRL2.crl
CN=ICA_CRL2,O=MGMT.checkpoint.com.s6t98x
Key Usage:
digitalSignature
keyEncipherment
Basic Constraint:
not CA
MD5 Fingerprint:
B1:15:C7:A8:2A:EE:D1:75:92:9F:C7:B4:B9:BE:42:1B
SHA-1 Fingerprints:
1. BC:7A:D9:E2:CD:29:D1:9E:F0:39:5A:CD:7E:A9:0B:F9:6A:A7:2B:85
2. MIRE SANK DUSK HOOD HURD RIDE TROY QUAD LOVE WOOD GRIT WITH
*****
[Expert@MGMT:0]#
defaultCert:
-d
fwm
mdsenv <
>
fwm [-d] snmp_trap [-v <SNMP OID>] [-g <Generic Trap Number>] [-s <Specific Trap
Number>] [-p <Source Port>] [-c <SNMP Community>] <Target> ["<Message>"]
-d
fwm
-v < >
-g <
>
coldStart
warmStart
linkDown
linkUp
authenticationFailure
egpNeighborLoss
enterpriseSpecific
-s <
> enterpriseSpecific
-p < >
-c < >
< >
"< >"
fwm unload
fwm unload
comp_init_policy
fw fetch
cpstart
fw unloadlocal
-d
fwm
[Expert@MGMT:0]#
-d
fwm
-f < >
-d
fwm
< >
-s < >
-o stdout
inet_alert <some
command> | inet_alert ...
-a < >
ssl_opsec
auth_opsec
clear
-p < >
-f < > < > < > < >
< >
< >
< >< >
-m < >
alert
mail
snmptrap
spoofalert
$FWDIR/conf/objects.C
value=clientquotaalert. Parameter=clientquotaalertcmd
0
102
103
104 stdin
106
107
inet_alert -s 10.0.2.4 -a clear -f product cads -m alert
cads
$FWDIR/log/ldap_pid_< >.stats
-d < >
< >
TemplateExtGrpCacheObject
cachetrace {all | UserCacheObject |
TemplateCacheObject |
TemplateExtGrpCacheObject}
all
UserCacheObject
TemplateCacheObject
TemplateExtGrpCacheObject
0
[Expert@MGMT:0]# ldapcompare [-d <Debug Level>] [<Options>] <DN> {<Attribute>
<Value> | <Attribute> <Base64 Value>}
-d
< >
< >
< >
< >
-E [!]< >[=<
>]
!dontUseCopy
-M
-MM
-P < >
-z
-D < >
-e [!]< >[=<
>]
[!]assert=< >
[!]authzid=< >
dn:< > "u:< >
[!]chaining[=<
>[/< >]]
"chainingPreferred"
"chainingRequired"
"referralsPreferred"
"referralsRequired"
[!]manageDSAit
[!]noop
ppolicy
[!]postread[=< >]
[!]preread[=< >]
[!]relax
abandon
cancel
ignore
-h < >
-H <
-I
-n
-N
-R < >
-U < >
-v
-V -VV
-w < >
-W
-x
-X < >
dn:< > u:< >
-y < >
< >
-Y < >
-Z
-ZZ
Member
MemberOf
MemberOf Both
Member
Member
MemberOf
Member
Both
ldapmemberconvert.log
-d < >
-h < >
localhost
-p < >
-D < >
-w < >
-m < >
Member
-o <
> MemberOf
-c < ObjectClass
>
<Group DN 1>
<Group DN 2>
...
<Group DN X>
-g < >
never
-M < >
-S < >
none
-T < >
never
-Z
GroupMembership
MemberOf
–M <Number of Updates>
–M
cn=cpGroup,ou=groups,ou=cp,c=us
...
cn=cpGroup
uniquemember="cn=member1,ou=people,ou=cp,c=us"
uniquemember="cn=member2,ou=people,ou=cp,c=us"
...
...
cn=member1
objectclass=fw1Person
...
...
cn=member2
objectclass=fw1Person
...
...
cn=cpGroup
...
...
cn=member1
objectclass=fw1Person
memberof="cn=cpGroup,ou=groups,ou=cp,c=us"
...
...
cn=member2
objectclass=fw1Person
memberof="cn=cpGroup,ou=groups,ou=cp,c=us"
...
–B
uniquemember="cn=template1,ou=people, ou=cp,c=us"
cn=member1
objectclass=fw1Template
-d < >
-h < >
localhost
-p < >
-D < >
-w < >
-a add
-b
-c
-F
-k
-K
-n add
-r
-v
-T < >
never
-Z
-f < >.ldif < >.ldif
-d < >
-h < >
localhost
-p < >
-D < >
-w < >
-A
-B
-b < >
-F < >
-l < >
never
-s < >
base
one
sub
-S < >
-t /tmp/
never
-u
< >
objectclass=fw1host
< >
cn=omi
fw1host
objectclass
mgmt_cli
C:\> cd /d "%ProgramFiles%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
C:\Program Files\...\PROGRAM\> mgmt_cli.exe <Command Name> <Command Parameters>
<Optional Switches>
C:\> cd /d "%ProgramFiles(x86)%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
C:\Program Files (x86)\...\PROGRAM\> mgmt_cli.exe <Command Name> <Command
Parameters> <Optional Switches>
$FWDIR/bin/upgrade_tools/
migrate
/var/log/opt/CPshrd-R80.30/migrate-<YYYY.MM.DD_HH.MM.SS>.log
$CPDIR/log/migrate-<YYYY.MM.DD_HH.MM.SS>.log
[Expert@MGMT:0]# ./migrate -h
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# yes | nohup ./migrate export [-l | -x] [-n]
[--exclude-uepm-postgres-db] [--include-uepm-msi-files] /<Full Path>/<Name of
Exported File>
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# yes | nohup ./migrate import [-l | -x] [-n]
[--exclude-uepm-postgres-db] [--include-uepm-msi-files] /<Full Path>/<Name of
Exported File>.tgz
-h
yes | nohup ./migrate ... & yes | nohup ... &
yes migrate
migrate
export
import
-l
$FWDIR/log/
-x
$FWDIR/log/
-n
cpstop
--exclude-uepm-postgres-d
b
--include-uepm-msi-files
/< >/
< >
*.tgz
*.tgz
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# ./migrate export /var/log/Migrate_Export
[Expert@MGMT:0]#
[Expert@MGMT:0]# find / -name migrate-\* -type f
/var/log/opt/CPshrd-R80.30/migrate-2018.06.14_11.03.46.log
[Expert@MGMT:0]#
[Expert@MGMT:0]# rs_db_tool [-d] -operation fetch -name <Object Name>
[Expert@MGMT:0]# rs_db_tool [-d] -operation delete -name <Object Name>
[Expert@MGMT:0]# rs_db_tool [-d] -operation list
[Expert@MGMT:0]# rs_db_tool [-d] -operation sync
-d
fw sam fw sam_policy
[Expert@MGMT:0]# sam_alert [-v] [-o] [-s <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-C] {-n|-i|-I} {-src|-dst|-any|-srv}
-v fw sam
-o
-s < >
-t < >
-f < >
-C
-n
-i
-I
-src
-dst
-any
-srv
[Expert@MGMT:0]# sam_alert -v2 [-v] [-O] [-S <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-n <Name>] [-c "<Comment">] [-o <Originator>] [-l {r | a}] -a {d | r|
n | b | q | i} [-C] {-ip |-eth} {-src|-dst|-any|-srv}
-v2
-v fw sam
-O
-S < >
-t < >
-f < >
-n < >
-c "< >"
-o < >
sam_alert
-l {r | a}
r
a
None
-a {d | r| n | b | q | i}
d
r
n
b
q
i
-C
-ip
-eth
-src
-dst
-any
-srv
[Expert@HostName:0]# mdsenv <
>
[Expert@HostName:0]# threshold_config
Default Profile
(3) Save policy
(4) Save policy to file
(7) Configure alert
destinations
(9)
(9) Configure thresholds
Thresholds Categories
----------------------
(1) Hardware
(2) High Availability
(3) Local Logging Mode Status
(4) Log Server Connectivity
(5) Networking
(6) Resources
(1) Hardware
Hardware Thresholds:
--------------------
(1) RAID volume state
(2) RAID disk state
(3) RAID disk flags
(4) Temperature sensor reading
(5) Fan speed sensor reading
(6) Voltage sensor reading
(6) Resources
Resources Thresholds:
---------------------
(1) Swap Memory Utilization
(2) Real Memory Utilization
(3) Partition free space
(4) Core Utilization
(5) Core interrupts rate
threshold_config
$FWDIR/conf/thresholds.conf
mgmt_cli.exe
mgmt_cli
api restart
mgmt_cli
mgmt_cli
mgmt_cli
cma_migrate /<Full Path>/<Name of R7x Domain Exported File>.tgz /<Full
Path>/<$FWDIR Directory of the New Domain Management Server>/
MISSING_ATTR
< >
attr
object
< >
< >
(""
__name__
cpmiquerybin
# cpmiquerybin attr "" network_objects "" -a __name__
DMZZone
WirelessZone
ExternalZone
InternalZone
AuxiliaryNet
LocalMachine_All_Interfaces
CPDShield
InternalNet
LocalMachine
DMZNet
fwm
fwm [-d]
dbload <options>
exportcert <options>
fetchfile <options>
fingerprint <options>
getpcap <options>
ikecrypt <options>
load [<options>]
logexport <options>
mds <options>
printcert <options>
sic_reset
snmp_trap <options>
unload [<options>]
ver [<options>]
verify <options>
-d
dbload
exportcert
fetchfile
fingerprint
getpcap
ikecrypt
load
mgmt_cli
logexport $FWDIR/log/*.log
$FWDIR/log/*.adtlog
mds
printcert
sic_reset
snmp_trap
unload
ver
verify
mdsenv < >
-d
fwm
-a
$FWDIR/conf/sys.conf
-c < >
localhost
mdsenv < >
fwm [-d] exportcert -obj <Name of Object> -cert <Name of CA> -file <Output File>
[-withroot] [-pem]
-d
fwm
< >
<
< >
-withroot
-pem
fwopsec.conf fwopsec.v4x
-d
fwm
conf/fwopsec.conf
conf/fwopsec.v4x
-d < >
< >
-d
fwm -d
fwm
fwm
fingerprint -d
< >
< >
$FWDIR/log/blob/
-d
fwm
-g < >
-u '{< >}'
-p < >
-d
fwm
fwm logexport -h
fwm [-d] logexport [{-d <Delimiter> | -s}] [-t <Table Delimiter>] [-i <Input File>]
[-o <Output File>] [{-f | -e}] [-x <Start Entry Number>] [-y <End Entry Number>]
[-z] [-n] [-p] [-a] [-u <Unification Scheme File>] [-m {initial | semi | raw}]
-d
fwm
-d < > | -s
-d < >
-s
;
-t < >
,
-i < >
$FWDIR/log/*.log
$FWDIR/log/*.adtlog
$FWDIR/log/fw.log
-o < >
-f
$FWDIR/log/fw.log
$FWDIR/log/fw.adtlog
-e
$FWDIR/log/fw.log
$FWDIR/log/fw.adtlog
-x < >
-y < >
-z
-n
-p
-a
-u <
>
$FWDIR/conf/log_unification_scheme.C
-m {initial | semi |
raw}
initial
-f
semi
semi
raw
fwm logexport
;;
fwm logexport
$FWDIR/conf/logexport.ini
[Expert@MGMT:0]# touch $FWDIR/conf/logexport.ini
$FWDIR/conf/logexport.ini
[Expert@MGMT:0]# vi $FWDIR/conf/logexport.ini
[Fields_Info]
included_fields = field1,field2,field3,<REST_OF_FIELDS>,field100
excluded_fields = field10,field11
num
<REST_OF_FIELDS>
-f <REST_OF_FIELDS>
$FWDIR/conf/logexport_default.C
-f <REST_OF_FIELDS>
included_fields excluded_fields
fwm logexport
-d
fwm
ver
rebuild_global_
communities_sta
tus all
missing
-d
fwm
-f <
>
-verbose
defaultCert:
Host Certificate (level 0):
Subject: CN=CXL_192.168.3.244 VPN Certificate,O=MGMT.checkpoint.com.s6t98x
Issuer: O=MGMT.checkpoint.com.s6t98x
Not Valid Before: Sun Jun 3 19:58:19 2018 Local Time
Not Valid After: Sat Jun 3 19:58:19 2023 Local Time
Serial No.: 85021
Public Key: RSA (2048 bits)
Signature: RSA with SHA256
Subject Alternate Names:
IP Address: 192.168.3.244
CRL distribution points:
http://192.168.3.240:18264/ICA_CRL2.crl
CN=ICA_CRL2,O=MGMT.checkpoint.com.s6t98x
Key Usage:
digitalSignature
keyEncipherment
Basic Constraint:
not CA
MD5 Fingerprint:
B1:15:C7:A8:2A:EE:D1:75:92:9F:C7:B4:B9:BE:42:1B
SHA-1 Fingerprints:
1. BC:7A:D9:E2:CD:29:D1:9E:F0:39:5A:CD:7E:A9:0B:F9:6A:A7:2B:85
2. MIRE SANK DUSK HOOD HURD RIDE TROY QUAD LOVE WOOD GRIT WITH
*****
[Expert@MGMT:0]#
defaultCert:
-d
fwm
mdsenv <
>
fwm [-d] snmp_trap [-v <SNMP OID>] [-g <Generic Trap Number>] [-s <Specific Trap
Number>] [-p <Source Port>] [-c <SNMP Community>] <Target> ["<Message>"]
-d
fwm
-v < >
-g <
>
coldStart
warmStart
linkDown
linkUp
authenticationFailure
egpNeighborLoss
enterpriseSpecific
-s <
> enterpriseSpecific
-p < >
-c < >
< >
"< >"
fwm unload
fwm unload
comp_init_policy
fw fetch
cpstart
fw unloadlocal
-d
fwm
[Expert@MGMT:0]#
-d
fwm
-f < >
-d
fwm
< >
[Expert@MDS:0]# mdsstat
+--------------------------------------------------------------------------------------+
| Processes status checking |
+-----+----------------+-----------------+------------+----------+----------+----------+
| Type| Name | IP address | FWM | FWD | CPD | CPCA |
+-----+----------------+-----------------+------------+----------+----------+----------+
| MDS | - | 192.168.3.51 | up 17284 | up 17266 | up 17251 | up 17753 |
+-----+----------------+-----------------+------------+----------+----------+----------+
| CMA |MyDomain_Server | 192.168.3.240 | up 32227 | up 32212 | up 25725 | up 32482 |
+-----+----------------+-----------------+------------+----------+----------+----------+
| Total Domain Management Servers checked: 1 0 up 1 down |
| Tip: Run mdsstat -h for legend |
+--------------------------------------------------------------------------------------+
[Expert@MDS:0]#
[Expert@MDS:0]# mdsenv MyDomain_Server
[Expert@MDS:0]#
[Expert@MDS:0]# mcd
changing to /opt/CPmds-R80.30/customers/MyDomain_Server/CPsuite-R80.30/fw1/
[Expert@MDS:0]#
[Expert@MDS:0]# ls -1
av
bin
conf
cpm-server
database
doc
hash
lib
libsw
log
scripts
state
tmp
[Expert@MDS:0]#
[Expert@MDS:0]# mcd av
changing to /opt/CPmds-R80.30/customers/MyDomain_Server/CPsuite-R80.30/fw1/av
[Expert@MDS:0]#
[Expert@MDS:0]# mcd bin
changing to /opt/CPmds-R80.30/customers/MyDomain_Server/CPsuite-R80.30/fw1/bin
[Expert@MDS:0]#
[Expert@MDS:0]# mcd conf
changing to /opt/CPmds-R80.30/customers/MyDomain_Server/CPsuite-R80.30/fw1/conf
[Expert@MDS:0]#
[Expert@MDS:0]# mcd log
changing to /opt/CPmds-R80.30/customers/MyDomain_Server/CPsuite-R80.30/fw1/log
[Expert@MDS:0]#
[Expert@MDS:0]# mcd scripts
changing to /opt/CPmds-R80.30/customers/MyDomain_Server/CPsuite-R80.30/fw1/scripts
[Expert@MDS:0]#
mds_backup
mds_backup
tar <timestamp>mdsbk.tar
tgz <timestamp>mdsbk.tgz
mds_backup
*.tar mds_restore
gtar gzip
mds_backup -h
mds_backup [-g -b [-d <target_directory>] -s [-v] [-l]]
-h
-g
-b
-d
< >
-s
-v
-l
mds_backup
mds_backup
/opt/CPmds-<current_release>/
mds_backup *.log
*.adtlog
$MDSDIR/conf/mds_exclude.da
log/*
mds_backup
mdscmd addadministrator < >
mdscmd adddomain < > mgmt_cli add-domain
mdscmd addlogserver < > mgmt_cli add-domain
mdscmd addmanagement < > mgmt_cli add-domain
mdscmd assign-globalpolicy < > mgmt_cli set global-assignment
mgmt_cli assign-global-assignment
<
>
mdsquerydb <key_name> [-f <output_file_name>]
< >
-f < >
# mdsquerydb
# mdsenv
# mdsquerydb Domains
# mdsenv
# mdsquerydb NetworkObjects –f /tmp/gateways.txt
# mdsenv DServer1
# mdsquerydb Gateways -f /tmp/gateways.txt
mdsstart
mdsstop
mdsstop_customer
mdsstart_customer
-m
-s
NUM_EXEC_SIMUL
NUM_EXEC_SIMUL
# export NUM_EXEC_SIMUL=<Number of Domain Management Servers>
export NUM_EXEC_SIMUL=5
NUM_EXEC_SIMUL
# echo $NUM_EXEC_SIMUL
/etc/rc.d/rc.local
# cp -v /etc/rc.d/rc.local{,_BKP}
/etc/rc.d/rc.local
# vi /etc/rc.d/rc.local
NUM_EXEC_SIMUL
# echo $NUM_EXEC_SIMUL
NUM_EXEC_SIMUL
# unset NUM_EXEC_SIMUL
NUM_EXEC_SIMUL
# echo $NUM_EXEC_SIMUL
mdsstop_customer
-h
-m
<
>
up
down
pnd
init
N/A
N/R
# mdsstat
+--------------------------------------------------------------------------------------+
| Processes status checking |
+-----+----------------+-----------------+------------+----------+----------+----------+
| Type| Name | IP address | FWM | FWD | CPD | CPCA |
+-----+----------------+-----------------+------------+----------+----------+----------+
| MDS | - | 192.168.3.101 | up 17284 | up 17266 | up 17251 | up 17753 |
+-----+----------------+-----------------+------------+----------+----------+----------+
| CMA |DOM211_Server | 192.168.3.211 | up 32227 | up 32212 | up 25725 | up 32482 |
| CMA |DOM212_Server | 192.168.3.212 | up 4248 | up 4184 | up 4094 | up 4441 |
+-----+----------------+-----------------+------------+----------+----------+----------+
| Total Domain Management Servers checked: 2 2 up 0 down |
| Tip: Run mdsstat -h for legend |
+--------------------------------------------------------------------------------------+
mdsstop_customer <IP address or Name of Domain Management Server>
mdsstart_customer
mgmt_cli
C:\> cd /d "%ProgramFiles%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
C:\Program Files\...\PROGRAM\> mgmt_cli.exe <Command Name> <Command Parameters>
<Optional Switches>
C:\> cd /d "%ProgramFiles(x86)%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
C:\Program Files (x86)\...\PROGRAM\> mgmt_cli.exe <Command Name> <Command
Parameters> <Optional Switches>
migrate_global_policies
*.pre_migrate
migrate_global_policies
migrate_global_policies
migrate_global_policies <Path>
< >
$MDSDIR/conf
[email protected]_MDS:0]# migrate_global_policies
/var/log/exported_global_db.22Jul2007-124547.tgz
[Expert@HostName:0]# mdsenv <
>
[Expert@HostName:0]# threshold_config
Default Profile
(3) Save policy
(4) Save policy to file
(7) Configure alert
destinations
(9)
(9) Configure thresholds
Thresholds Categories
----------------------
(1) Hardware
(2) High Availability
(3) Local Logging Mode Status
(4) Log Server Connectivity
(5) Networking
(6) Resources
(1) Hardware
Hardware Thresholds:
--------------------
(1) RAID volume state
(2) RAID disk state
(3) RAID disk flags
(4) Temperature sensor reading
(5) Fan speed sensor reading
(6) Voltage sensor reading
(6) Resources
Resources Thresholds:
---------------------
(1) Swap Memory Utilization
(2) Real Memory Utilization
(3) Partition free space
(4) Core Utilization
(5) Core interrupts rate
threshold_config
$FWDIR/conf/thresholds.conf
$MDSVERUTIL help
$MDSVERUTIL
AllCMAs <options>
AllVersions
CMAAddonDir <options>
CMACompDir <options>
CMAFgDir <options>
CMAFw40Dir <options>
CMAFw41Dir <options>
CMAFwConfDir <options>
CMAFwDir <options>
CMAIp <options>
CMAIp6 <options>
CMALogExporterDir <options>
CMALogIndexerDir <options>
CMANameByFwDir <options>
CMANameByIp <options>
CMARegistryDir <options>
CMAReporterDir <options>
CMASmartLogDir <options>
CMASvnConfDir <options>
CMASvnDir <options>
ConfDirVersion <options>
CpdbUpParam <options>
CPprofileDir <options>
CPVer <options>
CustomersBaseDir <options>
DiskSpaceFactor <options>
InstallationLogDir <options>
IsIPv6Enabled
IsLegalVersion <options>
IsOsSupportsIPv6
LatestVersion
MDSAddonDir <options>
MDSCompDir <options>
MDSDir <options>
MDSFgDir <options>
MDSFwbcDir <options>
MDSFwDir <options>
MDSIp <options>
MDSIp6 <options>
MDSLogExporterDir <options>
MDSLogIndexerDir <options>
MDSPkgName <options>
MDSRegistryDir <options>
MDSReporterDir <options>
MDSSmartLogDir <options>
MDSSvnDir <options>
MDSVarCompDir <options>
MDSVarDir <options>
MDSVarFwbcDir <options>
MDSVarFwDir <options>
MDSVarSvnDir <options>
MSP <options>
OfficialName <options>
OptionPack <options>
ProductName <options>
RegistryCurrentVer <options>
ShortOfficialName <options>
SmartCenterPuvUpgradeParam <options>
SP <options>
SVNPkgName <options>
SvrDirectory <options>
SvrParam <options>
help
AllVersions
$FWDIR
CMANameByIp < >
false
IsLegalVersion < >
IsOsSupportsIPv6 true
false
LatestVersion
SP < >
SVNPkgName < >
-v < >
$MDSVERUTIL AllVersions
$MDSVERUTIL IsLegalVersion
$MDSVERUTIL OfficialName
[Expert@MDS:0]# $MDSVERUTIL AllVersions
VID_92
VID_91
VID_90
VID_89
VID_88
VID_87
VID_86
VID_85
VID_84
VID_83
VID_80
VID_65
VID_62
VID_NGX_61
VID_61
VID_60
VID_541_A
VID_541
VID_54_VSX_R2
VID_54_VSX
VID_54
VID_53_VSX
VID_53
VID_52
VID_51
VID_41
[Expert@MDS:0]#
$MDSVERUTIL MDSAddonDir
-n <
>
-v < >
$MDSVERUTIL AllVersions
-n <
>
-c <
>
ls -1 $MDSDIR/customers/<
>/ | grep CMP
$MDSVERUTIL MDSFgDir
-n <
>
-v < >
$MDSVERUTIL AllVersions
-n <
>
-v < >
$MDSVERUTIL AllVersions
-n <
>
-v < >
$MDSVERUTIL AllVersions
-n <
>
-v < >
$MDSVERUTIL AllVersions
$MDSVERUTIL MDSFwDir
-n <
>
-v < >
$MDSVERUTIL AllVersions
-n <
>
-v < >
$MDSVERUTIL AllVersions
-n <
>
-v < >
$MDSVERUTIL AllVersions
$EXPORTERDIR
$MDSVERUTIL MDSLogExporterDir
-n <
>
-v < >
$MDSVERUTIL AllVersions
$MDSVERUTIL MDSLogIndexerDir
-n <
>
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
-i <
>
-v < >
$MDSVERUTIL AllVersions
$MDSVERUTIL MDSRegistryDir
-n <
-v < >
$MDSVERUTIL AllVersions
$MDSVERUTIL MDSReporterDir
-n <
>
-v < >
$MDSVERUTIL AllVersions
$MDSVERUTIL MDSSmartLogDir
-n <
>
-v < >
$MDSVERUTIL AllVersions
-n <
>
-v < >
$MDSVERUTIL AllVersions
$MDSVERUTIL MDSSvnDir
$MDSVERUTIL MDSVarSvnDir
-n <
>
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
$MDSVERUTIL IsIPv6Enabled
$MDSVERUTIL IsLegalVersion -v <Version_ID>
-v < >
$MDSVERUTIL AllVersions
$MDSVERUTIL IsOsSupportsIPv6
$MDSVERUTIL LatestVersion
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
-c <
>
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
$MDSVERUTIL MDSVarFwbcDir
-v < >
$MDSVERUTIL AllVersions
$MDSVERUTIL MDSVarFwDir
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
$EXPORTERDIR
$MDSVERUTIL CMALogExporterDir
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
$MDSVERUTIL CMASvnDir
$MDSVERUTIL MDSVarSvnDir
-v < >
$MDSVERUTIL AllVersions
$MDSVERUTIL CMACompDir
$MDSVERUTIL MDSCompDir
-c <
>
-v < >
$MDSVERUTIL AllVersions
$MDSVERUTIL MDSFwbcDir
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
$MDSVERUTIL CMASvnDir
$MDSVERUTIL MDSSvnDir
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
[Expert@MDS:0]# $MDSVERUTIL SP
4
[Expert@MDS:0]#
-v < >
$MDSVERUTIL AllVersions
-v < >
$MDSVERUTIL AllVersions
$MDSVERUTIL SvrParam [-v <Version_ID>]
-v < >
$MDSVERUTIL AllVersions
MyDomain
MyDMS
printxml
printxml services
LSMcli [-d] <Server> <User> <Pswd> <Action>
[-d]
LSMcli [-d] < > < > < > AddROBO VPN1 < > < >
[-RoboCluster=< >] [-O=< > [-I=< >]] [[-CA=< >
[-R=< >] [-KEY=< >]]]
[-D]:< >=< >
[-< >] [-D]:...]]
