CP R80.40 CLI ReferenceGuide
CP R80.40 CLI ReferenceGuide
CLI
R80.40
Reference Guide
Check Point Copyright Notice
© 2020 - 2024 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and
distributed under licensing restricting their use, copying, distribution, and decompilation. No
part of this product or related documentation may be reproduced in any form or by any means
without prior written authorization of Check Point. While every precaution has been taken in
the preparation of this book, Check Point assumes no responsibility for errors or omissions.
This publication and features described herein are subject to change without notice.
TRADEMARKS:
Refer to the Copyright page for a list of our trademarks.
Refer to the Third Party copyright notices for a list of relevant copyrights and third-party
licenses.
Important Information
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-
date with the latest functional improvements, stability fixes, security
enhancements and protection against new and evolving attacks.
Certifications
For third party independent certification of Check Point products, see the Check
Point Certifications page.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments.
Revision History
Date Description
26 October Updated:
2023
n "ClusterXL Monitoring Commands" on page 1232 - removed the
"cphaprob latency" command as not supported
n "fw ctl multik prioq" on page 1516
n "cpstart" on page 957 (for Security Gateway)
n "fw tab" on page 1152 - added "fw tab -t connections -z"
09 Updated:
September
2023
n "cp_conf ca" on page 63 - for Security Management Server
n "cpca_client get_crldp" on page 101 - for Security Management
Server
n "fwm dbload" on page 309 - for Security Management Server
n "cp_conf ca" on page 413 - for Multi-Domain Server
n "cpca_client get_crldp" on page 451 - for Multi-Domain Server
n "fwm dbload" on page 655 - for Multi-Domain Server
n "fw ctl conn" on page 1021
14 February Updated:
2023
n "cp_log_export" on page 74 for Security Management Server
n "ips stats" on page 1841
17 October Updated:
2022
n "cp_log_export" on page 74 - for Security Management Server
n "cp_log_export" on page 424 - for Multi-Domain Server
03 August Updated:
2022
n "Running Check Point Commands in Shell Scripts" on page 1862
Date Description
16 June 2022 In the HTML version, added glossary terms in the text
Added:
n "Monitoring Commands" on page 1844
n "cpca_client set_mgmt_tool" on page 116 - for Security Management
Server
n "cpca_client set_mgmt_tool" on page 465 - for Multi-Domain Server
Updated:
n The syntax in all commands listed in the chapter "fwaccel dos" on
page 1322
n Starting from R80.40 Jumbo Hotfix Accumulator Take 92:
l The term "allow-list" replaces the term "blacklist"
Date Description
21 December Updated:
2020
n "fw up_execute" on page 1165
23 August Added:
2020
n "vsx_util downgrade" on page 1763
Updated:
n "vsx_util" on page 1746
n "vsx_util convert_cluster" on page 1762
n "vsx_util upgrade" on page 1775
10 March Updated:
2020
n "Registering a Critical Device" on page 1210
02 February Updated:
2020
n "vsx" on page 1727
n "vsx mstat" on page 1735
Date Description
29 January Updated:
2020
n "dynamic_split" on page 1498
Table of Contents
Introduction 36
Syntax Legend 37
Gaia Commands 39
Security Management Server Commands 40
Managing Security through API 41
API 41
API Tools 41
Configuring the API Server 42
contract_util 44
contract_util check 46
contract_util cpmacro 47
contract_util download 48
contract_util mgmt 50
contract_util print 51
contract_util summary 52
contract_util update 53
contract_util verify 54
cp_conf 55
cp_conf admin 58
cp_conf auto 61
cp_conf ca 63
cp_conf client 65
cp_conf finger 69
cp_conf lic 71
cp_log_export 74
cpca_client 95
cpca_client create_cert 97
cpca_client double_sign 99
cpca_client get_crldp 101
cpca_client get_pubkey 103
cpca_client init_certs 104
cpca_client lscert 105
cpca_client revoke_cert 108
cpca_client revoke_non_exist_cert 111
cpca_client search 112
cpca_client set_cert_validity 114
cpca_client set_mgmt_tool 116
cpca_client set_sign_hash 121
cpca_create 123
cpconfig 124
cpinfo 127
cplic 128
cplic check 131
cplic contract 133
cplic db_add 135
cplic db_print 137
cplic db_rm 139
cplic del 140
cplic del <object name> 141
cplic get 142
cplic print 144
cplic put 146
cplic put <object name> 148
cplic upgrade 151
cppkg 154
cppkg add 156
cppkg delete 157
dbedit 577
fw 590
fw fetchlogs 592
fw hastat 594
fw kill 595
fw log 596
fw logswitch 606
fw lslogs 610
fw mergefiles 613
fw repairlog 616
fw sam 617
fw sam_policy 625
fw sam_policy add 628
fw sam_policy batch 641
fw sam_policy del 643
fw sam_policy get 646
fwm 652
fwm dbload 655
fwm exportcert 656
fwm fetchfile 657
fwm fingerprint 659
fwm getpcap 661
fwm ikecrypt 663
fwm load 664
fwm logexport 665
fwm mds 670
fwm printcert 672
fwm sic_reset 678
fwm snmp_trap 679
fwm unload 682
control_bootsec 917
cp_conf 921
cp_conf auto 924
cp_conf corexl 926
cp_conf fullha 928
cp_conf ha 929
cp_conf intfs 930
cp_conf lic 931
cp_conf sic 934
cpconfig 936
cpinfo 939
cplic 940
cplic check 942
cplic contract 944
cplic del 946
cplic print 947
cplic put 949
cpprod_util 951
cpstart 957
cpstat 958
cpstop 967
cpview 968
Overview of CPView 968
CPView User Interface 968
Using CPView 969
dynamic_objects 970
cpwd_admin 974
cpwd_admin config 977
cpwd_admin del 984
cpwd_admin detach 985
UserSettingsUtil 1714
Data Loss Prevention Commands 1716
dlpcmd 1717
VSX Commands 1720
cpconfig 1721
cpview 1724
Overview of CPView 1724
CPView User Interface 1724
Using CPView 1725
vsenv 1726
vsx 1727
vsx fetch 1730
vsx fetch_all_cluster_policies 1732
vsx fetchvs 1733
vsx get 1734
vsx mstat 1735
vsx showncs 1739
vsx sicreset 1740
vsx stat 1741
vsx unloadall 1744
vsx vspurge 1745
vsx_util 1746
vsx_util add_member 1751
vsx_util change_interfaces 1753
vsx_util change_mgmt_ip 1757
vsx_util change_mgmt_subnet 1758
vsx_util change_private_net 1760
vsx_util convert_cluster 1762
vsx_util downgrade 1763
vsx_util reconfigure 1764
Introduction
The CLI Reference Guide provides CLI commands to configure and monitor Check Point
Software Blades.
Syntax Legend
Whenever possible, this guide lists commands, parameters and options in the alphabetical
order.
This guide uses this convention in the Command Line Interface (CLI) syntax:
Character Description
Character Description
Square brackets or Enclose an optional command or parameter, which user can also
brackets enter.
[]
Gaia Commands
See:
n R80.40 Gaia Administration Guide
n R80.40 Gaia Advanced Routing Administration Guide
API
You can configure and control the Management Server through API Requests you send to the
API Server that runs on the Management Server.
The API Server runs scripts that automate daily tasks and integrate the Check Point solutions
with third party systems, such as virtualization servers, ticketing systems, and change
management systems.
To learn more about the management APIs, to see code samples, and to take advantage of
user forums, see:
n The API Documentation:
l Online - Check Point Management API Reference
l Local - https://<Server IP Address>/api_docs
By default, access to the local API Documentation is disabled. Follow the
instructions in sk174606.
n The Developers Network section of Check Point CheckMates Community.
API Tools
You can use these tools to work with the API Server on the Management Server:
n Standalone management tool, included with Gaia operating system:
mgmt_cli
n Standalone management tool, included with SmartConsole:
mgmt_cli.exe
You can copy this tool from the SmartConsole installation folder to other computers that
run Windows operating system.
n Web Services APIs that allow communication and data exchange between the clients
and the Management Server over the HTTP protocol.
These APIs also let other Check Point processes communicate with the Management
Server over the HTTPS protocol.
https://<IP Address of Management Server>/web_api/<command>
Select Automatic start to automatically start the API server when you start or reboot
the Management Server.
Notes:
n If the Management Server has more than 4GB of RAM installed, the
Select one of these options to configure which clients can connect to the API Server:
n Management server only - Only the Management Server itself can connect to
the API Server. This option only lets you use the mgmt_cli utility on the
Management Server to send API requests. You cannot use SmartConsole or
Web services to send API requests.
n All IP addresses that can be used for GUI clients - You can send API requests
from all IP addresses that are defined as Trusted Clients in SmartConsole. This
includes requests from SmartConsole, Web services, and the mgmt_cli utility
on the Management Server.
n All IP addresses - You can send API requests from all IP addresses. This
includes requests from SmartConsole, Web services, and the mgmt_cli utility
on the Management Server.
api restart
Note - On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server.
contract_util
Description
Works with the Check Point Service Contracts.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
contract_util [-d]
check <options>
cpmacro <options>
download <options>
mgmt
print <options>
summary <options>
update <options>
verify
Parameters
Parameter Description
cpmacro Overwrites the current cp.macro file with the specified cp.macro file.
<options> See "contract_util cpmacro" on page 47.
download Downloads all associated Check Point Service Contracts from the User
<options> Center, or from a local file.
See "contract_util download" on page 48.
mgmt Delivers the Service Contract information from the Management Server to
the managed Security Gateways.
See "contract_util mgmt" on page 50.
print Shows all the installed licenses and whether the Service Contract covers
<options> these license, which entitles them for upgrade or not.
See "contract_util print" on page 51.
Parameter Description
update Updates Check Point Service Contracts from your User Center account.
<options> See "contract_util update" on page 53.
contract_util check
Description
Checks whether the Security Gateway is eligible for an upgrade.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
contract_util check
{-h | -help}
hfa
maj_upgrade
min_upgrade
upgrade
Parameters
Parameter Description
hfa Checks whether the Security Gateway is eligible for an upgrade to a higher
Hotfix Accumulator.
maj_ Checks whether the Security Gateway is eligible for an upgrade to a higher
upgrade Major version.
min_ Checks whether the Security Gateway is eligible for an upgrade to a higher
upgrade Minor version.
contract_util cpmacro
Description
Overwrites the current cp.macro file with the specified cp.macro file, if the specified is
newer than the current file.
For more information about the cp.macro file, see sk96217: What is a cp.macro file?
Syntax
Message Description
contract_util download
Description
Downloads all associated Check Point Service Contracts from User Center, or from a local file.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
contract_util download
{-h | -help}
local
{-h | -help}
[{hfa | maj_upgrade | min_upgrade | upgrade}] <Service
Contract File>
uc
{-h | -help}
[-i] [{hfa | maj_upgrade | min_upgrade | upgrade}]
<Username> <Password> [<Proxy Server> [<Proxy Username>:<Proxy
Password>]]
Parameters
Parameter Description
<Proxy Server> [<Proxy Specifies that the connection to the User Center goes
Username>:<Proxy through the proxy server.
Password>]
n <Proxy Server> - IP address of resolvable
hostname of the proxy server
n <Proxy Username> - Username for the proxy
server.
n <Proxy Password> - Password for the proxy
server.
Note - If you do not specify the proxy server explicitly, the
command uses the proxy server configured in the
management database.
<Service Contract Path to and the name of the Service Contract file.
File> First, you must download the Service Contract file from
your User Center account.
contract_util mgmt
Description
Delivers the Service Contract information from the Management Server to the managed
Security Gateways.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
contract_util mgmt
contract_util print
Description
Shows all the installed licenses and whether the Service Contract covers these license, which
entitles them for upgrade or not.
This command can show which licenses are not recognized by the Service Contract file.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
Parameters
Parameter Description
contract_util summary
Description
Shows post-installation summary and whether this Check Point computer is eligible for
upgrades.
Syntax
contract_util summary
hfa
maj_upgrade
min_upgrade
upgrade
Parameters
Parameter Description
contract_util update
Description
Updates the Check Point Service Contracts from your User Center account.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
contract_util update
[-proxy <Proxy Server>:<Proxy Port>]
[-ca_path <Path to ca-bundle.crt File>]
Parameters
Parameter Description
-proxy <Proxy Specifies that the connection to the User Center goes through
Server>:<Proxy the proxy server:
Port>
n <Proxy Server> - IP address of resolvable hostname
of the proxy server.
n <Proxy Port> - The applicable port on the proxy
server.
Note - If you do not specify the proxy explicitly, the
command uses the proxy configured in the management
database.
-ca_path <Path to Specifies the path to the Certificate Authority Bundle file (ca-
ca-bundle.crt File> bundle.crt).
Note - If you do not specify the path explicitly, the
command uses the default path.
contract_util verify
Description
Checks whether the Security Gateway is eligible for an upgrade.
This command is the same as the "contract_util check" on page 46 command, but it also
interprets the return values and shows a meaningful message.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
contract_util verify
cp_conf
Description
Configures or reconfigures a Check Point product installation.
Note - The available options for each Check Point computer depend on the
configuration and installed products.
cp_conf
-h
admin <options>
auto <options>
ca <options>
client <options>
finger <options>
lic <options>
snmp <options>
cp_conf
-h
adv_routing <options>
auto <options>
corexl <options>
fullha <options>
ha <options>
intfs <options>
lic <options>
sic <options>
snmp <options>
Parameters
Parameter Description
Parameter Description
auto Shows and configures the automatic start of Check Point products
<options> during boot.
See "cp_conf auto" on page 61.
client Configures the GUI clients that can use SmartConsole to connect to the
<options> Security Management Server.
See "cp_conf client" on page 65.
Parameter Description
cp_conf admin
Description
Configures Check Point system administrators for the Security Management Server.
Notes:
n Multi-Domain Server does not support this command.
n Only one administrator can be defined in the "cpconfig" on page 124 menu.
To define additional administrators, use SmartConsole.
n This command corresponds to the option Administrator in the "cpconfig" on
page 124 menu.
Syntax
cp_conf admin
-h
add [<UserName> <Password> {a | w | r}]
add -gaia [{a | w | r}]
del <UserName1> <UserName2> ...
get
Parameters
Parameter Description
add -gaia [{a | w | r}] Adds the Gaia administrator user admin:
n a - Assigns all permissions - read settings, write
settings, and manage administrators
n w - Assigns permissions to read and write settings
only (cannot manage administrators)
n r - Assigns permissions to only read settings
Permissions for all products (Read/[W]rite All, [R]ead Only All, [C]ustomized) c
Permission for SmartUpdate (Read/[W]rite, [R]ead Only, [N]one) w
Permission for Monitoring (Read/[W]rite, [R]ead Only, [N]one) w
cp_conf auto
Description
Shows and controls which of Check Point products start automatically during boot.
Note - This command corresponds to the option Automatic start of Check Point
Products in the "cpconfig" on page 124 menu.
Note - On a Multi-Domain Server, use the option Automatic Start of Multi-Domain
Server in the "mdsconfig" on page 717 menu.
Syntax
cp_conf auto
-h
{enable | disable} <Product1> <Product2> ...
get all
Parameters
Parameter Description
[Expert@MGMT:0]#
[Expert@GW:0]#
cp_conf ca
Description
This command changes the settings of the Internal Certificate Authority (ICA).
Syntax
cp_conf ca
-h
fqdn <FQDN Name>
init
Parameters
Parameter Description
fqdn <FQDN Configures the Fully Qualified Domain Name (FQDN) for the Internal
Name> Certificate Authority (ICA).
The "<FQDN Name>" is the text string in this format:
hostname.domainname
Notes:
n The existing certificates for configured objects are not
revoked.
n The existing ICA certificate is not changed.
n The Management Server uses the specified "<FQDN Name>"
to configure the Certificate Revocation List Distribution Point
(CRL DP) property in all certificates that the ICA generates.
Refer to this command: "cpca_client get_crldp" on page 101
Example
[Expert@MyMGMT:0]# hostname
MyMGMT
[Expert@MyMGMT:0]#
[Expert@MyMGMT:0]# domainname
checkpoint.com
[Expert@MyMGMT:0]#
cp_conf client
Description
Configures the GUI clients that are allowed to connect with SmartConsoles to the Security
Management Server.
Notes:
n Multi-Domain Server does not support this command.
n This command corresponds to the option GUI Clients in the "cpconfig" on
page 124 menu.
Syntax
cp_conf client
add <GUI Client>
createlist <GUI Client 1> <GUI Client 2> ...
del <GUI Client 1> <GUI Client 2> ...
get
Parameters
Parameter Description
createlist <GUI Client 1> Deletes the current allowed GUI clients and creates
<GUI Client 2> ... a new list of allowed GUI clients.
del <GUI Client 1> <GUI Deletes the specified the GUI clients.
Client 2> ...
Examples
Example 1 - Configure one IPv4 address
[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#
Example 6 - Delete the current list and create a new list of allowed GUI clients
[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#
cp_conf finger
Description
Shows the Internal Certificate Authority's Fingerprint.
This fingerprint is a text string derived from the ICA certificate on the Security Management
Server, Multi-Domain Server, or Domain Management Server.
This fingerprint verifies the identity of the Security Management Server, Multi-Domain Server,
or Domain Management Server when you connect to it with SmartConsole.
Syntax
cp_conf finger
-h
get
Parameters
Parameter Description
Example
cp_conf lic
Description
Shows, adds and deletes Check Point licenses.
Note - This command corresponds to the option Licenses and contracts in the
"cpconfig" on page 124 menu.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
cp_conf lic
-h
add -f <Full Path to License File>
add -m <Host> <Date> <Signature Key> <SKU/Features>
del <Signature Key>
get [-x]
Parameters
Parameter Description
add -f <Full Path to Adds a license from the specified Check Point
License File> license file.
You get this license file in the Check Point User
Center.
This is the same command as the "cplic db_add" on
page 135.
cp_log_export
Description
Exports Check Point logs over syslog.
For more information, see sk122323 and R80.40 Logging and Monitoring Administration
Guide.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
cp_log_export
cp_log_export <command-name> help
Parameters
Parameter Description
<command-name> help Shows the built help for the specified internal command.
Internal Commands
Name Description
reexport Resets the current log position and exports all logs again based on the
configuration.
cp_log_export reexport name <Name> --apply-now
cp_log_export reexport name <Name> start-position
<Position of Last Exported Log> --apply-now
cp_log_export reexport name <Name> start-position
<Position of Gap Start> end-position <Position of
Gap End> --apply-now
Name Description
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
ca-cert Specifies the full Optio Optio N/A N/A N/A N/A
<Path> path to the CA nal nal
certificate file
*.pem.
Important -
Applicable only
when the value
of the
"encrypted"
argument is
"true".
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
client-cert Specifies the full Optio Optio N/A N/A N/A N/A
<Path> path to the client nal nal
certificate *.p12.
Important -
Applicable only
when the value
of the
"encrypted"
argument is
"true".
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
n Accept
n Block
n Bypass
n Detect
n Drop
n HTTPS
Bypass
n HTTPS
Inspect
n Prevent
n Reject
Important -
This parameter
replaces any
other filter
configuration
that was
declared earlier
on this field
directly in the
filtering XML
file. Other field
filters are not
overwritten.
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
2. In the top
query field,
enter blade:
and a letter.
Examples of values:
n Anti-Bot
n Firewall
n HTTPS
Inspection
n Identity
Awareness
n IPS
Valid Software
Blade families:
n Access
n TP
n Endpoint
n Mobile
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Important -
This parameter
replaces any
other filter
configuration
that was
declared earlier
on this field
directly in the
filtering XML
file. Other field
filters are not
overwritten.
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Important -
This parameter
replaces any
other filter
configuration
that was
declared earlier
on this field
directly in the
filtering XML
file. Other field
filters are not
overwritten.
format {cef Specifies the format, Optio Optio N/A N/A N/A N/A
| syslog} in which the logs are nal nal
exported.
Default: syslog
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
name Specifies the unique Man Man Man Opti Opti Man
"<Name>" name of the Log dator dator dator onal. onal. dator
Exporter y y y By By y
configuration. defa defa
ult, ult,
appli appli
es to es to
all. all.
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Notes:
n Allowed
characters
are: Latin
letters, digits
("0-9"),
minus ("-"),
underscore
("_"), and
period (".").
n Must start
with a letter.
n The minimum
length is two
characters.
n The "add"
command
creates a new
target
directory with
the specified
unique name
in the
$EXPORTERD
IR/target
s/ directory.
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
protocol Specifies the Layer Man Optio N/A N/A N/A N/A
{tcp | udp} 4 Transport protocol dator nal
to use (TCP or y
UDP).
There is no default
value.
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
read-mode Specifies the mode, Optio Optio N/A N/A N/A N/A
{raw | semi- in which to read the nal nal
unified} log files.
n raw -
Specifies to
export log
records
without any
unification.
n semi-
unified -
Specifies to
export log
records with
step-by-step
unification.
That is, for
each log
record, export
a record that
unifies this
record with all
previously-
encountered
records with
the same ID.
Default: raw
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
cpca_client
Description
Execute operations on the Internal Certificate Authority (ICA).
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
cpca_client [-d]
create_cert <options>
double_sign <options>
get_crldp <options>
get_pubkey <options>
init_certs <options>
lscert <options>
revoke_cert <options>
revoke_non_exist_cert <options>
search <options>
set_cert_validity <options>
set_mgmt_tool <options>
set_sign_hash <options>
Parameters
Parameter Description
Parameter Description
get_crldp <options> Shows how to access a CRL file from a CRL Distribution
Point.
See "cpca_client get_crldp" on page 101.
get_pubkey <options> Saves the encoding of the public key of the ICA's certificate
to a file.
See "cpca_client get_pubkey" on page 103.
init_certs <options> Imports a list of DNs for users and creates a file with
registration keys for each user.
See "cpca_client init_certs" on page 104.
set_sign_hash Sets the hash algorithm that the CA uses to sign the file hash.
<options> See "cpca_client set_sign_hash" on page 121.
cpca_client create_cert
Description
Issues a SIC certificate for the Security Management Server or Domain Management Server.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <CA port Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the
Certificate Authority.
The default TCP port number is 18209.
-f <Full Path Specifies the PKCS12 file, which stores the certificate and keys.
to PKCS12 file>
Example
cpca_client double_sign
Description
Creates a second signature for a certificate.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <CA port Optional. Specifies the TCP port on the Security Management
number> Server or Domain Management Server, which is used to connect to
the Certificate Authority.
The default TCP port number is 18209.
-o <Full Path Optional. Saves the certificate into the specified file.
to Output
File>
Example
[Expert@MGMT:0]#
cpca_client get_crldp
Description
Shows the Fully Qualified Domain Name (FQDN) configured for the Internal Certificate
Authority (ICA) with the ""cp_conf ca" on page 63" command.
The Management Server uses this FQDN:
1. To configure the Certificate Revocation List Distribution Point (CRL DP) property in all
certificates that the ICA generates.
2. To create the URL for accessing the CRL.
Example: http://MyMGMT.checkpoint.com:18264/ICA_CRL1.crl
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <ICA Optional.
port Specifies the TCP port on the Security Management Server or Domain
number> Management Server, which is used to connect to the Certificate Authority.
The default TCP port number is 18264.
Example
[Expert@MyMGMT:0]# hostname
MyMGMT
[Expert@MyMGMT:0]#
[Expert@MyMGMT:0]# domainname
checkpoint.com
[Expert@MyMGMT:0]#
cpca_client get_pubkey
Description
Saves the encoding of the public key of the ICA's certificate to a file.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <CA port Specifies the TCP port on the Security Management Server or Domain
number> Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.
<Full Path Saves the encoding of the public key of the ICA's certificate to the
to Output specified file.
File>
Example
cpca_client init_certs
Description
Imports a list of Distinguished Names (DN) for users and creates a file with registration keys for
each user.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <CA port Optional. Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.
cpca_client lscert
Description
Shows all certificates issued by the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-stat {Pending | Valid | Optional. Filters the search results to those with
Revoked | Expired | certificate status that matches the specified status.
Renewed} This command does not support multiple values.
-kind {SIC | IKE | User | Optional. Filters the search results to those with
LDAP} certificate kind that matches the specified kind.
This command does not support multiple values.
-ser <Certificate Serial Optional. Filters the search results to those with
Number> certificate serial number that matches the specified
serial number.
This command does not support multiple values.
Example
Subject = CN=VSX2,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Revoked Kind = SIC Serial = 5521 DP = 0
Not_Before: Sun Apr 8 14:10:01 2018 Not_After: Sat Apr 8 14:10:01 2023
Subject = CN=VSX1,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Revoked Kind = SIC Serial = 9113 DP = 0
Not_Before: Sun Apr 8 14:09:02 2018 Not_After: Sat Apr 8 14:09:02 2023
cpca_client revoke_cert
Description
Revokes a certificate issued by the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <CA port Optional. Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.
Note - You can use the parameter '-n' only, or together with the
parameter "-s".
cpca_client revoke_non_exist_cert
Description
Revokes a non-existent certificate issued by the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Paramet
Description
er
-i Specifies the file that contains the list of the certificate to revoke.
<Full You must create this file in the same format as the "cpca_client lscert" on
Path page 105 command prints its output.
to
Input Example
File> Subject = CN=cp_mgmt,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 30287 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri
Apr 7 19:40:12 2023
<Empty Line>
Subject = CN=cp_mgmt,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 60870 DP = 0
Not_Before: Sat Apr 7 19:40:13 2018 Not_After: Fri
Apr 7 19:40:13 2023
Note - This command saves the error messages in the <Name of Input
File>.failures file.
cpca_client search
Description
Searches for certificates in the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Parameter Description
-kind {SIC | IKE | User | LDAP} Optional. Specifies the certificate kind
to search.
You can enter multiple values in this
format:
-kind <Kind1> <Kind2> <Kind3>
The default is to search for all kinds.
Example 1
[Expert@MGMT:0]# cpca_client search samplecompany -where comment -kind SIC LDAP -stat Pending
Valid Renewed
Example 2
Subject = CN=192.168.3.51,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 73455 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
Fingerprint = XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX
Thumbprint = xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx
[Expert@MGMT:0]#
Example 3
Subject = CN=192.168.3.51,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 73455 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
[Expert@MGMT:0]#
cpca_client set_cert_validity
Description
This command configures the default certificate validity period for new certificates.
Notes:
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n The new certificate validity period applies only to certificate you create after this
change.
Syntax
Parameters
Parameter Description
Example
cpca_client set_mgmt_tool
Description
Controls the ICA Management Tool.
This tool is disabled by default.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Parameter Description
-p <CA port Optional. Specifies the TCP port on the Security Management
number> Server or Domain Management Server, which is used to connect to
the Certificate Authority.
The default TCP port number is 18265.
Example:
-a "CN=ICA_Tool_Admin,OU=users,O=MGMT.s6t98x"
-u <User DN> Optional. Specifies the DN of the user that is permitted to use the
ICA Management Tool.
Must specify the full DN as appears in SmartConsole:
Procedure
Example:
-u "CN=ICA_Tool_User,OU=users,O=MGMT.s6t98x"
Parameter Description
-c <Custom Optional. Specifies the DN for the custom user that is permitted to
User DN> use the ICA Management Tool.
Must specify the full DN as appears in SmartConsole.
Procedure
Example:
-c "CN=ICA_Tool_User,OU=users,O=MGMT.s6t98x"
3. In the command line on the Management Server, start the ICA Management Tool.
cpca_client set_mgmt_tool on
5. Import the administrator's / user's certificate into the Windows Certificate Store:.
a. Right-click the *.p12 file you saved when you created the required administrator /
user, and click Install PFX.
The Certificate Import Wizard opens.
c. Click Next.
d. Enter the same certificate password you used when you created the required
administrator / user certificate.
e. Clear Enable strong private key protection.
f. Select Mark this key as exportable.
g. Click Next.
h. Select Place all certificates in the following store > click Browse > select
Personal > click OK.
i. Click Next.
j. Click Finish.
8. Select the appropriate certificate for authenticating to the ICA Management Tool.
9. Click OK.
10. In the Security Alert dialog box, click Yes.
cpca_client set_sign_hash
Description
Sets the hash algorithm that the CA uses to sign the file hash. Also, see sk103840.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
{sha1 | sha256 | sha384 | The hash algorithms that the CA uses to sign the
sha512} file hash.
The default algorithm is SHA-256.
Example
cpca_create
Description
Creates new Check Point Internal Certificate Authority database.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-dn <CA DN> Specifies the Certificate Authority Distinguished Name (DN).
cpconfig
Description
This command starts the Check Point Configuration Tool.
This tool configures specific settings for the installed Check Point products.
Syntax
cpconfig
Menu Options
Note - The options shown depend on the configuration and installed products.
Licenses and Manages Check Point licenses and contracts on this server.
contracts
GUI Clients Configures the GUI clients that can use SmartConsole to connect to
this server.
Random Pool Configures the RSA keys, to be used by Gaia Operating System.
Certificate Initializes the Internal Certificate Authority (ICA) and configures the
Authority Certificate Authority's (CA) Fully Qualified Domain Name (FQDN).
Automatic start of Shows and controls which of the installed Check Point products start
Check Point automatically during boot.
Products
[Expert@MyMGMT:0]# cpconfig
This program will let you re-configure
your Check Point Security Management Server configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) Administrator
(3) GUI Clients
(4) SNMP Extension
(5) Random Pool
(6) Certificate Authority
(7) Certificate's Fingerprint
(8) Automatic start of Check Point Products
(9) Exit
cpinfo
Description
A utility that collects diagnostics data on your Check Point computer at the time of execution.
It is mandatory to collect these data when you contact Check Point Support about an issue on
your Check Point server.
For more information, see sk92739.
cplic
Description
The cplic command manages Check Point licenses.
You can run this command in Gaia Clish or in the Expert mode.
License Management is divided into three types of commands:
Licensing
Applies To Description
Commands
For more about managing licenses, see the R80.40 Security Management Administration
Guide.
cplic [-d]
{-h | -help}
check <options>
contract <options>
del <options>
print <options>
put <options>
Syntax for Remote Licensing on managed Security Gateways and Cluster Members
cplic [-d]
{-h | -help}
del <options>
get <options>
put <options>
upgrade <options>
cplic [-d]
{-h | -help}
db_add <options>
db_print <options>
db_rm <options>
Parameters
Parameter Description
check Confirms that the license includes the feature on the local Security
<options> Gateway or Management Server.
See "cplic check" on page 131.
contract Manages (deletes and installs) the Check Point Service Contract on
<options> the local Check Point computer.
See "cplic contract" on page 133.
Parameter Description
del <Object Detaches a Central license from a remote managed Security Gateway
Name> or Cluster Member.
<options> See "cplic del <object name>" on page 141.
print Prints details of the installed Check Point licenses on the local Check
<options> Point computer.
See "cplic print" on page 144.
put <Object Attaches one or more Central or Local licenses to a remote managed
Name> Security Gateways and Cluster Members.
<options> See "cplic put <object name>" on page 148.
cplic check
Description
Confirms that the license includes the feature on the local Security Gateway or Management
Server. See sk66245.
Syntax
Parameters
Parameter Description
Parameter Description
cplic contract
Description
Deletes the Check Point Service Contract on the local Check Point computer.
Installs the Check Point Service Contract on the local Check Point computer.
Note
n For more information about Service Contract files, see sk33089: What is a
Service Contract File?
n If you install a Service Contract on a managed Security Gateway / Cluster
Member, you must update the license repository on the applicable Management
Server - either with the "cplic get" on page 142 command, or in SmartUpdate.
Syntax
cplic contract -h
cplic [-d] contract
del
-h
<Service Contract ID>
put
-h
[{-o | -overwrite}] <Service Contract File>
Parameters
Parameter Description
cplic db_add
Description
Adds licenses to the license repository on the Management Server.
When you add Local licenses to the license repository, Management Server automatically
attaches them to the managed Security Gateway / Cluster Member with the matching IP
address.
When you add Central licenses, you must manually attach them.
Note - You get the license details in the Check Point User Center.
Syntax
Parameters
Parameter Description
Parameter Description
< The SKU of the license summarizes the features included in the
SKU/Features> license.
For example, CPSUITE-EVAL-3DES-vNG
Example
If the file 192.0.2.11.lic contains one or more licenses, the command "cplic db_add -
l 192.0.2.11.lic" produces output similar to:
cplic db_print
Description
Shows the details of Check Point licenses stored in the license repository on the Management
Server.
Syntax
Parameters
Parameter Description
Example
cplic db_rm
Description
Removes a license from the license repository on the Management Server.
After you remove the license from the repository, it can no longer use it.
Warning - You can run this command ONLY after you detach the license with the
"cplic del" on page 140 command.
Syntax
Parameters
Parameter Description
Example
[Expert@MGMT:0]# cplic db_rm 2f540abb-d3bcb001-7e54513e-kfyigpwn
cplic del
Description
Deletes a Check Point license on a host, including unwanted evaluation, expired, and other
licenses.
This command can delete a license on both local computer, and on remote managed
computers.
Syntax
Parameters
Parameter Description
<Object The name of the Security Gateway / Cluster Member object as defined
Name> in SmartConsole.
Description
Detaches a Central license from a remote managed Security Gateway or Cluster Member.
When you run this command, it automatically updates the license repository.
The Central license remains in the license repository as an unattached license.
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway / Cluster Member object as
defined in SmartConsole.
-ip <Dynamic IP Deletes the license on the DAIP Security Gateway with the
Address> specified IP address.
Note - If this parameter is used, then object name must be a
DAIP Security Gateway.
cplic get
Description
Retrieves all licenses from managed Security Gateways and Cluster Members into the license
repository on the Management Server.
This command helps synchronize the license repository with the managed Security Gateways
and Cluster Members.
When you run this command, it updates the license repository with all local changes.
Syntax
Parameters
Parameter Description
-all Retrieves licenses from all Security Gateways and Cluster Members in the
managed network.
<IP The IP address of the Security Gateway / Cluster Member, from which
Address> licenses are to be retrieved.
<Host The name of the Security Gateway / Cluster Member object as defined in
Name> SmartConsole, from which licenses are to be retrieved.
Example
If the Security Gateway with the object name MyGW contains four Local licenses, and the
license repository contains two other Local licenses, the command "cplic get MyGW"
produces output similar to this:
cplic print
Description
Prints details of the installed Check Point licenses on the local Check Point computer.
Note - On a Security Gateway / Cluster Member, this command prints all installed
licenses (both Local and Central).
Syntax
Parameters
Parameter Description
Example 1
Example 2
cplic put
Description
Installs one or more Local licenses on a Check Point computer.
Note - You get the license details in the Check Point User Center.
Syntax
Parameters
Parameter Description
{-c | -check- Verifies the license. Checks if the IP of the license matches the Check
only} Point computer and if the signature is valid.
{-s | - Selects only the local license whose IP address matches the IP
select} address of the Check Point computer.
{-P | -Pre- Use this option after you have upgraded and before you reboot the
boot} Check Point computer.
Use of this option will prevent certain error messages.
Parameter Description
< The SKU of the license summarizes the features included in the
SKU/Features> license.
For example: CPSUITE-EVAL-3DES-vNG
Copy and paste the parameters from the license received from the User Center:
Parameter Description
SKU/features A string listing the SKU and the Certificate Key of the license.
The SKU of the license summarizes the features included in the
license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab
Example
Description
Attaches one or more Central or Local licenses to a remote managed Security Gateways and
Cluster Members.
When you run this command, it automatically updates the license repository.
Note
n You get the license details in the Check Point User
Center.
n You can attach more than one license.
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway / Cluster Member object, as
defined in SmartConsole.
-ip <Dynamic Installs the license on the Security Gateway with the specified IP
IP Address> address.
This parameter is used to install a license on a Security Gateway with
dynamically assigned IP address (DAIP).
Note - If you use this parameter, then the object name must be
that of a DAIP Security Gateway.
<SKU/Features> The SKU of the license summarizes the features included in the
license.
For example: CPSUITE-EVAL-3DES-vNG
Copy and paste the parameters from the license received from the User Center:
Parameter Description
SKU/features A string listing the SKU and the Certificate Key of the license.
The SKU of the license summarizes the features included in the
license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab
cplic upgrade
Description
Upgrades licenses in the license repository with licenses in the specified license file.
Note - You get this license file in the Check Point User Center.
Syntax
Parameters
Parameter Description
-l <Input Upgrades the licenses in the license repository and Check Point Security
File> Gateways / Cluster Members to match the licenses in the specified file.
Example
This example explains the procedure to upgrade the licenses in the license repository.
There are two Software Blade licenses in the input file:
n One license does not match any license on a remote managed Security Gateway.
n The other license matches an NGX-version license on a managed Security Gateway that
has to be upgraded.
Workflow in this example:
1. Upgrade the Security Management Server to the latest version.
Ensure that there is connectivity between the Security Management Server and the
Security Gateways with the previous product versions.
2. Import all licenses into the license repository.
You can also do this after you upgrade the products on the remote Security Gateways.
3. Run this command:
Example:
Example:
5. In the Check Point User Center, view the licenses for the products that were upgraded
from version NGX to a Software Blades license.
You can also create new upgraded licenses.
6. Download a file containing the upgraded licenses.
Only download licenses for the products that were upgraded from version NGX to
Software Blades.
7. If you did not import the version NGX licenses into the repository, import the version NGX
licenses now.
n The licenses in the downloaded license file and in the license repository are
compared.
n If the certificate keys and features match, the old licenses in the repository and in
the remote Security Gateways are updated with the new licenses.
n A report of the results of the license upgrade is printed.
For more about managing licenses, see the R80.40 Security Management Administration
Guide.
cppkg
Description
Manages the SmartUpdate software packages repository on the Security Management
Server.
Important - Installing software packages with the SmartUpdate is not supported for
Security Gateways running on Gaia OS.
Syntax
cppkg
add <options>
{del | delete} <options>
get
getroot
print
setroot <options>
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run mdsenv).
Parameters
Parameter Description
getroot Shows the path to the root directory of the repository (the value of
the environment variable $SUROOT).
See "cppkg getroot" on page 160.
cppkg add
Description
Adds a SmartUpdate software package to the SmartUpdate software packages repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
n This command does not overwrite existing packages. To overwrite an existing
package, you must first delete the existing package.
n You get the SmartUpdate software packages from the Check Point Support
Center.
Syntax
Parameters
Parameter Description
<Full Path to Specifies the full local path on the computer to the SmartUpdate
Package> software package.
Example - Adding R77.20 HFA_75 (R77.20.75) firmware package for 1100 Appliances
cppkg delete
Description
Deletes SmartUpdate software packages from the SmartUpdate software packages
repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
Parameters
Parameter Description
del | When you do not specify optional parameters, the command runs in the
delete interactive mode. The command shows the menu with applicable options.
Notes:
n To see the values for the optional parameters, run the "cppkg print" on page 161
command.
n You must specify all optional parameters, or no parameters.
Select package:
--------------------
(0) Delete all
(1) CP1100 Gaia Embedded Check Point R77.20 R77.20
(e) Exit
You chose to delete 'CP1100 Gaia Embedded Check Point R77.20 R77.20', Is this correct? [y/n] : y
[Expert@MGMT:0]# cppkg delete "Check Point" "CP1100" "R77.20" "Gaia Embedded" "R77.20"
Package was successfully removed from the repository
[Expert@MGMT:0]#
cppkg get
Description
Updates the list of the SmartUpdate software packages in the SmartUpdate software
packages repository based on the real content of the repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
cppkg get
Example
cppkg getroot
Description
Shows the path to the root directory of the SmartUpdate software packages repository (the
value of the environment variable $SUROOT)
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
cppkg getroot
Example
cppkg print
Description
Prints the list of SmartUpdate software packages in the SmartUpdate software packages
repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
cppkg print
cppkg setroot
Description
Configures the path to the root directory of the SmartUpdate software packages repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
n The default path is: /var/log/cpupgrade/suroot
n When changing repository root directory:
l This command copies the software packages from the old repository to
Syntax
Example
cpprod_util
Description
This utility works with Check Point Registry ($CPDIR/registry/HKLM_registry.data)
without manually opening it:
n Shows which Check Point products and features are enabled on this Check Point
computer.
n Enables and disables Check Point products and features on this Check Point computer.
Syntax
Parameters
Parameter Description
"< Specifies the configuration parameter for the specified product or feature.
Parameter
>"
"<Value>" Specifies the value of the configuration parameter for the specified
product or feature:
n One of these integers: 0, 1, 4
n A string
Notes
n On a Multi-Domain Server, you must run this command in the context of the relevant
Domain Management Server.
n If you run the cpprod_util command without parameters, it prints:
l The list of all available products and features (for example,
"FwIsFirewallMgmt", "FwIsLogServer", "FwIsStandAlone")
l The type of the expected argument when you configure a product or feature ("no-
parameter", "string-parameter", or "integer-parameter")
l The type of the returned output ("status-output", or "no-output")
n To redirect the output of the cpprod_util command, it is necessary to redirect the
stderr to stdout:
Example:
Examples
Example - Showing a list of all installed Check Point Products Packages on a Management
Server
[Expert@MGMT:0]# cpprod_util CPPROD_GetInstalledProducts
CPFC
IDA
MGMT
FW1
SecurePlatform
NGXCMP
EdgeCmp
SFWCMP
SFWR75CMP
SFWR77CMP
FLICMP
R75CMP
R7520CMP
R7540CMP
R76CMP
R77CMP
PROVIDER-1
Reporting Module
SmartLog
CPinfo
VSEC
DIAG
[Expert@MGMT:0]#
Example - Checking if this Check Point computer is configured as a dedicated Log Server
[Expert@MGMT:0]# cpprod_util FwIsLogServer
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the SmartEvent Server blade is enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerServer
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the SmartEvent Correlation Unit blade is
enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerCorrelationUnit
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the Endpoint Policy Management blade is
enabled
[Expert@MGMT:0]# cpprod_util UepmIsInstalled
1
[Expert@MGMT:0]#
Example - Showing a list of all installed Check Point Products Packages on a Security Gateway
[Expert@MyGW:0]# cpprod_util CPPROD_GetInstalledProducts
CPFC
IDA
MGMT
FW1
SecurePlatform
CPinfo
DIAG
PPACK
CVPN
[Expert@MyGW:0]#
Example - Checking if this Security Gateway is configured with Dynamically Assigned IP (DAIP)
[Expert@MyGW:0]# cpprod_util FwIsDAG
0
[Expert@MyGW:0]#
cprid
Description
Manages the Check Point Remote Installation Daemon (cprid).
This daemon is used for remote upgrade and installation of Check Point products on the
managed Security Gateways.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run these commands in the context of the
MDS (run mdsenv).
Commands
Syntax Description
run_cprid_ Stops and then starts the Check Point Remote Installation Daemon
restart (cprid).
cprinstall
Description
Performs installation of Check Point product packages and associated operations on remote
managed Security Gateways.
Important - Installing software packages with this command is not supported for
Security Gateways that run on Gaia OS.
Notes:
n This command requires a license for SmartUpdate.
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n On the remote Security Gateways these are required:
l SIC Trust must be established between the Security Management Server
Syntax
cprinstall
boot <options>
cprestart <options>
cpstart <options>
cpstop <options>
delete <options>
get <options>
install <options>
revert <options>
show <options>
snapshot <options>
transfer <options>
uninstall <options>
verify <options>
Parameters
Parameter Description
get n Gets details of the products and the operating system installed on
<options> the managed Security Gateway.
n Updates the management database on the Security Management
Server.
See "cprinstall get" on page 178.
show Displays all snapshot (backup) files on the managed Security Gateway
<options> that runs on SecurePlatform OS.
See "cprinstall show" on page 183.
transfer Transfers a software package from the repository to the managed Security
<options> Gateway without installing the package.
See "cprinstall transfer" on page 185.
Parameter Description
cprinstall boot
Description
Reboots the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Example
[Expert@MGMT]# cprinstall boot MyGW
cprinstall cprestart
Description
Runs the cprestart command on the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n All Check Point products on the managed Security Gateway must be of the
same version.
Syntax
Parameters
Parameter Description
Example
[Expert@MGMT:0]# cprinstall cprestart MyGW
cprinstall cpstart
Description
Runs the cpstart command on the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n All Check Point products on the managed Security Gateway must be of the
same version.
Syntax
Parameters
Parameter Description
Example
[Expert@MGMT]# cprinstall cpstart MyGW
cprinstall cpstop
Description
Runs the cpstop command on the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n All Check Point products on the managed Security Gateway must be of the
same version.
Syntax
Parameters
Parameter Description
-proc Kills the Check Point daemons and Security Servers, while it maintains the
active Security Policy running in the Check Point kernel.
Rules with generic Allow, Drop or Reject action based on services, continue
to work.
-nopolicy Kills the Check Point daemons and Security Servers and unloads the
Security Policy from the Check Point kernel.
Example
[Expert@MGMT]# cprinstall cpstop -proc MyGW
cprinstall delete
Description
Deletes a snapshot (backup) file on the managed Security Gateway that runs on
SecurePlatform OS.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Example
[Expert@MGMT]# cprinstall delete MyGW Snapshot25Apr2017
cprinstall get
Description
n Gets details of the products and the operating system installed on the managed Security
Gateway.
n Updates the management database on the Security Management Server.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Example:
cprinstall install
Description
Installs Check Point products on the managed Security Gateway.
Important - Installing software packages with this command is not supported for
Security Gateways that run Gaia OS.
Notes:
n Before transferring the software package, this command runs the "cprinstall
verify" on page 189 command.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n To see the values for the package attributes, run the "cppkg print" on page 161
command.
Syntax
Parameters
Parameter Description
-boot Reboots the managed Security Gateway after installing the package.
Note - Only reboot after ALL products have the same version. Reboot is
canceled in certain scenarios.
Example
cprinstall revert
Description
Restores the managed Security Gateway that runs on SecurePlatform OS from a snapshot
saved on that Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
cprinstall show
Description
Displays all snapshot (backup) files on the managed Security Gateway that runs on
SecurePlatform OS.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Example
cprinstall snapshot
Description
Creates a snapshot on the managed Security Gateway that runs on SecurePlatform OS and
saves it on that Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
cprinstall transfer
Description
Transfers a software package from the repository to the managed Security Gateway without
installing the package.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n To see the values for the package attributes, run the "cppkg print" on page 161
command.
Syntax
Parameters
Parameter Description
cprinstall uninstall
Description
Uninstalls Check Point products on the managed Security Gateway.
Important - Uninstalling software packages with this command is not supported for
Security Gateways running on Gaia OS.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n Before uninstalling product packages, this command runs the "cprinstall verify"
on page 189 command.
n After uninstalling a product package, you must run the "cprinstall get" on
page 178 command.
n To see the values for the package attributes, run the "cppkg print" on page 161
command.
Syntax
Parameters
Parameter Description
Example
[Expert@MGMT]# cprinstall uninstall MyGW "checkpoint" "firewall" "R75.20" "R75.20"
Uninstalling firewall R75.20 from MyGW...
Info : Removing package from Check Point Gateway
Info : Product was successfully applied.
Operation Success. Please get network object data to complete the operation.
[Expert@MGMT]#
[Expert@MGMT]# cprinstall get
cprinstall verify
Description
Confirms these operations were successful:
n If a specific product can be installed on the managed Security Gateway.
n That the operating system and currently installed products the managed Security
Gateway are appropriate for the software package.
n That there is enough disk space to install the product the managed Security Gateway.
n That there is a CPRID connection with the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n To see the values for the package attributes, run the "cppkg print" on page 161
command.
Syntax
Parameters
Parameter Description
cpstart
Description
Manually starts all Check Point processes and applications.
Notes:
n For the cprid daemon, use the "cprid" on page 169
command.
n For manually starting specific Check Point processes, see
sk97638.
Syntax
cpstart
cpstat
Description
Displays the status and statistics information of Check Point applications.
Syntax
cpstat [-d] [-h <Host>] [-p <Port>] [-s <SICname>] [-f <Flavor>]
[-o <Polling Interval> [-c <Count>] [-e <Period>]] <Application
Flag>
Note - You can write the parameters in the syntax in any order.
Parameters
Parameter Description
-h <Host> Optional.
When you run this command on a Management Server, this parameter
specifies the managed Security Gateway.
<Host> is an IPv4 address, a resolvable hostname, or a DAIP object
name.
The default is localhost.
Note - On a Multi-Domain Server, you must run this command in
the context of the applicable Domain Management Server:mdsenv
<IP Address or Name of Domain Management Server>.
-p <Port> Optional.
Port number of the Application Monitoring (AMON) server.
The default port is 18192.
-s <SICname> Optional.
Secure Internal Communication (SIC) name of the Application
Monitoring (AMON) server.
Parameter Description
-f <Flavor> Optional.
Specifies the type of the information to collect.
If you do not specify a flavor explicitly, the command uses the first flavor
in the <Application Flag>. To see all flavors, run the cpstat
command without any parameters.
-o <Polling Optional.
Interval> Specifies the polling interval (in seconds) - how frequently the
command collects and shows the information.
Examples:
n 0 - The command shows the results only once and the stops (this
is the default value).
n 5 - The command shows the results every 5 seconds in the loop.
n 30 - The command shows the results every 30 seconds in the
loop.
n N - The command shows the results every N seconds in the loop.
Use this parameter together with the "-c <Count>" parameter and the
"-e <Period>" parameter.
Example:
cpstat os -f perf -o 2
-c <Count> Optional.
Specifies how many times the command runs and shows the results
before it stops.
You must use this parameter together with the "-o <Polling
Interval>" parameter.
Examples:
n 0 - The command shows the results repeatedly every <Polling
Interval> (this is the default value).
n 10 - The command shows the results 10 times every <Polling
Interval> and then stops.
n 20 - The command shows the results 20 times every <Polling
Interval> and then stops.
n N - The command shows the results N times every <Polling
Interval> and then stops.
Example:
cpstat os -f perf -o 2 -c 2
Parameter Description
-e <Period> Optional.
Specifies the time (in seconds), over which the command calculates the
statistics.
You must use this parameter together with the "-o <Polling
Interval>" parameter.
You can use this parameter together with the "-c <Count>"
parameter.
Example:
cpstat os -f perf -o 2 -c 2 -e 60
<Application Mandatory.
Flag> See the table below with flavors for the application flags.
Note - The available flags depend on the enabled Software Blades. Some flags are
supported only by a Security Gateway, and some flags are supported only by a
Management Server.
Feature or
Flag Flavors
Software Blade
Feature or
Flag Flavors
Software Blade
Anti-Virus ci default
Feature or
Flag Flavors
Software Blade
QoS fg all
Feature or
Flag Flavors
Software Blade
Provisioning PA default
Agent
Examples
Example - Interfaces on a Security Gateway
[Expert@MyGW:0]# cpstat -f interfaces fw
Network interfaces
---------------------------------------------------------------------------------------------
-----------------------
|Name|IP |Netmask |Flags|Peer name|Remote IP|Topology|Proxy
name|Slaves|Ports|IPv6 Address|IPv6 Len|
---------------------------------------------------------------------------------------------
-----------------------
|eth0|192.168.30.40|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth1| 172.30.60.80|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth2| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth3| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth4| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth5| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth6| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth7| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
---------------------------------------------------------------------------------------------
-----------------------
[Expert@MyGW:0]#
Interface table
---------------------------------------
|Name|Dir|Total |Accept|Deny |Log|
---------------------------------------
|eth0|in | 2393126| 32589| 2360537| 52|
|eth0|out| 33016| 33016| 0| 0|
|eth1|in | 2360350| 0| 2360350| 0|
|eth1|out| 0| 0| 0| 0|
|eth2|in | 2360350| 0| 2360350| 0|
|eth2|out| 0| 0| 0| 0|
|eth3|in | 2348704| 0| 2348704| 1|
|eth3|out| 0| 0| 0| 0|
|eth4|in | 2360350| 0| 2360350| 0|
|eth4|out| 0| 0| 0| 0|
---------------------------------------
| | |11855896| 65605|11790291| 53|
---------------------------------------
[Expert@MyGW:0]#
[Expert@HostName:0]#
Example - Performance
[Expert@HostName:0]# cpstat os -f perf -o 2 -c 2 -e 60
[Expert@HostName:0]#
Connected clients
-------------------------------------------------------
|Client type |Administrator|Host |Database lock|
-------------------------------------------------------
|SmartConsole|admin |JOHNDOE-PC |false |
-------------------------------------------------------
[Expert@MGMT:0]#
cpstop
Description
Manually stops all Check Point processes and applications.
Notes:
n For the cprid daemon, use the "cprid" on page 169 command.
n For manually stopping specific Check Point processes, see
sk97638.
Syntax
cpstop
cpview
Overview of CPView
Description
CPView is a text based built-in utility on a Check Point computer.
CPView Utility shows statistical data that contain both general system information (CPU,
Memory, Disk space) and information for different Software Blades (only on Security
Gateway).
The CPView continuously updates the data in easy to access views.
On Security Gateway, you can use this statistical data to monitor the performance.
For more information, see sk101878.
Syntax
cpview --help
Section Description
Header This view shows the time the statistics in the third view are collected.
It updates when you refresh the statistics.
Navigation This menu bar is interactive. Move between menus with the arrow keys and
mouse.
A menu can have sub-menus and they show under the menu bar.
Using CPView
Use these keys to navigate the CPView:
Key Description
Q Quits CPView.
Key Description
Use these keys to save statistics, show help, and refresh statistics:
Key Description
C Saves the current page to a file. The file name format is:
cpview_<ID of the cpview process>.cap<Number of the
capture>
cpwd_admin
Description
The Check Point WatchDog (cpwd) is a process that invokes and monitors critical processes
such as Check Point daemons on the local computer, and attempts to restart them if they fail.
Among the processes monitored by Watchdog are fwm, fwd, cpd, DAService, and others.
The list of monitored processes depends on the installed and configured Check Point products
and Software Blades.
The Check Point WatchDog writes monitoring information to the $CPDIR/log/cpwd.elg log
file.
The cpwd_admin utility shows the status of the monitored processes, and configures the
Check Point WatchDog.
Monitoring Description
Passive WatchDog restarts the process only when the process terminates
abnormally.
In the output of the cpwd_admin list command, the MON column shows
N for passively monitored processes.
Syntax
cpwd_admin
config <options>
del <options>
detach <options>
exist
flist <options>
getpid <options>
kill
list <options>
monitor_list
start <options>
start_monitor
stop <options>
stop_monitor
Parameters
Parameter Description
Parameter Description
stop_ Stops the active WatchDog monitoring - WatchDog monitors all processes
monitor only passively.
See "cpwd_admin stop_monitor" on page 230.
cpwd_admin config
Description
Configures the Check Point WatchDog.
Important - After changing the WatchDog configuration parameters, you must restart
the WatchDog process with the cpstop and cpstart commands (which restart all
Check Point processes).
Syntax
cpwd_admin config
-h
-a <options>
-d <options
-p
-r
Parameters
Parameter Description
These are the available configuration parameters and the accepted values:
Configuration Accepted
Description
Parameter Values
default_ctx Text string up to On a VSX Gateway, configures the CTX value that is
128 characters assigned to monitored processes, for which no CTX
is specified.
reset_ n Range: > 0 Configures the time (in seconds) the WatchDog
startups n Default: waits after the process starts and before the
3600 WatchDog resets the process's startup_counter
to 0.
To see the process's startup counter, in the output of
the cpwd_admin list command, refer to the
#START column.
Configuration Accepted
Description
Parameter Values
stop_timeout n Range: > 0 Configures the time (in seconds) the WatchDog
n Default: 60 waits for a process stop command to complete.
Example
cpwd_admin del
Description
Temporarily deletes a monitored process from the WatchDog database of monitored
processes.
Notes:
n WatchDog stops monitoring the detached process, but the process stays alive.
n The "cpwd_admin list" on page 218 command does not show the deleted
process anymore.
n This change applies until all Check Point services restart during boot, or with the
"cpstart" on page 191 command.
Parameters
Parameter Description
<Application Name of the monitored Check Point process as you see in the output of
Name> the "cpwd_admin list" on page 218 command in the leftmost column
APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual
System.
Example
cpwd_admin detach
Description
Temporarily detaches a monitored process from the WatchDog monitoring.
Notes:
n WatchDog stops monitoring the detached process, but the process stays alive.
n The "cpwd_admin list" on page 218 command does not show the detached
process anymore.
n This change applies until all Check Point services restart during boot, or with the
"cpstart" on page 191 command.
Parameters
Parameter Description
<Application Name of the monitored Check Point process as you see in the output of
Name> the "cpwd_admin list" on page 218 command in the leftmost column
APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual
System.
Example
cpwd_admin exist
Description
Checks whether the WatchDog process cpwd is alive.
Syntax
cpwd_admin exist
Example
cpwd_admin flist
Description
Saves the status of all WatchDog monitored processes to a file
Parameters
Parameter Description
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Output
Column Description
CTX On a VSX Gateway, shows the VSID, in which the monitored process
runs.
#START Shows how many times the WatchDog started the monitored process.
START_TIME Shows the time when the WatchDog started the monitored process for the
last time.
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_
limit configuration parameters (see "cpwd_admin config" on page 207).
MON Shows how the WatchDog monitors this process (see the explanation for
the "cpwd_admin" on page 204):
n Y - Active monitoring
n N - Passive monitoring
COMMAND Shows the command the WatchDog run to start this process.
Example
cpwd_admin getpid
Description
Shows the PID of a WatchDog monitored process.
Parameters
Parameter Description
<Application Name of the monitored Check Point process as you see in the output of
Name> the "cpwd_admin list" on page 218 command in the leftmost column
APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On VSX Gateway, specifies the context of the applicable Virtual
System.
Example
cpwd_admin kill
Description
Terminates the WatchDog process cpwd.
Important - Do not run this command unless explicitly instructed by Check Point
Support or R&D to do so.
To restart the WatchDog process, you must restart all Check Point services with the
"cpstop" on page 201 and "cpstart" on page 191 commands.
Syntax
cpwd_admin kill
cpwd_admin list
Description
Prints the status of all WatchDog monitored processes on the screen.
Parameters
Parameter Description
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Output
Column Description
CTX On a VSX Gateway, shows the VSID, in which the monitored process
runs.
#START Shows how many times the WatchDog started the monitored process.
START_TIME Shows the time when the WatchDog started the monitored process for the
last time.
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_
limit configuration parameters (see "cpwd_admin config" on page 207).
MON Shows how the WatchDog monitors this process (see the explanation for
the "cpwd_admin" on page 204):
n Y - Active monitoring
n N - Passive monitoring
COMMAND Shows the command the WatchDog run to start this process.
Examples
Example - Default output on a Management Server
[Expert@HostName:0]# cpwd_admin list
APP PID STAT #START START_TIME MON COMMAND
CPVIEWD 19738 E 1 [17:50:44] 31/5/2019 N cpviewd
HISTORYD 0 T 0 [17:54:44] 31/5/2019 N cpview_historyd
CPD 19730 E 1 [17:54:45] 31/5/2019 Y cpd
SOLR 19935 E 1 [17:50:55] 31/5/2019 N java_solr /opt/CPrt-
R80.40/conf/jetty.xml
RFL 19951 E 1 [17:50:55] 31/5/2019 N LogCore
SMARTVIEW 19979 E 1 [17:50:55] 31/5/2019 N SmartView
INDEXER 20032 E 1 [17:50:55] 31/5/2019 N /opt/CPrt-R80.40/log_indexer/log_
indexer
SMARTLOG_SERVER 20100 E 1 [17:50:55] 31/5/2019 N /opt/CPSmartLog-
R80.40/smartlog_server
CP3DLOGD 20237 E 1 [17:50:55] 31/5/2019 N cp3dlogd
EPM 20251 E 1 [17:50:56] 31/5/2019 N startEngine
DASERVICE 20404 E 1 [17:50:59] 31/5/2019 N DAService_script
[Expert@HostName:0]#
cpwd_admin monitor_list
Description
Prints the status of actively monitored processes on the screen.
See the explanation about the active monitoring in "cpwd_admin" on page 204.
Syntax
cpwd_admin monitor_list
Example
cpwd_admin start
Description
Starts a process as monitored by the WatchDog.
Parameters
Parameter Description
-name Name, under which the cpwd_admin list command shows the
<Application monitored process in the leftmost column APP.
Name> Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual
System.
Parameter Description
-path "<Full The full path (with or without Check Point environment variables)
Path to to the executable including the executable name.
Executable>" Must enclose in double quotes.
Examples:
n For FWM: "$FWDIR/bin/fwm"
n For FWD: "/opt/CPsuite-R80.40/fw1/bin/fw"
n For CPD: "$CPDIR/bin/cpd"
n For CPM: "/opt/CPsuite-
R80.40/fw1/scripts/cpm.sh"
n For SICTUNNEL: "/opt/CPshrd-R80.40/bin/cptnl"
-env {inherit | Configures whether to inherit the environment variables from the
<Env_ shell.
Var>=<Value>}
n inherit - Inherits all the environment variables (WatchDog
supports up to 80 environment variables)
n <Env_Var>=<Value> - Assigns the specified value to the
specified environment variable
Example
For the list of process and the applicable syntax, see sk97638.
cpwd_admin start_monitor
Description
Starts the active WatchDog monitoring. WatchDog monitors the predefined processes
actively.
See the explanation for the "cpwd_admin" on page 204 command.
Syntax
cpwd_admin start_monitor
Example
cpwd_admin stop
Description
Stops a WatchDog monitored process.
Parameters
Parameter Description
-name <Application Name under which the cpwd_admin list command shows
Name> the monitored process in the leftmost column APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-path "<Full Path The full path (with or without Check Point environment
to Executable>" variables) to the executable including the executable name.
Must enclose in double quotes.
Examples:
n For FWM: "$FWDIR/bin/fwm"
n For FWD: "/opt/CPsuite-R80.40/fw1/bin/fw"
n For CPD: "$CPDIR/bin/cpd_admin"
Parameter Description
Example
For the list of process and the applicable syntax, see sk97638.
cpwd_admin stop_monitor
Description
Stops the active WatchDog monitoring. WatchDog monitors all processes only passively.
See the explanation for the "cpwd_admin" on page 204 command.
Syntax
cpwd_admin stop_monitor
Example
dbedit
Description
Edits the management database - the $FWDIR/conf/objects_5_0.C file - on the Security
Management Server or Domain Management Server. See skI3301.
Important - Do NOT run this command, unless explicitly instructed by Check Point
Support or R&D to do so. Otherwise, you can corrupt settings in the management
database.
Syntax
dbedit -help
dbedit [-globallock] [{-local | -s <Management_Server>}] [{-u
<Username> | -c <Certificate>}] [-p <Password>] [-f <File_Name>
[ignore_script_failure] [-continue_updating]] [-r "<Open_Reason_
Text>"] [-d <Database_Name>] [-listen] [-readonly] [-session]
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Parameters
Parameter Description
-globallock When you work with the dbedit utility, it partially locks the management
database. If a user configures objects in SmartConsole at the same
time, it causes problems in the management database.
This option does not let SmartConsole, or a dbedit user to make
changes in the management database.
When you specify this option, the dbedit commands run on a copy of
the management database. After you make the changes with the
dbedit commands and run the savedb command, the dbedit utility
saves and commits your changes to the actual management database.
Parameter Description
-u Specifies the username, with which the dbedit utility connects to the
<Username> Security Management Server.
Mandatory parameter when you specify the "-s <Management_
Server>" parameter.
-c Specifies the user's certificate file, with which the dbedit utility connects
< to the Security Management Server.
Certificate> Mandatory parameter when you specify the "-s <Management_
Server>" parameter.
-p Specifies the user's password, with which the dbedit utility connects to
<Password> the Security Management Server.
Mandatory parameter when you specify the "-s <Management_
Server>" and "-u <Username>" parameters.
-f <File_ Specifies the file that contains the applicable dbedit internal commands
Name> (see the section "dbedit Internal Commands" below):
n create <object_type> <object_name>
n modify <table_name> <object_name> <field_name>
<value>
n update <table_name> <object_name>
n delete <table_name> <object_name>
n print <table_name> <object_name>
n quit
ignore_ Continues to execute the dbedit internal commands in the file and
script_ ignores errors.
failure You can use it when you specify the "-f <File_Name>" parameter.
-continue_ Continues to update the modified objects, even if the operation fails for
updating some of the objects (ignores the errors and runs the update_all
command at the end of the script).
You can use it when you specify the "-f <File_Name>" parameter.
-r "<Open_ Specifies the reason for opening the database in read-write mode
Reason_ (default mode).
Text>"
Parameter Description
-d Specifies the name of the database, to which the dbedit utility should
<Database_ connect (for example, mdsdb).
Name>
-listen The dbedit utility "listens" for changes (use this mode for advanced
troubleshooting with the assistance of Check Point Support).
The dbedit utility prints its internal messages when a change occurs in
the management database.
Note - To see the available tables, class names (object types), attributes and values,
connect to Management Server with Database Tool (GuiDBEdit Tool) (see sk13009).
-h Description:
Prints the general help.
Syntax:
dbedit> -h
-q Description:
Quits from dbedit.
quit Syntax:
dbedit> -q
dbedit> quit [-update_all | -noupdate]
Examples:
n Exit the utility and commit the remaining modified objects
(interactive mode):
dbedit> quit
n Exit the utility and update all the remaining modified objects:
dbedit> quit -update_all
n Exit the utility and discard all modifications:
dbedit> quit -no_update
update Description:
Saves the specified object in the specified table (for example,
"network_objects", "services", "users").
Syntax:
dbedit> update <table_name> <object_name>
Example:
Save the object My_Service in the table services:
dbedit> update services My_Service
update_all Description:
Saves all the modified objects.
Syntax:
dbedit> update_all
_print_set Description:
Prints the specified object from the specified table (for example,
"network_objects", "services", "users") as it appears in the
$FWDIR/conf/objects_5_0.C file (sets of attributes).
Syntax:
dbedit> _print_set <table_name> <object_name>
Example:
Print the object My_Obj from the table network_objects:
dbedit> print network_objects My_Obj
print Description:
Prints the list of attributes of the specified object from the specified
table (for example, "network_objects", "properties",
"services", "users").