AddROBO VPN1
server
user
pswd
ROBOName
Profile
OtherROBOName
-RoboCluster
ActivationKey
IP
CaName
CertificateIdentifie
r#
AuthorizationKey
DynamicObjectName
IP1-IP2
FirstDO
LSMcli mySrvr name pass AddROBO VPN1 MyRobo AnyProfile -O=MyPass
-I=10.10.10.1 -DE:FirstDO=10.10.10.5 -CA=OPSEC_CA -R=cert1233 -KEY=ab345
LSMcli [-d] < > < > < > AddROBO VPN1Edge< > < >
< >
[-RoboCluster=< >] [-O=< >] [[-CA=< >
[-R=< >][-KEY=< >]]]
[-F=LOCAL|DEFAULT|< >]
[-M=< >] [-K=< >] [-D[E]:<D.O. name>=< >[-< >] [-D[E]:...]]
server
user
pswd
RoboName
Profile
ProductType
OtherROBOName
-RoboCluster
RegistrationKey
CaName
CertificateIdentifier#
AuthorizationKey
Firmware-name
MAC
ProductKey
DO Name
E LSMcli
ModifyROBOManualVPNDomain
Ip1-Ip2
MyRobo
AnyProfile MyRobo
LSMcli mySrvr name pass AddROBO VPN1Edge MyRobo AnyProfile IP30 -O=AnyRegKey
-F=DEFAULT – M=00:08:AA:BB:CC:DD -K=123456-ABCDEF-ABC123
LSMcli mySrvr name pass AddROBO VPN1Edge MyRobo AnyProfile SBox-100
-F=Safe@_Safe@_3.0.23_Generic_Safe@_fcs
LSMcli [-d] < > < > < > ModifyROBO VPN1 < > [
ModifyROBO VPN1
server
user
pswd
RoboName
Profile
OtherROBOName
-RoboCluster
-NoRoboCluster -NoRoboCluster
ModifyROBO VPN1
DO Name
IP1-IP2
-KeepDOs
LSMcli
server
user
pswd
RoboName
Profile
ProductType
OtherROBOName
-RoboCluster
-NoRoboCluster -NoRoboCluster
ModifyROBO VPN1
RegistrationKey
Firmware
MAC
ProductKey
DO Name
E LSMcli
ModifyROBOManualVPNDomain.
Ip1-Ip2
-KeepDOs
LSMcli
server
user
pswd
RoboName
FirstIP-LastIP
Index
IfOverlappingIPRangesDetected
ModifyROBOTopology VPN1
server
user
pswd
RoboName
VPNDomain
not_defined:
ShowROBOTopology
external_ip_only:
topology:
manual:
ModifyROBOManualVPNDomain
server
user
pswd
RoboName
VPNDomain
not_defined:
ShowROBOTopology
external_ip_only
topology
automatic:
manual:
[-IfOverlappingIPRangesDetected=< >]
ModifyROBOInterface VPN1
server
user
pswd
RoboName
InterfaceName
IPAddress
NetMask
IfOverlappingIPRangesDetected
server
user
pswd
RoboName
InterfaceName
IPAddress
NetMask
Enabled
HideNAT
DHCPEnabled
DHCPIpAllocation
IfOverlappingIPRangesDetected
AddROBOInterface VPN1
server
user
pswd
RoboName
InterfaceName
IPAddress
NetMask
DeleteROBOInterface VPN1
server
user
pswd
RoboName
InterfaceName
ResetSic
server
user
pswd
RoboName
ActivationKey
IP
ResetIke
server
user
pswd
RoboName
CaName
CertificateIdentifier
AuthorizationKey
LSMcli [-d] < > < > < > ExportIke < > < > < >
ExportIke
server
user
pswd
RoboName
Password
FileName
UpdateCO
server
user
pswd
Cogw
CogwCluster
Remove
server
user
pswd
RoboName
ID
Show
-N
-F
n
b
c
i
t
v
p
g
l
s
k
d
LSMcli [-d] < > < > < > ShowROBOTopology < >
ShowROBOTopology
server
user
pswd
RoboName
ModifyROBOConfigScript
Usage
LSMcli [-d] < >< >< > ModifyROBOConfigScript VPN1Edge < >
< >
Parameters
ModifyROBOConfigScript
server
user
pswd
RoboName
inputScriptFile
Example
LSMcli mySrvr name pass ModifyROBOConfigScript VPN1Edge MyRobo myScriptFile
Usage
LSMcli [-d] < > < > < > ShowROBOConfigScript VPN1Edge < >
Parameters
ShowROBOConfigScript
server
user
pswd
RoboName
Example
LSMcli mySrvr name pass ShowROBOConfigScript VPN1Edge MyRobo
VerifyInstall
Install
uninstall
LSMcli [-d] < > < > < > VerifyInstall < > < > < >
< > < >
VerifyInstall
server
user
pswd
RoboName
Product
Vendor
Version
SP
LSMcli mySrvr name pass VerifyInstall MyRobo firewall checkpoint NG_AI fcs
VerifyInstall
LSMcli [-d] < >< >< > Install < >< >< >< >
< >
[-P=Profile] [-boot] [-DoNotDistribute]
Install
server
user
pswd
RoboName
Product
Vendor
Version
SP
Profile
boot
-DoNotDistribute
LSMcli mySrvr name pass Install MyRobo firewall checkpoint NG_AI fcs
-P=AnyProfile -boot
ShowInfo
LSMcli [-d] < > < > < > Uninstall < > < > < > < >
< >
[-P=Profile] [-boot]
Uninstall
server
user
pswd
ROBO
Product
Vendor
Version
SP
Profile
boot
LSMcli mySrvr name pass Uninstall MyRobo firewall checkpoint NG_AI fcs -boot
LSMcli [-d] < > < > < > Distribute < > < > < >
< > < >
Distribute
server
user
pswd
RoboName
Product
Vendor
Version
SP
LSMcli mySrvr name pass Distribute MyRobo fw1 checkpoint NG_AI R54
LSMcli [-d] < > < > < > VerifyUpgrade < >
VerifyUpgrade
Upgrade
server
user
pswd
RoboName
Profile
boot
LSMcli [-d] < > < > < > GetInfo < >
GetInfo
server
user
pswd
RoboName
LSMcli [-d] < > < > < > ShowInfo < >
ShowInfo
server
user
pswd
VPN1EdgeRoboName
LSMcli [-d] < > < > < > Stop < >
Stop
server
user
pswd
Robo Gateway
LSMcli [-d] < > < > < > Start < >
Start
server
user
pswd
Robo Gateway
LSMcli [-d] < > < > < > Restart < >
Restart
server
user
pswd
Robo Gateway
LSMcli [-d] < > < > < > Reboot < >
Reboot
server
user
pswd
Robo Gateway
LSMcli [-d] < > < > < > PushPolicy < >
PushPolicy
server
user
pswd
Robo Gateway
LSMcli [-d] < > < > < > PushDOs < >
PushDOs
server
user
pswd
RoboName
GetStatus
server
user
pswd
Robo Gateway
server
user
pswd
Name
CO
Force
LSMenabler –r off
LSMenabler on
server
user
pswd
Name
Profile
EXT
INT
DMZ
AUX
NoRestart
Force
LSMenabler –r on
LSMcli mySrvr name pass Convert Gateway VPN1 MyGW MyProfile –E=hme0 –I=hme1
–D=hme2 -Force
LSMcli [-d] < > < > < > Convert ROBO VPN1Edge < >
server
user
pswd
Name
server
user
pswd
Name
Profile
AddROBO VPN1Cluster
AddROBO
VPN1Cluster
< >
Profile
MainIPAddress
SuffixName
SubstitutedName
Part
CAName
KeyIdentifier#
AuthorizationCode
ModifyROBO VPN1Cluster
ModifyROBO VPN1Cluster
< >
ModifyROBO VPN1Cluster < > -I=< >
< >
< >
ModifyROBO VPN1Cluster
< >
< >
<D.O. Name>
< > i
ModifyROBO VPN1Cluster
< >
< >
ModifyROBONetaccess
VPN1Cluster
< >
ClusterName
InterfaceName
-InternalIP not_defined
this specific
-AntiSpoof true
AllowedGroup SpoofTrack
false
-AllowedGroup TopologyType=external AllowedGroup
TopologyType=internal AllowedGroup
<action>
< >ClusterSubnetOverride VPN1Cluster < >
< > [-IName=< >] [-MNet=< >]
[-CIP=< > -CNetMask=< >]
ModifyClusterSubnetOverride
AddClusterSubnetOverride
DeleteClusterSubnetOverride
PrivateSubnetOverride
Add|Modify|Delete
ROBOClusterName
InterfaceName
-IName
-MNet
-CIP
-CNetMask ClusterIPAddress
< >
<Add|Modify|Delete>PrivateSubnetOverride VPN1ClusterMember
< > < > [-IName=< >]
[-MNet=< >]
ModifyPrivateSubnetOverride
AddPrivateSubnetOverride
DeletePrivateSubnetOverride
Add|Modify|Delete
ROBOMemberName
InterfaceName
-IName
-MNet
< >
RemoveCluster < >
LSMcli [-d] < >< >< > AddROBO < > < >
[-O=< > [-I=< >]] [[-CA=< >
[-R=< >] [-KEY=< >]]
server
user
pswd
Appliance_Model
CPSG80
1200R
1430/1450
1470/1490
ROBOName
Profile
ActivationKey
IP
CaName
CertificateIdentifie
r#
AuthorizationKey
<Appliance_Model>Cluster
CPSG80Cluster
1200RCluster
1430/1450Cluster
1470/1490Cluster
Profile
MainIPAddress
SuffixName
SubstitutedName
Part
CAName
KeyIdentifier#
AuthorizationCode
LSMcli 192.168.3.26 aa aaaa ModifyROBO CPSG80 Paris_GW
-P=second_small_office_profile
LSMcli 192.168.3.26 aa aaaa ModifyROBO CPSG80 Paris_GW
-P=second_small_office_profile
cpstat -f policy fw
InitialPolicy
$FWDIR/state/__tmp/FW1/
$FWDIR/state/local/FW1/
$FWDIR/state/< >/FW1/
control_bootsec
fwboot bootconf
fw defaultgen
fwboot default
$FWDIR/state/local/FW1/
cpstart fw
fetch localhost
comp_init_policy -g
comp_init_policy -g
fw fetch localhost
comp_init_policy -g
cpstart
comp_init_policy -g
reboot
[Expert@GW:0]# cd $FWDIR/state/local/FW1/
[Expert@GW:0]#
[Expert@GW:0]# pwd
/opt/CPsuite-R80.30/fw1/state/local/FW1
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 7744
-rw-r--r-- 1 admin root 20166 Jun 13 16:34 install_policy_report.txt
-rw-r--r-- 1 admin root 55 Jun 13 16:34 install_policy_report_timing.txt
-rw-r--r-- 1 admin root 37355 Jun 13 16:34 local.Sandbox-persistence.xml
-rw-r--r-- 1 admin root 3 Jun 13 16:34 local.ad_query_profiles
-rw-r--r-- 1 admin root 309 Jun 13 16:34 local.adlog.networks.exclude
-rw-r--r-- 1 admin root 148 Jun 13 16:34 local.adlog.users.exclude
-rw-r--r-- 1 admin root 3 Jun 13 16:34 local.allowed_clients_objects
-rw-r--r-- 1 admin root 8236 Jun 13 16:34 local.appfw_misc
-rw-r--r-- 1 admin root 4706 Jun 13 16:34 local.cluster_member
-rw-r--r-- 1 admin root 7889 Jun 13 16:34 local.connectra_global_properties
-rw-r--r-- 1 admin root 514 Jun 13 16:34 local.connectra_policy
-rw-r--r-- 1 admin root 603 Jun 13 16:34 local.cpmi_file
-rw-r--r-- 1 admin root 8 Jun 13 16:34 local.ctlver
-rw-r--r-- 1 admin root 680 Jun 13 16:34 local.current_recovery.profile
-rw-r--r-- 1 admin root 1054 Jun 13 16:34 local.data_awareness_settings
-rw-r--r-- 1 admin root 31202 Jun 13 16:34 local.data_files
-rw-r--r-- 1 admin root 33104 Jun 13 16:34 local.db
-rw-r--r-- 1 admin root 26763 Jun 13 16:34 local.dcerpc_service
-rw-r--r-- 1 admin root 0 Jun 13 16:34 local.device_settings_transactions
-rw-r--r-- 1 admin root 4 Jun 13 16:34 local.domain_objects_for_web_applications
-rw-r--r-- 1 admin root 3409 Jun 13 16:34 local.dynobj
-rw-r--r-- 1 admin root 6876 Jun 13 16:34 local.embedded_applications
-rw-r--r-- 1 admin root 966 Jun 13 16:34 local.eps_notify.html
-rw-r--r-- 1 admin root 1667 Jun 13 16:34 local.eps_notify.mail
-rw-r--r-- 1 admin root 717137 Jun 13 16:34 local.fc
-rw-r--r-- 1 admin root 784436 Jun 13 16:34 local.fc6
-rw-r--r-- 1 admin root 737 Jun 13 16:34 local.fileslist
-rw-r--r-- 1 admin root 216819 Jun 13 16:34 local.ft
-rw-r--r-- 1 admin root 216651 Jun 13 16:34 local.ft6
-rw-r--r-- 1 admin root 4789 Jun 13 16:34 local.fwrl.conf
-rw-r--r-- 1 admin root 3025 Jun 13 16:34 local.gateway_cluster
-rw-r--r-- 1 admin root 706 Jun 13 16:34 local.gateway_general_properties
-rw-r--r-- 1 admin root 617 Jun 13 16:34 local.global_preferences
-rw-r--r-- 1 admin root 8207 Jun 13 16:34 local.icmp_service
-rw-r--r-- 1 admin root 16003 Jun 13 16:34 local.icmpv6_service
-rw-r--r-- 1 admin root 211440 Jun 13 16:34 local.ics_configuration
-rw-r--r-- 1 admin root 633 Jun 13 16:34 local.identity_awareness_custom_settings
-rw-r--r-- 1 admin root 3 Jun 13 16:34 local.identity_roles
-rw-r--r-- 1 admin root 11 Jun 13 16:34 local.ifs
-rw-r--r-- 1 admin root 31618 Jun 13 16:34 local.implied_rules
-rw-r--r-- 1 admin root 833 Jun 13 16:34 local.inspect.lf
-rw-r--r-- 1 admin root 596 Jun 13 16:34 local.intranet_community
-rw-r--r-- 1 admin root 2 Jun 13 16:34 local.ips_enhance
-rw-r--r-- 1 admin root 2 Jun 13 16:34 local.ips_granular_contexts
-rw-r--r-- 1 admin root 8123 Jun 13 16:34 local.languages
-rw-r--r-- 1 admin root 10286 Jun 13 16:34 local.lg
-rw-r--r-- 1 admin root 10286 Jun 13 16:34 local.lg6
-rw-r--r-- 1 admin root 39 Jun 13 16:34 local.logo_directory_content.conf
-rw-r--r-- 1 admin root 41030 Jun 13 16:34 local.magic
-rw-r--r-- 1 admin root 878700 Jun 13 16:34 local.magic.mgc
-rw-r--r-- 1 admin root 3 Jun 13 16:34 local.mail_servers
-rw-r--r-- 1 admin root 35 Jun 13 16:34 local.mgmt_dhcp_data
-rw-r--r-- 1 admin root 10958 Jun 13 16:34 local.mobile_profiles
-rw-r--r-- 1 admin root 1389 Jun 13 16:34 local.mobile_profiles_rulebase
-rw-r--r-- 1 admin root 101 Jun 13 16:34 local.mv_tag
-rw-r--r-- 1 admin root 2230 Jun 13 16:34 local.nac_agents
-rw-r--r-- 1 admin root 2267 Jun 13 16:34 local.network_applications
-rw-r--r-- 1 admin root 558756 Jun 13 16:34 local.objects
-rw-r--r-- 1 admin root 2951 Jun 13 16:34 local.other_service
-rw-r--r-- 1 admin root 630 Jun 13 16:34 local.policy
-rw-r--r-- 1 admin root 42336 Jun 13 16:34 local.policy.xml
-rw-r--r-- 1 admin root 5304 Jun 13 16:34 local.products_updates
-rw-r--r-- 1 admin root 5749 Jun 13 16:34 local.rad_services
-rw-r--r-- 1 admin root 11419 Jun 13 16:34 local.realm_objects
-rw-r--r-- 1 admin root 20590 Jun 13 16:34 local.realms
-rw-r--r-- 1 admin root 5767 Jun 13 16:34 local.remote_access_clients_objects
-rw-r--r-- 1 admin root 11389 Jun 13 16:34 local.rpc_service
-rw-r--r-- 1 admin root 7280 Jun 13 16:34 local.rule
-rw-r--r-- 1 admin root 3 Jun 13 16:34 local.rule_adtr
-rw-r--r-- 1 admin root 924 Jun 13 16:34 local.rulebase
-rw-r--r-- 1 admin root 6329 Jun 13 16:34 local.rulebase_tracks
-rw-r--r-- 1 admin root 0 Jun 13 16:34 local.sdopts.rec
-rw-r--r-- 1 admin root 0 Jun 13 16:34 local.securid
-rw-r--r-- 1 admin root 1643 Jun 13 16:34 local.service_group
-rw-r--r-- 1 admin root 362239 Jun 13 16:34 local.set
-rw-r--r-- 1 admin root 140 Jun 13 16:34 local.sic_name
-rw-r--r-- 1 admin root 590 Jun 13 16:34 local.sr_community
-rw-r--r-- 1 admin root 3 Jun 13 16:34 local.ssl_certificates
-rw-r--r-- 1 admin root 949165 Jun 13 16:34 local.ssl_inspection
-rw-r--r-- 1 admin root 4 Jun 13 16:34 local.sso_groups
-rw-r--r-- 1 admin root 1004 Jun 13 16:34 local.str
-rw-r--r-- 1 admin root 1004 Jun 13 16:34 local.str6
-rw-r--r-- 1 admin root 152350 Jun 13 16:34 local.tcp_protocol
-rw-r--r-- 1 admin root 304987 Jun 13 16:34 local.tcp_service
-rw-r--r-- 1 admin root 48337 Jun 13 16:34 local.thresholds.conf
-rw-r--r-- 1 admin root 887 Jun 13 16:34 local.track
-rw-r--r-- 1 admin root 36327 Jun 13 16:34 local.udp_protocol
-rw-r--r-- 1 admin root 125679 Jun 13 16:34 local.udp_service
-rw-r--r-- 1 admin root 1452032 Jun 13 16:34 local.upDB.sqlite
-rw-r--r-- 1 admin root 80512 Jun 13 16:34 local.user_check_interactions.C.converted
-rw-r--r-- 1 admin root 0 Jun 13 16:34 local.userdef
-rw-r--r-- 1 admin root 6240 Jun 13 16:34 local.vs_cluster_member
-rw-r--r-- 1 admin root 4547 Jun 13 16:34 local.vs_cluster_netobj
-rw-r--r-- 1 admin root 3118 Jun 13 16:34 local.vsx_cluster_member
-rw-r--r-- 1 admin root 2278 Jun 13 16:34 local.vsx_cluster_netobj
-rw-r--r-- 1 admin root 5172 Jun 13 16:34 local.{939922F7-DF98-4988-B776-B70B9B8340F3}
-rw-r--r-- 1 admin root 10328 Jun 13 16:34 local.{B9D14722-3936-4B33-814B-F87EA4062BEB}
-rw-r----- 1 admin root 14743 Jun 13 16:34 manifest.C
-rw-r--r-- 1 admin root 7381 Jun 13 16:34 policy.info
-rw-r--r-- 1 admin root 2736 Jun 13 16:34 policy.map
-rw-r--r-- 1 admin root 51 Jun 13 16:34 sig.map
[Expert@GW:0]#
[Expert@GW:0]# comp_init_policy -u
erasing local state..
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 0
[Expert@GW:0]#
[Expert@GW:0]# comp_init_policy -g
initial_module:
Compiled OK.
initial_module:
Compiled OK.
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 56
-rw-rw---- 1 admin root 8 Jul 19 19:51 local.ctlver
-rw-rw---- 1 admin root 4514 Jul 19 19:51 local.fc
-rw-rw---- 1 admin root 4721 Jul 19 19:51 local.fc6
-rw-rw---- 1 admin root 235 Jul 19 19:51 local.ft
-rw-rw---- 1 admin root 317 Jul 19 19:51 local.ft6
-rw-rw---- 1 admin root 135 Jul 19 19:51 local.fwrl.conf
-rw-rw---- 1 admin root 14 Jul 19 19:51 local.ifs
-rw-rw---- 1 admin root 833 Jul 19 19:51 local.inspect.lf
-rw-rw---- 1 admin root 243 Jul 19 19:51 local.lg
-rw-rw---- 1 admin root 243 Jul 19 19:51 local.lg6
-rw-rw---- 1 admin root 0 Jul 19 19:51 local.magic
-rw-rw---- 1 admin root 3 Jul 19 19:51 local.set
-rw-rw---- 1 admin root 51 Jul 19 19:51 sig.map
[Expert@GW:0]#
defaultfilter
InitialPolicy
comp_init_policy
fwboot bootconf
fw defaultgen
fwboot default
$CPDIR/registry/HKLM_registry.data
$FWDIR/state/local/FW1/
-r
-R $FWDIR/boot/fwboot bootconf set_def
$FWDIR/boot/boot.conf DEFAULT_FILTER_PATH
0
$FWDIR/bin/comp_init_policy -u
$CPDIR/registry/HKLM_registry.data
$FWDIR/state/local/FW1/
[Expert@GW:0]# cd $FWDIR/state/local/FW1/
[Expert@GW:0]#
[Expert@GW:0]# pwd
/opt/CPsuite-R80.30/fw1/state/local/FW1
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 7736
-rw-rw---- 1 admin root 11085 Jul 19 20:16 install_policy_report.txt
-rw-rw---- 1 admin root 56 Jul 19 20:16 install_policy_report_timing.txt
-rw-rw---- 1 admin root 37355 Jul 19 20:16 local.Sandbox-persistence.xml
-rw-rw---- 1 admin root 3 Jul 19 20:16 local.ad_query_profiles
... ... ...
-rw-r----- 1 admin root 14743 Jul 19 20:16 manifest.C
-rw-rw---- 1 admin root 7381 Jul 19 20:16 policy.info
-rw-rw---- 1 admin root 2736 Jul 19 20:16 policy.map
-rw-rw---- 1 admin root 51 Jul 19 20:16 sig.map
[Expert@GW:0]#
[Expert@GW:0]# $FWDIR/bin/control_bootsec -r
Disabling boot security
FW-1 will not load a default filter on boot
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 0
[Expert@GW:0]#
[Expert@GW:0]# cd $FWDIR/state/local/FW1/
[Expert@GW:0]#
[Expert@GW:0]# pwd
/opt/CPsuite-R80.30/fw1/state/local/FW1
[Expert@GW:0]#
[Expert@GW:0]# control_bootsec -g
Enabling boot security
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 56
-rw-rw---- 1 admin root 8 Jul 19 20:22 local.ctlver
-rw-rw---- 1 admin root 4514 Jul 19 20:22 local.fc
-rw-rw---- 1 admin root 4721 Jul 19 20:22 local.fc6
-rw-rw---- 1 admin root 235 Jul 19 20:22 local.ft
-rw-rw---- 1 admin root 317 Jul 19 20:22 local.ft6
-rw-rw---- 1 admin root 135 Jul 19 20:22 local.fwrl.conf
-rw-rw---- 1 admin root 14 Jul 19 20:22 local.ifs
-rw-rw---- 1 admin root 833 Jul 19 20:22 local.inspect.lf
-rw-rw---- 1 admin root 243 Jul 19 20:22 local.lg
-rw-rw---- 1 admin root 243 Jul 19 20:22 local.lg6
-rw-rw---- 1 admin root 0 Jul 19 20:22 local.magic
-rw-rw---- 1 admin root 3 Jul 19 20:22 local.set
-rw-rw---- 1 admin root 51 Jul 19 20:22 sig.map
[Expert@GW:0]#
cp_conf
-h
adv_routing <options>
auto <options>
corexl <options>
fullha <options>
ha <options>
intfs <options>
lic <options>
sic <options>
snmp <options>
-h
ha < >
cp_conf auto
-h
{enable | disable} <Product1> <Product2> ...
get all
-h
{enable | disable}
< > < > ...
get all
[Expert@MGMT:0]#
The Check Point Security Gateway will start automatically at boot time.
[Expert@MyGW:0]#
cpconfig
n k
cp_conf corexl [-v] enable [n] [-6 k]
cp_conf corexl [-v] disable
fwboot corexl
-v vmalloc
n
k
KERN_INSTANCE_NUM = 2
cp_conf fullha
enable
del_peer
disable
state
enable
del_peer
disable
state
enable
cpconfig
disable
cpconfig
norestart
[Expert@MyGW:0]#
[Expert@MyGW:0]#
cp_conf intfs
get
set
auxiliary <Name of Interface>
DMZ <Name of Interface>
external <Name of Interface>
internal <Name of Interface>
get
set
auxiliary
DMZ
external
internal
cpconfig
cp_conf lic
-h
add -f <Full Path to License File>
add -m <Host> <Date> <Signature Key> <SKU/Features>
del <Signature Key>
get [-x]
-h
add -f <
>
cplic db_add
add -m < > < >
< >
< > cplic db_add
del < >
cplic del
get [-x]
-x
cp_conf
-h
sic
cert_pull <Management Server> <DAIP GW object>
init <Activation Key> [norestart]
state
-h
cert_pull <Management
Server> <DAIP GW object>
state
[Expert@MyGW:0]#
cpconfig
[Expert@MySingleGW:0]# cpconfig
This program will let you re-configure
your Check Point products configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) SNMP Extension
(3) PKCS#11 Token
(4) Random Pool
(5) Secure Internal Communication
(6) Enable cluster membership for this gateway
(7) Check Point CoreXL
(8) Automatic start of Check Point Products
(9) Exit
[Expert@MyClusterMember:0]# cpconfig
This program will let you re-configure
your Check Point products configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) SNMP Extension
(3) PKCS#11 Token
(4) Random Pool
(5) Secure Internal Communication
(6) Disable cluster membership for this gateway
(7) Enable Check Point Per Virtual System State
(8) Enable Check Point ClusterXL for Bridge Active/Standby
(9) Check Point CoreXL
(10) Automatic start of Check Point Products
(11) Exit
cplic [-d]
{-h | -help}
check <options>
contract <options>
del <options>
print <options>
put <options>
-d
{-h | -help}
{-h | -help}
-d
-p < >
fw1
mgmt
services
cvpn
etm
eps
-v < >
{-c | -count}
-t < >
{-r | -routers}
< >
{-S | -SRusers}
< >
cplic get
cplic contract -h
cplic [-d] contract
del
-h
<Service Contract ID>
put
-h
[{-o | -overwrite}] <Service Contract File>
{-h | -help}
-d
del $CPDIR/conf/cp.contract
put $CPDIR/conf/cp.contract
< >
{-o | -overwrite}
< >
cplic del {-h | -help}
cplic [-d] del [-F <Output File>] <Signature> <Object Name>
{-h | -help}
-d
-F < >
< >
cplic print -x
< >
cplic print {-h | -help}
cplic [-d] print[{-n | -noheader}] [-x] [{-t | -type}] [-F <Output File>] [{-p |
-preatures}] [-D]
{-h | -help}
-d
{-n | -noheader}
-x
{-t | -type]
-F < >
{-p | -preatures}
-D
{-h | -help}
-d
{-o | -overwrite}
{-c | -check-only}
{-s | -select}
-F < >
{-P | -Pre-boot}
-l < >
< >
< >
< >
< >
CPSUITE-EVAL-3DES-vNG
host
SKU/features
CPPROD_GetValue
CPPROD_SetValue
"< >"
"< >"
"< >"
dump
$CPDIR/registry/HKLM_registry.data
RegDump
cpprod_util
FwIsFirewallModule
FwIsVSX FwIsStandAlone
no-parameter string-parameter integer-parameter
status-output no-output
-fwflag -default
-fwflag -proc
-fwflag -driver
cpstat [-d] [-h <Host>] [-p <Port>] [-s <SICname>] [-f <Flavor>] [-o <Polling
Interval> [-c <Count>] [-e <Period>]] <Application Flag>
-d
-h < >
< >
localhost
-p < >
-s < >
-f < >
-c < >
cpstat os -f perf -o 2
-c < >
-o < >
<
>
<
>
<
>
<
>
cpstat os -f perf -o 2 -c 2
-e < >
-o < >
-c < >
cpstat os -f perf -o 2 -c 2 -e 60
< >
os
persistency
thresholds
threshold_config
ci
https_inspection
cvpn
fw
vsx
vpn
blades
identityServer
appi
urlf
dlp
ctnt
antimalware
threat-emulation
scrub
gx
fg
ha
polsrv
ca
mg
cpsemd
cpsead
ls
PA
--------------------------------------------------------------
|Flag |Flavours |
--------------------------------------------------------------
|os |default, ifconfig, routing, routing6, |
| |memory, old_memory, cpu, disk, perf, |
| |multi_cpu, multi_disk, raidInfo, sensors, |
| |power_supply, hw_info, all, average_cpu, |
| |average_memory, statistics, updates, |
| |licensing, connectivity, vsx |
--------------------------------------------------------------
|persistency |product, TableConfig, SourceConfig |
--------------------------------------------------------------
|thresholds |default, active_thresholds, destinations, |
| |error |
--------------------------------------------------------------
|ci |default |
--------------------------------------------------------------
|https_inspection |default, hsm_status, all |
--------------------------------------------------------------
|cvpn |cvpnd, sysinfo, products, overall |
--------------------------------------------------------------
|fw |default, interfaces, policy, perf, hmem, |
| |kmem, inspect, cookies, chains, |
| |fragments, totals, totals64, ufp, http, |
| |ftp, telnet, rlogin, smtp, pop3, sync, |
| |log_connection, all |
--------------------------------------------------------------
|vsx |default, stat, traffic, conns, cpu, all, |
| |memory, cpu_usage_per_core |
--------------------------------------------------------------
|vpn |default, product, IKE, ipsec, traffic, |
| |compression, accelerator, nic, |
| |statistics, watermarks, all |
--------------------------------------------------------------
|blades |fw, ips, av, urlf, vpn, cvpn, aspm, dlp, |
| |appi, anti_bot, default, |
| |content_awareness, threat-emulation, |
| |default |
--------------------------------------------------------------
|identityServer |default, authentication, logins, ldap, |
| |components, adquery |
--------------------------------------------------------------
|appi |default, subscription_status, |
| |update_status, RAD_status, top_last_hour, |
| |top_last_day, top_last_week, |
| |top_last_month |
--------------------------------------------------------------
|urlf |default, subscription_status, |
| |update_status, RAD_status, top_last_hour, |
| |top_last_day, top_last_week, |
| |top_last_month |
--------------------------------------------------------------
|dlp |default, dlp, exchange_agents, fingerprint|
--------------------------------------------------------------
|ctnt |default |
--------------------------------------------------------------
|antimalware |default, scanned_hosts, scanned_mails, |
| |subscription_status, update_status, |
| |ab_prm_contracts, av_prm_contracts, |
| |ab_prm_contracts, av_prm_contracts |
--------------------------------------------------------------
|threat-emulation |default, general_statuses, update_status, |
| |scanned_files, malware_detected, |
| |scanned_on_cloud, malware_on_cloud, |
| |average_process_time, emulated_file_size, |
| |queue_size, peak_size, |
| |file_type_stat_file_scanned, |
| |file_type_stat_malware_detected, |
| |file_type_stat_cloud_scanned, |
| |file_type_stat_cloud_malware_scanned, |
| |file_type_stat_filter_by_analysis, |
| |file_type_stat_cache_hit_rate, |
| |file_type_stat_error_count, |
| |file_type_stat_no_resource_count, |
| |contract, downloads_information_current, |
| |downloading_file_information, |
| |queue_table, history_te_incidents, |
| |history_te_comp_hosts |
--------------------------------------------------------------
|scrub |default, subscription_status, |
| |threat_extraction_statistics |
--------------------------------------------------------------
|gx |default, contxt_create_info, |
| |contxt_delete_info, contxt_update_info, |
| |contxt_path_mng_info, GXSA_GPDU_info, |
| |contxt_initiate_info, gtpv2_create_info, |
| |gtpv2_delete_info, gtpv2_update_info, |
| |gtpv2_path_mng_info, gtpv2_cmd_info, all |
--------------------------------------------------------------
|fg |all |
--------------------------------------------------------------
|ha |default, all |
--------------------------------------------------------------
|polsrv |default, all |
--------------------------------------------------------------
|ca |default, all, cert, crl, user |
--------------------------------------------------------------
|mg |default |
--------------------------------------------------------------
|cpsemd |default |
--------------------------------------------------------------
|cpsead |default |
--------------------------------------------------------------
|ls |default |
--------------------------------------------------------------
|PA |default |
--------------------------------------------------------------
Network interfaces
--------------------------------------------------------------------------------------------------
------------------
|Name|IP |Netmask |Flags|Peer name|Remote IP|Topology|Proxy name|Slaves|Ports|IPv6
Address|IPv6 Len|
--------------------------------------------------------------------------------------------------
------------------
|eth0|192.168.30.40|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth1| 172.30.60.80|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth2| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth3| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth4| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth5| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth6| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth7| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
--------------------------------------------------------------------------------------------------
------------------
[Expert@MyGW:0]#
Interface table
---------------------------------------
|Name|Dir|Total |Accept|Deny |Log|
---------------------------------------
|eth0|in | 2393126| 32589| 2360537| 52|
|eth0|out| 33016| 33016| 0| 0|
|eth1|in | 2360350| 0| 2360350| 0|
|eth1|out| 0| 0| 0| 0|
|eth2|in | 2360350| 0| 2360350| 0|
|eth2|out| 0| 0| 0| 0|
|eth3|in | 2348704| 0| 2348704| 1|
|eth3|out| 0| 0| 0| 0|
|eth4|in | 2360350| 0| 2360350| 0|
|eth4|out| 0| 0| 0| 0|
---------------------------------------
| | |11855896| 65605|11790291| 53|
---------------------------------------
[Expert@MyGW:0]#
[Expert@MyGW:0]#
cpstop [-fwflag {–default | -proc | -driver}]
-fwflag –default
defaultfilter
-fwflag -proc
cpstart
-fwflag -driver
cpview --help
cpview_< >.cap< >
dynamic_objects
dynamic_objects -l
dynamic_objects -n <object_name> [-r <FromIP1> <ToIP2> ... [<FromIPx> <ToIPy>] -a]
dynamic_objects -o <object_name> -r <FromIP1> <ToIP2> ... [<FromIPx> <ToIPy>] -a
dynamic_objects -o <object_name> -r <FromIP1> <ToIP2> ... [<FromIPx> <ToIPy>] -d
dynamic_objects -c
dynamic_objects -e
< >
dynamic_objects -n < >
-c
$FWDIR/database/dynamic_objects.db
$FWDIR/conf/objects.C
-d
-do
-e
$FWDIR/database/dynamic_objects.db
-l
$FWDIR/database/dynamic_objects.db
-n
-u
dynamic_objects -n bigserver
dynamic_objects -o bigserver -r 192.168.2.30 192.168.2.40 -a
$CPDIR/log/cpwd.elg log
cpwd_admin
cpwd_admin
config <options>
del <options>
detach <options>
exist
flist <options>
getpid <options>
kill
list <options>
monitor_list
start <options>
start_monitor
stop <options>
stop_monitor
exist cpwd
flist < >
$CPDIR/tmp/cpwd_list_< >.lst
getpid < >
kill cpwd
list < >
monitor_list
start_monitor
stop_monitor
cpstop
cpwd_admin config
-h
-a <Configuration_Parameter_1>=<Value_1>
<Configuration_Parameter_2>=<Value_2> ... <Configuration_Parameter_N>=<Value_N>
-d <Configuration_Parameter_1> <Configuration_Parameter_2> ...
<Configuration_Parameter_N>
-p
-r
-h
-a
< >=<
>
< >=<
> ...
< >=<
>
-d < >
< > ... cpwd_admin config -a
< >
-p
cpwd_admin config -a
-r
default_ctx
display_ctx
CTX
cpwd_admin list APP
PID
CTX
CTX
no_limit rerun_mode=1
num_of_procs
rerun_mode
reset_startups
startup_counter
cpwd_admin list
#START
sleep_mode
sleep_timeout
sleep_timeout rerun_mode=1
stop_timeout
zero_timeout no_limit
zero_timeout
zero_timeout
timeout
$CPDIR/registry/HKLM_registry.data : (Wd_Config
("CheckPoint Repository Set"
: (SOFTWARE
: (CheckPoint
: (CPshared
:CurrentVersion (6.0)
: (6.0
... ...
: (reserved
... ...
: (Wd
: (Wd_Config
:Configuration_Parameter_1 ("[4]Value_1")
:Configuration_Parameter_2 ("[4]Value_2")
)
)
... ...
< >
cpwd_admin list APP
FWM
FWD
CPD
CPM
-ctx < >
< >
cpwd_admin list APP
FWM
FWD
CPD
CPM
-ctx < >
cpwd_admin exist
-full
APP
CTX
PID
STAT
E
T
#START
START_TIME
< >
cpwd_admin list APP
FWM
FWD
CPD
CPM
-ctx < >
cpstop cpstart
cpwd_admin kill
cpwd_admin list [-full] [-ctx <VSID>]
-full
APP
CTX
PID
STAT
E
T
#START
START_TIME
MON
cpwd_admin
Y
N
COMMAND
cpwd_admin monitor_list
FWM
FWD
CPD
CPM
-ctx < >
-path "<
>"
$FWDIR/bin/fwm
/opt/CPsuite-R80.30/fw1/bin/fw
$CPDIR/bin/cpd
/opt/CPsuite-R80.30/fw1/scripts/cpm.sh"
/opt/CPshrd-R80.30/bin/cptnl
-command "<
>"
fwm
fwm mds
fwd
cpd
/opt/CPsuite-R80.30/fw1/scripts/cpm.sh -s"
/opt/CPshrd-R80.30/bin/cptnl -c
"/opt/CPuepm-R80.30/engine/conf/cptnl_srv.co
nf"
-env {inherit |
< >=< >}
inherit
-slp_timeout sleep_timeout
< >
cpwd_admin config
-retry_limit no_limit
{< > | u} cpwd_admin config
< >
u
cpwd_admin
cpwd_admin start_monitor
FWM
FWD
CPD
CPM
-ctx < >
-path "<
>"
$FWDIR/bin/fwm
/opt/CPsuite-R80.30/fw1/bin/fw
$CPDIR/bin/cpd_admin
-command "<
>"
fw kill fwm
fw kill fwd
cpd_admin stop
-env {inherit |
< >=< >}
inherit
cpwd_admin stop_monitor
fw [-d] [-i]
amw <options>
ctl <options>
defaultgen
fetch <options>
fetchlogs <options>
getifs
hastat <options>
isp_link <options>
kill <options>
lichosts <options>
log <options>
logswitch <options>
lslogs <options>
mergefiles <options>
repairlog <options>
sam <options>
sam_policy <options>
showuptables <options>
stat
tab <options>
unloadlocal
up_execute <options>
ver <options>
-d
script
-i
fetchlogs $FWDIR/log/*.log*
$FWDIR/log/*.adtlog*
getifs
hastat
isp_link
kill
lichosts < >
log
$FWDIR/log/*.log $FWDIR/log/*.adtlog
logswitch
$FWDIR/log/fw.log $FWDIR/log/fw.adtlog
lslogs $FWDIR/log/*.log*
$FWDIR/log/*.adtlog*
mergefiles $FWDIR/log/*.log
$FWDIR/log/*.adtlog
monitor
repairlog
$FWDIR/log/*.log $FWDIR/log/*.adtlog
sam
sam_policy
showuptables
stat
tab < >
unloadlocal
fw -i
< >
fw ctl multik
stat
< > fw -i
fw -i < > conntab ...
fw -i < > ctl get ...
fw -i < > ctl leak ...
fw -i < > ctl pstat ...
fw -i < > ctl set ...
fw -i < > monitor ...
fw -i < > tab ...
fw -i 1 tab -t connections
fw [-d] amw fetch -f [-i] [-n] [-r]
fw [-d] amw fetch [-i] [-n] [-r] <Master 1> [<Master 2> ...]
fw [-d] amw fetch local [-nu]
fw [-d] amw fetch localhost [-nu]
fw [-d] amw unload
fw -d amw ...
fw amw fetch
fw amw fetchlocal
fw amw unload
-c
-f
-f
$FWDIR/conf/masters
-i
-lu
$FWDIR/state/local/AMW/
-n
-nu
-r
< > [< > ...]
< >
< >
< >
localhost
< >
localhost
-d < >
-d
block < >
chain
conn
conntab < >
install
uninstall
$FWDIR/conf/local.arp
-d
-h
-n
dmesg
-d
-h
lock
[packet | ioctl] [<Limit>]
[stop]
packet
ioctl
< >
stop
packet
[<Limit> | stop]
< >
stop
[Expert@MyGW:0]# dmesg -c
... ... ...
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw ctl bench lock 5
starting to collect statistics for 5 seconds
[Expert@MyGW:0]#
[Expert@MyGW:0]# dmesg
[fw4_1];
[fw4_1];BENCHMARKER
[fw4_1];===================================
[fw4_1];Type: FW LOCK STATISTICS
[fw4_1];General info
[fw4_1];-------------
[fw4_1];TU = Time Units
[fw4_1];Calibration: number of TU in one second 2401506325
[fw4_1];Testing period in TU: 11998021084
[fw4_2];BENCHMARKER
[fw4_2];===================================
[fw4_2];Type: FW LOCK STATISTICS
[fw4_2];General info
[fw4_2];-------------
[fw4_2];TU = Time Units
[fw4_2];Calibration: number of TU in one second 2398783828
[fw4_2];Testing period in TU: 11999333782
[fw4_0];
[fw4_0];General info
[fw4_0];-------------
[fw4_0];TU = Time Units
[fw4_2];----------------------------------- --------------- --------- -----------
---------------
[Expert@MyGW:0]# dmesg -c
... ... ...
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw ctl bench packet
starting to collect statistics for 10 seconds
[Expert@MyGW:0]#
[fw4_1];
[fw4_1];BENCHMARKER
[fw4_1];===================================
[fw4_1];Type: OUTBOUND PACKETS STATISCITCS
[fw4_1];General info
[fw4_1];-------------
[fw4_1];TU = Time Units
[fw4_1];Calibration: number of TU in one second 2401506325
[fw4_1];Testing period in TU: 23998127929
[fw4_1];BENCHMARKER
[fw4_1];===================================
[fw4_1];Type: INBOUND PACKETS STATISCITCS
[fw4_1];General info
[fw4_1];-------------
[fw4_1];TU = Time Units
[fw4_1];Calibration: number of TU in one second 2401506325
[fw4_1];Testing period in TU: 23998363528
[fw4_2];BENCHMARKER
[fw4_2];===================================
[fw4_2];Type: INBOUND PACKETS STATISCITCS
[fw4_2];General info
[fw4_2];-------------
[fw4_2];TU = Time Units
[fw4_2];Calibration: number of TU in one second 2398783828
[fw4_2];Testing period in TU: 23995572652
[fw4_0];BENCHMARKER
[fw4_0];===================================
[fw4_0];Type: OUTBOUND PACKETS STATISCITCS
[fw4_0];General info
[fw4_0];-------------
[fw4_0];TU = Time Units
[fw4_0];Calibration: number of TU in one second 2399455273
[fw4_0];Testing period in TU: 23995636055
[fw4_0];BENCHMARKER
[fw4_0];===================================
[fw4_0];Type: INBOUND PACKETS STATISCITCS
[fw4_0];General info
[fw4_0];-------------
[fw4_0];TU = Time Units
[fw4_0];Calibration: number of TU in one second 2399455273
[fw4_0];Testing period in TU: 23997573677
[fw4_2];BENCHMARKER
[fw4_2];===================================
[fw4_2];Type: OUTBOUND PACKETS STATISCITCS
[fw4_2];General info
[fw4_2];-------------
[fw4_2];TU = Time Units
[fw4_2];Calibration: number of TU in one second 2398783828
[fw4_2];Testing period in TU: 24000292567
-d
off
on
fw [-d] ctl chain
-d
-d
{-h | -help}
-d
-sip=<
>
-sport=<
>
-dip=<
>
-dport=<
>
-proto=<
>
-service=< fw
> ctl conntab
-rule=< fw ctl
> conntab
localhost:
Date: Sep 10, 2018
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum:
<max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; :
(+)====================================(+); Table_Name: connections; : (+);
Attributes: dynamic, id 8158, attributes: keep, sync, aggressive aging, kbufs 21
22 23 24 25 26 27 28 29 30 31 32 33 34, expires 25, refresh, , hashsize 2097152,
unlimited; LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1;
ProductFamily: Network;
[Expert@MyGW:0]#
fw [-d] ctl cpasstat
[-r]
-d
-r
Connections:
Connections initiated ............................ 0
Connections accepted ............................. 0
Connections established actively or passively .... 0
Connections dropped .............................. 0
Connections closed (includes drops)............... 0
Delayed acks sent ................................ 0
Connections dropped in retransmit timeout ........ 0
Connections dropped in persist timeout ........... 0
Connections dropped in keepalive timeout ......... 0
Packets:
Total packets sent ............................... 0
Data packets sent ................................ 0
Data bytes sent .................................. 0
Data packets retransmitted ....................... 0
Data bytes retransmitted ......................... 0
Fast retransmits ................................. 0
Ack-only packets sent ............................ 0
Window probes sent ............................... 0
Packets sent with URG only ....................... 0
Window update-only packets sent .................. 0
Control (SYN|FIN|RST) packets sent ............... 0
Total packets received ........................... 0
Packets received in sequence ..................... 0
Bytes received in sequence ....................... 0
Packets received with checksum errors ........... 0
Packets received with bad offset ................. 0
Packets received too short ....................... 0
Duplicate-only packets received .................. 0
Duplicate-only bytes received .................... 0
Packets with some duplicate data ................. 0
Duplicate bytes in part-duplicate packets ........ 0
Out-of-order packets received .................... 0
Out-of-order bytes received ...................... 0
Packets with data after window ................... 0
Bytes received after window ...................... 0
Packets received after connection closed ......... 0
Received window probe packets .................... 0
Received duplicate acks .......................... 0
Received acks for unsent data .................... 0
Received acks for old data ....................... 0
Received ack packets ............................. 0
Bytes acked by received acks ..................... 0
Received window update packets ................... 0
SYN packet with src==dst received ................ 0
Times header prediction correct for acks ......... 0
Times header prediction correct for data packets . 0
Defragmented packets ............................. 0
Memory:
Allocated memory in bytes ........................ 204180
Allocated skbuffs num ............................ 0
Allocated skbuffs size in bytes .................. 0
Allocated memory per connection .................. 0
Retransmissions:
Segments for which TCP tried to measure RTT ...... 0
Times RTT estimators updated ..................... 0
Timers:
Times retransmit timer expires ................... 0
Times persist timer expires ...................... 0
Times keepalive timer expires .................... 0
Keepalive probes sent ............................ 0
Drop reson:
Packets dropped for lack of memory ............... 0
Segments dropped due to PAWS ..................... 0
TCP Signatures:
Received bad or missing TCP signatures ........... 0
Received good TCP signatures ..................... 0
ECN stats:
ECN connections accepted ......................... 0
Number of received ECE ........................... 0
Number of received CWR ........................... 0
Number of received CE in IP header ............... 0
Number of ECT sent ............................... 0
Number of ECE sent ............................... 0
Number of CWR sent ............................... 0
Number of cwnd reduced by ECN .................... 0
Number of cwnd reduced by fastrecovery ........... 0
Number of cwnd reduced by timeout ................ 0
SYN cache stats:
Number of entries added .......................... 0
Number of connections completed .................. 0
Number of entries timed out ...................... 0
Number dropped due to overflow ................... 0
Number dropped due to RST ........................ 0
Number dropped due to ICMP unreach ............... 0
Number dropped due to bucket overflow ............ 0
Number of duplicate SYNs received ................ 0
Number of SYNs dropped (no route/mem) ............ 0
Number of retransmissions ........................ 0
SACK stats:
SACK recovery episodes ........................... 0
SACK retransmit segments ......................... 0
SACK retransmit bytes ............................ 0
SACK options received ............................ 0
SACK options sent ................................ 0
Applications Counters:
======================
[Expert@MyGW:0]#
-d
-r
=====================================
DLPK Statistics Information
=====================================
Number of emails seen ................................................ 0
Number of emails held and moved to user mode ......................... 0
Number of emails not held due to Monitor Only ........................ 0
Number of emails bypassed due to High CPU Load ....................... 0
Number of emails bypassed due to large data size limit ............... 0
Number of emails rejected due to large data size limit ............... 0
Number of emails bypassed due to internal errors ..................... 0
Number of emails rejected due to internal errors ..................... 0
Number of emails bypassed due to TLS ................................ 0
Number of HTTP POST requests ......................................... 0
Number of HTTP PUT requests .......................................... 0
Number of HTTP GET requests .......................................... 0
Number of other HTTP method requests ................................. 0
Number of HTTP POST requests held and moved to user mode ............. 0
Number of HTTP POST requests not held due to Monitor Only ............ 0
Number of HTTP POST requests bypassed due to High CPU Load ........... 0
Number of HTTP POST requests bypassed due to large data size limit ... 0
Number of HTTP POST requests bypassed due to internal errors ......... 0
Number of HTTP POST requests rejected due to large data size limit ... 0
Number of HTTP POST requests rejected due to internal errros ......... 0
User Mode Responses Statistics
===============================
Number of accepted HTTP POST requests ................................ 0
Number of rejected HTTP POST requests ................................ 0
Number of rejected HTTP POST requests with error page ................ 0
Number of failures at handling usermode result on held connection .... 0
Number of accepted emails ............................................ 0
Number of rejected emails ............................................ 0
[Expert@MyGW:0]#
$FWDIR/modules/fw_kern_64.o
$FWDIR/modules/fw_kern_64_v6.o
$PPKDIR/modules/sim_kern_64.o
$PPKDIR/modules/sim_kern_64_v6.o
fw ctl set
-d
<
>
< >
-a
$FWDIR/modules/fw_*.o
$PPKDIR/modules/sim_*.o
ifn=2
cpstat
cpstat -f ifconfig os
cpstat -f interfaces fw
-d
-d
/var/log/messages
dmesg
{-h | -help}
-a
-A
-A
-a
-d
-s
-l
-s
-o < >
-p
-s
-s
-d -l
-p
-t < >
chain
connh
cookie
kbuf
num
[Expert@GW_HostName:0]# cp -v /var/log/messages{,_BKP}
[Expert@GW_HostName:0]# dmesg -c