Syntax:
dbedit> print <table_name> <object_name>
Examples:
n Print the object My_Obj from the table network_objects (in
"Network Objects"):
dbedit> print network_objects my_obj
n Print the object firewall_properties from the table properties (in
"Global Properties"):
dbedit> print properties firewall_properties
printxml Description:
Prints in XML format the list of attributes of the specified object from the
specified table (for example, "network_objects", "properties",
"services", "users").
You can export the settings from a Management Server to an XML file
that you can use later with external automation systems.
Syntax:
dbedit> printxml <table_name> [<object_name>]
Examples:
n Print the object My_Obj from the table network_objects:
dbedit> printxml network_objects my_obj
n Print the object firewall_properties from the table properties (in
"Global Properties"):
dbedit> printxml properties firewall_
properties
printbyuid Description:
Prints the attributes of the object specified by its UID (appears in the
$FWDIR/conf/objects_5_0.C file at the beginning of the object as
"chkpf_uid ({...})").
Syntax:
dbedit> printbyuid {object_id}
Example:
Print the attributes of the object with the specified UID:
dbedit> printbyuid {D3833F1D-0A58-AA42-865F-
39BFE3C126F1}
query Description:
Prints all the objects in the specified table.
Optionally, you can query for objects with specific attribute and value -
query is separated by a comma after "query <table_name>"
(spaces are not allowed between the <attribute> and '<value>').
Syntax:
dbedit> query <table_name> [ ,
<attribute>='<value>' ]
Examples:
n Print all objects in the table users:
dbedit> query users
n Print all objects in the table network_objects that are defined as
Management Servers:
dbedit> query network_objects,
management='true'
n Print all objects in the table services with the name ssh:
command_sdbedit> query services, name='ssh'
n Print all objects in the table services with the port 22:
dbedit> query services, port='22'
n Print all objects with the IP address 10.10.10.10:
dbedit> query network_objects,
ipaddr='10.10.10.10'
whereused Description:
Checks where the specified object used in the database.
Prints the number of places, where this object is used and relevant
information about each such place.
Syntax:
dbedit> whereused <table_name> <object_name>
Example:
Check where the object My_Obj is used:
dbedit> whereused network_objects My_Obj
create Description:
Creates an object of specified type (with its default values) in the
database.
Restrictions apply to the object's name:
n Object names can have a maximum of 100 characters.
n Objects names can contain only ASCII letters, numbers, and
dashes.
n Reserved words will be blocked by the Management Server (refer
to sk40179).
Syntax:
dbedit> create <object_type> <object_name>
Example:
Create the service object My_Service of the type tcp_service (with its
default values):
dbedit> create tcp_service my_service
delete Description:
Deletes an object from the specified table.
Syntax:
dbedit> delete <table_name> <object_name>
Example:
Delete the service object My_Service from the table services:
dbedit> delete services my_service
modify Description:
Modifies the value of specified attribute in the specified object in the
specified table (for example, "network_objects", "services",
"users") in the management database.
Syntax:
dbedit> modify <table_name> <object_name> <field_
name> <value>
Examples:
n Modify the color to red in the object My_Service in the table
services:
dbedit> modify services My_Service color red
n Add a comment to the object MyObj:
dbedit> modify network_objects MyObj comments
"Created by fwadmin with dbedit"
n Set the value of the global property ike_use_largest_possible_
subnets in the table properties to false:
dbedit> modify properties firewall_properties
ike_use_largest_possible_subnets false
n Create a new interface on the Security Gateway My_FW and
modify its attributes - set the IP address / Mask and enable Anti-
Spoofing on interface with "Element Index"=3 (check the
attributes of the object My_FW in Database Tool (GuiDBEdit
Tool) (see sk13009)):
lock Description:
Locks the specified object (by administrator) in the specified table (for
example, "network_objects", "services", "users") from being
modified by other users.
For example, if you connect from a remote computer to this
Management Server with admin1 and lock an object, you are be able to
connect with admin2, but are not able to modify the locked object, until
admin1 releases the lock.
Syntax:
dbedit> lock <table_name> <object_name>
Example:
Lock the object My_Service_Obj in the table services in the database:
dbedit> lock services My_Service_Obj
addelement Description:
Adds a specified multiple field / container (with specified value) to a
specified object in specified table.
Syntax:
dbedit> addelement <table_name> <object_name>
<field_name> <value>
Examples:
n Add the element BranchObjectClass with the value Organization
to a multiple field Read in the object My_Obj in the table ldap:
dbedit> addelement ldap My_Obj
Read:BranchObjectClass Organization
n Add the service MyService to the group of services
MyServicesGroup in the table services:
dbedit> addelement services MyServicesGroup
'' services:MyService
n Add the network MyNetwork to the group of networks
MyNetworksGroup in the table network_objects:
dbedit> addelement network_objects
MyNetworksGroup '' network_objects:MyNetwork
rmelement Description:
Removes a specified multiple field / container (with specified value)
from a specified object in specified table.
Syntax:
dbedit> rmelement <table_name> <object_name>
<field_name> <value>
Examples:
n Remove the service MyService from the group of services
MyServicesGroup from the table services:
dbedit> rmelement services MyServicesGroup ''
services:MyService
n Remove the network MyNetwork from the group of networks
MyNetworksGroup from the table network_objects:
dbedit> rmelement network_objects
MyNetworksGroup '' network_objects:MyNetwork
n Remove the element BranchObjectClass with the value
Organization from the multiple field Read in the object My_Obj in
the table ldap:
dbedit> rmelement ldap my_obj
Read:BranchObjectClass Organization
rename Description:
Renames the specified object in specified table.
Syntax:
dbedit> rename <table_name> <object_name> <new_
object_name>
Example:
Rename the network object london to chicago in the table network_
objects:
dbedit> rename network_objects london chicago
rmbyindex Description:
Removes an element from a container by element's index.
Syntax:
dbedit> rmbyindex <table_name> <object_name>
<field_name> <index_number>
Example:
Remove the element backup_log_servers from the container log_
servers by element index 1 in the table network_objects:
dbedit> rmbyindex network_objects g log_
servers:backup_log_servers 1
add_owned_ Description:
remove_name Adds an owned object (and removes its name) to a specified owned
object field (or container).
Syntax:
dbedit> add_owned_remove_name <table_name>
<object_name> <field_name> <value>
Example:
Add the owned object My_Gateway (and remove its name) to the
owned object field (or container) my_external_products:
dbedit> add_owned_remove_name network_objects My_
Gateway additional_products owned:my_external_
products
is_delete_ Description:
allowed Checks if the specified object can be deleted from the specified table
(object cannot be deleted if it is used by other objects).
Syntax:
dbedit> is_delete_allowed <table_name> <object_
name>
Example:
dbedit> is_delete_allowed network_objects MyObj
Check if the object MyObj can be deleted from the table network_
objects:
set_pass Description:
Sets specified password for specified user.
Notes:
n The password must contain at least 4 characters and no more
than 50 characters.
n This command cannot change the administrator's password.
Syntax:
dbedit> set_pass <Username> <Password>
Example:
Set the password 1234 for the user abcd:
dbedit> set_pass abcd 1234
savedb Description:
Saves the database. You can run this command only when the
database is locked globally (when you start the dbedit utility with the
"dbedit -globallock" command).
Syntax:
dbedit> savedb
savesession Description:
Saves the session. You can run this command only when you start the
dbedit utility in session mode (with the "dbedit -session"
command).
Syntax:
dbedit> savesession
fw
Description
n Performs various operations on Security or Audit log files.
n Kills the specified Check Point processes.
n Manages the Suspicious Activity Monitoring (SAM) rules.
n Manages the Suspicious Activity Policy editor.
Syntax
fw [-d]
fetchlogs <options>
hastat <options>
kill <options>
log <options>
logswitch <options>
lslogs <options>
mergefiles <options>
repairlog <options>
sam <options>
sam_policy <options>
Parameters
Parameter Description
Parameter Description
logswitch Switches the current active Check Point log file - Security
<options> ($FWDIR/log/fw.log) or Audit ($FWDIR/log/fw.adtlog).
See "fw logswitch" on page 260.
repairlog Rebuilds pointer files for Check Point log files - Security
<options> ($FWDIR/log/*.log) or Audit ($FWDIR/log/*.adtlog).
See "fw repairlog" on page 270.
sam_policy Manages the Suspicious Activity Policy editor that works with these type
<options> of rules:
or n Suspicious Activity Monitoring (SAM) rules.
samp
<options>
n Rate Limiting rules.
See "fw sam_policy" on page 279.
fw fetchlogs
Description
Fetches the specified Security log files ($FWDIR/log/*.log*) or Audit log files
($FWDIR/log/*.adtlog*) from the specified Check Point computer.
Syntax
fw [-d] fetchlogs [-f <Name of Log File 1>] [-f <Name of Log File
2>]... [-f <Name of Log File N>] <Target>
Parameters
Parameter Description
-f <Name Specifies the name of the log file to fetch. Need to specify name only.
of Log Notes:
File N>
n If you do not specify the log file name explicitly, the command
transfers all Security log files ($FWDIR/log/*.log*) and all Audit
log files ($FWDIR/log/*.adtlog*).
n The specified log file name can include wildcards * and ? (for
example, 2017-0?-*.log).
If you enter a wildcard, you must enclose it in double quotes or single
quotes.
n You can specify multiple log files in one command.
You must use the -f parameter for each log file name pattern.
n This command also transfers the applicable log pointer files.
<Target> Specifies the remote Check Point computer, with which this local Check
Point computer has established SIC trust.
n If you run this command on a Security Management Server or Domain
Management Server, then <Target> is the applicable object's name
or main IP address of the Check Point Computer as configured in
SmartConsole.
n If you run this command on a Security Gateway or Cluster Member,
then <Target> is the main IP address of the applicable object as
configured in SmartConsole.
Notes:
n This command moves the specified log files from the $FWDIR/log/ directory on the
specified Check Point computer. Meaning, it deletes the specified log files on the
specified Check Point computer after it copies them successfully.
n This command moves the specified log files to the $FWDIR/log/ directory on the local
Check Point computer, on which you run this command.
n This command cannot fetch the active log files $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog.
To fetch these active log files:
1. Perform log switch on the applicable Check Point computer:
2. Fetch the rotated log file from the applicable Check Point computer:
n This command renames the log files it fetched from the specified Check Point computer.
The new log file name is the concatenation of the Check Point computer's name (as
configured in SmartConsole), two underscore (_) characters, and the original log file
name (for example: MyGW__2019-06-01_000000.log).
[Expert@HostName:0]# ls $FWDIR/log/MyGW*
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.log
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.logaccount_ptr
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.loginitial_ptr
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.logptr
[Expert@HostName:0]#
fw hastat
Description
Shows information about Check Point computers in High Availability configuration and their
states.
Note - This command is outdated. On cluster members, run the Gaia Clish command
"show cluster state", or the Expert mode command "cphaprob state".
Note - This command is outdated. On Management Servers, run the "cpstat" on
page 192 command.
Syntax
Parameters
Parameter Description
[Expert@Member1:0]# fw hastat
HOST NUMBER HIGH AVAILABILITY STATE MACHINE STATUS
192.168.3.52 1 active OK
[Expert@Member1:0]#
fw kill
Description
Kills the specified Check Point processes.
Important - Make sure the killed process is restarted, or restart it manually. See sk97638.
Syntax
Parameters
Parameter Description
Example
fw kill fwd
fw log
Description
Shows the content of Check Point log files - Security ($FWDIR/log/*.log) or Audit
($FWDIR/log/*.adtlog).
Syntax
Parameters
Parameter Description
Parameter Description
-b "<Start Shows only entries that were logged between the specified start and
Timestamp>" end times.
"<End
Timestamp>"
n The <Start Timestamp> and <End Timestamp> may be a
date, a time, or both.
n If date is omitted, then the command assumes the current date.
n Enclose the "<Start Timestamp>" and "<End
Timestamp> in single or double quotes (-b 'XX' 'YY", or -b
"XX" "YY).
n You cannot use the "-b" parameter together with the "-s" or "-
e" parameters.
n See the date and time format below.
-c <Action> Shows only events with the specified action. One of these:
n accept
n drop
n reject
n encrypt
n decrypt
n vpnroute
n keyinst
n authorize
n deauthorize
n authcrypt
n ctl
Notes:
n The fw log command always shows the Control (ctl) actions.
n For login action, use the authcrypt.
-e "<End Shows only entries that were logged before the specified time.
Timestamp>" Notes:
n The <End Timestamp> may be a date, a time, or both.
n Enclose the <End Timestamp> in single or double quotes (-e
'...', or -e "...").
n You cannot use the "-e" parameter together with the "-b"
parameter.
n See the date and time format below.
Parameter Description
-f This parameter:
1. Shows the saved entries that match the specified conditions.
2. After the command reaches the end of the currently opened log
file, it continues to monitor the log file indefinitely and shows the
new entries that match the specified conditions.
Note - Applies only to the active log file $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-h <Origin> Shows only logs that were generated by the Security Gateway with
the specified IP address or object name (as configured in
SmartConsole).
l mail
l snmp_trap
l spoof
l user_alert
l user_auth
n all - Show entries that match all alert types (this is the default).
-l Shows both the date and the time for each log entry.
The default is to show the date only once above the relevant entries,
and then specify the time for each log entry.
Parameter Description
-n Does not perform DNS resolution of the IP addresses in the log file
(this is the default behavior).
This significantly speeds up the log processing.
-o Shows detailed log chains - shows all the log segments in the log
entry.
-p Does not perform resolution of the port numbers in the log file (this is
the default behavior).
This significantly speeds up the log processing.
-s "<Start Shows only entries that were logged after the specified time.
Timestamp>" Notes:
n The <Start Timestamp> may be a date, a time, or both.
n If the date is omitted, then the command assumed the current
date.
n Enclose the <Start Timestamp> in single or double quotes
(-s '...', or -s "...").
n You cannot use the "-s" parameter together with the "-b"
parameter.
n See the date and time format below.
Parameter Description
-t This parameter:
1. Does not show the saved entries that match the specified
conditions.
2. After the command reaches the end of the currently opened log
file, it continues to monitor the log file indefinitely and shows the
new entries that match the specified conditions.
Note - Applies only to the active log file $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-u Specifies the path and name of the log unification scheme file.
<Unification The default log unification scheme file is:
Scheme File> $FWDIR/conf/log_unification_scheme.C
-w Shows the flags of each log entry (different bits used to specify the
"nature" of the log - for example, control, audit, accounting,
complementary, and so on).
-x <Start Shows only entries from the specified log entry number and below,
Entry Number> counting from the beginning of the log file.
-y <End Entry Shows only entries until the specified log entry number, counting from
Number> the beginning of the log file.
Output
Each output line consists of a single log entry, whose fields appear in this format:
Note - The fields that show depends on the connection type.
ContentVersion Version 5
LogId Log ID 0
Examples
Example 1 - Show all log entries with both the date and the time for each log entry
fw log -l
Example 2 - Show all log entries that start after the specified timestamp
[Expert@MyGW:0]# fw log -l -s "June 12, 2018 12:33:00"
12Jun2018 12:33:00 5 N/A 1 accept MyGW > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; fg-1_client_in_rule_name: Default; fg-1_client_out_rule_name: Default; fg-1_server_in_rule_name: Host
Redirect; fg-1_server_out_rule_name: ; ProductName: FG; ProductFamily: Network;
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_match_
table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_
uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table: TABLE_START; ROW_
START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933;
ProductFamily: Network;
[Expert@MyGW:0]#
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_match_
table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_
uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table: TABLE_START; ROW_
START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933;
ProductFamily: Network;
12Jun2018 12:33:45 5 N/A 1 ctl MyGW > LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; description: Contracts; reason: Could not reach
"https://productcoverage.checkpoint.com/ProductCoverageService". Check DNS and Proxy configuration on the gateway.; Severity: 2;
status: Failed; version: 1.0; failure_impact: Contracts may be out-of-date; update_service: 1; ProductName: Security
Gateway/Management; ProductFamily: Network;
[Expert@MyGW:0]#
Example 5 - Show all log entries with action "drop", show all field headers, and show log flags
[Expert@MyGW:0]# fw log -l -q -w -c drop
HeaderDateHour: 12Jun2018 12:33:39; ContentVersion: 5; HighLevelLogKey: <max_null>; LogUid: ; SequenceNum: 1; Flags: 428292; Action:
drop; Origin: MyGW; IfDir: <; InterfaceName: eth0; Alert: ; LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_match_
table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_
uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table: TABLE_START; ROW_
START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933;
ProductFamily: Network;
[Expert@MyGW:0]#
Example 6 - Show only log entries from 0 to 10 (counting from the beginning of the log file)
[Expert@MyGW:0]# fw log -l -x 0 -y 10
... ...
[Expert@MyGW:0]#
fw logswitch
Description
Switches the current active log file:
1. Closes the current active log file
2. Renames the current active log file
3. Creates a new active log file with the default name
Notes:
n By default, this command switches the active Security log file -
$FWDIR/log/fw.log
n You can specify to switch the active Audit log file - $FWDIR/log/fw.adtlog
Syntax
fw [-d] logswitch
[-audit] [<Name of Switched Log>]
-h <Target> [[+ | -]<Name of Switched Log>]
Parameters
Parameter Description
Parameter Description
+ Specifies to copy the active log from the remote computer to the local
computer.
Notes:
n If you specify the name of the switched log file, you must write it
immediately after this + (plus) parameter.
n The command copies the active log from the remote computer and
saves it in the $FWDIR/log/ directory on the local computer.
n The default name of the saved log file is:
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
For example, MyGW__2018-03-26_174455.log
n If you specify the name of the switched log file, then the name of the
saved log file is:
<Gateway_Object_Name>__<Specified_Log_Name>.log
n When this command copies the log file from the remote computer, it
compresses the file.
Parameter Description
- Specifies to transfer the active log from the remote computer to the local
computer.
Notes:
n The command saves the copied active log file in the $FWDIR/log/
directory on the local computer and then deletes the switched log file
on the remote computer.
n If you specify the name of the switched log file, you must write it
immediately after this - (minus) parameter.
n The default name of the saved log file is:
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
For example, MyGW__2018-03-26_174455.log
n If you specify the name of the switched log file, then the name of the
saved log file is:
<Gateway_Object_Name>__<Specified_Log_Name>.log
n When this command transfers the log file from the remote computer, it
compresses the file.
n As an alternative, you can use the "fw fetchlogs" on page 246
command.
Compression
When this command transfers the log files from the remote computer, it compresses the file
with the gzip command (see RFC 1950 to RFC 1952 for details). The algorithm is a variation
of LZ77 method. The compression ratio varies with the content of the log file and is difficult to
predict. Binary data are not compressed. Text data, such as user names and URLs, are
compressed.
Example - Switching the active Security log on a Security Management Server or Security
Gateway
[Expert@MGMT:0]# fw logswitch
Log file has been switched to: 2018-06-13_182359.log
[Expert@MGMT:0]#
Example - Switching the active Security log on a managed Security Gateway and copying the
switched log
[Expert@MGMT:0]# fw logswitch -h MyGW +
Log file has been switched to: 2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MGMT:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R80.40/fw1/log/fw.log
/opt/CPsuite-R80.40/fw1/log/MyGW__2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MyGW:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R80.40/fw1/log/fw.log
/opt/CPsuite-R80.40/fw1/log/2018-06-13_185451.log
[Expert@MyGW:0]#
fw lslogs
Description
Shows a list of Security log files ($FWDIR/log/*.log) and Audit log files
($FWDIR/log/*.adtlog) residing on the local computer or a remote computer.
Syntax
fw [-d] lslogs [-f <Name of Log File 1>] [-f <Name of Log File 2>]
... [-f <Name of Log File N>] [-e] [-r] [-s {name | size | stime |
etime}] [<Target>]
Parameters
Parameter Description
-f <Name Specifies the name of the log file to show. Need to specify name only.
of Log Notes:
File>
n If the log file name is not specified explicitly, the command shows all
Security log files ($FWDIR/log/*.log).
n File names may include * and ? as wildcards (for example, 2019-
0?-*). If you enter a wildcard, you must enclose it in double quotes or
single quotes.
n You can specify multiple log files in one command. You must use the
"-f" parameter for each log file name pattern:
-f <Name of Log File 1> -f <Name of Log File 2>
... -f <Name of Log File N>
-e Shows an extended file list. It includes the following information for each log
file:
n Size - The total size of the log file and its related pointer files
n Creation Time - The time the log file was created
n Closing Time - The time the log file was closed
n Log File Name - The file name
Parameter Description
-s {name | Specifies the sort order of the log files using one of the following sort
size | options:
stime |
etime}
n name - The file name
n size - The file size
n stime - The time the log file was created (this is the default option)
n etime - The time the log file was closed
<Target> Specifies the remote Check Point computer, with which this local Check
Point computer has established SIC trust.
n If you run this command on a Security Management Server or
Domain Management Server, then <Target> is the applicable
object's name or main IP address of the Check Point Computer as
configured in SmartConsole.
n If you run this command on a Security Gateway or Cluster Member,
then <Target> is the main IP address of the applicable object as
configured in SmartConsole.
[Expert@HostName:0]# fw lslogs
Size Log file name
9KB 2019-06-14_000000.log
11KB 2019-06-15_000000.log
9KB 2019-06-16_000000.log
10KB 2019-06-17_000000.log
9KB fw.log
[Expert@HostName:0]#
Example 4 - Showing only log files specified by the patterns and their extended
information
Example 5 - Showing only log files specified by the patterns, sorting by name in reverse
order
Example 6 - Showing only log files specified by the patterns, from a managed Security
Gateway with main IP address 192.168.3.53
fw mergefiles
Description
Merges several Security log files ($FWDIR/log/*.log) into a single log file.
Merges several Audit log files ($FWDIR/log/*.adtlog) into a single log file.
Important:
n Do not merge the active Security file $FWDIR/log/fw.log with other Security
switched log files.
Switch the active Security file $FWDIR/log/fw.log (with the "fw logswitch" on
page 1068 command) and only then merge it with other Security switched log
files.
n Do not merge the active Audit file $FWDIR/log/fw.adtlog with other Audit
switched log files.
Switch the active Audit file $FWDIR/log/fw.adtlog (with the "fw logswitch"
on page 1068 command) and only then merge it with other Audit switched log
files.
n This command unifies logs entries with the same Unique-ID (UID). If you rotate
the current active log file before all the segments of a specific log arrive, this
command merges the records with the same Unique ID from two different files,
into one fully detailed record.
n If the size of the final merged log file exceeds 2GB, this command creates a list
of merged files, where the size of each merged file size is not more than 2GB.
The user receives this warning:
Warning: The size of the files you have chosen to merge
is greater than 2GB. The merge will produce two or more
files.
The names of merged files are:
l <Name of Merged Log File>.log
l <Name of Merged Log File>_1.log
l <Name of Merged Log File>_2.log
l ... ...
Syntax
Parameters
Parameter Description
-t <Time Conversion Specifies a full path and name of a file that instructs this
File> command how to adjust the times during the merge.
This is required if you merge log files from Log Servers
configured with different time zones.
The file format is:
<IP Address of Log Server #1> <Signed
Date Time #1 in Seconds>
<IP Address of Log Server #2> <Signed
Date Time #2 in Seconds>
... ...
Notes
n You must specify the absolute path and the file
name.
n The name of the time conversion file cannot
exceed 230 characters.
Parameter Description
[Expert@HostName:0]# ls -l $FWDIR/*.log
-rw-rw-r-- 1 admin root 189497 Sep 7 00:00 2019-09-07_000000.log
-rw-rw-r-- 1 admin root 14490 Sep 9 09:52 2019-09-09_000000.log
-rw-rw-r-- 1 admin root 30796 Sep 10 10:56 2019-09-10_000000.log
-rw-rw-r-- 1 admin root 24503 Sep 10 13:08 fw.log
[Expert@HostName:0]#
[Expert@HostName:0]# fw mergefiles -s $FWDIR/2019-09-07_000000.log $FWDIR/2019-09-09_000000.log
$FWDIR/2019-09-10_000000.log /var/log/2019-Sep-Merged.log
[Expert@HostName:0]#
[Expert@HostName:0]# ls -l /var/log/2019-Sep-Merged.log*
-rw-rw---- 1 admin root 213688 Sep 10 13:18 /var/log/2019-Sep-Merged.log
-rw-rw---- 1 admin root 8192 Sep 10 13:18 /var/log/2019-Sep-Merged.logLuuidDB
-rw-rw---- 1 admin root 80 Sep 10 13:18 /var/log/2019-Sep-Merged.logaccount_ptr
-rw-rw---- 1 admin root 2264 Sep 10 13:18 /var/log/2019-Sep-Merged.loginitial_ptr
-rw-rw---- 1 admin root 4448 Sep 10 13:18 /var/log/2019-Sep-Merged.logptr
[Expert@HostName:0]#
fw repairlog
Description
Check Point Security log file ($FWDIR/log/*.log) and Audit log files
($FWDIR/log/*.adtlog) are databases, with special pointer files.
If these log pointer files become corrupted (which causes the inability to read the log file), this
command can rebuild them.
Syntax
Parameters
Parameter Description
fw sam
Description
Manages the Suspicious Activity Monitoring (SAM) rules. You can use the SAM rules to block
connections to and from IP addresses without the need to change or reinstall the Security
Policy. For more information, see sk112061.
You can create the Suspicious Activity Rules in two ways:
n In SmartConsole from Monitoring Results
n In CLI with the fw sam command
Notes:
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Monitoring (SAM) Rules. See sk79700.
n See the "fw sam_policy" and "sam_alert" commands.
n SAM rules consume some CPU resources on Security Gateway.
Best Practice - The SAM Policy rules consume some CPU resources on
Security Gateway. Set an expiration for rules that gives you time to
investigate, but does not affect performance. Keep only the required SAM
Policy rules. If you confirm that an activity is risky, edit the Security Policy,
educate users, or otherwise handle the risk.
n Logs for enforced SAM rules (configured with the fw sam command) are stored
in the $FWDIR/log/sam.dat file.
By design, the file is purged when the number of stored entries reaches
100,000.
This data log file contains the records in one of these formats:
<type>,<actions>,<expire>,<ipaddr>
<type>,<actions>,<expire>,<src>,<dst>,<dport>,<ip_p>
n SAM Requests are stored on the Security Gateway in the kernel table sam_
requests.
n IP Addresses that are blocked by SAM rules, are stored on the Security
Gateway in the kernel table sam_blocked_ips.
Syntax
n To add or cancel a SAM rule according to criteria:
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM
Server>] [-f <Security Gateway>] [-t <Timeout>] [-l <Log
Type>] [-C] [-e <key=val>]+ [-r] -{n|i|I|j|J} <Criteria>
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM
Server>] [-f <Security Gateway>] -D
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM
Server>] [-f <Security Gateway>] [-r] -M -{i|j|n|b|q} all
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM
Server>] [-f <Security Gateway>] [-r] -M -{i|j|n|b|q}
<Criteria>
Parameters
Parameter Description
-s <SAM Specifies the IP address (in the X.X.X.X format) or resolvable HostName of
Server> the Security Gateway that enforces the command.
The default is localhost.
Parameter Description
-S <SIC Specifies the SIC name for the SAM server to be contacted. It is expected
Name of that the SAM server has this SIC name, otherwise the connection fails.
SAM Notes:
Server>
n If you do not explicitly specify the SIC name, the connection
continues without SIC names comparison.
n For more information about enabling SIC, refer to the OPSEC
API Specification.
n On VSX Gateway, run the fw vsx showncs -vs <VSID> command
to show the SIC name for the applicable Virtual System.
Notes:
n You can use this syntax only on Security Management Server or
Domain Management Server.
n VSX Gateways and VSX Cluster Members do not support
Suspicious Activity Monitoring (SAM) Rules. See sk79700.
-D Cancels all inhibit ("-i", "-j", "-I", "-J") and notify ("-n") parameters.
Notes:
n To "uninhibit" the inhibited connections, run the fw sam
command with the "-C" or "-D" parameters.
n It is also possible to use this command for active SAM requests.
Parameter Description
-t Specifies the time period (in seconds), during which the action is enforced.
<Timeout> The default is forever, or until you cancel the fw sam command.
-e Specifies rule information based on the keys and the provided values.
<key=val>+ Multiple keys are separated by the plus sign (+).
Available keys are (each is limited to 100 characters):
n name - Security rule name
n comment - Security rule comment
n originator - Security rule originator's username
Parameter Description
-J Inhibits new connections with the specified parameters, and closes all
existing connections with the specified parameters.
Notes:
n Matching connections are dropped.
n Each inhibited connection is logged according to the log type.
-M Monitors the active SAM requests with the specified actions and criteria.
all Gets all active SAM requests. This is used for monitoring purposes only.
Parameter Description
Parameter Description
Parameter Description
srv <Src IP> <Dest IP> Matches the specific Source IP address,
<Port> <Protocol> Destination IP address, Service (port number) and
Protocol.
subsrvs <Src IP> <Src Matches the specific Source IP address, source
Netmask> <Dest IP> <Port> netmask, destination netmask, Service (port
<Protocol> number) and Protocol.
subsrvd <Src IP> <Dest IP> Matches specific Source IP address, Destination
<Dest Netmask> <Port> IP, destination netmask, Service (port number) and
<Protocol> Protocol.
Parameter Description
fw sam_policy
Description
Manages the Suspicious Activity Policy editor that works with these types of rules:
n Suspicious Activity Monitoring (SAM) rules.
See sk112061: How to create and view Suspicious Activity Monitoring (SAM) Rules.
n Rate Limiting rules.
See sk112454: How to configure Rate Limiting rules for DoS Mitigation.
Also, see these commands:
n "fw sam" on page 271
n "sam_alert" on page 376
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy
add <options>
batch
del <options>
get <options>
fw [-d] samp
add <options>
batch
del <options>
get <options>
Parameters
Parameter Description
del <options> Deletes one configured Rate Limiting rule one at a time.
See "fw sam_policy del" on page 297.
fw sam_policy add
Description
The "fw sam_policy add" and "fw6 sam_policy add" commands:
n Add one Suspicious Activity Monitoring (SAM) rule at a time.
n Add one Rate Limiting rule at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>]
[-f <Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] ip <IP Filter Arguments>
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>]
[-f <Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] quota <Quota Filter Arguments
Parameters
Parameter Description
-u Optional.
Specifies that the rule category is User-defined.
Default rule category is Auto.
-a {d | n | Mandatory.
b} Specifies the rule action if the traffic matches the rule conditions:
n d - Drop the connection.
n n - Notify (generate a log) about the connection and let it through.
n b - Bypass the connection - let it through without checking it against
the policy rules.
Note - Rules with action set to Bypass cannot have a log or limit
specification. Bypassed packets and connections do not count
towards overall number of packets and connection for limit
enforcement of type ratio.
-l {r | a} Optional.
Specifies which type of log to generate for this rule for all traffic that
matches:
n -r - Generate a regular log
n -a - Generate an alert log
Parameter Description
-t Optional.
<Timeout> Specifies the time period (in seconds), during which the rule will be
enforced.
Default timeout is indefinite.
-f <Target> Optional.
Specifies the target Security Gateways, on which to enforce the Rate
Limiting rule.
<Target> can be one of these:
n all - This is the default option. Specifies that the rule should be
enforced on all managed Security Gateways.
n Name of the Security Gateway or Cluster object - Specifies that the
rule should be enforced only on this Security Gateway or Cluster
object (the object name must be as defined in the SmartConsole).
n Name of the Group object - Specifies that the rule should be
enforced on all Security Gateways that are members of this Group
object (the object name must be as defined in the SmartConsole).
-n "<Rule Optional.
Name>" Specifies the name (label) for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must
write a backslash (\) character. Example:
"This\ is\ a\ rule\ name\ with\ a\ backslash\
\\"
-c "<Rule Optional.
Comment>" Specifies the comment for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must
write a backslash (\) character. Example:
"This\ is\ a\ comment\ with\ a\ backslash\ \\"
Parameter Description
-o "<Rule Optional.
Originator Specifies the name of the originator for this rule.
>" Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must
write a backslash (\) character. Example:
"Created\ by\ John\ Doe"
-z "<Zone>" Optional.
Specifies the name of the Security Zone for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
Parameter Description
Important:
n The Quota rules are not applied immediately to the Security
Gateway. They are only registered in the Suspicious Activity
Monitoring (SAM) policy database. To apply all the rules from
the SAM policy database immediately, add "flush true" in
the fw samp add command syntax.
n Explanation:
For new connections rate (and for any rate limiting in general),
when a rule's limit is violated, the Security Gateway also drops
all packets that match the rule.
The Security Gateway computes new connection rates on a
per-second basis.
At the start of the 1-second timer, the Security Gateway allows
all packets, including packets for existing connections.
If, at some point, during that 1 second period, there are too
many new connections, then the Security Gateway blocks all
remaining packets for the remainder of that 1-second interval.
At the start of the next 1-second interval, the counters are
reset, and the process starts over - the Security Gateway
allows packets to pass again up to the point, where the rule’s
limit is violated.
Explanation for the IP Filter Arguments syntax for Suspicious Activity Monitoring (SAM)
rules
Argument Description
-m <Source Mask> Specifies the Source subnet mask (in dotted decimal format -
x.y.z.w).
-M <Destination Specifies the Destination subnet mask (in dotted decimal format -
Mask> x.y.z.w).
-p <Port> Specifies the port number (see IANA Service Name and Port
Number Registry).
Explanation for the Quota Filter Arguments syntax for Rate Limiting rules
Argument Description
flush true Specifies to compile and load the quota rule to the
SecureXL immediately.
(xxxx:yyyy:...:zzzz)
n cidr:<IP Address>/<Prefix>
The rule is applied to packets sent from:
l IPv4 address with Prefix from 0 to 32
n cc:<Country Code>
The rule matches the country code to the
source IP addresses assigned to this
country, based on the Geo IP database.
The two-letter codes are defined in ISO
3166-1 alpha-2.
n asn:<Autonomous System Number>
The rule matches the AS number of the
organization to the source IP addresses that
are assigned to this organization, based on
the Geo IP database.
The valid syntax is ASnnnn, where nnnn is a
number unique to the specific organization.
Notes:
n Default is: source-negated false
n The source-negated true processes all
source types, except the specified type.
Argument Description
(xxxx:yyyy:...:zzzz)
n cidr:<IP Address>/<Prefix>
The rule is applied to packets sent to:
l IPv4 address with Prefix from 0 to 32
n cc:<Country Code>
The rule matches the country code to the
destination IP addresses assigned to this
country, based on the Geo IP database.
The two-letter codes are defined in ISO
3166-1 alpha-2.
n asn:<Autonomous System Number>
The rule matches the AS number of the
organization to the destination IP addresses
that are assigned to this organization, based
on the Geo IP database.
The valid syntax is ASnnnn, where nnnn is a
number unique to the specific organization.
Notes:
n Default is: destination-negated false
n The destination-negated true will
process all destination types except the
specified type
Argument Description
Argument Description
Argument Description
Examples
Example 1 - Rate Limiting rule with a range
fw sam_policy add -a d -l r -t 3600 quota service any source range:172.16.7.11-172.16.7.13 new-conn-rate 5 flush true
Explanations:
n This rule drops packets for all connections (-a d) that exceed the quota set by this
rule, including packets for existing connections.
n This rule logs packets (-l r) that exceed the quota set by this rule.
n This rule will expire in 3600 seconds (-t 3600).
n This rule limits the rate of creation of new connections to 5 connections per second
(new-conn-rate 5) for any traffic (service any) from the source IP addresses in
the range 172.16.7.11 - 172.16.7.13 (source range:172.16.7.11-
172.16.7.13).
Note - The limit of the total number of log entries per second is configured with the
fwaccel dos config set -n <rate> command.
n This rule will be compiled and loaded on the SecureXL, together with other rules in the
Suspicious Activity Monitoring (SAM) policy database immediately, because this rule
includes the "flush true" parameter.
Explanations:
n This rule logs and lets through all packets (-a n) that exceed the quota set by this
rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to all packets except (service-negated true) the packets with
IP protocol number 1, 50-51, 6 port 443 and 17 port 53 (service 1,50-
51,6/443,17/53).
n This rule applies to all packets from source IP addresses that are assigned to the
country with specified country code (cc:QQ).
n This rule does not let any traffic through (byte-rate 0) except the packets with IP
protocol number 1, 50-51, 6 port 443 and 17 port 53.
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to packets from the Autonomous System number 64500
(asn:AS64500).
n This rule applies to packets from source IPv6 addresses FFFF:C0A8:1100/120
(cidr:[::FFFF:C0A8:1100]/120).
n This rule applies to all traffic (service any).
n This rule does not let any traffic through (pkt-rate 0).
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
Explanations:
n This rule bypasses (-a b) all packets that match this rule.
Note - The Access Control Policy and other types of security policy rules still apply.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to packets from the source IP addresses in the range 172.16.8.17 -
172.16.9.121 (range:172.16.8.17-172.16.9.121).
n This rule applies to packets sent to TCP port 80 (service 6/80).
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not log any packets (the -l r parameter is not specified).
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to all traffic (service any).
n This rule applies to all sources except (source-negated true) the source IP
addresses that are assigned to the country with specified country code (cc:QQ).
n This rule limits the maximal number of concurrent active connections to
655/65536=~1% (concurrent-conns-ratio 655) for any traffic (service any)
except (service-negated true) the connections from the source IP addresses
that are assigned to the country with specified country code (cc:QQ).
n This rule counts connections, packets, and bytes for traffic only from sources that
match this rule, and not cumulatively for this rule.
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
fw sam_policy batch
Description
The "fw sam_policy batch" and "fw6 sam_policy batch" commands:
n Add and delete many Suspicious Activity Monitoring (SAM) rules at a time.
n Add and delete many Rate Limiting rules at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Procedure
1. Start the batch mode
add -a d -l r -t 3600 -c "Limit\ conn\ rate\ to\ 5\ conn/sec from\ these\ sources" quota service
any source range:172.16.7.13-172.16.7.13 new-conn-rate 5
del <501f6ef0,00000000,cb38a8c0,0a0afffe>
EOF
[Expert@HostName]#
fw sam_policy del
Description
The "fw sam_policy del" and "fw6 sam_policy del" commands:
n Delete one configured Suspicious Activity Monitoring (SAM) rule at a time.
n Delete one configured Rate Limiting rule at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Parameters
Parameter Description
'<Rule UID>' Specifies the UID of the rule you wish to delete.
Important:
n The quote marks and angle brackets
('<...>') are mandatory.
n To see the Rule UID, run the "fw
sam_policy get" command.
Procedure
1. List all the existing rules in the Suspicious Activity Monitoring policy database
List all the existing rules in the Suspicious Activity Monitoring policy database.
n For IPv4, run:
fw sam_policy get
operation=add uid=<5ac3965f,00000000,3403a8c0,0000264a>
target=all timeout=300 action=notify log=log name=Test\ Rule
comment=Notify\ about\ traffic\ from\ 1.1.1.1
originator=John\ Doe src_ip_addr=1.1.1.1 req_tpe=ip
Explanation:
The "fw samp del" and "fw6 samp del" commands only remove a rule from the
persistent database. The Security Gateway continues to enforce the deleted rule until
the next time you compiled and load a policy. To force the rule deletion immediately,
you must enter a flush-only rule right after the "fw samp del" and "fw6 samp del"
command. This flush-only rule immediately deletes the rule you specified in the
previous step, and times out in 2 seconds.
Best Practice - Specify a short timeout period for the flush-only rules. This
prevents accumulation of rules that are obsolete in the database.
fw sam_policy get
Description
The "fw sam_policy get" and "fw6 sam_policy get" commands:
n Show all the configured Suspicious Activity Monitoring (SAM) rules.
n Show all the configured Rate Limiting rules.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw6 [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t
<Type> [+{-v '<Value>'}] [-n]]
Parameters
Note - All these parameters are optional.
Parameter Description
-u '<Rule Prints the rule specified by its Rule UID or its zero-based rule index.
UID>' The quote marks and angle brackets ('<...>') are mandatory.
Examples
Example 1 - Output in the default format
[Expert@HostName:0]# fw samp get
uid
<5ac3965f,00000000,3403a8c0,0000264a>
target
all
timeout
2147483647
action
notify
log
log
name
Test\ Rule
comment
Notify\ about\ traffic\ from\ 1.1.1.1
originator
John\ Doe
src_ip_addr
1.1.1.1
req_type
ip
fwm
Description
Performs various management operations and shows various management information.
Notes:
n For debug instructions, see the description of the fwm process in sk97638.
n On a Multi-Domain Server, you must run these commands in the context of the
applicable Domain Management Server.
Syntax
fwm [-d]
dbload <options>
exportcert <options>
fetchfile <options>
fingerprint <options>
getpcap <options>
ikecrypt <options>
load [<options>]
logexport <options>
mds <options>
printcert <options>
sic_reset
snmp_trap <options>
unload [<options>]
ver [<options>]
verify <options>
Parameters
Parameter Description
Parameter Description
dbload Downloads the user database and network objects information to the
<options> specified targets
See "fwm dbload" on page 309.
fetchfile Fetches a specified OPSEC configuration file from the specified source
<options> computer.
See "fwm fetchfile" on page 311.
getpcap Fetches the IPS packet capture data from the specified Security
<options> Gateway.
See "fwm getpcap" on page 315.
unload Unloads the policy from the specified managed Security Gateways.
<options> See "fwm unload" on page 336.
Parameter Description
ver <options> Shows the Check Point version of the Management Server.
See "fwm ver" on page 340.
fwm dbload
Description
Copies the user database and network objects information to specified managed servers with
one or more Management Software Blades enabled.
fwm exportcert
Description
Export a SIC certificate of the specified managed object to a file.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
fwm [-d] exportcert -obj <Name of Object> -cert <Name of CA> -file
<Output File> [-withroot] [-pem]
Parameters
Parameter Description
<Name of Specifies the name of the managed object, whose certificate you wish
Object> to export.
<Name of CA> Specifies the name of Certificate Authority, whose certificate you wish
to export.
fwm fetchfile
Description
Fetches a specified OPSEC configuration file from the specified source computer.
This command supports only the fwopsec.conf or fwopsec.v4x files.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
<Source> Specifies the managed remote source computer, from which to fetch
the file.
Note - The local and the remote source computers must have
established SIC trust.
Example
fwm fingerprint
Description
Shows the Check Point fingerprint.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
fwm getpcap
Description
Fetches the IPS packet capture data from the specified Security Gateway.
This command only works with IPS packet captures stored on the Security Gateway in the
$FWDIR/log/captures_repository/ directory.
This command does not work with other Software Blades, such as Anti-Bot and Anti-Virus that
store packet captures in the $FWDIR/log/blob/ directory on the Security Gateway.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <Local Specifies the local path to save the specified packet capture file.
Path> If you do not specify the local directory explicitly, the command saves the
packet capture file in the current working directory.
Example
fwm ikecrypt
Description
Encrypts the password of an Endpoint VPN Client user using IKE. The resulting string must
then be stored in the LDAP database.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
<Key> Specifies the IKE Key as defined in the LDAP Account Unit properties
window on the Encryption tab.
<Password> Specifies the password for the Endpoint VPN Client user.
Example
fwm load
Description
Loads a policy on a managed Security Gateway.
fwm logexport
Description
Exports a Security log file ($FWDIR/log/*.log) or Audit log file ($FWDIR/log/*.adtlog)
to an ASCII file.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
fwm logexport -h
fwm [-d] logexport [{-d <Delimiter> | -s}] [-t <Table Delimiter>]
[-i <Input File>] [-o <Output File>] [{-f | -e}] [-x <Start Entry
Number>] [-y <End Entry Number>] [-z] [-n] [-p] [-a] [-u
<Unification Scheme File>] [-m {initial | semi | raw}]
Parameters
Parameter Description
Parameter Description
-f After reaching the end of the currently opened log file, specifies to
continue to monitor the log file indefinitely and export the new entries as
well.
Note - Applies only to the active log file: $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-e After reaching the end of the currently opened log file, continue to
monitor the log file indefinitely and export the new entries as well.
Note - Applies only to the active log file: $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-x <Start Starts exporting the log entries from the specified log entry number and
Entry below, counting from the beginning of the log file.
Number>
-y <End Starts exporting the log entries until the specified log entry number,
Entry counting from the beginning of the log file.
Number>
Parameter Description
-p Specifies to not to perform resolution of the port numbers in the log file
(this is the default behavior).
This significantly speeds up the log processing.
-u Specifies the path and name of the log unification scheme file.
<Unification The default log unification scheme file is:
Scheme File> $FWDIR/conf/log_unification_scheme.C
Step Instructions
3 To include or exclude the log fields from the output, add these lines in the
configuration file:
[Fields_Info]
included_fields = field1,field2,field3,<REST_OF_
FIELDS>,field100
excluded_fields = field10,field11
Where:
n You can specify only the included_fields parameter, only the
excluded_fields parameter, or both.
n The num field must always appear first. You cannot manipulate this field.
n The <REST_OF_FIELDS> is an optional reserved token that refers to a list of
fields.
l If you specify the "-f" parameter, then the <REST_OF_FIELDS> is
fwm mds
Description
n Shows the Check Point version of the Multi-Domain Server.
n Rebuilds status tree for Global VPN Communities.
Syntax
Parameters
Parameter Description
Example
fwm printcert
Description
Shows a SIC certificate's details.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Item Description
-obj <Name of Object> Specifies the name of the managed object, for which to
show the SIC certificate information.
Examples
Example 1 - Showing the SIC certificate of a Management Server
[Expert@MGMT:0]# fwm printcert -ca internal_ca
Subject: O=MGMT.checkpoint.com.s6t98x
Issuer: O=MGMT.checkpoint.com.s6t98x
Not Valid Before: Sun Apr 8 13:41:00 2018 Local Time
Not Valid After: Fri Jan 1 05:14:07 2038 Local Time
Serial No.: 1
Public Key: RSA (2048 bits)
Signature: RSA with SHA256
Key Usage:
digitalSignature
keyCertSign
cRLSign
Basic Constraint:
is CA
MD5 Fingerprint:
7B:F9:7B:4C:BD:40:B9:1C:AB:2C:AE:CF:66:2E:E7:06
SHA-1 Fingerprints:
1. A6:43:3A:2B:1A:04:7F:A6:36:A6:2C:78:BF:22:D9:BC:F7:7E:4D:73
2. KEYS HEM GERM PIT ABUT ROVE RAW PA IQ FAWN NUT SLAM
[Expert@MGMT:0]#
defaultCert:
Host Certificate (level 0):
Subject: CN=CXL_192.168.3.244 VPN Certificate,O=MGMT.checkpoint.com.s6t98x
Issuer: O=MGMT.checkpoint.com.s6t98x
Not Valid Before: Sun Jun 3 19:58:19 2018 Local Time
Not Valid After: Sat Jun 3 19:58:19 2023 Local Time
Serial No.: 85021
Public Key: RSA (2048 bits)
Signature: RSA with SHA256
Subject Alternate Names:
IP Address: 192.168.3.244
CRL distribution points:
http://192.168.3.240:18264/ICA_CRL2.crl
CN=ICA_CRL2,O=MGMT.checkpoint.com.s6t98x
Key Usage:
digitalSignature
keyEncipherment
Basic Constraint:
not CA
MD5 Fingerprint:
B1:15:C7:A8:2A:EE:D1:75:92:9F:C7:B4:B9:BE:42:1B
SHA-1 Fingerprints:
1. BC:7A:D9:E2:CD:29:D1:9E:F0:39:5A:CD:7E:A9:0B:F9:6A:A7:2B:85
2. MIRE SANK DUSK HOOD HURD RIDE TROY QUAD LOVE WOOD GRIT WITH
*****
[Expert@MGMT:0]#
Example 4 - Showing the SIC certificate of a managed Cluster object in verbose mode
[Expert@MGMT:0]# fwm printcert -obj CXL_192.168.3.244 -verbose
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] fwa_db_init: called
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] fwa_db_init: closing existing database
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] do_links_getver: strncmp failed. Returning -2
defaultCert:
fwm sic_reset
Description
Resets SIC on the Management Server.
For detailed procedure, see sk65764: How to reset SIC.
Warning:
n Before you run this command, take a Gaia Snapshot and a full backup of the
Management Server.
This command resets SIC between the Management Server and all its
managed objects.
n This operation breaks trust in all Internal CA certificates and SIC trust across
the managed environment.
Therefore, we do not recommend it at all, except for real disaster recovery.
Note
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
fwm snmp_trap
Description
Sends an SNMPv1 Trap to the specified host.
Notes:
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n On a Multi-Domain Server, the SNMP Trap packet is sent from the IP address of
the Leading Interface.
Syntax
fwm [-d] snmp_trap [-v <SNMP OID>] [-g <Generic Trap Number>] [-s
<Specific Trap Number>] [-p <Source Port>] [-c <SNMP Community>]
<Target> ["<Message>"]
Parameters
Parameter Description
-v <SNMP OID> Specifies an optional SNMP OID to bind with the message.
-p <Source Port> Specifies the source port, from which to send the SNMP Trap
packets.
<Target> Specifies the managed target host, to which to send the SNMP
Trap packets.
Enter an IP address of a resolvable hostname.
Example - Sending an SNMP Trap from a Management Server and capturing the traffic on
the Security Gateway
fwm unload
Description
Unloads the policy from the specified managed Security Gateways or Cluster Members.
Warning:
1. The fwm unload command prevents all traffic from passing through the
Security Gateway (Cluster Member), because it disables the IP Forwarding in
the Linux kernel on the specified Security Gateway (Cluster Member).
2. The fwm unload command removes all policies from the specified Security
Gateway (Cluster Member).
This means that the Security Gateway (Cluster Member) accepts all incoming
connections destined to all active interfaces without any filtering or protection
enabled.
Notes:
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n If it is necessary to remove the current policy, but keep the Security Gateway
(Cluster Member) protected, then run the "comp_init_policy" on page 913
command on the Security Gateway (Cluster Member).
n To load the policies on the Security Gateway (Cluster Member), run one of
these commands on the Security Gateway (Cluster Member), or reboot:
l "fw fetch" on page 1048
Syntax
Parameters
Parameter Description
<GW1> <GW2> Specifies the managed Security Gateways by their main IP address or
... <GWN> Object Name as configured in SmartConsole.
Example
[Expert@MGMT:0]#
fwm ver
Description
Shows the Check Point version of the Security Management Server.
Syntax
Parameters
Parameter Description
-f <Output Specifies the name of the output file, in which to save this information.
File>
Example
fwm verify
Important - This command is obsolete for R80 and higher. Use the "mgmt_cli" on
page 362 command to verify a policy on a managed Security Gateway.
Description
Verifies the specified policy package without installing it.
Note
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Example
inet_alert
Description
Notifies an Internet Service Provider (ISP) when a company's corporate network is under
attack. This command forwards log messages generated by the alert daemon on your Check
Point Security Gateway to an external Management Station. This external Management
Station is usually located at the ISP site. The ISP can then analyze the alert and react
accordingly.
This command uses the Event Logging API (ELA) protocol to send the alerts. The
Management Station receiving the alert must be running the ELA Proxy.
If communication with the ELA Proxy is to be authenticated or encrypted, a key exchange must
be performed between the external Management Station running the ELA Proxy at the ISP site
and the Check Point Security Gateway generating the alert.
Procedure
Step Instructions
3 Click on the [+] near the Log and Alert and click Alerts.
5 Select the next option Run UserDefined script under the above.
6 Enter the applicable inet_alert syntax (see the Syntax section below).
7 Click OK.
Syntax
inet_alert -s <IP Address> [-o] [-a <Auth Type>] [-p <Port>] [-f
<Token> <Value>] [-m <Alert Type>]
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Parameters
Parameter Description
-s <IP The IPv4 address of the ELA Proxy (usually located at the ISP site).
Address>
-p <Port> Specifies the port number on the ELA proxy. Default port is 18187.
Parameter Description
Exist Status
Example
inet_alert -s 10.0.2.4 -a clear -f product cads -m alert
ldapcmd
Description
This is an LDAP utility that controls these features:
Feature Description
Cache LDAP cache operations, such as emptying the cache, as well as providing
debug information.
Syntax
Parameters
Parameter Description
-d <Debug Runs the command in debug mode with the specified TDERROR
Level> debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).
objects
l TemplateExtGrpCacheObject - Clears cache for
objects
l TemplateExtGrpCacheObject - Traces cache for
ldapcompare
Description
This is an LDAP utility that performs compare queries and prints a message whether the result
returned a match or not.
This utility opens a connection to an LDAP directory server, binds, and performs the
comparison specified on the command line or from a specified file.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-d <Debug Runs the command in debug mode with the specified TDERROR
Level> debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).
Compare options
Option Description
-P <LDAP Protocol Version> Specifies the LDAP protocol version. Default version
is 3.
Common options
Option Description
Option Description
l "chainingRequired"
l "referralsPreferred"
l "referralsRequired"
n [!]manageDSAit
RFC 3296
n [!]noop
n ppolicy
n [!]postread[=<Attributes>]
RFC 4527; a comma-separated list of attributes
n [!]preread[=<Attributes>]
RFC 4527; a comma-separated list of attributes
n [!]relax
n abandon
SIGINT sends the abandon signal; if critical,
does not wait for SIGINT. Not really controls.
n cancel
SIGINT sends the cancel signal; if critical, does
not wait for SIGINT. Not really controls.
n ignore
SIGINT ignores the response; if critical, does not
wait for SIGINT. Not really controls.
Option Description
-p <LDAP Server Port> Specifies the LDAP Server port. Default is 389.
-w <LDAP Admin Password> Specifies the LDAP Server administrator password (for
simple authentication).
ldapmemberconvert
Description
This is an LDAP utility that ports from the "Member" attribute values in LDAP group entries to
the "MemberOf" attribute values in LDAP member (User or Template) entries.
This utility converts the LDAP server data to work in either the "MemberOf" mode, or "Both"
mode. The utility searches through all specified group or template entries that hold one or
more "Member" attribute values and modifies each value. The utility searches through all
specified group/template entries and fetches their "Member" attribute values.
Each value is the DN of a member entry. The entry identified by this DN is added to the
"MemberOf" attribute value of the group/template DN at hand. In addition, the utility delete
those "Member" attribute values from the group/template, unless you run the command in the
"Both" mode.
When your run the command, it creates a log file ldapmemberconvert.log in the current
working directory. The command logs all modifications done and errors encountered in that log
file.
Important - Back up the LDAP server database before you run this conversion utility.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified TDERROR
debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).
-m <Member Specifies the LDAP attribute name when fetching and (possibly)
Attribute Name> deleting a group Member attribute value.
-f <File> Specifies the file that contains a list of Group DNs separated by a
new line:
<Group DN 1>
<Group DN 2>
...
<Group DN N>
Length of each line is limited to 256 characters.
Parameter Description
-L <LDAP Server Specifies the Server side time limit for LDAP operations, in
Timeout> seconds.
Default is "never".
-S <Size> Specifies the Server side size limit for LDAP operations, in
number of entries.
Default is "none".
-T <LDAP Client Specifies the Client side timeout for LDAP operations, in
Timeout> milliseconds.
Default is "never".
Notes
There are two "GroupMembership" modes. You must keep these modes consistent:
n template-to-groups
n user-to-groups
For example, if you apply conversion on LDAP users to include the "MemberOf" attributes for
their groups, then this conversion has to be applied on LDAP defined templates for their
groups.
Troubleshooting
Symptom:
A command fails with an error message stating the connection stopped unexpectedly when
you run it with the parameter -M <Number of Updates>.
Root Cause:
The LDAP server could not handle that many LDAP requests simultaneously and closed the
connection.
Solution:
Run the command again with a lower value for the "-M" parameter. The default value should
be adequate, but can also cause a connection failure in extreme situations. Continue to reduce
the value until the command runs normally. Each time you run the command with the same set
of groups, the command continues from where it left off.
Examples
Example 1
...
cn=cpGroup
uniquemember="cn=member1,ou=people,ou=cp,c=us"
uniquemember="cn=member2,ou=people,ou=cp,c=us"
...
...
cn=member1
objectclass=fw1Person
...
and:
...
cn=member2
objectclass=fw1Person
...
Run:
[Expert@MGMT:0]# ldapconvert -g cn=cpGroup,ou=groups,ou=cp,c=us -h MyLdapServer -d cn=admin -w secret -m uniquemember -o memberof -c
fw1Person
...
cn=cpGroup
...
...
cn=member1
objectclass=fw1Person
memberof="cn=cpGroup,ou=groups,ou=cp,c=us"
...
and:
...
cn=member2
objectclass=fw1Person
memberof="cn=cpGroup,ou=groups,ou=cp,c=us"
...
If you run the same command with the "-B" parameter, it produces the same result, but the
group entry is not modified.
Example 2
If there is another member attribute value for the same group entry:
uniquemember="cn=template1,ou=people, ou=cp,c=us"
cn=member1
objectclass=fw1Template
Then after running the same command, the template entry stays intact, because of the
parameter "-c fw1Person", but the object class of "template1" is "fw1Template".
ldapmodify
Description
This is an LDAP utility that imports users to an LDAP server. The input file must be in the LDIF
format.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
ldapmodify [-d <Debug Level>] [-h <LDAP Server>] [-p <LDAP Server
Port>] [-D <LDAP Admin DN>] [-w <LDAP Admin Password>] [-a] [-b]
[-c] [-F] [-k] [-n] [-r] [-v] [-T <LDAP Client Timeout>] [-Z] [ -f
<Input File> .ldif | < <Entry>]
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified TDERROR
debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).
Parameter Description
-T <LDAP Client Specifies the Client side timeout for LDAP operations, in
Timeout> milliseconds.
Default is "never".
ldapsearch
Description
This is an LDAP utility that queries an LDAP directory and returns the results.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
ldapsearch [-d <Debug Level>] [-h <LDAP Server>] [-p <LDAP Port>]
[-D <LDAP Admin DN>] [-w <LDAP Admin Password>] [-A] [-B] [-b
<Base DN>] [-F <Separator>] [-l <LDAP Server Timeout>] [-s
<Scope>] [-S <Sort Attribute>] [-t] [-T <LDAP Client Timeout>] [-
u] [-z <Number of Search Entries>] [-Z] <Filter> [<Attributes>]
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified
TDERROR debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).
Parameter Description
-b <Base DN> Specifies the Base Distinguished Name (DN) for search.
-l <LDAP Server Specifies the Server side time limit for LDAP operations, in
Timeout> seconds.
Default is "never".
-T <LDAP Client Specifies the Client side timeout for LDAP operations, in
Timeout> milliseconds.
Default is never.
Parameter Description
Example
[Expert@MGMT:0]# ldapsearch -p 18185 -b cn=omi objectclass=fw1host objectclass
mgmt_cli
Description
The mgmt_cli tool works directly with the management database on your Management
Server.
cd /d "%ProgramFiles%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
mgmt_cli.exe <Command Name> <Command Parameters> <Optional
Switches>
cd /d "%ProgramFiles
(x86)%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
mgmt_cli.exe <Command Name> <Command Parameters> <Optional
Switches>
Notes
n For a complete list of the mgmt_cli options, enter the mgmt_cli (mgmt_cli.exe)
command and press Enter.
n For more information, see the Check Point Management API Reference.
migrate
Important - This command is used to migrate the management database from R80.10
and lower versions.
For more information, see the R80.40 Installation and Upgrade Guide.
Description
Exports the management database and applicable Check Point configuration.
Imports the exported management database and applicable Check Point configuration.
Notes:
n You must run this command from the Expert mode.
n If it is necessary to back up the current management database, and you do not
plan to import it on a Management Server that runs a higher software version,
then you can use the built-in command in the $FWDIR/bin/upgrade_tools/
directory.
n If you plan to import the management database on a Management Server that
runs a higher software version, then you must use the migrate utility from the
migration tools package created specifically for that higher software version.
See the Installation and Upgrade Guide for that higher software version.
n If this command completes successfully, it creates this log file:
/var/log/opt/CPshrd-R80.40/migrate-<YYYY.MM.DD_
HH.MM.SS>.log
For example: /var/log/opt/CPshrd-R80.40/migrate-2019.06.14_11.03.46.log
n If this command fails, it creates this log file:
$CPDIR/log/migrate-<YYYY.MM.DD_HH.MM.SS>.log
For example: /opt/CPshrd-R80.40/log/migrate-2019.06.14_11.21.39.log
Syntax
n To see the built-in help:
[Expert@MGMT:0]# ./migrate -h
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# yes | nohup ./migrate export [-l | -x] [-n]
[--exclude-uepm-postgres-db] [--include-uepm-msi-files] /<Full
Path>/<Name of Exported File> &
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# yes | nohup ./migrate import [-l | -x] [-n]
[--exclude-uepm-postgres-db] [--include-uepm-msi-files] /<Full
Path>/<Name of Exported File>.tgz &
Parameters
Parameter Description
Parameter Description
-l Exports and imports the Check Point logs without log indexes in the
$FWDIR/log/ directory.
Important:
n The command can export only closed logs (to which the
information is not currently written).
n If you use this parameter, it can take the command a long
time to complete (depends on the number of logs).
-x Exports and imports the Check Point logs with their log indexes in the
$FWDIR/log/ directory.
Important:
n This parameter only supports Management Servers and
Log Servers R80.10 and higher.
n The command can export only closed logs (to which the
information is not currently written).
n If you use this parameter, it can take the command a long
time to complete (depends on the number of logs and
indexes).
-n Runs silently (non-interactive mode) and uses the default options for
each setting.
Important:
n If you export a management database in this mode and the
specified name of the exported file matches the name of an
existing file, the command overwrites the existing file
without prompting.
n If you import a management database in this mode, the
"migrate import" command runs the "cpstop"
command automatically.
--exclude- n During the export operation, does not back up the PostgreSQL
uepm- database from the Endpoint Security Management Server.
postgres-db n During the import operation, does not restore the PostgreSQL
database on the Endpoint Security Management Server.
--include- n During the export operation, backs up the MSI files from the
uepm-msi- Endpoint Security Management Server.
files n During the import operation, restores the MSI files on the
Endpoint Security Management Server.
Parameter Description
<Name of n During the export operation, specifies the name of the output
Exported file.
File> The command automatically adds the *.tgz extension.
n During the import operation, specifies the name of the exported
file.
You must manually enter the *.tgz extension in the end.
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# ./migrate export /var/log/Migrate_Export
[Expert@MGMT:0]#
[Expert@MGMT:0]# find / -name migrate-\* -type f
/var/log/opt/CPshrd-R80.40/migrate-2019.06.14_11.03.46.log
[Expert@MGMT:0]#
migrate_server
Important - This command is used to migrate the management database from
R80.20.M1, R80.20, R80.20.M2, R80.30, and higher versions.
For more information, see:
n sk135172 - Upgrade Tools
n The R80.40 Installation and Upgrade Guide
Description
Exports the management database and applicable Check Point configuration.
Imports the exported management database and applicable Check Point configuration.
Notes:
n You must run this command from the Expert mode.
n If it is necessary to back up the current management database, and you do not
plan to import it on a Management Server that runs a higher software version,
then you can use the built-in command in the $FWDIR/scripts/ directory.
n If you plan to import the management database on a Management Server that
runs a higher software version, then you must use the migrate_server utility
from the migration tools package created specifically for that higher software
version. See the Installation and Upgrade Guide for that higher software
version.
n If this command completes successfully, it creates this log file:
/var/log/opt/CPshrd-R80.40/migrate-<YYYY.MM.DD_
HH.MM.SS>.log
For example: /var/log/opt/CPshrd-R80.40/migrate-2019.06.14_11.03.46.log
n If this command fails, it creates this log file:
$CPDIR/log/migrate-<YYYY.MM.DD_HH.MM.SS>.log
For example: /opt/CPshrd-R80.40/log/migrate-2020 - 2024.06.14_11.21.39.log
Syntax
n To see the built-in help:
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server -h
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server verify -v R80.40 [-skip_
upgrade_tools_check]
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server export -v R80.40 [-skip_
upgrade_tools_check] [-l | -x] [--include-uepm-msi-files] [--
exclude-uepm-postgres-db] [--ignore_warnings] /<Full
Path>/<Name of Exported File>
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server import -v R80.40 [-skip_
upgrade_tools_check] [-l | -x] [/var/log/mdss.json] [--
include-uepm-msi-files] [--exclude-uepm-postgres-db] /<Full
Path>/<Name of Exported File>.tgz
Parameters
Parameter Description
Parameter Description
-skip_ Does not try to connect to Check Point Cloud to check for a more recent
upgrade_ version of the Upgrade Tools.
tools_check Best Practice - Use this parameter on the Management Server that
is not connected to the Internet.
Parameter Description
-l Exports and imports the Check Point logs without log indexes in the
$FWDIR/log/ directory.
Important:
n The command can export only closed logs (to which the
information is not currently written).
n If you use this parameter, it can take the command a long time
to complete (depends on the number of logs).
-x Exports and imports the Check Point logs with their log indexes in the
$FWDIR/log/ directory.
Important:
n This parameter only supports Management Servers and Log
Servers R80.10 and higher.
n The command can export only closed logs (to which the
information is not currently written).
n If you use this parameter, it can take the command a long time
to complete (depends on the number of logs and indexes).
Parameter Description
/var/log/md Important:
ss.json
n In the Upgrade Tools for R80.40 build higher than 994000406,
the syntax is (this filename is mandatory):
Previously:
-change_ /var/log/mdss.json
ips_file You must create the file /var/log/mdss.json and not use the
/<Full parameter "-change_ips_file".
Path>/<Name n In the Upgrade Tools for R80.40 build 994000406 and lower,
of JSON
the syntax was:
File>.json
-change_ips_file /<Full Path>/<Name of JSON
File>.json
Specifies the absolute path to the special JSON configuration file with
new IPv4 addresses.
This file is mandatory during an upgrade of a Multi-Domain Security
Management environment.
Even if only one of the servers migrates to a new IP address, all the other
servers must get this configuration file for the import process.
Syntax:
[{"name":"<Name of Server 1 Object in
SmartConsole>","newIpAddress4":"<New IPv4 Address
of Server 1>"},
{"name":"<Name of Server 2 Object in
SmartConsole>","newIpAddress4":"<New IPv4 Address
of Server 2>"}]
Example:
[{"name":"MyPrimaryMultiDomainServer","newIpAddress
4":"172.30.40.51"},
{"name":"MySecondaryMultiDomainServer","newIpAddres
s4":"172.30.40.52"}]
--include- n During the export operation, backs up the MSI files from the
uepm-msi- Endpoint Security Management Server.
files n During the import operation, restores the MSI files on the Endpoint
Security Management Server.