[Expert@GW_HostName:0]# dmesg
[Expert@GW_HostName:0]# cat /var/log/messages
[Expert@GW_HostName:0]# cp -v /var/log/messages{,_LEAK_DETECTION}
/var/log/messages_LEAK_DETECTION
[Expert@MyGW:0]# cp -v /var/log/messages{,_BKP}
`/var/log/messages' -> `/var/log/messages_BKP'
[Expert@MyGW:0]#
[Expert@MyGW:0]# echo '' > /var/log/messages
[Expert@MyGW:0]#
[Expert@MyGW:0]# dmesg -c
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw ctl leak -s
[Expert@MyGW:0]#
[Expert@MyGW:0]# dmesg
[fw4_0];fwleak_report: type chain - 0 objects
[fw4_0];fwleak_report: type cookie - 0 objects
[fw4_0];fwleak_report: type kbuf - 0 objects
[fw4_0];fwleak_report: type connh - 0 objects
[fw4_1];fwleak_report: type chain - 0 objects
[fw4_1];fwleak_report: type cookie - 0 objects
[fw4_1];fwleak_report: type kbuf - 0 objects
[fw4_1];fwleak_report: type connh - 0 objects
[fw4_2];fwleak_report: type chain - 0 objects
[fw4_2];fwleak_report: type cookie - 0 objects
[fw4_2];fwleak_report: type kbuf - 0 objects
[fw4_2];fwleak_report: type connh - 0 objects
[Expert@MyGW:0]#
[Expert@MyGW:0]# cat /var/log/messages
Sep 12 16:09:50 2018 MyGW kernel: [fw4_0];fwleak_report: type chain - 0 objects
Sep 12 16:09:50 2018 MyGW kernel: [fw4_0];fwleak_report: type cookie - 0 objects
Sep 12 16:09:50 2018 MyGW kernel: [fw4_0];fwleak_report: type kbuf - 0 objects
Sep 12 16:09:50 2018 MyGW kernel: [fw4_0];fwleak_report: type connh - 0 objects
Sep 12 16:09:50 2018 MyGW kernel: [fw4_1];fwleak_report: type chain - 0 objects
Sep 12 16:09:50 2018 MyGW kernel: [fw4_1];fwleak_report: type cookie - 0 objects
Sep 12 16:09:50 2018 MyGW kernel: [fw4_1];fwleak_report: type kbuf - 0 objects
Sep 12 16:09:50 2018 MyGW kernel: [fw4_1];fwleak_report: type connh - 0 objects
Sep 12 16:09:50 2018 MyGW kernel: [fw4_2];fwleak_report: type chain - 0 objects
Sep 12 16:09:50 2018 MyGW kernel: [fw4_2];fwleak_report: type cookie - 0 objects
Sep 12 16:09:50 2018 MyGW kernel: [fw4_2];fwleak_report: type kbuf - 0 objects
Sep 12 16:09:50 2018 MyGW kernel: [fw4_2];fwleak_report: type connh - 0 objects
[Expert@MyGW:0]
[Expert@MyGW:0]# cp -v /var/log/messages{,_LEAK_DETECTION}
`/var/log/messages' -> `/var/log/messages_LEAK_DETECTION'
[Expert@MyGW:0]#
-d
-c
fwmultik_global_stats
fwmultik_gconn_stats
fwmultik_stats
-h
-k
-l
-m
-o
-s
-v 4 -v 4 -v 4
-v 6
Cookies:
91808 total, 0 alloc, 0 free,
2 dup, 91808 get, 0 put,
182258 len, 909 cached len, 0 chain alloc,
0 chain free
Connections:
0 total, 0 TCP, 0 UDP, 0 ICMP,
0 other, 0 anticipated, 0 recovered, -3 concurrent,
0 peak concurrent
Fragments:
0 fragments, 0 packets, 0 expired, 0 short,
0 large, 0 duplicates, 0 failures
NAT:
0/0 forw, 0/0 bckw, 0 tcpudp,
0 icmp, 0-0 alloc
[Expert@MyGW:0]#
Cookies:
91808 total, 0 alloc, 0 free,
2 dup, 91808 get, 0 put,
182258 len, 909 cached len, 0 chain alloc,
0 chain free
Connections:
0 total, 0 TCP, 0 UDP, 0 ICMP,
0 other, 0 anticipated, 0 recovered, -3 concurrent,
0 peak concurrent
Fragments:
0 fragments, 0 packets, 0 expired, 0 short,
0 large, 0 duplicates, 0 failures
NAT:
0/0 forw, 0/0 bckw, 0 tcpudp,
0 icmp, 0-0 alloc
Unable to open '/dev/fw6v0': No such file or directory
fw_get_kernel_instance_num: Invalid instance num 0 - return 0
VS 0 info:
CPU 0:
notifications handled: 64322, conn create failed: 0,
conns not from pool: 0, conns from pool: 6466, conns deleted: 9224, conn delete failed: 0,
bad notifications: 0,
pkt_partial_search: 367, pkt_partial_match: 0,
pkt_localsrc_search: 0, pkt_localsrc_match: 0
CPU 1:
notifications handled: 16624, conn create failed: 0,
conns not from pool: 0, conns from pool: 576, conns deleted: 2400, conn delete failed: 0, bad
notifications: 0,
pkt_partial_search: 46, pkt_partial_match: 0,
pkt_localsrc_search: 0, pkt_localsrc_match: 0
CPU 2:
notifications handled: 7460, conn create failed: 0,
conns not from pool: 0, conns from pool: 441, conns deleted: 2142, conn delete failed: 0, bad
notifications: 0,
pkt_partial_search: 26, pkt_partial_match: 0,
pkt_localsrc_search: 0, pkt_localsrc_match: 0
CPU 3:
notifications handled: 7090, conn create failed: 0,
conns not from pool: 0, conns from pool: 375, conns deleted: 1946, conn delete failed: 0, bad
notifications: 0,
pkt_partial_search: 28, pkt_partial_match: 0,
pkt_localsrc_search: 0, pkt_localsrc_match: 0
FWMULTIK STAT:
VS 0 info:
CPU 0:
Zeco: 0 data mapped, 0 data unmapped, 0 shared info mapped, 0 shared info unmapped
cut through: 0, non linear skbs: 0, shared skbs: 0
data alloc from pool: 0, data alloc not from pool: 0
CPU 1:
Zeco: 0 data mapped, 0 data unmapped, 0 shared info mapped, 0 shared info unmapped
cut through: 0, non linear skbs: 0, shared skbs: 0
data alloc from pool: 0, data alloc not from pool: 0
CPU 2:
Zeco: 0 data mapped, 0 data unmapped, 0 shared info mapped, 0 shared info unmapped
cut through: 0, non linear skbs: 0, shared skbs: 0
data alloc from pool: 0, data alloc not from pool: 0
CPU 3:
Zeco: 0 data mapped, 0 data unmapped, 0 shared info mapped, 0 shared info unmapped
cut through: 0, non linear skbs: 0, shared skbs: 0
data alloc from pool: 0, data alloc not from pool: 0
VS 0 info:
INSTANCE 0:
multik_forwarding: 0
INSTANCE 1:
multik_forwarding: 0
INSTANCE 2:
multik_forwarding: 0
Cookies:
91808 total, 0 alloc, 0 free,
2 dup, 91808 get, 0 put,
182258 len, 909 cached len, 0 chain alloc,
0 chain free
Connections:
0 total, 0 TCP, 0 UDP, 0 ICMP,
0 other, 0 anticipated, 0 recovered, -3 concurrent,
0 peak concurrent
Fragments:
0 fragments, 0 packets, 0 expired, 0 short,
0 large, 0 duplicates, 0 failures
NAT:
0/0 forw, 0/0 bckw, 0 tcpudp,
0 icmp, 0-0 alloc
Cookies:
91808 total, 0 alloc, 0 free,
2 dup, 91808 get, 0 put,
182258 len, 909 cached len, 0 chain alloc,
0 chain free
Connections:
0 total, 0 TCP, 0 UDP, 0 ICMP,
0 other, 0 anticipated, 0 recovered, -3 concurrent,
0 peak concurrent
Fragments:
0 fragments, 0 packets, 0 expired, 0 short,
0 large, 0 duplicates, 0 failures
NAT:
0/0 forw, 0/0 bckw, 0 tcpudp,
0 icmp, 0-0 alloc
Cookies:
91808 total, 0 alloc, 0 free,
2 dup, 91808 get, 0 put,
182258 len, 909 cached len, 0 chain alloc,
0 chain free
Connections:
0 total, 0 TCP, 0 UDP, 0 ICMP,
0 other, 0 anticipated, 0 recovered, -3 concurrent,
0 peak concurrent
Fragments:
0 fragments, 0 packets, 0 expired, 0 short,
0 large, 0 duplicates, 0 failures
NAT:
0/0 forw, 0/0 bckw, 0 tcpudp,
0 icmp, 0-0 alloc
Handles:
table name "kbufs"
3 handles, 6 pools, 6 maximum pool(s)
18249 allocated, 0 failed, 18246 freed
6 pool(s) allocated, 0 failed, 0 freed, 0 not preallocated
Cookies:
91808 total, 0 alloc, 0 free,
2 dup, 91808 get, 0 put,
182258 len, 909 cached len, 0 chain alloc,
0 chain free
Connections:
0 total, 0 TCP, 0 UDP, 0 ICMP,
0 other, 0 anticipated, 0 recovered, -3 concurrent,
0 peak concurrent
Fragments:
0 fragments, 0 packets, 0 expired, 0 short,
0 large, 0 duplicates, 0 failures
NAT:
0/0 forw, 0/0 bckw, 0 tcpudp,
0 icmp, 0-0 alloc
Unable to open '/dev/fw6v0': No such file or directory
fw_get_kernel_instance_num: Invalid instance num 0 - return 0
VS 0 info:
FWMULTIK STAT:
VS 0 info:
Zeco: 0 data mapped, 0 data unmapped, 0 shared info mapped, 0 shared info unmapped
cut through: 0, non linear skbs: 0, shared skbs: 0
data alloc from pool: 0, data alloc not from pool: 0
VS 0 info:
multik_forwarding: 0
Cookies:
91808 total, 0 alloc, 0 free,
2 dup, 91808 get, 0 put,
182258 len, 909 cached len, 0 chain alloc,
0 chain free
Connections:
0 total, 0 TCP, 0 UDP, 0 ICMP,
0 other, 0 anticipated, 0 recovered, -3 concurrent,
0 peak concurrent
Fragments:
0 fragments, 0 packets, 0 expired, 0 short,
0 large, 0 duplicates, 0 failures
NAT:
0/0 forw, 0/0 bckw, 0 tcpudp,
0 icmp, 0-0 alloc
Cookies:
91808 total, 0 alloc, 0 free,
2 dup, 91808 get, 0 put,
182258 len, 909 cached len, 0 chain alloc,
0 chain free
Connections:
0 total, 0 TCP, 0 UDP, 0 ICMP,
0 other, 0 anticipated, 0 recovered, -3 concurrent,
0 peak concurrent
Fragments:
0 fragments, 0 packets, 0 expired, 0 short,
0 large, 0 duplicates, 0 failures
NAT:
0/0 forw, 0/0 bckw, 0 tcpudp,
0 icmp, 0-0 alloc
$FWDIR/modules/fw_kern_64.o
$FWDIR/modules/fw_kern_64_v6.o
$PPKDIR/modules/sim_kern_64.o
$PPKDIR/modules/sim_kern_64_v6.o
$FWDIR/modules/fwkern.conf
$FWDIR/modules/vpnkern.conf
$PPKDIR/conf/simkern.conf
fw ctl get
-d
<
>
< >
[Expert@MyGW:0]# fw ctl get int fw_kdprintf_limit
fw_kdprintf_limit = 100
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw ctl set int fw_kdprintf_limit 50
Set operation succeeded
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw ctl get int fw_kdprintf_limit
fw_kdprintf_limit = 50
[Expert@MyGW:0]#
fw [-d] ctl tcpstrstat
-p
-r
-d
-p
-r
General Counters:
=================
Connections:
Concurrent num of connections ............. 0
Concurrent num of si connections .......... 0
Packets:
Total num of packets ...................... 2567
Total packets in bytes .................... 202394
Concurrent num of async packets ........... 0
Memory:
Allocated memory in bytes ................. 0
Referenced skbuffs num .................... 0
Referenced skbuffs size in bytes .......... 0
External packet references................. 0
Allocated memory per connection ........... 0
Rejected packets/connections:
Total num of rejected packets ............. 0
Dropped packets/connections:
Total num of dropped packets .............. 0
Stripped/Truncated packets:
Total num of stripped packets ............. 0
Total num of truncated packets ............ 0
Paused packets:
Total num of c2s|s2c paused packets ....... 0 | 0
Concurrent num of UDP held packets ........ 0
Applications Counters:
======================
Application Name: ASPII_MT
Connections:
Total num of connections .................. 954
Concurrent num of connections ............. 0
Total num of c2s|s2c connections .......... 954 | 954
Concurrent num of c2s|s2c connections ..... 0 | 0
Packets:
Total num of c2s|s2c data packets ......... 2567 | 0
Total c2s|s2c data packets in bytes ....... 130518 | 0
FastForward Counters:
=====================
FF connection:
Total num of c2s|s2c FFconns .............. 0 | 0
Total num of c2s|s2c saved packets ........ 0 | 0
Total num of c2s|s2c bytes requests ....... 0 | 0
Total num of c2s|s2c saved bytes .......... 0 | 0
[Expert@MyGW:0]#
General Counters:
=================
Connections:
Concurrent num of connections ............. 0
Concurrent num of si connections .......... 0
Packets:
Total num of packets ...................... 2567
Total packets in bytes .................... 202394
Concurrent num of async packets ........... 0
Memory:
Allocated memory in bytes ................. 0
Referenced skbuffs num .................... 0
Referenced skbuffs size in bytes .......... 0
External packet references................. 0
Allocated memory per connection ........... 0
Rejected packets/connections:
Total num of rejected packets ............. 0
Dropped packets/connections:
Total num of dropped packets .............. 0
Stripped/Truncated packets:
Total num of stripped packets ............. 0
Total num of truncated packets ............ 0
Paused packets:
Total num of c2s|s2c paused packets ....... 0 | 0
Concurrent num of UDP held packets ........ 0
Exception statistics:
=============================
Total num of urgent packets ...................... 0
Total num of invalid SYN retransmissions ......... 0
Total num of SYN sequences not initialized ....... 0
Total num of old packets outside window .......... 0
Total num of old packets outside window truncate . 0
Total num of old packets outside window strip .... 0
Total num of new packets outside window .......... 0
Total num of incorrect retransmissions ........... 0
Total num of TCP packets with incorrect checksum . 0
Total num of ACK on unprocessed data ............. 0
Total num of old ACK outside window .............. 0
Max segments reached ............................. 0
No resources ..................................... 0
Hold timeout ..................................... 0
Packets Manipulations:
=============================
Total num of split packets ....................... 0
Total num of merge packets ....................... 0
Total num of shrink packets ...................... 0
Opaque statistics:
=============================
Release reference:
End Handler ........... 954
Applications Counters:
======================
Application Name: ASPII_MT
Connections:
Total num of connections .................. 954
Concurrent num of connections ............. 0
Total num of c2s|s2c connections .......... 954 | 954
Concurrent num of c2s|s2c connections ..... 0 | 0
Packets:
Total num of c2s|s2c data packets ......... 2567 | 0
Total c2s|s2c data packets in bytes ....... 130518 | 0
FastForward Counters:
=====================
FF connection:
Total num of c2s|s2c FFconns .............. 0 | 0
Total num of c2s|s2c saved packets ........ 0 | 0
Total num of c2s|s2c bytes requests ....... 0 | 0
Total num of c2s|s2c saved bytes .......... 0 | 0
[Expert@MyGW:0]#
RTM
fw ctl uninstall
-d
comp_init_policy
control_bootsec
fwboot default
fwboot bootconf
fw [-d] defaultgen
–d
defaultgen
$FWDIR/state/default.bin
$FWDIR/state/default.bin6
$FWDIR/state/default.bin.bak
$FWDIR/state/default.bin6.bak
[Expert@MyGW:0]# fw defaultgen
Generating default filter
defaultfilter:
Compiled OK.
defaultfilter:
Compiled OK.
Backing up default.bin as default.bin.bak
hostaddr(MyGW) failed
Backing up default.bin6 as default.bin6.bak
[Expert@MyGW:0]#
fw [-d] fetch -f [-i] [-n] [-r]
fw [-d] fetch [-i] [-n] [-r] <Master 1> [<Master 2> ...]
fw [-d] fetch local [-nu]
fw [-d] fetch localhost [-nu]
fw [-d] fetchlocal -d <Full Path to Directory>
fw -d fetch...
script
-c
-f
-f
$FWDIR/conf/masters
-i
-n
-nu
-r
< > [< > ...]
< >
< >
< >
localhost
< >
localhost
-d < >
$FWDIR/log/*.log*
$FWDIR/log/*.adtlog*
fw [-d] fetchlogs [-f <Name of Log File 1>] [-f <Name of Log File 2>]... [-f <Name
of Log File N>] <Target>
-d
-f < >
$FWDIR/log/*.log*
$FWDIR/log/*.adtlog*
2017-0?-*.log
-f
<
< >
< >
$FWDIR/log/
$FWDIR/log/
$FWDIR/log/fw.log
$FWDIR/log/fw.adtlog
MyGW__2018-06-01_000000.log
[Expert@HostName:0]# ls $FWDIR/log/MyGW*
/opt/CPsuite-R80.30/fw1/log/MyGW__2018-06-01_000000.log
/opt/CPsuite-R80.30/fw1/log/MyGW__2018-06-01_000000.logaccount_ptr
/opt/CPsuite-R80.30/fw1/log/MyGW__2018-06-01_000000.loginitial_ptr
/opt/CPsuite-R80.30/fw1/log/MyGW__2018-06-01_000000.logptr
[Expert@HostName:0]#
cpstat
cpstat -f ifconfig os
cpstat -f interfaces fw
fw [-d] getifs
-d
[Expert@MyGW:0]# fw getifs
localhost eth0 192.168.30.40 255.255.255.0
localhost eth1 172.30.60.80 255.255.255.0
[Expert@MyGW:0]#
fw hastat
show cluster state
cphaprob state
cpstat
[Expert@MGMT:0]# fw hastat
[Expert@Member1:0]# fw hastat
HOST NUMBER HIGH AVAILABILITY STATE MACHINE STATUS
192.168.3.52 1 active OK
[Expert@Member1:0]#
fw [-d] isp_link
{-h | -help}
[<Name of Object>] <Name of ISP Link>
down
up
-d
{-h | -help}
< >
< >
down
up
fw [-d] kill [-t <Signal Number>] <Name of Process>
-d
-t <
> kill -l
kill signal
SIGTERM
< >
fw kill fwd
fw [-d] lichosts [-l] [-x]
-d
-l
-x
[Expert@MyGW:0]# fw lichosts
License allows an unlimited number of hosts
[Expert@MyGW:0]
$FWDIR/log/*.log
$FWDIR/log/*.adtlog
{-h | -help}
-d
script
-a
-b "< >"
"< >"
< > < >
fw log ctl
authcrypt
-e "< >"
< >
< >
-e '...' -e "..."
-e -b
-f
$FWDIR/log/fw.log
$FWDIR/log/fw.adtlog
-g
-H
-h < >
-i
-k {< > |
all}
< >
alert
mail
snmp_trap
spoof
user_alert
user_auth
all
-l
-m
initial
-f
semi
semi
raw
-n
-o
-p
-q
-S
-s "< >"
< >
< >
-s '...' -s "..."
-s -b
-t
$FWDIR/log/fw.log
$FWDIR/log/fw.adtlog
-u <
>
$FWDIR/conf/log_unification_scheme.C
-w
-x < >
-y < >
-z
-#
< >
$FWDIR/log/fw.log
MMM DD, YYYY June 11, 2018
HH:MM:SS 14:20:00
Action accept
dropreject
encrypt
decrypt
vpnroute
keyinst
authorize
deauthorize
authcrypt
ctl
Origin MyGW
IfDir <
>
<
>
InterfaceName eth0
daemon
N/A
daemon
LogId 0
Alert
alert
mail
snmp_trap
spoof
user_alert
user_auth
OriginSicName CN=MyGW,O=MyDomain_Server.check
point.com.s6t98x
inzone Local
outzone External
service_id ftp
src MyHost
dst MyFTPServer
proto tcp
sport_svc 64933
fw log -l
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>;
OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone: Local;
outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp;
UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid:
4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid:
802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table:
TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0;
UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc:
64933; ProductFamily: Network;
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw log -l -b "June 12, 2018 12:33:00" 'June 12, 2018 12:34:00'
12Jun2018 12:33:00 5 N/A 1 accept MyGW > N/A LogId: <max_null>; ContextNum:
<max_null>; OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x;
fg-1_client_in_rule_name: Default; fg-1_client_out_rule_name: Default;
fg-1_server_in_rule_name: Host Redirect; fg-1_server_out_rule_name: ;
ProductName: FG; ProductFamily: Network;
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>;
OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone: Local;
outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp;
UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid:
4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid:
802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table:
TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0;
UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc:
64933; ProductFamily: Network;
[Expert@MyGW:0]# fw log -l -x 0 -y 10
... ...
[Expert@MyGW:0]#
$FWDIR/log/fw.log
$FWDIR/log/fw.adtlog
fw [-d] logswitch
[-audit] [<Name of Switched Log>]
-h <Target> [[+ | -]<Name of Switched Log>]
-d
-audit $FWDIR/log/fw.adtlog
-h < >
<
>
<YYYY-MM-DD_HHMMSS>.log
<YYYY-MM-DD_HHMMSS>.adtlog
<Specified_Log_Name>.log
<Specified_Log_Name>.adtlog
$FWDIR/log/
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
<Gateway_Object_Name>__<Specified_Log_Name>.log
-
$FWDIR/log/
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
<Gateway_Object_Name>__<Specified_Log_Name>.log
fw fetchlogs
gzip
[Expert@MGMT:0]# fw logswitch
Log file has been switched to: 2018-06-13_182359.log
[Expert@MGMT:0]#
fw [-d] lslogs [-f <Name of Log File 1>] [-f <Name of Log File 2>] ... [-f <Name
of Log File N>] [-e] [-r] [-s {name | size | stime | etime}] [<Target>]
-d
script
-f < >
$FWDIR/log/*.log
2017-0?-*
-f
-e
Size
Creation Time
Closing Time
Log File Name
-r
-s {name | size |
stime | etime}
name
size
stime
etime
< >
< >
< >
[Expert@MGMT:0]# fw lslogs
Size Log file name
9KB 2018-06-14_000000.log
11KB 2018-06-15_000000.log
9KB 2018-06-16_000000.log
10KB 2018-06-17_000000.log
9KB fw.log
[Expert@MGMT:0]#
Warning: The size of the files you have chosen to merge is greater than
2GB. The merge will produce two or more files.
.log
_1.log
_2.log
... ...
_N.log
fw [-d] mergefiles
{-h | -help}
[-s] [-r] [-t <Time Conversion File>] <Log File 1> [<Log File 2> ... <Log File
N>] <Output Log File>
-d
script
{-h | -help}
-r
-s
-t < >
[Expert@MyGW:0]# ls -l $FWDIR/*.log
-rw-rw-r-- 1 admin root 189497 Sep 7 00:00 2018-09-07_000000.log
-rw-rw-r-- 1 admin root 14490 Sep 9 09:52 2018-09-09_000000.log
-rw-rw-r-- 1 admin root 30796 Sep 10 10:56 2018-09-10_000000.log
-rw-rw-r-- 1 admin root 24503 Sep 10 13:08 fw.log
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw mergefiles -s $FWDIR/2018-09-07_000000.log $FWDIR/2018-09-09_000000.log
$FWDIR/2018-09-10_000000.log /var/log/2018-Sep-Merged.log
[Expert@MyGW:0]#
[Expert@MyGW:0]# ls -l /var/log/2018-Sep-Merged.log*
-rw-rw---- 1 admin root 213688 Sep 10 13:18 /var/log/2018-Sep-Merged.log
-rw-rw---- 1 admin root 8192 Sep 10 13:18 /var/log/2018-Sep-Merged.logLuuidDB
-rw-rw---- 1 admin root 80 Sep 10 13:18 /var/log/2018-Sep-Merged.logaccount_ptr
-rw-rw---- 1 admin root 2264 Sep 10 13:18 /var/log/2018-Sep-Merged.loginitial_ptr
-rw-rw---- 1 admin root 4448 Sep 10 13:18 /var/log/2018-Sep-Merged.logptr
[Expert@MyGW:0]#
fw monitor
fw monitor
$FWDIR/tmp/monitorfilter.*
{-h | -help}
-d
-D
-d
-D
-ci <
>
-co <
> -ci
-co
-ci -co
-e <
> -e < >
-f -
^D
$FWDIR/lib/fwmonitor.def
-i
-v < >
-l < >
-m {i, I, o, O, e,
E}
-m i
-m I
-m o
-m O
-m e
-m E
... -m o -m O ...
-m {i, I, o, O,
e, E}
-p{i | I | o | O}
/var/log/
snoop
-pi < >
-pI < >
-po < >
-o < >
-pO < >
-p all [-a]
-pi < >
-p all [-a]
-a
fw ctl chain
< >
fw ctl chain
fw ctl chain
sxl_in
fw cpas
fw ctl chain
-p{i | I|
o | O} ... -m
{i, I, o, O, e, E}
-T
DDMMMYYYY HH:MM:SS.mmmmmm
-u
-u
-s
-s
-v < >
-x
< >[,< >]
< >
< >
-x
52,96
eth4:i
eth4:I
eth4:id
eth4:ID
eth4:iq
eth4:IQ
eth4:o
eth4:O
eth4:e
eth4:E
eth4:oq
eth4:OQ
[Expert@MyGW:0]# fw monitor
monitor: getting filter (from command line)
monitor: compiling
monitorfilter:
Compiled OK.
monitor: loading
monitor: monitoring (control-C to stop)
[vs_0][fw_1] eth0:i[40]: 192.168.204.1 -> 192.168.204.40 (TCP) len=40 id=31789
TCP: 53901 -> 22 ....A. seq=761113cd ack=f92e2a13
[vs_0][fw_1] eth0:I[40]: 192.168.204.1 -> 192.168.204.40 (TCP) len=40 id=31789
TCP: 53901 -> 22 ....A. seq=761113cd ack=f92e2a13
[vs_0][fw_1] eth0:i[40]: 192.168.204.1 -> 192.168.204.40 (TCP) len=40 id=31790
TCP: 53901 -> 22 ....A. seq=761113cd ack=f92e2a47
... ... ...
monitor: caught sig 2
monitor: unloading
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw monitor -T
monitor: getting filter (from command line)
monitor: compiling
monitorfilter:
Compiled OK.
monitor: loading
monitor: monitoring (control-C to stop)
[vs_0][fw_1] 12Sep2018 19:08:05.453947 eth0:oq[124]: 192.168.3.53 -> 172.20.168.16 (TCP) len=124
id=38414
TCP: 22 -> 64424 ...PA. seq=1c23924a ack=3c951092
[vs_0][fw_1] 12Sep2018 19:08:05.453960 eth0:OQ[124]: 192.168.3.53 -> 172.20.168.16 (TCP) len=124
id=38414
TCP: 22 -> 64424 ...PA. seq=1c23924a ack=3c951092
[vs_0][fw_1] 12Sep2018 19:08:05.454059 eth0:oq[252]: 192.168.3.53 -> 172.20.168.16 (TCP) len=252
id=38415
TCP: 22 -> 64424 ...PA. seq=1c23929e ack=3c951092
[vs_0][fw_1] 12Sep2018 19:08:05.454064 eth0:OQ[252]: 192.168.3.53 -> 172.20.168.16 (TCP) len=252
id=38415
TCP: 22 -> 64424 ...PA. seq=1c23929e ack=3c951092
[vs_0][fw_1] 12Sep2018 19:08:05.454072 eth0:oq[252]: 192.168.3.53 -> 172.20.168.16 (TCP) len=252
id=38416
TCP: 22 -> 64424 ...PA. seq=1c239372 ack=3c951092
[vs_0][fw_1] 12Sep2018 19:08:05.454074 eth0:OQ[252]: 192.168.3.53 -> 172.20.168.16 (TCP) len=252
id=38416
TCP: 22 -> 64424 ...PA. seq=1c239372 ack=3c951092
[vs_0][fw_1] 12Sep2018 19:08:05.463165 eth0:iq[40]: 172.20.168.16 -> 192.168.3.53 (TCP) len=40 id=17398
TCP: 64424 -> 22 ....A. seq=3c951092 ack=1c239446
[vs_0][fw_1] 12Sep2018 19:08:05.463177 eth0:IQ[40]: 172.20.168.16 -> 192.168.3.53 (TCP) len=40 id=17398
TCP: 64424 -> 22 ....A. seq=3c951092 ack=1c239446
monitor: unloading
[Expert@MyGW:0]#
-u
< >
fw repairlog -u 2018-06-17_000000.adtlog
fw sam
fw sam_policy sam_alert
fw sam
$FWDIR/log/sam.dat
<type>,<actions>,<expire>,<ipaddr>
<type>,<actions>,<expire>,<src>,<dst>,<dport>,<ip_p>
sam_blocked_ips
[Expert@HostName:0]# fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-t <Timeout>] [-l <Log Type>] [-C] [-e <key=val>]+ [-r]
-{n|i|I|j|J} <Criteria>
[Expert@HostName:0]# fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] -D
[Expert@HostName:0]# fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-r] -M -{i|j|n|b|q} all
[Expert@HostName:0]# fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM Server>]
[-f <Security Gateway>] [-r] -M -{i|j|n|b|q} <Criteria>
-d
-v
-s < >
localhost
-S <
>
-f <
> < >
fw sam
-D -i -j -I -J -n
fw sam
-C -D
-C fw sam
fw sam -t <Timeout>
-t < >
fw sam
-l < >
nolog
short_noalert
short_alert
long_noalert
long_alert
-e < >+
name
comment
originator
-r
-n
-i
-I
-j
-J
-b
-q
-M
all
< >
service=gtp
imsi
msisdn
apn
tunl_dst
tunl_dport
tunl_proto
fw sam
sam_alert
fw sam_policy fw samp
$FWDIR/database/sam_policy.db
$FWDIR/database/sam_policy.mng
set virtual-system < >
vsenv < >
fw [-d] sam_policy
add <options>
batch
del <options>
get <options>
fw [-d] samp
add <options>
batch
del <options>
get <options>
-d
batch
del < >
set virtual-system < >
vsenv < >
fw [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f <Target>] [-n
<"Rule Name">] [-c <"Rule Comment">] [-o <"Rule Originator">] [-z <"Zone">]
ip <IP Filter Arguments>
quota <Quota Filter Arguments>
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f <Target>]
[-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule Originator">] [-z <"Zone">]
ip <IP Filter Arguments>
quota <Quota Filter Arg
-d
script
-u
User-defined
Auto
-a {d | n | b}
d
n
b
-l {r | a}
-r
-a
-t < >
-f < >
< >
all
-n "< >"
[flush true]
[source-negated {true | false}] source < >
[destination-negated {true | false}]
destination < >
[service-negated {true | false}] service
< >
[< >< >] [< ><
>] ...[< > < >]
[track < >]
-C
-s < >
-m < >
-d < >
-M < >
-p < >
-r < >
flush true
[source-negated {true |
false}] source < >
any
range:< >
cidr:< >/< >
cc:< >
asn:< >
source-negated false
source-negated true
[destination-negated {true |
false}] destination
< > any
range:< >
cidr:< >/< >
cc:< >
asn:< >
destination-negated false
destination-negated true
[service-negated {true |
false}] service <
>
< >
service-negated false
service-negated true
[< > < >]
[< > < >]
...