--exclude- n During the export operation, does not back up the PostgreSQL
uepm- database from the Endpoint Security Management Server.
postgres-db n During the import operation, does not restore the PostgreSQL
database on the Endpoint Security Management Server.
Parameter Description
/<Full Specifies the absolute path to the exported database file. This path must
Path>/<Name exist.
of Exported
File>
n During the export operation, specifies the name of the output file.
The command automatically adds the *.tgz extension.
n During the import operation, specifies the name of the exported file.
You must manually enter the *.tgz extension in the end.
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server export /var/log/Migrate_Export
[Expert@MGMT:0]#
[Expert@MGMT:0]# find / -name migrate-\* -type f
/var/log/opt/CPshrd-R80.40/migrate-2020 - 2024.06.14_11.03.46.log
[Expert@MGMT:0]#
queryDB_util
Description
Searches in the management database for objects or policy rules.
Important - This command is obsolete for R80 and higher. Use the "mgmt_cli" on
page 362 command to search in the management database for objects or policy rules
according to search parameters.
rs_db_tool
Description
Manages Dynamically Assigned IP address (DAIP) gateways in a DAIP database.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
n To add an entry to the DAIP database:
Note - You must run this command from the Expert mode.
Parameters
Parameter Description
-TTL <Time-To- Specifies the relative time interval (in seconds), during which the
Live> entry is valid.
sam_alert
Description
For SAM v1, this utility executes Suspicious Activity Monitoring (SAM) actions according to the
information received from the standard input.
For SAM v2, this utility executes Suspicious Activity Monitoring (SAM) actions with User
Defined Alerts mechanism.
Important:
n You must run this command on the Management Server.
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Notes:
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Monitoring (SAM) Rules. See sk79700.
n See the "fw sam" on page 271 and "fw sam_policy" on page 279 commands.
SAM v1 syntax
sam_alert [-v] [-o] [-s <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-C] {-n|-i|-I} {-src|-dst|-any|-srv}
Parameter Description
-o Specifies to print the input of this tool to the standard output (to use with
pipes in a CLI syntax).
-t <Time> Specifies the time (in seconds), during which to enforce the action. The
default is forever.
Parameter Description
SAM v2 syntax
sam_alert -v2 [-v] [-O] [-S <SAM Server>] [-t <Time>] [-f
<Security Gateway>] [-n <Name>] [-c "<Comment">] [-o
<Originator>] [-l {r | a}] -a {d | r| n | b | q | i} [-C] {-ip
|-eth} {-src|-dst|-any|-srv}
Parameter Description
-O Specifies to print the input of this tool to the standard output (to
use with pipes in a CLI syntax).
-t <Time> Specifies the time (in seconds), during which to enforce the
action. The default is forever.
Parameter Description
-l {r | a} Specifies the log type for connections that match the specified
criteria:
n r - Regular
n a - Alert
Default is None.
Example
See sk110873: How to configure Security Gateway to detect and prevent port scan.
stattest
Description
Check Point AMON client to query SNMP OIDs.
You can use this command as an alternative to the standard SNMP commands for debug
purposes - to make sure the applicable SNMP OIDs provide the requested information.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
n To query a Regular OID:
stattest get [-d] [-h <Host>] [-p <Port>] [-x <Proxy Server>] [-v <VSID>] [-t <Timeout>] <Regular_OID_1> <Regular_OID_2> ...
<Regular_OID_N>
Parameters
Parameter Description
Parameter Description
threshold_config
Description
You can configure a variety of different SNMP thresholds that generate SNMP traps, or alerts.
You can use these thresholds to monitor many system components automatically without
requesting information from each object or device.
You configure these SNMP Monitoring Thresholds only on the Security Management Server,
Multi-Domain Server, or Domain Management Server.
During policy installation, the managed a Security Gateway and Clusters receive and apply
these thresholds as part of their policy.
For more information, see sk90860: How to configure SNMP on Gaia OS.
Procedure
Step Instructions
Step Instructions
(1) Show policy Shows the name of the current configured threshold policy.
name
(2) Set policy Configures the name for the threshold policy.
name If you do not specify it explicitly, then the default name is "Default
Profile".
(3) Save policy Saves the changes in the current threshold policy.
(8) View Shows a list of all available thresholds and their current settings.
thresholds These include:
overview
n Name
n Category (see the next option "(9)")
n State (disabled or enabled)
n Threshold (threshold point, if applicable)
n Description
Thresholds Categories
Category Sub-Categories
Category Sub-Categories
Notes:
n If you run the threshold_config command locally on a Security Gateway or
Cluster Members to configure the SNMP Monitoring Thresholds, then each
policy installation erases these local SNMP threshold settings and reverts them
to the global SNMP threshold settings configured on the Management Server
that manages this Security Gateway or Cluster.
n On a Security Gateway and Cluster Members, you can save the local Threshold
Engine Configuration settings to a file and load it locally later.
n The Threshold Engine Configuration is stored in the
$FWDIR/conf/thresholds.conf file.
n In a Multi-Domain Security Management environment:
l You can configure the SNMP thresholds in the context of Multi-Domain
Server are for that Domain Management Server and its managed Security
Gateway and Clusters.
l If an SNMP threshold applies both to the Multi-Domain Server and a
Multi-Domain Security
Management Commands
For more information about Multi-Domain Server, see the R80.40 Multi-Domain Security
Management Administration Guide.
In addition, see "Security Management Server Commands" on page 40.
API
You can configure and control the Management Server through API Requests you send to the
API Server that runs on the Management Server.
The API Server runs scripts that automate daily tasks and integrate the Check Point solutions
with third party systems, such as virtualization servers, ticketing systems, and change
management systems.
To learn more about the management APIs, to see code samples, and to take advantage of
user forums, see:
n The API Documentation:
l Online - Check Point Management API Reference
l Local - https://<Server IP Address>/api_docs
By default, access to the local API Documentation is disabled. Follow the
instructions in sk174606.
n The Developers Network section of Check Point CheckMates Community.
API Tools
You can use these tools to work with the API Server on the Management Server:
n Standalone management tool, included with Gaia operating system:
mgmt_cli
n Standalone management tool, included with SmartConsole:
mgmt_cli.exe
You can copy this tool from the SmartConsole installation folder to other computers that
run Windows operating system.
n Web Services APIs that allow communication and data exchange between the clients
and the Management Server over the HTTP protocol.
These APIs also let other Check Point processes communicate with the Management
Server over the HTTPS protocol.
https://<IP Address of Management Server>/web_api/<command>
Select Automatic start to automatically start the API server when you start or reboot
the Management Server.
Notes:
n If the Management Server has more than 4GB of RAM installed, the
Select one of these options to configure which clients can connect to the API Server:
n Management server only - Only the Management Server itself can connect to
the API Server. This option only lets you use the mgmt_cli utility on the
Management Server to send API requests. You cannot use SmartConsole or
Web services to send API requests.
n All IP addresses that can be used for GUI clients - You can send API requests
from all IP addresses that are defined as Trusted Clients in SmartConsole. This
includes requests from SmartConsole, Web services, and the mgmt_cli utility
on the Management Server.
n All IP addresses - You can send API requests from all IP addresses. This
includes requests from SmartConsole, Web services, and the mgmt_cli utility
on the Management Server.
api restart
Note - On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server.
cma_migrate
Description
On the applicable target Domain Management Server, imports the management database that
was exported from an R7x Domain Management Server.
Note - This command updates the database schema before it imports. First, the
command runs pre-upgrade verification. If no errors are found, migration continues. If
there are errors, you must fix them on the source R7x Domain Management Server
according to instructions in the error messages. Then do this procedure again.
For the complete procedure, see the R80.40 Installation and Upgrade Guide.
Syntax
Example
contract_util
Description
Works with the Check Point Service Contracts.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
contract_util [-d]
check <options>
cpmacro <options>
download <options>
mgmt
print <options>
summary <options>
update <options>
verify
Parameters
Parameter Description
cpmacro Overwrites the current cp.macro file with the specified cp.macro file.
<options> See "contract_util cpmacro" on page 47.
download Downloads all associated Check Point Service Contracts from the User
<options> Center, or from a local file.
See "contract_util download" on page 48.
mgmt Delivers the Service Contract information from the Management Server to
the managed Security Gateways.
See "contract_util mgmt" on page 50.
print Shows all the installed licenses and whether the Service Contract covers
<options> these license, which entitles them for upgrade or not.
See "contract_util print" on page 51.
Parameter Description
update Updates Check Point Service Contracts from your User Center account.
<options> See "contract_util update" on page 53.
contract_util check
Description
Checks whether the Security Gateway is eligible for an upgrade.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
contract_util check
{-h | -help}
hfa
maj_upgrade
min_upgrade
upgrade
Parameters
Parameter Description
hfa Checks whether the Security Gateway is eligible for an upgrade to a higher
Hotfix Accumulator.
maj_ Checks whether the Security Gateway is eligible for an upgrade to a higher
upgrade Major version.
min_ Checks whether the Security Gateway is eligible for an upgrade to a higher
upgrade Minor version.
contract_util cpmacro
Description
Overwrites the current cp.macro file with the specified cp.macro file, if the specified is
newer than the current file.
For more information about the cp.macro file, see sk96217: What is a cp.macro file?
Syntax
Message Description
contract_util download
Description
Downloads all associated Check Point Service Contracts from User Center, or from a local file.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
contract_util download
{-h | -help}
local
{-h | -help}
[{hfa | maj_upgrade | min_upgrade | upgrade}] <Service
Contract File>
uc
{-h | -help}
[-i] [{hfa | maj_upgrade | min_upgrade | upgrade}]
<Username> <Password> [<Proxy Server> [<Proxy Username>:<Proxy
Password>]]
Parameters
Parameter Description
<Proxy Server> [<Proxy Specifies that the connection to the User Center goes
Username>:<Proxy through the proxy server.
Password>]
n <Proxy Server> - IP address of resolvable
hostname of the proxy server
n <Proxy Username> - Username for the proxy
server.
n <Proxy Password> - Password for the proxy
server.
Note - If you do not specify the proxy server explicitly, the
command uses the proxy server configured in the
management database.
<Service Contract Path to and the name of the Service Contract file.
File> First, you must download the Service Contract file from
your User Center account.
contract_util mgmt
Description
Delivers the Service Contract information from the Management Server to the managed
Security Gateways.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
contract_util mgmt
contract_util print
Description
Shows all the installed licenses and whether the Service Contract covers these license, which
entitles them for upgrade or not.
This command can show which licenses are not recognized by the Service Contract file.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
Parameters
Parameter Description
contract_util summary
Description
Shows post-installation summary and whether this Check Point computer is eligible for
upgrades.
Syntax
contract_util summary
hfa
maj_upgrade
min_upgrade
upgrade
Parameters
Parameter Description
contract_util update
Description
Updates the Check Point Service Contracts from your User Center account.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
contract_util update
[-proxy <Proxy Server>:<Proxy Port>]
[-ca_path <Path to ca-bundle.crt File>]
Parameters
Parameter Description
-proxy <Proxy Specifies that the connection to the User Center goes through
Server>:<Proxy the proxy server:
Port>
n <Proxy Server> - IP address of resolvable hostname
of the proxy server.
n <Proxy Port> - The applicable port on the proxy
server.
Note - If you do not specify the proxy explicitly, the
command uses the proxy configured in the management
database.
-ca_path <Path to Specifies the path to the Certificate Authority Bundle file (ca-
ca-bundle.crt File> bundle.crt).
Note - If you do not specify the path explicitly, the
command uses the default path.
contract_util verify
Description
Checks whether the Security Gateway is eligible for an upgrade.
This command is the same as the "contract_util check" on page 46 command, but it also
interprets the return values and shows a meaningful message.
For more information about Service Contract files, see sk33089: What is a Service Contract
File?
Syntax
contract_util verify
cp_conf
Description
Configures or reconfigures a Check Point product installation.
Note - The available options for each Check Point computer depend on the
configuration and installed products.
cp_conf
-h
admin <options>
auto <options>
ca <options>
client <options>
finger <options>
lic <options>
snmp <options>
cp_conf
-h
adv_routing <options>
auto <options>
corexl <options>
fullha <options>
ha <options>
intfs <options>
lic <options>
sic <options>
snmp <options>
Parameters
Parameter Description
Parameter Description
auto Shows and configures the automatic start of Check Point products
<options> during boot.
See "cp_conf auto" on page 61.
client Configures the GUI clients that can use SmartConsole to connect to the
<options> Security Management Server.
See "cp_conf client" on page 65.
Parameter Description
cp_conf admin
Description
Configures Check Point system administrators for the Security Management Server.
Notes:
n Multi-Domain Server does not support this command.
n Only one administrator can be defined in the "cpconfig" on page 124 menu.
To define additional administrators, use SmartConsole.
n This command corresponds to the option Administrator in the "cpconfig" on
page 124 menu.
Syntax
cp_conf admin
-h
add [<UserName> <Password> {a | w | r}]
add -gaia [{a | w | r}]
del <UserName1> <UserName2> ...
get
Parameters
Parameter Description
add -gaia [{a | w | r}] Adds the Gaia administrator user admin:
n a - Assigns all permissions - read settings, write
settings, and manage administrators
n w - Assigns permissions to read and write settings
only (cannot manage administrators)
n r - Assigns permissions to only read settings
Permissions for all products (Read/[W]rite All, [R]ead Only All, [C]ustomized) c
Permission for SmartUpdate (Read/[W]rite, [R]ead Only, [N]one) w
Permission for Monitoring (Read/[W]rite, [R]ead Only, [N]one) w
cp_conf auto
Description
Shows and controls which of Check Point products start automatically during boot.
Note - This command corresponds to the option Automatic start of Check Point
Products in the "cpconfig" on page 124 menu.
Note - On a Multi-Domain Server, use the option Automatic Start of Multi-Domain
Server in the "mdsconfig" on page 717 menu.
Syntax
cp_conf auto
-h
{enable | disable} <Product1> <Product2> ...
get all
Parameters
Parameter Description
[Expert@MGMT:0]#
[Expert@GW:0]#
cp_conf ca
Description
This command changes the settings of the Internal Certificate Authority (ICA).
Syntax
cp_conf ca
-h
fqdn <FQDN Name>
init
Parameters
Parameter Description
fqdn <FQDN Configures the Fully Qualified Domain Name (FQDN) for the Internal
Name> Certificate Authority (ICA).
The "<FQDN Name>" is the text string in this format:
hostname.domainname
Notes:
n The existing certificates for configured objects are not
revoked.
n The existing ICA certificate is not changed.
n The Management Server uses the specified "<FQDN Name>"
to configure the Certificate Revocation List Distribution Point
(CRL DP) property in all certificates that the ICA generates.
Refer to this command: "cpca_client get_crldp" on page 101
Example
[Expert@MyMGMT:0]# hostname
MyMGMT
[Expert@MyMGMT:0]#
[Expert@MyMGMT:0]# domainname
checkpoint.com
[Expert@MyMGMT:0]#
cp_conf client
Description
Configures the GUI clients that are allowed to connect with SmartConsoles to the Security
Management Server.
Notes:
n Multi-Domain Server does not support this command.
n This command corresponds to the option GUI Clients in the "cpconfig" on
page 124 menu.
Syntax
cp_conf client
add <GUI Client>
createlist <GUI Client 1> <GUI Client 2> ...
del <GUI Client 1> <GUI Client 2> ...
get
Parameters
Parameter Description
createlist <GUI Client 1> Deletes the current allowed GUI clients and creates
<GUI Client 2> ... a new list of allowed GUI clients.
del <GUI Client 1> <GUI Deletes the specified the GUI clients.
Client 2> ...
Examples
Example 1 - Configure one IPv4 address
[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#
Example 6 - Delete the current list and create a new list of allowed GUI clients
[Expert@MGMT:0]# cp_conf client get
There are no GUI Clients defined for this Security Management Server
[Expert@MGMT:0]#
cp_conf finger
Description
Shows the Internal Certificate Authority's Fingerprint.
This fingerprint is a text string derived from the ICA certificate on the Security Management
Server, Multi-Domain Server, or Domain Management Server.
This fingerprint verifies the identity of the Security Management Server, Multi-Domain Server,
or Domain Management Server when you connect to it with SmartConsole.
Syntax
cp_conf finger
-h
get
Parameters
Parameter Description
Example
cp_conf lic
Description
Shows, adds and deletes Check Point licenses.
Note - This command corresponds to the option Licenses and contracts in the
"cpconfig" on page 124 menu.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
cp_conf lic
-h
add -f <Full Path to License File>
add -m <Host> <Date> <Signature Key> <SKU/Features>
del <Signature Key>
get [-x]
Parameters
Parameter Description
add -f <Full Path to Adds a license from the specified Check Point
License File> license file.
You get this license file in the Check Point User
Center.
This is the same command as the "cplic db_add" on
page 135.
cp_log_export
Description
Exports Check Point logs over syslog.
For more information, see sk122323 and R80.40 Logging and Monitoring Administration
Guide.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
cp_log_export
cp_log_export <command-name> help
Parameters
Parameter Description
<command-name> help Shows the built help for the specified internal command.
Internal Commands
Name Description
reexport Resets the current log position and exports all logs again based on the
configuration.
cp_log_export reexport name <Name> --apply-now
cp_log_export reexport name <Name> start-position
<Position of Last Exported Log> --apply-now
cp_log_export reexport name <Name> start-position
<Position of Gap Start> end-position <Position of
Gap End> --apply-now
Name Description
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
ca-cert Specifies the full Optio Optio N/A N/A N/A N/A
<Path> path to the CA nal nal
certificate file
*.pem.
Important -
Applicable only
when the value
of the
"encrypted"
argument is
"true".
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
client-cert Specifies the full Optio Optio N/A N/A N/A N/A
<Path> path to the client nal nal
certificate *.p12.
Important -
Applicable only
when the value
of the
"encrypted"
argument is
"true".
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
n Accept
n Block
n Bypass
n Detect
n Drop
n HTTPS
Bypass
n HTTPS
Inspect
n Prevent
n Reject
Important -
This parameter
replaces any
other filter
configuration
that was
declared earlier
on this field
directly in the
filtering XML
file. Other field
filters are not
overwritten.
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
2. In the top
query field,
enter blade:
and a letter.
Examples of values:
n Anti-Bot
n Firewall
n HTTPS
Inspection
n Identity
Awareness
n IPS
Valid Software
Blade families:
n Access
n TP
n Endpoint
n Mobile
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Important -
This parameter
replaces any
other filter
configuration
that was
declared earlier
on this field
directly in the
filtering XML
file. Other field
filters are not
overwritten.
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Important -
This parameter
replaces any
other filter
configuration
that was
declared earlier
on this field
directly in the
filtering XML
file. Other field
filters are not
overwritten.
format {cef Specifies the format, Optio Optio N/A N/A N/A N/A
| syslog} in which the logs are nal nal
exported.
Default: syslog
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
name Specifies the unique Man Man Man Opti Opti Man
"<Name>" name of the Log dator dator dator onal. onal. dator
Exporter y y y By By y
configuration. defa defa
ult, ult,
appli appli
es to es to
all. all.
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
Notes:
n Allowed
characters
are: Latin
letters, digits
("0-9"),
minus ("-"),
underscore
("_"), and
period (".").
n Must start
with a letter.
n The minimum
length is two
characters.
n The "add"
command
creates a new
target
directory with
the specified
unique name
in the
$EXPORTERD
IR/target
s/ directory.
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
protocol Specifies the Layer Man Optio N/A N/A N/A N/A
{tcp | udp} 4 Transport protocol dator nal
to use (TCP or y
UDP).
There is no default
value.
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
read-mode Specifies the mode, Optio Optio N/A N/A N/A N/A
{raw | semi- in which to read the nal nal
unified} log files.
n raw -
Specifies to
export log
records
without any
unification.
n semi-
unified -
Specifies to
export log
records with
step-by-step
unification.
That is, for
each log
record, export
a record that
unifies this
record with all
previously-
encountered
records with
the same ID.
Default: raw
Req
uired
for
"rest
Req art",
Requ Requ
Requ Requ uired "sho
ired ired
ired ired for w",
for for
for for "rec "stat
Name Description "dele "reex
"add" "set" onf" us",
te" port"
com com com "star
com com
mand mand man t",
mand mand
d "sto
p"
com
man
d
cpca_client
Description
Execute operations on the Internal Certificate Authority (ICA).
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
cpca_client [-d]
create_cert <options>
double_sign <options>
get_crldp <options>
get_pubkey <options>
init_certs <options>
lscert <options>
revoke_cert <options>
revoke_non_exist_cert <options>
search <options>
set_cert_validity <options>
set_mgmt_tool <options>
set_sign_hash <options>
Parameters
Parameter Description
Parameter Description
get_crldp <options> Shows how to access a CRL file from a CRL Distribution
Point.
See "cpca_client get_crldp" on page 101.
get_pubkey <options> Saves the encoding of the public key of the ICA's certificate
to a file.
See "cpca_client get_pubkey" on page 103.
init_certs <options> Imports a list of DNs for users and creates a file with
registration keys for each user.
See "cpca_client init_certs" on page 104.
set_sign_hash Sets the hash algorithm that the CA uses to sign the file hash.
<options> See "cpca_client set_sign_hash" on page 121.
cpca_client create_cert
Description
Issues a SIC certificate for the Security Management Server or Domain Management Server.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <CA port Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the
Certificate Authority.
The default TCP port number is 18209.
-f <Full Path Specifies the PKCS12 file, which stores the certificate and keys.
to PKCS12 file>
Example
cpca_client double_sign
Description
Creates a second signature for a certificate.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <CA port Optional. Specifies the TCP port on the Security Management
number> Server or Domain Management Server, which is used to connect to
the Certificate Authority.
The default TCP port number is 18209.
-o <Full Path Optional. Saves the certificate into the specified file.
to Output
File>
Example
[Expert@MGMT:0]#
cpca_client get_crldp
Description
Shows the Fully Qualified Domain Name (FQDN) configured for the Internal Certificate
Authority (ICA) with the ""cp_conf ca" on page 63" command.
The Management Server uses this FQDN:
1. To configure the Certificate Revocation List Distribution Point (CRL DP) property in all
certificates that the ICA generates.
2. To create the URL for accessing the CRL.
Example: http://MyMGMT.checkpoint.com:18264/ICA_CRL1.crl
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <ICA Optional.
port Specifies the TCP port on the Security Management Server or Domain
number> Management Server, which is used to connect to the Certificate Authority.
The default TCP port number is 18264.
Example
[Expert@MyMGMT:0]# hostname
MyMGMT
[Expert@MyMGMT:0]#
[Expert@MyMGMT:0]# domainname
checkpoint.com
[Expert@MyMGMT:0]#
cpca_client get_pubkey
Description
Saves the encoding of the public key of the ICA's certificate to a file.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <CA port Specifies the TCP port on the Security Management Server or Domain
number> Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.
<Full Path Saves the encoding of the public key of the ICA's certificate to the
to Output specified file.
File>
Example
cpca_client init_certs
Description
Imports a list of Distinguished Names (DN) for users and creates a file with registration keys for
each user.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <CA port Optional. Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.
cpca_client lscert
Description
Shows all certificates issued by the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-stat {Pending | Valid | Optional. Filters the search results to those with
Revoked | Expired | certificate status that matches the specified status.
Renewed} This command does not support multiple values.
-kind {SIC | IKE | User | Optional. Filters the search results to those with
LDAP} certificate kind that matches the specified kind.
This command does not support multiple values.
-ser <Certificate Serial Optional. Filters the search results to those with
Number> certificate serial number that matches the specified
serial number.
This command does not support multiple values.
Example
Subject = CN=VSX2,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Revoked Kind = SIC Serial = 5521 DP = 0
Not_Before: Sun Apr 8 14:10:01 2018 Not_After: Sat Apr 8 14:10:01 2023
Subject = CN=VSX1,O=MyDomain_Server.checkpoint.com.s6t98x
Status = Revoked Kind = SIC Serial = 9113 DP = 0
Not_Before: Sun Apr 8 14:09:02 2018 Not_After: Sat Apr 8 14:09:02 2023
cpca_client revoke_cert
Description
Revokes a certificate issued by the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <CA port Optional. Specifies the TCP port on the Security Management Server or
number> Domain Management Server, which is used to connect to the Certificate
Authority.
The default TCP port number is 18209.
Note - You can use the parameter '-n' only, or together with the
parameter "-s".
cpca_client revoke_non_exist_cert
Description
Revokes a non-existent certificate issued by the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Paramet
Description
er
-i Specifies the file that contains the list of the certificate to revoke.
<Full You must create this file in the same format as the "cpca_client lscert" on
Path page 105 command prints its output.
to
Input Example
File> Subject = CN=cp_mgmt,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 30287 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri
Apr 7 19:40:12 2023
<Empty Line>
Subject = CN=cp_mgmt,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 60870 DP = 0
Not_Before: Sat Apr 7 19:40:13 2018 Not_After: Fri
Apr 7 19:40:13 2023
Note - This command saves the error messages in the <Name of Input
File>.failures file.
cpca_client search
Description
Searches for certificates in the ICA.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Parameter Description
-kind {SIC | IKE | User | LDAP} Optional. Specifies the certificate kind
to search.
You can enter multiple values in this
format:
-kind <Kind1> <Kind2> <Kind3>
The default is to search for all kinds.
Example 1
[Expert@MGMT:0]# cpca_client search samplecompany -where comment -kind SIC LDAP -stat Pending
Valid Renewed
Example 2
Subject = CN=192.168.3.51,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 73455 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
Fingerprint = XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX XXX
Thumbprint = xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx
[Expert@MGMT:0]#
Example 3
Subject = CN=192.168.3.51,O=MGMT.5p72vp
Status = Valid Kind = SIC Serial = 73455 DP = 0
Not_Before: Sat Apr 7 19:40:12 2018 Not_After: Fri Apr 7 19:40:12 2023
[Expert@MGMT:0]#
cpca_client set_mgmt_tool
Description
Controls the ICA Management Tool.
This tool is disabled by default.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Parameter Description
-p <CA port Optional. Specifies the TCP port on the Security Management
number> Server or Domain Management Server, which is used to connect to
the Certificate Authority.
The default TCP port number is 18265.
Example:
-a "CN=ICA_Tool_Admin,OU=users,O=MGMT.s6t98x"
-u <User DN> Optional. Specifies the DN of the user that is permitted to use the
ICA Management Tool.
Must specify the full DN as appears in SmartConsole:
Procedure
Example:
-u "CN=ICA_Tool_User,OU=users,O=MGMT.s6t98x"
Parameter Description
-c <Custom Optional. Specifies the DN for the custom user that is permitted to
User DN> use the ICA Management Tool.
Must specify the full DN as appears in SmartConsole.
Procedure
Example:
-c "CN=ICA_Tool_User,OU=users,O=MGMT.s6t98x"
3. In the command line on the Management Server, start the ICA Management Tool.
cpca_client set_mgmt_tool on
5. Import the administrator's / user's certificate into the Windows Certificate Store:.
a. Right-click the *.p12 file you saved when you created the required administrator /
user, and click Install PFX.
The Certificate Import Wizard opens.
c. Click Next.
d. Enter the same certificate password you used when you created the required
administrator / user certificate.
e. Clear Enable strong private key protection.
f. Select Mark this key as exportable.
g. Click Next.
h. Select Place all certificates in the following store > click Browse > select
Personal > click OK.
i. Click Next.
j. Click Finish.
8. Select the appropriate certificate for authenticating to the ICA Management Tool.
9. Click OK.
10. In the Security Alert dialog box, click Yes.
cpca_client set_sign_hash
Description
Sets the hash algorithm that the CA uses to sign the file hash. Also, see sk103840.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
{sha1 | sha256 | sha384 | The hash algorithms that the CA uses to sign the
sha512} file hash.
The default algorithm is SHA-256.
Example
cpca_create
Description
Creates new Check Point Internal Certificate Authority database.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-dn <CA DN> Specifies the Certificate Authority Distinguished Name (DN).
cpinfo
Description
A utility that collects diagnostics data on your Check Point computer at the time of execution.
It is mandatory to collect these data when you contact Check Point Support about an issue on
your Check Point server.
For more information, see sk92739.
cplic
Description
The cplic command manages Check Point licenses.
You can run this command in Gaia Clish or in the Expert mode.
License Management is divided into three types of commands:
Licensing
Applies To Description
Commands
For more about managing licenses, see the R80.40 Security Management Administration
Guide.
cplic [-d]
{-h | -help}
check <options>
contract <options>
del <options>
print <options>
put <options>
Syntax for Remote Licensing on managed Security Gateways and Cluster Members
cplic [-d]
{-h | -help}
del <options>
get <options>
put <options>
upgrade <options>
cplic [-d]
{-h | -help}
db_add <options>
db_print <options>
db_rm <options>
Parameters
Parameter Description
check Confirms that the license includes the feature on the local Security
<options> Gateway or Management Server.
See "cplic check" on page 131.
contract Manages (deletes and installs) the Check Point Service Contract on
<options> the local Check Point computer.
See "cplic contract" on page 133.
Parameter Description
del <Object Detaches a Central license from a remote managed Security Gateway
Name> or Cluster Member.
<options> See "cplic del <object name>" on page 141.
print Prints details of the installed Check Point licenses on the local Check
<options> Point computer.
See "cplic print" on page 144.
put <Object Attaches one or more Central or Local licenses to a remote managed
Name> Security Gateways and Cluster Members.
<options> See "cplic put <object name>" on page 148.
cplic check
Description
Confirms that the license includes the feature on the local Security Gateway or Management
Server. See sk66245.
Syntax
Parameters
Parameter Description
Parameter Description
cplic contract
Description
Deletes the Check Point Service Contract on the local Check Point computer.
Installs the Check Point Service Contract on the local Check Point computer.
Note
n For more information about Service Contract files, see sk33089: What is a
Service Contract File?
n If you install a Service Contract on a managed Security Gateway / Cluster
Member, you must update the license repository on the applicable Management
Server - either with the "cplic get" on page 142 command, or in SmartUpdate.
Syntax
cplic contract -h
cplic [-d] contract
del
-h
<Service Contract ID>
put
-h
[{-o | -overwrite}] <Service Contract File>
Parameters
Parameter Description
cplic db_add
Description
Adds licenses to the license repository on the Management Server.
When you add Local licenses to the license repository, Management Server automatically
attaches them to the managed Security Gateway / Cluster Member with the matching IP
address.
When you add Central licenses, you must manually attach them.
Note - You get the license details in the Check Point User Center.
Syntax
Parameters
Parameter Description
Parameter Description
< The SKU of the license summarizes the features included in the
SKU/Features> license.
For example, CPSUITE-EVAL-3DES-vNG
Example
If the file 192.0.2.11.lic contains one or more licenses, the command "cplic db_add -
l 192.0.2.11.lic" produces output similar to:
cplic db_print
Description
Shows the details of Check Point licenses stored in the license repository on the Management
Server.
Syntax
Parameters
Parameter Description
Example
cplic db_rm
Description
Removes a license from the license repository on the Management Server.
After you remove the license from the repository, it can no longer use it.
Warning - You can run this command ONLY after you detach the license with the
"cplic del" on page 140 command.
Syntax
Parameters
Parameter Description
Example
[Expert@MGMT:0]# cplic db_rm 2f540abb-d3bcb001-7e54513e-kfyigpwn
cplic del
Description
Deletes a Check Point license on a host, including unwanted evaluation, expired, and other
licenses.
This command can delete a license on both local computer, and on remote managed
computers.
Syntax
Parameters
Parameter Description
<Object The name of the Security Gateway / Cluster Member object as defined
Name> in SmartConsole.
Description
Detaches a Central license from a remote managed Security Gateway or Cluster Member.
When you run this command, it automatically updates the license repository.
The Central license remains in the license repository as an unattached license.
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway / Cluster Member object as
defined in SmartConsole.
-ip <Dynamic IP Deletes the license on the DAIP Security Gateway with the
Address> specified IP address.
Note - If this parameter is used, then object name must be a
DAIP Security Gateway.
cplic get
Description
Retrieves all licenses from managed Security Gateways and Cluster Members into the license
repository on the Management Server.
This command helps synchronize the license repository with the managed Security Gateways
and Cluster Members.
When you run this command, it updates the license repository with all local changes.
Syntax
Parameters
Parameter Description
-all Retrieves licenses from all Security Gateways and Cluster Members in the
managed network.
<IP The IP address of the Security Gateway / Cluster Member, from which
Address> licenses are to be retrieved.
<Host The name of the Security Gateway / Cluster Member object as defined in
Name> SmartConsole, from which licenses are to be retrieved.
Example
If the Security Gateway with the object name MyGW contains four Local licenses, and the
license repository contains two other Local licenses, the command "cplic get MyGW"
produces output similar to this:
cplic print
Description
Prints details of the installed Check Point licenses on the local Check Point computer.
Note - On a Security Gateway / Cluster Member, this command prints all installed
licenses (both Local and Central).
Syntax
Parameters
Parameter Description
Example 1
Example 2
cplic put
Description
Installs one or more Local licenses on a Check Point computer.
Note - You get the license details in the Check Point User Center.
Syntax
Parameters
Parameter Description
{-c | -check- Verifies the license. Checks if the IP of the license matches the Check
only} Point computer and if the signature is valid.
{-s | - Selects only the local license whose IP address matches the IP
select} address of the Check Point computer.
{-P | -Pre- Use this option after you have upgraded and before you reboot the
boot} Check Point computer.
Use of this option will prevent certain error messages.
Parameter Description
< The SKU of the license summarizes the features included in the
SKU/Features> license.
For example: CPSUITE-EVAL-3DES-vNG
Copy and paste the parameters from the license received from the User Center:
Parameter Description
SKU/features A string listing the SKU and the Certificate Key of the license.
The SKU of the license summarizes the features included in the
license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab
Example
Description
Attaches one or more Central or Local licenses to a remote managed Security Gateways and
Cluster Members.
When you run this command, it automatically updates the license repository.
Note
n You get the license details in the Check Point User
Center.
n You can attach more than one license.
Syntax
Parameters
Parameter Description
<Object Name> The name of the Security Gateway / Cluster Member object, as
defined in SmartConsole.
-ip <Dynamic Installs the license on the Security Gateway with the specified IP
IP Address> address.
This parameter is used to install a license on a Security Gateway with
dynamically assigned IP address (DAIP).
Note - If you use this parameter, then the object name must be
that of a DAIP Security Gateway.
<SKU/Features> The SKU of the license summarizes the features included in the
license.
For example: CPSUITE-EVAL-3DES-vNG
Copy and paste the parameters from the license received from the User Center:
Parameter Description
SKU/features A string listing the SKU and the Certificate Key of the license.
The SKU of the license summarizes the features included in the
license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab
cplic upgrade
Description
Upgrades licenses in the license repository with licenses in the specified license file.
Note - You get this license file in the Check Point User Center.
Syntax
Parameters
Parameter Description
-l <Input Upgrades the licenses in the license repository and Check Point Security
File> Gateways / Cluster Members to match the licenses in the specified file.
Example
This example explains the procedure to upgrade the licenses in the license repository.
There are two Software Blade licenses in the input file:
n One license does not match any license on a remote managed Security Gateway.
n The other license matches an NGX-version license on a managed Security Gateway that
has to be upgraded.
Workflow in this example:
1. Upgrade the Security Management Server to the latest version.
Ensure that there is connectivity between the Security Management Server and the
Security Gateways with the previous product versions.
2. Import all licenses into the license repository.
You can also do this after you upgrade the products on the remote Security Gateways.
3. Run this command:
Example:
Example:
5. In the Check Point User Center, view the licenses for the products that were upgraded
from version NGX to a Software Blades license.
You can also create new upgraded licenses.
6. Download a file containing the upgraded licenses.
Only download licenses for the products that were upgraded from version NGX to
Software Blades.
7. If you did not import the version NGX licenses into the repository, import the version NGX
licenses now.
n The licenses in the downloaded license file and in the license repository are
compared.
n If the certificate keys and features match, the old licenses in the repository and in
the remote Security Gateways are updated with the new licenses.
n A report of the results of the license upgrade is printed.
For more about managing licenses, see the R80.40 Security Management Administration
Guide.
cpmiquerybin
Description
The cpmiquerybin utility connects to a specified database, runs a user-defined query and
shows the query results.
The results can be a collection of Security Gateway sets or a tab-delimited list of specified
fields from each retrieved object.
The default database of the query tool is based on the shell environment settings.
To connect to a Domain Management Server database, run "mdsenv" on page 721 and define
the necessary environment variables.
Use the Domain Management Server name or IP address as the first parameter.
Notes:
n You can see complete documentation of the cpmiquerybin utility, with the full
query syntax, examples, and a list of common attributes in sk65181.
n The MISSING_ATTR string shows when you use an attribute name that does
not exist in the objects in query result.
Syntax
Parameters
Parameter Description
Return Values
n 0 - Query returns data successfully
n 1 - Query does not return data or there is a query syntax error
cppkg
Description
Manages the SmartUpdate software packages repository on the Security Management
Server.
Important - Installing software packages with the SmartUpdate is not supported for
Security Gateways running on Gaia OS.
Syntax
cppkg
add <options>
{del | delete} <options>
get
getroot
print
setroot <options>
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run mdsenv).
Parameters
Parameter Description
getroot Shows the path to the root directory of the repository (the value of
the environment variable $SUROOT).
See "cppkg getroot" on page 160.
cppkg add
Description
Adds a SmartUpdate software package to the SmartUpdate software packages repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
n This command does not overwrite existing packages. To overwrite an existing
package, you must first delete the existing package.
n You get the SmartUpdate software packages from the Check Point Support
Center.
Syntax
Parameters
Parameter Description
<Full Path to Specifies the full local path on the computer to the SmartUpdate
Package> software package.
Example - Adding R77.20 HFA_75 (R77.20.75) firmware package for 1100 Appliances
ppkg delete
Description
Deletes SmartUpdate software packages from the SmartUpdate software packages
repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
Parameters
Parameter Description
del | When you do not specify optional parameters, the command runs in the
delete interactive mode. The command shows the menu with applicable options.
Notes:
n To see the values for the optional parameters, run the "cppkg print" on page 161
command.
n You must specify all optional parameters, or no parameters.
Select package:
--------------------
(0) Delete all
(1) CP1100 Gaia Embedded Check Point R77.20 R77.20
(e) Exit
You chose to delete 'CP1100 Gaia Embedded Check Point R77.20 R77.20', Is this correct? [y/n] : y
[Expert@MGMT:0]# cppkg delete "Check Point" "CP1100" "R77.20" "Gaia Embedded" "R77.20"
Package was successfully removed from the repository
[Expert@MGMT:0]#
cppkg get
Description
Updates the list of the SmartUpdate software packages in the SmartUpdate software
packages repository based on the real content of the repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
cppkg get
Example
cppkg getroot
Description
Shows the path to the root directory of the SmartUpdate software packages repository (the
value of the environment variable $SUROOT)
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
cppkg getroot
Example
cppkg print
Description
Prints the list of SmartUpdate software packages in the SmartUpdate software packages
repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
Syntax
cppkg print
cppkg setroot
Description
Configures the path to the root directory of the SmartUpdate software packages repository.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
MDS (run the mdsenv command).
n The default path is: /var/log/cpupgrade/suroot
n When changing repository root directory:
l This command copies the software packages from the old repository to
Syntax
Example
cpprod_util
Description
This utility works with Check Point Registry ($CPDIR/registry/HKLM_registry.data)
without manually opening it:
n Shows which Check Point products and features are enabled on this Check Point
computer.
n Enables and disables Check Point products and features on this Check Point computer.
Syntax
Parameters
Parameter Description
"< Specifies the configuration parameter for the specified product or feature.
Parameter
>"
"<Value>" Specifies the value of the configuration parameter for the specified
product or feature:
n One of these integers: 0, 1, 4
n A string
Notes
n On a Multi-Domain Server, you must run this command in the context of the relevant
Domain Management Server.
n If you run the cpprod_util command without parameters, it prints:
l The list of all available products and features (for example,
"FwIsFirewallMgmt", "FwIsLogServer", "FwIsStandAlone")
l The type of the expected argument when you configure a product or feature ("no-
parameter", "string-parameter", or "integer-parameter")
l The type of the returned output ("status-output", or "no-output")
n To redirect the output of the cpprod_util command, it is necessary to redirect the
stderr to stdout:
Example:
Examples
Example - Showing a list of all installed Check Point Products Packages on a Management
Server
[Expert@MGMT:0]# cpprod_util CPPROD_GetInstalledProducts
CPFC
IDA
MGMT
FW1
SecurePlatform
NGXCMP
EdgeCmp
SFWCMP
SFWR75CMP
SFWR77CMP
FLICMP
R75CMP
R7520CMP
R7540CMP
R76CMP
R77CMP
PROVIDER-1
Reporting Module
SmartLog
CPinfo
VSEC
DIAG
[Expert@MGMT:0]#
Example - Checking if this Check Point computer is configured as a dedicated Log Server
[Expert@MGMT:0]# cpprod_util FwIsLogServer
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the SmartEvent Server blade is enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerServer
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the SmartEvent Correlation Unit blade is
enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerCorrelationUnit
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the Endpoint Policy Management blade is
enabled
[Expert@MGMT:0]# cpprod_util UepmIsInstalled
1
[Expert@MGMT:0]#
Example - Showing a list of all installed Check Point Products Packages on a Security Gateway
[Expert@MyGW:0]# cpprod_util CPPROD_GetInstalledProducts
CPFC
IDA
MGMT
FW1
SecurePlatform
CPinfo
DIAG
PPACK
CVPN
[Expert@MyGW:0]#
Example - Checking if this Security Gateway is configured with Dynamically Assigned IP (DAIP)
[Expert@MyGW:0]# cpprod_util FwIsDAG
0
[Expert@MyGW:0]#
cprid
Description
Manages the Check Point Remote Installation Daemon (cprid).
This daemon is used for remote upgrade and installation of Check Point products on the
managed Security Gateways.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run these commands in the context of the
MDS (run mdsenv).
Commands
Syntax Description
run_cprid_ Stops and then starts the Check Point Remote Installation Daemon
restart (cprid).
cprinstall
Description
Performs installation of Check Point product packages and associated operations on remote
managed Security Gateways.
Important - Installing software packages with this command is not supported for
Security Gateways that run on Gaia OS.
Notes:
n This command requires a license for SmartUpdate.
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n On the remote Security Gateways these are required:
l SIC Trust must be established between the Security Management Server
Syntax
cprinstall
boot <options>
cprestart <options>
cpstart <options>
cpstop <options>
delete <options>
get <options>
install <options>
revert <options>
show <options>
snapshot <options>
transfer <options>
uninstall <options>
verify <options>
Parameters
Parameter Description
get n Gets details of the products and the operating system installed on
<options> the managed Security Gateway.
n Updates the management database on the Security Management
Server.
See "cprinstall get" on page 178.
show Displays all snapshot (backup) files on the managed Security Gateway
<options> that runs on SecurePlatform OS.
See "cprinstall show" on page 183.
transfer Transfers a software package from the repository to the managed Security
<options> Gateway without installing the package.
See "cprinstall transfer" on page 185.
Parameter Description
cprinstall boot
Description
Reboots the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Example
[Expert@MGMT]# cprinstall boot MyGW
cprinstall cprestart
Description
Runs the cprestart command on the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n All Check Point products on the managed Security Gateway must be of the
same version.
Syntax
Parameters
Parameter Description
Example
[Expert@MGMT:0]# cprinstall cprestart MyGW
cprinstall cpstart
Description
Runs the cpstart command on the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n All Check Point products on the managed Security Gateway must be of the
same version.
Syntax
Parameters
Parameter Description
Example
[Expert@MGMT]# cprinstall cpstart MyGW
cprinstall cpstop
Description
Runs the cpstop command on the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n All Check Point products on the managed Security Gateway must be of the
same version.
Syntax
Parameters
Parameter Description
-proc Kills the Check Point daemons and Security Servers, while it maintains the
active Security Policy running in the Check Point kernel.
Rules with generic Allow, Drop or Reject action based on services, continue
to work.
-nopolicy Kills the Check Point daemons and Security Servers and unloads the
Security Policy from the Check Point kernel.
Example
[Expert@MGMT]# cprinstall cpstop -proc MyGW
cprinstall delete
Description
Deletes a snapshot (backup) file on the managed Security Gateway that runs on
SecurePlatform OS.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Example
[Expert@MGMT]# cprinstall delete MyGW Snapshot25Apr2017
cprinstall get
Description
n Gets details of the products and the operating system installed on the managed Security
Gateway.
n Updates the management database on the Security Management Server.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Example:
cprinstall install
Description
Installs Check Point products on the managed Security Gateway.
Important - Installing software packages with this command is not supported for
Security Gateways that run Gaia OS.
Notes:
n Before transferring the software package, this command runs the "cprinstall
verify" on page 189 command.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n To see the values for the package attributes, run the "cppkg print" on page 161
command.
Syntax
Parameters
Parameter Description
-boot Reboots the managed Security Gateway after installing the package.
Note - Only reboot after ALL products have the same version. Reboot is
canceled in certain scenarios.
Example
cprinstall revert
Description
Restores the managed Security Gateway that runs on SecurePlatform OS from a snapshot
saved on that Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
cprinstall show
Description
Displays all snapshot (backup) files on the managed Security Gateway that runs on
SecurePlatform OS.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Example
cprinstall snapshot
Description
Creates a snapshot on the managed Security Gateway that runs on SecurePlatform OS and
saves it on that Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
cprinstall transfer
Description
Transfers a software package from the repository to the managed Security Gateway without
installing the package.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n To see the values for the package attributes, run the "cppkg print" on page 161
command.
Syntax
Parameters
Parameter Description
cprinstall uninstall
Description
Uninstalls Check Point products on the managed Security Gateway.
Important - Uninstalling software packages with this command is not supported for
Security Gateways running on Gaia OS.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n Before uninstalling product packages, this command runs the "cprinstall verify"
on page 189 command.
n After uninstalling a product package, you must run the "cprinstall get" on
page 178 command.
n To see the values for the package attributes, run the "cppkg print" on page 161
command.
Syntax
Parameters
Parameter Description
Example
[Expert@MGMT]# cprinstall uninstall MyGW "checkpoint" "firewall" "R75.20" "R75.20"
Uninstalling firewall R75.20 from MyGW...
Info : Removing package from Check Point Gateway
Info : Product was successfully applied.
Operation Success. Please get network object data to complete the operation.
[Expert@MGMT]#
[Expert@MGMT]# cprinstall get
cprinstall verify
Description
Confirms these operations were successful:
n If a specific product can be installed on the managed Security Gateway.
n That the operating system and currently installed products the managed Security
Gateway are appropriate for the software package.
n That there is enough disk space to install the product the managed Security Gateway.
n That there is a CPRID connection with the managed Security Gateway.
Notes:
n You must run this command from the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n To see the values for the package attributes, run the "cppkg print" on page 161
command.
Syntax
Parameters
Parameter Description
cpstat
Description
Displays the status and statistics information of Check Point applications.
Syntax
cpstat [-d] [-h <Host>] [-p <Port>] [-s <SICname>] [-f <Flavor>]
[-o <Polling Interval> [-c <Count>] [-e <Period>]] <Application
Flag>
Note - You can write the parameters in the syntax in any order.
Parameters
Parameter Description
-h <Host> Optional.
When you run this command on a Management Server, this parameter
specifies the managed Security Gateway.
<Host> is an IPv4 address, a resolvable hostname, or a DAIP object
name.
The default is localhost.
Note - On a Multi-Domain Server, you must run this command in
the context of the applicable Domain Management Server:mdsenv
<IP Address or Name of Domain Management Server>.
-p <Port> Optional.
Port number of the Application Monitoring (AMON) server.
The default port is 18192.
-s <SICname> Optional.
Secure Internal Communication (SIC) name of the Application
Monitoring (AMON) server.
Parameter Description
-f <Flavor> Optional.
Specifies the type of the information to collect.
If you do not specify a flavor explicitly, the command uses the first flavor
in the <Application Flag>. To see all flavors, run the cpstat
command without any parameters.
-o <Polling Optional.
Interval> Specifies the polling interval (in seconds) - how frequently the
command collects and shows the information.
Examples:
n 0 - The command shows the results only once and the stops (this
is the default value).
n 5 - The command shows the results every 5 seconds in the loop.
n 30 - The command shows the results every 30 seconds in the
loop.
n N - The command shows the results every N seconds in the loop.
Use this parameter together with the "-c <Count>" parameter and the
"-e <Period>" parameter.
Example:
cpstat os -f perf -o 2
-c <Count> Optional.
Specifies how many times the command runs and shows the results
before it stops.
You must use this parameter together with the "-o <Polling
Interval>" parameter.
Examples:
n 0 - The command shows the results repeatedly every <Polling
Interval> (this is the default value).
n 10 - The command shows the results 10 times every <Polling
Interval> and then stops.
n 20 - The command shows the results 20 times every <Polling
Interval> and then stops.
n N - The command shows the results N times every <Polling
Interval> and then stops.
Example:
cpstat os -f perf -o 2 -c 2
Parameter Description
-e <Period> Optional.
Specifies the time (in seconds), over which the command calculates the
statistics.
You must use this parameter together with the "-o <Polling
Interval>" parameter.
You can use this parameter together with the "-c <Count>"
parameter.
Example:
cpstat os -f perf -o 2 -c 2 -e 60
<Application Mandatory.
Flag> See the table below with flavors for the application flags.
Note - The available flags depend on the enabled Software Blades. Some flags are
supported only by a Security Gateway, and some flags are supported only by a
Management Server.
Feature or
Flag Flavors
Software Blade
Feature or
Flag Flavors
Software Blade
Anti-Virus ci default
Feature or
Flag Flavors
Software Blade
QoS fg all
Feature or
Flag Flavors
Software Blade
Provisioning PA default
Agent
Examples
Example - Interfaces on a Security Gateway
[Expert@MyGW:0]# cpstat -f interfaces fw
Network interfaces
---------------------------------------------------------------------------------------------
-----------------------
|Name|IP |Netmask |Flags|Peer name|Remote IP|Topology|Proxy
name|Slaves|Ports|IPv6 Address|IPv6 Len|
---------------------------------------------------------------------------------------------
-----------------------
|eth0|192.168.30.40|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth1| 172.30.60.80|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth2| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth3| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth4| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth5| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth6| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth7| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
---------------------------------------------------------------------------------------------
-----------------------
[Expert@MyGW:0]#
Interface table
---------------------------------------
|Name|Dir|Total |Accept|Deny |Log|
---------------------------------------
|eth0|in | 2393126| 32589| 2360537| 52|
|eth0|out| 33016| 33016| 0| 0|
|eth1|in | 2360350| 0| 2360350| 0|
|eth1|out| 0| 0| 0| 0|
|eth2|in | 2360350| 0| 2360350| 0|
|eth2|out| 0| 0| 0| 0|
|eth3|in | 2348704| 0| 2348704| 1|
|eth3|out| 0| 0| 0| 0|
|eth4|in | 2360350| 0| 2360350| 0|
|eth4|out| 0| 0| 0| 0|
---------------------------------------
| | |11855896| 65605|11790291| 53|
---------------------------------------
[Expert@MyGW:0]#
[Expert@HostName:0]#
Example - Performance
[Expert@HostName:0]# cpstat os -f perf -o 2 -c 2 -e 60
[Expert@HostName:0]#
Connected clients
-------------------------------------------------------
|Client type |Administrator|Host |Database lock|
-------------------------------------------------------
|SmartConsole|admin |JOHNDOE-PC |false |
-------------------------------------------------------
[Expert@MGMT:0]#
cpview
Overview of CPView
Description
CPView is a text based built-in utility on a Check Point computer.
CPView Utility shows statistical data that contain both general system information (CPU,
Memory, Disk space) and information for different Software Blades (only on Security
Gateway).
The CPView continuously updates the data in easy to access views.
On Security Gateway, you can use this statistical data to monitor the performance.
For more information, see sk101878.
Syntax
cpview --help
Section Description
Header This view shows the time the statistics in the third view are collected.
It updates when you refresh the statistics.
Navigation This menu bar is interactive. Move between menus with the arrow keys and
mouse.
A menu can have sub-menus and they show under the menu bar.
Using CPView
Use these keys to navigate the CPView:
Key Description
Q Quits CPView.
Key Description
Use these keys to save statistics, show help, and refresh statistics:
Key Description
C Saves the current page to a file. The file name format is:
cpview_<ID of the cpview process>.cap<Number of the
capture>
cpwd_admin
Description
The Check Point WatchDog (cpwd) is a process that invokes and monitors critical processes
such as Check Point daemons on the local computer, and attempts to restart them if they fail.
Among the processes monitored by Watchdog are fwm, fwd, cpd, DAService, and others.
The list of monitored processes depends on the installed and configured Check Point products
and Software Blades.
The Check Point WatchDog writes monitoring information to the $CPDIR/log/cpwd.elg log
file.
The cpwd_admin utility shows the status of the monitored processes, and configures the
Check Point WatchDog.
Monitoring Description
Passive WatchDog restarts the process only when the process terminates
abnormally.
In the output of the cpwd_admin list command, the MON column shows
N for passively monitored processes.
Syntax
cpwd_admin
config <options>
del <options>
detach <options>
exist
flist <options>
getpid <options>
kill
list <options>
monitor_list
start <options>
start_monitor
stop <options>
stop_monitor
Parameters
Parameter Description
Parameter Description
stop_ Stops the active WatchDog monitoring - WatchDog monitors all processes
monitor only passively.
See "cpwd_admin stop_monitor" on page 230.
cpwd_admin config
Description
Configures the Check Point WatchDog.
Important - After changing the WatchDog configuration parameters, you must restart
the WatchDog process with the cpstop and cpstart commands (which restart all
Check Point processes).
Syntax
cpwd_admin config
-h
-a <options>
-d <options
-p
-r
Parameters
Parameter Description
These are the available configuration parameters and the accepted values:
Configuration Accepted
Description
Parameter Values
default_ctx Text string up to On a VSX Gateway, configures the CTX value that is
128 characters assigned to monitored processes, for which no CTX
is specified.
reset_ n Range: > 0 Configures the time (in seconds) the WatchDog
startups n Default: waits after the process starts and before the
3600 WatchDog resets the process's startup_counter
to 0.
To see the process's startup counter, in the output of
the cpwd_admin list command, refer to the
#START column.
Configuration Accepted
Description
Parameter Values
stop_timeout n Range: > 0 Configures the time (in seconds) the WatchDog
n Default: 60 waits for a process stop command to complete.
Example
cpwd_admin del
Description
Temporarily deletes a monitored process from the WatchDog database of monitored
processes.
Notes:
n WatchDog stops monitoring the detached process, but the process stays alive.
n The "cpwd_admin list" on page 218 command does not show the deleted
process anymore.
n This change applies until all Check Point services restart during boot, or with the
"cpstart" on page 191 command.
Parameters
Parameter Description
<Application Name of the monitored Check Point process as you see in the output of
Name> the "cpwd_admin list" on page 218 command in the leftmost column
APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual
System.
Example
cpwd_admin detach
Description
Temporarily detaches a monitored process from the WatchDog monitoring.
Notes:
n WatchDog stops monitoring the detached process, but the process stays alive.
n The "cpwd_admin list" on page 218 command does not show the detached
process anymore.
n This change applies until all Check Point services restart during boot, or with the
"cpstart" on page 191 command.
Parameters
Parameter Description
<Application Name of the monitored Check Point process as you see in the output of
Name> the "cpwd_admin list" on page 218 command in the leftmost column
APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual
System.
Example
cpwd_admin exist
Description
Checks whether the WatchDog process cpwd is alive.
Syntax
cpwd_admin exist
Example
cpwd_admin flist
Description
Saves the status of all WatchDog monitored processes to a file
Parameters
Parameter Description
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Output
Column Description
CTX On a VSX Gateway, shows the VSID, in which the monitored process
runs.
#START Shows how many times the WatchDog started the monitored process.
START_TIME Shows the time when the WatchDog started the monitored process for the
last time.
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_
limit configuration parameters (see "cpwd_admin config" on page 207).
MON Shows how the WatchDog monitors this process (see the explanation for
the "cpwd_admin" on page 204):
n Y - Active monitoring
n N - Passive monitoring
COMMAND Shows the command the WatchDog run to start this process.
Example
cpwd_admin getpid
Description
Shows the PID of a WatchDog monitored process.
Parameters
Parameter Description
<Application Name of the monitored Check Point process as you see in the output of
Name> the "cpwd_admin list" on page 218 command in the leftmost column
APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On VSX Gateway, specifies the context of the applicable Virtual
System.
Example
cpwd_admin kill
Description
Terminates the WatchDog process cpwd.
Important - Do not run this command unless explicitly instructed by Check Point
Support or R&D to do so.
To restart the WatchDog process, you must restart all Check Point services with the
"cpstop" on page 201 and "cpstart" on page 191 commands.
Syntax
cpwd_admin kill
cpwd_admin list
Description
Prints the status of all WatchDog monitored processes on the screen.
Parameters
Parameter Description
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Output
Column Description
CTX On a VSX Gateway, shows the VSID, in which the monitored process
runs.
#START Shows how many times the WatchDog started the monitored process.
START_TIME Shows the time when the WatchDog started the monitored process for the
last time.
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_
limit configuration parameters (see "cpwd_admin config" on page 207).
MON Shows how the WatchDog monitors this process (see the explanation for
the "cpwd_admin" on page 204):
n Y - Active monitoring
n N - Passive monitoring
COMMAND Shows the command the WatchDog run to start this process.
Examples
Example - Default output on a Management Server
[Expert@HostName:0]# cpwd_admin list
APP PID STAT #START START_TIME MON COMMAND
CPVIEWD 19738 E 1 [17:50:44] 31/5/2019 N cpviewd
HISTORYD 0 T 0 [17:54:44] 31/5/2019 N cpview_historyd
CPD 19730 E 1 [17:54:45] 31/5/2019 Y cpd
SOLR 19935 E 1 [17:50:55] 31/5/2019 N java_solr /opt/CPrt-
R80.40/conf/jetty.xml
RFL 19951 E 1 [17:50:55] 31/5/2019 N LogCore
SMARTVIEW 19979 E 1 [17:50:55] 31/5/2019 N SmartView
INDEXER 20032 E 1 [17:50:55] 31/5/2019 N /opt/CPrt-R80.40/log_indexer/log_
indexer
SMARTLOG_SERVER 20100 E 1 [17:50:55] 31/5/2019 N /opt/CPSmartLog-
R80.40/smartlog_server
CP3DLOGD 20237 E 1 [17:50:55] 31/5/2019 N cp3dlogd
EPM 20251 E 1 [17:50:56] 31/5/2019 N startEngine
DASERVICE 20404 E 1 [17:50:59] 31/5/2019 N DAService_script
[Expert@HostName:0]#
cpwd_admin monitor_list
Description
Prints the status of actively monitored processes on the screen.
See the explanation about the active monitoring in "cpwd_admin" on page 204.
Syntax
cpwd_admin monitor_list
Example
cpwd_admin start
Description
Starts a process as monitored by the WatchDog.
Parameters
Parameter Description
-name Name, under which the cpwd_admin list command shows the
<Application monitored process in the leftmost column APP.
Name> Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual
System.
Parameter Description
-path "<Full The full path (with or without Check Point environment variables)
Path to to the executable including the executable name.
Executable>" Must enclose in double quotes.
Examples:
n For FWM: "$FWDIR/bin/fwm"
n For FWD: "/opt/CPsuite-R80.40/fw1/bin/fw"
n For CPD: "$CPDIR/bin/cpd"
n For CPM: "/opt/CPsuite-
R80.40/fw1/scripts/cpm.sh"
n For SICTUNNEL: "/opt/CPshrd-R80.40/bin/cptnl"
-env {inherit | Configures whether to inherit the environment variables from the
<Env_ shell.
Var>=<Value>}
n inherit - Inherits all the environment variables (WatchDog
supports up to 80 environment variables)
n <Env_Var>=<Value> - Assigns the specified value to the
specified environment variable
Example
For the list of process and the applicable syntax, see sk97638.
cpwd_admin start_monitor
Description
Starts the active WatchDog monitoring. WatchDog monitors the predefined processes
actively.
See the explanation for the "cpwd_admin" on page 204 command.
Syntax
cpwd_admin start_monitor
Example
cpwd_admin stop
Description
Stops a WatchDog monitored process.
Parameters
Parameter Description
-name <Application Name under which the cpwd_admin list command shows
Name> the monitored process in the leftmost column APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-path "<Full Path The full path (with or without Check Point environment
to Executable>" variables) to the executable including the executable name.
Must enclose in double quotes.
Examples:
n For FWM: "$FWDIR/bin/fwm"
n For FWD: "/opt/CPsuite-R80.40/fw1/bin/fw"
n For CPD: "$CPDIR/bin/cpd_admin"
Parameter Description
Example
For the list of process and the applicable syntax, see sk97638.
cpwd_admin stop_monitor
Description
Stops the active WatchDog monitoring. WatchDog monitors all processes only passively.
See the explanation for the "cpwd_admin" on page 204 command.
Syntax
cpwd_admin stop_monitor
Example
dbedit
Description
Edits the management database - the $FWDIR/conf/objects_5_0.C file - on the Security
Management Server or Domain Management Server. See skI3301.
Important - Do NOT run this command, unless explicitly instructed by Check Point
Support or R&D to do so. Otherwise, you can corrupt settings in the management
database.
Syntax
dbedit -help
dbedit [-globallock] [{-local | -s <Management_Server>}] [{-u
<Username> | -c <Certificate>}] [-p <Password>] [-f <File_Name>
[ignore_script_failure] [-continue_updating]] [-r "<Open_Reason_
Text>"] [-d <Database_Name>] [-listen] [-readonly] [-session]
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Parameters
Parameter Description
-globallock When you work with the dbedit utility, it partially locks the management
database. If a user configures objects in SmartConsole at the same
time, it causes problems in the management database.
This option does not let SmartConsole, or a dbedit user to make
changes in the management database.
When you specify this option, the dbedit commands run on a copy of
the management database. After you make the changes with the
dbedit commands and run the savedb command, the dbedit utility
saves and commits your changes to the actual management database.
Parameter Description
-u Specifies the username, with which the dbedit utility connects to the
<Username> Security Management Server.
Mandatory parameter when you specify the "-s <Management_
Server>" parameter.
-c Specifies the user's certificate file, with which the dbedit utility connects
< to the Security Management Server.
Certificate> Mandatory parameter when you specify the "-s <Management_
Server>" parameter.
-p Specifies the user's password, with which the dbedit utility connects to
<Password> the Security Management Server.
Mandatory parameter when you specify the "-s <Management_
Server>" and "-u <Username>" parameters.
-f <File_ Specifies the file that contains the applicable dbedit internal commands
Name> (see the section "dbedit Internal Commands" below):
n create <object_type> <object_name>
n modify <table_name> <object_name> <field_name>
<value>
n update <table_name> <object_name>
n delete <table_name> <object_name>
n print <table_name> <object_name>
n quit
ignore_ Continues to execute the dbedit internal commands in the file and
script_ ignores errors.
failure You can use it when you specify the "-f <File_Name>" parameter.
-continue_ Continues to update the modified objects, even if the operation fails for
updating some of the objects (ignores the errors and runs the update_all
command at the end of the script).
You can use it when you specify the "-f <File_Name>" parameter.
-r "<Open_ Specifies the reason for opening the database in read-write mode
Reason_ (default mode).
Text>"
Parameter Description
-d Specifies the name of the database, to which the dbedit utility should
<Database_ connect (for example, mdsdb).
Name>
-listen The dbedit utility "listens" for changes (use this mode for advanced
troubleshooting with the assistance of Check Point Support).
The dbedit utility prints its internal messages when a change occurs in
the management database.
Note - To see the available tables, class names (object types), attributes and values,
connect to Management Server with Database Tool (GuiDBEdit Tool) (see sk13009).
-h Description:
Prints the general help.
Syntax:
dbedit> -h
-q Description:
Quits from dbedit.
quit Syntax:
dbedit> -q
dbedit> quit [-update_all | -noupdate]
Examples:
n Exit the utility and commit the remaining modified objects
(interactive mode):
dbedit> quit
n Exit the utility and update all the remaining modified objects:
dbedit> quit -update_all
n Exit the utility and discard all modifications:
dbedit> quit -no_update
update Description:
Saves the specified object in the specified table (for example,
"network_objects", "services", "users").
Syntax:
dbedit> update <table_name> <object_name>
Example:
Save the object My_Service in the table services:
dbedit> update services My_Service
update_all Description:
Saves all the modified objects.
Syntax:
dbedit> update_all
_print_set Description:
Prints the specified object from the specified table (for example,
"network_objects", "services", "users") as it appears in the
$FWDIR/conf/objects_5_0.C file (sets of attributes).
Syntax:
dbedit> _print_set <table_name> <object_name>
Example:
Print the object My_Obj from the table network_objects:
dbedit> print network_objects My_Obj
print Description:
Prints the list of attributes of the specified object from the specified
table (for example, "network_objects", "properties",
"services", "users").
Syntax:
dbedit> print <table_name> <object_name>
Examples:
n Print the object My_Obj from the table network_objects (in
"Network Objects"):
dbedit> print network_objects my_obj
n Print the object firewall_properties from the table properties (in
"Global Properties"):
dbedit> print properties firewall_properties
printxml Description:
Prints in XML format the list of attributes of the specified object from the
specified table (for example, "network_objects", "properties",
"services", "users").
You can export the settings from a Management Server to an XML file
that you can use later with external automation systems.
Syntax:
dbedit> printxml <table_name> [<object_name>]
Examples:
n Print the object My_Obj from the table network_objects:
dbedit> printxml network_objects my_obj
n Print the object firewall_properties from the table properties (in
"Global Properties"):
dbedit> printxml properties firewall_
properties
printbyuid Description:
Prints the attributes of the object specified by its UID (appears in the
$FWDIR/conf/objects_5_0.C file at the beginning of the object as
"chkpf_uid ({...})").
Syntax:
dbedit> printbyuid {object_id}
Example:
Print the attributes of the object with the specified UID:
dbedit> printbyuid {D3833F1D-0A58-AA42-865F-
39BFE3C126F1}
query Description:
Prints all the objects in the specified table.
Optionally, you can query for objects with specific attribute and value -
query is separated by a comma after "query <table_name>"
(spaces are not allowed between the <attribute> and '<value>').
Syntax:
dbedit> query <table_name> [ ,
<attribute>='<value>' ]
Examples:
n Print all objects in the table users:
dbedit> query users
n Print all objects in the table network_objects that are defined as
Management Servers:
dbedit> query network_objects,
management='true'
n Print all objects in the table services with the name ssh:
command_sdbedit> query services, name='ssh'
n Print all objects in the table services with the port 22:
dbedit> query services, port='22'
n Print all objects with the IP address 10.10.10.10:
dbedit> query network_objects,
ipaddr='10.10.10.10'
whereused Description:
Checks where the specified object used in the database.
Prints the number of places, where this object is used and relevant
information about each such place.
Syntax:
dbedit> whereused <table_name> <object_name>
Example:
Check where the object My_Obj is used:
dbedit> whereused network_objects My_Obj
create Description:
Creates an object of specified type (with its default values) in the
database.
Restrictions apply to the object's name:
n Object names can have a maximum of 100 characters.
n Objects names can contain only ASCII letters, numbers, and
dashes.
n Reserved words will be blocked by the Management Server (refer
to sk40179).
Syntax:
dbedit> create <object_type> <object_name>
Example:
Create the service object My_Service of the type tcp_service (with its
default values):
dbedit> create tcp_service my_service
delete Description:
Deletes an object from the specified table.
Syntax:
dbedit> delete <table_name> <object_name>
Example:
Delete the service object My_Service from the table services:
dbedit> delete services my_service
modify Description:
Modifies the value of specified attribute in the specified object in the
specified table (for example, "network_objects", "services",
"users") in the management database.
Syntax:
dbedit> modify <table_name> <object_name> <field_
name> <value>
Examples:
n Modify the color to red in the object My_Service in the table
services:
dbedit> modify services My_Service color red
n Add a comment to the object MyObj:
dbedit> modify network_objects MyObj comments
"Created by fwadmin with dbedit"
n Set the value of the global property ike_use_largest_possible_
subnets in the table properties to false:
dbedit> modify properties firewall_properties
ike_use_largest_possible_subnets false
n Create a new interface on the Security Gateway My_FW and
modify its attributes - set the IP address / Mask and enable Anti-
Spoofing on interface with "Element Index"=3 (check the
attributes of the object My_FW in Database Tool (GuiDBEdit
Tool) (see sk13009)):
lock Description:
Locks the specified object (by administrator) in the specified table (for
example, "network_objects", "services", "users") from being
modified by other users.
For example, if you connect from a remote computer to this
Management Server with admin1 and lock an object, you are be able to
connect with admin2, but are not able to modify the locked object, until
admin1 releases the lock.
Syntax:
dbedit> lock <table_name> <object_name>
Example:
Lock the object My_Service_Obj in the table services in the database:
dbedit> lock services My_Service_Obj
addelement Description:
Adds a specified multiple field / container (with specified value) to a
specified object in specified table.
Syntax:
dbedit> addelement <table_name> <object_name>
<field_name> <value>
Examples:
n Add the element BranchObjectClass with the value Organization
to a multiple field Read in the object My_Obj in the table ldap:
dbedit> addelement ldap My_Obj
Read:BranchObjectClass Organization
n Add the service MyService to the group of services
MyServicesGroup in the table services:
dbedit> addelement services MyServicesGroup
'' services:MyService
n Add the network MyNetwork to the group of networks
MyNetworksGroup in the table network_objects:
dbedit> addelement network_objects
MyNetworksGroup '' network_objects:MyNetwork
rmelement Description:
Removes a specified multiple field / container (with specified value)
from a specified object in specified table.
Syntax:
dbedit> rmelement <table_name> <object_name>
<field_name> <value>
Examples:
n Remove the service MyService from the group of services
MyServicesGroup from the table services:
dbedit> rmelement services MyServicesGroup ''
services:MyService
n Remove the network MyNetwork from the group of networks
MyNetworksGroup from the table network_objects:
dbedit> rmelement network_objects
MyNetworksGroup '' network_objects:MyNetwork
n Remove the element BranchObjectClass with the value
Organization from the multiple field Read in the object My_Obj in
the table ldap:
dbedit> rmelement ldap my_obj
Read:BranchObjectClass Organization
rename Description:
Renames the specified object in specified table.
Syntax:
dbedit> rename <table_name> <object_name> <new_
object_name>
Example:
Rename the network object london to chicago in the table network_
objects:
dbedit> rename network_objects london chicago
rmbyindex Description:
Removes an element from a container by element's index.
Syntax:
dbedit> rmbyindex <table_name> <object_name>
<field_name> <index_number>
Example:
Remove the element backup_log_servers from the container log_
servers by element index 1 in the table network_objects:
dbedit> rmbyindex network_objects g log_
servers:backup_log_servers 1
add_owned_ Description:
remove_name Adds an owned object (and removes its name) to a specified owned
object field (or container).
Syntax:
dbedit> add_owned_remove_name <table_name>
<object_name> <field_name> <value>
Example:
Add the owned object My_Gateway (and remove its name) to the
owned object field (or container) my_external_products:
dbedit> add_owned_remove_name network_objects My_
Gateway additional_products owned:my_external_
products
is_delete_ Description:
allowed Checks if the specified object can be deleted from the specified table
(object cannot be deleted if it is used by other objects).
Syntax:
dbedit> is_delete_allowed <table_name> <object_
name>
Example:
dbedit> is_delete_allowed network_objects MyObj
Check if the object MyObj can be deleted from the table network_
objects:
set_pass Description:
Sets specified password for specified user.
Notes:
n The password must contain at least 4 characters and no more
than 50 characters.
n This command cannot change the administrator's password.
Syntax:
dbedit> set_pass <Username> <Password>
Example:
Set the password 1234 for the user abcd:
dbedit> set_pass abcd 1234
savedb Description:
Saves the database. You can run this command only when the
database is locked globally (when you start the dbedit utility with the
"dbedit -globallock" command).
Syntax:
dbedit> savedb
savesession Description:
Saves the session. You can run this command only when you start the
dbedit utility in session mode (with the "dbedit -session"
command).
Syntax:
dbedit> savesession
fw
Description
n Performs various operations on Security or Audit log files.
n Kills the specified Check Point processes.
n Manages the Suspicious Activity Monitoring (SAM) rules.
n Manages the Suspicious Activity Policy editor.
Syntax
fw [-d]
fetchlogs <options>
hastat <options>
kill <options>
log <options>
logswitch <options>
lslogs <options>
mergefiles <options>
repairlog <options>
sam <options>
sam_policy <options>
Parameters
Parameter Description
Parameter Description
logswitch Switches the current active Check Point log file - Security
<options> ($FWDIR/log/fw.log) or Audit ($FWDIR/log/fw.adtlog).
See "fw logswitch" on page 260.
repairlog Rebuilds pointer files for Check Point log files - Security
<options> ($FWDIR/log/*.log) or Audit ($FWDIR/log/*.adtlog).
See "fw repairlog" on page 270.
sam_policy Manages the Suspicious Activity Policy editor that works with these type
<options> of rules:
or n Suspicious Activity Monitoring (SAM) rules.
samp
<options>
n Rate Limiting rules.
See "fw sam_policy" on page 279.
fw fetchlogs
Description
Fetches the specified Security log files ($FWDIR/log/*.log*) or Audit log files
($FWDIR/log/*.adtlog*) from the specified Check Point computer.
Syntax
fw [-d] fetchlogs [-f <Name of Log File 1>] [-f <Name of Log File
2>]... [-f <Name of Log File N>] <Target>
Parameters
Parameter Description
-f <Name Specifies the name of the log file to fetch. Need to specify name only.
of Log Notes:
File N>
n If you do not specify the log file name explicitly, the command
transfers all Security log files ($FWDIR/log/*.log*) and all Audit
log files ($FWDIR/log/*.adtlog*).
n The specified log file name can include wildcards * and ? (for
example, 2017-0?-*.log).
If you enter a wildcard, you must enclose it in double quotes or single
quotes.
n You can specify multiple log files in one command.
You must use the -f parameter for each log file name pattern.
n This command also transfers the applicable log pointer files.
<Target> Specifies the remote Check Point computer, with which this local Check
Point computer has established SIC trust.
n If you run this command on a Security Management Server or Domain
Management Server, then <Target> is the applicable object's name
or main IP address of the Check Point Computer as configured in
SmartConsole.
n If you run this command on a Security Gateway or Cluster Member,
then <Target> is the main IP address of the applicable object as
configured in SmartConsole.
Notes:
n This command moves the specified log files from the $FWDIR/log/ directory on the
specified Check Point computer. Meaning, it deletes the specified log files on the
specified Check Point computer after it copies them successfully.
n This command moves the specified log files to the $FWDIR/log/ directory on the local
Check Point computer, on which you run this command.
n This command cannot fetch the active log files $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog.
To fetch these active log files:
1. Perform log switch on the applicable Check Point computer:
2. Fetch the rotated log file from the applicable Check Point computer:
n This command renames the log files it fetched from the specified Check Point computer.
The new log file name is the concatenation of the Check Point computer's name (as
configured in SmartConsole), two underscore (_) characters, and the original log file
name (for example: MyGW__2019-06-01_000000.log).
[Expert@HostName:0]# ls $FWDIR/log/MyGW*
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.log
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.logaccount_ptr
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.loginitial_ptr
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.logptr
[Expert@HostName:0]#
fw hastat
Description
Shows information about Check Point computers in High Availability configuration and their
states.
Note - This command is outdated. On cluster members, run the Gaia Clish command
"show cluster state", or the Expert mode command "cphaprob state".
Note - This command is outdated. On Management Servers, run the "cpstat" on
page 192 command.
Syntax
Parameters
Parameter Description
[Expert@Member1:0]# fw hastat
HOST NUMBER HIGH AVAILABILITY STATE MACHINE STATUS
192.168.3.52 1 active OK
[Expert@Member1:0]#
fw kill
Description
Kills the specified Check Point processes.
Important - Make sure the killed process is restarted, or restart it manually. See sk97638.
Syntax
Parameters
Parameter Description
Example
fw kill fwd
fw log
Description
Shows the content of Check Point log files - Security ($FWDIR/log/*.log) or Audit
($FWDIR/log/*.adtlog).
Syntax
Parameters
Parameter Description
Parameter Description
-b "<Start Shows only entries that were logged between the specified start and
Timestamp>" end times.
"<End
Timestamp>"
n The <Start Timestamp> and <End Timestamp> may be a
date, a time, or both.
n If date is omitted, then the command assumes the current date.
n Enclose the "<Start Timestamp>" and "<End
Timestamp> in single or double quotes (-b 'XX' 'YY", or -b
"XX" "YY).
n You cannot use the "-b" parameter together with the "-s" or "-
e" parameters.
n See the date and time format below.
-c <Action> Shows only events with the specified action. One of these:
n accept
n drop
n reject
n encrypt
n decrypt
n vpnroute
n keyinst
n authorize
n deauthorize
n authcrypt
n ctl
Notes:
n The fw log command always shows the Control (ctl) actions.
n For login action, use the authcrypt.
-e "<End Shows only entries that were logged before the specified time.
Timestamp>" Notes:
n The <End Timestamp> may be a date, a time, or both.
n Enclose the <End Timestamp> in single or double quotes (-e
'...', or -e "...").
n You cannot use the "-e" parameter together with the "-b"
parameter.
n See the date and time format below.
Parameter Description
-f This parameter:
1. Shows the saved entries that match the specified conditions.
2. After the command reaches the end of the currently opened log
file, it continues to monitor the log file indefinitely and shows the
new entries that match the specified conditions.
Note - Applies only to the active log file $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-h <Origin> Shows only logs that were generated by the Security Gateway with
the specified IP address or object name (as configured in
SmartConsole).
l mail
l snmp_trap
l spoof
l user_alert
l user_auth
n all - Show entries that match all alert types (this is the default).
-l Shows both the date and the time for each log entry.
The default is to show the date only once above the relevant entries,
and then specify the time for each log entry.
Parameter Description
-n Does not perform DNS resolution of the IP addresses in the log file
(this is the default behavior).
This significantly speeds up the log processing.
-o Shows detailed log chains - shows all the log segments in the log
entry.
-p Does not perform resolution of the port numbers in the log file (this is
the default behavior).
This significantly speeds up the log processing.
-s "<Start Shows only entries that were logged after the specified time.
Timestamp>" Notes:
n The <Start Timestamp> may be a date, a time, or both.
n If the date is omitted, then the command assumed the current
date.
n Enclose the <Start Timestamp> in single or double quotes
(-s '...', or -s "...").
n You cannot use the "-s" parameter together with the "-b"
parameter.
n See the date and time format below.
Parameter Description
-t This parameter:
1. Does not show the saved entries that match the specified
conditions.
2. After the command reaches the end of the currently opened log
file, it continues to monitor the log file indefinitely and shows the
new entries that match the specified conditions.
Note - Applies only to the active log file $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-u Specifies the path and name of the log unification scheme file.
<Unification The default log unification scheme file is:
Scheme File> $FWDIR/conf/log_unification_scheme.C
-w Shows the flags of each log entry (different bits used to specify the
"nature" of the log - for example, control, audit, accounting,
complementary, and so on).
-x <Start Shows only entries from the specified log entry number and below,
Entry Number> counting from the beginning of the log file.
-y <End Entry Shows only entries until the specified log entry number, counting from
Number> the beginning of the log file.
Output
Each output line consists of a single log entry, whose fields appear in this format:
Note - The fields that show depends on the connection type.
ContentVersion Version 5
LogId Log ID 0
Examples
Example 1 - Show all log entries with both the date and the time for each log entry
fw log -l
Example 2 - Show all log entries that start after the specified timestamp
[Expert@MyGW:0]# fw log -l -s "June 12, 2018 12:33:00"
12Jun2018 12:33:00 5 N/A 1 accept MyGW > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; fg-1_client_in_rule_name: Default; fg-1_client_out_rule_name: Default; fg-1_server_in_rule_name: Host
Redirect; fg-1_server_out_rule_name: ; ProductName: FG; ProductFamily: Network;
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_match_
table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_
uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table: TABLE_START; ROW_
START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933;
ProductFamily: Network;
[Expert@MyGW:0]#
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_match_
table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_
uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table: TABLE_START; ROW_
START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933;
ProductFamily: Network;
12Jun2018 12:33:45 5 N/A 1 ctl MyGW > LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; description: Contracts; reason: Could not reach
"https://productcoverage.checkpoint.com/ProductCoverageService". Check DNS and Proxy configuration on the gateway.; Severity: 2;
status: Failed; version: 1.0; failure_impact: Contracts may be out-of-date; update_service: 1; ProductName: Security
Gateway/Management; ProductFamily: Network;
[Expert@MyGW:0]#
Example 5 - Show all log entries with action "drop", show all field headers, and show log flags
[Expert@MyGW:0]# fw log -l -q -w -c drop
HeaderDateHour: 12Jun2018 12:33:39; ContentVersion: 5; HighLevelLogKey: <max_null>; LogUid: ; SequenceNum: 1; Flags: 428292; Action:
drop; Origin: MyGW; IfDir: <; InterfaceName: eth0; Alert: ; LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_match_
table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_
uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table: TABLE_START; ROW_
START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933;
ProductFamily: Network;
[Expert@MyGW:0]#
Example 6 - Show only log entries from 0 to 10 (counting from the beginning of the log file)
[Expert@MyGW:0]# fw log -l -x 0 -y 10
... ...
[Expert@MyGW:0]#
fw logswitch
Description
Switches the current active log file:
1. Closes the current active log file
2. Renames the current active log file
3. Creates a new active log file with the default name
Notes:
n By default, this command switches the active Security log file -
$FWDIR/log/fw.log
n You can specify to switch the active Audit log file - $FWDIR/log/fw.adtlog
Syntax
fw [-d] logswitch
[-audit] [<Name of Switched Log>]
-h <Target> [[+ | -]<Name of Switched Log>]
Parameters
Parameter Description
Parameter Description
+ Specifies to copy the active log from the remote computer to the local
computer.
Notes:
n If you specify the name of the switched log file, you must write it
immediately after this + (plus) parameter.
n The command copies the active log from the remote computer and
saves it in the $FWDIR/log/ directory on the local computer.
n The default name of the saved log file is:
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
For example, MyGW__2018-03-26_174455.log
n If you specify the name of the switched log file, then the name of the
saved log file is:
<Gateway_Object_Name>__<Specified_Log_Name>.log
n When this command copies the log file from the remote computer, it
compresses the file.
Parameter Description
- Specifies to transfer the active log from the remote computer to the local
computer.
Notes:
n The command saves the copied active log file in the $FWDIR/log/
directory on the local computer and then deletes the switched log file
on the remote computer.
n If you specify the name of the switched log file, you must write it
immediately after this - (minus) parameter.
n The default name of the saved log file is:
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
For example, MyGW__2018-03-26_174455.log
n If you specify the name of the switched log file, then the name of the
saved log file is:
<Gateway_Object_Name>__<Specified_Log_Name>.log
n When this command transfers the log file from the remote computer, it
compresses the file.
n As an alternative, you can use the "fw fetchlogs" on page 246
command.
Compression
When this command transfers the log files from the remote computer, it compresses the file
with the gzip command (see RFC 1950 to RFC 1952 for details). The algorithm is a variation
of LZ77 method. The compression ratio varies with the content of the log file and is difficult to
predict. Binary data are not compressed. Text data, such as user names and URLs, are
compressed.
Example - Switching the active Security log on a Security Management Server or Security
Gateway
[Expert@MGMT:0]# fw logswitch
Log file has been switched to: 2018-06-13_182359.log
[Expert@MGMT:0]#
Example - Switching the active Security log on a managed Security Gateway and copying the
switched log
[Expert@MGMT:0]# fw logswitch -h MyGW +
Log file has been switched to: 2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MGMT:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R80.40/fw1/log/fw.log
/opt/CPsuite-R80.40/fw1/log/MyGW__2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MyGW:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R80.40/fw1/log/fw.log
/opt/CPsuite-R80.40/fw1/log/2018-06-13_185451.log
[Expert@MyGW:0]#
fw lslogs
Description
Shows a list of Security log files ($FWDIR/log/*.log) and Audit log files
($FWDIR/log/*.adtlog) residing on the local computer or a remote computer.
Syntax
fw [-d] lslogs [-f <Name of Log File 1>] [-f <Name of Log File 2>]
... [-f <Name of Log File N>] [-e] [-r] [-s {name | size | stime |
etime}] [<Target>]
Parameters
Parameter Description
-f <Name Specifies the name of the log file to show. Need to specify name only.
of Log Notes:
File>
n If the log file name is not specified explicitly, the command shows all
Security log files ($FWDIR/log/*.log).
n File names may include * and ? as wildcards (for example, 2019-
0?-*). If you enter a wildcard, you must enclose it in double quotes or
single quotes.
n You can specify multiple log files in one command. You must use the
"-f" parameter for each log file name pattern:
-f <Name of Log File 1> -f <Name of Log File 2>
... -f <Name of Log File N>
-e Shows an extended file list. It includes the following information for each log
file:
n Size - The total size of the log file and its related pointer files
n Creation Time - The time the log file was created
n Closing Time - The time the log file was closed
n Log File Name - The file name
Parameter Description
-s {name | Specifies the sort order of the log files using one of the following sort
size | options:
stime |
etime}
n name - The file name
n size - The file size
n stime - The time the log file was created (this is the default option)
n etime - The time the log file was closed
<Target> Specifies the remote Check Point computer, with which this local Check
Point computer has established SIC trust.
n If you run this command on a Security Management Server or
Domain Management Server, then <Target> is the applicable
object's name or main IP address of the Check Point Computer as
configured in SmartConsole.
n If you run this command on a Security Gateway or Cluster Member,
then <Target> is the main IP address of the applicable object as
configured in SmartConsole.
[Expert@HostName:0]# fw lslogs
Size Log file name
9KB 2019-06-14_000000.log
11KB 2019-06-15_000000.log
9KB 2019-06-16_000000.log
10KB 2019-06-17_000000.log
9KB fw.log
[Expert@HostName:0]#
Example 4 - Showing only log files specified by the patterns and their extended
information
Example 5 - Showing only log files specified by the patterns, sorting by name in reverse
order
Example 6 - Showing only log files specified by the patterns, from a managed Security
Gateway with main IP address 192.168.3.53
fw mergefiles
Description
Merges several Security log files ($FWDIR/log/*.log) into a single log file.
Merges several Audit log files ($FWDIR/log/*.adtlog) into a single log file.
Important:
n Do not merge the active Security file $FWDIR/log/fw.log with other Security
switched log files.
Switch the active Security file $FWDIR/log/fw.log (with the "fw logswitch" on
page 1068 command) and only then merge it with other Security switched log
files.
n Do not merge the active Audit file $FWDIR/log/fw.adtlog with other Audit
switched log files.
Switch the active Audit file $FWDIR/log/fw.adtlog (with the "fw logswitch"
on page 1068 command) and only then merge it with other Audit switched log
files.
n This command unifies logs entries with the same Unique-ID (UID). If you rotate
the current active log file before all the segments of a specific log arrive, this
command merges the records with the same Unique ID from two different files,
into one fully detailed record.
n If the size of the final merged log file exceeds 2GB, this command creates a list
of merged files, where the size of each merged file size is not more than 2GB.
The user receives this warning:
Warning: The size of the files you have chosen to merge
is greater than 2GB. The merge will produce two or more
files.
The names of merged files are:
l <Name of Merged Log File>.log
l <Name of Merged Log File>_1.log
l <Name of Merged Log File>_2.log
l ... ...
Syntax
Parameters
Parameter Description
-t <Time Conversion Specifies a full path and name of a file that instructs this
File> command how to adjust the times during the merge.
This is required if you merge log files from Log Servers
configured with different time zones.
The file format is:
<IP Address of Log Server #1> <Signed
Date Time #1 in Seconds>
<IP Address of Log Server #2> <Signed
Date Time #2 in Seconds>
... ...
Notes
n You must specify the absolute path and the file
name.
n The name of the time conversion file cannot
exceed 230 characters.
Parameter Description
[Expert@HostName:0]# ls -l $FWDIR/*.log
-rw-rw-r-- 1 admin root 189497 Sep 7 00:00 2019-09-07_000000.log
-rw-rw-r-- 1 admin root 14490 Sep 9 09:52 2019-09-09_000000.log
-rw-rw-r-- 1 admin root 30796 Sep 10 10:56 2019-09-10_000000.log
-rw-rw-r-- 1 admin root 24503 Sep 10 13:08 fw.log
[Expert@HostName:0]#
[Expert@HostName:0]# fw mergefiles -s $FWDIR/2019-09-07_000000.log $FWDIR/2019-09-09_000000.log
$FWDIR/2019-09-10_000000.log /var/log/2019-Sep-Merged.log
[Expert@HostName:0]#
[Expert@HostName:0]# ls -l /var/log/2019-Sep-Merged.log*
-rw-rw---- 1 admin root 213688 Sep 10 13:18 /var/log/2019-Sep-Merged.log
-rw-rw---- 1 admin root 8192 Sep 10 13:18 /var/log/2019-Sep-Merged.logLuuidDB
-rw-rw---- 1 admin root 80 Sep 10 13:18 /var/log/2019-Sep-Merged.logaccount_ptr
-rw-rw---- 1 admin root 2264 Sep 10 13:18 /var/log/2019-Sep-Merged.loginitial_ptr
-rw-rw---- 1 admin root 4448 Sep 10 13:18 /var/log/2019-Sep-Merged.logptr
[Expert@HostName:0]#
fw repairlog
Description
Check Point Security log file ($FWDIR/log/*.log) and Audit log files
($FWDIR/log/*.adtlog) are databases, with special pointer files.
If these log pointer files become corrupted (which causes the inability to read the log file), this
command can rebuild them.
Syntax
Parameters
Parameter Description
fw sam
Description
Manages the Suspicious Activity Monitoring (SAM) rules. You can use the SAM rules to block
connections to and from IP addresses without the need to change or reinstall the Security
Policy. For more information, see sk112061.
You can create the Suspicious Activity Rules in two ways:
n In SmartConsole from Monitoring Results
n In CLI with the fw sam command
Notes:
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Monitoring (SAM) Rules. See sk79700.
n See the "fw sam_policy" and "sam_alert" commands.
n SAM rules consume some CPU resources on Security Gateway.
Best Practice - The SAM Policy rules consume some CPU resources on
Security Gateway. Set an expiration for rules that gives you time to
investigate, but does not affect performance. Keep only the required SAM
Policy rules. If you confirm that an activity is risky, edit the Security Policy,
educate users, or otherwise handle the risk.
n Logs for enforced SAM rules (configured with the fw sam command) are stored
in the $FWDIR/log/sam.dat file.
By design, the file is purged when the number of stored entries reaches
100,000.
This data log file contains the records in one of these formats:
<type>,<actions>,<expire>,<ipaddr>
<type>,<actions>,<expire>,<src>,<dst>,<dport>,<ip_p>
n SAM Requests are stored on the Security Gateway in the kernel table sam_
requests.
n IP Addresses that are blocked by SAM rules, are stored on the Security
Gateway in the kernel table sam_blocked_ips.
Syntax
n To add or cancel a SAM rule according to criteria:
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM
Server>] [-f <Security Gateway>] [-t <Timeout>] [-l <Log
Type>] [-C] [-e <key=val>]+ [-r] -{n|i|I|j|J} <Criteria>
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM
Server>] [-f <Security Gateway>] -D
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM
Server>] [-f <Security Gateway>] [-r] -M -{i|j|n|b|q} all
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM
Server>] [-f <Security Gateway>] [-r] -M -{i|j|n|b|q}
<Criteria>
Parameters
Parameter Description
-s <SAM Specifies the IP address (in the X.X.X.X format) or resolvable HostName of
Server> the Security Gateway that enforces the command.
The default is localhost.
Parameter Description
-S <SIC Specifies the SIC name for the SAM server to be contacted. It is expected
Name of that the SAM server has this SIC name, otherwise the connection fails.
SAM Notes:
Server>
n If you do not explicitly specify the SIC name, the connection
continues without SIC names comparison.
n For more information about enabling SIC, refer to the OPSEC
API Specification.
n On VSX Gateway, run the fw vsx showncs -vs <VSID> command
to show the SIC name for the applicable Virtual System.
Notes:
n You can use this syntax only on Security Management Server or
Domain Management Server.
n VSX Gateways and VSX Cluster Members do not support
Suspicious Activity Monitoring (SAM) Rules. See sk79700.
-D Cancels all inhibit ("-i", "-j", "-I", "-J") and notify ("-n") parameters.
Notes:
n To "uninhibit" the inhibited connections, run the fw sam
command with the "-C" or "-D" parameters.
n It is also possible to use this command for active SAM requests.
Parameter Description
-t Specifies the time period (in seconds), during which the action is enforced.
<Timeout> The default is forever, or until you cancel the fw sam command.
-e Specifies rule information based on the keys and the provided values.
<key=val>+ Multiple keys are separated by the plus sign (+).
Available keys are (each is limited to 100 characters):
n name - Security rule name
n comment - Security rule comment
n originator - Security rule originator's username
Parameter Description
-J Inhibits new connections with the specified parameters, and closes all
existing connections with the specified parameters.
Notes:
n Matching connections are dropped.
n Each inhibited connection is logged according to the log type.
-M Monitors the active SAM requests with the specified actions and criteria.
all Gets all active SAM requests. This is used for monitoring purposes only.
Parameter Description
Parameter Description
Parameter Description
srv <Src IP> <Dest IP> Matches the specific Source IP address,
<Port> <Protocol> Destination IP address, Service (port number) and
Protocol.
subsrvs <Src IP> <Src Matches the specific Source IP address, source
Netmask> <Dest IP> <Port> netmask, destination netmask, Service (port
<Protocol> number) and Protocol.
subsrvd <Src IP> <Dest IP> Matches specific Source IP address, Destination
<Dest Netmask> <Port> IP, destination netmask, Service (port number) and
<Protocol> Protocol.
Parameter Description
fw sam_policy
Description
Manages the Suspicious Activity Policy editor that works with these types of rules:
n Suspicious Activity Monitoring (SAM) rules.
See sk112061: How to create and view Suspicious Activity Monitoring (SAM) Rules.
n Rate Limiting rules.
See sk112454: How to configure Rate Limiting rules for DoS Mitigation.
Also, see these commands:
n "fw sam" on page 271
n "sam_alert" on page 376
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy
add <options>
batch
del <options>
get <options>
fw [-d] samp
add <options>
batch
del <options>
get <options>
Parameters
Parameter Description
del <options> Deletes one configured Rate Limiting rule one at a time.
See "fw sam_policy del" on page 297.
fw sam_policy add
Description
The "fw sam_policy add" and "fw6 sam_policy add" commands:
n Add one Suspicious Activity Monitoring (SAM) rule at a time.
n Add one Rate Limiting rule at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>]
[-f <Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] ip <IP Filter Arguments>
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>]
[-f <Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] quota <Quota Filter Arguments
Parameters
Parameter Description
-u Optional.
Specifies that the rule category is User-defined.
Default rule category is Auto.
-a {d | n | Mandatory.
b} Specifies the rule action if the traffic matches the rule conditions:
n d - Drop the connection.
n n - Notify (generate a log) about the connection and let it through.
n b - Bypass the connection - let it through without checking it against
the policy rules.
Note - Rules with action set to Bypass cannot have a log or limit
specification. Bypassed packets and connections do not count
towards overall number of packets and connection for limit
enforcement of type ratio.
-l {r | a} Optional.
Specifies which type of log to generate for this rule for all traffic that
matches:
n -r - Generate a regular log
n -a - Generate an alert log
Parameter Description
-t Optional.
<Timeout> Specifies the time period (in seconds), during which the rule will be
enforced.
Default timeout is indefinite.
-f <Target> Optional.
Specifies the target Security Gateways, on which to enforce the Rate
Limiting rule.
<Target> can be one of these:
n all - This is the default option. Specifies that the rule should be
enforced on all managed Security Gateways.
n Name of the Security Gateway or Cluster object - Specifies that the
rule should be enforced only on this Security Gateway or Cluster
object (the object name must be as defined in the SmartConsole).
n Name of the Group object - Specifies that the rule should be
enforced on all Security Gateways that are members of this Group
object (the object name must be as defined in the SmartConsole).
-n "<Rule Optional.
Name>" Specifies the name (label) for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must
write a backslash (\) character. Example:
"This\ is\ a\ rule\ name\ with\ a\ backslash\
\\"
-c "<Rule Optional.
Comment>" Specifies the comment for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must
write a backslash (\) character. Example:
"This\ is\ a\ comment\ with\ a\ backslash\ \\"
Parameter Description
-o "<Rule Optional.
Originator Specifies the name of the originator for this rule.
>" Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must
write a backslash (\) character. Example:
"Created\ by\ John\ Doe"
-z "<Zone>" Optional.
Specifies the name of the Security Zone for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
Parameter Description
Important:
n The Quota rules are not applied immediately to the Security
Gateway. They are only registered in the Suspicious Activity
Monitoring (SAM) policy database. To apply all the rules from
the SAM policy database immediately, add "flush true" in
the fw samp add command syntax.
n Explanation:
For new connections rate (and for any rate limiting in general),
when a rule's limit is violated, the Security Gateway also drops
all packets that match the rule.
The Security Gateway computes new connection rates on a
per-second basis.
At the start of the 1-second timer, the Security Gateway allows
all packets, including packets for existing connections.
If, at some point, during that 1 second period, there are too
many new connections, then the Security Gateway blocks all
remaining packets for the remainder of that 1-second interval.
At the start of the next 1-second interval, the counters are
reset, and the process starts over - the Security Gateway
allows packets to pass again up to the point, where the rule’s
limit is violated.
Explanation for the IP Filter Arguments syntax for Suspicious Activity Monitoring (SAM)
rules
Argument Description
-m <Source Mask> Specifies the Source subnet mask (in dotted decimal format -
x.y.z.w).
-M <Destination Specifies the Destination subnet mask (in dotted decimal format -
Mask> x.y.z.w).
-p <Port> Specifies the port number (see IANA Service Name and Port
Number Registry).
Explanation for the Quota Filter Arguments syntax for Rate Limiting rules
Argument Description
flush true Specifies to compile and load the quota rule to the
SecureXL immediately.
(xxxx:yyyy:...:zzzz)
n cidr:<IP Address>/<Prefix>
The rule is applied to packets sent from:
l IPv4 address with Prefix from 0 to 32
n cc:<Country Code>
The rule matches the country code to the
source IP addresses assigned to this
country, based on the Geo IP database.
The two-letter codes are defined in ISO
3166-1 alpha-2.
n asn:<Autonomous System Number>
The rule matches the AS number of the
organization to the source IP addresses that
are assigned to this organization, based on
the Geo IP database.
The valid syntax is ASnnnn, where nnnn is a
number unique to the specific organization.
Notes:
n Default is: source-negated false
n The source-negated true processes all
source types, except the specified type.
Argument Description
(xxxx:yyyy:...:zzzz)
n cidr:<IP Address>/<Prefix>
The rule is applied to packets sent to:
l IPv4 address with Prefix from 0 to 32
n cc:<Country Code>
The rule matches the country code to the
destination IP addresses assigned to this
country, based on the Geo IP database.
The two-letter codes are defined in ISO
3166-1 alpha-2.
n asn:<Autonomous System Number>
The rule matches the AS number of the
organization to the destination IP addresses
that are assigned to this organization, based
on the Geo IP database.
The valid syntax is ASnnnn, where nnnn is a
number unique to the specific organization.
Notes:
n Default is: destination-negated false
n The destination-negated true will
process all destination types except the
specified type
Argument Description
Argument Description
Argument Description
Examples
Example 1 - Rate Limiting rule with a range
fw sam_policy add -a d -l r -t 3600 quota service any source range:172.16.7.11-172.16.7.13 new-conn-rate 5 flush true
Explanations:
n This rule drops packets for all connections (-a d) that exceed the quota set by this
rule, including packets for existing connections.
n This rule logs packets (-l r) that exceed the quota set by this rule.
n This rule will expire in 3600 seconds (-t 3600).
n This rule limits the rate of creation of new connections to 5 connections per second
(new-conn-rate 5) for any traffic (service any) from the source IP addresses in
the range 172.16.7.11 - 172.16.7.13 (source range:172.16.7.11-
172.16.7.13).
Note - The limit of the total number of log entries per second is configured with the
fwaccel dos config set -n <rate> command.
n This rule will be compiled and loaded on the SecureXL, together with other rules in the
Suspicious Activity Monitoring (SAM) policy database immediately, because this rule
includes the "flush true" parameter.
Explanations:
n This rule logs and lets through all packets (-a n) that exceed the quota set by this
rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to all packets except (service-negated true) the packets with
IP protocol number 1, 50-51, 6 port 443 and 17 port 53 (service 1,50-
51,6/443,17/53).
n This rule applies to all packets from source IP addresses that are assigned to the
country with specified country code (cc:QQ).
n This rule does not let any traffic through (byte-rate 0) except the packets with IP
protocol number 1, 50-51, 6 port 443 and 17 port 53.
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to packets from the Autonomous System number 64500
(asn:AS64500).
n This rule applies to packets from source IPv6 addresses FFFF:C0A8:1100/120
(cidr:[::FFFF:C0A8:1100]/120).
n This rule applies to all traffic (service any).
n This rule does not let any traffic through (pkt-rate 0).
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
Explanations:
n This rule bypasses (-a b) all packets that match this rule.
Note - The Access Control Policy and other types of security policy rules still apply.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to packets from the source IP addresses in the range 172.16.8.17 -
172.16.9.121 (range:172.16.8.17-172.16.9.121).
n This rule applies to packets sent to TCP port 80 (service 6/80).
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not log any packets (the -l r parameter is not specified).
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to all traffic (service any).
n This rule applies to all sources except (source-negated true) the source IP
addresses that are assigned to the country with specified country code (cc:QQ).
n This rule limits the maximal number of concurrent active connections to
655/65536=~1% (concurrent-conns-ratio 655) for any traffic (service any)
except (service-negated true) the connections from the source IP addresses
that are assigned to the country with specified country code (cc:QQ).
n This rule counts connections, packets, and bytes for traffic only from sources that
match this rule, and not cumulatively for this rule.
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
fw sam_policy batch
Description
The "fw sam_policy batch" and "fw6 sam_policy batch" commands:
n Add and delete many Suspicious Activity Monitoring (SAM) rules at a time.
n Add and delete many Rate Limiting rules at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Procedure
1. Start the batch mode
add -a d -l r -t 3600 -c "Limit\ conn\ rate\ to\ 5\ conn/sec from\ these\ sources" quota service
any source range:172.16.7.13-172.16.7.13 new-conn-rate 5
del <501f6ef0,00000000,cb38a8c0,0a0afffe>
EOF
[Expert@HostName]#
fw sam_policy del
Description
The "fw sam_policy del" and "fw6 sam_policy del" commands:
n Delete one configured Suspicious Activity Monitoring (SAM) rule at a time.
n Delete one configured Rate Limiting rule at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Parameters
Parameter Description
'<Rule UID>' Specifies the UID of the rule you wish to delete.
Important:
n The quote marks and angle brackets
('<...>') are mandatory.
n To see the Rule UID, run the "fw
sam_policy get" command.
Procedure
1. List all the existing rules in the Suspicious Activity Monitoring policy database
List all the existing rules in the Suspicious Activity Monitoring policy database.
n For IPv4, run:
fw sam_policy get
operation=add uid=<5ac3965f,00000000,3403a8c0,0000264a>
target=all timeout=300 action=notify log=log name=Test\ Rule
comment=Notify\ about\ traffic\ from\ 1.1.1.1
originator=John\ Doe src_ip_addr=1.1.1.1 req_tpe=ip
Explanation:
The "fw samp del" and "fw6 samp del" commands only remove a rule from the
persistent database. The Security Gateway continues to enforce the deleted rule until
the next time you compiled and load a policy. To force the rule deletion immediately,
you must enter a flush-only rule right after the "fw samp del" and "fw6 samp del"
command. This flush-only rule immediately deletes the rule you specified in the
previous step, and times out in 2 seconds.
Best Practice - Specify a short timeout period for the flush-only rules. This
prevents accumulation of rules that are obsolete in the database.
fw sam_policy get
Description
The "fw sam_policy get" and "fw6 sam_policy get" commands:
n Show all the configured Suspicious Activity Monitoring (SAM) rules.
n Show all the configured Rate Limiting rules.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw6 [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t
<Type> [+{-v '<Value>'}] [-n]]
Parameters
Note - All these parameters are optional.
Parameter Description
-u '<Rule Prints the rule specified by its Rule UID or its zero-based rule index.
UID>' The quote marks and angle brackets ('<...>') are mandatory.
Examples
Example 1 - Output in the default format
[Expert@HostName:0]# fw samp get
uid
<5ac3965f,00000000,3403a8c0,0000264a>
target
all
timeout
2147483647
action
notify
log
log
name
Test\ Rule
comment
Notify\ about\ traffic\ from\ 1.1.1.1
originator
John\ Doe
src_ip_addr
1.1.1.1
req_type
ip
fwm
Description
Performs various management operations and shows various management information.
Notes:
n For debug instructions, see the description of the fwm process in sk97638.
n On a Multi-Domain Server, you must run these commands in the context of the
applicable Domain Management Server.
Syntax
fwm [-d]
dbload <options>
exportcert <options>
fetchfile <options>
fingerprint <options>
getpcap <options>
ikecrypt <options>
load [<options>]
logexport <options>
mds <options>
printcert <options>
sic_reset
snmp_trap <options>
unload [<options>]
ver [<options>]
verify <options>
Parameters
Parameter Description
Parameter Description
dbload Downloads the user database and network objects information to the
<options> specified targets
See "fwm dbload" on page 309.
fetchfile Fetches a specified OPSEC configuration file from the specified source
<options> computer.
See "fwm fetchfile" on page 311.
getpcap Fetches the IPS packet capture data from the specified Security
<options> Gateway.
See "fwm getpcap" on page 315.
unload Unloads the policy from the specified managed Security Gateways.
<options> See "fwm unload" on page 336.
Parameter Description
ver <options> Shows the Check Point version of the Management Server.
See "fwm ver" on page 340.
fwm dbload
Description
Copies the user database and network objects information to specified managed servers with
one or more Management Software Blades enabled.
fwm exportcert
Description
Export a SIC certificate of the specified managed object to a file.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
fwm [-d] exportcert -obj <Name of Object> -cert <Name of CA> -file
<Output File> [-withroot] [-pem]
Parameters
Parameter Description
<Name of Specifies the name of the managed object, whose certificate you wish
Object> to export.
<Name of CA> Specifies the name of Certificate Authority, whose certificate you wish
to export.
fwm fetchfile
Description
Fetches a specified OPSEC configuration file from the specified source computer.
This command supports only the fwopsec.conf or fwopsec.v4x files.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
<Source> Specifies the managed remote source computer, from which to fetch
the file.
Note - The local and the remote source computers must have
established SIC trust.
Example
fwm fingerprint
Description
Shows the Check Point fingerprint.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
fwm getpcap
Description
Fetches the IPS packet capture data from the specified Security Gateway.
This command only works with IPS packet captures stored on the Security Gateway in the
$FWDIR/log/captures_repository/ directory.
This command does not work with other Software Blades, such as Anti-Bot and Anti-Virus that
store packet captures in the $FWDIR/log/blob/ directory on the Security Gateway.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-p <Local Specifies the local path to save the specified packet capture file.
Path> If you do not specify the local directory explicitly, the command saves the
packet capture file in the current working directory.
Example
fwm ikecrypt
Description
Encrypts the password of an Endpoint VPN Client user using IKE. The resulting string must
then be stored in the LDAP database.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
<Key> Specifies the IKE Key as defined in the LDAP Account Unit properties
window on the Encryption tab.
<Password> Specifies the password for the Endpoint VPN Client user.
Example
fwm load
Description
Loads a policy on a managed Security Gateway.
fwm logexport
Description
Exports a Security log file ($FWDIR/log/*.log) or Audit log file ($FWDIR/log/*.adtlog)
to an ASCII file.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
fwm logexport -h
fwm [-d] logexport [{-d <Delimiter> | -s}] [-t <Table Delimiter>]
[-i <Input File>] [-o <Output File>] [{-f | -e}] [-x <Start Entry
Number>] [-y <End Entry Number>] [-z] [-n] [-p] [-a] [-u
<Unification Scheme File>] [-m {initial | semi | raw}]
Parameters
Parameter Description
Parameter Description
-f After reaching the end of the currently opened log file, specifies to
continue to monitor the log file indefinitely and export the new entries as
well.
Note - Applies only to the active log file: $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-e After reaching the end of the currently opened log file, continue to
monitor the log file indefinitely and export the new entries as well.
Note - Applies only to the active log file: $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-x <Start Starts exporting the log entries from the specified log entry number and
Entry below, counting from the beginning of the log file.
Number>
-y <End Starts exporting the log entries until the specified log entry number,
Entry counting from the beginning of the log file.
Number>
Parameter Description
-p Specifies to not to perform resolution of the port numbers in the log file
(this is the default behavior).
This significantly speeds up the log processing.
-u Specifies the path and name of the log unification scheme file.
<Unification The default log unification scheme file is:
Scheme File> $FWDIR/conf/log_unification_scheme.C
Step Instructions
3 To include or exclude the log fields from the output, add these lines in the
configuration file:
[Fields_Info]
included_fields = field1,field2,field3,<REST_OF_
FIELDS>,field100
excluded_fields = field10,field11
Where:
n You can specify only the included_fields parameter, only the
excluded_fields parameter, or both.
n The num field must always appear first. You cannot manipulate this field.
n The <REST_OF_FIELDS> is an optional reserved token that refers to a list of
fields.
l If you specify the "-f" parameter, then the <REST_OF_FIELDS> is
fwm mds
Description
n Shows the Check Point version of the Multi-Domain Server.
n Rebuilds status tree for Global VPN Communities.
Syntax
Parameters
Parameter Description
Example
fwm printcert
Description
Shows a SIC certificate's details.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Item Description
-obj <Name of Object> Specifies the name of the managed object, for which to
show the SIC certificate information.
Examples
Example 1 - Showing the SIC certificate of a Management Server
[Expert@MGMT:0]# fwm printcert -ca internal_ca
Subject: O=MGMT.checkpoint.com.s6t98x
Issuer: O=MGMT.checkpoint.com.s6t98x
Not Valid Before: Sun Apr 8 13:41:00 2018 Local Time
Not Valid After: Fri Jan 1 05:14:07 2038 Local Time
Serial No.: 1
Public Key: RSA (2048 bits)
Signature: RSA with SHA256
Key Usage:
digitalSignature
keyCertSign
cRLSign
Basic Constraint:
is CA
MD5 Fingerprint:
7B:F9:7B:4C:BD:40:B9:1C:AB:2C:AE:CF:66:2E:E7:06
SHA-1 Fingerprints:
1. A6:43:3A:2B:1A:04:7F:A6:36:A6:2C:78:BF:22:D9:BC:F7:7E:4D:73
2. KEYS HEM GERM PIT ABUT ROVE RAW PA IQ FAWN NUT SLAM
[Expert@MGMT:0]#
defaultCert:
Host Certificate (level 0):
Subject: CN=CXL_192.168.3.244 VPN Certificate,O=MGMT.checkpoint.com.s6t98x
Issuer: O=MGMT.checkpoint.com.s6t98x
Not Valid Before: Sun Jun 3 19:58:19 2018 Local Time
Not Valid After: Sat Jun 3 19:58:19 2023 Local Time
Serial No.: 85021
Public Key: RSA (2048 bits)
Signature: RSA with SHA256
Subject Alternate Names:
IP Address: 192.168.3.244
CRL distribution points:
http://192.168.3.240:18264/ICA_CRL2.crl
CN=ICA_CRL2,O=MGMT.checkpoint.com.s6t98x
Key Usage:
digitalSignature
keyEncipherment
Basic Constraint:
not CA
MD5 Fingerprint:
B1:15:C7:A8:2A:EE:D1:75:92:9F:C7:B4:B9:BE:42:1B
SHA-1 Fingerprints:
1. BC:7A:D9:E2:CD:29:D1:9E:F0:39:5A:CD:7E:A9:0B:F9:6A:A7:2B:85
2. MIRE SANK DUSK HOOD HURD RIDE TROY QUAD LOVE WOOD GRIT WITH
*****
[Expert@MGMT:0]#
Example 4 - Showing the SIC certificate of a managed Cluster object in verbose mode
[Expert@MGMT:0]# fwm printcert -obj CXL_192.168.3.244 -verbose
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] fwa_db_init: called
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] fwa_db_init: closing existing database
[FWM 24665 4023814048]@MGMT[12 Jun 20:26:45] do_links_getver: strncmp failed. Returning -2
defaultCert:
fwm sic_reset
Description
Resets SIC on the Management Server.
For detailed procedure, see sk65764: How to reset SIC.
Warning:
n Before you run this command, take a Gaia Snapshot and a full backup of the
Management Server.
This command resets SIC between the Management Server and all its
managed objects.
n This operation breaks trust in all Internal CA certificates and SIC trust across
the managed environment.
Therefore, we do not recommend it at all, except for real disaster recovery.
Note
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
fwm snmp_trap
Description
Sends an SNMPv1 Trap to the specified host.
Notes:
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n On a Multi-Domain Server, the SNMP Trap packet is sent from the IP address of
the Leading Interface.
Syntax
fwm [-d] snmp_trap [-v <SNMP OID>] [-g <Generic Trap Number>] [-s
<Specific Trap Number>] [-p <Source Port>] [-c <SNMP Community>]
<Target> ["<Message>"]
Parameters
Parameter Description
-v <SNMP OID> Specifies an optional SNMP OID to bind with the message.
-p <Source Port> Specifies the source port, from which to send the SNMP Trap
packets.
<Target> Specifies the managed target host, to which to send the SNMP
Trap packets.
Enter an IP address of a resolvable hostname.
Example - Sending an SNMP Trap from a Management Server and capturing the traffic on
the Security Gateway
fwm unload
Description
Unloads the policy from the specified managed Security Gateways or Cluster Members.
Warning:
1. The fwm unload command prevents all traffic from passing through the
Security Gateway (Cluster Member), because it disables the IP Forwarding in
the Linux kernel on the specified Security Gateway (Cluster Member).
2. The fwm unload command removes all policies from the specified Security
Gateway (Cluster Member).
This means that the Security Gateway (Cluster Member) accepts all incoming
connections destined to all active interfaces without any filtering or protection
enabled.
Notes:
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
n If it is necessary to remove the current policy, but keep the Security Gateway
(Cluster Member) protected, then run the "comp_init_policy" on page 913
command on the Security Gateway (Cluster Member).
n To load the policies on the Security Gateway (Cluster Member), run one of
these commands on the Security Gateway (Cluster Member), or reboot:
l "fw fetch" on page 1048
Syntax
Parameters
Parameter Description
<GW1> <GW2> Specifies the managed Security Gateways by their main IP address or
... <GWN> Object Name as configured in SmartConsole.
Example
[Expert@MGMT:0]#
fwm ver
Description
Shows the Check Point version of the Security Management Server.
Syntax
Parameters
Parameter Description
-f <Output Specifies the name of the output file, in which to save this information.
File>
Example
fwm verify
Important - This command is obsolete for R80 and higher. Use the "mgmt_cli" on
page 362 command to verify a policy on a managed Security Gateway.
Description
Verifies the specified policy package without installing it.
Note
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
Example
inet_alert
Description
Notifies an Internet Service Provider (ISP) when a company's corporate network is under
attack. This command forwards log messages generated by the alert daemon on your Check
Point Security Gateway to an external Management Station. This external Management
Station is usually located at the ISP site. The ISP can then analyze the alert and react
accordingly.
This command uses the Event Logging API (ELA) protocol to send the alerts. The
Management Station receiving the alert must be running the ELA Proxy.
If communication with the ELA Proxy is to be authenticated or encrypted, a key exchange must
be performed between the external Management Station running the ELA Proxy at the ISP site
and the Check Point Security Gateway generating the alert.
Procedure
Step Instructions
3 Click on the [+] near the Log and Alert and click Alerts.
5 Select the next option Run UserDefined script under the above.
6 Enter the applicable inet_alert syntax (see the Syntax section below).
7 Click OK.
Syntax
inet_alert -s <IP Address> [-o] [-a <Auth Type>] [-p <Port>] [-f
<Token> <Value>] [-m <Alert Type>]
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Parameters
Parameter Description
-s <IP The IPv4 address of the ELA Proxy (usually located at the ISP site).
Address>
-p <Port> Specifies the port number on the ELA proxy. Default port is 18187.
Parameter Description
Exist Status
Example
inet_alert -s 10.0.2.4 -a clear -f product cads -m alert
ldapcmd
Description
This is an LDAP utility that controls these features:
Feature Description
Cache LDAP cache operations, such as emptying the cache, as well as providing
debug information.
Syntax
Parameters
Parameter Description
-d <Debug Runs the command in debug mode with the specified TDERROR
Level> debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).
objects
l TemplateExtGrpCacheObject - Clears cache for
objects
l TemplateExtGrpCacheObject - Traces cache for
ldapcompare
Description
This is an LDAP utility that performs compare queries and prints a message whether the result
returned a match or not.
This utility opens a connection to an LDAP directory server, binds, and performs the
comparison specified on the command line or from a specified file.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-d <Debug Runs the command in debug mode with the specified TDERROR
Level> debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).
Compare options
Option Description
-P <LDAP Protocol Version> Specifies the LDAP protocol version. Default version
is 3.
Common options
Option Description
Option Description
l "chainingRequired"
l "referralsPreferred"
l "referralsRequired"
n [!]manageDSAit
RFC 3296
n [!]noop
n ppolicy
n [!]postread[=<Attributes>]
RFC 4527; a comma-separated list of attributes
n [!]preread[=<Attributes>]
RFC 4527; a comma-separated list of attributes
n [!]relax
n abandon
SIGINT sends the abandon signal; if critical,
does not wait for SIGINT. Not really controls.
n cancel
SIGINT sends the cancel signal; if critical, does
not wait for SIGINT. Not really controls.
n ignore
SIGINT ignores the response; if critical, does not
wait for SIGINT. Not really controls.
Option Description
-p <LDAP Server Port> Specifies the LDAP Server port. Default is 389.
-w <LDAP Admin Password> Specifies the LDAP Server administrator password (for
simple authentication).
ldapmemberconvert
Description
This is an LDAP utility that ports from the "Member" attribute values in LDAP group entries to
the "MemberOf" attribute values in LDAP member (User or Template) entries.
This utility converts the LDAP server data to work in either the "MemberOf" mode, or "Both"
mode. The utility searches through all specified group or template entries that hold one or
more "Member" attribute values and modifies each value. The utility searches through all
specified group/template entries and fetches their "Member" attribute values.
Each value is the DN of a member entry. The entry identified by this DN is added to the
"MemberOf" attribute value of the group/template DN at hand. In addition, the utility delete
those "Member" attribute values from the group/template, unless you run the command in the
"Both" mode.
When your run the command, it creates a log file ldapmemberconvert.log in the current
working directory. The command logs all modifications done and errors encountered in that log
file.
Important - Back up the LDAP server database before you run this conversion utility.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified TDERROR
debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).
-m <Member Specifies the LDAP attribute name when fetching and (possibly)
Attribute Name> deleting a group Member attribute value.
-f <File> Specifies the file that contains a list of Group DNs separated by a
new line:
<Group DN 1>
<Group DN 2>
...
<Group DN N>
Length of each line is limited to 256 characters.
Parameter Description
-L <LDAP Server Specifies the Server side time limit for LDAP operations, in
Timeout> seconds.
Default is "never".
-S <Size> Specifies the Server side size limit for LDAP operations, in
number of entries.
Default is "none".
-T <LDAP Client Specifies the Client side timeout for LDAP operations, in
Timeout> milliseconds.
Default is "never".
Notes
There are two "GroupMembership" modes. You must keep these modes consistent:
n template-to-groups
n user-to-groups
For example, if you apply conversion on LDAP users to include the "MemberOf" attributes for
their groups, then this conversion has to be applied on LDAP defined templates for their
groups.
Troubleshooting
Symptom:
A command fails with an error message stating the connection stopped unexpectedly when
you run it with the parameter -M <Number of Updates>.
Root Cause:
The LDAP server could not handle that many LDAP requests simultaneously and closed the
connection.
Solution:
Run the command again with a lower value for the "-M" parameter. The default value should
be adequate, but can also cause a connection failure in extreme situations. Continue to reduce
the value until the command runs normally. Each time you run the command with the same set
of groups, the command continues from where it left off.
Examples
Example 1
...
cn=cpGroup
uniquemember="cn=member1,ou=people,ou=cp,c=us"
uniquemember="cn=member2,ou=people,ou=cp,c=us"
...
...
cn=member1
objectclass=fw1Person
...
and:
...
cn=member2
objectclass=fw1Person
...
Run:
[Expert@MGMT:0]# ldapconvert -g cn=cpGroup,ou=groups,ou=cp,c=us -h MyLdapServer -d cn=admin -w secret -m uniquemember -o memberof -c
fw1Person
...
cn=cpGroup
...
...
cn=member1
objectclass=fw1Person
memberof="cn=cpGroup,ou=groups,ou=cp,c=us"
...
and:
...
cn=member2
objectclass=fw1Person
memberof="cn=cpGroup,ou=groups,ou=cp,c=us"
...
If you run the same command with the "-B" parameter, it produces the same result, but the
group entry is not modified.
Example 2
If there is another member attribute value for the same group entry:
uniquemember="cn=template1,ou=people, ou=cp,c=us"
cn=member1
objectclass=fw1Template
Then after running the same command, the template entry stays intact, because of the
parameter "-c fw1Person", but the object class of "template1" is "fw1Template".
ldapmodify
Description
This is an LDAP utility that imports users to an LDAP server. The input file must be in the LDIF
format.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
ldapmodify [-d <Debug Level>] [-h <LDAP Server>] [-p <LDAP Server
Port>] [-D <LDAP Admin DN>] [-w <LDAP Admin Password>] [-a] [-b]
[-c] [-F] [-k] [-n] [-r] [-v] [-T <LDAP Client Timeout>] [-Z] [ -f
<Input File> .ldif | < <Entry>]
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified TDERROR
debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).
Parameter Description
-T <LDAP Client Specifies the Client side timeout for LDAP operations, in
Timeout> milliseconds.
Default is "never".
ldapsearch
Description
This is an LDAP utility that queries an LDAP directory and returns the results.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
ldapsearch [-d <Debug Level>] [-h <LDAP Server>] [-p <LDAP Port>]
[-D <LDAP Admin DN>] [-w <LDAP Admin Password>] [-A] [-B] [-b
<Base DN>] [-F <Separator>] [-l <LDAP Server Timeout>] [-s
<Scope>] [-S <Sort Attribute>] [-t] [-T <LDAP Client Timeout>] [-
u] [-z <Number of Search Entries>] [-Z] <Filter> [<Attributes>]
Parameters
Parameter Description
-d <Debug Level> Runs the command in debug mode with the specified
TDERROR debug level.
Valid values are from 0 (disabled) to 5 (maximal level,
recommended).
Parameter Description
-b <Base DN> Specifies the Base Distinguished Name (DN) for search.
-l <LDAP Server Specifies the Server side time limit for LDAP operations, in
Timeout> seconds.
Default is "never".
-T <LDAP Client Specifies the Client side timeout for LDAP operations, in
Timeout> milliseconds.
Default is never.
Parameter Description
Example
[Expert@MGMT:0]# ldapsearch -p 18185 -b cn=omi objectclass=fw1host objectclass
mcd
Description
This command changes the current working directory to the specified directory in the $FWDIR
directory in the context of a Domain Management Server.
Syntax
Example
[Expert@MDS:0]# mdsstat
+-----------------------------------------------------------------------------------------------
------+
| Processes status checking
|
+------+--------------------+-----------------+-------------+-------------+-------------+-------
------+
| Type | Name | IP address | FWM | FWD | CPD | CPCA
|
+------+--------------------+-----------------+-------------+-------------+-------------+-------
------+
| MDS | - | 192.168.3.51 | up 15312 | up 15310 | up 10227 | up
15475 |
+------+--------------------+-----------------+-------------+-------------+-------------+-------
------+
| CMA | MyDomain_Server | 192.168.3.240 | up 17225 | up 17208 | up 17101 | up
18402 |
+------+--------------------+-----------------+-------------+-------------+-------------+-------
------+
| Total Domain Management Servers checked: 1 1 up 0 down
|
| Tip: Run mdsstat -h for legend
|
+-----------------------------------------------------------------------------------------------
------+
[Expert@MDS:0]#
[Expert@MDS:0]#
[Expert@MDS:0]# mdsenv MyDomain_Server
[Expert@MDS:0]#
[Expert@MDS:0]# mcd
changing to /opt/CPmds-R80.40/customers/MyDomain_Server/CPsuite-R80.40/fw1/
[Expert@MDS:0]#
[Expert@MDS:0]# pwd
/opt/CPmds-R80.40/customers/MyDomain_Server/CPsuite-R80.40/fw1
[Expert@MDS:0]#
[Expert@MDS:0]# ls -1
av
bin
conf
cpm-server
database
doc
hash
lib
libsw
log
scripts
state
tmp
[Expert@MDS:0]#
[Expert@MDS:0]# mcd av
changing to /opt/CPmds-R80.40/customers/MyDomain_Server/CPsuite-R80.40/fw1/av
[Expert@MDS:0]#
[Expert@MDS:0]# mcd bin
changing to /opt/CPmds-R80.40/customers/MyDomain_Server/CPsuite-R80.40/fw1/bin
[Expert@MDS:0]#
[Expert@MDS:0]# mcd conf
changing to /opt/CPmds-R80.40/customers/MyDomain_Server/CPsuite-R80.40/fw1/conf
[Expert@MDS:0]#
[Expert@MDS:0]# mcd log
changing to /opt/CPmds-R80.40/customers/MyDomain_Server/CPsuite-R80.40/fw1/log
[Expert@MDS:0]#
[Expert@MDS:0]# mcd scripts
changing to /opt/CPmds-R80.40/customers/MyDomain_Server/CPsuite-R80.40/fw1/scripts
[Expert@MDS:0]#
mds_backup
Description
The mds_backup command backs up binaries and data from a Multi-Domain Server to a user
specified working directory.
You then copy the backup files from the working directory to external storage.
This command requires Multi-Domain Superuser privileges.
The mds_backup command runs the gtar and dump commands to back up all databases.
The collected information is stored in one *.tar file. The file name is a combination of the
backup date and time and is saved in the current working directory. For example:
13Sep2015-141437.mdsbk.tar
Notes:
n Do not create or delete Domains or Domain Management Servers until the
backup operation completes.
n It is important not to run the mds_backup command from directories that are
not backed up.
For example, when you back up a Multi-Domain Server, do not run the mds_
backup command from the /opt/CPmds-<Current_Release>/ directory,
because it is a circular reference (backup of directory, in which it is necessary to
write files).
Run the mds_backup command from a location outside the product directory
tree to be backed up. This becomes the working directory.
n The mds_backup command does not collect the active Security log file
(*.log) and Audit log file (*.adtlog).
This is necessary to prevent inconsistencies during the read-write operations.
Best Practice - Perform a log switch before you start the backup
procedure.
n You can back up the Multi-Domain Server configuration without the log files.
This backup is typically significantly smaller than a full backup with logs.
To back up without log files, add this line to the file $MDSDIR/conf/mds_
exclude.dat configuration file:
log/*
n After the backup completes, copy the backup *.tar file, together with the mds_
restore, and gtar binary files, to your external backup location.
Syntax
mds_backup -h
mds_backup [-b] [-d <Target Directory>] [-g] [-i] [-l] [-L {all |
best}][-s] [-v]
Parameters
Parameter Description
-v "Dry run" - Shows all files to be backed up, but does not perform the
backup operation.
mds_restore
Description
Use the mds_restore command to restore a Multi-Domain Server / Multi-Domain Log Server
that was backed up with the "mds_backup" on page 711 command.
Important - You must restore on the server that runs same software version, from
which you collected this backup.
Example: If you collected a backup on a server with version "XX" and Jumbo Hotfix
Accumulator Take "YY", then you must restore on a server with version "XX" and
Jumbo Hotfix Accumulator Take "YY".
Best Practice - If the Multi-Domain Security Management environment has multiple
Multi-Domain Servers, restore all Multi-Domain Servers at the same time.
Backing up and restoring in Management High Availability environment:
n To back up and restore a consistent environment, make sure to collect and
restore the backups and snapshots from all servers in the High Availability
environment at the same time.
n Make sure other administrators do not make changes in SmartConsole until the
backup operation is completed.
For more information:
n About Gaia Backup and Gaia Snapshot, see the R80.40 Gaia Administration
Guide.
n About Virtual Machine Snapshots, see the vendor documentation.
./mds_restore <backup_file>
5. If you restore on a Multi-Domain Server with a new IP address, configure the new
IP address.
mdscmd
Description
In versions lower than R80, this utility executed various commands on the Multi-Domain
Server.
Starting from R80, this command is obsolete.
You must use other commands. If there is no alternative command, then perform the
applicable action in SmartConsole.
mdsconfig
Description
This command starts the Multi-Domain Server Configuration Program. This tool configures
specific settings for the installed Check Point products.
Note - This command updates the database schema before it imports. First, the
command runs pre-upgrade verification. If no errors are found, migration continues. If
there are errors, you must fix them on the source R7x Domain Management Server
according to instructions in the error messages. Then do this procedure again.
For the complete procedure, see the R80.40 Installation and Upgrade Guide.
Syntax
mdsconfig
Menu Options
Leading VIP Interfaces The Leading VIP Interfaces are real interfaces connected
to an external network.
These interfaces are used when you configure virtual IP
addresses for Domain Management Servers.
GUI Clients Configures the GUI clients that can use SmartConsole to
connect to this server.
Start Multi-Domain Server Configures a password to control the start of the Multi-
Password Domain Server.
IPv6 Support for Multi- Enables or disables the IPv6 Support on the Multi-Domain
Domain Server Server.
Important - R80.40 Multi-Domain Server does not
support IPv6 address configuration (Known Limitation
PMTR-14989).
IPv6 Support for Existing Enables or disables the IPv6 Support on the Domain
Domain Management Management Servers.
Servers Important - R80.40 Multi-Domain Server does not
support IPv6 address configuration (Known Limitation
PMTR-14989).
[Expert@MyMDS:0]# mdsconfig
Configuration Options:
----------------------
(1) Leading VIP Interfaces
(2) Licenses
(3) Random Pool
(4) Groups
(5) Certificate's Fingerprint
(6) Administrators
(7) GUI clients
(8) Automatic Start of Multi-Domain Server
(9) P1Shell
(10) Start Multi-Domain Server Password
(11) IPv6 Support for Multi-Domain Server
(12) IPv6 Support for Existing Domain Management Servers
(13) Exit
mdsenv
Description
Use the mdsenv command to set shell environment variables to run commands on a specified
Domain Management Server.
When run without an argument, the command sets the shell for Multi-Domain Server level
commands ("mdsstart" on page 725, "mdsstop" on page 732, and so on).
Syntax
Parameters
Parameter Description
Example
[Expert@MyMDS:0]# mdsstat
+-----------------------------------------------------------------
------------------------------------+
| Processes status checking
|
+------+--------------------+-----------------+-------------+-----
--------+-------------+-------------+
| Type | Name | IP address | FWM | FWD
| CPD | CPCA |
+------+--------------------+-----------------+-------------+-----
--------+-------------+-------------+
| MDS | - | 192.168.3.51 | up 10086 | up
11422 | up 5427 | up 11440 |
+------+--------------------+-----------------+-------------+-----
--------+-------------+-------------+
| CMA | MyDomain_Server | 192.168.3.240 | up 10891 | up
8199 | up 7670 | up 9536 |
+------+--------------------+-----------------+-------------+-----
--------+-------------+-------------+
| Total Domain Management Servers checked: 1 1 up 0 down
|
| Tip: Run mdsstat -h for legend
|
+-----------------------------------------------------------------
------------------------------------+
[Expert@MyMDS:0]#
[Expert@MyMDS:0]# mdsenv MyDomain_Server
[Expert@MyMDS:0]#
[Expert@MyMDS:0]# echo $FWDIR
/opt/CPmds-R80.40/customers/MyDomain_Server/CPsuite-R80.40/fw1
[Expert@MyMDS:0]#
mdsquerydb
Description
The mdsquerydb is an advanced database query tool that administrators can use to run shell
scripts to get information from the Multi-Domain Security Management databases.