[< > < >] concurrent-conns < >
N / 65536
pkt-rate < >
N / 65536
byte-rate < >
N / 65536
new-conn-rate < >
N / 65536
[track < >]
source
source-service
fw sam_policy add -a d -l r -t 3600 quota service any source
range:172.16.7.11-172.16.7.13 new-conn-rate 5 flush true
-a d
-l r
-t 3600
new-conn-rate 5 service any
source range:172.16.7.11-172.16.7.13
flush true
-a n
timeout
service-negated true
service
1,50-51,6/443,17/53
cc:QQ
byte-rate 0
flush true
-a d
timeout
asn:AS64500
cidr:[::FFFF:C0A8:1100]/120
service any
pkt-rate 0
flush true
-a b
timeout
range:172.16.8.17-172.16.9.121
service 6/80
flush true
-a d
-l r
timeout
service any
source-negated true
cc:QQ
concurrent-conns-ratio 655 service any
service-negated true
cc:QQ
flush true
fw sam_policy batch fw6 sam_policy batch
set virtual-system < >
vsenv < >
add del
add -a d -l r -t 3600 -c "Limit\ conn\ rate\ to\ 5\ conn/sec from\ these\ sources"
quota service any source range:172.16.7.13-172.16.7.13 new-conn-rate 5
del <501f6ef0,00000000,cb38a8c0,0a0afffe>
EOF
fw sam_policy del fw6 sam_policy del
set virtual-system < >
vsenv < >
-d fw
script
'< >'
'<...>'
fw sam_policy get fw6
sam_policy get
fw sam_policy get
fw6 sam_policy get
set virtual-system < >
vsenv < >
fw [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t <Type> [+{-v '<Value>'}]
[-n]]
fw6 [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t <Type> [+{-v
'<Value>'}] [-n]]
-d
-l
-l
-l
-u '< >'
-k '
-t
-t in
+{-v '< >'}
-n
-k
-t
+-v
uid
<5ac3965f,00000000,3403a8c0,0000264a>
target
all
timeout
2147483647
action
notify
log
log
name
Test\ Rule
comment
Notify\ about\ traffic\ from\ 1.1.1.1
originator
John\ Doe
src_ip_addr
1.1.1.1
req_type
ip
[Expert@GW:0]# fw samp get -u '<5ac3965f,00000000,3403a8c0,0000264a>'
0
operation=add uid=<5ac3965f,00000000,3403a8c0,0000264a> target=all timeout=300
action=notify log=log name=Test\ Rule comment=Notify\ about\ traffic\ from\
1.1.1.1 originator=John\ Doe src_ip_addr=1.1.1.1 req_tpe=ip
-d
-h
-i
[Expert@MyGW:0]# fw showuptables
Error: table up_0_day_in_month_intvl was not found
Error: table up_0_day_in_week_intvl was not found
Error: table up_0_month_intvl was not found
Error: table up_0_time_of_day_intvl was not found
Error: table up_0_time_period_intvl was not found
Error: table sslIns_rb_src_uuid_list was not found
Error: table sslIns_rb_dst_negate_uuid_list was not found
Error: table sslIns_rb_src_negate_uuid_list was not found
Error: table sslIns_rb_dst_uuid_list was not found
********************
Printing UP Tables
********************
_____________________________
up_0_compound_clob_lists
9112
_____________________________
up_0_negate_compound
9116
_____________________________
up_0_clob_id_to_rnum
9110
_____________________________
up_0_rule_to_clob_uuid
9119
_____________________________
up_0_n_clob_id_to_rnum
9111
_____________________________
up_0_columns_utility
9109
_____________________________
up_0_compound_to_clob_mask
9117
_____________________________
up_0_clob_lists
9118
_____________________________
up_0_n_simple_to_compound
9114
_____________________________
up_0_any_compound
9115
_____________________________
up_0_dst_ip_intvl
9102
_____________________________
up_0_clob_type_scheme
9108
_____________________________
up_0_dst_zone
9104
_____________________________
up_0_rnum_lists
9106
_____________________________
up_0_action_track
9107
_____________________________
up_0_src_ip_intvl
9101
_____________________________
up_0_src_zone
9103
_____________________________
up_0_simple_to_compound
9113
_____________________________
dynobj_to_ip_ranges2
9145
_____________________________
dynobj_to_ip_ranges1
9141
_____________________________
unresolved_dynobjs2
9144
_____________________________
ip_range_to_dynobj1
9138
_____________________________
sslIns_rb_dst_intvl_list
529
_____________________________
ip_range_to_dynobj_kbufs1
9140
_____________________________
ip_range_to_dynobj_kbufs2
9143
_____________________________
sslIns_rb_src_intvl_list
528
[Expert@MyGW:0]#
cpstat
-d
-l
Total
Reject
Drop
Accept
Log
-s
< >
[Expert@MyGW:0]# fw stat
HOST POLICY DATE
localhost MyGW_Policy 10Sep2018 14:01:25 : [>eth0] [<eth0] [>eth1]
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw stat -s
HOST IF POLICY DATE
localhost >eth0 MyGW_Policy 10Sep2018 14:01:25 :
localhost <eth0 MyGW_Policy 10Sep2018 14:01:25 :
localhost >eth1 MyGW_Policy 10Sep2018 14:01:25 :
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw stat -l
HOST IF POLICY DATE TOTAL REJECT DROP
ACCEPT LOG
localhost >eth0 MyGW_Policy 10Sep2018 14:01:25 : 14377 0 316
14061 1
localhost <eth0 MyGW_Policy 10Sep2018 14:01:25 : 60996 0 0
60996 0
localhost >eth1 MyGW_Policy 10Sep2018 14:01:25 : 304 0 304
0 0
[Expert@MyGW:0]#
fw ctl conntab
fw [-d]
{-h | -help}
[-v] [-t <Table>] [-c | -s] [-f] [-o <Output File>] [-r] [-u | -m <Limit>]
[-a -e <Entry>] [ -x [-e <Entry>]] [-y] [<Name of Object>]
-d
{-h | -help}
-t < >
fw tab
-s
-c
-e < >
-f
-o < >
fw log
-m < >
-r
-s
-u
-v
-y
-a -x
< >
localhost
[Expert@MyGW:0]# fw tab -s
HOST NAME ID #VALS #PEAK #SLINKS
localhost vsx_firewalled 0 1 1 0
localhost firewalled_list 1 2 2 0
localhost external_firewalled_list 2 0 0 0
localhost management_list 3 2 2 0
localhost external_management_list 4 0 0 0
localhost log_server_list 5 0 0 0
localhost ips1_sensors_list 6 0 0 0
localhost all_tcp_services 7 141 141 0
localhost tcp_services 8 1 1 0
... ...
localhost connections 8158 2 56 2
... ...
localhost up_251_rule_to_clob_uuid 14083 0 0 0
... ...
localhost urlf_cache_tbl 29 0 0 0
localhost proxy_outbound_conn_tbl 30 0 0 0
localhost dns_cache_tbl 31 0 0 0
localhost appi_referrer_table 32 0 0 0
localhost uc_hits_htab 33 0 0 0
localhost uc_cache_htab 34 0 0 0
localhost uc_incident_to_instance_htab 35 0 0 0
localhost fwx_cntl_dyn_ghtab 36 0 0 0
localhost frag_table 37 0 0 0
localhost dos_blacklist_notifs 38 0 0 0
[Expert@MyGW:0]#
localhost:
Date: Sep 10, 2018
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>;
OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : (+)====================================(+); Table_Name:
connections; : (+); Attributes: dynamic, id 8158, attributes: keep, sync, aggressive aging, kbufs 21
22 23 24 25 26 27 28 29 30 31 32 33 34, expires 25, refresh, , hashsize 2097152, unlimited; LastUpdateTime:
10Sep2018 20:30:48; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>;
OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction: 1;
Source: 192.168.204.40; SPort: 55411; Dest: 192.168.204.1; DPort: 53; Protocol: udp; CPTFMT_sep: ;;
Type: 131073; Rule: 0; Timeout: 335; Handler: 0; Ifncin: -1; Ifncout: -1; Ifnsin: 1; Ifnsout: 1; Bits:
0000780000000000; Expires: 2/40; LastUpdateTime: 10Sep2018 20:30:48; ProductName: VPN-1 & FireWall-1;
ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>;
OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction: 0;
Source: 192.168.204.1; SPort: 53901; Dest: 192.168.204.40; DPort: 22; Protocol: tcp; CPTFMT_sep: ;;
Type: 114689; Rule: 2; Timeout: 481; Handler: 0; Ifncin: 1; Ifncout: 1; Ifnsin: -1; Ifnsout: -1; Bits:
02007800000f9000; Expires: 2002/3600; LastUpdateTime: 10Sep2018 20:30:48; ProductName: VPN-1 &
FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>;
OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction: 1;
Source: 192.168.204.40; SPort: 22; Dest: 192.168.204.1; DPort: 53901; Protocol: tcp; CPTFMT_sep_1: ->;
Direction_1: 0; Source_1: 192.168.204.1; SPort_1: 53901; Dest_1: 192.168.204.40; DPort_1: 22;
Protocol_1: tcp; FW_symval: 2053; LastUpdateTime: 10Sep2018 20:30:48; ProductName: VPN-1 & FireWall-1;
ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>;
OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction: 0;
Source: 192.168.204.1; SPort: 51702; Dest: 192.168.204.40; DPort: 22; Protocol: tcp; CPTFMT_sep: ;;
Type: 114689; Rule: 2; Timeout: 481; Handler: 0; Ifncin: 1; Ifncout: 1; Ifnsin: -1; Ifnsout: -1; Bits:
02007800000f9000; Expires: 3600/3600; LastUpdateTime: 10Sep2018 20:30:48; ProductName: VPN-1 &
FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>;
OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction: 1;
Source: 192.168.204.40; SPort: 22; Dest: 192.168.204.1; DPort: 51702; Protocol: tcp; CPTFMT_sep_1: ->;
Direction_1: 0; Source_1: 192.168.204.1; SPort_1: 51702; Dest_1: 192.168.204.40; DPort_1: 22;
Protocol_1: tcp; FW_symval: 2053; LastUpdateTime: 10Sep2018 20:30:48; ProductName: VPN-1 & FireWall-1;
ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>;
OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction: 0;
Source: 192.168.204.1; SPort: 53; Dest: 192.168.204.40; DPort: 55411; Protocol: udp; CPTFMT_sep_1: ->;
Direction_2: 1; Source_2: 192.168.204.40; SPort_2: 55411; Dest_2: 192.168.204.1; DPort_2: 53;
Protocol_2: udp; FW_symval: 2054; LastUpdateTime: 10Sep2018 20:30:48; ProductName: VPN-1 & FireWall-1;
ProductFamily: Network;
[Expert@MyGW:0]#
fw unloadlocal
comp_init_policy
fw fetch
cpstart
fwm unload
fw [-d] unloadlocal
-d
[Expert@MyGW:0]# fw unloadlocal
-d
script
ipp=<
>
src=< >
dst=<Destination IP>
sport=< >
dport=<
>
protocol=<
>
application=<
>
Per Layer:
------------
Layer name: Network
Layer id: 0
Match status: MATCH
Match action: Accept
Matched rule: 2
Possible rules: 2 16777215
[Expert@MyGW:0]#
Per Layer:
------------
Layer name: Network
Layer id: 0
Match status: MATCH
Match action: Accept
Matched rule: 2
Possible rules: 2 16777215
[Expert@MyGW:0]#
-d
ver
-k
-f < >
[Expert@MyGW:0]# fw ver -k
This is Check Point's software version R80.20 - Build 123
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw ver -k
This is Check Point's software version R80.20 - Build 123
kernel: R80.20 - Build 456
[Expert@MyGW:0]#
[Expert@HostName:0]# $FWDIR/boot/fwboot
bootconf <options>
corexl <options>
cpuid <options>
default <options>
fwboot_ipv6 <options>
fwdefault <options>
ha_conf <options>
ht <options>
multik_reg <options>
post_drv <options>
bootconf
< >
corexl
< >
cpuid
< >
default
< >
fwboot_ipv6
< >
fwdefault
< >
ha_conf
< >
ht < >
multik_reg
< >
post_drv
< >
$FWDIR/boot/boot.conf
fwboot
bootconf
fwboot corexl
control_bootsec
get_corexl
$FWDIR/boot/boot.conf
COREXL_INSTALLED
get_core_override
$FWDIR/boot/boot.conf
CORE_OVERRIDE
get_def
$FWDIR/boot/default.bin
$FWDIR/boot/boot.conf
DEFAULT_FILTER_PATH
get_ipf
$FWDIR/boot/boot.conf
CTL_IPFORWARDING
get_ipv6
$FWDIR/boot/boot.conf
IPV6_INSTALLED
get_kernnum
$FWDIR/boot/boot.conf
KERN_INSTANCE_NUM
get_kern6num
$FWDIR/boot/boot.conf
KERN6_INSTANCE_NUM
set_corexl <0 | 1>
$FWDIR/boot/boot.conf
COREXL_INSTALLED
cpconfig
set_core_override < >
$FWDIR/boot/boot.conf
CORE_OVERRIDE
set_def [< >]
$FWDIR/boot/default.bin
$FWDIR/boot/boot.conf
DEFAULT_FILTER_PATH
DEFAULT_FILTER_PATH
$FWDIR/boot/
set_ipf <0 | 1>
$FWDIR/boot/boot.conf
CTL_IPFORWARDING
set_ipv6 <0 | 1>
$FWDIR/boot/boot.conf
IPV6_INSTALLED
set_kernnum <number>
$FWDIR/boot/boot.conf
KERN_INSTANCE_NUM
cpconfig
set_kern6num < >
$FWDIR/boot/boot.conf
KERN6_INSTANCE_NUM
cpconfig
fwboot bootconf
cpconfig
default
def_instance4_count
-v vmalloc
cp_conf corexl
eligible
-v vmalloc
n
k
cp_conf corexl
installed
fw defaultgen
fwboot bootconf
control_bootsec
comp_init_policy
<
> $FWDIR/boot/default.bin
<
>
-d
fw defaultgen
fwboot bootconf
control_bootsec
comp_init_policy
<
> $FWDIR/boot/default.bin
--core_override
[< >]
--disable
--eligible
--enable
--enabled
--supported
[Expert@HostName:0]# $FWDIR/boot/fwboot multik_reg <Number of CoreXL FW instance>
{ipv4 | ipv6} [-d]
<
>
ipv4
ipv6
-d
ipv4
ipv6
fw sam fw sam_policy
[Expert@MGMT:0]# sam_alert [-v] [-o] [-s <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-C] {-n|-i|-I} {-src|-dst|-any|-srv}
-v fw sam
-o
-s < >
-t < >
-f < >
-C
-n
-i
-I
-src
-dst
-any
-srv
[Expert@MGMT:0]# sam_alert -v2 [-v] [-O] [-S <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-n <Name>] [-c "<Comment">] [-o <Originator>] [-l {r | a}] -a {d | r|
n | b | q | i} [-C] {-ip |-eth} {-src|-dst|-any|-srv}
-v2
-v fw sam
-O
-S < >
-t < >
-f < >
-n < >
-c "< >"
-o < >
sam_alert
-l {r | a}
r
a
None
-a {d | r| n | b | q | i}
d
r
n
b
q
i
-C
-ip
-eth
-src
-dst
-any
-srv
usrchk
hits <options>
incidents <options>
debug <options>
usrchk hits
hits < >
usrchk hits list all
usrchk hits list user < >
usrchk hits list uci <
>
usrchk hits clear all
usrchk hits clear user < >
usrchk hits clear uci <
>
usrchk hits db reload
usrchk hits db reload update
usrchk incidents expiring
debug < >
usrchk debug on
usrchk debug on
usrchk debug set ...
usrchkd
usrchk debug off
all
all
critical
events
important
surprise
usrchk debug stat
usrchk debug unset < >
usrchk debug reset
usrchk debug
usrchkd
usrchk debug memory
$FWDIR/log/usrchk.elg
usrchk debug spaces [<0 - 5>]
usrchk hits list all
cphastop
cphastart
[-h]
[-d]
-h
cphastart -d > /var/log/cphastart_output.txt
prepare_command_args: -D ... start
/opt/CPsuite-RXX/fw1/bin/cphaconf clear-secured
/opt/CPsuite-RXX/fw1/bin/cphaconf -D ... start
$FWDIR/log/cphastart.elg
cphastart
cphastop
show cluster<ESC><ESC>
cphaprob
cphaprob
N / A cphaprob
show_bond_groups
N / A cphaprob corr
cphaprob -c {a | d |f}
show cluster members cphaprob -a if
interfaces virtual
show cluster
show cluster
bond
all
name <Name of Bond>
failover [reset {count | history}]
members
ccpenc
idmode
igmp
interfaces
all
secured
virtual
vlans
ips
pnotes
all
problem
mmagic
roles
state
statistics
sync [reset]
transport [reset]
cphaprob
MEM2>
problem
ACTIVE(!)
ACTIVE(!F)
ACTIVE(!P)
ACTIVE(!FP)
problem
Problem
Notification
problem
problem
Init
Interface Active
Check
Load Balancing
Configuration
Recovery Delay
CoreXL
Configuration
Fullsync
Policy
fwd
cphamcset
$FWDIR/log/cphamc
set.elg
routed routed routed
routed
cvpnd
ted
VSX
Down
Problematic
VSIDs:
Instances
Hibernating
admin_down
admin_down clusterXL_admin
down
host_monitor
host_monitor
$FWDIR/bin/cluste
rXL_monitor_ips
fwd $FWDIR/bin/cluste
routed cvpnd ted rXL_monitor_proce
ss
problem
Problem Notification
problem
cphaprob -e list
problem
Built-in Devices:
Registered Devices:
[Expert@Member2:0]#
set virtual-system < >
show cluster members interfaces {all | secured |
virtual | vlans}
cphaprob [-vs all] [-a] [-m] if
show cluster members interfaces virtual
cphaprob -a if
cphaprob -a -m if
cphaprob -am if
eth3 192.168.151.7
eth4 192.168.1.5
Member2>
Legend:
-------
UP! - Bond interface state is UP, yet attention is required
Slaves configured - number of slave interfaces configured on the bond
Slaves link up - number of operational slaves
Slaves required - minimal number of operational slaves required for bond to be UP
[Expert@Member2:0]#
High Availability
Load Sharing
UP
UP!
DOWN
[Expert@Member2:0]#
High Availability
Load Sharing
UP
UP!
DOWN
Active
Backup
Not Available
Yes
No
Legend:
---------
Bonds in group - a list of the bonds in the bond group
Required active bonds - number of required active bonds
[Expert@Member2:0]#
cphaprob show_bond_groups
UP
DOWN
UP
DOWN
show cluster failover
-l < >
count
-c
history
-h
[Expert@Member2:0]#
[Expert@Member2:0]# clusterXL_admin down
Setting member to administratively down state ...
Member current state is Down
[Expert@Member2:0]#
[Expert@Member2:0]# cphaprob show_failover
[Expert@Member2:0]#
set virtual-system < >
show cluster mmagic
cphaprob [-vs < >][-k] mmagic
MAC magic: 1
MAC forward magic: 254
[Expert@Member2:0]#
MAC magic: 2
MAC forward magic: 1
[Expert@Member2:0]#
show cluster statistics sync
cphaprob syncstat
Sync status: OK
Drops:
Lost updates................................. 0
Lost bulk update events...................... 0
Oversized updates not sent................... 0
Sync at risk:
Sent reject notifications.................... 0
Received reject notifications................ 0
Sent updates:
Total generated sync messages................ 12316
Sent retransmission requests................. 0
Sent retransmission updates.................. 0
Peak fragments per update.................... 1
Received updates:
Total received updates....................... 12
Received retransmission requests............. 0
Timers:
Delta Sync interval (ms)..................... 100
Sync status: OK
Sync status: Off - Full-sync failure
Sync status: Off - Policy installation failure
Sync status: Off - Cluster module not started
Sync status: Off - SIC failure
Sync status: Off - Full-sync checksum error
Sync status: Off - Full-sync received queue is full
Sync status: Off - Release version mismatch
Sync status: Off - Connection to remote member timed-out
Sync status: Off - Connection terminated by remote member
Sync status: Off - Could not start a connection to remote member
Sync status: Off - cpstart
Sync status: Off - cpstop
Sync status: Off - Manually disabled sync
Sync status: Off - Was not able to start for more than X second
Sync status: Off - Boot
Sync status: Off - Connectivity Upgrade (CU)
Sync status: Off - cphastop
Sync status: Off - Policy unloaded
Sync status: Off - Hibernation
Sync status: Off - OSU deactivated
Sync status: Off - Sync interface down
Sync status: Fullsync in progress
Sync status: Problem (Able to send sync packets, unable to receive
sync packets)
Sync status: Problem (Able to send sync packets, saving incoming sync
packets)
Sync status: Problem (Able to send sync packets, able to receive sync
packets)
Sync status: Problem (Unable to send sync packets, unable to receive
sync packets)
Sync status: Problem (Unable to send sync packets, saving incoming
sync packets)
Sync status: Problem (Unable to send sync packets, able to receive
sync packets)
manually by fullsync
show cluster members igmp
cphaprob igmp
reset
(Local)
0 1 172.23.88.176
0 2 1.0.0.176
0 3 2.0.0.176
0 4 3.0.0.176
1 2 1.0.0.177
1 3 2.0.0.177
1 4 3.0.0.177
------------------------------------------
Member1>
(Local)
1 1 172.23.88.177
1 2 1.0.0.177
1 3 2.0.0.177
1 4 3.0.0.177
------------------------------------------
Member2>
show cluster members idmode
cphaprob names
[Expert@Member2:0]#
show ospf interfaces [detailed]
cphaprob routedifcs
[Expert@Member2:0]#
eth0
[Expert@Member2:0]#
ID Role
1 Non-Master
2 (local) Master
[Expert@Member2:0]#
with metadata
cphaprob corr
cphaprob -c {a | d |f}
cphaprob corr
cphaprob -c a
cphaprob -c d
cphaprob -c f
[Expert@Member2:0]# cphaprob -c a
Cluster Correction Stats (All traffic):
------------------------------------------------------
Sent packets: 0 (0 with metadata)
Sent bytes: 0
Received packets: 0 (0 with metadata)
Received bytes: 0
Send errors: 0
Receive errors: 0
Local asymmetric conns: 0
[Expert@Member2:0]#
[Expert@Member2:0]# cphaprob -c d
[Expert@Member2:0]# cphaprob -c f
cphaprob ccp_encrypt
cphaprob ccp_encrypt_key
set cluster <ESC><ESC>
cphaconf
cphaconf
set cluster member idmode cphaconf mem_id_mode
id id
name name
N/A cphaconf
enable_bond_failover
< >
cphaconf
cphaconf [-D]
[-c <Cluster Size>]
[-i <Member ID>]
[-n <Cluster ID>]
[-p <Policy ID>]
[-m {1|service} | {2|balance} | {3|primary-up} | {4|active-up}]
[-R a | <Number of Required IF>]
[-t <Sync IF 1>...]
[-d <Non-Monitored IF 1>...]
[-M {0|multicast} | {1|pivot}]
[-l <Cluster Failover Track Mode 0-7>]
[-M multicast|pivot]
[-N <MAC Magic value>]
[-u <Member_Name1,Member_Name2,...>]
start
cphaconf stop
cphaconf clear-secured
cphaconf clear-non-monitored
cphaconf debug_data
N/A
0
-p
-g
problem
N/A
-p
-g
N/A
-g
< > problem
<device> <timeout> <status>
<device>
<timeout> <device>
0
<status> <device>
ok
init
problem
N/A
g
N/A
cphaconf set_pnote -a [-g] unregister
-a
-g
Member2>
Member2>
Member2>
cpconfig
enable
cpconfig
disable
cpconfig
norestart
[Expert@MyGW:0]#
[Expert@MyGW:0]#
fw hastat
show cluster state
cphaprob state
cpstat
[Expert@MGMT:0]# fw hastat
[Expert@Member1:0]# fw hastat
HOST NUMBER HIGH AVAILABILITY STATE MACHINE STATUS
192.168.3.52 1 active OK
[Expert@Member1:0]#
$FWDIR/bin/clusterXL_admin
admin_down
problem Down
admin_down ok
Up
admin_down
#! /bin/csh -f
#
# The script will cause the machine to get into down state, thus the member will not filter packets.
# It will supply a simple way to initiate a failover by registering a new device in problem state when
# a failover is required and will unregister the device when wanting to return to normal operation.
# USAGE:
# clusterXL_admin <up|down>
if ( $1 == "up" ) then
echo "Setting member to normal operation ..."
$FWDIR/bin/cphaconf set_pnote -d admin_down $PERSISTENT unregister > & /dev/null
if ( `uname` == 'IPSO' ) then
sleep 5
else
sleep 1
endif
if ( $1 == "down" ) then
echo "Setting member to administratively down state ..."
$FWDIR/bin/cphaconf set_pnote -d admin_down -t 0 -s problem $PERSISTENT register > & /dev/null
sleep 1
$FWDIR/bin/clusterXL_monitor_ips
host_monitor ok
$FWDIR/conf/cpha_hosts
problem Down
ok
#!/bin/sh
#
# The script tries to ping the hosts written in the file $FWDIR/conf/cpha_hosts. The names (must be
resolveable) ot the IPs of the hosrs must be written in seperate lines.