Use this command to get information from the Multi-Domain Server, Domain Management
Server, and Global databases.
Syntax
Parameters
Parameter Description
-f <output_ Send the query results to the specified file name. If this parameter is not
file_name> specified, the data is sent to the standard output.
Example 2 - Send a list of Domains in the Multi-Domain Server database to the standard
output
[Expert@MDS:0]# mdsenv
[Expert@MDS:0]# mdsquerydb Domains
Example 3 - Send a list of network objects in the global database to the /tmp/gateways.txt
file
[Expert@MDS:0]# mdsenv
[Expert@MDS:0]# mdsquerydb NetworkObjects -f /tmp/gateways.txt
Example 4 - Get a list of gateway objects in the Domain Management Server "DServer1"
mdsstart
Description
Starts the Multi-Domain Server and all Domain Management Servers.
To start a specific Domain Management Server, see the "mdsstart_customer" on page 729
command.
Syntax
Parameters
Parameter Description
-m Optional: Starts only the Multi-Domain Server and not the Domain
Management Servers.
You can decrease the amount of time it takes to start the Multi-Domain Server when there are
many Domain Management Servers.
To do this, set the value of the environment variable NUM_EXEC_SIMUL to the number of
Domain Management Servers that start at the same time.
This procedure configures the specified value for the environment variable NUM_EXEC_
SIMUL in the current shell (does not survive reboot):
Step Instructions
4 Make sure the new value of the environment variable NUM_EXEC_SIMUL is set:
[Expert@MDS:0]# echo $NUM_EXEC_SIMUL
Output must show the configured value.
This procedure removes the configured value for the environment variable NUM_EXEC_
SIMUL in the current shell (does not survive reboot):
Parameter Description
This procedure configures the specified value for the environment variable NUM_EXEC_
SIMUL for all shells (survives reboot):
Step Instructions
Important - After this line, you must press Enter to add a new line.
Example:
export NUM_EXEC_SIMUL=5
7 Reboot.
8 Make sure the new value of the environment variable NUM_EXEC_SIMUL is set:
[Expert@MDS:0]# echo $NUM_EXEC_SIMUL
Output must show the configured value.
This procedure removes the configured value for the environment variable NUM_EXEC_
SIMUL for all shells (survives reboot):
Step Instructions
7 Reboot.
8 Make sure the new value of the environment variable NUM_EXEC_SIMUL is not
set:
[Expert@MDS:0]# echo $NUM_EXEC_SIMUL
Output must be empty.
mdsstart_customer
Description
Starts the specified Domain Management Server, if it was stopped with the "mdsstop_
customer" on page 736 command.
To start the entire Multi-Domain Server, see the "mdsstart" on page 725 command.
Syntax
mdsstat
Description
This command shows the status of specific processes on the Multi-Domain Server and
Domain Management Servers.
Syntax
Parameters
Parameter Description
Status Description
Example
[Expert@MDS:0]# mdsstat
+--------------------------------------------------------------------------------------+
| Processes status checking |
+-----+----------------+-----------------+------------+----------+----------+----------+
| Type| Name | IP address | FWM | FWD | CPD | CPCA |
+-----+----------------+-----------------+------------+----------+----------+----------+
| MDS | - | 192.168.3.101 | up 17284 | up 17266 | up 17251 | up 17753 |
+-----+----------------+-----------------+------------+----------+----------+----------+
| CMA |DOM211_Server | 192.168.3.211 | up 32227 | up 32212 | up 25725 | up 32482 |
| CMA |DOM212_Server | 192.168.3.212 | up 4248 | up 4184 | up 4094 | up 4441 |
+-----+----------------+-----------------+------------+----------+----------+----------+
| Total Domain Management Servers checked: 2 2 up 0 down |
| Tip: Run mdsstat -h for legend |
+--------------------------------------------------------------------------------------+
[Expert@MDS:0]#
mdsstop
Description
Stops the Multi-Domain Server and all Domain Management Servers.
To stop a specific Domain Management Server, see the "mdsstop_customer" on page 736
command.
Syntax
Parameters
Parameter Description
-m Optional: Stops only the Multi-Domain Server and not the Domain
Management Servers.
You can decrease the amount of time it takes to stop the Multi-Domain Server when there are
many Domain Management Servers.
To do this, set the value of the environment variable NUM_EXEC_SIMUL to the number of
Domain Management Servers that stop at the same time.
This procedure configures the specified value for the environment variable NUM_EXEC_
SIMUL in the current shell (does not survive reboot):
Step Instructions
4 Make sure the new value of the environment variable NUM_EXEC_SIMUL is set:
[Expert@MDS:0]# echo $NUM_EXEC_SIMUL
Output must show the configured value.
This procedure removes the configured value for the environment variable NUM_EXEC_
SIMUL in the current shell (does not survive reboot):
Parameter Description
This procedure configures the specified value for the environment variable NUM_EXEC_
SIMUL for all shells (survives reboot):
Step Instructions
Important - After this line, you must press Enter to add a new line.
Example:
export NUM_EXEC_SIMUL=5
7 Reboot.
8 Make sure the new value of the environment variable NUM_EXEC_SIMUL is set:
[Expert@MDS:0]# echo $NUM_EXEC_SIMUL
Output must show the configured value.
This procedure removes the configured value for the environment variable NUM_EXEC_
SIMUL for all shells (survives reboot):
Step Instructions
7 Reboot.
8 Make sure the new value of the environment variable NUM_EXEC_SIMUL is not
set:
[Expert@MDS:0]# echo $NUM_EXEC_SIMUL
Output must be empty.
mdsstop_customer
Description
Stops the specified Domain Management Server.
To stop the entire Multi-Domain Server, see the "mdsstop" on page 732 command.
Syntax
mgmt_cli
Description
The mgmt_cli tool works directly with the management database on your Management
Server.
cd /d "%ProgramFiles%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
mgmt_cli.exe <Command Name> <Command Parameters> <Optional
Switches>
cd /d "%ProgramFiles
(x86)%\CheckPoint\SmartConsole\<VERSION>\PROGRAM\"
mgmt_cli.exe <Command Name> <Command Parameters> <Optional
Switches>
Notes
n For a complete list of the mgmt_cli options, enter the mgmt_cli (mgmt_cli.exe)
command and press Enter.
n For more information, see the Check Point Management API Reference.
migrate
Important - This command is used to migrate the management database from R80.10
and lower versions.
For more information, see the R80.40 Installation and Upgrade Guide.
Description
Exports the management database and applicable Check Point configuration.
Imports the exported management database and applicable Check Point configuration.
Notes:
n You must run this command from the Expert mode.
n If it is necessary to back up the current management database, and you do not
plan to import it on a Management Server that runs a higher software version,
then you can use the built-in command in the $FWDIR/bin/upgrade_tools/
directory.
n If you plan to import the management database on a Management Server that
runs a higher software version, then you must use the migrate utility from the
migration tools package created specifically for that higher software version.
See the Installation and Upgrade Guide for that higher software version.
n If this command completes successfully, it creates this log file:
/var/log/opt/CPshrd-R80.40/migrate-<YYYY.MM.DD_
HH.MM.SS>.log
For example: /var/log/opt/CPshrd-R80.40/migrate-2019.06.14_11.03.46.log
n If this command fails, it creates this log file:
$CPDIR/log/migrate-<YYYY.MM.DD_HH.MM.SS>.log
For example: /opt/CPshrd-R80.40/log/migrate-2019.06.14_11.21.39.log
Syntax
n To see the built-in help:
[Expert@MGMT:0]# ./migrate -h
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# yes | nohup ./migrate export [-l | -x] [-n]
[--exclude-uepm-postgres-db] [--include-uepm-msi-files] /<Full
Path>/<Name of Exported File> &
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# yes | nohup ./migrate import [-l | -x] [-n]
[--exclude-uepm-postgres-db] [--include-uepm-msi-files] /<Full
Path>/<Name of Exported File>.tgz &
Parameters
Parameter Description
Parameter Description
-l Exports and imports the Check Point logs without log indexes in the
$FWDIR/log/ directory.
Important:
n The command can export only closed logs (to which the
information is not currently written).
n If you use this parameter, it can take the command a long
time to complete (depends on the number of logs).
-x Exports and imports the Check Point logs with their log indexes in the
$FWDIR/log/ directory.
Important:
n This parameter only supports Management Servers and
Log Servers R80.10 and higher.
n The command can export only closed logs (to which the
information is not currently written).
n If you use this parameter, it can take the command a long
time to complete (depends on the number of logs and
indexes).
-n Runs silently (non-interactive mode) and uses the default options for
each setting.
Important:
n If you export a management database in this mode and the
specified name of the exported file matches the name of an
existing file, the command overwrites the existing file
without prompting.
n If you import a management database in this mode, the
"migrate import" command runs the "cpstop"
command automatically.
--exclude- n During the export operation, does not back up the PostgreSQL
uepm- database from the Endpoint Security Management Server.
postgres-db n During the import operation, does not restore the PostgreSQL
database on the Endpoint Security Management Server.
--include- n During the export operation, backs up the MSI files from the
uepm-msi- Endpoint Security Management Server.
files n During the import operation, restores the MSI files on the
Endpoint Security Management Server.
Parameter Description
<Name of n During the export operation, specifies the name of the output
Exported file.
File> The command automatically adds the *.tgz extension.
n During the import operation, specifies the name of the exported
file.
You must manually enter the *.tgz extension in the end.
[Expert@MGMT:0]# cd $FWDIR/bin/upgrade_tools/
[Expert@MGMT:0]# ./migrate export /var/log/Migrate_Export
[Expert@MGMT:0]#
[Expert@MGMT:0]# find / -name migrate-\* -type f
/var/log/opt/CPshrd-R80.40/migrate-2019.06.14_11.03.46.log
[Expert@MGMT:0]#
migrate_server
Important - This command is used to migrate the management database from
R80.20.M1, R80.20, R80.20.M2, R80.30, and higher versions.
For more information, see:
n sk135172 - Upgrade Tools
n The R80.40 Installation and Upgrade Guide
Description
Exports the management database and applicable Check Point configuration.
Imports the exported management database and applicable Check Point configuration.
Notes:
n You must run this command from the Expert mode.
n If it is necessary to back up the current management database, and you do not
plan to import it on a Management Server that runs a higher software version,
then you can use the built-in command in the $FWDIR/scripts/ directory.
n If you plan to import the management database on a Management Server that
runs a higher software version, then you must use the migrate_server utility
from the migration tools package created specifically for that higher software
version. See the Installation and Upgrade Guide for that higher software
version.
n If this command completes successfully, it creates this log file:
/var/log/opt/CPshrd-R80.40/migrate-<YYYY.MM.DD_
HH.MM.SS>.log
For example: /var/log/opt/CPshrd-R80.40/migrate-2019.06.14_11.03.46.log
n If this command fails, it creates this log file:
$CPDIR/log/migrate-<YYYY.MM.DD_HH.MM.SS>.log
For example: /opt/CPshrd-R80.40/log/migrate-2020 - 2024.06.14_11.21.39.log
Syntax
n To see the built-in help:
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server -h
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server verify -v R80.40 [-skip_
upgrade_tools_check]
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server export -v R80.40 [-skip_
upgrade_tools_check] [-l | -x] [--include-uepm-msi-files] [--
exclude-uepm-postgres-db] [--ignore_warnings] /<Full
Path>/<Name of Exported File>
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server import -v R80.40 [-skip_
upgrade_tools_check] [-l | -x] [/var/log/mdss.json] [--
include-uepm-msi-files] [--exclude-uepm-postgres-db] /<Full
Path>/<Name of Exported File>.tgz
Parameters
Parameter Description
Parameter Description
-skip_ Does not try to connect to Check Point Cloud to check for a more recent
upgrade_ version of the Upgrade Tools.
tools_check Best Practice - Use this parameter on the Management Server that
is not connected to the Internet.
Parameter Description
-l Exports and imports the Check Point logs without log indexes in the
$FWDIR/log/ directory.
Important:
n The command can export only closed logs (to which the
information is not currently written).
n If you use this parameter, it can take the command a long time
to complete (depends on the number of logs).
-x Exports and imports the Check Point logs with their log indexes in the
$FWDIR/log/ directory.
Important:
n This parameter only supports Management Servers and Log
Servers R80.10 and higher.
n The command can export only closed logs (to which the
information is not currently written).
n If you use this parameter, it can take the command a long time
to complete (depends on the number of logs and indexes).
Parameter Description
/var/log/md Important:
ss.json
n In the Upgrade Tools for R80.40 build higher than 994000406,
the syntax is (this filename is mandatory):
Previously:
-change_ /var/log/mdss.json
ips_file You must create the file /var/log/mdss.json and not use the
/<Full parameter "-change_ips_file".
Path>/<Name n In the Upgrade Tools for R80.40 build 994000406 and lower,
of JSON
the syntax was:
File>.json
-change_ips_file /<Full Path>/<Name of JSON
File>.json
Specifies the absolute path to the special JSON configuration file with
new IPv4 addresses.
This file is mandatory during an upgrade of a Multi-Domain Security
Management environment.
Even if only one of the servers migrates to a new IP address, all the other
servers must get this configuration file for the import process.
Syntax:
[{"name":"<Name of Server 1 Object in
SmartConsole>","newIpAddress4":"<New IPv4 Address
of Server 1>"},
{"name":"<Name of Server 2 Object in
SmartConsole>","newIpAddress4":"<New IPv4 Address
of Server 2>"}]
Example:
[{"name":"MyPrimaryMultiDomainServer","newIpAddress
4":"172.30.40.51"},
{"name":"MySecondaryMultiDomainServer","newIpAddres
s4":"172.30.40.52"}]
--include- n During the export operation, backs up the MSI files from the
uepm-msi- Endpoint Security Management Server.
files n During the import operation, restores the MSI files on the Endpoint
Security Management Server.
--exclude- n During the export operation, does not back up the PostgreSQL
uepm- database from the Endpoint Security Management Server.
postgres-db n During the import operation, does not restore the PostgreSQL
database on the Endpoint Security Management Server.
Parameter Description
/<Full Specifies the absolute path to the exported database file. This path must
Path>/<Name exist.
of Exported
File>
n During the export operation, specifies the name of the output file.
The command automatically adds the *.tgz extension.
n During the import operation, specifies the name of the exported file.
You must manually enter the *.tgz extension in the end.
[Expert@MGMT:0]# cd $FWDIR/scripts/
[Expert@MGMT:0]# ./migrate_server export /var/log/Migrate_Export
[Expert@MGMT:0]#
[Expert@MGMT:0]# find / -name migrate-\* -type f
/var/log/opt/CPshrd-R80.40/migrate-2020 - 2024.06.14_11.03.46.log
[Expert@MGMT:0]#
migrate_global_policies
Description
This utility transfers (and upgrades, if necessary) the global configuration database from one
Multi-Domain Server to another Multi-Domain Server.
Notes:
n You can only use this command when the target Multi-Domain Server does not
have global configurations defined.
n This utility replaces all existing global configurations. Each existing global
configuration is saved with a *.pre_migrate extension.
n If you migrate only the global configurations (without the Domain Management
Servers) to a new Multi-Domain Server, disable all Security Gateways that are
enabled for global use.
Important - You cannot export an R80.X global configuration database and then use
this utility on an R80.X Multi-Domain Server.
Syntax
migrate_global_policies <Path>
Parameters
Parameter Description
<Path> The fully qualified path to the directory where the global policies files,
originally exported from the source Multi-Domain Server
($MDSDIR/conf/), are located.
Example
[email protected]_MDS:0]# migrate_global_policies /var/log/exported_global_db.22Jul2019-124547.tgz
queryDB_util
Description
Searches in the management database for objects or policy rules.
Important - This command is obsolete for R80 and higher. Use the "mgmt_cli" on
page 362 command to search in the management database for objects or policy rules
according to search parameters.
rs_db_tool
Description
Manages Dynamically Assigned IP address (DAIP) gateways in a DAIP database.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
n To add an entry to the DAIP database:
Note - You must run this command from the Expert mode.
Parameters
Parameter Description
-TTL <Time-To- Specifies the relative time interval (in seconds), during which the
Live> entry is valid.
sam_alert
Description
For SAM v1, this utility executes Suspicious Activity Monitoring (SAM) actions according to the
information received from the standard input.
For SAM v2, this utility executes Suspicious Activity Monitoring (SAM) actions with User
Defined Alerts mechanism.
Important:
n You must run this command on the Management Server.
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Notes:
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Monitoring (SAM) Rules. See sk79700.
n See the "fw sam" on page 271 and "fw sam_policy" on page 279 commands.
SAM v1 syntax
sam_alert [-v] [-o] [-s <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-C] {-n|-i|-I} {-src|-dst|-any|-srv}
Parameter Description
-o Specifies to print the input of this tool to the standard output (to use with
pipes in a CLI syntax).
-t <Time> Specifies the time (in seconds), during which to enforce the action. The
default is forever.
Parameter Description
SAM v2 syntax
sam_alert -v2 [-v] [-O] [-S <SAM Server>] [-t <Time>] [-f
<Security Gateway>] [-n <Name>] [-c "<Comment">] [-o
<Originator>] [-l {r | a}] -a {d | r| n | b | q | i} [-C] {-ip
|-eth} {-src|-dst|-any|-srv}
Parameter Description
-O Specifies to print the input of this tool to the standard output (to
use with pipes in a CLI syntax).
-t <Time> Specifies the time (in seconds), during which to enforce the
action. The default is forever.
Parameter Description
-l {r | a} Specifies the log type for connections that match the specified
criteria:
n r - Regular
n a - Alert
Default is None.
Example
See sk110873: How to configure Security Gateway to detect and prevent port scan.
stattest
Description
Check Point AMON client to query SNMP OIDs.
You can use this command as an alternative to the standard SNMP commands for debug
purposes - to make sure the applicable SNMP OIDs provide the requested information.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
n To query a Regular OID:
stattest get [-d] [-h <Host>] [-p <Port>] [-x <Proxy Server>] [-v <VSID>] [-t <Timeout>] <Regular_OID_1> <Regular_OID_2> ...
<Regular_OID_N>
Parameters
Parameter Description
Parameter Description
threshold_config
Description
You can configure a variety of different SNMP thresholds that generate SNMP traps, or alerts.
You can use these thresholds to monitor many system components automatically without
requesting information from each object or device.
You configure these SNMP Monitoring Thresholds only on the Security Management Server,
Multi-Domain Server, or Domain Management Server.
During policy installation, the managed a Security Gateway and Clusters receive and apply
these thresholds as part of their policy.
For more information, see sk90860: How to configure SNMP on Gaia OS.
Procedure
Step Instructions
Step Instructions
(1) Show policy Shows the name of the current configured threshold policy.
name
(2) Set policy Configures the name for the threshold policy.
name If you do not specify it explicitly, then the default name is "Default
Profile".
(3) Save policy Saves the changes in the current threshold policy.
(8) View Shows a list of all available thresholds and their current settings.
thresholds These include:
overview
n Name
n Category (see the next option "(9)")
n State (disabled or enabled)
n Threshold (threshold point, if applicable)
n Description
Thresholds Categories
Category Sub-Categories
Category Sub-Categories
Notes:
n If you run the threshold_config command locally on a Security Gateway or
Cluster Members to configure the SNMP Monitoring Thresholds, then each
policy installation erases these local SNMP threshold settings and reverts them
to the global SNMP threshold settings configured on the Management Server
that manages this Security Gateway or Cluster.
n On a Security Gateway and Cluster Members, you can save the local Threshold
Engine Configuration settings to a file and load it locally later.
n The Threshold Engine Configuration is stored in the
$FWDIR/conf/thresholds.conf file.
n In a Multi-Domain Security Management environment:
l You can configure the SNMP thresholds in the context of Multi-Domain
Server are for that Domain Management Server and its managed Security
Gateway and Clusters.
l If an SNMP threshold applies both to the Multi-Domain Server and a
$MDSVERUTIL
Description
This utility returns information about the Multi-Domain Server and Domain Management
Servers.
This utility is intended for internal use by Check Point scripts on the Multi-Domain Server.
You can use this utility to get some information about the Multi-Domain Server and Domain
Management Servers (for example, the names of all Domain Management Servers).
Syntax
$MDSVERUTIL help
$MDSVERUTIL
AllCMAs <options>
AllVersions
CMAAddonDir <options>
CMACompDir <options>
CMAFgDir <options>
CMAFw40Dir <options>
CMAFw41Dir <options>
CMAFwConfDir <options>
CMAFwDir <options>
CMAIp <options>
CMAIp6 <options>
CMALogExporterDir <options>
CMALogIndexerDir <options>
CMANameByFwDir <options>
CMANameByIp <options>
CMARegistryDir <options>
CMAReporterDir <options>
CMASmartLogDir <options>
CMASvnConfDir <options>
CMASvnDir <options>
ConfDirVersion <options>
CpdbUpParam <options>
CPprofileDir <options>
CPVer <options>
CustomersBaseDir <options>
DiskSpaceFactor <options>
InstallationLogDir <options>
IsIPv6Enabled
IsLegalVersion <options>
IsOsSupportsIPv6
LatestVersion
MDSAddonDir <options>
MDSCompDir <options>
MDSDir <options>
MDSFgDir <options>
MDSFwbcDir <options>
MDSFwDir <options>
MDSIp <options>
MDSIp6 <options>
MDSLogExporterDir <options>
MDSLogIndexerDir <options>
MDSPkgName <options>
MDSRegistryDir <options>
MDSReporterDir <options>
MDSSmartLogDir <options>
MDSSvnDir <options>
MDSVarCompDir <options>
MDSVarDir <options>
MDSVarFwbcDir <options>
MDSVarFwDir <options>
MDSVarSvnDir <options>
MSP <options>
OfficialName <options>
OptionPack <options>
ProductName <options>
RegistryCurrentVer <options>
ShortOfficialName <options>
SmartCenterPuvUpgradeParam <options>
SP <options>
SVNPkgName <options>
SvrDirectory <options>
SvrParam <options>
Parameters
Parameter Description
CMACompDir <options> Returns the full path for the specified Backward
Compatibility Package in the context of the
specified Domain Management Server.
See "$MDSVERUTIL CMACompDir" on page 781.
Parameter Description
CMAFgDir <options> Returns the full path for the $FGDIR directory in
the context of the specified Domain Management
Server.
See "$MDSVERUTIL CMAFgDir" on page 782.
CMAFw40Dir <options> Returns the full path for the $FWDIR directory for
FireWall-1 4.0 in the context of the specified
Domain Management Server.
See "$MDSVERUTIL CMAFw40Dir" on page 783.
CMAFw41Dir <options> Returns the full path for the $FWDIR directory for
Edge devices (that are based on FireWall-1 4.1) in
the context of the specified Domain Management
Server.
Note - R80.40 does not support UTM-1 Edge
and Safe@Office devices. The information
about this command is provided only to
describe the existing syntax option until it is
removed completely.
See "$MDSVERUTIL CMAFw41Dir" on page 784.
CMAFwDir <options> Returns the full path for the $FWDIR directory in
the context of the specified Domain Management
Server.
See "$MDSVERUTIL CMAFwDir" on page 786.
Parameter Description
CMAReporterDir <options> Returns the full path for the $RTDIR directory in
the context of the specified Domain Management
Server.
See "$MDSVERUTIL CMAReporterDir" on
page 794.
CMASvnDir <options> Returns the full path for the $CPDIR directory in
the context of the specified Domain Management
Server.
See "$MDSVERUTIL CMASvnDir" on page 797.
Parameter Description
CPprofileDir <options> Returns the path to the directory that contains the
.CPprofile.sh and the .CPprofile.csh
shell scripts.
See "$MDSVERUTIL CPprofileDir" on page 800.
Parameter Description
MDSCompDir <options> Returns the full path for the specified Backward
Compatibility Package in the MDS context.
See "$MDSVERUTIL MDSCompDir" on page 810.
MDSDir <options> Returns the full path in the /opt/ directory to the
$MDSDIR directory.
See "$MDSVERUTIL MDSDir" on page 811.
MDSFgDir <options> Returns the full path for the $FGDIR directory in
the MDS context.
See "$MDSVERUTIL MDSFgDir" on page 812.
MDSFwbcDir <options> Returns the full path in the /opt/ directory (in the
MDS context) for the Backward Compatibility
directory for Edge devices.
See "$MDSVERUTIL MDSFwbcDir" on page 813.
MDSFwDir <options> Returns the full path in the /opt/ directory for the
$FWDIR directory in the MDS context.
See "$MDSVERUTIL MDSFwDir" on page 814.
Parameter Description
MDSReporterDir <options> Returns the full path for the $RTDIR directory in
the MDS context.
See "$MDSVERUTIL MDSReporterDir" on
page 821.
MDSSvnDir <options> Returns the full path in the /opt/ directory for the
$CPDIR directory in the MDS context.
See "$MDSVERUTIL MDSSvnDir" on page 823.
Parameter Description
Parameter Description
$MDSVERUTIL AllCMAs
Description
Returns the list of names of the configured Domain Management Servers.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL AllVersions
Description
Returns the internal representation of versions, this Multi-Domain Server recognizes.
You can you these internal version strings in other commands.
In addition, see these commands:
n "$MDSVERUTIL IsLegalVersion" on page 806
n "$MDSVERUTIL OfficialName" on page 830
Syntax
$MDSVERUTIL AllVersions
Mapping
VID_94 R80.40
VID_93 R80.30
VID_92 R80.20
VID_91 R80
VID_90 R77.X
VID_89 R76
VID_88 R75.40VS
VID_87 R75.40
VID_86 R75.30
VID_85 R75.20
VID_84 R75
VID_83 R71.X
VID_80 R70.X
VID_541_A NG AI R55W
VID_541 NG AI R55
VID_54_VSX_R2 VSX NG AI R2
VID_54 NG AI R54
VID_53_VSX VSX NG AI
VID_53 NG FP3
VID_52 NG FP2
VID_51 NG FP1
VID_41 4.1
Example
$MDSVERUTIL CMAAddonDir
Description
Returns the path to the Management Addon directory in the context of the specified Domain
Management Server. Applies only to NG AI R55W version.
In addition, see the "$MDSVERUTIL MDSAddonDir" on page 809 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMACompDir
Description
Returns the full path for the specified Backward Compatibility Package in the context of the
specified Domain Management Server.
In addition, see these commands:
n "$MDSVERUTIL MDSCompDir" on page 810
n "$MDSVERUTIL MDSVarCompDir" on page 824
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMAFgDir
Description
Returns the full path for the $FGDIR directory in the context of the specified Domain
Management Server.
In addition, see the "$MDSVERUTIL MDSFgDir" on page 812 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CMAFw40Dir
Description
Returns the full path for the $FWDIR directory for FireWall-1 4.0 in the context of the specified
Domain Management Server.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CMAFw41Dir
Note - R80.40 does not support UTM-1 Edge and Safe@Office devices. The
information about this command is provided only to describe the existing syntax
option until it is removed completely.
Description
Returns the full path for the $FWDIR directory for UTM-1 Edge devices (that are based on
FireWall-1 4.1) in the context of the specified Domain Management Server.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CMAFwConfDir
Description
Returns the full path for the $FWDIR/conf/ directory in the context of the specified Domain
Management Server.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CMAFwDir
Description
Returns the full path for the $FWDIR directory in the context of the specified Domain
Management Server.
In addition, see the "$MDSVERUTIL MDSFwDir" on page 814 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CMAIp
Description
Returns the IPv4 address of the Domain Management Server specified by its name.
In addition, see the "$MDSVERUTIL MDSIp" on page 815 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMAIp6
Description
Returns the IPv6 address of the Domain Management Server specified by its name.
In addition, see the "$MDSVERUTIL MDSIp6" on page 816 command.
Syntax
Parameters
Parameter Description
$MDSVERUTIL CMALogExporterDir
Description
Returns the full path for the $EXPORTERDIR directory in the context of the specified Domain
Management Server.
In addition, see the "$MDSVERUTIL MDSLogExporterDir" on page 817 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMALogIndexerDir
Description
Returns the full path for the $INDEXERDIR directory in the context of the specified Domain
Management Server.
In addition, see the "$MDSVERUTIL MDSLogIndexerDir" on page 818 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMANameByFwDir
Description
Returns the name of the Domain Management Server based on the context of the current
$FWDIR directory.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMANameByIp
Description
Returns the name of the Domain Management Server based on the specified IPv4 address.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMARegistryDir
Description
Returns the full path for the $CPDIR/registry/ directory in the context of the specified
Domain Management Server.
In addition, see the "$MDSVERUTIL MDSRegistryDir" on page 820 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMAReporterDir
Description
Returns the full path for the $RTDIR directory in the context of the specified Domain
Management Server.
In addition, see the "$MDSVERUTIL MDSReporterDir" on page 821 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMASmartLogDir
Description
Returns the full path for the $SMARTLOGDIR directory in the context of the specified Domain
Management Server.
In addition, see the "$MDSVERUTIL MDSSmartLogDir" on page 822 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMASvnConfDir
Description
Returns the full path for the $CPDIR/conf/ directory in the context of the specified Domain
Management Server.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL CMASvnDir
Description
Returns the full path for the $CPDIR directory in the context of the specified Domain
Management Server.
In addition, see these commands:
n "$MDSVERUTIL MDSSvnDir" on page 823
n "$MDSVERUTIL MDSVarSvnDir" on page 828
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL ConfDirVersion
Description
Returns the internal Version ID based on the context of the current $FWDIR/conf/ directory.
For information about the internal Version ID, see the "$MDSVERUTIL AllVersions" on
page 777 command.
Syntax
Example
$MDSVERUTIL CpdbUpParam
Description
Returns internal version numbers from the internal database.
In addition, see these commands:
n "$MDSVERUTIL MSP" on page 829
n "$MDSVERUTIL SP" on page 836
Syntax
Parameters
Parameter Description
Example 1
Example 2
Example 3
$MDSVERUTIL CPprofileDir
Description
Returns the path to the directory that contains the .CPprofile.sh and the
.CPprofile.csh shell scripts.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CPVer
Description
Returns internal Check Point version number.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL CustomersBaseDir
Description
Returns the full path for the $MDSDIR/customers/ directory.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL DiskSpaceFactor
Description
Returns the disk-space factor. The mds_setup command uses this value during an upgrade.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL InstallationLogDir
Description
Returns the full path for directory with all installation logs (/opt/CPInstLog/).
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL IsIPv6Enabled
Description
Returns true, if IPv6 is enabled in Gaia OS.
Returns false, if IPv6 is disabled in Gaia OS.
Syntax
$MDSVERUTIL IsIPv6Enabled
$MDSVERUTIL IsLegalVersion
Description
Returns 0, if the specified internal Version ID is legal.
Returns 1, if the specified internal Version ID is illegal.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL IsOsSupportsIPv6
Description
Returns true, if the OS supports IPv6.
Returns false, if the OS does not support IPv6.
Syntax
$MDSVERUTIL IsOsSupportsIPv6
$MDSVERUTIL LatestVersion
Description
Returns the internal Version ID of the latest installed version.
Syntax
$MDSVERUTIL LatestVersion
Example
$MDSVERUTIL MDSAddonDir
Description
Returns the path to the Management Addon directory in the MDS context.
In addition, see the "$MDSVERUTIL CMAAddonDir" on page 780 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL MDSCompDir
Description
Returns the full path for the specified Backward Compatibility Package in the MDS context.
In addition, see these commands:
n "$MDSVERUTIL CMACompDir" on page 781
n "$MDSVERUTIL MDSVarCompDir" on page 824
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL MDSDir
Description
Returns the full path in the /opt/ directory to the $MDSDIR directory.
In addition, see the "$MDSVERUTIL MDSVarDir" on page 825 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSFgDir
Description
Returns the full path for the $FGDIR directory in the MDS context.
In addition, see the "$MDSVERUTIL CMAFgDir" on page 782 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSFwbcDir
Note - R80.40 does not support UTM-1 Edge and Safe@Office devices. The
information about this command is provided only to describe the existing syntax
option until it is removed completely.
Description
Returns the full path in the /opt/ directory (in the MDS context) for the Backward
Compatibility directory for UTM-1 Edge devices.
This Backward Compatibility directory contains the applicable files to install policy on UTM-1
Edge devices.
In addition, see the "$MDSVERUTIL MDSVarFwbcDir" on page 826 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSFwDir
Description
Returns the full path in the /opt/ directory for the $FWDIR directory in the MDS context.
In addition, see these commands:
n "$MDSVERUTIL MDSVarFwDir" on page 827
n "$MDSVERUTIL CMAFwDir" on page 786
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSIp
Description
Returns the IPv4 address of Multi-Domain Server.
In addition, see the "$MDSVERUTIL CMAIp" on page 787 command.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL MDSIp6
Description
Returns the IPv6 address of Multi-Domain Server.
In addition, see the "$MDSVERUTIL CMAIp6" on page 788 command.
Syntax
Parameters
Parameter Description
$MDSVERUTIL MDSLogExporterDir
Description
Returns the full path for the $EXPORTERDIR directory in the MDS context.
In addition, see the "$MDSVERUTIL CMALogExporterDir" on page 789 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSLogIndexerDir
Description
Returns the full path for the $INDEXERDIR directory in the MDS context.
In addition, see the "$MDSVERUTIL CMALogIndexerDir" on page 790 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSPkgName
Description
Returns the name of the MDS software package.
In addition, see the "$MDSVERUTIL SVNPkgName" on page 837 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSRegistryDir
Description
Returns the full path for the $CPDIR/registry/ directory in the MDS context.
In addition, see the "$MDSVERUTIL CMARegistryDir" on page 793 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSReporterDir
Description
Returns the full path for the $RTDIR directory in the MDS context.
In addition, see the "$MDSVERUTIL CMAReporterDir" on page 794 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSSmartLogDir
Description
Returns the full path for the $SMARTLOGDIR directory in the MDS context.
In addition, see the "$MDSVERUTIL CMASmartLogDir" on page 795 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSSvnDir
Description
Returns the full path in the /opt/ directory for the $CPDIR directory in the MDS context.
In addition, see these commands:
n "$MDSVERUTIL CMASvnDir" on page 797
n "$MDSVERUTIL MDSVarSvnDir" on page 828
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSVarCompDir
Description
Returns the full path in the /var/opt/ directory for the specified Backward Compatibility
Package in the MDS context.
In addition, see these commands:
n "$MDSVERUTIL CMACompDir" on page 781
n "$MDSVERUTIL MDSCompDir" on page 810
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL MDSVarDir
Description
Returns the full path in the /var/opt/ directory to the $MDSDIR directory.
In addition, see the "$MDSVERUTIL MDSDir" on page 811 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSVarFwbcDir
Note - R80.40 does not support UTM-1 Edge and Safe@Office devices. The
information about this command is provided only to describe the existing syntax
option until it is removed completely.
Description
Returns the full path in the /var/opt/ directory (in the MDS context) for the Backward
Compatibility directory for UTM-1 Edge devices.
This Backward Compatibility directory contains the applicable files to install policy on UTM-1
Edge devices.
In addition, see the "$MDSVERUTIL MDSFwbcDir" on page 813 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSVarFwDir
Description
Returns the full path in the /var/opt/ directory for the $FWDIR directory in the MDS context.
In addition, see the "$MDSVERUTIL MDSFwDir" on page 814 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MDSVarSvnDir
Description
Returns the full path in the /var/opt/ directory for the $CPDIR directory in the MDS context.
In addition, see these commands:
n "$MDSVERUTIL CMASvnDir" on page 797
n "$MDSVERUTIL MDSSvnDir" on page 823
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL MSP
Description
Returns the Minor Service Pack version.
In addition, see these commands:
n "$MDSVERUTIL SP" on page 836
n "$MDSVERUTIL CpdbUpParam" on page 799
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL OfficialName
Description
Returns the official version name.
In addition, see the "$MDSVERUTIL ShortOfficialName" on page 834 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
Example 3
$MDSVERUTIL OptionPack
Description
Returns the internal Option Pack version.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL ProductName
Description
Returns the official name of the Multi-Domain Server product.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL RegistryCurrentVer
Description
Returns the current internal version of Check Point Registry.
Syntax
Parameters
Parameter Description
Example
$MDSVERUTIL ShortOfficialName
Description
Returns the short (without spaces) official version name.
In addition, see the "$MDSVERUTIL OfficialName" on page 830 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL SmartCenterPuvUpgradeParam
Description
Returns the version to the Pre-Upgrade Verifier (PUV) in order for it to upgrade to that version.
Syntax
Parameters
Parameter Description
Example 1
Example 2
Example 3
[Expert@MDS:0]# $MDSVERUTIL SmartCenterPuvUpgradeParam -v VID_65
NGX_R65
[Expert@MDS:0]#
$MDSVERUTIL SP
Description
Returns the Service Pack version.
In addition, see these commands:
n "$MDSVERUTIL MSP" on page 829
n "$MDSVERUTIL CpdbUpParam" on page 799
Syntax
Parameters
Parameter Description
Example 1
[Expert@MDS:0]# $MDSVERUTIL SP
4
[Expert@MDS:0]#
Example 2
$MDSVERUTIL SVNPkgName
Description
Returns the name of the Secure Virtual Network (SVN) package. Applies to versions NGX R60
and above.
In addition, see the "$MDSVERUTIL MDSPkgName" on page 819 command.
Syntax
Parameters
Parameter Description
Example 1
Example 2
$MDSVERUTIL SvrDirectory
Description
Returns the full path for the SmartReporter directory.
Syntax
Parameters
Parameter Description
$MDSVERUTIL SvrParam
Description
Returns the SmartReporter version.
Syntax
Parameters
Parameter Description
Example:
4. Connect with SmartConsole to the new Domain Management Server to configure the
applicable settings.
SmartProvisioning Commands
For more information about SmartProvisioning, see the R80.40 SmartProvisioning
Administration Guide.
In addition, see "Security Management Server Commands" on page 40.
API
You can configure and control the Management Server through API Requests you send to the
API Server that runs on the Management Server.
The API Server runs scripts that automate daily tasks and integrate the Check Point solutions
with third party systems, such as virtualization servers, ticketing systems, and change
management systems.
To learn more about the management APIs, to see code samples, and to take advantage of
user forums, see:
n The API Documentation:
l Online - Check Point Management API Reference
l Local - https://<Server IP Address>/api_docs
By default, access to the local API Documentation is disabled. Follow the
instructions in sk174606.
n The Developers Network section of Check Point CheckMates Community.
API Tools
You can use these tools to work with the API Server on the Management Server:
n Standalone management tool, included with Gaia operating system:
mgmt_cli
n Standalone management tool, included with SmartConsole:
mgmt_cli.exe
You can copy this tool from the SmartConsole installation folder to other computers that
run Windows operating system.
n Web Services APIs that allow communication and data exchange between the clients
and the Management Server over the HTTP protocol.
These APIs also let other Check Point processes communicate with the Management
Server over the HTTPS protocol.
https://<IP Address of Management Server>/web_api/<command>
Select Automatic start to automatically start the API server when you start or reboot
the Management Server.
Notes:
n If the Management Server has more than 4GB of RAM installed, the
Select one of these options to configure which clients can connect to the API Server:
n Management server only - Only the Management Server itself can connect to
the API Server. This option only lets you use the mgmt_cli utility on the
Management Server to send API requests. You cannot use SmartConsole or
Web services to send API requests.
n All IP addresses that can be used for GUI clients - You can send API requests
from all IP addresses that are defined as Trusted Clients in SmartConsole. This
includes requests from SmartConsole, Web services, and the mgmt_cli utility
on the Management Server.
n All IP addresses - You can send API requests from all IP addresses. This
includes requests from SmartConsole, Web services, and the mgmt_cli utility
on the Management Server.
api restart
Note - On a Multi-Domain Server, you must run this command in the context of
the applicable Domain Management Server.
Notes:
n LSMcli can run from hosts other than SmartConsole clients. Make sure to define
the hosts, from which you run the LSMcli as GUI clients.
n The first time you run the LSMcli from a client, it shows the Management
Server's fingerprint. Confirm the fingerprint.
n In the LSMcli, commands can use the abbreviation ROBO (Remote
Office/Branch Office) gateways.
In SmartProvisioning GUI, these gateways are called SmartLSM Security
Gateways.
Syntax
Parameters
Parameter Description
<Username> Specifies the username used in the standard Check Point authentication
method.
<Password> Specifies the password used in the standard Check Point authentication
method.
<Action> Specifies the function performed (see the next sub-sections for a complete
list of actions).
Syntax Notation
Square brackets ([ ]) are used in the LSMcli utility syntax. These brackets are correct and
syntactically necessary.
This is an example of how they are used:
n A [b [c]] - means that for parameter A, you can provide b. If you provide b, you can
provide c.
n A [b] [c] - means that for parameter A, you can provide b, c, or b and c.
n A [b c] - means that for parameter A, you can provide b and c.
Description
This command adds a new Check Point SmartLSM Security Gateway to SmartProvisioning
and assigns it a SmartLSM Security Profile.
If a one-time password is supplied, a SIC certificate is created.
If an IP address is also supplied, the SIC certificate is pushed to the SmartLSM Security
Gateway (in such cases, the SmartLSM Security Gateway SIC one-time password must be
initialized first).
If no IP address is supplied, the SIC certificate is pulled from the SmartLSM Security Gateway
afterwards.
You can also assign an IP address range to Dynamic Objects, and specify whether or not to
add them to the VPN domain.
Syntax
Parameters
Parameter Description
Parameter Description
Example 1
This command adds a new SmartLSM Security Gateway MyRobo and assigns it the specified
SmartLSM Security Profile AnyProfile.
A SIC password and an IP address are supplied, so the SIC Activation Key can be sent to the
new SmartLSM Security Gateway.
A Dynamic Object called FirstDO is resolved to an IP address for this Security Gateway.
Example 2
Description
This command modifies a Check Point SmartLSM Security Gateway.
This action modifies the SmartProvisioning details for an existing SmartLSM Security Gateway
and can be used to update properties previously supplied by the user.
Syntax
Parameters
Parameter Description
Parameter Description
-KeepDOs Keeps all existing dynamic objects in the dynamic objects list when
you add new dynamic objects.
If a dynamic object already exists in the list, its IP resolution is
updated.
If this flag is not specified, the dynamic objects list is deleted when
you use the LSMcli command to add new dynamic objects.
Example
This example resolves Dynamic Objects for the given Security Gateway.
LSMcli ModifyROBOManualVPNDomain
Description
This command modifies the SmartLSM VPN Domain, to take effect when the VPN Domain
becomes defined as Manual.
Syntax
Parameters
Parameter Description
-IfOverlappingIPRangesDetected Optional.
Determines the course of action, if overlapping
IP address ranges are detected: exit, ignore,
or show a warning.
Example 1
Example 2
Description
This command modifies the SmartLSM VPN Domain configuration for a selected Security
Gateway.
Syntax
Parameters
Parameter Description
Example
Description
This command modifies the Internal Interface list.
Syntax
Parameters
Parameter Description
-IfOverlappingIPRangesDetected Optional.
Determines the course of action, if overlapping
IP address ranges are detected: exit, ignore,
or show a warning.
Example
Description
This command adds a new interface to the selected SmartLSM Security Gateway.
Syntax
Parameters
Parameter Description
Example
Description
This command deletes an interface from the selected Security Gateway.
Syntax
Parameters
Parameter Description
Example
LSMcli ExportIke
Description
This command exports the IKE Certificate into a P12 file(encrypted with a provided password)
from SmartLSM Security Gateway, SmartLSM Cluster, or SmartLSM Cluster Member.
The default location of the exported file is the $FWDIR/conf/ directory.
Syntax
Parameters
Parameter Description
Example
LSMcli ResetIke
Description
This command resets the IKE Certificate of a SmartLSM Security Gateway, SmartLSM
Cluster, or SmartLSM Cluster Member.
This action revokes the existing IKE certificate and creates a new one.
Syntax
Parameters
Parameter Description
Example
LSMcli Remove
Description
This command deletes a SmartLSM Security Gateway.
This action revokes all the certificates used by the SmartLSM Security Gateway, releases all
the licenses and, finally, removes the SmartLSM Security Gateway.
Syntax
Parameters
Parameter Description
Example
LSMcli ResetSic
Description
This command resets the SIC Certificate of a SmartLSM Security Gateway or SmartLSM
Cluster Member.
This action revokes the Security Gateway's SIC certificate and creates a new one with the one-
time password provided by the user.
If an IP address is supplied for the SmartLSM Security Gateway, the SIC certificate is pushed
to the SmartLSM Security Gateway, in which case the SmartLSM Security Gateway SIC one-
time password must be initialized first.
Otherwise, if no IP address is given, the SIC certificate is later pulled from the SmartLSM
Security Gateway.
Syntax
Parameters
Parameter Description
< One-time password for the Secure Internal Communications with the
ActivationKey> SmartLSM Security Gateway.
Example 1
Example 2
LSMcli Show
Description
This command displays a list of existing Security Gateways.
Syntax
Parameters
Parameter Description
Example 1
Example 2
LSMcli ShowROBOTopology
Description
This command displays the Topology information of the SmartLSM Security Gateway.
It lists the defined Interfaces and their respective IP Addresses and Network Masks, and the
VPN Domain configuration.
You can use the indexes of the manually defined VPN domain IP address ranges, on the
displayed list, when you request to delete a range, with the "LSMcli
ModifyROBOManualVPNDomain" on page 852 command.
Syntax
Parameters
Parameter Description
Example
LSMcli UpdateCO
Description
This command updates a Corporate Office (CO) Security Gateway.
This action updates the CO Security Gateway with up-to-date available information about the
VPN Domains of the SmartLSM Security Gateways.
Perform this action after you add a new SmartLSM Security Gateway to enable the CO
gateway to initiate a VPN tunnel to the new SmartLSM Security Gateway.
Alternatively, you can Install Policy on the CO gateway to obtain updated VPN Domain
information.
Syntax
Parameters
Parameter Description
Example
SmartUpdate Actions
This section describes commands that perform SmartUpdate actions on SmartLSM Gateways.
Before you can install software on gateways, you must first load it to the Security Management
Server.
Best Practice - Run the "LSMcli VerifyInstall" on page 872 command to make sure
that the software is compatible.
Use the "LSMcli Install" on page 868 command to install the software.
Use the "LSMcli Uninstall" on page 870 command to uninstall the software.
LSMcli Install
Description
This command installs the specified software on the SmartLSM Security Gateway or
SmartLSM Cluster Member.
Note - Before you can install software on SmartLSM Security Gateways, you must
first load it to the Security Management Server.
Best Practice - Run the "LSMcli VerifyInstall" on page 872 command to make sure
that the software is compatible.
Syntax
Parameters
Parameter Description
-DoNotDistribute Optional.
Install previously distributed packages.
Example
LSMcli Uninstall
Description
This command uninstalls the specified package from the SmartLSM Security Gateway or
SmartLSM Cluster Member.
You can use the "LSMcli ShowInfo" on page 876 command to see what products are installed
on the SmartLSM Security Gateway.
Syntax
Parameters
Parameter Description
Example
LSMcli Distribute
Description
This command distributes a package from the Repository to the SmartLSM Security Gateway
or SmartLSM Cluster Member, but does not install it.
Syntax
Parameters
Parameter Description
Example
LSMcli mySrvr name pass Distribute MyRobo fw1 checkpoint NG_AI R54
LSMcli VerifyInstall
Description
This command makes sure that the software is compatible to install on the SmartLSM Security
Gateway or SmartLSM Cluster Member.
Best Practice - Run this command before you install the software on the SmartLSM
Security Gateway.
Syntax
Parameters
Parameter Description
Example
LSMcli VerifyUpgrade
Description
This command verifies if you can upgrade a selected software on the SmartLSM Security
Gateway or SmartLSM Cluster Member.
Best Practice - Run this command before you run the "LSMcli Upgrade" on page 874
command.
Syntax
Parameters
Parameter Description
Example
LSMcli Upgrade
Description
This command upgrades all the (appropriate) available software packages on the SmartLSM
Security Gateway or SmartLSM Cluster Member.
Best Practice - Run the "LSMcli VerifyUpgrade" on page 873 command before you
run this command.
Syntax
Parameters
Parameter Description
boot Reboot the SmartLSM Security Gateway after the installation is finished.
Example
LSMcli GetInfo
Description
This command collects product information from the SmartLSM Security Gateway or
SmartLSM Cluster Member.
Important - If you upgrade any package manually instead of using SmartUpdate, you
must run this command before you run the "LSMcli ShowInfo" on page 876 command.
Syntax
Parameters
Parameter Description
Example
LSMcli ShowInfo
Description
This command displays product information for the list of the products installed on the
SmartLSM Security Gateway or SmartLSM Cluster Member.
Important - Before you run this command, run the "LSMcli GetInfo" on page 875
command to make sure the information is up-to-date.
Syntax
Parameters
Parameter Description
Example
LSMcli ShowRepository
Description
This command shows the list of the available products on the Management Server.
Use SmartUpdate to manage the products, load new products, remove products, and so on.
Syntax
Parameters
Parameter Description
Example
LSMcli Stop
Description
This command stops Security Gateway services on the selected gateway.
Notes:
n The CPRID services must run on the selected gateway. See "cprid" on
page 169.
n This command supports Security Gateways, SmartLSM Security Gateways,
and SmartLSM Cluster Members.
Syntax
Parameters
Parameter Description
Example
LSMcli Start
Description
This command starts Security Gateway services on the selected gateway.
Notes:
n The CPRID services must run on the selected gateway. See "cprid" on
page 169.
n This command supports Security Gateways, SmartLSM Security Gateways,
and SmartLSM Cluster Members.
Syntax
Parameters
Parameter Description
Example
LSMcli Restart
Description
This command restarts Security Gateway services on the selected gateway.
Notes:
n The CPRID services must run on the selected gateway. See "cprid" on
page 169.
n This command supports Security Gateways, SmartLSM Security Gateways,
and SmartLSM Cluster Members.
Syntax
Parameters
Parameter Description
Example
LSMcli Reboot
Description
This command reboots the selected gateway.
Notes:
n The CPRID services must run on the selected gateway. See "cprid" on
page 169.
n This command supports Security Gateways, SmartLSM Security Gateways,
and SmartLSM Cluster Members.
Syntax
Parameters
Parameter Description
Example
LSMcli PushPolicy
Description
This command pushes a policy to the selected gateway.
Notes:
n The CPRID services must run on the selected gateway. See "cprid" on
page 169.
n This command supports Security Gateways, SmartLSM Security Gateways,
and SmartLSM Clusters.
Syntax
Parameters
Parameter Description
Example
LSMcli PushDOs
Description
This command updates a Dynamic Object's information on the SmartLSM Security Gateway or
SmartLSM Cluster Member.
Note - This command does not remove/release the IP address range for the deleted
Dynamic Object, but only adds new ones. To overcome this difficulty, run the "LSMcli
PushPolicy" on page 883 command.
Syntax
Parameters
Parameter Description
Example
LSMcli GetStatus
Description
This command fetches various statistics from the selected gateway.
Syntax
Parameters
Parameter Description
Example
Description
This command defines a new SmartLSM cluster.
You can configure all of the options available in the New SmartLSM Cluster wizard of the
SmartProvisioning GUI.
The only exception is the configuration of Topology overrides (see "LSMcli
ModifyROBONetaccess VPN1Cluster" on page 891).
Syntax
Parameters
Description
You can change a SmartLSM cluster main IP address.
You can resolve a dynamic object for a SmartLSM cluster.
Parameters
Parameter Description
Description
You can set the VPN domain of a SmartLSM cluster in the SmartProvisioning GUI (double-
click the SmartLSM cluster object > Edit window > Topology tab), or with this command.
Note - When the VPN domain is set to Manual, the IP address ranges are those set in
the SmartProvisioning GUI, or with the "LSMcli ModifyROBOManualVPNDomain" on
page 852 command.
Syntax
Parameters
Parameter Description
Description
For the actual SmartLSM cluster, you can override the profile topology definitions of a cluster
(virtual) interface in the SmartProvisioning GUI (double-click the SmartLSM cluster object >
Edit window > Topology tab), or with this command.
Syntax
Parameters
Parameter Description
Parameter Description
Description
These settings in SmartLSM cluster objects get default values from their Profiles:
n Names of cluster member interfaces
n IP addresses of cluster member interfaces
These default values can (and in the case of IP addresses, usually must) be overridden for the
individual SmartLSM cluster.
You can edit the interface properties in the SmartProvisioning GUI (in the New SmartLSM
Cluster wizard, or double-click the SmartLSM cluster object > Edit window > Topology tab), or
with this command.
Notes:
n If there is a set override value, and you want to change it, then use only the
"LSMcli ModifyClusterSubnetOverride VPN1Cluster" on page 895 command.
n If the override value you want to set is not defined (except at the Profile level),
because it was never defined or because it was deleted, then use only this
"AddClusterSubnetOverride" command.
n To cancel a value and return to the value set by the Profile, use the "LSMcli
DeleteClusterSubnetOverride VPN1Cluster" on page 897 command.
n To define overrides for a private (monitored or non-monitored) interface, use
one of these commands:
l "LSMcli AddPrivateSubnetOverride VPN1ClusterMember" on page 899
Syntax
Parameters
Parameter Description
Description
These settings in SmartLSM cluster objects get default values from their Profiles:
n Names of cluster member interfaces
n IP addresses of cluster member interfaces
These default values can (and in the case of IP addresses, usually must) be overridden for the
individual SmartLSM cluster.
You can edit the interface properties in the SmartProvisioning GUI (in the New SmartLSM
Cluster wizard, or double-click the SmartLSM cluster object > Edit window > Topology tab), or
with this command.
Notes:
n If there is a set override value, and you want to change it, then use only this
"ModifyClusterSubnetOverride" command.
n If the override value you want to set is not defined (except at the Profile level),
because it was never defined or because it was deleted, then use only the
"LSMcli AddClusterSubnetOverride VPN1Cluster" on page 893 command.
n To cancel a value and return to the value set by the Profile, use the "LSMcli
DeleteClusterSubnetOverride VPN1Cluster" on page 897 command.
n To define overrides for a private (monitored or non-monitored) interface, use
one of these commands:
l "LSMcli AddPrivateSubnetOverride VPN1ClusterMember" on page 899
Syntax
Parameters
Parameter Description
Description
These settings in SmartLSM cluster objects get default values from their Profiles:
n Names of cluster member interfaces
n IP addresses of cluster member interfaces
These default values can (and in the case of IP addresses, usually must) be overridden for the
individual SmartLSM cluster.
You can edit the interface properties in the SmartProvisioning GUI (in the New SmartLSM
Cluster wizard, or double-click the SmartLSM cluster object > Edit window > Topology tab), or
with this command.
Notes:
n If there is a set override value, and you want to change it, then use only this
"LSMcli ModifyClusterSubnetOverride VPN1Cluster" on page 895 command.
n If the override value you want to set is not defined (except at the Profile level),
because it was never defined or because it was deleted, then use only the
"LSMcli AddClusterSubnetOverride VPN1Cluster" on page 893 command.
n To cancel a value and return to the value set by the Profile, use this
"DeleteClusterSubnetOverride" command.
n To define overrides for a private (monitored or non-monitored) interface, use
one of these commands:
l "LSMcli AddPrivateSubnetOverride VPN1ClusterMember" on page 899
Syntax
Parameters
Parameter Description
Description
These settings in SmartLSM cluster objects get default values from their Profiles:
n Names of cluster member monitored interfaces or non-monitored interfaces
n IP addresses of cluster member monitored interfaces or non-monitored interfaces
These default values can (and in the case of IP addresses, usually must) be overridden for the
individual SmartLSM cluster.
You can edit the interface properties in the SmartProvisioning GUI (in the New SmartLSM
Cluster wizard, or double-click the SmartLSM cluster object > Edit window > Topology tab), or
with this command.
Notes:
n If there is a set override value, and you want to change it, then use only the
"LSMcli ModifyPrivateSubnetOverride VPN1ClusterMember" on page 901
command.
n If the override value you want to set is not defined (except at the Profile level),
because it was never defined or because it was deleted, then use only this
"AddPrivateSubnetOverride" command.
n To cancel a value and return to the value set by the Profile, use the "LSMcli
DeletePrivateSubnetOverride VPN1ClusterMember" on page 903 command.
n To define overrides for a cluster interface, use one of these commands:
l "LSMcli AddClusterSubnetOverride VPN1Cluster" on page 893
Syntax
Parameters
Parameter Description
Description
These settings in SmartLSM cluster objects get default values from their Profiles:
n Names of cluster member monitored interfaces or non-monitored interfaces
n IP addresses of cluster member monitored interfaces or non-monitored interfaces
These default values can (and in the case of IP addresses, usually must) be overridden for the
individual SmartLSM cluster.
You can edit the interface properties in the SmartProvisioning GUI (in the New SmartLSM
Cluster wizard, or double-click the SmartLSM cluster object > Edit window > Topology tab), or
with this command.
Notes:
n If there is a set override value, and you want to change it, then use only the
"ModifyPrivateSubnetOverride" command.
n If the override value you want to set is not defined (except at the Profile level),
because it was never defined or because it was deleted, then use only the
"LSMcli AddPrivateSubnetOverride VPN1ClusterMember" on page 899
command.
n To cancel a value and return to the value set by the Profile, use the "LSMcli
DeletePrivateSubnetOverride VPN1ClusterMember" on page 903 command.
n To define overrides for a cluster interface, use one of these commands:
l "LSMcli AddClusterSubnetOverride VPN1Cluster" on page 893
Syntax
Parameters
Parameter Description
Description
These settings in SmartLSM cluster objects get default values from their Profiles:
n Names of cluster member monitored interfaces or non-monitored interfaces
n IP addresses of cluster member monitored interfaces or non-monitored interfaces
These default values can (and in the case of IP addresses, usually must) be overridden for the
individual SmartLSM cluster.
You can edit the interface properties in the SmartProvisioning GUI (in the New SmartLSM
Cluster wizard, or double-click the SmartLSM cluster object > Edit window > Topology tab), or
with this command.
Notes:
n If there is a set override value, and you want to change it, then use only the
"LSMcli ModifyPrivateSubnetOverride VPN1ClusterMember" on page 901
command.
n If the override value you want to set is not defined (except at the Profile level),
because it was never defined or because it was deleted, then use only the
"LSMcli AddPrivateSubnetOverride VPN1ClusterMember" on page 899
command.
n To cancel a value and return to the value set by the Profile, use the
"DeletePrivateSubnetOverride" command.
n To define overrides for a cluster interface, use one of these commands:
l "LSMcli AddClusterSubnetOverride VPN1Cluster" on page 893
Syntax
Parameters
Parameter Description
LSMcli RemoveCluster
Description
This command:
1. Revokes all the certificates used by the SmartLSM cluster and its members.
2. Releases all the licenses.
3. Deletes the SmartLSM cluster and member objects.
Syntax
Parameters
Parameter Description
Description
This command adds a Small Office Appliance Gateway.
Syntax
Parameters
Parameter Description
Parameter Description
Examples
n To add a 1100 appliance Security Gateway:
Description
This command adds a Small Office Appliance Cluster.
Syntax
Parameters
Parameter Description
Parameter Description
Example
To add a 1450 cluster:
n For all other commands on Small Office Appliance clusters, replace the "VPN1Cluster"
with the "CPSG80Cluster", for all appliance types (for example, in "LSMcli
ModifyROBO VPN1Cluster" on page 889).
comp_init_policy
Description
Generates, loads, or removes the Initial Policy on a Security Gateway, or a Cluster Member.
Until the Security Gateway or cluster administrator installs the user-defined Security Policy on
the Security Gateway or Cluster Members for the first time, security is enforced by an Initial
Policy.
The Initial Policy operates by adding Check Point "implied rules" to the Default Filter to allow
internal Check Point communication between the Management Server and the Security
Gateway / Cluster Member.
The Initial Policy also protects a Security Gateway or Cluster Members in these cases:
n During Check Point product upgrades.
n When a SIC certificate is reset on the Security Gateway or Cluster Member.
n When Check Point product license expires.
The Security Gateway enforces the Initial until an administrator installs a user-defined policy.
In subsequent boots, the Security Gateway loads the user-defined policy immediately after the
Default Filter.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Notes:
n You must run this command from the Expert mode.
n The Initial Policy overwrites the user-defined policy.
n Output of the "cpstat -f policy fw" command (see "cpstat" on page 958)
shows the name of this policy as "InitialPolicy".
n Security Gateway, or Cluster Member stores the installed Access Control Policy
in these directories:
l $FWDIR/state/__tmp/FW1/
l $FWDIR/state/local/FW1/
Syntax
Parameters
Parameter Description
Example
[Expert@GW:0]# cd $FWDIR/state/local/FW1/
[Expert@GW:0]#
[Expert@GW:0]# pwd
/opt/CPsuite-R80.40/fw1/state/local/FW1
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 7744
-rw-r--r-- 1 admin root 20166 Jun 13 16:34 install_policy_report.txt
-rw-r--r-- 1 admin root 55 Jun 13 16:34 install_policy_report_timing.txt
-rw-r--r-- 1 admin root 37355 Jun 13 16:34 local.Sandbox-persistence.xml
... output was cut for brevity ...
-rw-r--r-- 1 admin root 2278 Jun 13 16:34 local.vsx_cluster_netobj
-rw-r--r-- 1 admin root 5172 Jun 13 16:34 local.{939922F7-DF98-4988-B776-B70B9B8340F3}
-rw-r--r-- 1 admin root 10328 Jun 13 16:34 local.{B9D14722-3936-4B33-814B-F87EA4062BEB}
-rw-r----- 1 admin root 14743 Jun 13 16:34 manifest.C
-rw-r--r-- 1 admin root 7381 Jun 13 16:34 policy.info
-rw-r--r-- 1 admin root 2736 Jun 13 16:34 policy.map
-rw-r--r-- 1 admin root 51 Jun 13 16:34 sig.map
[Expert@GW:0]#
[Expert@GW:0]# comp_init_policy -u
erasing local state..
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 0
[Expert@GW:0]#
[Expert@GW:0]# comp_init_policy -g
initial_module:
Compiled OK.
initial_module:
Compiled OK.
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 56
-rw-rw---- 1 admin root 8 Jul 19 19:51 local.ctlver
-rw-rw---- 1 admin root 4514 Jul 19 19:51 local.fc
-rw-rw---- 1 admin root 4721 Jul 19 19:51 local.fc6
-rw-rw---- 1 admin root 235 Jul 19 19:51 local.ft
-rw-rw---- 1 admin root 317 Jul 19 19:51 local.ft6
-rw-rw---- 1 admin root 135 Jul 19 19:51 local.fwrl.conf
-rw-rw---- 1 admin root 14 Jul 19 19:51 local.ifs
-rw-rw---- 1 admin root 833 Jul 19 19:51 local.inspect.lf
-rw-rw---- 1 admin root 243 Jul 19 19:51 local.lg
-rw-rw---- 1 admin root 243 Jul 19 19:51 local.lg6
-rw-rw---- 1 admin root 0 Jul 19 19:51 local.magic
-rw-rw---- 1 admin root 3 Jul 19 19:51 local.set
-rw-rw---- 1 admin root 51 Jul 19 19:51 sig.map
[Expert@GW:0]#
Warning - If you connect over SSH, the "Initial Policy" blocks your connection.
cd $FWDIR/state/local/
tar cvf /var/log/FW1_Policy_Bkp.tar FW1
rm $FWDIR/state/local/FW1/*
comp_init_policy
fw fetch local
8. In SmartConsole, make the required changes and install the Access Control policy on
the Security Gateway / Cluster.
control_bootsec
Description
Controls the boot security - loading of both the Default Filter policy (defaultfilter) and the
Initial Policy (InitialPolicy) during boot on a Security Gateway, or a Cluster Member.
Warning - If you disable the boot security, you leave your Security Gateway, or a
Cluster Member without any protection during the boot. Before you disable the boot
security, we recommend to disconnect your Security Gateway, or a Cluster Member
from the network completely.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Notes:
n You must run this command from the Expert
mode.
n The changes made with this command survive
reboot.
n Refer to these related commands:
l "comp_init_policy" on page 913
Syntax
Parameters
Parameter Description
[Expert@GW:0]# cd $FWDIR/state/local/FW1/
[Expert@GW:0]#
[Expert@GW:0]# pwd
/opt/CPsuite-R80.40/fw1/state/local/FW1
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 7736
-rw-rw---- 1 admin root 11085 Jul 19 20:16 install_policy_report.txt
-rw-rw---- 1 admin root 56 Jul 19 20:16 install_policy_report_timing.txt
-rw-rw---- 1 admin root 37355 Jul 19 20:16 local.Sandbox-persistence.xml
-rw-rw---- 1 admin root 3 Jul 19 20:16 local.ad_query_profiles
... ... ...
-rw-r----- 1 admin root 14743 Jul 19 20:16 manifest.C
-rw-rw---- 1 admin root 7381 Jul 19 20:16 policy.info
-rw-rw---- 1 admin root 2736 Jul 19 20:16 policy.map
-rw-rw---- 1 admin root 51 Jul 19 20:16 sig.map
[Expert@GW:0]#
[Expert@GW:0]# $FWDIR/bin/control_bootsec -r
Disabling boot security
FW-1 will not load a default filter on boot
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 0
[Expert@GW:0]#
[Expert@GW:0]# cd $FWDIR/state/local/FW1/
[Expert@GW:0]#
[Expert@GW:0]# pwd
/opt/CPsuite-R80.40/fw1/state/local/FW1
[Expert@GW:0]#
[Expert@GW:0]# control_bootsec -g
Enabling boot security
[Expert@GW:0]#
[Expert@GW:0]# ls -l
total 56
-rw-rw---- 1 admin root 8 Jul 19 20:22 local.ctlver
-rw-rw---- 1 admin root 4514 Jul 19 20:22 local.fc
-rw-rw---- 1 admin root 4721 Jul 19 20:22 local.fc6
-rw-rw---- 1 admin root 235 Jul 19 20:22 local.ft
-rw-rw---- 1 admin root 317 Jul 19 20:22 local.ft6
-rw-rw---- 1 admin root 135 Jul 19 20:22 local.fwrl.conf
-rw-rw---- 1 admin root 14 Jul 19 20:22 local.ifs
-rw-rw---- 1 admin root 833 Jul 19 20:22 local.inspect.lf
-rw-rw---- 1 admin root 243 Jul 19 20:22 local.lg
-rw-rw---- 1 admin root 243 Jul 19 20:22 local.lg6
-rw-rw---- 1 admin root 0 Jul 19 20:22 local.magic
-rw-rw---- 1 admin root 3 Jul 19 20:22 local.set
-rw-rw---- 1 admin root 51 Jul 19 20:22 sig.map
[Expert@GW:0]#
cp_conf
Description
Configures or reconfigures a Check Point product installation.
Note - The available options for each Check Point computer depend on the
configuration and installed products.
cp_conf
-h
admin <options>
auto <options>
ca <options>
client <options>
finger <options>
lic <options>
snmp <options>
cp_conf
-h
adv_routing <options>
auto <options>
corexl <options>
fullha <options>
ha <options>
intfs <options>
lic <options>
sic <options>
snmp <options>
Parameters
Parameter Description
Parameter Description
auto Shows and configures the automatic start of Check Point products
<options> during boot.
See "cp_conf auto" on page 61.
client Configures the GUI clients that can use SmartConsole to connect to the
<options> Security Management Server.
See "cp_conf client" on page 65.
Parameter Description
cp_conf auto
Description
Shows and controls which of Check Point products start automatically during boot.
Note - This command corresponds to the option Automatic start of Check Point
Products in the "cpconfig" on page 124 menu.
Note - On a Multi-Domain Server, use the option Automatic Start of Multi-Domain
Server in the "mdsconfig" on page 717 menu.
Syntax
cp_conf auto
-h
{enable | disable} <Product1> <Product2> ...
get all
Parameters
Parameter Description
[Expert@MGMT:0]#
[Expert@GW:0]#
cp_conf corexl
Description
Enables or disables CoreXL.
For more information, see the R80.40 Performance Tuning Administration Guide.
Important:
n This command is for Check Point use only.
To configure CoreXL, use the Check Point CoreXL option in the "cpconfig" on
page 936 menu.
n After all changes in CoreXL configuration on the Security Gateway, you must
reboot it.
n In Custer, you must configure all the Cluster Members in the same way.
Syntax
n To enable CoreXL with 'n' IPv4 Firewall instances and optionally 'k' IPv6 Firewall
instances:
n To disable CoreXL:
Parameters
Parameter Description
Example
Currently, the Security Gateway runs two IP4v CoreXL Firewall instances (KERN_INSTANCE_
NUM = 2).
We change the number of IP4v CoreXL Firewall instances to three.
cp_conf fullha
Description
Manages the state of the Full High Availability Cluster:
n Enables the Full High Availability Cluster
n Disables the Full High Availability Cluster
n Deletes the Full High Availability peer
n Shows the Full High Availability state
Important - To configure a Full High Availability cluster, follow the R80.40 Installation
and Upgrade Guide.
Syntax
cp_conf fullha
enable
del_peer
disable
state
Parameters
Parameter Description
del_peer Deletes the Full High Availability peer from the configuration.
Example
cp_conf ha
Description
Enables or disables cluster membership on this Security Gateway.
Important - This command is for Check Point use only. To configure cluster
membership, you must use the "cpconfig" on page 936 command.
For more information, see the R80.40 ClusterXL Administration Guide.
Syntax
Parameters
Parameter Description
norestart Optional: Specifies to apply the configuration change without the restart of
Check Point services. The new configuration takes effect only after reboot.
Example 1 - Enable the cluster membership without restart of Check Point services
[Expert@MyGW:0]#
Example 2 - Disable the cluster membership without restart of Check Point services
[Expert@MyGW:0]#
cp_conf intfs
Description
Sets the topology of interfaces on a Security Gateway, which you manage with
SmartProvisioning.
For more information, see the R80.40 SmartProvisioning Administration Guide.
Syntax
cp_conf intfs
get
set
auxiliary <Name of Interface>
DMZ <Name of Interface>
external <Name of Interface>
internal <Name of Interface>
Parameters
Parameter Description
cp_conf lic
Description
Shows, adds and deletes Check Point licenses.
Note - This command corresponds to the option Licenses and contracts in the
"cpconfig" on page 124 menu.
Note:
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
cp_conf lic
-h
add -f <Full Path to License File>
add -m <Host> <Date> <Signature Key> <SKU/Features>
del <Signature Key>
get [-x]
Parameters
Parameter Description
add -f <Full Path to Adds a license from the specified Check Point
License File> license file.
You get this license file in the Check Point User
Center.
This is the same command as the "cplic db_add" on
page 135.
cp_conf sic
Description
Manages SIC on the Security Gateway.
For additional information, see sk65764: How to reset SIC.
Syntax
cp_conf
-h
sic
cert_pull <Management Server> <DAIP GW object>
init <Activation Key> [norestart]
state
Parameters
Parameter Description
cert_pull For DAIP Security Gateways, pulls a SIC certificate from the
<Management Server> specified Management Server for the specified DAIP
<DAIP GW object> Security Gateway:
n <Management Server> - IPv4 address or HostName of
the Security Management Server or Domain
Management Server
n <DAIP GW object> - Name of the DAIP Security
Gateway object as configured in SmartConsole
Example
[Expert@MyGW:0]#
cpconfig
Description
This command starts the Check Point Configuration Tool.
This tool configures specific settings for the installed Check Point products.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Syntax
cpconfig
Menu Options
Note - The options shown depend on the configuration and installed products.
Licenses and contracts Manages Check Point licenses and contracts on this
Security Gateway or Cluster Member.
Enable cluster membership Enables the cluster membership on the Security Gateway.
for this gateway This change requires a reboot of the Security Gateway.
For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Disable cluster membership Disables the cluster membership on the Security Gateway.
for this gateway This change requires a reboot of the Security Gateway.
For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Enable Check Point Per Enables Virtual System Load Sharing on the VSX Cluster
Virtual System State Member.
For more information, see the R80.40 VSX Administration
Guide.
Disable Check Point Per Disables Virtual System Load Sharing on the VSX Cluster
Virtual System State Member.
For more information, see the R80.40 VSX Administration
Guide.
Enable Check Point Enables Check Point ClusterXL for Bridge mode.
ClusterXL for Bridge This change requires a reboot of the Cluster Member.
Active/Standby For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Disable Check Point Disables Check Point ClusterXL for Bridge mode.
ClusterXL for Bridge This change requires a reboot of the Cluster Member.
Active/Standby For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Automatic start of Check Shows and controls which of the installed Check Point
Point Products products start automatically during boot.
[Expert@MySingleGW:0]# cpconfig
This program will let you re-configure
your Check Point products configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) SNMP Extension
(3) PKCS#11 Token
(4) Random Pool
(5) Secure Internal Communication
(6) Enable cluster membership for this gateway
(7) Check Point CoreXL
(8) Automatic start of Check Point Products
(9) Exit
[Expert@MyClusterMember:0]# cpconfig
This program will let you re-configure
your Check Point products configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) SNMP Extension
(3) PKCS#11 Token
(4) Random Pool
(5) Secure Internal Communication
(6) Disable cluster membership for this gateway
(7) Enable Check Point Per Virtual System State
(8) Enable Check Point ClusterXL for Bridge Active/Standby
(9) Check Point CoreXL
(10) Automatic start of Check Point Products
(11) Exit
cpinfo
Description
A utility that collects diagnostics data on your Check Point computer at the time of execution.
It is mandatory to collect these data when you contact Check Point Support about an issue on
your Check Point server.
For more information, see sk92739.
cplic
Description
The cplic command manages Check Point licenses.
You can run this command in Gaia Clish or in the Expert Mode.
License Management is divided into three types of commands:
Licensing
Applies To Description
Commands
For more about managing licenses, see the R80.40 Security Management Administration
Guide.
cplic [-d]
{-h | -help}
check <options>
contract <options>
del <options>
print <options>
put <options>
Parameters
Parameter Description
check Confirms that the license includes the feature on the local Security
<options> Gateway or Security Management Server.
See "cplic check" on page 942.
contract Manages (deletes and installs) the Check Point Service Contract on the
<options> local Check Point computer.
See "cplic contract" on page 944.
print Prints details of the installed Check Point licenses on the local Check
<options> Point computer.
See "cplic print" on page 947.
cplic check
Description
Confirms that the license includes the feature on the local Security Gateway or Management
Server. See sk66245.
Syntax
Parameters
Parameter Description
Parameter Description
cplic contract
Description
Deletes the Check Point Service Contract on the local Check Point computer.
Installs the Check Point Service Contract on the local Check Point computer.
Note
n For more information about Service Contract files, see sk33089: What is a
Service Contract File?
n If you install a Service Contract on a managed Security Gateway / Cluster
Member, you must update the license repository on the applicable Management
Server - either with the "cplic get" on page 142 command, or in SmartUpdate.
Syntax
cplic contract -h
cplic [-d] contract
del
-h
<Service Contract ID>
put
-h
[{-o | -overwrite}] <Service Contract File>
Parameters
Parameter Description
cplic del
Description
Deletes a Check Point license on a host, including unwanted evaluation, expired, and other
licenses.
This command can delete a license on both local computer, and on remote managed
computers.
Syntax
Parameters
Parameter Description
<Object The name of the Security Gateway / Cluster Member object as defined
Name> in SmartConsole.
cplic print
Description
Prints details of the installed Check Point licenses on the local Check Point computer.
Note - On a Security Gateway / Cluster Member, this command prints all installed
licenses (both Local and Central).
Syntax
Parameters
Parameter Description
Example 1
Example 2
cplic put
Description
Installs one or more Local licenses on a Check Point computer.
Note - You get the license details in the Check Point User Center.
Syntax
Parameters
Parameter Description
{-c | -check- Verifies the license. Checks if the IP of the license matches the Check
only} Point computer and if the signature is valid.
{-s | - Selects only the local license whose IP address matches the IP
select} address of the Check Point computer.
{-P | -Pre- Use this option after you have upgraded and before you reboot the
boot} Check Point computer.
Use of this option will prevent certain error messages.
Parameter Description
< The SKU of the license summarizes the features included in the
SKU/Features> license.
For example: CPSUITE-EVAL-3DES-vNG
Copy and paste the parameters from the license received from the User Center:
Parameter Description
SKU/features A string listing the SKU and the Certificate Key of the license.
The SKU of the license summarizes the features included in the
license.
For example: CPSB-SWB CPSB-ADNC-M CK0123456789ab
Example
cpprod_util
Description
This utility works with Check Point Registry ($CPDIR/registry/HKLM_registry.data)
without manually opening it:
n Shows which Check Point products and features are enabled on this Check Point
computer.
n Enables and disables Check Point products and features on this Check Point computer.
Syntax
Parameters
Parameter Description
"< Specifies the configuration parameter for the specified product or feature.
Parameter
>"
"<Value>" Specifies the value of the configuration parameter for the specified
product or feature:
n One of these integers: 0, 1, 4
n A string
Notes
n On a Multi-Domain Server, you must run this command in the context of the relevant
Domain Management Server.
n If you run the cpprod_util command without parameters, it prints:
l The list of all available products and features (for example,
"FwIsFirewallMgmt", "FwIsLogServer", "FwIsStandAlone")
l The type of the expected argument when you configure a product or feature ("no-
parameter", "string-parameter", or "integer-parameter")
l The type of the returned output ("status-output", or "no-output")
n To redirect the output of the cpprod_util command, it is necessary to redirect the
stderr to stdout:
Example:
Examples
Example - Showing a list of all installed Check Point Products Packages on a Management
Server
[Expert@MGMT:0]# cpprod_util CPPROD_GetInstalledProducts
CPFC
IDA
MGMT
FW1
SecurePlatform
NGXCMP
EdgeCmp
SFWCMP
SFWR75CMP
SFWR77CMP
FLICMP
R75CMP
R7520CMP
R7540CMP
R76CMP
R77CMP
PROVIDER-1
Reporting Module
SmartLog
CPinfo
VSEC
DIAG
[Expert@MGMT:0]#
Example - Checking if this Check Point computer is configured as a dedicated Log Server
[Expert@MGMT:0]# cpprod_util FwIsLogServer
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the SmartEvent Server blade is enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerServer
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the SmartEvent Correlation Unit blade is
enabled
[Expert@MGMT:0]# cpprod_util RtIsAnalyzerCorrelationUnit
1
[Expert@MGMT:0]#
Example - Checking if on this Management Server the Endpoint Policy Management blade is
enabled
[Expert@MGMT:0]# cpprod_util UepmIsInstalled
1
[Expert@MGMT:0]#
Example - Showing a list of all installed Check Point Products Packages on a Security Gateway
[Expert@MyGW:0]# cpprod_util CPPROD_GetInstalledProducts
CPFC
IDA
MGMT
FW1
SecurePlatform
CPinfo
DIAG
PPACK
CVPN
[Expert@MyGW:0]#
Example - Checking if this Security Gateway is configured with Dynamically Assigned IP (DAIP)
[Expert@MyGW:0]# cpprod_util FwIsDAG
0
[Expert@MyGW:0]#
cpstart
Description
Manually starts all Check Point processes and applications.
Syntax
Log Files
n $CPDIR/cpstart.log
n /opt/CPInstLog/cpstart_error.log
cpstat
Description
Displays the status and statistics information of Check Point applications.
Syntax
cpstat [-d] [-h <Host>] [-p <Port>] [-s <SICname>] [-f <Flavor>]
[-o <Polling Interval> [-c <Count>] [-e <Period>]] <Application
Flag>
Note - You can write the parameters in the syntax in any order.
Parameters
Parameter Description
-h <Host> Optional.
When you run this command on a Management Server, this parameter
specifies the managed Security Gateway.
<Host> is an IPv4 address, a resolvable hostname, or a DAIP object
name.
The default is localhost.
Note - On a Multi-Domain Server, you must run this command in
the context of the applicable Domain Management Server:mdsenv
<IP Address or Name of Domain Management Server>.
-p <Port> Optional.
Port number of the Application Monitoring (AMON) server.
The default port is 18192.
-s <SICname> Optional.
Secure Internal Communication (SIC) name of the Application
Monitoring (AMON) server.
Parameter Description
-f <Flavor> Optional.
Specifies the type of the information to collect.
If you do not specify a flavor explicitly, the command uses the first flavor
in the <Application Flag>. To see all flavors, run the cpstat
command without any parameters.
-o <Polling Optional.
Interval> Specifies the polling interval (in seconds) - how frequently the
command collects and shows the information.
Examples:
n 0 - The command shows the results only once and the stops (this
is the default value).
n 5 - The command shows the results every 5 seconds in the loop.
n 30 - The command shows the results every 30 seconds in the
loop.
n N - The command shows the results every N seconds in the loop.
Use this parameter together with the "-c <Count>" parameter and the
"-e <Period>" parameter.
Example:
cpstat os -f perf -o 2
-c <Count> Optional.
Specifies how many times the command runs and shows the results
before it stops.
You must use this parameter together with the "-o <Polling
Interval>" parameter.
Examples:
n 0 - The command shows the results repeatedly every <Polling
Interval> (this is the default value).
n 10 - The command shows the results 10 times every <Polling
Interval> and then stops.
n 20 - The command shows the results 20 times every <Polling
Interval> and then stops.
n N - The command shows the results N times every <Polling
Interval> and then stops.
Example:
cpstat os -f perf -o 2 -c 2
Parameter Description
-e <Period> Optional.
Specifies the time (in seconds), over which the command calculates the
statistics.
You must use this parameter together with the "-o <Polling
Interval>" parameter.
You can use this parameter together with the "-c <Count>"
parameter.
Example:
cpstat os -f perf -o 2 -c 2 -e 60
<Application Mandatory.
Flag> See the table below with flavors for the application flags.
Note - The available flags depend on the enabled Software Blades. Some flags are
supported only by a Security Gateway, and some flags are supported only by a
Management Server.
Feature or
Flag Flavors
Software Blade
Feature or
Flag Flavors
Software Blade
Anti-Virus ci default
Feature or
Flag Flavors
Software Blade
QoS fg all
Feature or
Flag Flavors
Software Blade
Provisioning PA default
Agent
Examples
Example - Interfaces on a Security Gateway
[Expert@MyGW:0]# cpstat -f interfaces fw
Network interfaces
---------------------------------------------------------------------------------------------
-----------------------
|Name|IP |Netmask |Flags|Peer name|Remote IP|Topology|Proxy
name|Slaves|Ports|IPv6 Address|IPv6 Len|
---------------------------------------------------------------------------------------------
-----------------------
|eth0|192.168.30.40|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth1| 172.30.60.80|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth2| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth3| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth4| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth5| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth6| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth7| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
---------------------------------------------------------------------------------------------
-----------------------
[Expert@MyGW:0]#
Interface table
---------------------------------------
|Name|Dir|Total |Accept|Deny |Log|
---------------------------------------
|eth0|in | 2393126| 32589| 2360537| 52|
|eth0|out| 33016| 33016| 0| 0|
|eth1|in | 2360350| 0| 2360350| 0|
|eth1|out| 0| 0| 0| 0|
|eth2|in | 2360350| 0| 2360350| 0|
|eth2|out| 0| 0| 0| 0|
|eth3|in | 2348704| 0| 2348704| 1|
|eth3|out| 0| 0| 0| 0|
|eth4|in | 2360350| 0| 2360350| 0|
|eth4|out| 0| 0| 0| 0|
---------------------------------------
| | |11855896| 65605|11790291| 53|
---------------------------------------
[Expert@MyGW:0]#
[Expert@HostName:0]#
Example - Performance
[Expert@HostName:0]# cpstat os -f perf -o 2 -c 2 -e 60
[Expert@HostName:0]#
Connected clients
-------------------------------------------------------
|Client type |Administrator|Host |Database lock|
-------------------------------------------------------
|SmartConsole|admin |JOHNDOE-PC |false |
-------------------------------------------------------
[Expert@MGMT:0]#
cpstop
Description
Manually stops all Check Point processes and applications.
Syntax
Parameters
Important - These parameters are for Check Point internal use. Do not use them,
unless explicitly instructed by Check Point Support or R&D to do so.
Parameter Description
Note - Only security rules that do not use user space processes continue to
work.
cpview
Overview of CPView
Description
CPView is a text based built-in utility on a Check Point computer.
CPView Utility shows statistical data that contain both general system information (CPU,
Memory, Disk space) and information for different Software Blades (only on Security
Gateway).
The CPView continuously updates the data in easy to access views.
On Security Gateway, you can use this statistical data to monitor the performance.
For more information, see sk101878.
Syntax
cpview --help
Section Description
Header This view shows the time the statistics in the third view are collected.
It updates when you refresh the statistics.
Navigation This menu bar is interactive. Move between menus with the arrow keys and
mouse.
A menu can have sub-menus and they show under the menu bar.
Using CPView
Use these keys to navigate the CPView:
Key Description
Q Quits CPView.
Key Description
Use these keys to save statistics, show help, and refresh statistics:
Key Description
C Saves the current page to a file. The file name format is:
cpview_<ID of the cpview process>.cap<Number of the
capture>
dynamic_objects
Description
Manages dynamic objects and their applicable ranges of IP addresses on the Security
Gateway.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Workflow
Step Instructions
1 In SmartConsole:
1. Define the applicable dynamic object.
2. Install the Access Control Policy on the Security Gateway.
Syntax
n To show all configured dynamic objects and their ranges of IP addresses:
dynamic_objects -l
n To update the specific existing dynamic object (and assign a different range of IP
addresses to it):
dynamic_objects -c
n To delete the specific existing dynamic object (and all ranges of IP addresses assigned
to it):
n To delete all the existing dynamic objects (and all ranges of IP addresses assigned to
them):
dynamic_objects -e
Parameters
Parameter Description
Example 1 - Create a new dynamic object named "bigserver" and assign to it the range of
IP addresses 192.168.2.30-192.168.2.40
Run either these two commands:
dynamic_objects -n bigserver
dynamic_objects -o bigserver -r 192.168.2.30 192.168.2.40 -a
Example 2 - Update the ranges of IP addresses assigned to the dynamic object named
"bigserver" from the current range to the new range 192.168.2.60-192.168.2.80
dynamic_objects -u bigserver -r 192.168.2.60 192.168.2.80
cpwd_admin
Description
The Check Point WatchDog (cpwd) is a process that invokes and monitors critical processes
such as Check Point daemons on the local computer, and attempts to restart them if they fail.
Among the processes monitored by Watchdog are fwm, fwd, cpd, DAService, and others.
The list of monitored processes depends on the installed and configured Check Point products
and Software Blades.
The Check Point WatchDog writes monitoring information to the $CPDIR/log/cpwd.elg log
file.
The cpwd_admin utility shows the status of the monitored processes, and configures the
Check Point WatchDog.
Monitoring Description
Passive WatchDog restarts the process only when the process terminates
abnormally.
In the output of the cpwd_admin list command, the MON column shows
N for passively monitored processes.
Syntax
cpwd_admin
config <options>
del <options>
detach <options>
exist
flist <options>
getpid <options>
kill
list <options>
monitor_list
start <options>
start_monitor
stop <options>
stop_monitor
Parameters
Parameter Description
Parameter Description
stop_ Stops the active WatchDog monitoring - WatchDog monitors all processes
monitor only passively.
See "cpwd_admin stop_monitor" on page 230.
cpwd_admin config
Description
Configures the Check Point WatchDog.
Important - After changing the WatchDog configuration parameters, you must restart
the WatchDog process with the cpstop and cpstart commands (which restart all
Check Point processes).
Syntax
cpwd_admin config
-h
-a <options>
-d <options
-p
-r
Parameters
Parameter Description
These are the available configuration parameters and the accepted values:
Configuration Accepted
Description
Parameter Values
default_ctx Text string up to On a VSX Gateway, configures the CTX value that is
128 characters assigned to monitored processes, for which no CTX
is specified.
reset_ n Range: > 0 Configures the time (in seconds) the WatchDog
startups n Default: waits after the process starts and before the
3600 WatchDog resets the process's startup_counter
to 0.
To see the process's startup counter, in the output of
the cpwd_admin list command, refer to the
#START column.
Configuration Accepted
Description
Parameter Values
stop_timeout n Range: > 0 Configures the time (in seconds) the WatchDog
n Default: 60 waits for a process stop command to complete.
Example
Description
Configures the Check Point WatchDog.
Important - After changing the WatchDog configuration parameters, you must restart
the WatchDog process with the cpstop and cpstart commands (which restart all
Check Point processes).
Syntax
cpwd_admin config
-h
-a <options>
-d <options
-p
-r
Parameters
Parameter Description
Parameter Description
These are the available configuration parameters and the accepted values:
Configuration Accepted
Description
Parameter Values
default_ctx Text string up to On a VSX Gateway, configures the CTX value that is
128 characters assigned to monitored processes, for which no CTX
is specified.
Configuration Accepted
Description
Parameter Values
reset_ n Range: > 0 Configures the time (in seconds) the WatchDog
startups n Default: waits after the process starts and before the
3600 WatchDog resets the process's startup_counter
to 0.
To see the process's startup counter, in the output of
the cpwd_admin list command, refer to the
#START column.
stop_timeout n Range: > 0 Configures the time (in seconds) the WatchDog
n Default: 60 waits for a process stop command to complete.
Example
cpwd_admin del
Description
Temporarily deletes a monitored process from the WatchDog database of monitored
processes.
Notes:
n WatchDog stops monitoring the detached process, but the process stays alive.
n The "cpwd_admin list" on page 218 command does not show the deleted
process anymore.
n This change applies until all Check Point services restart during boot, or with the
"cpstart" on page 191 command.
Parameters
Parameter Description
<Application Name of the monitored Check Point process as you see in the output of
Name> the "cpwd_admin list" on page 218 command in the leftmost column
APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual
System.
Example
cpwd_admin detach
Description
Temporarily detaches a monitored process from the WatchDog monitoring.
Notes:
n WatchDog stops monitoring the detached process, but the process stays alive.
n The "cpwd_admin list" on page 218 command does not show the detached
process anymore.
n This change applies until all Check Point services restart during boot, or with the
"cpstart" on page 191 command.
Parameters
Parameter Description
<Application Name of the monitored Check Point process as you see in the output of
Name> the "cpwd_admin list" on page 218 command in the leftmost column
APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual
System.
Example
cpwd_admin exist
Description
Checks whether the WatchDog process cpwd is alive.
Syntax
cpwd_admin exist
Example
cpwd_admin flist
Description
Saves the status of all WatchDog monitored processes to a file
Parameters
Parameter Description
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Output
Column Description
CTX On a VSX Gateway, shows the VSID, in which the monitored process
runs.
#START Shows how many times the WatchDog started the monitored process.
START_TIME Shows the time when the WatchDog started the monitored process for the
last time.
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_
limit configuration parameters (see "cpwd_admin config" on page 207).
MON Shows how the WatchDog monitors this process (see the explanation for
the "cpwd_admin" on page 204):
n Y - Active monitoring
n N - Passive monitoring
COMMAND Shows the command the WatchDog run to start this process.
Example
cpwd_admin getpid
Description
Shows the PID of a WatchDog monitored process.
Parameters
Parameter Description
<Application Name of the monitored Check Point process as you see in the output of
Name> the "cpwd_admin list" on page 218 command in the leftmost column
APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On VSX Gateway, specifies the context of the applicable Virtual
System.
Example
cpwd_admin kill
Description
Terminates the WatchDog process cpwd.
Important - Do not run this command unless explicitly instructed by Check Point
Support or R&D to do so.
To restart the WatchDog process, you must restart all Check Point services with the
"cpstop" on page 201 and "cpstart" on page 191 commands.
Syntax
cpwd_admin kill
cpwd_admin list
Description
Prints the status of all WatchDog monitored processes on the screen.
Parameters
Parameter Description
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual System.
Output
Column Description
CTX On a VSX Gateway, shows the VSID, in which the monitored process
runs.
#START Shows how many times the WatchDog started the monitored process.
START_TIME Shows the time when the WatchDog started the monitored process for the
last time.
SLP/LIMIT In verbose output, shows the values of the sleep_timeout and no_
limit configuration parameters (see "cpwd_admin config" on page 207).
MON Shows how the WatchDog monitors this process (see the explanation for
the "cpwd_admin" on page 204):
n Y - Active monitoring
n N - Passive monitoring
COMMAND Shows the command the WatchDog run to start this process.
Examples
Example - Default output on a Management Server
[Expert@HostName:0]# cpwd_admin list
APP PID STAT #START START_TIME MON COMMAND
CPVIEWD 19738 E 1 [17:50:44] 31/5/2019 N cpviewd
HISTORYD 0 T 0 [17:54:44] 31/5/2019 N cpview_historyd
CPD 19730 E 1 [17:54:45] 31/5/2019 Y cpd
SOLR 19935 E 1 [17:50:55] 31/5/2019 N java_solr /opt/CPrt-
R80.40/conf/jetty.xml
RFL 19951 E 1 [17:50:55] 31/5/2019 N LogCore
SMARTVIEW 19979 E 1 [17:50:55] 31/5/2019 N SmartView
INDEXER 20032 E 1 [17:50:55] 31/5/2019 N /opt/CPrt-R80.40/log_indexer/log_
indexer
SMARTLOG_SERVER 20100 E 1 [17:50:55] 31/5/2019 N /opt/CPSmartLog-
R80.40/smartlog_server
CP3DLOGD 20237 E 1 [17:50:55] 31/5/2019 N cp3dlogd
EPM 20251 E 1 [17:50:56] 31/5/2019 N startEngine
DASERVICE 20404 E 1 [17:50:59] 31/5/2019 N DAService_script
[Expert@HostName:0]#
cpwd_admin monitor_list
Description
Prints the status of actively monitored processes on the screen.
See the explanation about the active monitoring in "cpwd_admin" on page 204.
Syntax
cpwd_admin monitor_list
Example
cpwd_admin start
Description
Starts a process as monitored by the WatchDog.
Parameters
Parameter Description
-name Name, under which the cpwd_admin list command shows the
<Application monitored process in the leftmost column APP.
Name> Examples:
n FWM
n FWD
n CPD
n CPM
-ctx <VSID> On a VSX Gateway, specifies the context of the applicable Virtual
System.
Parameter Description
-path "<Full The full path (with or without Check Point environment variables)
Path to to the executable including the executable name.
Executable>" Must enclose in double quotes.
Examples:
n For FWM: "$FWDIR/bin/fwm"
n For FWD: "/opt/CPsuite-R80.40/fw1/bin/fw"
n For CPD: "$CPDIR/bin/cpd"
n For CPM: "/opt/CPsuite-
R80.40/fw1/scripts/cpm.sh"
n For SICTUNNEL: "/opt/CPshrd-R80.40/bin/cptnl"
-env {inherit | Configures whether to inherit the environment variables from the
<Env_ shell.
Var>=<Value>}
n inherit - Inherits all the environment variables (WatchDog
supports up to 80 environment variables)
n <Env_Var>=<Value> - Assigns the specified value to the
specified environment variable
Example
For the list of process and the applicable syntax, see sk97638.
cpwd_admin start_monitor
Description
Starts the active WatchDog monitoring. WatchDog monitors the predefined processes
actively.
See the explanation for the "cpwd_admin" on page 204 command.
Syntax
cpwd_admin start_monitor
Example
cpwd_admin stop
Description
Stops a WatchDog monitored process.
Parameters
Parameter Description
-name <Application Name under which the cpwd_admin list command shows
Name> the monitored process in the leftmost column APP.
Examples:
n FWM
n FWD
n CPD
n CPM
-path "<Full Path The full path (with or without Check Point environment
to Executable>" variables) to the executable including the executable name.
Must enclose in double quotes.
Examples:
n For FWM: "$FWDIR/bin/fwm"
n For FWD: "/opt/CPsuite-R80.40/fw1/bin/fw"
n For CPD: "$CPDIR/bin/cpd_admin"
Parameter Description
Example
For the list of process and the applicable syntax, see sk97638.
cpwd_admin stop_monitor
Description
Stops the active WatchDog monitoring. WatchDog monitors all processes only passively.
See the explanation for the "cpwd_admin" on page 204 command.
Syntax
cpwd_admin stop_monitor
Example
fw
Description
n Fetches and unloads Threat Prevention policy.
n Controls the Firewall module.
n Generates the Default Filter policy files.
n Fetches the policy from the Management Server, peer Cluster Member, or local
directory.
n Fetches the specified Security or Audit log files from the specified Check Point computer.
n Shows the list of interfaces and their IP addresses.
n Shows information about Check Point computers in High Availability configuration and
their states.
n Controls ISP links in ISP Redundancy configuration.
n Kills the specified Check Point processes.
n Shows a list of hosts protected by the Security Gateway.
n Shows the content of Check Point log files.
n Switches the current active log file.
n Shows a list of Security or Audit log files.
n Merges several input log files into a single log file.
n Runs FW Monitor to capture the traffic that passes through the Security Gateway.
n Rebuilds pointer files for Security or Audit log files.
n Manages the Suspicious Activity Monitoring (SAM) rules.
n Manages the Suspicious Activity Policy editor.
n Shows the contents of the Unified Policy kernel tables.
n Shows the currently installed policy.
n Shows and deletes the contents of the specified kernel tables.
n Executes the offline Unified Policy.
n Removes all policies from the Security Gateway or Cluster Member.
n Shows the Security Gateway major and minor version number and build number.
Syntax
fw [-d] [-i]
amw <options>
ctl <options>
defaultgen
fetch <options>
fetchlogs <options>
getifs
hastat <options>
isp_link <options>
kill <options>
lichosts <options>
log <options>
logswitch <options>
lslogs <options>
mergefiles <options>
repairlog <options>
sam <options>
sam_policy <options>
showuptables <options>
stat
tab <options>
unloadlocal
up_execute <options>
ver <options>
Parameters
Parameter Description
Parameter Description
fetch Fetches the policy from the Management Server, peer Cluster
<options> Member, or local directory.
See "fw fetch" on page 1048.
log <options> Shows the content of Check Point log files - Security
($FWDIR/log/*.log) or Audit ($FWDIR/log/*.adtlog).
See "fw log" on page 1058.
Parameter Description
monitor Runs FW Monitor to capture the traffic that passes through the
<options> Security Gateway.
See "fw monitor" on page 1078.
tab <options> Shows and deletes the contents of the specified kernel tables.
See "fw tab" on page 1152.
unloadlocal Uninstalls all policies from the Security Gateway or Cluster Member.
See "fw unloadlocal" on page 1161.
ver <options> Shows the Security Gateway major and minor version number and
build number.
See "fw ver" on page 1168.
fw -i
Description
By default, the "fw" on page 1004 commands apply to the entire Security Gateway.
The fw commands show aggregated information for all CoreXL Firewall instances.
The fw -i commands apply to the specified CoreXL Firewall instance.
Syntax
Parameters
Parameter Description
fw amw
Description
Fetches and unloads Threat Prevention policy.
Threat Prevention policy applies to these Software Blades:
n Anti-Bot
n Anti-Spam
n Anti-Virus
n IPS
n Threat Emulation
n Threat Extraction
Syntax
n To fetch the Threat Prevention policy from the Management Server:
n To fetch the Threat Prevention policy from a peer Cluster Member, and, if it fails, then
from the Management Server:
n To fetch the Threat Prevention policy from the specified Check Point computer(s):
fw [-d] amw fetch [-i] [-n] [-r] <Master 1> [<Master 2> ...]
n To fetch the Threat Prevention policy stored locally on the Security Gateway:
n To fetch the Threat Prevention policy stored locally on the Security Gateway in the
specified directory:
Parameters
Parameter Description
fw amw Fetches the Threat Prevention policy from the specified Check Point
fetch computer(s).
These can be a Management Server, or a peer Cluster Member.
fw amw Fetches the Threat Prevention policy that is stored locally on the Security
fetch local Gateway in the $FWDIR/state/local/AMW/ directory.
fw amw
fetch
localhost
fw amw Fetches the Threat Prevention policy that stored locally on the Security
fetchlocal Gateway in the specified directory.
fw amw Unloads the current Threat Prevention policy from the Security Gateway.
unload Important - This significantly decreases the security on the Security
Gateway. This is the same as if you disable the Threat Prevention
Software Blades on the Security Gateway.
-c Specifies that you fetch the policy from a peer Cluster Member.
Notes:
n Must also use the "-f" parameter.
n Works only in cluster.
-f Specifies that you fetch the policy from a Management Server listed in
the $FWDIR/conf/masters file.
-lu Specifies to perform a late update - to load signatures just after the
Security Gateway copies the policy files to the local directory
$FWDIR/state/local/AMW/.
-n Specifies not to load the fetched policy, if it is the same as the policy
already located on the Security Gateway.
Parameter Description
<Master 1> Specifies the Check Point computer(s), from which to fetch the Threat
[<Master 2> Prevention policy.
...] You can fetch the Threat Prevention policy from the Management
Server, or a peer Cluster Member.
Notes:
n If you fetch the Threat Prevention policy from the Management
Server, you can enter one of these:
l The main IP address of the Management Server object.
Member.
n If the fetch from the first specified <Master> fails, the Security
Gateway fetches the policy from the second specified
<Master> , and so on. If the Security Gateway fails to connect
to each specified <Masters>, the Security Gateway fetches
the policy from the localhost.
n If you do not specify the <Masters> explicitly, the Security
Gateway fetches the policy from the localhost.
-d <Full Specifies local directory on the Security Gateway, from which to fetch the
Path to Threat Prevention policy files.
Directory>
Example
fw ctl
Description
Controls the Firewall kernel module.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Syntax
fw [-d] ctl
arp <options>
bench <options>
block <options>
chain
conn
conntab <options>
cpasstat <options>
debug <options>
get <options>
iflist
install
kdebug <options>
pstat <options>
set <options>
tcpstrstat <options>
uninstall
Parameters
Parameter Description
Parameter Description
bench Runs the CPU benchmark tests that collect these statistics:
<options>
n FireWall Lock Statistics
n Outbound Packets Statistics
n Inbound Packets Statistics
See "fw ctl bench" on page 1016.
block Blocks all connections to, from, and through the Security Gateway.
<options> See "fw ctl block" on page 1018.
cpasstat Generates statistics report about Check Point Active Streaming (CPAS).
<options> See "fw ctl cpasstat" on page 1027.
debug Generates kernel debug messages from Check Point Firewall kernel to
<options> a debug buffer.
See "'fw ctl debug' and 'fw ctl kdebug'" on page 1028.
dlpkstat Generates statistics report about Data Loss Prevention kernel module.
<options> See "fw ctl dlpkstat" on page 1029.
Parameter Description
kdebug Generates kernel debug messages from Check Point Firewall kernel to
<options> a debug buffer.
See "'fw ctl debug' and 'fw ctl kdebug'" on page 1028.
set Configures the specified value for the specified kernel parameter.
<options> See "fw ctl set" on page 1040.
uninstall Tells the operating system to stop passing packets to Firewall, and
unloads the current Security Policy.
See "fw ctl uninstall" on page 1045.
fw ctl arp
Description
Shows the configured Proxy ARP entries based on the $FWDIR/conf/local.arp file on the
Security Gateway.
For more information about the Proxy ARP, see sk30197.
Syntax
Parameters
Parameter Description
fw ctl bench
Description
The benchmark mechanism provides a way to measure the time spent in the code between
two points.
This command runs the CPU benchmark tests that collect these statistics:
n FireWall Lock Statistics
n Outbound Packets Statistics
n Inbound Packets Statistics.
Note - This command writes the output of these tests to the dmesg.
Syntax
Parameters
Parameter Description
Parameter Description
lock Runs the lock benchmark that collects the FireWall Lock Statistics.
[ioctl[ Available options:
<Limit>]]
[packet
n No parameters - Starts the lock benchmark.
[<Limit>]]
n ioctl - Calculates the IOCTL flow statistics.
[stop]
n packet - Calculates the packet flow statistics.
n <Limit> - Specifies the time limit (in seconds) for the
benchmark to run. Default is 10 seconds. Maximum is 200
seconds.
n stop - Stops the current lock benchmark.
packet Runs the packet benchmark test that collects these statistics:
[{<Limit> |
stop}]
n Outbound Packets Statistics
n Inbound Packets Statistics
Available options:
n No parameters - Starts the packet benchmark.
n <Limit> - Specifies the time limit (in seconds) for the
benchmark to run. Default is 10 seconds. Maximum is 200
seconds.
n stop - Stops the current packet benchmark.
fw ctl block
Description
Blocks all connections to, from, and through the Security Gateway.
Important - The "fw ctl block on" command immediately blocks all connections
without a prompt and regardless the currently installed policy. To unblock the
connections, you must either reboot the Security Gateway, or connect to the Security
Gateway over a serial console (or Lights Out Management Card) and run the "fw
ctl block off" command.
Syntax
Parameters
Parameter Description
fw ctl chain
Description
Shows the list of Firewall Chain Modules.
This list shows various inspection Chain Modules, through which the traffic passes on this
Security Gateway.
The available Chain Modules depend on the configuration and enabled Software Blades.
Important - In Cluster, outputs of this command must be the same on all the Cluster
Members.
Syntax
Parameters
Parameter Description
Example
fw ctl conn
Description
Shows the list of Firewall Connection Modules.
This list shows various inspection Connection Modules, through which the traffic passes on
this Security Gateway.
The available Connection Modules depend on the configuration and enabled Software Blades.
Important - In Cluster, outputs of this command must be the same on all the Cluster
Members.
Syntax
Parameters
Parameter Description
Example
fw ctl conntab
Description
Shows formatted list of current connections from the Connections kernel table (ID 8158).
Use this command if you want to see the simplified information about the current connections.
Best Practices:
n Use the "fw ctl conntab" command to see the simplified information about
the current connections.
n Use the "fw tab -t connections -f" command ("fw tab" on page 1152) to
see the detailed (and more technical) information about the current
connections.
Syntax
Parameters
Parameter Description
Parameter Description
Examples
Example 1 - Default output
[Expert@MyGW:0]# fw ctl conntab
<(inbound, src=[192.168.204.1,54201], dest=[192.168.204.40,22], TCP); 3593/3600, rule=2, tcp state=TCP_ESTABLISHED, service=ssh(481),
Ifncin=1, Ifncout=1, conn modules: Authentication, FG-1>
<(outbound, src=[192.168.204.40,59249], dest=[192.168.204.1,53], UDP); 20/40, rule=0, service=domain-udp(335), Ifnsout=1, conn
modules: Authentication, FG-1>
<(outbound, src=[192.168.204.40,37892], dest=[192.168.204.1,53], UDP); 20/40, rule=0, service=domain-udp(335), Ifnsin=1, Ifnsout=1,
conn modules: Authentication, FG-1>
[Expert@MyGW:0]#
Example 10 - Formatted detailed output from the Connections table (for comparison)
[Expert@MyGW:0]# fw tab -t connections -f
localhost:
Date: Sep 10, 2018
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; :
(+)====================================(+); Table_Name: connections; : (+); Attributes: dynamic, id 8158, attributes: keep, sync,
aggressive aging, kbufs 21 22 23 24 25 26 27 28 29 30 31 32 33 34, expires 25, refresh, , hashsize 2097152, unlimited;
LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : -----
------------------------------(+); Direction: 1; Source: 192.168.204.40; SPort: 54201; Dest: 192.168.204.1; DPort: 53; Protocol: udp;
CPTFMT_sep: ;; Type: 131073; Rule: 0; Timeout: 335; Handler: 0; Ifncin: -1; Ifncout: -1; Ifnsin: -1; Ifnsout: 1; Bits:
0000780000000000; Expires: 23/40; LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : -----
------------------------------(+); Direction: 0; Source: 192.168.204.1; SPort: 53; Dest: 192.168.204.40; DPort: 54201; Protocol: udp;
CPTFMT_sep_1: ->; Direction_1: 1; Source_1: 192.168.204.40; SPort_1: 54201; Dest_1: 192.168.204.1; DPort_1: 53; Protocol_1: udp; FW_
symval: 2054; LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : -----
------------------------------(+); Direction: 1; Source: 192.168.204.40; SPort: 22; Dest: 192.168.204.1; DPort: 54201; Protocol: tcp;
CPTFMT_sep_1: ->; Direction_2: 0; Source_2: 192.168.204.1; SPort_2: 54201; Dest_2: 192.168.204.40; DPort_2: 22; Protocol_2: tcp; FW_
symval: 2053; LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : -----
------------------------------(+); Direction: 0; Source: 192.168.204.1; SPort: 54201; Dest: 192.168.204.40; DPort: 22; Protocol: tcp;
CPTFMT_sep: ;; Type: 114689; Rule: 2; Timeout: 481; Handler: 0; Ifncin: 1; Ifncout: 1; Ifnsin: -1; Ifnsout: -1; Bits:
02007800000f9000; Expires: 3596/3600; LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : -----
------------------------------(+); Direction: 0; Source: 192.168.204.1; SPort: 53; Dest: 192.168.204.40; DPort: 44966; Protocol: udp;
CPTFMT_sep_1: ->; Direction_1: 1; Source_1: 192.168.204.40; SPort_1: 44966; Dest_1: 192.168.204.1; DPort_1: 53; Protocol_1: udp; FW_
symval: 2054; LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
11:30:56 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : -----
------------------------------(+); Direction: 1; Source: 192.168.204.40; SPort: 44966; Dest: 192.168.204.1; DPort: 53; Protocol: udp;
CPTFMT_sep: ;; Type: 131073; Rule: 0; Timeout: 335; Handler: 0; Ifncin: -1; Ifncout: -1; Ifnsin: 1; Ifnsout: 1; Bits:
0000780000000000; Expires: 23/40; LastUpdateTime: 10Sep2018 11:30:56; ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
[Expert@MyGW:0]#
fw ctl cpasstat
Description
Generates statistics report about Check Point Active Streaming (CPAS).
Syntax
Parameters
Parameter Description
Description
These commands generate kernel debug messages from Check Point Firewall kernel to a
debug buffer.
For more information, see the R80.40 Quantum Security Gateway Guide - Chapter Kernel
Debug on Security Gateway.
fw ctl dlpkstat
Description
Generates statistics report about Data Loss Prevention, inspected HTTP requests, and
Identity Awareness Captive Portal.
This report contains these statistics:
Category Information
Identity Awareness - Captive Portal HTTP requests redirected to the Captive Portal
Syntax
Parameters
Parameter Description
fw ctl get
Description
Shows the current value of the specified kernel parameter.
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n In VSX Gateway, the configured values of kernel parameters apply to all
existing Virtual Systems and Virtual Routers.
Notes:
n Kernel parameters let you change the advanced behavior of your Security
Gateway.
n There are two types of kernel parameters - integer and string.
n Security Gateway gets the names and the default values of the kernel
parameters from these kernel module files:
l $FWDIR/boot/modules/fw_kern_64.o
l $FWDIR/boot/modules/fw_kern_64_v6.o
l $FWDIR/boot/modules/fw_kern_64_3_10_64.o
l $FWDIR/boot/modules/fw_kern_64_3_10_64_v6.o
l $PPKDIR/boot/modules/sim_kern_64.o
l $PPKDIR/boot/modules/sim_kern_64_v6.o
l $PPKDIR/boot/modules/sim_kern_64_3_10_64.o
l $PPKDIR/boot/modules/sim_kern_64_3_10_64_v6.o
Syntax
Parameters
Parameter Description
fw ctl iflist
Description
Shows the list with this information:
n The name of interfaces, to which the Check Point Firewall kernel attached.
n The internal numbers of the interfaces in the Check Point Firewall kernel.
Notes:
n This list shows all detected interfaces, even if there are no IP addresses
assigned on them.
n You use this list when you analyze a kernel debug, which shows only the
internal numbers of the interfaces (for example, ifn=2).
n Related "cpstat" on page 958 commands:
l cpstat -f ifconfig os
l cpstat -f interfaces fw
Syntax
Parameters
Parameter Description
Example
fw ctl install
Description
Tells the operating system to start passing packets to Firewall.
This command runs automatically when the Security Gateway or an administrator runs the
"cpstart" on page 957 command.
Warning - If you run the "fw ctl uninstall" on page 1045 command and then the "fw
ctl install" command, it does not restore the Security Policy.
You must run one of these commands: "fw fetch" on page 1048, or "cpstart" on
page 957.
Syntax
Parameters
Parameter Description
fw ctl leak
Description
Generates leak detection report. This report is for Check Point use only.
Important - This command save the report into the active /var/log/messages file
and the dmesg buffer.
Syntax
Parameters
Parameter Description
-o <Internal Specifies to perform leak detection for the specified internal object ID.
Object ID>
Parameter Description
-t <Internal Specifies the internal object types, for which to perform leak
Object Type> detection.
Available internal object types are:
n chain
n connh
n cookie
n kbuf
n num
If you do not specify the internal object type explicitly, the command
performs leak detection for all internal object types.
Procedure
Step Instructions
6 Generate the leak detection report (see the Syntax section above):
[Expert@GW_HostName:0]# fw [-d] ctl leak
<options>
Step Instructions
Example
[Expert@MyGW:0]# cp -v /var/log/messages{,_BKP}
`/var/log/messages' -> `/var/log/messages_BKP'
[Expert@MyGW:0]#
[Expert@MyGW:0]# echo '' > /var/log/messages
[Expert@MyGW:0]#
[Expert@MyGW:0]# dmesg -c
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw ctl leak -s
[Expert@MyGW:0]#
[Expert@MyGW:0]# dmesg
[fw4_0];fwleak_report: type chain - 0 objects
[fw4_0];fwleak_report: type cookie - 0 objects
[fw4_0];fwleak_report: type kbuf - 0 objects
[fw4_0];fwleak_report: type connh - 0 objects
[fw4_1];fwleak_report: type chain - 0 objects
[fw4_1];fwleak_report: type cookie - 0 objects
[fw4_1];fwleak_report: type kbuf - 0 objects
[fw4_1];fwleak_report: type connh - 0 objects
[fw4_2];fwleak_report: type chain - 0 objects
[fw4_2];fwleak_report: type cookie - 0 objects
[fw4_2];fwleak_report: type kbuf - 0 objects
[fw4_2];fwleak_report: type connh - 0 objects
[Expert@MyGW:0]#
[Expert@MyGW:0]# cat /var/log/messages
Sep 12 16:09:50 2019 MyGW kernel: [fw4_0];fwleak_report: type chain - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_0];fwleak_report: type cookie - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_0];fwleak_report: type kbuf - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_0];fwleak_report: type connh - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_1];fwleak_report: type chain - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_1];fwleak_report: type cookie - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_1];fwleak_report: type kbuf - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_1];fwleak_report: type connh - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_2];fwleak_report: type chain - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_2];fwleak_report: type cookie - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_2];fwleak_report: type kbuf - 0 objects
Sep 12 16:09:50 2019 MyGW kernel: [fw4_2];fwleak_report: type connh - 0 objects
[Expert@MyGW:0]
[Expert@MyGW:0]# cp -v /var/log/messages{,_LEAK_DETECTION}
`/var/log/messages' -> `/var/log/messages_LEAK_DETECTION'
[Expert@MyGW:0]#
fw ctl pstat
Description
Shows Security Gateway various internal statistics:
n System Capacity Summary
n Hash kernel memory (hmem) statistics
n System kernel memory (smem) statistics
n Kernel memory (kmem) statistics
n Cookies
n Connections
n Fragments
n NAT
n Handles
Syntax
fw [-d] ctl pstat [-c] [-h] [-k] [-l] [-m] [-o] [-s] [-v {4 | 6}]
Parameters
Parameter Description
Parameter Description
-v 4 Shows statistics for IPv4 (-v 4) traffic only, or for IPv6 (-v 4) traffic only.
-v 6 Default is to show statistics for both IPv4 and IPv6 traffic.
Examples
Example 1 - fw ctl pstat
[Expert@MyGW:0]# fw ctl pstat
Cookies:
91808 total, 0 alloc, 0 free,
2 dup, 91808 get, 0 put,
182258 len, 909 cached len, 0 chain alloc,
0 chain free
Connections:
0 total, 0 TCP, 0 UDP, 0 ICMP,
0 other, 0 anticipated, 0 recovered, -3 concurrent,
0 peak concurrent
Fragments:
0 fragments, 0 packets, 0 expired, 0 short,
0 large, 0 duplicates, 0 failures
NAT:
0/0 forw, 0/0 bckw, 0 tcpudp,
0 icmp, 0-0 alloc
[Expert@MyGW:0]#
fw ctl set
Description
Configures the specified value for the specified kernel parameter.
Important:
n In a Cluster, you must configure all the Cluster Members in the same way.
n In VSX Gateway, the configured values of kernel parameters apply to all
existing Virtual Systems and Virtual Routers.
n The configuration made with this command without the "-f" flag does not
survive reboot.
To make this configuration permanent, you must edit one of the applicable
configuration files:
l $FWDIR/boot/modules/fwkern.conf
l $FWDIR/boot/modules/vpnkern.conf
l $PPKDIR/conf/simkern.conf
Notes:
n Kernel parameters control the advanced behavior of your Security Gateway.
n There are two types of kernel parameters - integer and string.
n Security Gateway gets the names and the default values of the kernel
parameters from these kernel module files:
l $FWDIR/boot/modules/fw_kern_64_3_10_64.o
l $FWDIR/boot/modules/fw_kern_64_3_10_64_v6.o
l $FWDIR/boot/modules/fw_kern_64_3_10_64_sp.o
l $FWDIR/boot/modules/fw_kern_64_3_10_64_sp_v6.o
l $PPKDIR/boot/modules/adp_kern_64_3_10_64.o
l $PPKDIR/boot/modules/sim_kern_64_3_10_64.o
l $PPKDIR/boot/modules/sim_kern_64_3_10_64_v6.o
Syntax
Parameters
Parameter Description
<Integer Value> Specifies the integer value for the integer kernel parameter.
'<String Value>' Specifies the string value for the string kernel parameter.
fw ctl tcpstrstat
Description
Generates statistics report about TCP Streaming.
Syntax
Parameters
Parameter Description
General Counters:
=================
Connections:
Concurrent num of connections ............. 0
Concurrent num of si connections .......... 0
Packets:
Total num of packets ...................... 2567
Total packets in bytes .................... 202394
Concurrent num of async packets ........... 0
Memory:
Allocated memory in bytes ................. 0
Referenced skbuffs num .................... 0
Referenced skbuffs size in bytes .......... 0
External packet references................. 0
Allocated memory per connection ........... 0
Rejected packets/connections:
Total num of rejected packets ............. 0
Dropped packets/connections:
Total num of dropped packets .............. 0
Stripped/Truncated packets:
Total num of stripped packets ............. 0
Total num of truncated packets ............ 0
Paused packets:
Total num of c2s|s2c paused packets ....... 0 | 0
Concurrent num of UDP held packets ........ 0
Applications Counters:
======================
Application Name: ASPII_MT
Connections:
Total num of connections .................. 954
Concurrent num of connections ............. 0
Total num of c2s|s2c connections .......... 954 | 954
Concurrent num of c2s|s2c connections ..... 0 | 0
Packets:
Total num of c2s|s2c data packets ......... 2567 | 0
Total c2s|s2c data packets in bytes ....... 130518 | 0
FastForward Counters:
=====================
FF connection:
Total num of c2s|s2c FFconns .............. 0 | 0
Total num of c2s|s2c saved packets ........ 0 | 0
Total num of c2s|s2c bytes requests ....... 0 | 0
Total num of c2s|s2c saved bytes .......... 0 | 0
[Expert@MyGW:0]#
fw ctl uninstall
Description
1. Tells the operating system to stop passing packets to Firewall.
2. Unloads the current Security Policy.
3. Unloads the current Firewall Chain Modules (see "fw ctl chain" on page 1019).
4. Unloads the current Firewall Connection Modules except for RTM (see "fw ctl conn" on
page 1021).
Warnings:
1. If you run the "fw ctl uninstall" command, the networks behind the
Security Gateway become unprotected.
2. If you run the "fw ctl uninstall" command and then the "fw ctl install" on
page 1033 command, it does not restore the Security Policy.
You must run one of these commands: "fw fetch" on page 1048, or "cpstart" on
page 957.
Syntax
Parameters
Parameter Description
fw defaultgen
Description
Manually generates the Default Filter policy files.
Refer to these related commands:
n "comp_init_policy" on page 913
n "control_bootsec" on page 917
n "fwboot default" on page 1185
n "fwboot bootconf" on page 1172
Syntax
fw [-d] defaultgen
Parameters
Parameter Description
If the Default Filter policy file already exists, the command creates a
backup copy ($FWDIR/state/default.bin.bak and
$FWDIR/state/default.bin6.bak).
Example
[Expert@MyGW:0]# fw defaultgen
Generating default filter
defaultfilter:
Compiled OK.
defaultfilter:
Compiled OK.
Backing up default.bin as default.bin.bak
hostaddr(MyGW) failed
Backing up default.bin6 as default.bin6.bak
[Expert@MyGW:0]#
fw fetch
Description
Fetches the Security Policy from the specified host and installs it to the kernel.
Syntax
n To fetch the policy from the Management Server:
n To fetch the policy from a peer Cluster Member, and, if it fails, then from the
Management Server:
fw [-d] fetch [-i] [-n] [-r] <Master 1> [<Master 2> ...]
n To fetch the policy stored locally on the Security Gateway in the default directory
$FWDIR/state/:
n To fetch the policy stored locally on the Security Gateway in the specified directory:
Parameters
Parameter Description
Parameter Description
-c Specifies that you fetch the policy from a peer Cluster Member.
Notes:
n Must also use the "-f" parameter.
n Works only in cluster.
-f Specifies that you fetch the policy from a Management Server listed
in the $FWDIR/conf/masters file.
-n Specifies not to load the fetched policy, if it is the same as the policy
already located on the Security Gateway.
Parameter Description
<Master 1> Specifies the Check Point computer(s), from which to fetch the
[<Master 2> policy.
...] You can fetch the policy from the Management Server, or a peer
Cluster Member.
Notes:
n If you fetch the policy from the Management Server, you
can enter one of these:
l The main IP address of the Management Server
object.
l The object name of the Management Server.
Member.
n If the fetch from the first specified <Master> fails, the
Security Gateway fetches the policy from the second
specified <Master> , and so on. If the Security Gateway
fails to connect to each specified <Masters>, the
Security Gateway fetches the policy from the localhost.
n If you do not specify the <Masters> explicitly, the
Security Gateway fetches the policy from the localhost.
-d <Full Path Specifies the local directory on the Security Gateway, from which to
to Directory> fetch the policy files.
fw fetchlogs
Description
Fetches the specified Security log files ($FWDIR/log/*.log*) or Audit log files
($FWDIR/log/*.adtlog*) from the specified Check Point computer.
Syntax
fw [-d] fetchlogs [-f <Name of Log File 1>] [-f <Name of Log File
2>]... [-f <Name of Log File N>] <Target>
Parameters
Parameter Description
-f <Name Specifies the name of the log file to fetch. Need to specify name only.
of Log Notes:
File N>
n If you do not specify the log file name explicitly, the command
transfers all Security log files ($FWDIR/log/*.log*) and all Audit
log files ($FWDIR/log/*.adtlog*).
n The specified log file name can include wildcards * and ? (for
example, 2017-0?-*.log).
If you enter a wildcard, you must enclose it in double quotes or single
quotes.
n You can specify multiple log files in one command.
You must use the -f parameter for each log file name pattern.
n This command also transfers the applicable log pointer files.
<Target> Specifies the remote Check Point computer, with which this local Check
Point computer has established SIC trust.
n If you run this command on a Security Management Server or Domain
Management Server, then <Target> is the applicable object's name
or main IP address of the Check Point Computer as configured in
SmartConsole.
n If you run this command on a Security Gateway or Cluster Member,
then <Target> is the main IP address of the applicable object as
configured in SmartConsole.
Notes:
n This command moves the specified log files from the $FWDIR/log/ directory on the
specified Check Point computer. Meaning, it deletes the specified log files on the
specified Check Point computer after it copies them successfully.
n This command moves the specified log files to the $FWDIR/log/ directory on the local
Check Point computer, on which you run this command.
n This command cannot fetch the active log files $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog.
To fetch these active log files:
1. Perform log switch on the applicable Check Point computer:
2. Fetch the rotated log file from the applicable Check Point computer:
n This command renames the log files it fetched from the specified Check Point computer.
The new log file name is the concatenation of the Check Point computer's name (as
configured in SmartConsole), two underscore (_) characters, and the original log file
name (for example: MyGW__2019-06-01_000000.log).
[Expert@HostName:0]# ls $FWDIR/log/MyGW*
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.log
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.logaccount_ptr
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.loginitial_ptr
/opt/CPsuite-R80.40/fw1/log/MyGW__2019-06-01_000000.logptr
[Expert@HostName:0]#
fw getifs
Description
Shows the list with this information:
n The name of interfaces, to which the Check Point Firewall kernel attached.
n The IP addresses assigned to the interfaces.
Notes:
n This list shows only interfaces that have IP addresses assigned on
them.
n Related "cpstat" on page 958 commands:
l cpstat -f ifconfig os
l cpstat -f interfaces fw
Syntax
fw [-d] getifs
Parameters
Parameter Description
Example
[Expert@MyGW:0]# fw getifs
localhost eth0 192.168.30.40 255.255.255.0
localhost eth1 172.30.60.80 255.255.255.0
[Expert@MyGW:0]#
fw hastat
Description
Shows information about Check Point computers in High Availability configuration and their
states.
Note - This command is outdated. On cluster members, run the Gaia Clish command
"show cluster state", or the Expert mode command "cphaprob state".
Note - This command is outdated. On Management Servers, run the "cpstat" on
page 192 command.
Syntax
Parameters
Parameter Description
[Expert@Member1:0]# fw hastat
HOST NUMBER HIGH AVAILABILITY STATE MACHINE STATUS
192.168.3.52 1 active OK
[Expert@Member1:0]#
fw isp_link
Description
Controls the state of ISP Links in the ISP Redundancy configuration on Security Gateway.
See the R80.40 Quantum Security Gateway Guide.
Syntax
fw [-d] isp_link
{-h | -help}
[<Name of Object>] <Name of ISP Link>
down
up
Parameters
Parameter Description
<Name of The name of the ISP Link as defined in the Security Gateway or Cluster
ISP Link> object:
1. In SmartConsole, from the left navigation panel, click Gateways &
Servers.
2. Open the Security Gateway or Cluster object.
3. From the left tree, click Other > ISP Redundancy.
fw kill
Description
Kills the specified Check Point processes.
Important - Make sure the killed process is restarted, or restart it manually. See sk97638.
Syntax
Parameters
Parameter Description
Example
fw kill fwd
fw lichosts
Description
Shows IP addresses of internal hosts that Security Gateway detected and counted based on
the installed license.
Syntax
Parameters
Parameter Description
Example
[Expert@MyGW:0]# fw lichosts
License allows an unlimited number of hosts
[Expert@MyGW:0]
Related SK article
sk10200 - 'too many internal hosts' error in /var/log/messages on Security Gateway.
fw log
Description
Shows the content of Check Point log files - Security ($FWDIR/log/*.log) or Audit
($FWDIR/log/*.adtlog).
Syntax
Parameters
Parameter Description
Parameter Description
-b "<Start Shows only entries that were logged between the specified start and
Timestamp>" end times.
"<End
Timestamp>"
n The <Start Timestamp> and <End Timestamp> may be a
date, a time, or both.
n If date is omitted, then the command assumes the current date.
n Enclose the "<Start Timestamp>" and "<End
Timestamp> in single or double quotes (-b 'XX' 'YY", or -b
"XX" "YY).
n You cannot use the "-b" parameter together with the "-s" or "-
e" parameters.
n See the date and time format below.
-c <Action> Shows only events with the specified action. One of these:
n accept
n drop
n reject
n encrypt
n decrypt
n vpnroute
n keyinst
n authorize
n deauthorize
n authcrypt
n ctl
Notes:
n The fw log command always shows the Control (ctl) actions.
n For login action, use the authcrypt.
-e "<End Shows only entries that were logged before the specified time.
Timestamp>" Notes:
n The <End Timestamp> may be a date, a time, or both.
n Enclose the <End Timestamp> in single or double quotes (-e
'...', or -e "...").
n You cannot use the "-e" parameter together with the "-b"
parameter.
n See the date and time format below.
Parameter Description
-f This parameter:
1. Shows the saved entries that match the specified conditions.
2. After the command reaches the end of the currently opened log
file, it continues to monitor the log file indefinitely and shows the
new entries that match the specified conditions.
Note - Applies only to the active log file $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-h <Origin> Shows only logs that were generated by the Security Gateway with
the specified IP address or object name (as configured in
SmartConsole).
l mail
l snmp_trap
l spoof
l user_alert
l user_auth
n all - Show entries that match all alert types (this is the default).
-l Shows both the date and the time for each log entry.
The default is to show the date only once above the relevant entries,
and then specify the time for each log entry.
Parameter Description
-n Does not perform DNS resolution of the IP addresses in the log file
(this is the default behavior).
This significantly speeds up the log processing.
-o Shows detailed log chains - shows all the log segments in the log
entry.
-p Does not perform resolution of the port numbers in the log file (this is
the default behavior).
This significantly speeds up the log processing.
-s "<Start Shows only entries that were logged after the specified time.
Timestamp>" Notes:
n The <Start Timestamp> may be a date, a time, or both.
n If the date is omitted, then the command assumed the current
date.
n Enclose the <Start Timestamp> in single or double quotes
(-s '...', or -s "...").
n You cannot use the "-s" parameter together with the "-b"
parameter.
n See the date and time format below.
Parameter Description
-t This parameter:
1. Does not show the saved entries that match the specified
conditions.
2. After the command reaches the end of the currently opened log
file, it continues to monitor the log file indefinitely and shows the
new entries that match the specified conditions.
Note - Applies only to the active log file $FWDIR/log/fw.log or
$FWDIR/log/fw.adtlog
-u Specifies the path and name of the log unification scheme file.
<Unification The default log unification scheme file is:
Scheme File> $FWDIR/conf/log_unification_scheme.C
-w Shows the flags of each log entry (different bits used to specify the
"nature" of the log - for example, control, audit, accounting,
complementary, and so on).
-x <Start Shows only entries from the specified log entry number and below,
Entry Number> counting from the beginning of the log file.
-y <End Entry Shows only entries until the specified log entry number, counting from
Number> the beginning of the log file.
Output
Each output line consists of a single log entry, whose fields appear in this format:
Note - The fields that show depends on the connection type.
ContentVersion Version 5
LogId Log ID 0
Examples
Example 1 - Show all log entries with both the date and the time for each log entry
fw log -l
Example 2 - Show all log entries that start after the specified timestamp
[Expert@MyGW:0]# fw log -l -s "June 12, 2018 12:33:00"
12Jun2018 12:33:00 5 N/A 1 accept MyGW > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; fg-1_client_in_rule_name: Default; fg-1_client_out_rule_name: Default; fg-1_server_in_rule_name: Host
Redirect; fg-1_server_out_rule_name: ; ProductName: FG; ProductFamily: Network;
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_match_
table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_
uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table: TABLE_START; ROW_
START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933;
ProductFamily: Network;
[Expert@MyGW:0]#
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_match_
table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_
uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table: TABLE_START; ROW_
START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933;
ProductFamily: Network;
12Jun2018 12:33:45 5 N/A 1 ctl MyGW > LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; description: Contracts; reason: Could not reach
"https://productcoverage.checkpoint.com/ProductCoverageService". Check DNS and Proxy configuration on the gateway.; Severity: 2;
status: Failed; version: 1.0; failure_impact: Contracts may be out-of-date; update_service: 1; ProductName: Security
Gateway/Management; ProductFamily: Network;
[Expert@MyGW:0]#
Example 5 - Show all log entries with action "drop", show all field headers, and show log flags
[Expert@MyGW:0]# fw log -l -q -w -c drop
HeaderDateHour: 12Jun2018 12:33:39; ContentVersion: 5; HighLevelLogKey: <max_null>; LogUid: ; SequenceNum: 1; Flags: 428292; Action:
drop; Origin: MyGW; IfDir: <; InterfaceName: eth0; Alert: ; LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_
Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_match_
table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_
uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table: TABLE_START; ROW_
START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933;
ProductFamily: Network;
[Expert@MyGW:0]#
Example 6 - Show only log entries from 0 to 10 (counting from the beginning of the log file)
[Expert@MyGW:0]# fw log -l -x 0 -y 10
... ...