# the file must not contain anything else.
# We ping the given hosts every number of seconds given as parameter to the script.
# USAGE:
# cpha_monitor_ips X silent
# where X is the number of seconds between loops over the IPs.
# if silent is set to 1, no messages will appear on the console
#
# We initially register a pnote named "host_monitor" in the problem notification mechanism
# when we detect that a host is not responding we report the pnote to be in "problem" state.
# when ping succeeds again - we report the pnote is OK.
silent=0
if [ -n "$2" ]; then
if [ $2 -le 1 ]; then
silent=$2
fi
fi
hostfile=$FWDIR/conf/cpha_hosts
arch=`uname -s`
if [ $arch = "Linux" ]
then
#system is linux
ping="ping -c 1 -w 1"
else
ping="ping"
fi
$FWDIR/bin/cphaconf set_pnote -d host_monitor -t 0 -s ok register
TRUE=1
while [ "$TRUE" ]
do
result=1
for hosts in `cat $hostfile`
do
if [ $silent = 0 ]
then
echo "pinging $hosts using command $ping $hosts"
fi
if [ $arch = "Linux" ]
then
$ping $hosts > /dev/null 2>&1
else
$ping $hosts $1 > /dev/null 2>&1
fi
status=$?
if [ $status = 0 ]
then
if [ $silent = 0 ]
then
echo " $hosts is alive"
fi
else
if [ $silent = 0 ]
then
echo " $hosts is not responding "
fi
result=0
fi
done
if [ $silent = 0 ]
then
echo "done pinging"
fi
if [ $result = 0 ]
then
if [ $silent = 0 ]
then
echo " Cluster member should be down!"
fi
$FWDIR/bin/cphaconf set_pnote -d host_monitor -s problem report
else
if [ $silent = 0 ]
then
echo " Cluster member seems fine!"
fi
$FWDIR/bin/cphaconf set_pnote -d host_monitor -s ok report
fi
if [ "$silent" = 0 ]
then
echo "sleeping"
fi
sleep $1
echo "sleep $1"
done
$FWDIR/conf/cpha_proc_list
$FWDIR/bin/clusterXL_monitor_process
ok
$FWDIR/conf/cpha_proc_list
problem
Down
ok
#!/bin/sh
#
# This script monitors the existance of processes in the system. The process names should be written
# in the $FWDIR/conf/cpha_proc_list file one every line.
#
# USAGE :
# cpha_monitor_process X silent
# where X is the number of seconds between process probings.
# if silent is set to 1, no messages will appear on the console.
#
#
# We initially register a pnote for each of the monitored processes
# (process name must be up to 15 charachters) in the problem notification mechanism.
# when we detect that a process is missing we report the pnote to be in "problem" state.
# when the process is up again - we report the pnote is OK.
if [ "$2" -le 1 ]
then
silent=$2
else
silent=0
fi
if [ -f $FWDIR/conf/cpha_proc_list ]
then
procfile=$FWDIR/conf/cpha_proc_list
else
echo "No process file in $FWDIR/conf/cpha_proc_list "
exit 0
fi
arch=`uname -s`
while [ 1 ]
do
result=1
for process in `cat $procfile`
do
ps -ef | grep $process | grep -v grep > /dev/null 2>&1
status=$?
if [ $status = 0 ]
then
if [ $silent = 0 ]
then
echo " $process is alive"
fi
# echo "3, $FWDIR/bin/cphaconf set_pnote -d $process -s ok report"
$FWDIR/bin/cphaconf set_pnote -d $process -s ok report
else
if [ $silent = 0 ]
then
echo " $process is down"
fi
done
if [ $result = 0 ]
then
if [ $silent = 0 ]
then
echo " One of the monitored processes is down!"
fi
else
if [ $silent = 0 ]
then
echo " All monitored processes are up "
fi
fi
if [ "$silent" = 0 ]
then
echo "sleeping"
fi
sleep $1
done
fwaccel
fwaccel6
fwaccel help
fwaccel [-i <SecureXL ID>]
cfg <options>
conns <options>
dbg <options>
dos <options>
feature <options>
off <options>
on <options>
ranges <options>
stat <options>
stats <options>
synatk <options>
tab <options>
templates <options>
ver
fwaccel6 help
fwaccel6
conns <options>
dbg <options>
dos <options>
feature <options>
off <options>
on <options>
ranges <options>
stat <options>
stats <options>
synatk <options>
tab <options>
templates <options>
ver
help
-i <SecureXL ID>
-h
-a reset
fw getifs
fw ctl iflist
fwaccel cfg -a ...
tail -n 10 /var/log/messages
-b {on | off}
on
off
-c < >
-d < >
-e < >
-i {on | off}
on
off
-l < >
fwaccel
off fwaccel on
-m < >
-p {on | off}
on
off
-r < >
-v < >
-w {on | off}
on
off
fwaccel [-i <SecureXL ID>] conns
-h
-f <filter>
-m <Number of Entries>
-s
fwaccel6 conns
-h
-f <Filter>
-m <Number of Entries>
-s
-h
-i
<
>
-f < >
fwaccel conns -h
fwaccel conns -f AaQq
A
a
C
c
F
f
H
h
L
l
N
n
Q
q
S
s
U
u
-m
<
>
-s
Idx Interface
--- ---------
0 lo
1 eth0
2 eth1
-h
-m <
>
fwaccel dbg
all
+ < >
- < >
-
reset
-f "<5-Tuple Debug Filter>"
"<Source IP Address>,<Source
Port>,<Destination IP Address>,<Destination
Port>,<Protocol Number>"
*
-f reset
list
resetall
Module: db
err get save del tmpl tmo init ant profile nmr nmt
Module: api
err init add update del acct conf stat vpn notif tmpl sv pxl qos gtp infra tmpl_info upd_conf upd_if_inf
add_sa del_sa del_all_sas misc get_features get_tab get_stat reset_stat tag long_ver del_all_tmpl
get_state upd_link_sel
Module: pkt
err f2f frag spoof acct notif tcp_state tcp_state_pkt sv cpls routing drop pxl qos user deliver vlan
pkt nat wrp corr caf
Module: infras
err reorder pm
Module: tmpl
err dtmpl_get dtmpl_notif tmpl
Module: vpn
err vpnpkt linksel routing vpn
Module: nac
err db db_get pkt pkt_ex signature offload idnt ioctl nac
Module: cpaq
init client server exp cbuf opreg transport transport_utils error
Module: synatk
init conf conn err log pkt proxy state msg
Module: adp
err rt nh eth heth wrp inf mbs bpl bplinf mbeinf if drop bond xmode ipsctl xnp
Module: dos
fw1-cfg fw1-pkt sim-cfg sim-pkt err detailed drop
[Expert@MyGW:0]#
Module: db (1)
err
Module: db (1)
err
... ...
fwaccel6 dos
blacklist <options>
config <options>
rate <options>
stats <options>
-i < >
blacklist < >
fwaccel dos config fwaccel6 dos config
fw sam_policy fw6 sam_policy
-i < >
-a < >
-d < >
-F
-s
[Expert@MyGW:0]# fwaccel dos blacklist -s
The blacklist is empty
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel dos blacklist -a 1.1.1.1
Adding 1.1.1.1
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel dos blacklist -s
1.1.1.1
[Expert@MyGW:0]# fwaccel dos blacklist -a 2.2.2.2
Adding 2.2.2.2
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel dos blacklist -s
2.2.2.2
1.1.1.1
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel dos blacklist -d 2.2.2.2
Deleting 2.2.2.2
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel dos blacklist -s
1.1.1.1
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel dos blacklist -F
All blacklist entries deleted
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel dos blacklist -s
The blacklist is empty
[Expert@MyGW:0]#
set virtual-system < >
vsenv < >
-i < >
get
set < >
--disable-blacklists
--disable-drop-frags
--disable-drop-opts
--disable-internal
--disable-log-drops
--disable-log-pbox
--disable-monitor
--disable-pbox
--enable-blacklists
fwaccel dos blacklist fwaccel6
dos blacklist
--enable-drop-frags
--enable-drop-opts
--enable-internal
--enable-log-drops
--enable-log-pbox
--enable-monitor
--enable-pbox
fwaccel dos pbox
--enable-rate-limit
-n < >
--notif-rate < >
-p < >
--pbox-rate < >
-t < >
--pbox-tmo < >
$FWDIR/conf/fwaccel_dos_rate_on_ins
tall fwaccel dos config set
#!/bin/bash
fwaccel dos config set < >
$FWDIR/conf/fwaccel6_dos_rate_on_in
stall fwaccel6 dos config set
#!/bin/bash
fwaccel6 dos config set < >
fw sam_policy
touch $FWDIR/conf/< >
vi $FWDIR/conf/< >
!/bin/bash
fwaccel dos config set --enable-internal
fwaccel dos config set --enable-pbox
set virtual-system < >
vsenv < >
fwaccel dos config fwaccel6 dos config
-i < >
flush
whitelist < >
fwaccel dos
whitelist
-a < >[/< >]
< >
< >
/<bits>
192.168.20.30
192.168.20.30/32
192.168.20.0/24
-d < >[/< >]
< >
< >
/<bits>
-F
-l /< >/< >
touch vi
chmod +x
-L
$FWDIR/conf/pbox-whitelist-v4.conf
touch vi
chmod +x
-s
-i < >
install
-i < >
clear
get
--enable-drop-opts
--enable-drop-frags
fwaccel dos config fwaccel6 dos config
fw samp
fw samp -a b ...
fw sam_policy
-i < >
-a < >[/< >]
< >
< >
/<bits>
192.168.20.30
192.168.20.30/32
192.168.20.0/24
-d < >[/< >]
< >
< >
/<bits>
-F
-l /< >/< >
-F -l
touch vi
chmod +x
-L
$FWDIR/conf/pbox-whitelist-v4.conf
-F -L
touch vi
chmod +x
-s
[Expert@MyGW:0]# fwaccel dos whitelist -a 192.168.20.40
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel dos whitelist -s
192.168.20.40/32
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel dos whitelist -F
[Expert@MyGW:0]# fwaccel dos whitelist -s
[Expert@MyGW:0]#
-i < >
< >
sctp
get
off
on
sctp
$FWDIR/modules/fwkern.conf
sim_sctp_disable_by_default=1
-i < >
-a
-q
ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy | SIC
Stat
-----+---------------------+-----------------------+-----------------+--------------------------+-
--------
1 | S VS1 | VS1_Policy | 17Sep2018 12:47 | <No Policy> | Trust
2 | S VS2 | VS2_Policy | 17Sep2018 12:47 | <No Policy> | Trust
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel stat -t
+-----------------------------------------------------------------------------+
|Id|Name |Status |Interfaces |Features |
+-----------------------------------------------------------------------------+
|0 |SND |enabled |eth1,eth2,eth3 |Acceleration,Cryptography |
+-----------------------------------------------------------------------------+
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]#
ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy | SIC
Stat
-----+---------------------+-----------------------+-----------------+--------------------------+-
--------
1 | S VS1 | VS1_Policy | 17Sep2018 12:47 | <No Policy> | Trust
2 | S VS2 | VS2_Policy | 17Sep2018 12:47 | <No Policy> | Trust
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel off -a
SecureXL device disabled. (Virtual ID 0)
SecureXL device disabled. (Virtual ID 1)
SecureXL device disabled. (Virtual ID 2)
[Expert@MyVSXGW:1]#
fwaccel
off fwaccel6 off
-i < >
-a
-q
[Expert@MyGW:0]# fwaccel on
SecureXL device is enabled.
[Expert@MyGW:0]#
ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy | SIC
Stat
-----+---------------------+-----------------------+-----------------+--------------------------+-
--------
1 | S VS1 | VS1_Policy | 17Sep2018 12:47 | <No Policy> | Trust
2 | S VS2 | VS2_Policy | 17Sep2018 12:47 | <No Policy> | Trust
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel stat -t
+-----------------------------------------------------------------------------+
|Id|Name |Status |Interfaces |Features |
+-----------------------------------------------------------------------------+
|0 |SND |disabled |eth1,eth2,eth3 |Acceleration,Cryptography |
+-----------------------------------------------------------------------------+
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel on
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel stat -t
+-----------------------------------------------------------------------------+
|Id|Name |Status |Interfaces |Features |
+-----------------------------------------------------------------------------+
|0 |SND |enabled |eth1,eth2,eth3 |Acceleration,Cryptography |
+-----------------------------------------------------------------------------+
[Expert@MyVSXGW:1]#
ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy | SIC
Stat
-----+---------------------+-----------------------+-----------------+--------------------------+-
--------
1 | S VS1 | VS1_Policy | 17Sep2018 12:47 | <No Policy> | Trust
2 | S VS2 | VS2_Policy | 17Sep2018 12:47 | <No Policy> | Trust
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel on -a
[Expert@MyVSXGW:1]#
fwaccel6 ranges
-h
-a
-l
-p <Range ID>
-s <Range ID>
-i < >
-h
-a
fwaccel ranges -a
-l
-p < >
-s < >
[Expert@MyVSXGW:2]# vsenv 0
Context is set to Virtual Device VSX2_192.168.3.242 (ID 0).
[Expert@MyVSXGW:0]# fwaccel ranges -l
SecureXL device 0:
0 Anti spoofing ranges eth0:
1 Anti spoofing ranges eth1:
[Expert@MyVSXGW:0]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]# fwaccel ranges -l
SecureXL device 0:
0 Anti spoofing ranges eth3:
1 Anti spoofing ranges eth2.52:
[Expert@MyVSXGW:1]# vsenv 2
Context is set to Virtual Device VS2 (ID 2).
[Expert@MyVSXGW:2]# fwaccel ranges -l
SecureXL device 0:
0 Anti spoofing ranges eth4:
1 Anti spoofing ranges eth2.53:
[Expert@MyVSXGW:2]#
[Expert@MyVSXGW:2]# vsenv 0
Context is set to Virtual Device VSX2_192.168.3.242 (ID 0).
[Expert@MyVSXGW:0]# fwaccel ranges
SecureXL device 0:
Anti spoofing ranges eth0:
(0) 0.0.0.0 - 10.20.29.255
(1) 10.20.31.0 - 126.255.255.255
(2) 128.0.0.0 - 192.168.2.255
(3) 192.168.3.1 - 192.168.3.241
(4) 192.168.3.243 - 192.168.3.254
(5) 192.168.4.0 - 223.255.255.255
(6) 240.0.0.0 - 255.255.255.254
Anti spoofing ranges eth1:
(0) 10.20.30.1 - 10.20.30.241
(1) 10.20.30.243 - 10.20.30.254
[Expert@MyVSXGW:0]#
[Expert@MyVSXGW:1]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]# fwaccel ranges
SecureXL device 0:
Anti spoofing ranges eth3:
(0) 40.50.60.0 - 40.50.60.255
(1) 192.168.196.17 - 192.168.196.17
(2) 192.168.196.19 - 192.168.196.30
Anti spoofing ranges eth2.52:
(0) 70.80.90.0 - 70.80.90.255
(1) 192.168.196.1 - 192.168.196.1
(2) 192.168.196.3 - 192.168.196.14
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 2
Context is set to Virtual Device VS2 (ID 2).
[Expert@MyVSXGW:2]# fwaccel ranges
SecureXL device 0:
Anti spoofing ranges eth4:
(0) 100.100.100.0 - 100.100.100.255
(1) 192.168.196.17 - 192.168.196.17
(2) 192.168.196.19 - 192.168.196.30
Anti spoofing ranges eth2.53:
(0) 192.168.196.1 - 192.168.196.1
(1) 192.168.196.3 - 192.168.196.14
(2) 200.200.200.0 - 200.200.200.255
[Expert@MyVSXGW:2]#
[Expert@MyVSXGW:2]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel ranges -s 0
SecureXL device 0:
List name "Anti spoofing ranges eth3:", ID 0, Number of ranges 3
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel ranges -s 1
SecureXL device 0:
List name "Anti spoofing ranges eth2.52:", ID 1, Number of ranges 3
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel ranges -s 2
SecureXL device 0:
The requested range table is empty
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 2
Context is set to Virtual Device VS2 (ID 2).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:2]# fwaccel ranges -s 0
SecureXL device 0:
List name "Anti spoofing ranges eth4:", ID 0, Number of ranges 3
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:2]# fwaccel ranges -s 1
SecureXL device 0:
List name "Anti spoofing ranges eth2.53:", ID 1, Number of ranges 3
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:2]# fwaccel ranges -s 2
SecureXL device 0:
The requested range table is empty
[Expert@MyVSXGW:2]#
fwaccel [-i <SecureXL ID>] stat [-a] [-t] [-v]
-i < >
-a
-t
-v
-a
[Expert@MyGW:0]#
ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy | SIC
Stat
-----+---------------------+-----------------------+-----------------+--------------------------+-
--------
1 | S VS1 | VS1_Policy | 17Sep2018 12:47 | <No Policy> | Trust
2 | S VS2 | VS2_Policy | 17Sep2018 12:47 | <No Policy> | Trust
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel stat
+-----------------------------------------------------------------------------+
|Id|Name |Status |Interfaces |Features |
+-----------------------------------------------------------------------------+
|0 |SND |enabled |eth1,eth2,eth3 |Acceleration,Cryptography |
| | | | |Crypto: Tunnel,UDPEncap,MD5, |
| | | | |SHA1,NULL,3DES,DES,CAST, |
| | | | |CAST-40,AES-128,AES-256,ESP, |
| | | | |LinkSelection,DynamicVPN, |
| | | | |NatTraversal,AES-XCBC,SHA256 |
+-----------------------------------------------------------------------------+
fwaccel6 stats
[-c]
[-d]
[-l]
[-m]
[-n]
[-o]
[-p]
[-q]
[-r]
[-s]
[-x]
-i < >
-c
-d
-l
-m
-n
-o
-p
-q
-r
-s
-x
accel packets
accel bytes
outbound packets
outbound bytes
conns created
conns deleted
C total conns
C templates
C TCP conns
C non TCP conns
nat conns
dropped packets
dropped bytes
nat templates
port alloc templates
conns from nat tmpl
port alloc conns
fragments received
fragments transmit
fragments dropped
fragments expired
IP options stripped
IP options restored
IP options dropped
corrs created
corrs deleted
C corrections
corrected packets
corrected bytes
C crypt conns
enc bytes
dec bytes
ESP enc pkts
ESP enc err
ESP dec pkts
ESP dec err
ESP other err
espudp enc pkts
espudp enc err
espudp dec pkts
espudp dec err
PXL packets
PXL FF conns
PXL FF packets
PXL FF bytes
PXL FF acks
Enqueued IN packets
Enqueued OUT packets
Dequeued IN packets
Dequeued OUT packets
Enqueued IN bytes
Enqueued OUT bytes
Dequeued IN bytes
Dequeued OUT bytes
Enqueued IN packets
Enqueued OUT packets
Dequeued IN packets
Dequeued OUT packets
Enqueued IN bytes
Enqueued OUT bytes
Dequeued IN bytes
Dequeued OUT bytes
F2F packets
F2F bytes
TCP violations
C anticipated conns
port alloc f2f
F2V conn match pkts
F2V packets
F2V bytes
memory used
free memory
C used templates
pxl tmpl conns
C conns from tmpl
Accelerated Path
--------------------------------------------------------------------------------------
accel packets 0 accel bytes 0
outbound packets 0 outbound bytes 0
conns created 0 conns deleted 0
C total conns 0 C TCP conns 0
C non TCP conns 0 nat conns 0
dropped packets 0 dropped bytes 0
fragments received 0 fragments transmit 0
fragments dropped 0 fragments expired 0
IP options stripped 0 IP options restored 0
IP options dropped 0 corrs created 0
corrs deleted 0 C corrections 0
corrected packets 0 corrected bytes 0
QoS Paths
--------------------------------------------------------------------------------------
QoS General Information:
------------------------
Total QoS Conns 0 QoS Classify Conns 0
QoS Classify flow 0 Reclassify QoS policy 0
Firewall Path
--------------------------------------------------------------------------------------
F2F packets 35324 F2F bytes 1797781
TCP violations 0 F2V conn match pkts 0
F2V packets 0 F2V bytes 0
GTP
--------------------------------------------------------------------------------------
gtp tunnels created 0 gtp tunnels 0
gtp accel pkts 0 gtp f2f pkts 0
gtp spoofed pkts 0 gtp in gtp pkts 0
gtp signaling pkts 0 gtp tcpopt pkts 0
gtp apn err pkts 0
General
--------------------------------------------------------------------------------------
memory used 38798784 C tcp handshake conns 0
C tcp established conns 0 C tcp closed conns 0
C tcp pxl handshake conns 0 C tcp pxl established conns 0
C tcp pxl closed conns 0 outbound cpasxl packets 0
outbound pslxl packets 0 outbound cpasxl bytes 0
outbound pslxl bytes 0 DNS DoR stats 0
(*) Statistics marked with C refer to current value, others refer to total value
fwaccel stats -c
Appliaction: F2V
Statistic Value
----------------------------------- --------------------
Queued pkts 0
Max queued pkts 0
Timer triggered 0
Callback hahndling unhold 0
Callback hahndling unhold and drop 0
Callback hahndling reset 0
Dequeued pkts resumed 0
Queue ent allocated 0
Queue ent freed 0
Queues allocated 0
Queues freed 0
Ack notif sent 0
Ack respones handling 0
Dequeued pkts dropped 0
Reached max queued pkt limit 0
Set timer failed 0
Error already held 0
Queue ent alloc failed 0
Queue alloc failed 0
Ack notif failed 0
Ack respones handling failed 0
----------------------------------------------------
Appliaction: Route
Statistic Value
----------------------------------- --------------------
Queued pkts 0
Max queued pkts 0
Timer triggered 0
Callback hahndling unhold 0
Callback hahndling unhold and drop 0
Callback hahndling reset 0
Dequeued pkts resumed 0
Queue ent allocated 0
Queue ent freed 0
Queues allocated 0
Queues freed 0
Ack notif sent 0
Ack respones handling 0
Dequeued pkts dropped 0
Reached max queued pkt limit 0
Set timer failed 0
Error already held 0
Queue ent alloc failed 0
Queue alloc failed 0
Ack notif failed 0
Ack respones handling failed 0
----------------------------------------------------
Appliaction: F2P
Statistic Value
----------------------------------- --------------------
Queued pkts 0
Max queued pkts 0
Timer triggered 0
Callback hahndling unhold 0
Callback hahndling unhold and drop 0
Callback hahndling reset 0
Dequeued pkts resumed 0
Queue ent allocated 0
Queue ent freed 0
Queues allocated 0
Queues freed 0
Ack notif sent 0
Ack respones handling 0
Dequeued pkts dropped 0
Reached max queued pkt limit 0
Set timer failed 0
Error already held 0
Queue ent alloc failed 0
Queue alloc failed 0
Ack notif failed 0
Ack respones handling failed 0
----------------------------------------------------
fwaccel stats -p
F2F packets:
--------------
Violation Packets Violation Packets
-------------------- --------------- -------------------- ---------------
pkt has IP options 0 ICMP miss conn 3036
TCP-SYN miss conn 8 TCP-other miss conn 32224
UDP miss conn 3772 other miss conn 0
VPN returned F2F 0 uni-directional viol 0
possible spoof viol 0 TCP state viol 0
out if not def/accl 0 bridge, src=dst 0
routing decision err 0 sanity checks failed 0
fwd to non-pivot 0 broadcast/multicast 0
cluster message 0 cluster forward 0
chain forwarding 0 F2V conn match pkts 0
general reason 0 route changes 0
fwaccel stats -q
fwaccel6 synatk
-a
-c <options>
-d
-e
-g
-m
-t <options>
config
monitor <options>
state <options>
whitelist <options>
-a
-c < >
-d
-e
-g
-m
-t < >
config
monitor < >
fwaccel synatk -a
fwaccel6 synatk -a
<Configuration File>
$FWDIR/conf/synatk.conf
$FWDIR/conf/synatk.conf
-c
Disabled
Disable
Disable
fwaccel synatk config fwaccel6 synatk config
enabled 0
enforce 0
fwaccel synatk -d
fwaccel6 synatk -d
$FWDIR/conf/synatk.conf
-c
Enforcing
Prevent
Ready
fwaccel synatk monitor fwaccel6 synatk monitor
Enforcing
Detect
Monitor
fwaccel synatk config fwaccel6 synatk config
enabled 1
enforce 1
fwaccel synatk -e
fwaccel6 synatk -e
$FWDIR/conf/synatk.conf
-c
Enforcing
Prevent
Ready
fwaccel synatk monitor fwaccel6 synatk monitor
Enforcing
Detect
Monitor
fwaccel synatk config fwaccel6 synatk config
enabled 1
enforce 2
fwaccel synatk -g
fwaccel6 synatk -g
$FWDIR/conf/synatk.conf
-c
Monitoring
Detect
Monitor
fwaccel synatk config fwaccel6 synatk config
enabled 1
enforce 0
fwaccel synatk -m
fwaccel6 synatk -m
$FWDIR/conf/synatk.conf
-c
< >
< >
< >
fwaccel synatk config
enabled
enforce
global_high_threshold
fwaccel synatk -t <Threshold>
fwaccel6 synatk -t <Threshold>
periodic_updates
cookie_resolution_shift
min_frag_sz
high_threshold
fwaccel synatk -t <Threshold>
fwaccel6 synatk -t <Threshold>
low_threshold
fwaccel synatk -t <Threshold>
fwaccel6 synatk -t <Threshold>
score_alpha
monitor_log_interval (msec)
grace_timeout (msec)
min_time_in_active (msec)
fwaccel synatk -m fwaccel6 synatk -m
-p
PPAK ID: 0
[-p] -a
[-p] -s
[-p] -v
-a -s -v
PPAK ID: 0
----------
+-----------------------------------------------------------------------------+
| SYN Defender status |
+-----------------------------------------------------------------------------+
| Configuration Monitoring |
| Status Normal |
| Non established connections 0 |
| Global Threshold 10000 |
| Interface Threshold 5000 |
+-----------------------------------------------------------------------------+
| IF | Topology | Enforce | State (sec) | Non-established conns |
| | | | | Peak | Current |
+-----------------------------------------------------------------------------+
| eth0 | External | Detect | Monitor | 0 | 0 |
| eth1 | Internal | Detect | Monitor | 0 | 0 |
+-----------------------------------------------------------------------------+
[Expert@MyGW:0]#
Firewall
----------
Per-interface:
eth0 eth1
---------- ----------
topology External Internal
state Monitor Monitor
syn ready 0 0
syn active prev 0 0
syn active curr 0 0
active_score 0 0
msec grace 0 0
msec active 0 0
sent cookies 0 0
fail validations 0 0
succ validations 0 0
early packets 0 0
no conn data 0 0
bogus syn 0 0
peak non-estab 0 0
int sent cookies 0 0
int succ validations 0 0
msec interval 0 0
PPAK ID: 0
----------
Per-interface:
eth0 eth1
---------- ----------
topology External Internal
state Monitor Monitor
syn ready 0 0
syn active prev 0 0
syn active curr 0 0
active_score 0 0
msec grace 0 0
msec active 0 0
sent cookies 0 0
fail validations 0 0
succ validations 0 0
early packets 0 0
no conn data 0 0
bogus syn 0 0
peak non-estab 0 0
int sent cookies 0 0
int succ validations 0 0
msec interval 0 0
[Expert@MyGW:0]#
PPAK ID: 0
----------
M,N,0,0
[Expert@MyGW:0]#
PPAK ID: 0
----------
+-----------------------------------------------------------------------------+
| SYN Defender statistics |
+-----------------------------------------------------------------------------+
| Status Normal |
| Spoofed SYN/sec 0 |
+-----------------------------------------------------------------------------+
[Expert@MyGW:0]#
fwaccel synatk state
-h
-a
-d
-g
-i {all | external | internal | <Name of Interface>}
-m
-r
-a -d -g -m -r
-h
-a
-d
-g
-i all
-i external
-i internal
-i < >
-m
-r
< >
< >
/<bits>
192.168.20.30
192.168.20.30/32
192.168.20.0/24
-a < >[/<
>]
< >
< >
/<bits>
2001:0db8:85a3:0000:0000:8a2e:0370:7334
2001:0db8:85a3:0000:0000:8a2e:0370:7334/
128
2001:cdba:9abc:5678::/64
-d <IPv4 Address>[/<Subnet
Prefix>]
< >
< >
/<bits>
-d < >[/<
>]
< >
< >
/<bits>
-F
-l /<Path>/<Name of File>
-F -l
touch vi
chmod +x
< >[/< >]
-L
$FWDIR/conf/synatk-whitelist-v4.conf
-F -L
touch vi
chmod +x
< >[/< >]
-s
/var/log/messages
fw tab
fwaccel [-i <SecureXL ID>] tab [-f] [-m <Number of Rows>] -t <Name of Kernel Table>
fwaccel [-i <SecureXL ID>] tab -s -t <Name of Kernel Table>
-i < >
-f
-m < >
-s
-t < >
connections
dos_ip_blacklists
dos_pbox
dos_pbox_violating_ips
dos_rate_matches
dos_rate_track_src
dos_rate_track_src_svc
drop_templates
frag_table
gtp_apns
gtp_tunnels
if_by_name
inbound_SAs
invalid_replay_counter
ipsec_mtu_icmp
mcast_drop_conns
outbound_SAs
PMTU_table
profile
reset_table
vpn_link_selection
vpn_trusted_ifs
fwaccel6 templates
[-h]
[-d]
[-m <Number of Rows>]
[-s]
[-S]
-i < >
cphwd_tmpl
-h
-d
-m < >
-s
-S
[Expert@MyGW:0]# fwaccel templates
Source SPort Destination DPort PR Flags LCT DLY C2S i/f S2C i/f
--------------- ----- --------------- ----- -- ------------ ---- --- ------- -------
192.168.10.20 * 192.168.10.50 80 6 0 0 0 eth5/eth1 eth1/eth5
[Expert@MyGW:0]#
Templates stats:
[Expert@MyGW:0]#
fwaccel ver
fw sam
sam_alert
fw sam_policy fw samp
$FWDIR/database/sam_policy.db
$FWDIR/database/sam_policy.mng
set virtual-system < >
vsenv < >
fw [-d] sam_policy
add <options>
batch
del <options>
get <options>
fw [-d] samp
add <options>
batch
del <options>
get <options>
-d
batch
del < >
set virtual-system < >
vsenv < >
fw [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f <Target>] [-n
<"Rule Name">] [-c <"Rule Comment">] [-o <"Rule Originator">] [-z <"Zone">]
ip <IP Filter Arguments>
quota <Quota Filter Arguments>
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>] [-f <Target>]
[-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule Originator">] [-z <"Zone">]
ip <IP Filter Arguments>
quota <Quota Filter Arg
-d
script
-u
User-defined
Auto
-a {d | n | b}
d
n
b
-l {r | a}
-r
-a
-t < >
-f < >
< >
all
-n "< >"
[flush true]
[source-negated {true | false}] source < >
[destination-negated {true | false}]
destination < >
[service-negated {true | false}] service
< >
[< >< >] [< ><
>] ...[< > < >]
[track < >]
-C
-s < >
-m < >
-d < >
-M < >
-p < >
-r < >
flush true
[source-negated {true |
false}] source < >
any
range:< >
cidr:< >/< >
cc:< >
asn:< >
source-negated false
source-negated true
[destination-negated {true |
false}] destination
< > any
range:< >
cidr:< >/< >
cc:< >
asn:< >
destination-negated false
destination-negated true
[service-negated {true |
false}] service <
>
< >
service-negated false
service-negated true
[< > < >]
[< > < >]
...