[Expert@MyGW:0]#
fw logswitch
Description
Switches the current active log file:
1. Closes the current active log file
2. Renames the current active log file
3. Creates a new active log file with the default name
Notes:
n By default, this command switches the active Security log file -
$FWDIR/log/fw.log
n You can specify to switch the active Audit log file - $FWDIR/log/fw.adtlog
Syntax
fw [-d] logswitch
[-audit] [<Name of Switched Log>]
-h <Target> [[+ | -]<Name of Switched Log>]
Parameters
Parameter Description
Parameter Description
+ Specifies to copy the active log from the remote computer to the local
computer.
Notes:
n If you specify the name of the switched log file, you must write it
immediately after this + (plus) parameter.
n The command copies the active log from the remote computer and
saves it in the $FWDIR/log/ directory on the local computer.
n The default name of the saved log file is:
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
For example, MyGW__2018-03-26_174455.log
n If you specify the name of the switched log file, then the name of the
saved log file is:
<Gateway_Object_Name>__<Specified_Log_Name>.log
n When this command copies the log file from the remote computer, it
compresses the file.
Parameter Description
- Specifies to transfer the active log from the remote computer to the local
computer.
Notes:
n The command saves the copied active log file in the $FWDIR/log/
directory on the local computer and then deletes the switched log file
on the remote computer.
n If you specify the name of the switched log file, you must write it
immediately after this - (minus) parameter.
n The default name of the saved log file is:
<Gateway_Object_Name>__<YYYY-MM-DD_HHMMSS>.log
For example, MyGW__2018-03-26_174455.log
n If you specify the name of the switched log file, then the name of the
saved log file is:
<Gateway_Object_Name>__<Specified_Log_Name>.log
n When this command transfers the log file from the remote computer, it
compresses the file.
n As an alternative, you can use the "fw fetchlogs" on page 246
command.
Compression
When this command transfers the log files from the remote computer, it compresses the file
with the gzip command (see RFC 1950 to RFC 1952 for details). The algorithm is a variation
of LZ77 method. The compression ratio varies with the content of the log file and is difficult to
predict. Binary data are not compressed. Text data, such as user names and URLs, are
compressed.
Example - Switching the active Security log on a Security Management Server or Security
Gateway
[Expert@MGMT:0]# fw logswitch
Log file has been switched to: 2018-06-13_182359.log
[Expert@MGMT:0]#
Example - Switching the active Security log on a managed Security Gateway and copying the
switched log
[Expert@MGMT:0]# fw logswitch -h MyGW +
Log file has been switched to: 2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MGMT:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R80.40/fw1/log/fw.log
/opt/CPsuite-R80.40/fw1/log/MyGW__2018-06-13_185451.log
[Expert@MGMT:0]#
[Expert@MyGW:0]# ls $FWDIR/log/*.log
/opt/CPsuite-R80.40/fw1/log/fw.log
/opt/CPsuite-R80.40/fw1/log/2018-06-13_185451.log
[Expert@MyGW:0]#
fw lslogs
Description
Shows a list of Security log files ($FWDIR/log/*.log) and Audit log files
($FWDIR/log/*.adtlog) residing on the local computer or a remote computer.
Syntax
fw [-d] lslogs [-f <Name of Log File 1>] [-f <Name of Log File 2>]
... [-f <Name of Log File N>] [-e] [-r] [-s {name | size | stime |
etime}] [<Target>]
Parameters
Parameter Description
-f <Name Specifies the name of the log file to show. Need to specify name only.
of Log Notes:
File>
n If the log file name is not specified explicitly, the command shows all
Security log files ($FWDIR/log/*.log).
n File names may include * and ? as wildcards (for example, 2019-
0?-*). If you enter a wildcard, you must enclose it in double quotes or
single quotes.
n You can specify multiple log files in one command. You must use the
"-f" parameter for each log file name pattern:
-f <Name of Log File 1> -f <Name of Log File 2>
... -f <Name of Log File N>
-e Shows an extended file list. It includes the following information for each log
file:
n Size - The total size of the log file and its related pointer files
n Creation Time - The time the log file was created
n Closing Time - The time the log file was closed
n Log File Name - The file name
Parameter Description
-s {name | Specifies the sort order of the log files using one of the following sort
size | options:
stime |
etime}
n name - The file name
n size - The file size
n stime - The time the log file was created (this is the default option)
n etime - The time the log file was closed
<Target> Specifies the remote Check Point computer, with which this local Check
Point computer has established SIC trust.
n If you run this command on a Security Management Server or
Domain Management Server, then <Target> is the applicable
object's name or main IP address of the Check Point Computer as
configured in SmartConsole.
n If you run this command on a Security Gateway or Cluster Member,
then <Target> is the main IP address of the applicable object as
configured in SmartConsole.
[Expert@HostName:0]# fw lslogs
Size Log file name
9KB 2019-06-14_000000.log
11KB 2019-06-15_000000.log
9KB 2019-06-16_000000.log
10KB 2019-06-17_000000.log
9KB fw.log
[Expert@HostName:0]#
Example 4 - Showing only log files specified by the patterns and their extended
information
Example 5 - Showing only log files specified by the patterns, sorting by name in reverse
order
Example 6 - Showing only log files specified by the patterns, from a managed Security
Gateway with main IP address 192.168.3.53
fw mergefiles
Description
Merges several Security log files ($FWDIR/log/*.log) into a single log file.
Merges several Audit log files ($FWDIR/log/*.adtlog) into a single log file.
Important:
n Do not merge the active Security file $FWDIR/log/fw.log with other Security
switched log files.
Switch the active Security file $FWDIR/log/fw.log (with the "fw logswitch" on
page 1068 command) and only then merge it with other Security switched log
files.
n Do not merge the active Audit file $FWDIR/log/fw.adtlog with other Audit
switched log files.
Switch the active Audit file $FWDIR/log/fw.adtlog (with the "fw logswitch"
on page 1068 command) and only then merge it with other Audit switched log
files.
n This command unifies logs entries with the same Unique-ID (UID). If you rotate
the current active log file before all the segments of a specific log arrive, this
command merges the records with the same Unique ID from two different files,
into one fully detailed record.
n If the size of the final merged log file exceeds 2GB, this command creates a list
of merged files, where the size of each merged file size is not more than 2GB.
The user receives this warning:
Warning: The size of the files you have chosen to merge
is greater than 2GB. The merge will produce two or more
files.
The names of merged files are:
l <Name of Merged Log File>.log
l <Name of Merged Log File>_1.log
l <Name of Merged Log File>_2.log
l ... ...
Syntax
Parameters
Parameter Description
-t <Time Conversion Specifies a full path and name of a file that instructs this
File> command how to adjust the times during the merge.
This is required if you merge log files from Log Servers
configured with different time zones.
The file format is:
<IP Address of Log Server #1> <Signed
Date Time #1 in Seconds>
<IP Address of Log Server #2> <Signed
Date Time #2 in Seconds>
... ...
Notes
n You must specify the absolute path and the file
name.
n The name of the time conversion file cannot
exceed 230 characters.
Parameter Description
[Expert@HostName:0]# ls -l $FWDIR/*.log
-rw-rw-r-- 1 admin root 189497 Sep 7 00:00 2019-09-07_000000.log
-rw-rw-r-- 1 admin root 14490 Sep 9 09:52 2019-09-09_000000.log
-rw-rw-r-- 1 admin root 30796 Sep 10 10:56 2019-09-10_000000.log
-rw-rw-r-- 1 admin root 24503 Sep 10 13:08 fw.log
[Expert@HostName:0]#
[Expert@HostName:0]# fw mergefiles -s $FWDIR/2019-09-07_000000.log $FWDIR/2019-09-09_000000.log
$FWDIR/2019-09-10_000000.log /var/log/2019-Sep-Merged.log
[Expert@HostName:0]#
[Expert@HostName:0]# ls -l /var/log/2019-Sep-Merged.log*
-rw-rw---- 1 admin root 213688 Sep 10 13:18 /var/log/2019-Sep-Merged.log
-rw-rw---- 1 admin root 8192 Sep 10 13:18 /var/log/2019-Sep-Merged.logLuuidDB
-rw-rw---- 1 admin root 80 Sep 10 13:18 /var/log/2019-Sep-Merged.logaccount_ptr
-rw-rw---- 1 admin root 2264 Sep 10 13:18 /var/log/2019-Sep-Merged.loginitial_ptr
-rw-rw---- 1 admin root 4448 Sep 10 13:18 /var/log/2019-Sep-Merged.logptr
[Expert@HostName:0]#
fw monitor
Description
Firewall Monitor is the Check Point traffic capture tool.
In a Security Gateway, traffic passes through different inspection points - Chain Modules in the
Inbound direction and then in the Outbound direction (see "fw ctl chain" on page 1019).
The FW Monitor tool captures the traffic at each Chain Module in both directions.
You can later analyze the captured traffic with the same FW Monitor tool, or with special tools
like Wireshark.
Notes:
n Only one instance of "fw monitor" can run at a time.
n You can stop the "fw monitor" instance in one of these ways:
l In the shell, in which the "fw monitor" instance runs, press CTRL + C
keys
l In another shell, run this command: fw monitor -U
n Each time you run the FW Monitor, it compiles its temporary policy files
($FWDIR/tmp/monitorfilter.*).
n From R80.20, the FW Monitor is able to show the traffic accelerated with
SecureXL.
n For more information, see sk30583 and How to use FW Monitor.
Parameters
Parameter Description
Best Practice - You can use the "-ci" and the "-co"
parameters together. This is especially useful during large
volumes of traffic. In such scenarios, FW Monitor may bind so
many resources (for writing to the console, or to a file) that
recognizing the break sequence (CTRL+C) might take a very
long time.
Parameter Description
-F "<Source Specifies the capture filter (for both accelerated and non-
IP>,<Source accelerated traffic):
Port>,<Dest
IP>,<Dest
n <Source IP> - Specifies the source IP address
Port>,<Protocol
n <Source Port> - Specifies the source Port Number (see
Number>" IANA Service Name and Port Number Registry)
n <Dest IP> - Specifies the destination IP address
n <Dest Port> - Specifies the destination Port Number (see
IANA Service Name and Port Number Registry)
n <Protocol Number> - Specifies the Protocol Number (see
IANA Protocol Numbers)
Parameter Description
Notes:
n See syntax examples below ("Examples for the "-F"
parameter" on page 1109).
n The "-F" parameter uses these Kernel Debug Filters.
For more information, see the R80.40 Quantum Security
Gateway Guide - Chapter Kernel Debug on Security
Gateway - Section Kernel Debug Filters.
l For the Source IP address:
simple_debug_filter_saddr_<N> "<IP
Address>"
l For the Source Ports:
simple_debug_filter_sport_<N> <1-
65535>
l For the Destination IP address:
simple_debug_filter_daddr_<N> "<IP
Address>"
l For the Destination Ports:
simple_debug_filter_dport_<N> <1-
65535>
l For the Protocol Number:
simple_debug_filter_proto_<N> <0-
254>
n Value 0 means "any".
n This parameter supports up to 5 capture filters (up to 5
instances of the "-F" parameter in the syntax).
The FW Monitor performs the logical "OR" between all
specified simple capture filters.
Parameter Description
Parameter Description
Parameter Description
Notes:
n You can specify several capture masks (for example, to see
NAT on the egress packets, enter "... -m o O ...").
n You can use this capture mask parameter "-m {i, I, o,
O, e, E}" together with the chain module position
parameter "-p{i | I | o | O}".
n In the inbound direction:
l All chain positions before the FireWall Virtual Machine
Parameter Description
-o <Output File> Specifies the output file, to which FW Monitor writes the captured
raw data.
Important - If you do not specify the path explicitly, FW
Monitor creates this output file in the current working directory.
Because this output file can grow very fast to very large size,
we always recommend to specify the full path to the largest
partition /var/log/.
The format of this output file is the same format used by tools like
snoop (refer to RFC 1761).
You can later analyze the captured traffic with the same FW
Monitor tool, or with special tools like Wireshark.
-pi <Position> Inserts the FW Monitor Chain Module at the specified position
-pI <Position> between the kernel Chain Modules (see the "fw ctl chain" on
-po <Position> page 1019).
-pO <Position> If the FW Monitor writes the captured data to the specified output
or file (with the parameter "-o <Output File>"), it also writes the
-p all [-a] position of the FW Monitor chain module as one of the fields.
You can insert the FW Monitor Chain Module in these positions
only:
n -pi <Position>
Inserts the FW Monitor Chain Module in the specified Pre-
Inbound position.
n -pI <Position>
Inserts the FW Monitor Chain Module in the specified Post-
Inbound position.
n -po <Position>
Inserts the FW Monitor Chain Module in the specified Pre-
Outbound position.
n -pO <Position>
Inserts the FW Monitor Chain Module in the specified Post-
Outbound position
n -p all [-a]
Inserts the FW Monitor Chain Module at all positions (both
Inbound and Outbound).
Warning - This parameter causes very high load on the
CPU, but provides the most complete traffic capture.
The "-a" parameter specifies to use absolute chain
positions. This parameter changes the chain ID from a
relative value (which only makes sense with the matching
output from the "fw ctl chain" on page 1019 command) to an
absolute value.
Parameter Description
Notes:
n <Position> can be one of these:
l A relative position number
Parameter Description
-u Shows UUID for each packet (it is only possible to print either the
or UUID, or the SUUID - not both):
-s
n -u
Prints connection's Universal-Unique-ID (UUID) for each
packet
n -s
Prints connection's Session UUID (SUUID) for each packet
Parameter Description
-x <Offset> Specifies the position in each packet, where the FW Monitor starts
[,<Length>] to capture the data from each packet.
Optionally, it is also possible to limit the amount of data the FW
Monitor captures.
n <Offset>
Specifies how many bytes to skip from the beginning of each
packet. FW Monitor starts to capture the data from each
packet only after the specified number of bytes.
n <Length>
Specifies the maximal length of the captured packets. FW
Monitor reads only the specified number of bytes from each
packet.
For example, to skip over the IP header and TCP header, enter "-x
52,96"
n Inbound
Notion of inspection
Name of inspection Relation to the FireWall
point
point Virtual Machine
in the FW Monitor output
n Outbound
Notion of inspection
Name of inspection Relation to the FireWall
point
point Virtual Machine
in the FW Monitor output
Generic Examples
Example 1 - Default syntax
[Expert@MyGW:0]# fw monitor
monitor: getting filter (from command line)
monitor: compiling
monitorfilter:
Compiled OK.
monitor: loading
monitor: monitoring (control-C to stop)
[vs_0][fw_1] eth0:i[40]: 192.168.204.1 -> 192.168.204.40 (TCP) len=40 id=31789
TCP: 53901 -> 22 ....A. seq=761113cd ack=f92e2a13
[vs_0][fw_1] eth0:I[40]: 192.168.204.1 -> 192.168.204.40 (TCP) len=40 id=31789
TCP: 53901 -> 22 ....A. seq=761113cd ack=f92e2a13
[vs_0][fw_1] eth0:i[40]: 192.168.204.1 -> 192.168.204.40 (TCP) len=40 id=31790
TCP: 53901 -> 22 ....A. seq=761113cd ack=f92e2a47
... ... ...
monitor: caught sig 2
monitor: unloading
[Expert@MyGW:0]#
Example 3 - Capturing only three Pre-Inbound packets at the FireWall Virtual Machine module
[Expert@MyGW:0]# fw monitor -m i -ci 3
monitor: getting filter (from command line)
monitor: compiling
monitorfilter:
Compiled OK.
monitor: loading
monitor: monitoring (control-C to stop)
[vs_0][fw_1] eth0:i[40]: 192.168.204.1 -> 192.168.204.40 (TCP) len=40 id=31905
TCP: 53901 -> 22 ....A. seq=76111bb5 ack=f92e683b
[vs_0][fw_1] eth0:i[40]: 192.168.204.1 -> 192.168.204.40 (TCP) len=40 id=31906
TCP: 53901 -> 22 ....A. seq=76111bb5 ack=f92e68ef
[vs_0][fw_1] eth0:i[40]: 192.168.204.1 -> 192.168.204.40 (TCP) len=40 id=31907
TCP: 53901 -> 22 ....A. seq=76111bb5 ack=f92e69a3
monitor: unloading
Read 3 inbound packets and 0 outbound packets
[Expert@MyGW:0]#
Example 4 - Inserting the FW Monitor chain is before the chain #2 and capture only three Pre-
Inbound packets
Example 5 - Showing list of Chain Modules with the FW Monitor, when you do not change the
default capture positions
[Expert@MyGW:0]# fw ctl chain
in chain (17):
0: -7fffffff (0000000000000000) (00000000) SecureXL inbound (sxl_in)
1: -7ffffffe (0000000000000000) (00000000) SecureXL inbound CT (sxl_ct)
2: -7f800000 (ffffffff8b6718c0) (ffffffff) IP Options Strip (in) (ipopt_strip)
3: -70000000 (ffffffff8b6774d0) (ffffffff) fwmonitor (i/f side)
4: - 1fffff8 (ffffffff8b66f6f0) (00000001) Stateless verifications (in) (asm)
5: - 1fffff7 (ffffffff8b66f210) (00000001) fw multik misc proto forwarding
6: 0 (ffffffff8b8506a0) (00000001) fw VM inbound (fw)
7: 2 (ffffffff8b671d10) (00000001) fw SCV inbound (scv)
8: 4 (ffffffff8b061ed0) (00000003) QoS inbound offload chain module
9: 5 (ffffffff8b564d30) (00000003) fw offload inbound (offload_in)
10: 10 (ffffffff8b842710) (00000001) fw post VM inbound (post_vm)
11: 100000 (ffffffff8b7fd6c0) (00000001) fw accounting inbound (acct)
12: 22000000 (ffffffff8b0638d0) (00000003) QoS slowpath inbound chain mod (fg_sched)
13: 70000000 (ffffffff8b6774d0) (ffffffff) fwmonitor (IP side)
14: 7f730000 (ffffffff8b3c40b0) (00000001) passive streaming (in) (pass_str)
15: 7f750000 (ffffffff8b0e5b40) (00000001) TCP streaming (in) (cpas)
16: 7f800000 (ffffffff8b671870) (ffffffff) IP Options Restore (in) (ipopt_res)
out chain (16):
0: -7f800000 (ffffffff8b6718c0) (ffffffff) IP Options Strip (out) (ipopt_strip)
1: -70000000 (ffffffff8b6774d0) (ffffffff) fwmonitor (i/f side)
2: - 1fffff0 (ffffffff8b0d0190) (00000001) TCP streaming (out) (cpas)
3: - 1ffff50 (ffffffff8b3c40b0) (00000001) passive streaming (out) (pass_str)
4: - 1f00000 (ffffffff8b66f6f0) (00000001) Stateless verifications (out) (asm)
5: - 1ff (ffffffff8aeec0a0) (00000001) NAC Packet Outbound (nac_tag)
6: 0 (ffffffff8b8506a0) (00000001) fw VM outbound (fw)
7: 10 (ffffffff8b842710) (00000001) fw post VM outbound (post_vm)
8: 15000000 (ffffffff8b062540) (00000003) QoS outbound offload chain modul (fg_pol)
9: 21000000 (ffffffff8b0638d0) (00000003) QoS slowpath outbound chain mod (fg_sched)
10: 70000000 (ffffffff8b6774d0) (ffffffff) fwmonitor (IP side)
11: 7f000000 (ffffffff8b7fd6c0) (00000001) fw accounting outbound (acct)
12: 7f700000 (ffffffff8b0e4660) (00000001) TCP streaming post VM (cpas)
13: 7f800000 (ffffffff8b671870) (ffffffff) IP Options Restore (out) (ipopt_res)
14: 7f900000 (0000000000000000) (00000000) SecureXL outbound (sxl_out)
15: 7fa00000 (0000000000000000) (00000000) SecureXL deliver (sxl_deliver)
[Expert@MyGW:0]#
Example filters:
n Capture everything between hosts X,Z and hosts Y,Z in all Firewall kernel chains:
n Use "ip_p=<IANA_Protocol_Number>"
Examples:
l To specify TCP protocol with byte offset, use "ip_p=6"
l To specify UDP protocol with byte offset, use "ip_p=11"
l To specify ICMP protocol with byte offset, use "ip_p=1"
n Use "accept [9:1]=<IANA_Protocol_Number>"
Examples:
l To specify TCP protocol with byte offset, use "accept [9:1]=6"
l To specify UDP protocol with byte offset, use "accept [9:1]=11"
l To specify ICMP protocol with byte offset, use "accept [9:1]=1"
n In addition, you can explicitly use these expressions to specify protocols:
Summary Table
Example filters:
ACK fw monitor
(0x10) -e "th_
flags =
0x10,
accept;"
PSH fw monitor
(0x8) -e "th_
flags =
0x8,
accept;"
FIN fw monitor
(0x1) -e "th_
flags =
0x1,
accept;"
RST fw monitor
(0x4) -e "th_
flags =
0x4,
accept;"
URG fw monitor
(0x20) -e "th_
flags =
0x20,
accept;"
TCP
Example
Flag
SYN + fw monitor
ACK -e "th_
flags =
0x12,
accept;"
PSH + fw monitor
ACK -e "th_
flags =
0x18,
accept;"
FIN + fw monitor
ACK -e "th_
flags =
0x11,
accept;"
RST + fw monitor
ACK -e "th_
flags =
0x14,
accept;"
Option
Expression Example
Description
Syntax:
Parameters:
Parameter Explanation
<Offset> Specifies the offset relative to the beginning of the IP packet from
where the value should be read.
Parameter Explanation
<Relational- Relational operator to express the relation between the packet data
Operator and the value:
n < - less than
n > - greater than
n <= - less than or equal to
n >= - greater than
n = or is - equal to
n != or is not - not equal to
Explanations:
n The IP-based protocols are stored in the IP packet as a byte at offset 9.
l To filter based on a Protocol encapsulated into IP, use this syntax:
n The Layer 3 IP Addresses are stored in the IP packet as double words at offset 12
(Source address) and at offset 16 (Destination address).
n The Layer 4 Ports are stored in the IP packet as a word at offset 20 (Source port) and
at offset 22 (Destination port).
l To filter based on a Source port, use this syntax:
Example filters:
n Capture everything between host X and host Y:
You must specify the network address and length of network mask (number of bits).
There are 3 options:
Example filters:
n Capture everything to/from network 192.168.33.0 / 24:
n Capture all traffic from Source IP x.x.x.x (any port) to Destination IP y.y.y.y (any port),
over all protocols:
n Capture all traffic between Host x.x.x.x (any port) and Host y.y.y.y (any port), over all
protocols:
n Capture traffic from any Source IP from Source Port X to any Destination IP to
Destination Port Y, over all protocols:
n Capture traffic between all hosts, between Port X and Port Y, over all protocols:
n Capture traffic between all hosts, between all ports, over a Protocol with assigned
number X:
Example 5 - Capture traffic between specific hosts between specific ports over specific protocol
To capture only HTTP traffic between the Client 1.1.1.1 and the Server 2.2.2.2:
fw montior –F "1.1.1.1,0,2.2.2.2,80,6" –F
"2.2.2.2,80,1.1.1.1,0,6" -o /var/log/fw_mon.cap
fw repairlog
Description
Check Point Security log file ($FWDIR/log/*.log) and Audit log files
($FWDIR/log/*.adtlog) are databases, with special pointer files.
If these log pointer files become corrupted (which causes the inability to read the log file), this
command can rebuild them.
Syntax
Parameters
Parameter Description
fw sam
Description
Manages the Suspicious Activity Monitoring (SAM) rules. You can use the SAM rules to block
connections to and from IP addresses without the need to change or reinstall the Security
Policy. For more information, see sk112061.
You can create the Suspicious Activity Rules in two ways:
n In SmartConsole from Monitoring Results
n In CLI with the fw sam command
Notes:
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Monitoring (SAM) Rules. See sk79700.
n See the "fw sam_policy" and "sam_alert" commands.
n SAM rules consume some CPU resources on Security Gateway.
Best Practice - The SAM Policy rules consume some CPU resources on
Security Gateway. Set an expiration for rules that gives you time to
investigate, but does not affect performance. Keep only the required SAM
Policy rules. If you confirm that an activity is risky, edit the Security Policy,
educate users, or otherwise handle the risk.
n Logs for enforced SAM rules (configured with the fw sam command) are stored
in the $FWDIR/log/sam.dat file.
By design, the file is purged when the number of stored entries reaches
100,000.
This data log file contains the records in one of these formats:
<type>,<actions>,<expire>,<ipaddr>
<type>,<actions>,<expire>,<src>,<dst>,<dport>,<ip_p>
n SAM Requests are stored on the Security Gateway in the kernel table sam_
requests.
n IP Addresses that are blocked by SAM rules, are stored on the Security
Gateway in the kernel table sam_blocked_ips.
Syntax
n To add or cancel a SAM rule according to criteria:
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM
Server>] [-f <Security Gateway>] [-t <Timeout>] [-l <Log
Type>] [-C] [-e <key=val>]+ [-r] -{n|i|I|j|J} <Criteria>
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM
Server>] [-f <Security Gateway>] -D
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM
Server>] [-f <Security Gateway>] [-r] -M -{i|j|n|b|q} all
fw [-d] sam [-v] [-s <SAM Server>] [-S <SIC Name of SAM
Server>] [-f <Security Gateway>] [-r] -M -{i|j|n|b|q}
<Criteria>
Parameters
Parameter Description
-s <SAM Specifies the IP address (in the X.X.X.X format) or resolvable HostName of
Server> the Security Gateway that enforces the command.
The default is localhost.
Parameter Description
-S <SIC Specifies the SIC name for the SAM server to be contacted. It is expected
Name of that the SAM server has this SIC name, otherwise the connection fails.
SAM Notes:
Server>
n If you do not explicitly specify the SIC name, the connection
continues without SIC names comparison.
n For more information about enabling SIC, refer to the OPSEC
API Specification.
n On VSX Gateway, run the fw vsx showncs -vs <VSID> command
to show the SIC name for the applicable Virtual System.
Notes:
n You can use this syntax only on Security Management Server or
Domain Management Server.
n VSX Gateways and VSX Cluster Members do not support
Suspicious Activity Monitoring (SAM) Rules. See sk79700.
-D Cancels all inhibit ("-i", "-j", "-I", "-J") and notify ("-n") parameters.
Notes:
n To "uninhibit" the inhibited connections, run the fw sam
command with the "-C" or "-D" parameters.
n It is also possible to use this command for active SAM requests.
Parameter Description
-t Specifies the time period (in seconds), during which the action is enforced.
<Timeout> The default is forever, or until you cancel the fw sam command.
-e Specifies rule information based on the keys and the provided values.
<key=val>+ Multiple keys are separated by the plus sign (+).
Available keys are (each is limited to 100 characters):
n name - Security rule name
n comment - Security rule comment
n originator - Security rule originator's username
Parameter Description
-J Inhibits new connections with the specified parameters, and closes all
existing connections with the specified parameters.
Notes:
n Matching connections are dropped.
n Each inhibited connection is logged according to the log type.
-M Monitors the active SAM requests with the specified actions and criteria.
all Gets all active SAM requests. This is used for monitoring purposes only.
Parameter Description
Parameter Description
Parameter Description
srv <Src IP> <Dest IP> Matches the specific Source IP address,
<Port> <Protocol> Destination IP address, Service (port number) and
Protocol.
subsrvs <Src IP> <Src Matches the specific Source IP address, source
Netmask> <Dest IP> <Port> netmask, destination netmask, Service (port
<Protocol> number) and Protocol.
subsrvd <Src IP> <Dest IP> Matches specific Source IP address, Destination
<Dest Netmask> <Port> IP, destination netmask, Service (port number) and
<Protocol> Protocol.
Parameter Description
fw sam_policy
Description
Manages the Suspicious Activity Policy editor that works with these types of rules:
n Suspicious Activity Monitoring (SAM) rules.
See sk112061: How to create and view Suspicious Activity Monitoring (SAM) Rules.
n Rate Limiting rules.
See sk112454: How to configure Rate Limiting rules for DoS Mitigation.
Also, see these commands:
n "fw sam" on page 271
n "sam_alert" on page 376
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy
add <options>
batch
del <options>
get <options>
fw [-d] samp
add <options>
batch
del <options>
get <options>
Parameters
Parameter Description
del <options> Deletes one configured Rate Limiting rule one at a time.
See "fw sam_policy del" on page 297.
fw sam_policy add
Description
The "fw sam_policy add" and "fw6 sam_policy add" commands:
n Add one Suspicious Activity Monitoring (SAM) rule at a time.
n Add one Rate Limiting rule at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>]
[-f <Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] ip <IP Filter Arguments>
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>]
[-f <Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] quota <Quota Filter Arguments
Parameters
Parameter Description
-u Optional.
Specifies that the rule category is User-defined.
Default rule category is Auto.
-a {d | n | Mandatory.
b} Specifies the rule action if the traffic matches the rule conditions:
n d - Drop the connection.
n n - Notify (generate a log) about the connection and let it through.
n b - Bypass the connection - let it through without checking it against
the policy rules.
Note - Rules with action set to Bypass cannot have a log or limit
specification. Bypassed packets and connections do not count
towards overall number of packets and connection for limit
enforcement of type ratio.
-l {r | a} Optional.
Specifies which type of log to generate for this rule for all traffic that
matches:
n -r - Generate a regular log
n -a - Generate an alert log
Parameter Description
-t Optional.
<Timeout> Specifies the time period (in seconds), during which the rule will be
enforced.
Default timeout is indefinite.
-f <Target> Optional.
Specifies the target Security Gateways, on which to enforce the Rate
Limiting rule.
<Target> can be one of these:
n all - This is the default option. Specifies that the rule should be
enforced on all managed Security Gateways.
n Name of the Security Gateway or Cluster object - Specifies that the
rule should be enforced only on this Security Gateway or Cluster
object (the object name must be as defined in the SmartConsole).
n Name of the Group object - Specifies that the rule should be
enforced on all Security Gateways that are members of this Group
object (the object name must be as defined in the SmartConsole).
-n "<Rule Optional.
Name>" Specifies the name (label) for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must
write a backslash (\) character. Example:
"This\ is\ a\ rule\ name\ with\ a\ backslash\
\\"
-c "<Rule Optional.
Comment>" Specifies the comment for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must
write a backslash (\) character. Example:
"This\ is\ a\ comment\ with\ a\ backslash\ \\"
Parameter Description
-o "<Rule Optional.
Originator Specifies the name of the originator for this rule.
>" Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must
write a backslash (\) character. Example:
"Created\ by\ John\ Doe"
-z "<Zone>" Optional.
Specifies the name of the Security Zone for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
Parameter Description
Important:
n The Quota rules are not applied immediately to the Security
Gateway. They are only registered in the Suspicious Activity
Monitoring (SAM) policy database. To apply all the rules from
the SAM policy database immediately, add "flush true" in
the fw samp add command syntax.
n Explanation:
For new connections rate (and for any rate limiting in general),
when a rule's limit is violated, the Security Gateway also drops
all packets that match the rule.
The Security Gateway computes new connection rates on a
per-second basis.
At the start of the 1-second timer, the Security Gateway allows
all packets, including packets for existing connections.
If, at some point, during that 1 second period, there are too
many new connections, then the Security Gateway blocks all
remaining packets for the remainder of that 1-second interval.
At the start of the next 1-second interval, the counters are
reset, and the process starts over - the Security Gateway
allows packets to pass again up to the point, where the rule’s
limit is violated.
Explanation for the IP Filter Arguments syntax for Suspicious Activity Monitoring (SAM)
rules
Argument Description
-m <Source Mask> Specifies the Source subnet mask (in dotted decimal format -
x.y.z.w).
-M <Destination Specifies the Destination subnet mask (in dotted decimal format -
Mask> x.y.z.w).
-p <Port> Specifies the port number (see IANA Service Name and Port
Number Registry).
Explanation for the Quota Filter Arguments syntax for Rate Limiting rules
Argument Description
flush true Specifies to compile and load the quota rule to the
SecureXL immediately.
(xxxx:yyyy:...:zzzz)
n cidr:<IP Address>/<Prefix>
The rule is applied to packets sent from:
l IPv4 address with Prefix from 0 to 32
n cc:<Country Code>
The rule matches the country code to the
source IP addresses assigned to this
country, based on the Geo IP database.
The two-letter codes are defined in ISO
3166-1 alpha-2.
n asn:<Autonomous System Number>
The rule matches the AS number of the
organization to the source IP addresses that
are assigned to this organization, based on
the Geo IP database.
The valid syntax is ASnnnn, where nnnn is a
number unique to the specific organization.
Notes:
n Default is: source-negated false
n The source-negated true processes all
source types, except the specified type.
Argument Description
(xxxx:yyyy:...:zzzz)
n cidr:<IP Address>/<Prefix>
The rule is applied to packets sent to:
l IPv4 address with Prefix from 0 to 32
n cc:<Country Code>
The rule matches the country code to the
destination IP addresses assigned to this
country, based on the Geo IP database.
The two-letter codes are defined in ISO
3166-1 alpha-2.
n asn:<Autonomous System Number>
The rule matches the AS number of the
organization to the destination IP addresses
that are assigned to this organization, based
on the Geo IP database.
The valid syntax is ASnnnn, where nnnn is a
number unique to the specific organization.
Notes:
n Default is: destination-negated false
n The destination-negated true will
process all destination types except the
specified type
Argument Description
Argument Description
Argument Description
Examples
Example 1 - Rate Limiting rule with a range
fw sam_policy add -a d -l r -t 3600 quota service any source range:172.16.7.11-172.16.7.13 new-conn-rate 5 flush true
Explanations:
n This rule drops packets for all connections (-a d) that exceed the quota set by this
rule, including packets for existing connections.
n This rule logs packets (-l r) that exceed the quota set by this rule.
n This rule will expire in 3600 seconds (-t 3600).
n This rule limits the rate of creation of new connections to 5 connections per second
(new-conn-rate 5) for any traffic (service any) from the source IP addresses in
the range 172.16.7.11 - 172.16.7.13 (source range:172.16.7.11-
172.16.7.13).
Note - The limit of the total number of log entries per second is configured with the
fwaccel dos config set -n <rate> command.
n This rule will be compiled and loaded on the SecureXL, together with other rules in the
Suspicious Activity Monitoring (SAM) policy database immediately, because this rule
includes the "flush true" parameter.
Explanations:
n This rule logs and lets through all packets (-a n) that exceed the quota set by this
rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to all packets except (service-negated true) the packets with
IP protocol number 1, 50-51, 6 port 443 and 17 port 53 (service 1,50-
51,6/443,17/53).
n This rule applies to all packets from source IP addresses that are assigned to the
country with specified country code (cc:QQ).
n This rule does not let any traffic through (byte-rate 0) except the packets with IP
protocol number 1, 50-51, 6 port 443 and 17 port 53.
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to packets from the Autonomous System number 64500
(asn:AS64500).
n This rule applies to packets from source IPv6 addresses FFFF:C0A8:1100/120
(cidr:[::FFFF:C0A8:1100]/120).
n This rule applies to all traffic (service any).
n This rule does not let any traffic through (pkt-rate 0).
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
Explanations:
n This rule bypasses (-a b) all packets that match this rule.
Note - The Access Control Policy and other types of security policy rules still apply.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to packets from the source IP addresses in the range 172.16.8.17 -
172.16.9.121 (range:172.16.8.17-172.16.9.121).
n This rule applies to packets sent to TCP port 80 (service 6/80).
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not log any packets (the -l r parameter is not specified).
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to all traffic (service any).
n This rule applies to all sources except (source-negated true) the source IP
addresses that are assigned to the country with specified country code (cc:QQ).
n This rule limits the maximal number of concurrent active connections to
655/65536=~1% (concurrent-conns-ratio 655) for any traffic (service any)
except (service-negated true) the connections from the source IP addresses
that are assigned to the country with specified country code (cc:QQ).
n This rule counts connections, packets, and bytes for traffic only from sources that
match this rule, and not cumulatively for this rule.
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
fw sam_policy batch
Description
The "fw sam_policy batch" and "fw6 sam_policy batch" commands:
n Add and delete many Suspicious Activity Monitoring (SAM) rules at a time.
n Add and delete many Rate Limiting rules at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Procedure
1. Start the batch mode
add -a d -l r -t 3600 -c "Limit\ conn\ rate\ to\ 5\ conn/sec from\ these\ sources" quota service
any source range:172.16.7.13-172.16.7.13 new-conn-rate 5
del <501f6ef0,00000000,cb38a8c0,0a0afffe>
EOF
[Expert@HostName]#
fw sam_policy del
Description
The "fw sam_policy del" and "fw6 sam_policy del" commands:
n Delete one configured Suspicious Activity Monitoring (SAM) rule at a time.
n Delete one configured Rate Limiting rule at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Parameters
Parameter Description
'<Rule UID>' Specifies the UID of the rule you wish to delete.
Important:
n The quote marks and angle brackets
('<...>') are mandatory.
n To see the Rule UID, run the "fw
sam_policy get" command.
Procedure
1. List all the existing rules in the Suspicious Activity Monitoring policy database
List all the existing rules in the Suspicious Activity Monitoring policy database.
n For IPv4, run:
fw sam_policy get
operation=add uid=<5ac3965f,00000000,3403a8c0,0000264a>
target=all timeout=300 action=notify log=log name=Test\ Rule
comment=Notify\ about\ traffic\ from\ 1.1.1.1
originator=John\ Doe src_ip_addr=1.1.1.1 req_tpe=ip
Explanation:
The "fw samp del" and "fw6 samp del" commands only remove a rule from the
persistent database. The Security Gateway continues to enforce the deleted rule until
the next time you compiled and load a policy. To force the rule deletion immediately,
you must enter a flush-only rule right after the "fw samp del" and "fw6 samp del"
command. This flush-only rule immediately deletes the rule you specified in the
previous step, and times out in 2 seconds.
Best Practice - Specify a short timeout period for the flush-only rules. This
prevents accumulation of rules that are obsolete in the database.
fw sam_policy get
Description
The "fw sam_policy get" and "fw6 sam_policy get" commands:
n Show all the configured Suspicious Activity Monitoring (SAM) rules.
n Show all the configured Rate Limiting rules.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw6 [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t
<Type> [+{-v '<Value>'}] [-n]]
Parameters
Note - All these parameters are optional.
Parameter Description
-u '<Rule Prints the rule specified by its Rule UID or its zero-based rule index.
UID>' The quote marks and angle brackets ('<...>') are mandatory.
Examples
Example 1 - Output in the default format
[Expert@HostName:0]# fw samp get
uid
<5ac3965f,00000000,3403a8c0,0000264a>
target
all
timeout
2147483647
action
notify
log
log
name
Test\ Rule
comment
Notify\ about\ traffic\ from\ 1.1.1.1
originator
John\ Doe
src_ip_addr
1.1.1.1
req_type
ip
fw showuptables
Description
Shows the formatted contents of the Unified Policy kernel tables.
Syntax
fw [-d] showuptables
[-h]
[-i]
Parameters
Parameter Description
fw stat
Description
Shows the following information about the policy on the Security Gateway:
n Name of the installed policy.
n Date of the last policy installation.
n Names of the interfaces protected by the installed policy, and in which direction the
policy protects them.
Important - This command is outdated and exists only for backward compatibility with
very old versions. Use the "cpstat -f policy fw" command instead (see
"cpstat" on page 958).
Syntax
Parameters
Parameter Description
Parameter Description
<Name of Specifies the name of the Security Gateway or Cluster Member object (as
Object> defined in SmartConsole), from which to show the information. Use this
parameter only on the Management Server.
This requires the established SIC with that Check Point computer.
[Expert@MyGW:0]# fw stat
HOST POLICY DATE
localhost MyGW_Policy 10Sep2018 14:01:25 : [>eth0] [<eth0] [>eth1]
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw stat -s
HOST IF POLICY DATE
localhost >eth0 MyGW_Policy 10Sep2018 14:01:25 :
localhost <eth0 MyGW_Policy 10Sep2018 14:01:25 :
localhost >eth1 MyGW_Policy 10Sep2018 14:01:25 :
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw stat -l
HOST IF POLICY DATE TOTAL REJECT DROP ACCEPT LOG
localhost >eth0 MyGW_Policy 10Sep2018 14:01:25 : 14377 0 316 14061 1
localhost <eth0 MyGW_Policy 10Sep2018 14:01:25 : 60996 0 0 60996 0
localhost >eth1 MyGW_Policy 10Sep2018 14:01:25 : 304 0 304 0 0
[Expert@MyGW:0]#
fw tab
Description
Shows data from the specified Security Gateway kernel tables.
This command also changes the content of dynamic kernel tables. You cannot change the
content of static kernel tables.
Kernel tables (also known as State tables) store data that the Firewall and other Software
Blades use to inspect packets. These kernel tables are a critical component of Stateful
Inspection.
Best Practices:
n Use the "fw tab -t connections -f" command to see the detailed (and
more technical) information about the current connections in the Connections
kernel table (ID 8158).
n Use the "fw ctl conntab" on page 1023 command to see the simplified
information about the current connections in the Connections kernel table (ID
8158).
Syntax
fw [-d]
{-h | -help}
[-v] [-t <Table>] [-c | -s] [-f] [-z] [-o <Output File>] [-
r] [-u | -m <Limit>] [-a -e "<Entry>"] [ -x [-e "<Entry>"]] [-y]
[<Name of Object>]
Parameters
Parameter Description
Parameter Description
-c Shows formatted kernel table data in the common format. This is the
default.
-o <Output Saves the output in the specified file in the CL format as a Check Point
File> Firewall log.
You can later open this file with the "fw log" on page 1058 command.
If you do not specify the full path explicitly, this command saves the output
file in the current working directory.
Parameter Description
-v Shows the CoreXL Firewall instance number as a prefix for each line.
-x [-e Deletes all entries or the specified entry from the specified kernel table.
<Entry>] You can use this parameter only on the local Security Gateway.
Warning - If you delete a wrong entry, you can break the current
connections through your Security Gateway. This includes the remote
SSH connection.
-z In the Connections table (ID 8158) shows only connections in Slow Path
(F2F) and the reason why acceleration is not possible for each connection.
These are connections that SecureXL cannot accelerate and forwards to
the Firewall.
See the corresponding example (with the legend) below.
Note - This parameter is available in the R80.40 Jumbo Hotfix
Accumulator Take 40 and above.
<Name of Specifies the name of the Security Gateway or Cluster Member object (as
Object> defined in SmartConsole), from which to show the information. Use this
parameter only on the Management Server.
This requires the established SIC with that Check Point computer.
If you do not use this parameter, the default is localhost.
[Expert@MyGW:0]# fw tab -s
HOST NAME ID #VALS #PEAK #SLINKS
localhost vsx_firewalled 0 1 1 0
localhost firewalled_list 1 2 2 0
localhost external_firewalled_list 2 0 0 0
localhost management_list 3 2 2 0
localhost external_management_list 4 0 0 0
localhost log_server_list 5 0 0 0
localhost ips1_sensors_list 6 0 0 0
localhost all_tcp_services 7 141 141 0
localhost tcp_services 8 1 1 0
... ...
localhost connections 8158 2 56 2
... ...
localhost up_251_rule_to_clob_uuid 14083 0 0 0
... ...
localhost urlf_cache_tbl 29 0 0 0
localhost proxy_outbound_conn_tbl 30 0 0 0
localhost dns_cache_tbl 31 0 0 0
localhost appi_referrer_table 32 0 0 0
localhost uc_hits_htab 33 0 0 0
localhost uc_cache_htab 34 0 0 0
localhost uc_incident_to_instance_htab 35 0 0 0
localhost fwx_cntl_dyn_ghtab 36 0 0 0
localhost frag_table 37 0 0 0
localhost dos_blacklist_notifs 38 0 0 0
[Expert@MyGW:0]#
localhost:
Date: Sep 10, 2018
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>;
OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : (+)====================================(+); Table_
Name: connections; : (+); Attributes: dynamic, id 8158, attributes: keep, sync, aggressive
aging, kbufs 21 22 23 24 25 26 27 28 29 30 31 32 33 34, expires 25, refresh, , hashsize 2097152,
unlimited; LastUpdateTime: 10Sep2018 20:30:48; ProductName: VPN-1 & FireWall-1; ProductFamily:
Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>;
OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction:
1; Source: 192.168.204.40; SPort: 55411; Dest: 192.168.204.1; DPort: 53; Protocol: udp; CPTFMT_
sep: ;; Type: 131073; Rule: 0; Timeout: 335; Handler: 0; Ifncin: -1; Ifncout: -1; Ifnsin: 1;
Ifnsout: 1; Bits: 0000780000000000; Expires: 2/40; LastUpdateTime: 10Sep2018 20:30:48;
ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>;
OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction:
0; Source: 192.168.204.1; SPort: 53901; Dest: 192.168.204.40; DPort: 22; Protocol: tcp; CPTFMT_
sep: ;; Type: 114689; Rule: 2; Timeout: 481; Handler: 0; Ifncin: 1; Ifncout: 1; Ifnsin: -1;
Ifnsout: -1; Bits: 02007800000f9000; Expires: 2002/3600; LastUpdateTime: 10Sep2018 20:30:48;
ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>;
OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction:
1; Source: 192.168.204.40; SPort: 22; Dest: 192.168.204.1; DPort: 53901; Protocol: tcp; CPTFMT_
sep_1: ->; Direction_1: 0; Source_1: 192.168.204.1; SPort_1: 53901; Dest_1: 192.168.204.40;
DPort_1: 22; Protocol_1: tcp; FW_symval: 2053; LastUpdateTime: 10Sep2018 20:30:48; ProductName:
VPN-1 & FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>;
OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction:
0; Source: 192.168.204.1; SPort: 51702; Dest: 192.168.204.40; DPort: 22; Protocol: tcp; CPTFMT_
sep: ;; Type: 114689; Rule: 2; Timeout: 481; Handler: 0; Ifncin: 1; Ifncout: 1; Ifnsin: -1;
Ifnsout: -1; Bits: 02007800000f9000; Expires: 3600/3600; LastUpdateTime: 10Sep2018 20:30:48;
ProductName: VPN-1 & FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>;
OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction:
1; Source: 192.168.204.40; SPort: 22; Dest: 192.168.204.1; DPort: 51702; Protocol: tcp; CPTFMT_
sep_1: ->; Direction_1: 0; Source_1: 192.168.204.1; SPort_1: 51702; Dest_1: 192.168.204.40;
DPort_1: 22; Protocol_1: tcp; FW_symval: 2053; LastUpdateTime: 10Sep2018 20:30:48; ProductName:
VPN-1 & FireWall-1; ProductFamily: Network;
20:30:48 5 N/A N/A 192.168.204.40 > N/A LogId: <max_null>; ContextNum: <max_null>;
OriginSicName: cn=cp_mgmt,o=MyGW..44jkyv; : -----------------------------------(+); Direction:
0; Source: 192.168.204.1; SPort: 53; Dest: 192.168.204.40; DPort: 55411; Protocol: udp; CPTFMT_
sep_1: ->; Direction_2: 1; Source_2: 192.168.204.40; SPort_2: 55411; Dest_2: 192.168.204.1;
DPort_2: 53; Protocol_2: udp; FW_symval: 2054; LastUpdateTime: 10Sep2018 20:30:48; ProductName:
VPN-1 & FireWall-1; ProductFamily: Network;
[Expert@MyGW:0]#
Example 5 - Show the raw data from the Connections table and show the IDs of CoreXL
Firewall instances for each entry
Example 6 - Show only Slow Path (F2F) entries from the Connections table
Legend
Column Description
Expires How many seconds remain before the connection expires (based on
the maximum expiration time).
Also, refer to the "Duration" column.
For example, 1990/3600 means:
n The maximum expiration time is 3600 seconds.
n If the connection remains idle for the next 1990 seconds, it
expires from the Firewall Connections table.
Column Description
Last Seen How many seconds passed since the last packet transferred in this
connection.
fw unloadlocal
Description
Uninstalls all policies from the Security Gateway or Cluster Member.
Warning:
1. The "fw unloadlocal" command prevents all traffic from passing through the
Security Gateway (Cluster Member), because it disables the IP Forwarding in
the Linux kernel on the Security Gateway (Cluster Member).
2. The "fw unloadlocal" command removes all policies from the Security
Gateway (Cluster Member). This means that the Security Gateway (Cluster
Member) accepts all incoming connections destined to all active interfaces
without any filtering or protection enabled.
Notes
n If it is necessary to remove the current policy, but keep the Security Gateway (Cluster
Member) protected, then run the "comp_init_policy" on page 913 command on the
Security Gateway (Cluster Member).
n To load the policies on the Security Gateway (Cluster Member), run one of these
commands on the Security Gateway (Cluster Member), or reboot:
l "fw fetch" on page 1048
l "cpstart" on page 957
n See the related command "fwm unload" on page 336.
Syntax
fw [-d] unloadlocal
Parameters
Parameter Description
Example
[Expert@MyGW:0]# fw unloadlocal
net.ipv4.conf.default.mc_forwarding = 0
net.ipv4.conf.default.forwarding = 0
net.ipv4.conf.all.mc_forwarding = 0
net.ipv4.conf.all.forwarding = 0
[Expert@MyGW:0]#
fw up_execute
Description
Executes the offline Unified Policy.
This command only supports:
n Source IP address, Destination IP address, and objects that contain an IP address
n Simple services objects (based on destination port, source port, and protocol)
n Protocol detection
n Application detection
Syntax
Parameters
Parameter Description
Parameter Description
Example 1
Per Layer:
------------
Layer name: Network
Layer id: 0
Match status: MATCH
Match action: Accept
Matched rule: 2
Possible rules: 2 16777215
[Expert@MyGW:0]#
Example 2
Per Layer:
------------
Layer name: Network
Layer id: 0
Match status: MATCH
Match action: Accept
Matched rule: 2
Possible rules: 2 16777215
[Expert@MyGW:0]#
fw ver
Description
Shows this information about the Security Gateway software:
n Major version
n Minor version
n Build number
n Kernel build number
Syntax
Parameters
Parameter Description
ver Shows:
n Major version
n Minor version
n Build number
-k n Shows:
n Major version
n Minor version
n Build number
n Kernel build number
Example 1
[Expert@MyGW:0]# fw ver -k
This is Check Point's software version R80.40 - Build 123
[Expert@MyGW:0]#
Example 2
[Expert@MyGW:0]# fw ver -k
This is Check Point's software version R80.40 - Build 456
[Expert@MyGW:0]#
fwboot
Description
Configures Check Point boot options.
Important - Most of these commands are for Check Point use only.
Syntax
[Expert@HostName:0]# $FWDIR/boot/fwboot
bootconf <options>
corexl <options>
cpuid <options>
default <options>
fwboot_ipv6 <options>
fwdefault <options>
ha_conf <options>
ht <options>
multik_reg <options>
post_drv <options>
Parameters
Parameter Description
cpuid Shows the number of available CPUs and CPU cores on this Security
<options> Gateway.
See "fwboot cpuid" on page 1183.
default Loads the specified Default Filter policy on this Security Gateway.
<options> See "fwboot default" on page 1185.
fwboot_ipv6 Shows the internal memory address of the hook function for the
<options> specified CoreXL Firewall instance.
See "fwboot fwboot_ipv6" on page 1186.
Parameter Description
fwdefault Loads the specified Default Filter policy on this Security Gateway.
<options> See "fwboot fwdefault" on page 1187.
multik_reg Shows the internal memory address of the registration function for the
<options> specified CoreXL Firewall instance.
See "fwboot multik_reg" on page 1190.
fwboot bootconf
Description
Configures boot security options.
Notes:
n You must run this command from the Expert mode.
n The settings are saved in the
$FWDIR/boot/boot.conf file.
Warning - To avoid issues, do not edit the
$FWDIR/boot/boot.conf file manually. Edit the
file only with this command.
n Refer to these related commands:
l "fwboot corexl" on page 1176
Parameters
Parameter Description
get_def Shows the configured path and the name of the Default Filter policy
file (default is $FWDIR/boot/default.bin).
Note - In the $FWDIR/boot/boot.conf file, refer to the
value of the DEFAULT_FILTER_PATH.
Parameter Description
Notes:
n In the $FWDIR/boot/boot.conf file, refer to the value
of the COREXL_INSTALLED.
n To configure CoreXL, use the "cpconfig" on page 936
menu.
set_def Configures the path and the name of the Default Filter policy file
[< (default is $FWDIR/boot/default.bin).
/path/filename Notes:
>]
n In the $FWDIR/boot/boot.conf file, refer to the value
of the DEFAULT_FILTER_PATH.
n If you do not specify the path and the name explicitly,
then the value of the DEFAULT_FILTER_PATH is set to
0.
As a result, Security Gateway does not load a Default
Filter during boot.
Parameter Description
Notes:
n In the $FWDIR/boot/boot.conf file, refer to the value
of the IPV6_INSTALLED.
n Configure the IPv6 Support in Gaia Portal, or Gaia Clish.
See the R80.40 Gaia Administration Guide.
fwboot corexl
Description
Configures and monitors the CoreXL.
Important:
n The configuration commands are for Check Point use only. To configure
CoreXL, use the Check Point CoreXL option in the "cpconfig" on page 936
menu.
n After all changes in CoreXL configuration on the Security Gateway, you must
reboot it.
n In a Cluster, you must configure all the Cluster Members in the same way.
Parameters
Parameter Description
Parameter Description
curr_ Returns the current configured number of IPv4 CoreXL Firewall instances.
instance4_
count Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl curr_
instance4_count
[Expert@MyGW:0]# echo $?
3
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 11 | 18
1 | Yes | 2 | 12 | 18
2 | Yes | 1 | 13 | 18
[Expert@MyGW:0]#
curr_ Returns the current configured number of IPv6 CoreXL Firewall instances.
instance6_
count Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl curr_
instance6_count
[Expert@MyGW:0]# echo $?
2
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw6 ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 11 | 18
1 | Yes | 2 | 12 | 18
[Expert@MyGW:0]#
def_by_ Sets the default configuration for CoreXL according to the specified
allowed allowed number of CPU cores.
[n]
Parameter Description
def_ Returns the default number of IPv4 CoreXL Firewall instances for this
instance4_ Security Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl def_
instance4_count
[Expert@MyGW:0]# echo $?
3
[Expert@MyGW:0]#
def_ Returns the default number of IPv4 CoreXL Firewall instances for this
instance6_ Security Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl def_
instance6_count
[Expert@MyGW:0]# echo $?
2
[Expert@MyGW:0]#
Parameter Description
[-v] Enables CoreXL with 'n' IPv4 Firewall instances and optionally 'k' IPv6
enable [n] Firewall instances.
[-6 k]
n -v - Leaves the high memory (vmalloc) unchanged.
n n - Denotes the number of IPv4 CoreXL Firewall instances.
n k - Denotes the number of IPv6 CoreXL Firewall instances.
See the "cp_conf corexl" on page 926 command.
max_ Returns the maximal allowed number of IPv4 CoreXL Firewall instances
instance4_ for this Security Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instance4_count
[Expert@MyGW:0]# echo $?
4
[Expert@MyGW:0]#
max_ Returns the maximal allowed number of IPv4 CoreXL Firewall instances
instances for a Security Gateway that runs Gaia with 32-bit kernel.
4_32bit
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances4_32bit
[Expert@MyGW:0]# echo $?
14
[Expert@MyGW:0]#
Parameter Description
max_ Returns the maximal allowed number of IPv4 CoreXL Firewall instances
instances for a Security Gateway that runs Gaia with 64-bit kernel.
4_64bit
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances4_64bit
[Expert@MyGW:0]# echo $?
38
[Expert@MyGW:0]#
max_ Returns the maximal allowed number of IPv6 CoreXL Firewall instances
instance6_ for this Security Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instance6_count
[Expert@MyGW:0]# echo $?
3
[Expert@MyGW:0]#
max_ Returns the total maximal allowed number of CoreXL Firewall instances
instances_ (IPv4 and IPv6) for this Security Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances_count
[Expert@MyGW:0]# echo $?
40
[Expert@MyGW:0]#
max_ Returns the total maximal allowed number of CoreXL Firewall instances
instances_ for a Security Gateway that runs Gaia with 32-bit kernel.
32bit
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances_32bit
[Expert@MyGW:0]# echo $?
16
[Expert@MyGW:0]#
Parameter Description
max_ Returns the total maximal allowed number of CoreXL Firewall instances
instances_ for a Security Gateway that runs Gaia with 64-bit kernel.
64bit
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances_64bit
[Expert@MyGW:0]# echo $?
40
[Expert@MyGW:0]#
min_ Returns the minimal allowed number of IPv4 CoreXL Firewall instances.
instance_
count Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl min_
instance_count
[Expert@MyGW:0]# echo $?
2
[Expert@MyGW:0]#
unsupporte Returns 1 if at least one feature is configured, which CoreXL does not
d_features support.
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl
unsupported_features
corexl unsupported feature: QoS is configured.
[Expert@MyGW:0]# echo $?
1
[Expert@MyGW:0]#
fwboot cpuid
Description
Shows the number of available CPUs and CPU cores on this Security Gateway.
Syntax
Parameters
Parameter Description
No Shows the IDs of the available CPU cores on this Security Gateway.
Parameters
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid
3 2 1 0
[Expert@MyGW:0]#
Parameter Description
--full Shows a full map of the available CPUs and CPU cores on this Security
Gateway.
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid --full
cpuid phys_id core_id thread_id
0 0 0 0
1 2 0 0
2 4 0 0
3 6 0 0
[Expert@MyGW:0]#
ht_aware Shows the CPU cores in the order of their awareness of Hyper-Threading.
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid ht_aware
3 2 1 0
[Expert@MyGW:0]#
fwboot default
Description
Loads the specified Default Filter policy on this Security Gateway.
Notes:
n You must run this command from the Expert mode.
n This command is the same as the "fwboot fwdefault" on page 1187
command.
n Refer to these related commands:
l "fw defaultgen" on page 1046
Syntax
Parameters
Parameter Description
<Default Filter Policy Specifies the full path and name of the Default Filter
File> policy file.
The default is $FWDIR/boot/default.bin
Example
fwboot fwboot_ipv6
Description
Shows the internal memory address of the hook function for the specified CoreXL Firewall
instance.
Syntax
Parameters
Parameter Description
Example
fwboot fwdefault
Description
Loads the specified Default Filter policy on this Security Gateway.
Notes:
n You must run this command from the Expert mode.
n This command is the same as the "fwboot default" on
page 1185command.
n Refer to these related commands:
l "fw defaultgen" on page 1046
Syntax
Parameters
Parameter Description
<Default Filter Policy Specifies the full path and name of the Default Filter
File> policy file.
The default file is $FWDIR/boot/default.bin
Example
fwboot ha_conf
Description
Configures the cluster mechanism during boot.
Notes:
n You must run this command from the Expert mode.
n Refer to these related commands:
l "fw defaultgen" on page 1046
Syntax
fwboot ht
Important - This command is obsolete and is not supported. To configure SMT
(HyperThreading) feature, follow sk93000.
fwboot multik_reg
Description
Shows the internal memory address of the registration function for the specified CoreXL
Firewall instance.
Note - You must run this command from the Expert mode.
Syntax
Parameters
Parameter Description
Example
fwboot post_drv
Description
Loads the Firewall driver for CoreXL during boot.
Important:
n This command is for Check Point use only.
n If you run this command, Security Gateway can block all traffic. In such case,
you must connect to the Security Gateway over a console and restart Check
Point services with the "cpstop" on page 967 and "cpstart" on page 957
commands. Alternatively, you can reboot the Security Gateway.
Note - You must run this command from the Expert mode.
Syntax
Parameters
Parameter Description
sam_alert
Description
For SAM v1, this utility executes Suspicious Activity Monitoring (SAM) actions according to the
information received from the standard input.
For SAM v2, this utility executes Suspicious Activity Monitoring (SAM) actions with User
Defined Alerts mechanism.
Important:
n You must run this command on the Management Server.
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Notes:
n VSX Gateways and VSX Cluster Members do not support Suspicious Activity
Monitoring (SAM) Rules. See sk79700.
n See the "fw sam" on page 271 and "fw sam_policy" on page 279 commands.
SAM v1 syntax
sam_alert [-v] [-o] [-s <SAM Server>] [-t <Time>] [-f <Security
Gateway>] [-C] {-n|-i|-I} {-src|-dst|-any|-srv}
Parameter Description
-o Specifies to print the input of this tool to the standard output (to use with
pipes in a CLI syntax).
-t <Time> Specifies the time (in seconds), during which to enforce the action. The
default is forever.
Parameter Description
SAM v2 syntax
sam_alert -v2 [-v] [-O] [-S <SAM Server>] [-t <Time>] [-f
<Security Gateway>] [-n <Name>] [-c "<Comment">] [-o
<Originator>] [-l {r | a}] -a {d | r| n | b | q | i} [-C] {-ip
|-eth} {-src|-dst|-any|-srv}
Parameter Description
-O Specifies to print the input of this tool to the standard output (to
use with pipes in a CLI syntax).
-t <Time> Specifies the time (in seconds), during which to enforce the
action. The default is forever.
Parameter Description
-l {r | a} Specifies the log type for connections that match the specified
criteria:
n r - Regular
n a - Alert
Default is None.
Example
See sk110873: How to configure Security Gateway to detect and prevent port scan.
stattest
Description
Check Point AMON client to query SNMP OIDs.
You can use this command as an alternative to the standard SNMP commands for debug
purposes - to make sure the applicable SNMP OIDs provide the requested information.
Notes:
n You can run this command only in the Expert mode.
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
n To query a Regular OID:
stattest get [-d] [-h <Host>] [-p <Port>] [-x <Proxy Server>] [-v <VSID>] [-t <Timeout>] <Regular_OID_1> <Regular_OID_2> ...
<Regular_OID_N>
Parameters
Parameter Description
Parameter Description
usrchk
Description
Controls the UserCheck daemon (usrchkd).
Syntax
usrchk
hits <options>
incidents <options>
debug <options>
Note - You can also enter partial names of the sub-commands and their options.
Parameters
Parameter Description
n Database operations:
l Reload hits from the database:
Parameter Description
n Filter which debug logs UserCheck writes to the log file based on
the specified Debug Topics and Severity:
usrchk debug set <Topic Name> <Severity>
The available Debug Topics are:
l all
l critical
l events
l important
l surprise
Parameter Description
l 1
l 2
l 3
l 4
l 5
Notes:
n To show all UserCheck interaction objects, run:
usrchk hits list all
n You can run a command that contains "user <UserName>"
only if:
l Identity Awareness is enabled on the Security Gateway.
UserCheck objects.
ClusterXL Commands
For more information about Check Point cluster, see the R80.40 ClusterXL Administration
Guide.
Important:
n We do not recommend that you run these commands. These commands must
be run automatically only by the Security Gateway or the Check Point Support.
n In a Cluster, you must configure all the Cluster Members in the same way.
Syntax
Notes:
n In Gaia Clish:
Enter the set cluster<ESC><ESC> to see all the available commands.
n In Expert mode:
Run the cphaconf command see all the available commands.
You can run the cphaconf commands only from the Expert mode.
n Syntax legend:
1. Curly brackets or braces { }:
Enclose a list of available commands or parameters, separated by the
vertical bar |, from which user can enter only one.
2. Angle brackets < >:
Enclose a variable - a supported value user needs to specify explicitly.
3. Square brackets or brackets [ ]:
Enclose an optional command or parameter, which user can also enter.
n You can include these commands in scripts to run them automatically.
The meaning of each command is explained in the next sections.
Description
This command configures how to show the Cluster Member in the local ClusterXL logs - by its
Member ID (default), or its Member Name.
This configuration affects these local logs:
n /var/log/messages
n dmesg
n $FWDIR/log/fwd.elg
See "Viewing the Cluster Member ID Mode in Local Logs" on page 1275.
Syntax
Shell Command
Example
[Expert@Member1:0]#
[Expert@Member1:0]# cphaconf mem_id_mode name
[Expert@Member1:0]#
[Expert@Member1:0]# cphaprob names
[Expert@Member1:0]#
Description
You can add a user-defined critical device to the default list of critical devices. Use this
command to register <device> as a critical process, and add it to the list of devices that must
run for the Cluster Member to be considered active. If <device> fails, then the Cluster Member
is seen as failed.
If a Critical Device fails to report its state to the Cluster Member in the configured timeout, the
Critical Device, and by design the Cluster Member, are seen as failed.
Define the status of the Critical Device that is reported to ClusterXL upon registration.
This initial status can be one of these:
n ok - Critical Device is alive.
n init - Critical Device is initializing. The Cluster Member is Down. In this state, the Cluster
Member cannot become Active.
n problem - Critical Device failed. If this state is reported to ClusterXL, the Cluster Member
immediately goes Down. This causes a failover.
Syntax
Shell Command
Gaia N/A
Clish
Notes:
n The "-t" flags specifies how frequently to expect the periodic reports from this
Critical Device.
If no periodic reports should be expected, then enter the value 0 (zero).
n The "-p" flag makes these changes permanent (survive reboot).
n The "-g" flag applies the command to all configured Virtual Systems.
Restrictions
n Total number of critical devices (pnotes) on Cluster Member is limited to 16.
n Name of any critical device (pnote) on Cluster Member is limited to 15 characters, and
must not include white spaces.
Related topics
n "Viewing Critical Devices" on page 1243
n "Reporting the State of a Critical Device" on page 1215
n "Registering Critical Devices Listed in a File" on page 1217
n "Unregistering a Critical Device" on page 1214
n "Unregistering All Critical Devices" on page 1219
#!/bin/bash
2. Configure a scheduled job to run this shell script at the relevant time intervals.
See the R80.40 Gaia Administration Guide.
Description
This command unregisters a user-defined Critical Device (Pnote). This means that this device
is no longer considered critical.
If a Critical Device was registered with a state "problem", before you ran this command, then
after you run this command, the status of the Cluster Member depends only on the states of
the remaining Critical Devices.
Syntax
Shell Command
Notes:
n The "-p" flag makes these changes permanent.