[< > < >] concurrent-conns < >
N / 65536
pkt-rate < >
N / 65536
byte-rate < >
N / 65536
new-conn-rate < >
N / 65536
[track < >]
source
source-service
fw sam_policy add -a d -l r -t 3600 quota service any source
range:172.16.7.11-172.16.7.13 new-conn-rate 5 flush true
-a d
-l r
-t 3600
new-conn-rate 5 service any
source range:172.16.7.11-172.16.7.13
flush true
-a n
timeout
service-negated true
service
1,50-51,6/443,17/53
cc:QQ
byte-rate 0
flush true
-a d
timeout
asn:AS64500
cidr:[::FFFF:C0A8:1100]/120
service any
pkt-rate 0
flush true
-a b
timeout
range:172.16.8.17-172.16.9.121
service 6/80
flush true
-a d
-l r
timeout
service any
source-negated true
cc:QQ
concurrent-conns-ratio 655 service any
service-negated true
cc:QQ
flush true
fw sam_policy batch fw6 sam_policy batch
set virtual-system < >
vsenv < >
add del
add -a d -l r -t 3600 -c "Limit\ conn\ rate\ to\ 5\ conn/sec from\ these\ sources"
quota service any source range:172.16.7.13-172.16.7.13 new-conn-rate 5
del <501f6ef0,00000000,cb38a8c0,0a0afffe>
EOF
fw sam_policy del fw6 sam_policy del
set virtual-system < >
vsenv < >
-d fw
script
'< >'
'<...>'
fw sam_policy get fw6
sam_policy get
fw sam_policy get
fw6 sam_policy get
set virtual-system < >
vsenv < >
fw [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t <Type> [+{-v '<Value>'}]
[-n]]
fw6 [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t <Type> [+{-v
'<Value>'}] [-n]]
-d
-l
-l
-l
-u '< >'
-k '
-t
-t in
+{-v '< >'}
-n
-k
-t
+-v
uid
<5ac3965f,00000000,3403a8c0,0000264a>
target
all
timeout
2147483647
action
notify
log
log
name
Test\ Rule
comment
Notify\ about\ traffic\ from\ 1.1.1.1
originator
John\ Doe
src_ip_addr
1.1.1.1
req_type
ip
[Expert@GW:0]# fw samp get -u '<5ac3965f,00000000,3403a8c0,0000264a>'
0
operation=add uid=<5ac3965f,00000000,3403a8c0,0000264a> target=all timeout=300
action=notify log=log name=Test\ Rule comment=Notify\ about\ traffic\ from\
1.1.1.1 originator=John\ Doe src_ip_addr=1.1.1.1 req_tpe=ip
affinity
conf
conns
cpls
cqstats
drop_statistics
ifs
mcast_statistics
nac
notify_statistics
profile_cpu_stat
rlc
statistics
stats
viol_statistics
Debug flags :
0 : 0x1
1 : 0x1
2 : 0x1
3 : 0x801
4 : 0x1
5 : 0x1
6 : 0x1
7 : 0x1
8 : 0x100
9 : 0x8
10 : 0x1
11 : 0x10
[Expert@MyGW:0]#
fwaccel conns fwaccel6 conns
F
SIM F
fw_clamp_tcp_mss fw_clamp_vpn_mss
activate_optimize_drops_support_now
fwaccel stats -m
-h
-m <
>
fwaccel dbg
all
+ < >
- < >
-
reset
-f "<5-Tuple Debug Filter>"
"<Source IP Address>,<Source
Port>,<Destination IP Address>,<Destination
Port>,<Protocol Number>"
*
-f reset
list
resetall
Module: db
err get save del tmpl tmo init ant profile nmr nmt
Module: api
err init add update del acct conf stat vpn notif tmpl sv pxl qos gtp infra tmpl_info upd_conf upd_if_inf
add_sa del_sa del_all_sas misc get_features get_tab get_stat reset_stat tag long_ver del_all_tmpl
get_state upd_link_sel
Module: pkt
err f2f frag spoof acct notif tcp_state tcp_state_pkt sv cpls routing drop pxl qos user deliver vlan
pkt nat wrp corr caf
Module: infras
err reorder pm
Module: tmpl
err dtmpl_get dtmpl_notif tmpl
Module: vpn
err vpnpkt linksel routing vpn
Module: nac
err db db_get pkt pkt_ex signature offload idnt ioctl nac
Module: cpaq
init client server exp cbuf opreg transport transport_utils error
Module: synatk
init conf conn err log pkt proxy state msg
Module: adp
err rt nh eth heth wrp inf mbs bpl bplinf mbeinf if drop bond xmode ipsctl xnp
Module: dos
fw1-cfg fw1-pkt sim-cfg sim-pkt err detailed drop
[Expert@MyGW:0]#
Module: db (1)
err
Module: db (1)
err
... ...
fw ctl debug 0
fwaccel dbg resetall
fwaccel -i dbg resetall
fw ctl debug
fwaccel dbg list
fwaccel -i dbg list
fw tab -t connections -x -y
fw tab -t cphwd_tmpl -x -y
fw ctl debug 0
fwaccel dbg resetall
fwaccel -i dbg resetall
fw ctl debug
fwaccel dbg list
fwaccel -i dbg list
/var/log/kernel_debug.txt
fwaccel dbg
acct
ant
conf
conn
conn_app
corr
cpdrv
del
drv
err
gtp
gtp_pkt
htab
infra_ids
init
ioctl
iter
kdrv
lock
nat
offload
queue
relations
rngs
rngs_print
routing
stat
svm
tag
tcp_sv
update
util
acct
caf
corr
cpls
deliver
drop
err
f2f
frag
nat
notif
pkt
pxl
qos
routing
spoof
sv
tcp_state
tcp_state_pkt
user
vlan
wrp
ant
del
err
get
init
nmr
nmt
profile
save
tmo
tmpl
acct
add
add_sa
conf
del
del_all_sas
del_all_tmpl
del_sa
err
get_features
get_stat
get_state
get_tab
gtp
infra
init
long_ver
misc
notif
pxl
qos
reset_stat
stat
sv
tag
tmpl
tmpl_info
upd_conf
upd_if_inf
upd_link_sel
update
vpn
err
pm
reorder
db
db_get
err
idnt
ioctl
nac
offload
pkt
pkt_ex
signature
err
linksel
routing
vpn
vpnpkt
cbuf
client
error
exp
init
opreg
server
transport
transport_utils
detailed
drop
err
fw1-cfg
fw1-pkt
sim-cfg
sim-pkt
conf
conn
err
init
log
msg
pkt
proxy
state
err
dtmpl_get
dtmpl_notif
tmpl
fw ctl multik fw6 ctl multik
fw ctl multik
add_bypass_port <options>
del_bypass_port <options>
dynamic_dispatching <options>
gconn <options>
get_instance <options>
print_heavy_conn
prioq <options>
show_bypass_ports
stat
start
stop
utilize
dynamic_dispatching
print_heavy_conn
prioq
show_bypass_ports
stat
start
stop
utilize
$FWDIR/conf/dispatcher_bypass.conf
fw ctl multik add_bypass_port <Port Number 1>,<Port Number 2>,...,<Port Number N>
<Port Number>
fw ctl multik del_bypass_port <Port Number 1>,<Port Number 2>,...,<Port Number N>
<Port Number>
get_mode
off
on
-d
-h
-p
I/O
Inst. ID
Flags
Seq
Hold_ref
Prio
last_enq_jiff
queue_indx
conn_tokens
-s
-sec
I/O
Inst. ID
Flags
Seq
Hold_ref
-seg < >
<Protocol Number>
-d
0
1
Available modes:
0. Off
1. Eviluator-only
2. On
$FWDIR/conf/dispatcher_bypass.conf
-d
fw ctl affinity
fw ctl affinity -l [-a] [-v] [-r] [-q]
fw ctl affinity -l -i <Interface Name>
fw ctl affinity -l -k <CoreXL FW Instance ID>
fw ctl affinity -l -p <Process ID>
fw ctl affinity -l -n <Process Name>
fw -d ctl affinity -corelicnum
-i <Interface Name>
-p <Process ID>
-n <Process Name>
all
-a
-v
-r
-q
[Expert@MyGW:0]# fw ctl affinity -l
eth0: CPU 0
eth1: CPU 0
eth2: CPU 0
eth3: CPU 0
fw_0: CPU 7
fw_1: CPU 6
fw_2: CPU 5
fw_3: CPU 4
fw_4: CPU 3
fw_5: CPU 2
fwd: CPU 2 3 4 5 6 7
fgd50: CPU 2 3 4 5 6 7
status_proxy: CPU 2 3 4 5 6 7
rad: CPU 2 3 4 5 6 7
cpstat_monitor: CPU 2 3 4 5 6 7
mpdaemon: CPU 2 3 4 5 6 7
cpsead: CPU 2 3 4 5 6 7
cserver: CPU 2 3 4 5 6 7
rtmd: CPU 2 3 4 5 6 7
fwm: CPU 2 3 4 5 6 7
cpsemd: CPU 2 3 4 5 6 7
cpca: CPU 2 3 4 5 6 7
cprid: CPU 2 3 4 5 6 7
cpd: CPU 2 3 4 5 6 7
[Expert@MyGW:0]#
fw ctl affinity -l -x
[-vsid <VSID ranges>]
[-cpu <CPU ID ranges>]
[-flags {e | k | t | n | h | o}]
fw -d ctl affinity -corelicnum
< >
-cpu 7
-cpu 0-2 4
-flags {e | k | t | n -flags
| h | o}
e
k
t
n
/proc/ /cmdline
h
o
/tmp/affinity_list_output
-flags tn
$FWDIR/conf/fwaffinity.conf
• fw ctl affinity -s
sim affinity -s
sim affinity -a
fw ctl affinity
fw ctl affinity -s -i <Interface Name>
all
<CPU ID0> [ <CPU ID1> ... <CPU IDn> ]
fw ctl affinity -s -k <CoreXL FW Instance ID>
all
<CPU ID0> [ <CPU ID1> ... <CPU IDn> ]
fw ctl affinity -s -p <Process ID>
all
<CPU ID0> [ <CPU ID1> ... <CPU IDn> ]
fw ctl affinity -s -n <Process Name>
all
<CPU ID0> [ <CPU ID1> ... <CPU IDn> ]
-i <Interface Name>
-p <Process ID>
-n <Process Name>
all
fw ctl affinity
fw ctl affinity -s -d [-vsid <VSID ranges>] -cpu <CPU ID ranges>
fw ctl affinity -s -d -pname <Process Name> [-vsid <VSID ranges>]
-cpu all
-cpu <CPU ID ranges>
fw ctl affinity -s -d -inst <Instances Ranges> -cpu <CPU ID ranges>
fw ctl affinity -s -d -fwkall <Number of CPUs>
fw ctl affinity
-vsx_factory_defaults
-vsx_factory_defaults_no_prompt
-vsx_factory_defaults
-vsx_factory_defaults_no_prompt
fw -i
< >
fw ctl multik
stat
< > fw -i
fw -i < > conntab ...
fw -i < > ctl get ...
fw -i < > ctl leak ...
fw -i < > ctl pstat ...
fw -i < > ctl set ...
fw -i < > monitor ...
fw -i < > tab ...
fw -i 1 tab -t connections
cpmq
cpmq get
[-a]
[-v]
[-vv]
[rx_num {igb | ixgbe | i40e | mlx5_core}]
cpmq set rx_num
igb {default | <Value>}
ixgbe {default | <Value>}
i40e {default | <Value>}
mlx5_core {default | <Value>}
cpmq set affinity
get
get -a
[On]
[Off]
[Pending On]
[Pending Off]
get -vv
set affinity
cpmq get
cpmq set
cpmq set rx_num {igb | ixgbe | i40e | mlx5_core} <Number of Active RX Queues>
cpconfig
rx_num
rx_num
fw ctl affinity
cpmq get -v
top
top - 18:02:33 up 28 days, 1:18, 1 user, load average: 1.22, 1.38, 1.48
Tasks: 137 total, 3 running, 134 sleeping, 0 stopped, 0 zombie
adlog
adlog
adlog
adlog
< >
a
adlog a
l
adlog l
l adlog
a adlog l
control < > < >
dc
debug < >
statistics
adlog {a | l} control
muh <options>
reconf
srv_accounts <options>
stop
muh
mark
show mark
unmark
show
unmark
reconf
srv_accounts
clear
find
show
unmark
clear
find
show
unmark
stop
adlog a dc
adlog l dc
adlog
$FWDIR/log/pdpd.elg
$FWDIR/log/fwd.elg
adlog {a | l} debug
extended
mode
off
on
extended
mode on off
off
on
adlog {a | l} query
all
ip <options>
machine <options>
string <options>
user <options>
all
ip < >
machine < >
jo
adlog a query user jo
adlog
adlog a statistics
adlog l statistics
pdp <command> [<parameter> [<option>]]
< >
ad < > < >
ip < >
u < >
m < >
d < >
t < >
ip <IP Address>
u <Username>
m <Computer Name>
r
override
probed
timeout
pdp auth
allow_empty_result <options>
count_in_non_ldap_group <options>
fetch_by_sid <options>
force_domain <options>
kerberos_any_domain <options>
kerberos_encryption <options>
reauth_agents_after_policy <options>
recovery_interval <options>
username_password <options>
allow_empty_result
disable
enabled
status
count_in_non_ldap_group
disable
enabled
status
fetch_by_sid
disable
enabled
status
force_domain
disable
enabled
stat
kerberos_any_domain
disable
enabled
status
kerberos_encryption
get
set
reauth_agents_after_policy
disable
enabled
status
recovery_interval
disable
enable
set <Value>
show
username_password
disable
enabled
stat
pdp connections
idc
pep
ts
idc
pep
ts
pdp control
revoke_ip <options>
sync
async1
async echo
ccc
on
off $FWDIR/log/pdpd.elg
on
off
memory
off
on
pdp debug on
pdp debug set ...
reset
pdp debug
reset pdp debug off
rotate
$FWDIR/log/pdpd.elg
$FWDIR/log/pdpd.elg.0
$FWDIR/log/pdpd.elg.0
$FWDIR/log/pdpd.elg.1
set <Topic Name> <Severity>
all
all
critical
events
important
surprise
stat
groups_consolidation
status
muh
mark
show mark
unmark
show
unmark
service_accounts
pdp monitor
all
client_type <options>
cv_ge <options>
cv_le <options>
groups <options>
ip <options>
machine <options>
machine_exact
mad
network
s_port
summary
user <options>
user_exact
all
client_type
"AD Query"
"Identity Agent"
portal
unknown
"AD Query"
"Identity Agent"
portal
unknown
cv_ge <Version>
cv_le <Version>
ip <IP address>
machine_exact
mad
network
192.168.72.*
s_port
summary
user <Username>
user_exact
Published
pdp nested_groups
clear
depth
disable
enable
show
status
__set_state <options>
clear
depth
disable
enable
show
status
__set_state
1
2 1
3
4 2
3
pdp network
info
registered
info
registered
pdp radius
ip <options>
groups <options>
parser <options>
roles <options>
status
ip
reset
set <attribute index> [-a <vendor specific
attribute index>] [-c <vendor code>]
set
reset
groups
fetch
off
on
reset
fetch
set
-m <attribute index> [-a <vendor specific
attribute index>] [-c <vendor code>] [-d <delimiter>]
-u
on
off
reset
set
parser
reset
set <attribute index> [-c <vendor code> -a <vendor
specific attribute index>] -p <prefix> -s <suffix>
reset
set
roles
fetch
off
on
reset
set fetch
-m <attribute index> [-a <vendor specific
attribute index>] [-c <vendor code>] [-d <delimiter>]
-u
on
off
reset
set
status
pdp status
show
show
pdp tasks_manager
status
status
pdp timers
show
show
User Auth Timer
Machine Auth Timer
Pep Cache Timer
Compliance Timer
Keep Alive Timer
Ldap Fetch Timer
pdp topology_map
TRACKER
TRACKER
pdp tracker
off
on
off TRACKER
on TRACKER
pdp update
all
specific
all
specific
pdp vpn
show
show
pep <command> [<parameter> [<option>]]
extended_info_storage
disable
enable
disable
enable
pep_priority_method
remove
status
ttl
user_machine
remove
pep_priority_method.
status
ttl
user_machine
portal_dual_stack
disable
enable disable
enable
tasks_manager
status
pep debug
memory
off
on
reset
rotate
set <options>
spaces [<options>]
stat
unset <options>
memory
off
on
pep debug on
pep debug set ...
reset
pep debug
reset ... pep debug
off
rotate
$FWDIR/log/pepd.elg
$FWDIR/log/pepd.elg.0
$FWDIR/log/pepd.elg.0
$FWDIR/log/pepd.elg.1
set <Topic Name> <Severity>
all
all
critical
events
important
surprise
stat
conciliation_clashes
all
clear all
ip <Session IP Address>
clear
ip
network
pdp
registration pdp
registration
pdp
all
id <ID of PDP>
all
id
stat
topology_map
user
all
query
cid <IP[,ID]>
cmp <Compliance>
mchn <Computer Name> all
mgrp <Group>
pdp <IP[,ID]> query
role <Identity Role>
ugrp <Group>
uid <UID String> cid < [, ]>
usr <Username>
cmp <Compliance>
jo
Employees
TRACKER
pep tracker
off
on
off TRACKER
on TRACKER
$FWDIR/conf/test_ad_connectivity.conf
$FWDIR/conf/test_ad_connectivity.conf
–o
$FWDIR/log/test_ad_connectivity.elg
[Expert@HostName:0]# $FWDIR/bin/test_ad_connectivity -h
[Expert@HostName:0]# $FWDIR/bin/test_ad_connectivity <Parameter_1 Value_1>
<Parameter Value_2> ... <Parameter_N Value_N> ...<Parameters And Options>
-h
-a
-a
-c
-p
-b < >
-c < >
-a
-c
-p
-d < >
ad.mycompany.com
-D < >
-f <
>
-i < >
-I < >
-o < >
$FWDIR/tmp/
-p < >
-a
-c
-p
-l
-L < >
-M
-r < >
-s
-t < >
-u < >
-v
-x < >
ad.mycompany.com
-w
192.168.230.240
mydc.local
Administrator
aaaa
[Expert@HostName:0]# $FWDIR/bin/test_ad_connectivity -u
"Administrator" -c "aaaa" -D
"CN=Administrator,CN=Users,DC=mydc,DC=local" -d mydc.local -i
192.168.230.240 -b "DC=mydc,DC=local" -o test.txt
[Expert@HostName:0]# cat $FWDIR/tmp/test.txt
(
:status (SUCCESS_LDAP_WMI)
:err_msg ("WMI_SUCCESS;LDAP_SUCCESS")
:ldap_status (LDAP_SUCCESS)
:wmi_status (WMI_SUCCESS)
:timestamp ("Mon Feb 26 10:17:41 2018")
)
vpn
check_ttm
{cipherutil | cu}
compreset
compstat
crl_zap
crlview
debug
dll
drv
dump_psk
ipafile_check
ipafile_users_capacity
macutil
mep_refresh
neo_proto
nssm_topology
overlap_encdom
rim_cleanup
rll
set_slim_server
set_snx_encdom_groups
set_trac
shell
show_tcpt
sw_topology
{tunnelutil | tu}
ver
check_ttm
cipherutil | cu
compreset
compstat
crl_zap
crlview
debug vpnd
dll
drv
dump_psk
ipafile_check
$FWDIR/conf/ipassignment.conf
ipafile_users_capacity
$FWDIR/conf/ipassignment.conf
macutil
mep_refresh
neo_proto
nssm_topology
overlap_encdom
rim_cleanup
rll
set_slim_server
set_snx_encdom_groups
set_trac
shell
show_tcpt
sw_topology
tunnelutil | tu TunnelUtil
ver
vpn check_ttm <ttm_file_path>
< >
[Expert@MyGW:0]#
vpn compreset
(Q) Quit
*******************************************
vpn compstat
Compression:
============
Bytes before compression : 0
Bytes after compression : 0
Compression overhead (bytes) : 0
Bytes that were not compressed : 0
Compressed packets : 0
Packets that were not compressed : 0
Compression errors : 0
Decompression:
==============
Bytes before decompression : 0
Bytes after decompression : 0
Decompression overhead (bytes) : 0
Decompressed packets : 0
Decompression errors : 0
Pure decompression ratio : 0.000000
[Expert@MyGW:0]#
vpn crl_zap
vpn crlview [-d]
-obj <Network Object Name> -cert <Certificate Object Name>
-f <Certificate File>
-view
-d
LDAP
vpn debug
on [<Debug_Topic>=<Debug_Level>]
off
ikeon [-s <Size_in_MB>]
ikeoff
trunc [<Debug_Topic>=<Debug_Level>]
truncon [<Debug_Topic>=<Debug_Level>]
truncoff
timeon [<Seconds>]
timeoff
ikefail [-s <Size_in_MB>]
mon
moff
say ["String"]
tunnel [<Level>]
on
$FWDIR/log/vpnd.elg*
< >=<
>
vpn debug trunc ALL=5
off
ikeoff
timeoff
mon
$FWDIR/log/ikemonitor.snoop
moff
say " " $FWDIR/log/vpnd.elg
vpn debug on vpn debug trunc vpn debug
truncon
tunnel [< >]
$FWDIR/log/vpnd.elg
$FWDIR/log/ike.elg
tunnel
ikev2
< >
CRLCache
vpn dll
dump <File>
resolve <HostName>
$FWDIR/tmp/vpnd_cmd.tmp
vpn drv
off
on
stat
off
on
stat
< >
{err | warn | detail}
err
warn
detail
verify_group_names
$FWDIR/conf/ipassignment.conf
$FWDIR/conf/ipassignment.conf
get
set <128-32768>
off
on
vpn nssm_topology -url <"url"> -dn <"dn"> -name <"name"> -pass <"password">
[-action <bypass|drop>][-print_xml]
-url
-dn
-name
-pass
-action
-print_xml
communities
traditional
The objects Paris and Chicago have overlapping encryption domains. The overlapping domain is:
10.8.8.1 - 10.8.8.1
- Same destination address can be reached in more than one community (MyIntranet, NewStar). This
configuration is not supported.
vpn rll
dump <File>
sync
$FWDIR/conf/slim.conf
vpn set_snx_encdom_groups
off
on
off
on
vpn set_trac
disable
enable
disable
enable
-d
vpn tu
vpn tunnelutil
# vpn tu
********** Select Option **********
(Q) Quit
*******************************************
vpn tu
help
del <options>
list <options>
mstats
tlist <options>
help
mstats
-w
all
vpn tu
ipsec
all
vpn tu
< >
vpn tu
< > < >
vpn tu
< >
vpn tu
< > < >
vpn tu
vpn tu [-w] list
ike
ipsec
peer_ike <IP Address>
peer_ipsec <IP Address>
tunnels
-w
ike
vpn tu
ipsec
vpn tu
peer_ike < >
vpn tu
peer_ipsec < >
vpn tu
tunnels
vpn tu tlist
vpn tu [-w] mstats
-w
[Expert@MyGW:0]#
[Expert@MyGW:0]#
vpn tu [-w] tlist
{-h | -help}
[clear]
[start]
[state]
[stop]
[<Sort Options>]
-w
-h | -help
clear
start
state
stop
< >
-b
-d
-e
-i
-m
-n
-p < >
-r
-s
-t
-v
... -<option1> -<option2> -<option3>
-v -t -b -r
... -<option1><option2><option3>
-vtbr
-k
-f
dbedit
mcc cpca
mcc
mcc
-h
add <options>
add2main <options>
del <options>
lca
main2add <options>
show <options>
-h
mcc add
dbedit
< >
< >
/var/log/Mycert.cer MyCA
mcc add MyCA /var/log/Mycert.cer
mcc add2main <CA Name> <Certificate Index Number>
mcc add2main
dbedit
< >
< >
MyCA
mcc add2main MyCA 1
mcc del <CA Name> <Certificate Index Number>
mcc del
dbedit
< >
< >
MyCA
mcc del MyCA 1
mcc lca
mcc main2add
dbedit
< >
MyCA
< >
< >
MyCA
mcc show MyCA 1
internal_ca
[Expert@MGMT:0]# mcc lca
MCC: Here is a list of the CAs, with the number of additional CA certificates
1. internal_ca (0)
[Expert@MGMT:0]#
[Expert@MGMT:0]#
< >
< >
< >
< >
< >
as,ow
as
ews
owa
all
-d < >
-x < >
-c < >:< >
-n
-m < >
-s < >
/Microsoft-Server-ActiveSync
-e < >
/EWS/Exchange.asmx
-f < >
-r
-n
-n
-v
$CVPNDIR/log/trace_log/
-p
cvpnd_admin
policy [hard]
debug [off | set ... | trace]
appMonitor status
policy
httpd
policy hard
httpd
http
debug set TDERROR_ALL_ALL=5 cvpnd debug
$CVPNDIR/log/cvpnd.elg
$CVPNDIR/log/trace_log/
TraceLogger
TraceLogger
TraceLogger
appMonitor status
$CVPNDIR/conf/cvpnd.C
cvpnd_settings
cvpnd_settings
$CVPNDIR/conf/cvpnd.C
cvpnd_settings -h
< >
get
set
add
listAdd
listRemove
internal
$CVPNDIR/conf/cvpnd_internal_settings.C
$CVPNDIR/conf/cvpnd.C
< >
< >
< >
< >
cvpn_ver
[Expert@MyGW:0]# cvpn_ver
This is Check Point Mobile Access R80.20 - Build 064
[Expert@MyGW:0]#
cvpnrestart [--with-pinger]
--with-pinger
cvpnstop
cvpnstart
cvpnstop
deleteUserSettings [-s] <Username1> [<Username2> ...]
-s
< >
fwpush
info
print
send <options>
unsub
info
xxxxxxxxxxxxx65b48e424023eb7952fbc5ca22ea788cfb3cxxxxxxxxxx
< > CN
JohnD
< > User Settings id
c4b6c6fbb0c4a4ff4469265e93e0e372
<
>
listusers
[Expert@MyGW:0]# listusers
---------------------------------
User Name | IP
---------------------------------
Tom , 192.168.0.51
Dick , 192.168.0.130
Jane , 192.168.0.7
[Expert@MyGW:0]#
$CVPNDIR/var/ssl/ca-bundle/
rehash_ca_bundle
vsenv [{<VSID> | <Name of Virtual Device>}]
< >
< >
vsx stat -v
[Expert@MyVsxGW:0]# vsenv
Context is set to Virtual Device VSX2_192.168.3.242 (ID 0).
[Expert@MyVsxGW:0]#
[Expert@MyVsxGW:0]# vsenv 2
Context is set to Virtual Device VS2 (ID 2).
[Expert@MyVsxGW:2]#
vsx
fetch <options>
fetch_all_cluster_policies
fetchvs <options>
get
initmsg <options>
mstat <options>
resctrl <options>
showncs <options>
sicreset
stat <options>
unloadall
vspurge
fw6 vsx
<options>
fetch < >
fetch_all_cluster_policies
sicreset
vspurge
vsx fetch [-v] [-q] [-s] local
vsx fetch [-v | -q | -s] [-f <conf_file>]
vsx fetch [-v | -q] -C "command"
vsx fetch [-v | -q | -c | -n | -s] [<Management Server>]
-c
-n
local.vsall
-q
-s
-v
local
$FWDIR/state/local/VSX/local.vsall
-f <conf_file>
local.vsall
-C "command"
$FWDIR/conf/masters
# vsx fetch
Fetching VSX Configuration From: 10.18.99.101
-v
vsx fetchvs [-v | -q] [{<VSID> | <Name of Virtual Device>}]
-q
-v
< >
< >
# vsx fetchvs 2
vsx get
-q
-v
-vs <VSID1>
debug
disable
enable
status
10
[Expert@MyVsxGW:0]#
[Expert@MyVsxGW:0]# vsx mstat -vs 0 unit G
[Expert@MyVsxGW:0]#
Note: To add a field to memory table please uncomment the required field (delete the leading '#')
To remove a field from memory table please comment out the required field (add a leading '#')
Configuration is done in the file /opt/CPsuite-R80.30/fw1/conf/memoryinfo.conf
[Expert@MyVsxGW:0]#
Important - R80.30 with Gaia kernel 3.10 does not support this command.
vsx resctrl monitor enable
--help
-d stat
-d -q stat
-u stat
load_configuration $FWDIR/conf/resctrl
monitor
disable
enable
show
reset
stop
vsx resctrl -u
[Expert@MyVsxGW:0]# vsx resctrl -d stat
Number of CPUs: 4
Monitoring active time: 2m 32s
[Expert@MyVsxGW:0]#
vsx showncs {<VSID> | <Name of Virtual Device>}
<
< >
cpca_client revoke_cert
<
>
< >
vsx stat [-l] [-v] [<VSID>]
-l
-v
< >
ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy | SIC Stat
-----+-------------+-----------------------+-----------------+--------------------------+---------
1 | S VS1 | VS_Policy | 20Sep2018 22:07 | <No Policy> | Trust
2 | S VS2 | VS_Policy | 20Sep2018 22:07 | <No Policy> | Trust
[Expert@MyVsxGW:2]#
VSID: 0
VRID: 0
Type: VSX Gateway
Name: VSX1_192.168.3.241
Security Policy: VSX_Cluster_VSX
Installed at: 20Sep2018 22:06:33
SIC Status: Trust
Connections number: 5
Connections peak: 43
Connections limit: 14900
VSID: 1
VRID: 1
Type: Virtual System
Name: VS1
Security Policy: VS_Policy
Installed at: 20Sep2018 22:07:03
SIC Status: Trust
Connections number: 0
Connections peak: 3
Connections limit: 14900
VSID: 2
VRID: 2
Type: Virtual System
Name: VS2
Security Policy: VS_Policy
Installed at: 20Sep2018 22:07:01
SIC Status: Trust
Connections number: 0
Connections peak: 2
Connections limit: 14900
[Expert@MyVsxGW:2]#
VSID: 2
VRID: 2
Type: Virtual System
Name: VS2
Security Policy: VS_Policy
Installed at: 20Sep2018 22:07:01
SIC Status: Trust
Connections number: 0
Connections peak: 2
Connections limit: 14900
[Expert@MyVsxGW:2]#
vsx unloadall
local.vskeep
local.vskeep
-q
-v
-f < >
vsx_util
vsx_util -h
vsx_util <Command> [-s <Server>] [-u <UserName>] [-c <Name of VSX Object>] [-m <Name
of VSX Cluster Member>]
-h
-u < >
-c
-m <
>
vsx_util
vsx_util
vsx_util add_member
vsx_util add_member_reconf add_member
vsx_util change_interfaces
vsx_util change_mgmt_ip
vsx_util change_mgmt_subnet
vsx_util change_private_net
vsx_util convert_cluster
vsx_util reconfigure
vsx_util remove_member
vsx_util show_interfaces
vsx_util upgrade
vsx_util view_vs_conf
vsx_util vsls
vsx_util_ .log
$FWDIR/log/vsx_util_ .log
/opt/CPsuite-R80.30/fw1/log/vsx_util_ .log
/opt/CPmds-R80.30/customers/<
>/CPsuite-R80.30/fw1/log/vsx_util_ .log
vsx_util add_member
vsx_util add_member_reconf
vsx_util add_member
vsx_util add_member_reconf
vsx_util change_interfaces
vsx_util change_interfaces
vsx_util
reconfigure
Would you like to remove the old interfaces from the database? (y|n)
[n]
vsx_util reconfigure
vsx_util change_mgmt_ip
vsx_util change_mgmt_subnet
vsx_util change_private_net
cpconfig
vsx_util reconfigure
vsx_util remove_member
cphastop
interfacesconfig.csv
vsx_util show_interfaces
+-------------------+---------------------+----+--------------------------------------------------
---+
| Type & Interface | Virtual Device Name |VSID| IP / Mask length |
+-------------------+---------------------+----+--------------------------------------------------
---+
|M eth0 |VSX_Cluster_1 |0 |v4 172.16.16.98/24 v6 2001:0DB8::98/64
|
+-------------------+---------------------+----+--------------------------------------------------
---+
|S eth1 |VSX_Cluster_1 |0 |v4
10.0.0.0/24 |
+-------------------+---------------------+----+--------------------------------------------------
---+
|U eth2 |VS1 |1 |v4 192.0.2.2/24 v6
2001:0DB8:c::1/64 |
+-------------------+---------------------+----+--------------------------------------------------
---+
|U eth3 |VS1 |1 |v4 192.168.3.3/24 v6 2001:0DB8:b::1/64
|
+-------------------+---------------------+----+--------------------------------------------------
---+
|A
eth4 | | |
|
+-------------------+---------------------+----+--------------------------------------------------
---+
|U eth5 |VS2 |2 |v4 10.10.10.10/24 v6 2001:0DB8:a::1/64
|
+-------------------+---------------------+----+--------------------------------------------------
---+
|A
eth6 | | |
|
+-------------------+---------------------+----+--------------------------------------------------
---+
[Expert@MGMT:0]#
[Expert@MGMT:0]# cat interfacesconfig.csv
Interface Name , Type ,Virtual Device Name , VSID , IPv4 Address , IPv4 mask length, IPv6 Address,
IPv6 mask length
eth0,M,VSX_Cluster_1,0,172.16.16.98,24,2001:0DB8::98,64
eth1,S,VSX_Cluster_1,0,10.0.0.0,24,,
eth2,U,VS1,192.0.2.2,24,2001:0DB8:c::1,64
eth3,U,VS1,192.168.3.3,24,2001:0DB8:b::1,64
eth4,A
eth5,U,VS2,10.10.10.10,24,2001:0DB8:a::1,64
eth6,A
[Expert@MGMT:0]#
vsx_util upgrade
vsx_util reconfigure
vsx_util view_vs_conf
+---------------------------------------------------+-----+-------------------+
|Interfaces |Mgmt |VSX GW(s) |
+----------+----------------------------------------+-----+---------+---------+
|Name |IP / Mask length | |mem 1 |mem2 |
+----------+----------------------------------------+-----+---------+---------+
|eth2 |v4 10.0.0.0/24 v6 2001:db8::abc::1/64 | V | V | V |
|eth3 |v4 10.10.10.10/24 v6 2001:db8::3121/64 | V | V | V |
+----------+----------------------------------------+-----+---------+---------+
V - Interface exists on the gateway and matches management information (if defined on the
management).
- - Interface does not exist on the gateway.
N/A - Fetching Virtual Device configuration from the gateway failed.
!IP - Interface exists on the gateway, but there is an IP address mismatch.
!MASK - Interface exists on the gateway, but there is a Net Mask mismatch.
Routing table:
+----------------------------------------------------------+-----+-------------+
|Ipv4 Routes |Mgmt |VSX GW(s) |
+--------------------------+--------------------+----------+-----+------+------+
|Destination / Mask Length |Gateway |Interface | |mem1 |mem2 |
+--------------------------+--------------------+----------+-----+------+------+
|2.2.2.0/24 | |eth2 | V | V | V |
|3.3.3.0/24 | |eth3 | V | V | V |
+--------------------------+--------------------+----------+-----+------+------+
+--------------------------+--------------------+----------+-----+------+------+
+----------------------------------------------------------+-----+-------------+
|Ipv6 Routes |Mgmt |VSX GW(s) |
+--------------------------+--------------------+----------+-----+------+------+
|Destination / Mask Length |Gateway |Interface | |mem1 |mem2 |
+--------------------------+--------------------+----------+-----+------+------+
|2001:db8::abc::/64 | |eth2 | V | !NH | !NH |
|2001:db8:0a::/64 | |eth3 | V | !NH | !NH |
+--------------------------+--------------------+----------+-----+------+------+
|2001:db8::1ffe:0:0:0/112 | |eth2 | - | V | V |
|2001:db8::fd9a:0:1:0/112 | |eth3 | - | V | V |
+--------------------------+--------------------+----------+-----+------+------+
V - Route exists on the gateway and matches management information (if defined on the management).
- - Route does not exist on the gateway.
N/A - Fetching Virtual Device configuration from the gateway failed.
!NH - Route exists on the gateway, but there is a Next Hop mismatch.
Note: Routes can be created automatically on the gateways by the Operating System.
Therefore, routes that appear on all gateways, but are not defined on the management,
do not necessarily indicate a problem.
[Expert@MGMT:0]#
vsx_util vsls
Operation not allowed. Object is not a Virtual
System Load Sharing cluster. vsx_util convert_cluster
vsx_provisioning_tool -h
vsx_provisioning_tool [-s <Server>] {-u <User> | -c <Certificate>} -p <Password>
-o <Commands> [-a] -L
-f <Input File> [-l <Line>] [-a] -L
-h
-s < >
-u < >
-c < >
-p < >
-o < >
-f < >
-l -f
-a
-L
-a
/var/log/vsx.txt
vsx_provisioning_tool –s localhost -u admin -p mypassword -f /var/log/vsx.txt
VS1 VSX1
eth4
, -o
-f
,
vsx_provisioning_tool
transaction begin
transaction end
transaction cancel
add vsx type gateway name <Object Name> version <Version> main_ip <Main IPv4
Address> main_ip6 <Main IPv6 Address> sic_otp <Activation Key> [rule_snmp
{enable|disable}] [rule_ssh {enable|disable}] [rule_ping {enable|disable}
[rule_ping6 {enable|disable}] [rule_https {enable|disable}] [rule_drop
{enable|disable}]
name <
>
main_ip <
>
main_ip6 <
>
sic_otp
<
rule_snmp enable
{enable |
disable} disable
enable
disable
rule_ssh enable
{enable |
disable} disable
enable
disable
rule_ping enable
{enable |
disable} disable
enable
disable
rule_ping6 enable
{enable |
disable} disable
enable
disable
rule_https enable
{enable |
disable} disable
enable
disable
rule_drop enable
{enable |
disable} disable
enable
disable
add vsx_member
add vsx
main_ip <
>
main_ip6 <
>
cluster_type {vsls | ha |
crbm}
vsls
ha
crbm
sync_if_name
>
sync_netmask <
>
rule_snmp {enable | enable
disable}
disable
enable
disable
enable
disable
enable
disable
disable
enable
disable
add vd name <Device Object Name> vsx <VSX GW or Cluster Object Name> [type
{vs|vsbm|vsw|vr}] [vs_mtu <MTU>] [instances <Number of IPv4 CoreXL Firewall
instances>] [instances6 <Number of IPv6 CoreXL Firewall instances>] [main_ip <Main
IPv4 Address>] [main_ip6 <Main IPv6 Address>] [calc_topo_auto {true|false}]
name <
>
vsx <
>
type vsbm
type vsw
instances
<
>
type vs
type vsbm
instances6
<
>
type vs
type vsbm
main_ip <
>
type vs
type vr
main_ip6 <
>
type vs
type vr
calc_topo_auto true
{true | false}
false true
false
type vs
type vr
name <
>
set vd name <Device Object Name> [vs_mtu <MTU>] [instances <Number of IPv4 CoreXL
Firewall instances>] [instances6 <Number of IPv6 CoreXL Firewall instances>]
[main_ip <Main IPv4 Address>] [main_ip6 <Main IPv6 Address>] [calc_topo_auto
{true|false}]
name <
>
instances
<
>
instances6
<
>
main_ip <
>
empty set
vd name VS1 main_ip6 empty
calc_topo_auto true
false true
false
add interface vd <Device Object Name> {name <Interface> | leads_to <VSW or VR Object
Name>} ip <IPv4 Address>{/<IPv4 Prefix Length> | netmask <IPv4 Netmask> | prefix
<IPv4 Prefix>} ip6 <IPv6 Address>{/<IPv6 Prefix Length> | netmask6 <IPv6 Netmask>
| prefix6 <IPv6 Prefix>} [propagate {true|false}] [propagate6 {true|false}]
[topology {external | internal_undefined | internal_this_network |
internal_specific [specific_group <Network Group Object Name>}] [mtu <MTU>]
vd <
>
name
leads_to
leads_to <
>
name
leads_to
ip <
>{/< > <IPv4 Address>
| netmask <
> | prefix
< >} <IPv4 Prefix>
<IPv4 Netmask>
ip6 <
>{/< > <IPv6 Address
| netmask6 <
> | prefix6
< >} <IPv6 Prefix>
<IPv6 Netmask>
propagate {true | true
false}
false
true
false
false
internal_this_network
internal_specific
specific_group topology
< internal_specific
>
vd <
>
leads_to <
>
name leads_to
vd <
>
name
leads_to
new_name < >
leads_to <
>
name
leads_to
false
false
topology {external | external
internal_undefined
internal_undefined
|
internal_this_netwo internal_this_netwo external
rk | rk
internal_specific } internal_specific internal_undefined
internal_this_network
internal_specific
specific_group topology
< internal_specific
>
vd <
>
destination {<
>[/< >] <IP Address>
| default |
default6}
<IP Prefix>
default
default6
next_hop <
>
next_hop
leads_to
leads_to <
>
next_hop
leads_to
propagate true
{true|false}
false
true
false
next_hop
vd <
>
destination {<
>[/< >] <IP Address>
| default |
default6}
<IP Prefix>
default
default6
vd name <
>
wrpj
1 transaction begin
2 add vd name VR1 vsx VSX1 type vr
3 add interface name eth3.100 ip 10.0.0.1/24
4 transaction end
5 transaction begin
6 add vd name VR2 vsx VSX2 type vr
7 add interface name eth3.200 ip 20.0.0.1/24
8 transaction end
9 transaction begin
10 add vd name VS1 vsx VSX1
11 add interface leads_to VR1 ip 192.168.1.1/32
12 add interface name eth4.20 ip 192.168.20.1/24 propagate true
13 add route destination default leads_to VR1
14 add route destination 192.168.40.0/25 next_hop 192.168.20.254
15 transaction end
1 transaction begin
2 add vd name VSW1 vsx VSX1 type vsw vs_mtu 1400
3 add interface name eth3.100
4 transaction end
5 transaction begin
6 add vd name VS1 vsx VSX1 calc_topo_auto false
7 add interface leads_to VSW1 ip 10.0.0.1/24 ip6 2001::1/64 topology external
8 add interface name eth4.20 ip 192.168.20.1/25 ip6 2020::1/64 topology
9 internal_this_network
10 add route destination default next_hop 10.0.0.254
11 add route destination default6 next_hop 2001::254
transaction end
1 transaction begin
2 set vd name VS1 instances 4 instances6 2 calc_topo_auto true
3 set interface name eth4.20 new_name eth4.21 mtu 1400
4 transaction end
fgd50
$FWDIR/conf/masters
etmstart
[Expert@MyGW:0]# etmstart
FloodGate-1: Starting fgd50
eth0(inbound), eth0(outbound).
Download OK.
Done.
FloodGate-1 started
[Expert@MyGW:0]#
fgd50
etmstop
[Expert@CXL1_192.168.3.52:0]# etmstop
Unloading QoS Policy:
Target(s): CXL1_192.168.3.52
CXL1_192.168.3.52: QoS policy unloaded successfully.
Done.
FloodGate-1 stopped
[Expert@CXL1_192.168.3.52:0]#
fgate [-d]
ctl
-h
<QoS Module> {on | off}
debug
on
off
fetch
-f
<Management Server>
kill [-t <Signal Number>] <Name of QoS Process>
load
log
on
off
stat
stat [-h]
ver [-k]
unload
-d
ctl -h
on
off
fgd50
$FGDIR/log/fgd.elg
fetch -f
$FWDIR/conf/masters
fetch <Management
Server>
$FWDIR/tmp/< >.pid
$FWDIR/tmp/fgd50.pid
$FWDIR/tmp/< >.pid
SIGTERM
kill -l
kill
signal
fgd50
etmstop etmstart
load
etmstop etmstart
log {on | off | stat}
on
off
stat
stat [-h]
-h stat
cpstat
ver [-k]
-k
unload
eth0(inbound), eth0(outbound).
Download OK.
Done.
[Expert@MyGW]#
eth0(inbound), eth0(outbound).
Download OK.
Done.
[Expert@MyGW]#
[Expert@MyGW]#
fgate [-d]
load <Name of QoS Policy>.F <GW1> <GW2> ... <GWN>
stat
-h
<GW1> <GW2> ... <GWN>}
unload <GW1> <GW2> ... <GWN>
ver
-d
load <
>.F < > < >
... < > < >
< > ... < >
stat -h stat
stat < > < > ...
< >
cpstat
unload < >< > ...
< > < > < > ... < >
ver
Interface table
----------------------------------------------------------------
|Name|Dir|Limit (Bps)|Avg Rate (Bps)|Conns|Pend pkts|Pend bytes|
----------------------------------------------------------------
|eth0|in | 1250000000| 0| 0| 0| 0|
|eth0|out| 1250000000| 0| 0| 0| 0|
----------------------------------------------------------------
[Expert@MGMT:0]#
bypass <options>
(on page 1099)
debug < >
off
on
pmstats
< >
refreshcap
stat
off
on
cpu
mem
low
high
<Threshold>
-e <Filter>
-o <Output File>
ips on [-n]
[Expert@MyGW:0]# ips on
IPS is enabled
Please note that for the configuration to apply for connections from existing
templates, you have to run this command with -n flag which deletes existing
templates.
Without '-n', it will fully take effect in a few minutes.
[Expert@MyGW:0]#
[Expert@MyGW:0]# ips on -n
IPS is enabled
Deleting templates
-o <Output File>
reset
ips stat
Active Profiles:
$FWDIR/ips/statistics_results/
ips.dbg
ips_stat_output_file.cs
v
pm_output_file.csv
tier1_output_file.csv
tier2_output_file.csv
ips stats -h
ips stats
ips stats <Seconds>
ips stats -g <Seconds>
ips stats <IP Address of Gateway>
ips stats <IP Address of Gateway> <Seconds>
ips stats <IP Address of Gateway> -m
ips stats -h
ips stats
/ips_tar.tgz
/ips_tar.tgz
ips_stats 192.168.20.14 40
ips_stats –g 30
ips_stats 192.168.20.14 –m
rtm
debug <options>
drv <options>
monitor <options>
rtmd
stat <options>
ver <options>
rtmd
stat < >
on
off
OPSEC_DEBUG_LEVEL
TDERROR_RTM_ALL
rtm drv
off
on
stat
on
off
stat
rtm monitor vl <Virtual_Link_Name> [-t {wire | application}] [-h <Module>]
rtm monitor <Key_1> [<Key_2> [<Key_3>] [<Key_4>]] <Value_Column_1>
[<Value_Column_2> [<Value_Column_3>] [<Value_Column_4>] [<Value_Column_5>]
[<Value_Column_6>]] [<Filter>] [<Options>]
< >
-t {wire |
application}
wire
application
-h < >
fgrule
fwrule
interface
interface
,{in|out|both} both
ip
orientation
pktRange
src
svc http
tunnel .
tunnelType
0
1
2
url [< >]
< >
url_mod=full
url_mod=host
url_mod=host_path
url_mod=path
url_mod=scheme
url_mod=scheme_host
wdAttack
< > [...
[< >]] -v < > [< >] [< >] [<
>] [< >]
< >
ab
conn
pkt
session
wb
< >
< >=ab
acc=lineUtil
acc=rate
acc=sum
< >=conn
acc=concurrent
acc=new
< >=pkt
acc=rate
acc=sum
< >=session
acc=new
< >=wb
acc=lineUtil
acc=rate
acc=sum
< >
sort=top
sort=bottom
sort=none
< >
dir=in
dir=out
dir=both
< >
enc=yes
enc=no
enc=both
< >
-f < > [not] [< > ... < >]
-f {and | or} [...]
< >
connId
dst
fgrule
fwrule
interface
interface
,{in|out|both} both
ip
orientation
src
svc http .
tunnel
tunnelType
0
1
2
url [< >]
< >
url_mod=full
url_mod=host
url_mod=host_path
url_mod=path
url_mod=scheme
url_mod=scheme_host
wdAttack
< >
-e < >
-h < >
localhost
-i < >
rtm monitor -k ip -v pkt dir=in acc=sum -v pkt dir=out acc=sum -v pkt acc=sum
sort=bottom -i 10
rtm monitor -k pktRange 0-99 100-499 500-999 1000-1999 ">2000" -v pkt acc=sum -i
1
-d
rtm stat -h
rtm stat [vl | view] [perf [{on | off | reset}] [-i <Interval>] [-r <View_ID>]
[-v[v][v]]
-h
vl
view
perf [{off | on |
reset}]
off
on
reset
New Connections
Packets
Inf Reclassify
View Reclassify
End Connections
Packets / connections ratio
-i < >
-r < >
-v[v][v]
-v
-vv
-vvv
Number of Entries(2)
Keys(-k svc acc=replace )
Values(-v wb acc=rate )
Sort(-s top )
Filter(-)
Daemon id:5 kernel id:0 timeUntilUpdate: 1 [Sec]
-------------------------------------------------------------------------------------------
[Expert@MyGW:0]#
rtm ver [-k]
-k
rtmstart
rtmstop
/etc/profile.d/CP.sh
#!/bin/bash
source /etc/profile.d/CP.sh
$FWDIR/modules/fw_kern_64.o
$FWDIR/modules/fw_kern_64_v6.o
$PPKDIR/modules/sim_kern_64.o
$PPKDIR/modules/sim_kern_64_v6.o
fw ctl
set
$FWDIR/modules/fwkern.conf
$FWDIR/modules/vpnkern.conf
fw_allow_simultaneous_ping
fw_kdprintf_limit
fw_log_bufsize
send_buf_limit
simple_debug_filter_addr_1
simple_debug_filter_daddr_1
simple_debug_filter_vpn_1
ws_debug_ip_str
fw_lsp_pair1
/var/log/fw_integer_kernel_parameters.txt
[Expert@MyGW:0]# modinfo -p $FWDIR/modules/fw_kern*.o | sort -u | grep
'string param' | awk 'BEGIN {FS=":"} ; {print $1}' | xargs -n 1 fw ctl
get str 1>> /var/log/fw_string_kernel_parameters.txt 2>>
/var/log/fw_string_kernel_parameters.txt
/var/log/fw_string_kernel_parameters.txt
$FWDIR/modules/fwkern.conf
$FWDIR/modules/vpnkern.conf
[Expert@MyGW:0]# ls -l $FWDIR/modules/fwkern.conf
[Expert@MyGW:0]# ls -l $FWDIR/modules/vpnkern.conf
[Expert@MyGW:0]# cp -v $FWDIR/modules/fwkern.conf{,_BKP}
[Expert@MyGW:0]# cp -v $FWDIR/modules/vpnkern.conf{,_BKP}
[Expert@MyGW:0]# vi $FWDIR/modules/fwkern.conf
[Expert@MyGW:0]# vi $FWDIR/modules/vpnkern.conf
<Name_of_Integer_Kernel_Parameter>=<Integer_Value>
<Name_of_String_Kernel_Parameter>='<String_Text>'
<Name_of_String_Kernel_Parameter>="<String_Text>"
fw ctl get int < > [-a]
fw ctl get str < > [-a]
fw ctl set
$PPKDIR/conf/simkern.conf
fw ctl get
num_of_sxl_devices
sim_ipsec_dont_fragment
tcp_always_keepalive
sim_log_all_frags
simple_debug_filter_dport_1
simple_debug_filter_proto_1
simple_debug_filter_addr_1
simple_debug_filter_daddr_2
simlinux_excluded_ifs_list
/var/log/sxl_string_kernel_parameters.txt
[Expert@MyGW:0]# ls -l $PPKDIR/conf/simkern.conf
[Expert@MyGW:0]# cp -v $PPKDIR/conf/simkern.conf{,_BKP}
[Expert@MyGW:0]# vi $PPKDIR/conf/simkern.conf
<Name_of_SecureXL_Integer_Kernel_Parameter>=<Integer_Value>
<Name_of_SecureXL_String_Kernel_Parameter>="<String_Text>"
<Name_of_SecureXL_String_Kernel_Parameter>="<String_Text>"
fw ctl get int < > [-a]
fw ctl get str < > [-a]