This means that after you reboot, these Critical Devices remain
unregistered.
n The "-g" flag applies the command to all configured Virtual Systems.
Related topics
n "Viewing Critical Devices" on page 1243
n "Reporting the State of a Critical Device" on page 1215
n "Registering a Critical Device" on page 1210
n "Registering Critical Devices Listed in a File" on page 1217
n "Unregistering All Critical Devices" on page 1219
Description
This command manually reports (changes) the state of a Critical Device to ClusterXL.
The reported state can be one of these:
n ok - Critical Device is alive.
n init - Critical Device is initializing. The Cluster Member is Down. In this state, the Cluster
Member cannot become Active.
n problem - Critical Device failed. If this state is reported to ClusterXL, the Cluster Member
immediately goes Down. This causes a failover.
If a Critical Device fails to report its state to the Cluster Member within the defined timeout, the
Critical Device, and by design the Cluster Member, are seen as failed. This is true only for
Critical Devices with timeouts. If a Critical Device is registered with the "-t 0" parameter, there
is no timeout. Until the Critical Device reports otherwise, the state of the Critical Device is
considered to be the last reported state.
Syntax
Shell Command
Gaia N/A
Clish
Notes:
n The "-g" flag applies the command to all configured Virtual Systems.
n If the "<Name of Critical Device>" reports its state as "problem", then
the Cluster Member reports its state as failed.
Related topics
n "Viewing Critical Devices" on page 1243
n "Registering a Critical Device" on page 1210
n "Registering Critical Devices Listed in a File" on page 1217
n "Unregistering a Critical Device" on page 1214
n "Unregistering All Critical Devices" on page 1219
Description
This command registers all the user-defined Critical Devices listed in the specified file.
This file must be a plain-text ASCII file, with each Critical Device defined on a separate line.
Each definition must contain three parameters, which must be separated by a space or a tab
character:
Where:
Parameter Description
<Timeout> If the Critical Device <Name of Device> fails to report its state to the
Cluster Member within this specified number of seconds, the Critical Device
(and by design the Cluster Member), are seen as failed.
For no timeout, use the value 0 (zero).
<Status> The Critical Device <Name of Device> reports one of these statuses to
the Cluster Member:
n ok - Critical Device is alive.
n init- Critical Device is initializing. The Cluster Member is Down. In
this state, the Cluster Member cannot become Active.
n problem - Critical Device failed. If this state is reported to ClusterXL,
the Cluster Member immediately goes Down. This causes a failover.
Syntax
Shell Command
Note - The "-g" flag applies the command to all configured Virtual Systems.
Related topics
n "Viewing Critical Devices" on page 1243
n "Reporting the State of a Critical Device" on page 1215
n "Registering a Critical Device" on page 1210
n "Unregistering a Critical Device" on page 1214
n "Unregistering All Critical Devices" on page 1219
Description
This command unregisters all critical devices from the Cluster Member.
Syntax
Shell Command
Notes:
n The "-a" flag specifies that all Pnotes must be unregistered
n The "-g" flag applies the command to all configured Virtual
Systems
Related topics
n "Viewing Critical Devices" on page 1243
n "Reporting the State of a Critical Device" on page 1215
n "Registering a Critical Device" on page 1210
n "Registering Critical Devices Listed in a File" on page 1217
n "Unregistering a Critical Device" on page 1214
Description
Cluster Members configure the Cluster Control Protocol (CCP) mode automatically.
You can configure the Cluster Control Protocol (CCP) Encryption on the Cluster Members.
See "Viewing the Cluster Control Protocol (CCP) Settings" on page 1280.
Shell Command
Description
This commands initiates a manual cluster failover (see sk55081).
Syntax
Shell Command
Example
... ...
[Expert@Member1:0]#
[Expert@Member1:0]#
[Expert@Member1:0]# clusterXL_admin up
This command does not survive reboot. To make the change permanent, please run 'set cluster
member admin down/up permanent' in clish or add '-p' at the end of the command in expert mode
Setting member to normal operation ...
Member current state is STANDBY
[Expert@Member1:0]#
[Expert@Member1:0]#
Description
ClusterXL considers a bond in Load Sharing mode to be in the "down" state when fewer than a
minimal number of required subordinate interfaces stay in the "up" state.
By default, the minimal number of required subordinate interfaces, which must stay in the "up"
state in a bond of n subordinate interfaces is n-1.
If one more subordinate interface fails (when n-2 subordinate interfaces stay in the "up" state),
ClusterXL considers the bond interface to be in the "down" state, even if the bond contains
more than two subordinate interfaces.
If a smaller number of subordinate interfaces can pass the expected traffic, you can configure
explicitly the minimal number of required subordinate interfaces.
Divide your maximal expected traffic speed by the speed of your subordinate interfaces and
round up the result to find an applicable minimal number of required subordinate interfaces.
Notes:
n Cluster Members save the configuration in the $FWDIR/conf/cpha_bond_
ls_config.conf file.
n The commands below save the changes in this file.
n Each line in the file has this syntax:
<Name of Bond Interface> <Minimal Number of Required
Subordinate Interfaces>
Syntax to add the minimal number of required subordinate interfaces for a specific Bond
interface
Shell Command
Gaia N/A
Clish
Syntax to remove the configured minimal number of required subordinate interfaces for a
specific Bond interface
Shell Command
Syntax to see the current configuration of the minimal number of required subordinate
interfaces
Shell Command
Procedure
Step Instructions
Example
[Expert@Member1:0]#
bond1 2
[Expert@Member1:0]#
[Expert@Member1:0]#
[Expert@Member1:0]#
Description
This procedure configures the Cluster Member to monitor only the physical link on the cluster
interfaces (instead of monitoring the Cluster Control Protocol (CCP) packets):
n If a link disappears on the configured interface, the Cluster Member changes the
interface's state to DOWN.
This causes the Cluster Member to change its state to DOWN.
n If a link appears again on the configured interface, the Cluster Member changes the
interface's state back to UP.
This causes the Cluster Member to change its state back to ACTIVE or STANDBY.
See "Viewing Cluster State" on page 1237.
Procedure
Step Instructions
Step Instructions
Best Practices:
n In High Availability cluster
1. Perform the configuration steps on all Cluster Members
2. Reboot all the Standby Cluster Members
3. Initiate a manual failover on the Active Cluster Member
4. Reboot the former Active Cluster Member
n In Load Sharing Unicast cluster
1. Perform the configuration steps on all Cluster Members
2. Reboot all the non-Pivot Cluster Members
3. Initiate a manual failover on the Pivot Cluster Member
4. Reboot the former Pivot Cluster Member
n In Load Sharing Multicast cluster
1. Perform the configuration steps on all Cluster Members
2. Reboot all Cluster Members except one
3. Initiate a manual failover on the remaining Cluster Member
4. Reboot the remaining Cluster Member
Description
This command changes the state of the Multi-Version Cluster (MVC) Mechanism - enable or
disable it.
Important:
n The MVC Mechanism is disabled by default.
n For limitations of the MVC Mechanism, see the R80.40 Installation and Upgrade
Guide > Chapter Upgrading Gateways and Clusters > Section Upgrading
ClusterXL, VSX Cluster, VRRP Cluster > Section Multi-Version Cluster
Upgrade.
Syntax
Shell Command
Parameters
Parameter Description
Notes:
n This command does not provide an output. To view the current state of the MVC
Mechanism, see "Viewing the State of the Multi-Version Cluster Mechanism" on
page 1281.
n The change made with this command survives reboot.
n If a specific scenario requires you to disable the MVC Mechanism before the
first start of an R80.40 Cluster Member (for example, immediately after an
upgrade to R80.40), then disable it before the first policy installation on this
Cluster Member.
Syntax
Notes:
n In Gaia Clish:
Enter the show cluster<ESC><ESC> to see all the available commands.
n In Expert mode:
Run the cphaprob command see all the available commands.
You can run the cphaprob commands from Gaia Clish as well.
n Syntax legend:
1. Curly brackets or braces { }:
Enclose a list of available commands or parameters, separated by the
vertical bar |, from which user can enter only one.
2. Angle brackets < >:
Enclose a variable - a supported value user needs to specify explicitly.
3. Square brackets or brackets [ ]:
Enclose an optional command or parameter, which user can also enter.
n You can include these commands in scripts to run them automatically.
The meaning of each command is explained in the next sections.
Show states of Cluster Members and their names show cluster cphaprob [-
(see "Viewing Cluster State" on page 1237) state vs <VSID>]
state
Show Critical Devices (Pnotes) and their states on show cluster cphaprob [-
the Cluster Member (see "Viewing Critical members pnotes l] [-ia] [-
Devices" on page 1243) {all | e] list
problem}
Show (and reset) cluster failover statistics on the show cluster cphaprob [-
Cluster Member (see "Viewing Cluster Failover failover reset {-c |
Statistics" on page 1261) [reset {count -h}] [-l
| history}] <count>]
show_
failover
Show Delta Sync statistics on the Cluster Member show cluster cphaprob [-
(see "Viewing Delta Synchronization" on statistics reset]
page 1264) sync [reset] syncstat
Show Delta Sync statistics for the Connections show cluster cphaprob [-
table on the Cluster Member (see "Viewing Cluster statistics reset]
Delta Sync Statistics for Connections Table" on transport ldstat
page 1272) [reset]
Show the Cluster Control Protocol (CCP) mode on show cluster cphaprob [-
the Cluster Member (see "Viewing Cluster members vs all] -a
Interfaces" on page 1251) interfaces if
virtual
Show cluster unique IP's table on the Cluster show cluster cphaprob
Member (see "Viewing Cluster IP Addresses" on members ips tablestat
page 1273) show cluster cphaprob -m
members tablestat
monitored
Show the Cluster Member ID Mode in local logs - show cluster cphaprob
by Member ID (default) or Member Name (see members idmode names
"Viewing the Cluster Member ID Mode in Local
Logs" on page 1275)
Show the Cluster Control Protocol (CCP) mode show cluster cphaprob -a
(see "Viewing the Cluster Control Protocol (CCP) members if
Settings" on page 1280) interfaces
virtual
show cluster
bond
all
name <Name of Bond>
failover
members
ccpenc
idmode
igmp
interfaces
all
secured
virtual
vlans
ips
monitored
mvc
pnotes
all
problem
release
roles
state
statistics
sync [reset]
transport [reset]
Description
This command monitors the cluster status (after you set up the cluster).
Syntax
Shell Command
Example
Member1>
Assigned n In the ClusterXL High Availability mode - shows the Active Cluster
Load Member with 100% load, and all other Standby Cluster Members with
0% load.
n In ClusterXL Load Sharing modes (Unicast and Multicast) - shows all
Active Cluster Members with 100% load.
State n In the ClusterXL High Availability mode, only one Cluster Member in a
fully-functioning cluster must be ACTIVE, and the other Cluster
Members must be in the STANDBY state.
n In the ClusterXL Load Sharing modes (Unicast and Multicast), all
Cluster Members in a fully-functioning cluster must be ACTIVE.
n In 3rd-party clustering configuration, all Cluster Members in a fully-
functioning cluster must be ACTIVE. This is because this command
only reports the status of the Full Synchronization process.
See the summary table below.
Active Shows the Critical Devices that report theirs states as "problem" (see
PNOTEs "Viewing Critical Devices" on page 1243).
Last Shows information about the last time this Cluster Member changed its
member cluster state.
state
change
event
State Shows the previous cluster state and the new cluster state of this Cluster
change Member.
Reason for Shows the reason why this Cluster Member changed its cluster state.
state
change
Event time Shows the date and the time when this Cluster Member changed its cluster
state.
Last cluster Shows information about the last time a cluster failover occurred.
failover
event
Event time Shows the date and the time of the last cluster failover.
Time of Shows the date and the time of the last counter reset, and the reset initiator.
counter
reset
When you examine the state of the Cluster Member, consider whether it forwards packets, and
whether it has a problem that prevents it from forwarding packets. Each state reflects the result
of a test on critical devices. This table shows the possible cluster states, and whether or not
they represent a problem.
Table: Description of the cluster states
Is this
Cluster Forwarding
Description state a
State packets?
problem?
Description
There are a number of built-in Critical Devices, and the Administrator can define additional
Critical Devices.
When a Critical Device reports its state as a "problem", the Cluster Member reports its state
as "DOWN".
To see the list of Critical Devices on a Cluster Member, and of all the other Cluster Members,
run the commands listed below on the Cluster Member.
Table: Built-in Critical Devices
Meaning of
Meaning of the
Critical Device Description the "OK"
"problem" state
state
Problem Monitors all the Critical Devices. None of the At least one of
Notification Critical the Critical
Devices on Devices on this
this Cluster Cluster Member
Member reports its state
report its state as "problem".
as problem.
Syntax
Shell Command
Where:
Command Description
show cluster Prints the list of all the "Built-in Devices" and the
members pnotes "Registered Devices" that report their state as "problem"
problem
cphaprob -ia When there are no issues on the Cluster Member, shows:
list There are no pnotes in problem state
When a Critical Device reports a problem, prints the Critical Device
"Problem Notification" and the Critical Device that reports its
state as "problem"
Related topics
n "Reporting the State of a Critical Device" on page 1215
n "Registering a Critical Device" on page 1210
n "Registering Critical Devices Listed in a File" on page 1217
n "Unregistering a Critical Device" on page 1214
n "Unregistering All Critical Devices" on page 1219
Examples
Example 1 - Critical Device 'fwd'
Critical Device fwd reports its state as problem because the fwd process is down.
Built-in Devices:
Registered Devices:
[Expert@Member1:0]#
Critical Device CoreXL Configuration reports its state as problem because the
numbers of CoreXL Firewall instances do not match between the Cluster Members.
Built-in Devices:
Registered Devices:
[Expert@Member1:0]#
Description
This command shows the state of the Cluster Member interfaces and the virtual cluster
interfaces.
ClusterXL treats the interfaces as Critical Devices. ClusterXL makes sure that interfaces can
send and receive CCP packets.
ClusterXL also sets the required minimal number of functional interfaces to the largest number
of functional interfaces ClusterXL detected since the last reboot. If the number of functional
interfaces is less than the required number, ClusterXL declares the Cluster Member as failed
and starts a failover. The same applies to the synchronization interfaces, where only good
synchronization interfaces are counted.
When an interface is DOWN, it means that the interface cannot receive or send CCP packets,
or both. An interface may also be able to receive, but not send CCP packets. The time you see
in the command's output is the number of seconds that elapsed since the interface was last
able to receive or send a CCP packet.
Syntax
Shell Command
Where:
Command Description
show cluster members Shows only cluster interfaces (Cluster and Sync)
interfaces secured and their states:
n without Network Objective
n without VLAN monitoring mode
n without monitored VLAN interfaces
show cluster members Shows full list of cluster virtual interfaces and their
interfaces virtual states:
n including the number of required interfaces
n including Network Objective
n without VLAN monitoring mode
n without monitored VLAN interfaces
Command Description
Output
The output of these commands must be identical to the configuration in the cluster object's
Network Management page in SmartConsole.
Example
[Expert@Member1:0]# cphaprob -a -m if
eth0 UP
eth1 (S) UP
eth2 (LM) UP
bond1 (LS) UP
eth0 192.168.3.247
eth2 44.55.66.247
bond1 77.88.99.247
[Expert@Member1:0]#
Required secured Shows the total number of the required Sync interfaces.
interfaces This number is based on the configuration of the cluster
object > Network Management page.
Non-Monitored This means that Cluster Member does not monitor the state
of this interface.
In SmartConsole, in the cluster object > Network
Management page, administrator configured the Network
Type Private for this interface.
DOWN This means that Cluster Members monitors the state of this
interface.
The current cluster state of this interface is DOWN, which
means this interface cannot send CCP packets, receive CCP
packets, or both.
In SmartConsole, in the cluster object > Network
Management page, administrator configured one of these
Network Types for this interface: Cluster, Sync, or Cluster +
Sync.
Virtual cluster interfaces Shows the total number of the configured virtual cluster
interfaces.
This number is based on the configuration of the cluster
object > Network Management page.
No VLANs are monitored Shows the VLAN monitoring mode - there are no VLAN
on the member interfaces configured on the cluster interfaces.
Monitoring mode is Shows the VLAN monitoring mode - there are some VLAN
Monitor all VLANs: All interfaces configured on the cluster interfaces, and Cluster
VLANs are monitored Member monitors all VLAN IDs.
Monitoring mode is Shows the VLAN monitoring mode - there are some VLAN
Monitor specific VLAN: interfaces configured on the cluster interfaces, and Cluster
Only specified VLANs are Member monitors only specific VLAN IDs.
monitored
Description
This command shows the configuration of bond interfaces and their subordinate interfaces.
Syntax
Shell Command
Where:
Command Description
show cluster bond name <bond_ Shows configuration of the specified bond
name> interface
cphaprob show_bond <bond_
name>
Examples
Example 1 - 'cphaprob show_bond'
[Expert@Member2:0]# cphaprob show_bond
Legend:
-------
UP! - Bond interface state is UP, yet attention is required
Slaves configured - number of slave interfaces configured on the bond
Slaves link up - number of operational slaves
Slaves required - minimal number of operational slaves required for bond to be UP
[Expert@Member2:0]#
Description of the output fields for the "cphaprob show_bond" and "show cluster
bond all" commands:
[Expert@Member2:0]#
Description of the output fields for the "cphaprob show_bond <bond_name>" and
"show cluster bond name <bond_name>" commands:
Table: Description of the output fields
Field Description
Bond mode Bonding mode of this Gaia bonding group. One of these:
n High Availability
n Load Sharing
Link State of the physical link on the physical subordinate interfaces in this
Gaia bonding group. One of these:
n Yes - Link is present
n No - Link is lost
Legend:
---------
Bonds in group - a list of the bonds in the bond group
Required active bonds - number of required active bonds
[Expert@Member2:0]#
Bonds in group Names of the Gaia bond interfaces configured in this Group of
Bonds.
Description
This command shows the cluster failover statistics on the Cluster Member:
n Number of failovers that happened
n Failover reason
n The time of the last failover event
Shell Command
Shell Command
Parameters
Parameter Description
-l <number> Specifies how many of last failover events to show (between 1 and 50)
Example
Cluster failover history (last 20 failovers since reboot/reset on Sun Sep 8 16:08:34 2019):
[Expert@Member1:0]#
Description
This command shows information about the software version (including private hotfixes) on
the local Cluster Member and its matches / mismatches with other Cluster Members.
Syntax
Shell Command
Example
ID SW release
[Expert@Member1:0]#
Shell Command
Shell Command
Example output of the "show cluster statistics sync" and "cphaprob syncstat"
commands from a Cluster Member:
Sync status: OK
Drops:
Lost updates................................. 0
Lost bulk update events...................... 0
Oversized updates not sent................... 0
Sync at risk:
Sent reject notifications.................... 0
Received reject notifications................ 0
Sent messages:
Total generated sync messages................ 26079
Sent retransmission requests................. 0
Sent retransmission updates.................. 0
Peak fragments per update.................... 1
Received messages:
Total received updates....................... 3710
Received retransmission requests............. 0
Sync Interface:
Name......................................... eth1
Link speed................................... 1000Mb/s
Rate......................................... 46000 [Bps]
Peak rate.................................... 46000 [Bps]
Link usage................................... 0%
Total........................................ 376827[KB]
Timers:
Delta Sync interval (ms)..................... 100
This section shows the status of the Delta Sync mechanism. One of these:
n Sync status: OK
n Sync status: Off - Full-sync failure
n Sync status: Off - Policy installation failure
n Sync status: Off - Cluster module not started
n Sync status: Off - SIC failure
n Sync status: Off - Full-sync checksum error
n Sync status: Off - Full-sync received queue is full
This section shows statistics for drops on the Delta Sync network.
Lost Shows how many Delta Sync updates this Cluster Member considers as
updates lost (based on sequence numbers in CCP packets).
If this counter shows a value greater than 0, this Cluster Member lost
Delta Sync updates.
Possible mitigation:
Increase the size of the Sending Queue and the size of the Receiving
Queue:
n Increase the size of the Sending Queue, if the counter Received
reject notification is increasing.
n Increase the size of the Receiving Queue, if the counter Received
reject notification is not increasing.
Lost bulk Shows how many times this Cluster Member missed Delta Sync updates.
update (bulk update = twice the size of the local receiving queue)
events This counter increases when this Cluster Member receives a Delta Sync
update with a sequence number much greater than expected. This
probably indicates some networking issues that cause massive packet
drops.
This counter increases when the amount of missed Delta Sync updates
is more than twice the local Receiving Queue Size.
Possible mitigation:
n If the counter's value is steady, this might indicate a one-time
synchronization problem that can be resolved by running manual
Full Sync. See sk37029.
n If the counter's value keeps increasing, probable there are some
networking issues. Increase the sizes of both the Receiving Queue
and Sending Queue.
Oversized Shows how many oversized Delta Sync updates were discarded before
updates not sending them.
sent This counter increases when Delta Sync update is larger than the local
Fragments Queue Size.
Possible mitigation:
n If the counter's value is steady, increase the size of the Sending
Queue.
n If the counter's value keeps increasing, contact Check Point
Support.
This section shows statistics that the Sending Queue is at full capacity and rejects Delta
Sync retransmission requests.
Table: Description of the output fields
Field Description
Sent reject Shows how many times this Cluster Member rejected Delta Sync
notifications retransmission requests from its peer Cluster Members, because this
Cluster Member does not hold the requested Delta Sync update
anymore.
Received Shows how many reject notifications this Cluster Member received
reject from its peer Cluster Members.
notification
This section shows statistics for Delta Sync updates sent by this Cluster Member to its peer
Cluster Members.
Table: Description of the output fields
Field Description
Total generated Shows how many Delta Sync updates were generated.
sync messages This counts the Delta Sync updates, Retransmission Requests,
Retransmission Acknowledgments, and so on.
Sent Shows how many times this Cluster Member asked its peer Cluster
retransmission Members to retransmit specific Delta Sync update(s).
requests Retransmission requests are sent when certain Delta Sync updates
(with a specified sequence number) are missing, while the sending
Cluster Member already received Delta Sync updates with
advanced sequences.
Note - Compare the number of Sent retransmission requests to the
Total generated sync messages of the other Cluster Members.
A large counter's value can imply connectivity problems. If the
counter's value is unreasonably high (more than 30% of the Total
generated sync messages of other Cluster Members), contact
Check Point Support equipped with the entire output and a detailed
description of the network topology and configuration.
Sent Shows how many times this Cluster Member retransmitted specific
retransmission Delta Sync update(s) at the requests from its peer Cluster Members.
updates
Peak fragments Shows the peak amount of fragments in the Fragments Queue on
per update this Cluster Member (usually, should be 1).
This section shows statistics for Delta Sync updates that were received by this Cluster
Member from its peer Cluster Members.
Table: Description of the output fields
Field Description
Total received Shows the total number of Delta Sync updates this Cluster Member
updates received from its peer Cluster Members.
This counts only Delta Sync updates (not Retransmission Requests,
Retransmission Acknowledgments, and others).
Sending Shows the size of the cyclic queue, which buffers all the Delta Sync
queue size updates that were already sent until it receives an acknowledgment from
the peer Cluster Members.
This queue is needed for retransmitting the requested Delta Sync
updates.
Each Cluster Member has one Sending Queue.
Default: 512 Delta Sync updates, which is also the minimal value.
Receiving Shows the size of the cyclic queue, which buffers the received Delta
queue size Sync updates in two cases:
n When Delta Sync updates are missing, this queue is used to hold
the remaining received Delta Sync updates until the lost Delta
Sync updates are retransmitted (Cluster Members must keep the
order, in which they save the Delta Sync updates in the kernel
tables).
n This queue is used to re-assemble a fragmented Delta Sync
update.
Fragments Shows the size of the queue, which is used to prepare a Delta Sync
queue size update before moving it to the Sending Queue.
Notes:
n This queue must be smaller than the Sending Queue.
n This queue must be significantly smaller than the Receiving
Queue.
Default: 50 Delta Sync updates, which is also the minimal value.
Field Description
Delta Sync Shows the interval at which this Cluster Member sends the Delta Sync
interval (ms) updates from its Sending Queue.
The base time unit is 100ms (or 1 tick).
Default: 100 ms, which is also the minimum value.
See Increasing the Sync Timer.
Description
This command shows the IGMP membership status.
Syntax
Shell Command
Example
[Expert@Member1:0]#
Description
This command shows Delta Sync statistics about the operations performed in the Connections
Kernel Table (id 8158).
The output shows operations such as creating a new connection (SET), updating a connection
(REFRESH), deleting a connection (DELETE), and so on.
Syntax
Shell Command
The "reset" flag resets the kernel statistics, which were collected since the last reboot or
reset.
Example
[Expert@Member1:0]#
Description
This command shows the IP addresses and interfaces of the Cluster Members.
Shell Command
Note - These commands are available in R80.40 Jumbo Hotfix Accumulator Take 100
and higher (PRHF-13935).
Shell Command
Example
(Local)
0 1 192.168.3.245
0 2 11.22.33.245
0 3 44.55.66.245
1 1 192.168.3.246
1 2 11.22.33.246
1 3 44.55.66.246
------------------------------------------
[Expert@Member1:0]#
[Expert@Member1:0]# fw ctl iflist
1 : eth0
2 : eth1
3 : eth2
[Expert@Member1:0]#
Description
This command shows how the local ClusterXL logs show the Cluster Member - by its Member
ID (default), or its Member Name.
See "Configuring the Cluster Member ID Mode in Local Logs" on page 1209.
Syntax
Shell Command
Example
[Expert@Member1:0]#
Description
This command shows the interfaces, which the RouteD daemon monitors on the Cluster
Member when you configure OSPF.
The idea is that if you configure OSPF, Cluster Member monitors these interfaces and does
not bring up the Cluster Member unless RouteD daemon says it is OK to bring up the Cluster
Member. This is used mainly in ClusterXL High Availability Primary Up configuration to avoid
premature failbacks.
Syntax
Shell Command
Example 1
[Expert@Member1:0]#
Example 2
eth0
[Expert@Member1:0]#
Description
This command shows on which Cluster Member the RouteD daemon runs as a Master.
Notes:
n In ClusterXL High Availability, the RouteD daemon must run as a Master only
on the Active Cluster Member.
n In ClusterXL Load Sharing, the RouteD daemon must run as a Master only on
one of the Active Cluster Members and as a Non-Master on all other Cluster
Members.
n In VRRP Cluster, the RouteD daemon must run as a Master only on the VRRP
Master Cluster Member.
Syntax
Shell Command
Example
ID Role
1 (local) Master
2 Non-Master
[Expert@Member1:0]#
Description
This command shows the Cluster Correction Statistics on each Cluster Member.
The Cluster Correction Layer (CCL) is a mechanism that deals with asymmetric connections.
The CCL provides connections stickiness by "correcting" the packets to the correct Cluster
Member:
n In most cases, the CCL makes the correction from the CoreXL SND.
n In some cases (like Dynamic Routing, or VPN), the CCL makes the correction from the
Firewall or SecureXL.
In some cases, ClusterXL needs to send some data along with the corrected packet (currently,
only in VPN). For such packets, the output shows "with metadata".
Note - For more information about CoreXL, see the R80.40 Performance Tuning
Administration Guide.
Syntax
Shell Command
Where:
Command Description
Description
n You can view the Cluster Control Protocol (CCP) mode on the Cluster Members.
n You can view the Cluster Control Protocol (CCP) Encryption on the Cluster Members -
enabled or disabled (and the encryption key).
See "Configuring the Cluster Control Protocol (CCP) Settings" on page 1220
Shell Command
Shell Command
Description
This command shows the state of the Multi-Version Cluster (MVC) Mechanism - enabled (ON)
or disabled (OFF).
See "Configuring the Multi-Version Cluster Mechanism" on page 1231.
Syntax
Shell Command
Example
ON
Member1>
Description
This command shows the Full Connectivity Upgrade statistics when you upgrade between
minor versions.
Syntax
Shell Command
Example
During FCU....................... no
Connection module map............ none
[Expert@Member1:0]#
cpconfig
Description
This command starts the Check Point Configuration Tool.
This tool configures specific settings for the installed Check Point products.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Syntax
cpconfig
Menu Options
Note - The options shown depend on the configuration and installed products.
Licenses and contracts Manages Check Point licenses and contracts on this
Security Gateway or Cluster Member.
Enable cluster membership Enables the cluster membership on the Security Gateway.
for this gateway This change requires a reboot of the Security Gateway.
For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Disable cluster membership Disables the cluster membership on the Security Gateway.
for this gateway This change requires a reboot of the Security Gateway.
For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Enable Check Point Per Enables Virtual System Load Sharing on the VSX Cluster
Virtual System State Member.
For more information, see the R80.40 VSX Administration
Guide.
Disable Check Point Per Disables Virtual System Load Sharing on the VSX Cluster
Virtual System State Member.
For more information, see the R80.40 VSX Administration
Guide.
Enable Check Point Enables Check Point ClusterXL for Bridge mode.
ClusterXL for Bridge This change requires a reboot of the Cluster Member.
Active/Standby For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Disable Check Point Disables Check Point ClusterXL for Bridge mode.
ClusterXL for Bridge This change requires a reboot of the Cluster Member.
Active/Standby For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Automatic start of Check Shows and controls which of the installed Check Point
Point Products products start automatically during boot.
[Expert@MySingleGW:0]# cpconfig
This program will let you re-configure
your Check Point products configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) SNMP Extension
(3) PKCS#11 Token
(4) Random Pool
(5) Secure Internal Communication
(6) Enable cluster membership for this gateway
(7) Check Point CoreXL
(8) Automatic start of Check Point Products
(9) Exit
[Expert@MyClusterMember:0]# cpconfig
This program will let you re-configure
your Check Point products configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) SNMP Extension
(3) PKCS#11 Token
(4) Random Pool
(5) Secure Internal Communication
(6) Disable cluster membership for this gateway
(7) Enable Check Point Per Virtual System State
(8) Enable Check Point ClusterXL for Bridge Active/Standby
(9) Check Point CoreXL
(10) Automatic start of Check Point Products
(11) Exit
cphastart
Description
Starts the cluster configuration on a Cluster Member after it was stopped with the "cphastop"
on page 1287 command.
Best Practice - To start a Cluster Member, use the "cpstart" on page 957 command.
Note - This command does not initiate a Full Synchronization on the Cluster Member.
Syntax
cphastart
[-h]
[-d]
Parameters
Parameter Description
cphastop
Description
Stops the cluster software on a Cluster Member.
Best Practice - To stop a Cluster Member, use the "cpstop" on page 967 command.
Notes:
n This command stops the Cluster Member from passing traffic.
n This command stops the State Synchronization between this Cluster Member
and its peer Cluster Members.
n After you run this command, you can still open connections directly to this
Cluster Member.
n To start the cluster software, run the "cphastart" on page 1286 command.
Syntax
cphastop
cp_conf fullha
Description
Manages the state of the Full High Availability Cluster:
n Enables the Full High Availability Cluster
n Disables the Full High Availability Cluster
n Deletes the Full High Availability peer
n Shows the Full High Availability state
Important - To configure a Full High Availability cluster, follow the R80.40 Installation
and Upgrade Guide.
Syntax
cp_conf fullha
enable
del_peer
disable
state
Parameters
Parameter Description
del_peer Deletes the Full High Availability peer from the configuration.
Example
cp_conf ha
Description
Enables or disables cluster membership on this Security Gateway.
Important - This command is for Check Point use only. To configure cluster
membership, you must use the "cpconfig" on page 936 command.
For more information, see the R80.40 ClusterXL Administration Guide.
Syntax
Parameters
Parameter Description
norestart Optional: Specifies to apply the configuration change without the restart of
Check Point services. The new configuration takes effect only after reboot.
Example 1 - Enable the cluster membership without restart of Check Point services
[Expert@MyGW:0]#
Example 2 - Disable the cluster membership without restart of Check Point services
[Expert@MyGW:0]#
fw hastat
Description
Shows information about Check Point computers in High Availability configuration and their
states.
Note - This command is outdated. On cluster members, run the Gaia Clish command
"show cluster state", or the Expert mode command "cphaprob state".
Note - This command is outdated. On Management Servers, run the "cpstat" on
page 192 command.
Syntax
Parameters
Parameter Description
[Expert@Member1:0]# fw hastat
HOST NUMBER HIGH AVAILABILITY STATE MACHINE STATUS
192.168.3.52 1 active OK
[Expert@Member1:0]#
fwboot ha_conf
Description
Configures the cluster mechanism during boot.
Notes:
n You must run this command from the Expert mode.
n Refer to these related commands:
l "fw defaultgen" on page 1046
Syntax
$FWDIR/bin/clusterXL_admin
Script Workflow
This shell script does one of these:
n Registers a Critical Device called "admin_down" and reports the state of that Critical
Device as "problem".
This gracefully changes the state of the Cluster Member to "DOWN".
n Reports the state of the registered Critical Device "admin_down" as "ok".
This gracefully changes the state of the Cluster Member to "UP".
Then, the script unregisters the Critical Device "admin_down".
For more information, see sk55081.
Example
#! /bin/csh -f
#
# The script will cause the machine to get into down state, thus the member will not filter
packets.
# It will supply a simple way to initiate a failover by registering a new device in problem
state when
# a failover is required and will unregister the device when wanting to return to normal
operation.
# USAGE:
# clusterXL_admin <up|down>
# Inform the user that the command can run with persistent mode.
if ("$PERSISTENT" != "-p") then
echo "This command does not survive reboot. To make the change permanent, please run
'set cluster member admin down/up permanent' in clish or add '-p' at the end of the command in
expert mode"
endif
if ( $1 == "up" ) then
echo "Setting member to normal operation ..."
$FWDIR/bin/cphaconf set_pnote -d admin_down $PERSISTENT unregister > & /dev/null
if ( `uname` == 'IPSO' ) then
sleep 5
else
sleep 1
endif
if ( $1 == "down" ) then
echo "Setting member to administratively down state ..."
$FWDIR/bin/cphaconf set_pnote -d admin_down -t 0 -s problem $PERSISTENT register > &
/dev/null
sleep 1
$FWDIR/bin/clusterXL_monitor_ips
Script Workflow
1. Registers a Critical Device called "host_monitor" with the status "ok".
2. Starts to send pings to the list of predefined IP addresses in the $FWDIR/conf/cpha_
hosts file.
3. While the script receives responses to its pings, it does not change the status of that
Critical Device.
4. If the script does not receive a response to even one ping, it reports the state of that
Critical Device as "problem".
This gracefully changes the state of the Cluster Member to DOWN.
If the script receives responses to its pings again, it changes the status of that Critical
Device to "ok" again.
Example
#!/bin/sh
#
# The script tries to ping the hosts written in the file $FWDIR/conf/cpha_hosts. The names (must
be resolveable) ot the IPs of the hosrs must be written in seperate lines.
# the file must not contain anything else.
# We ping the given hosts every number of seconds given as parameter to the script.
# USAGE:
# cpha_monitor_ips X silent
# where X is the number of seconds between loops over the IPs.
# if silent is set to 1, no messages will appear on the console
#
# We initially register a pnote named "host_monitor" in the problem notification mechanism
# when we detect that a host is not responding we report the pnote to be in "problem" state.
# when ping succeeds again - we report the pnote is OK.
silent=0
if [ -n "$2" ]; then
if [ $2 -le 1 ]; then
silent=$2
fi
fi
hostfile=$FWDIR/conf/cpha_hosts
arch=`uname -s`
if [ $arch = "Linux" ]
then
#system is linux
ping="ping -c 1 -w 1"
else
ping="ping"
fi
$FWDIR/bin/cphaconf set_pnote -d host_monitor -t 0 -s ok register
TRUE=1
while [ "$TRUE" ]
do
result=1
for hosts in `cat $hostfile`
do
if [ $silent = 0 ]
then
echo "pinging $hosts using command $ping $hosts"
fi
if [ $arch = "Linux" ]
then
$ping $hosts > /dev/null 2>&1
else
$ping $hosts $1 > /dev/null 2>&1
fi
status=$?
if [ $status = 0 ]
then
if [ $silent = 0 ]
then
echo " $hosts is alive"
fi
else
if [ $silent = 0 ]
then
echo " $hosts is not responding "
fi
result=0
fi
done
if [ $silent = 0 ]
then
echo "done pinging"
fi
if [ $result = 0 ]
then
if [ $silent = 0 ]
then
echo " Cluster member should be down!"
fi
$FWDIR/bin/cphaconf set_pnote -d host_monitor -s problem report
else
if [ $silent = 0 ]
then
echo " Cluster member seems fine!"
fi
$FWDIR/bin/cphaconf set_pnote -d host_monitor -s ok report
fi
if [ "$silent" = 0 ]
then
echo "sleeping"
fi
sleep $1
echo "sleep $1"
done
$FWDIR/bin/clusterXL_monitor_process
Script Workflow
1. Registers Critical Devices (with the status "ok") called as the names of the processes
you specified in the $FWDIR/conf/cpha_proc_list file.
2. While the script detects that the specified process runs, it does not change the status of
the corresponding Critical Device.
3. If the script detects that the specified process do not run anymore, it reports the state of
the corresponding Critical Device as "problem".
This gracefully changes the state of the Cluster Member to "DOWN".
If the script detects that the specified process runs again, it changes the status of the
corresponding Critical Device to "ok" again.
For more information, see sk92904.
Example
#!/bin/sh
#
# This script monitors the existance of processes in the system. The process names should be
written
# in the $FWDIR/conf/cpha_proc_list file one every line.
#
# USAGE :
# cpha_monitor_process X silent
# where X is the number of seconds between process probings.
# if silent is set to 1, no messages will appear on the console.
#
#
# We initially register a pnote for each of the monitored processes
# (process name must be up to 15 charachters) in the problem notification mechanism.
# when we detect that a process is missing we report the pnote to be in "problem" state.
# when the process is up again - we report the pnote is OK.
if [ "$2" -le 1 ]
then
silent=$2
else
silent=0
fi
if [ -f $FWDIR/conf/cpha_proc_list ]
then
procfile=$FWDIR/conf/cpha_proc_list
else
echo "No process file in $FWDIR/conf/cpha_proc_list "
exit 0
fi
arch=`uname -s`
while [ 1 ]
do
result=1
status=$?
if [ $status = 0 ]
then
if [ $silent = 0 ]
then
echo " $process is alive"
fi
# echo "3, $FWDIR/bin/cphaconf set_pnote -d $process -s ok report"
$FWDIR/bin/cphaconf set_pnote -d $process -s ok report
else
if [ $silent = 0 ]
then
echo " $process is down"
fi
done
if [ $result = 0 ]
then
if [ $silent = 0 ]
then
echo " One of the monitored processes is down!"
fi
else
if [ $silent = 0 ]
then
echo " All monitored processes are up "
fi
fi
if [ "$silent" = 0 ]
then
echo "sleeping"
fi
sleep $1
done
SecureXL Commands
For more information about SecureXL, see:
n R80.40 Performance Tuning Administration Guide - Chapter SecureXL.
n sk98722 - ATRG: SecureXL.
fwaccel help
fwaccel
cfg <options>
conns <options>
dbg <options>
dos <options>
feature <options>
off <options>
on <options>
ranges <options>
stat <options>
stats <options>
synatk <options>
tab <options>
templates <options>
ver
fwaccel6 help
fwaccel6
conns <options>
dbg <options>
dos <options>
feature <options>
off <options>
on <options>
ranges <options>
stat <options>
stats <options>
synatk <options>
tab <options>
templates <options>
ver
cfg <options> Controls the SecureXL acceleration parameters (for IPv4 only).
See "fwaccel cfg" on page 1310.
dos <options> Controls the Rate Limiting for DoS Mitigation in SecureXL.
See "fwaccel dos" on page 1322.
off <options> Stops the acceleration on-the-fly. This does not survive reboot.
See "fwaccel off" on page 1353.
fwaccel cfg
Description
The fwaccel cfg command controls the SecureXL acceleration parameters.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Syntax
fwaccel cfg
-h
-a {<Number of Interface> | <Name of Interface> | reset}
-b {on | off}
-c <Number>
-d <Number>
-e <Number>
-i {on | off}
-l <Number>
-m <Seconds>
-p {on | off}
-r <Number>
-v <Seconds>
-w {on | off}
Important:
n These commands do not provide output. You cannot see the currently configured
values.
n Changes made with these commands do not survive reboot.
Parameters
Parameter Description
Parameter Description
Notes:
n This command does not support Falcon Acceleration Cards.
n To see the required information about the interfaces, run
these commands in the specified order:
"fw getifs" on page 1053
"fw ctl iflist" on page 1032
n To see if the "fwaccel cfg -a ..." command failed,
run this command:
tail -n 10 /var/log/messages
Parameter Description
Important - If you configure a limit, you must stop and start the
acceleration for this change to take effect. Run the "fwaccel off"
on page 1353 command and then the "fwaccel on" on page 1357
command.
-r <Number> Configures the maximal number of retries for SecureXL API calls.
-w {on | off} Configures the support for warnings about the IPS protection
Sequence Verifier:
n on - Enable the support for these warnings.
n off - Disables the support for these warnings.
fwaccel conns
Description
The fwaccel conns and fwaccel6 conns commands show the list of the SecureXL connections
on the local Security Gateway, or Cluster Member.
Warning - If the number of concurrent connections is large, when you run these
commands, they can consume memory and CPU at very high level (see sk118716).
fwaccel conns
-h
-f <filter>
-m <Number of Entries>
-s
fwaccel6 conns
-h
-f <Filter>
-m <Number of Entries>
-s
Parameters
Parameter Description
Parameter Description
Idx Interface
--- ---------
0 lo
1 eth0
2 eth1
fwaccel dbg
Description
The fwaccel dbg command controls the SecureXL debug. See "SecureXL Debug Procedure"
on page 1483.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
fwaccel dbg
-h
-m <Name of SecureXL Debug Module>
all
+ <Debug Flags>
- <Debug Flags>
reset
-f {"<5-Tuple Debug Filter>" | reset}
list
resetall
Parameters
Parameter Description
all Enables all debug flags for the specified debug module.
+ <Debug Flags> Enables the specified debug flags for the specified debug
module:
Syntax:
+ Flag1 [Flag2 Flag3 ... FlagN]
Note - You must press the space bar key after the plus
(+) character.
Parameter Description
- <Debug Flags> Disables all debug flags for the specified debug module.
Syntax:
- Flag1 [Flag2 Flag3 ... FlagN]
Note - You must press the space bar key after the
minus (-) character.
reset Resets all debug flags for the specified debug module to
their default state.
-f "<5-Tuple Debug Configures the debug filter to show only debug messages
Filter>" that contain the specified connection.
The filter is a string of five numbers separated with commas:
"<Source IP Address>,<Source
Port>,<Destination IP
Address>,<Destination Port>,<Protocol
Number>"
Notes:
n You can configure only one debug filter at one
time.
n You can use the asterisk "*" as a wildcard for an
IP Address, Port number, or Protocol number.
n For more information, see IANA Service Name
and Port Number Registry and IANA Protocol
Numbers.
resetall Reset all debug flags for all debug modules to their default
state.
Examples
Example 1 - Default output
[Expert@MyGW:0]# fwaccel dbg
Usage: fwaccel dbg [-m <...>] [resetall | reset | list | all | +/- <flags>]
-m <module> - module of debugging
-h - this help message
resetall - reset all debug flags for all modules
reset - reset all debug flags for module
all - set all debug flags for module
list - list all debug flags for all modules
-f reset | "<5-tuple>" - filter debug messages
+ <flags> - set the given debug flags
- <flags> - unset the given debug flags
Module: db
err get save del tmpl tmo init ant profile nmr nmt
Module: api
err init add update del acct conf stat vpn notif tmpl sv pxl qos gtp infra tmpl_info upd_conf
upd_if_inf add_sa del_sa del_all_sas misc get_features get_tab get_stat reset_stat tag long_
ver del_all_tmpl get_state upd_link_sel
Module: pkt
err f2f frag spoof acct notif tcp_state tcp_state_pkt sv cpls routing drop pxl qos user
deliver vlan pkt nat wrp corr caf
Module: infras
err reorder pm
Module: tmpl
err dtmpl_get dtmpl_notif tmpl
Module: vpn
err vpnpkt linksel routing vpn
Module: nac
err db db_get pkt pkt_ex signature offload idnt ioctl nac
Module: cpaq
init client server exp cbuf opreg transport transport_utils error
Module: synatk
init conf conn err log pkt proxy state msg
Module: adp
err rt nh eth heth wrp inf mbs bpl bplinf mbeinf if drop bond xmode ipsctl xnp
Module: dos
fw1-cfg fw1-pkt sim-cfg sim-pkt err detailed drop
[Expert@MyGW:0]#
Module: db (1)
err
Module: db (1)
err
err
Example 4 - Configuring debug filter for an SSH connection from 192.168.20.30 to 172.16.40.50
[Expert@MyGW:0]# fwaccel dbg -f 192.168.20.30,*,172.16.40.50,22,6
Debug filter was set.
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel dbg list
... ...
fwaccel dos
Description
The fwaccel dos and fwaccel6 dos commands control the Rate Limiting for DoS mitigation
techniques in SecureXL on the local Security Gateway, or Cluster Member.
Important:
n In VSX mode, you must go to the context of an applicable Virtual System.In
Gaia Clish, run: set virtual-system <VSID>In the Expert mode, run:
vsenv <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
n Starting from R80.40 Jumbo Hotfix Accumulator Take 92, these commands
were renamed:
l from "fwaccel dos blacklist" to "fwaccel dos deny"
n Starting from R80.40 Jumbo Hotfix Accumulator Take 92, these commands
were renamed:
l from "fwaccel dos whitelist" to "fwaccel dos allow"
fwaccel dos
blacklist <options>
config <options>
pbox <options>
rate <options>
stats <options>
whitelist <options>
fwaccel dos
allow <options>
config <options>
deny <options>
pbox <options>
rate <options>
stats <options>
fwaccel6 dos
blacklist <options>
config <options>
pbox <options>
rate <options>
stats <options>
whitelist <options>
fwaccel6 dos
allow <options>
config <options>
deny <options>
pbox <options>
rate <options>
stats <options>
Parameters
Parameter Description
allow Starting from R80.40 Jumbo Hotfix Accumulator Take 92, replaces the
<options> "whitelist" parameter.
whitelist Configures the allow-list for source IP addresses in the SecureXL
<options> Penalty Box.
See "fwaccel dos allow / whitelist" on page 1325.
deny Starting from R80.40 Jumbo Hotfix Accumulator Take 92, replaces the
<options> "blacklist" parameter.
blacklist Controls the IP deny-list in SecureXL.
<options> See "fwaccel dos deny / blacklist" on page 1336.
Parameter Description
Description
The fwaccel dos whitelist / fwaccel dos allow and fwaccel6 dos whitelist / fwaccel6 dos allow
commands control the IP allow-list for source IP addresses in the SecureXL Penalty Box.
This allow list overrides which packet the SecureXL Penalty Box drops.
Important:
n Starting from R80.40 Jumbo Hotfix Accumulator Take 92, these commands
were renamed:
l from "fwaccel dos whitelist" to "fwaccel dos allow"
l --enable-drop-frags
Notes:
n To allow the Rate Limiting policy, refer to the bypass action of the fw samp
command.
For example, fw samp -a b ...
For more information about the fw sam_policy command, see the R80.40
Performance Tuning Administration Guide - Chapter SecureXL Commands and
Debug - Section fw sam_policy.
n This command is similar to the "fwaccel dos pbox {whitelist |
allow}" command (see "fwaccel dos pbox" on page 1341).
n Also, see the "fwaccel synatk allow / whitelist" on page 1403 command.
fwaccel dos
{whitelist | allow}
-a <IPv4 Address>[/<Subnet Prefix>]
-d <IPv4 Address>[/<Subnet Prefix>]
-F
-l /<Path>/<Name of File>
-L
-s
Parameters
Parameter Description
whitelist Starting from R80.40 Jumbo Hotfix Accumulator Take 92, the
allow "allow" parameter replaces the "whitelist" parameter.
Controls the IP allow list.
-a <IPv4 Adds the specified IP address to the Penalty Box allow list.
Address>
n <IPv4 Address>
[/<Subnet
Prefix>] Can be an IPv4 address of a network or a host.
n <Subnet Prefix>
Must specify the length of the subnet mask in the format
/<bits>.
Optional for a host IPv4 address.
Mandatory for a network IPv4 address.
Range - from /1 to /32.
Important - If you do not specify the subnet prefix explicitly,
this command uses the subnet prefix /32.
Examples:
n For a host:
192.168.20.30
192.168.20.30/32
n For a network:
192.168.20.0/24
Parameter Description
-d <IPv4 Removes the specified IPv4 address from the Penalty Box allow
Address> list.
[/<Subnet
n <IPv4 Address>
Prefix>]
Can be an IPv4 address of a network or a host.
n <Subnet Prefix>
Optional. Must specify the length of the subnet mask in the
format /<bits>.
Optional for a host IPv4 address.
Mandatory for a network IPv4 address.
Range - from /1 to /32.
Important - If you do not specify the subnet prefix explicitly,
this command uses the subnet prefix /32.
-F Removes (flushes) all entries from the Penalty Box allow list.
-l /<Path>/<Name Loads the Penalty Box allow list entries from the specified plain-
of File> text file.
Note - To replace the current deny list with the contents of a new
file, use both the "-F" and "-L" parameters on the same command
line.
Important:
n You must manually create and configure this file with the
touch or vi command.
n You must assign at least the read permission to this file with
the chmod +x command.
n Each entry in this file must be on a separate line.
n Each entry in this file must be in this format:
<IPv4 Address>[/<Subnet Prefix>]
n SecureXL ignores empty lines and lines that start with the #
character in this file.
Parameter Description
-L Loads the Penalty Box allow list entries from the plain-text file with
a predefined name:
n R80.40 and R80.40 Jumbo Hotfix Accumulator lower than
Take 92:
$FWDIR/conf/dos-whitelist-v4.conf
n Starting from R80.40 Jumbo Hotfix Accumulator Take 92:
$FWDIR/conf/dos-allow-list-v4.conf
Description
The fwaccel dos config and fwaccel6 dos config commands control the global configuration
parameters of the Rate Limiting for DoS mitigation in SecureXL.
These global parameters apply to all configured Rate Limiting rules.
Important:
n In VSX mode, you must go to the context of an applicable Virtual System.In
Gaia Clish, run: set virtual-system <VSID>In the Expert mode, run:
vsenv <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Parameter or
Description
Option
--disable- Starting from R80.40 Jumbo Hotfix Accumulator Take 92, the "--
blacklists disable-deny-list" replaces the "--disable-blacklists"
--disable- parameter.
deny-list Disables the IP deny lists.
This is the default configuration.
Parameter or
Description
Option
--disable- Disables the drops of all fragmented packets. This is the default
drop-frags configuration.
Important - This option applies to only VSX, and only for traffic that
arrives at a Virtual System through a Virtual Switch (packets
received through a Warp interface). From R80.20, IP Fragment
reassembly occurs in SecureXL before the Warp-jump from a
Virtual Switch to a Virtual System. To block IP fragments, the Virtual
Switch must be configured with this option. Otherwise, this has no
effect, because the IP fragments would already be reassembled
when they arrive at the Virtual System's Warp interface.
--disable- Disables the notifications when the DoS module drops a packet due to
log-drops rate limiting policy.
--disable- Disables the acceptance of all packets that otherwise would be dropped.
monitor This is the default configuration.
--enable- Starting from R80.40 Jumbo Hotfix Accumulator Take 92, the "--
blacklists enable-deny-list" replaces the "--enable-blacklists"
--enable- parameter.
deny-list Enables IP deny lists.
Also, see the "fwaccel dos deny / blacklist" on page 1336 command.
Parameter or
Description
Option
--enable- Enables the notifications when the DoS module drops a packet due to
log-drops rate limiting policy.
This is the default configuration.
--enable- Enables the acceptance of all packets that otherwise would be dropped.
monitor
-n <NOTIF_ Configures the maximal number of drop notifications per second for each
RATE> SecureXL device.
--notif-rate Range: 0 - (232-1)
<NOTIF_RATE> Default: 100
File Description
$FWDIR/conf/fwaccel_dos_ This shell script for IPv4 must contain only the
rate_on_install "fwaccel dos config set" commands:
#!/bin/bash
fwaccel dos config set <options>
$FWDIR/conf/fwaccel6_ This shell script for IPv6 must contain only the
dos_rate_on_install "fwaccel6 dos config set" commands:
#!/bin/bash
fwaccel6 dos config set <options>
Important - Do not include the "fw sam_policy" on page 1426 commands in these
configuration files. The configured Rate Limiting policy survives reboot. If you add the
"fw sam_policy" commands, the rate policy installer runs in an infinite loop.
Notes:
n To create or edit these files, log in to the Expert mode.
n On VSX Gateway, before you create these files, go to the context of an
applicable Virtual System:
vsenv <VSID>
n If these files do not already exist, create them with one of these commands:
l touch $FWDIR/conf/<Name of File>
l vi $FWDIR/conf/<Name of File>
!/bin/bash
fwaccel dos config set --enable-internal
fwaccel dos config set --enable-pbox
Description
The fwaccel dos blacklist / fwaccel dos deny and fwaccel6 dos blacklist / fwaccel6 dos deny
commands control the IP deny list in SecureXL.
The deny list blocks all traffic to and from the specified IP addresses.
The deny list drops occur in SecureXL, which is more efficient than an Access Control Policy to
drop the packets.
Important:
n Starting from R80.40 Jumbo Hotfix Accumulator Take 92, these commands
were renamed:
l from "fwaccel dos blacklist" to "fwaccel dos deny"
fwaccel dos
{blacklist | deny}
-a <IPv4 Address>
-d <IPv4 Address>
-F
-l /<Path>/<Name of File>
-L
-N "<Name of IP Deny List>"
-n
-s
fwaccel6 dos
{blacklist | deny}
-a <IPv6 Address>
-d <IPv6 Address>
-F
-l /<Path>/<Name of File>
-L
-N "<Name of IP Deny List>"
-n
-s
Parameters
Parameter Description
blacklist Starting from R80.40 Jumbo Hotfix Accumulator Take 92, the "deny"
deny parameter replaces the "blacklist" parameter.
Controls the IP deny list.
-l Loads the Penalty Box deny list entries from the specified plain-text file.
/< Notes:
Path>/<Name
of File>
n To replace the current allow list with the contents of a new file, use
both the "-F" and "-l" parameters on the same command line.
n You can use this parameter several times to load entries from
different files.
Important:
n You must manually create and configure this file with the touch
or vi command.
n You must assign at least the read permission to this file with the
chmod +x command.
n Each entry in this file must be on a separate line.
n Each entry in this file must be in this format:
<IPv4 Address>[/<Subnet Prefix>]
n SecureXL ignores empty lines and lines that start with the #
character in this file.
Parameter Description
-L Loads the Penalty Box deny list entries from all plain-text files located in
the predefined directory:
n R80.40 and R80.40 Jumbo Hotfix Accumulator lower than Take
92:
$FWDIR/conf/blacklists/
n Starting from R80.40 Jumbo Hotfix Accumulator Take 92:
$FWDIR/conf/deny_lists/
Description
The fwaccel dos pbox command controls the Penalty Box allow-list in SecureXL.
The SecureXL Penalty Box is a mechanism that performs an early drop of packets that arrive
from suspected sources. The purpose of this feature is to allow the Security Gateway to cope
better under high traffic load, possibly caused by a DoS/DDoS attack.
The SecureXL Penalty Box detects clients that send packets, which the Access Control Policy
drops, and clients that violate the IPS protections. If the SecureXL Penalty Box detects a
specific client frequently, it puts that client in a penalty box. From that point, SecureXL drops all
packets that arrive from the blocked source IP address.
The Penalty Box allow-list in SecureXL configures the source IP addresses, which the
SecureXL Penalty Box never blocks.
Important:
n This command supports only IPv4.
n In VSX mode, you must go to the context of an applicable Virtual System.In
Gaia Clish, run: set virtual-system <VSID>In the Expert mode, run:
vsenv <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
n To enforce the Penalty Box in SecureXL, you must first enable the Penalty Box.
See these commands:
l "fwaccel dos config" on page 1330
Parameters
Parameter Description
whitelist Starting from R80.40 Jumbo Hotfix Accumulator Take 92, the
<options> "allow" parameter replaces the "whitelist" parameter.
allow <options> Configures the allow-list for source IP addresses in the
SecureXL Penalty Box.
Important - This allow-list overrides which packet the
SecureXL Penalty Box drops. Before you use a 3rd-party or
automatic blacklists, add trusted networks and hosts to the
allow-list to avoid outages.
Note - This command is similar to the "fwaccel dos allow /
whitelist" on page 1325 command.
-a <IPv4 Address> Adds the specified IP address to the Penalty Box allow-list.
[/<Subnet
n <IPv4 Address>
Prefix>]
Can be an IP address of a network or a host.
n <Subnet Prefix>
Must specify the length of the subnet mask in the format
/<bits>.
Optional for a host IP address.
Mandatory for a network IP address.
Range - from /1 to /32.
Important - If you do not specify the subnet prefix
explicitly, this command uses the subnet prefix /32.
Examples:
n For a host:
192.168.20.30
192.168.20.30/32
n For a network:
192.168.20.0/24
Parameter Description
-d <IPv4 Address> Removes the specified IP address from the Penalty Box allow-
[/<Subnet list.
Prefix>]
n <IPv4 Address>
Can be an IP address of a network or a host.
n <Subnet Prefix>
Optional. Must specify the length of the subnet mask in the
format /<bits>.
Optional for a host IP address.
Mandatory for a network IP address.
Range - from /1 to /32.
Important - If you do not specify the subnet prefix
explicitly, this command uses the subnet prefix /32.
-l /<Path>/<Name Loads the Penalty Box allow-list entries from the specified plain-
of File> text file.
Important:
n You must manually create and configure this file with
the touch or vi command.
n You must assign at least the read permission to this
file with the chmod +x command.
n Each entry in this file must be on a separate line.
n Each entry in this file must be in this format:
<IPv4 Address>[/<Subnet Prefix>]
n SecureXL ignores empty lines and lines that start with
the # character in this file.
Parameter Description
-L Loads the Penalty Box allow-list entries from the plain-text file
with a predefined name:
n R80.40 and R80.40 Jumbo Hotfix Accumulator lower than
Take 92:
$FWDIR/conf/pbox-whitelist-v4.conf
n Starting from R80.40 Jumbo Hotfix Accumulator Take 92:
$FWDIR/conf/pbox-allow-list-v4.conf
Description
The fwaccel dos rate and fwaccel6 dos rate commands show and install the Rate Limiting
policy in SecureXL.
Important:
n In VSX mode, you must go to the context of an applicable Virtual System.In
Gaia Clish, run: set virtual-system <VSID>In the Expert mode, run:
vsenv <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Parameters
Parameter Description
get '<Rule Shows information about the rule specified by its Rule UID or its zero-
UID>' based rule index.
The quote marks and angle brackets ('<...>') are mandatory.
Notes
n If you install a new rate limiting policy with more than one rule, it automatically enables
the rate limiting feature.
To disable the rate limiting feature manually, run this command (see "fwaccel dos config"
on page 1330):
n To delete the current rate limiting policy, install a new policy with zero rules.
Description
The fwaccel dos stats and fwaccel6 dos stats commands show and clear the DoS real-time
statistics in SecureXL.
Important:
n In VSX mode, you must go to the context of an applicable Virtual System.In
Gaia Clish, run: set virtual-system <VSID>In the Expert mode, run:
vsenv <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
fwaccel stats
clear
get
Parameters
Parameter Description
SecureXL:
Memory Usage: 0
Packets/Second: (rate limiting inactive)
Bytes/Second: (rate limiting inactive)
Reasons Packets Dropped:
IP Fragment: 0
IP Option: 0
Penalty Box: 0
Deny List: 0
Rate Limit: 0
Number of Elements in Tables:
Penalty Box: 0
Non-Empty Deny Lists: 0
Deny List IPs: 0
Rate Limit Matches: 0
Rate Limit Source Only Tracks: 0
Rate Limit Source and Service Tracks: 0
Rate Limit Dest Only Tracks: 0
Rate Limit Dest and Service Tracks: 0
[Expert@MyGW:0]#
fwaccel feature
Description
The fwaccel feature and fwaccel6 feature commands enable and disable the specified
SecureXL features.
Important:
n If you disable a SecureXL feature, SecureXL does not accelerate the applicable
traffic anymore.
n This change does not survive reboot.
n In VSX Gateway, this change is global and applies to all Virtual Systems.
n In a Cluster, you must configure all the Cluster Members in the same way.
Parameters
Parameter Description
2. Reboot.
fwaccel off
Description
The fwaccel off and fwaccel6 off commands stop the SecureXL on-the-fly.
Starting from R80.20, you can stop the SecureXL only temporarily. The SecureXL starts
automatically when you start Check Point services (with the "cpstart" on page 957 command),
or reboot the Security Gateway.
Important:
n Disable the SecureXL only for debug purposes, if Check Point Support explicitly
instructs you to do so.
n If you disable the SecureXL, this change does not survive reboot.
SecureXL remains disabled until you enable it again on-the-fly, or reboot the
Security Gateway.
n If you disable the SecureXL, this change applies only to new connections that
arrive after you disable the acceleration.
SecureXL continues to accelerate the connections that are already accelerated.
Other non-connection oriented processing continues to function (for example,
virtual defragmentation, VPN decrypt).
n On a VSX Gateway:
l If you wish to stop the acceleration only for a specific Virtual System, go to
Parameters
Parameter Description
ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy
| SIC Stat
-----+---------------------+-----------------------+-----------------+--------------------------
+---------
1 | S VS1 | VS1_Policy | 17Sep2018 12:47 | <No Policy>
| Trust
2 | S VS2 | VS2_Policy | 17Sep2018 12:47 | <No Policy>
| Trust
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel stat -t
+-----------------------------------------------------------------------------+
|Id|Name |Status |Interfaces |Features |
+-----------------------------------------------------------------------------+
|0 |SND |enabled |eth1,eth2,eth3 |Acceleration,Cryptography |
+-----------------------------------------------------------------------------+
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]#
ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy
| SIC Stat
-----+---------------------+-----------------------+-----------------+--------------------------
+---------
1 | S VS1 | VS1_Policy | 17Sep2018 12:47 | <No Policy>
| Trust
2 | S VS2 | VS2_Policy | 17Sep2018 12:47 | <No Policy>
| Trust
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel off -a
SecureXL device disabled. (Virtual ID 0)
SecureXL device disabled. (Virtual ID 1)
SecureXL device disabled. (Virtual ID 2)
[Expert@MyVSXGW:1]#
fwaccel on
Description
The fwaccel on and fwaccel6 on commands start the acceleration on-the-fly, if it was
previously stopped with the fwaccel off or fwaccel6 off command (see "fwaccel off" on
page 1353).
Important:
n On a VSX Gateway:
l If you wish to start the acceleration only for a specific Virtual System, go to
Parameters
Parameter Description
[Expert@MyGW:0]# fwaccel on
SecureXL device is enabled.
[Expert@MyGW:0]#
ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy
| SIC Stat
-----+---------------------+-----------------------+-----------------+--------------------------
+---------
1 | S VS1 | VS1_Policy | 17Sep2018 12:47 | <No Policy>
| Trust
2 | S VS2 | VS2_Policy | 17Sep2018 12:47 | <No Policy>
| Trust
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel stat -t
+-----------------------------------------------------------------------------+
|Id|Name |Status |Interfaces |Features |
+-----------------------------------------------------------------------------+
|0 |SND |disabled |eth1,eth2,eth3 |Acceleration,Cryptography |
+-----------------------------------------------------------------------------+
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel on
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel stat -t
+-----------------------------------------------------------------------------+
|Id|Name |Status |Interfaces |Features |
+-----------------------------------------------------------------------------+
|0 |SND |enabled |eth1,eth2,eth3 |Acceleration,Cryptography |
+-----------------------------------------------------------------------------+
[Expert@MyVSXGW:1]#
ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy
| SIC Stat
-----+---------------------+-----------------------+-----------------+--------------------------
+---------
1 | S VS1 | VS1_Policy | 17Sep2018 12:47 | <No Policy>
| Trust
2 | S VS2 | VS2_Policy | 17Sep2018 12:47 | <No Policy>
| Trust
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel on -a
[Expert@MyVSXGW:1]#
fwaccel ranges
Description
The fwaccel ranges and fwaccel6 ranges commands show the SecureXL loaded ranges:
n Ranges of Rule Base source IP addresses
n Ranges of Rule Base destination IP addresses
n Ranges of Rule Base destination ports and protocols
The Security Gateway creates these ranges during the policy installation. The Firewall creates
and offloads ranges to SecureXL when any of these feature is enabled:
n Rulebase ranges for Drop Templates
n Anti-Spoofing enforcement ranges on per-interface basis
n NAT64 ranges
n NAT46 ranges
These ranges are related to matching of connections to SecureXL Drop Templates. These
ranges represent the Source, Destination and Service columns of the Rule Base.
These ranges are not exactly the same as the Rule Base, because as there are objects that
cannot be represented as real (deterministic) IP addresses. For example, Domain objects and
Dynamic objects. The Security Gateway converts such non-deterministic objects to "Any" IP
address.
In addition, implied rules are represented in these ranges, except for some specific implied
rules.
You can use these commands for troubleshooting.
fwaccel ranges
-h
-a
-l
-p <Range ID>
-s <Range ID>
fwaccel6 ranges
-h
-a
-l
-p <Range ID>
-s <Range ID>
Parameters
Parameter Description
Examples
Example 1 - Show the list of ranges from a non-VSX Gateway
[Expert@MyGW:0]# fwaccel ranges -l
SecureXL device 0:
0 Rule base source ranges (ip):
1 Rule base destination ranges (ip):
2 Rule base dport ranges (port, proto):
[Expert@MyGW:0]#
Example 2 - Show the full information for all loaded ranges from a non-VSX Gateway
[Expert@MyGW:0]# fwaccel ranges
SecureXL device 0:
Rule base source ranges (ip):
(0) 0.0.0.0 - 192.168.204.0
(1) 192.168.204.1 - 192.168.204.1
(2) 192.168.204.2 - 192.168.204.39
(3) 192.168.204.40 - 192.168.204.40
(4) 192.168.204.41 - 192.168.254.39
(5) 192.168.254.40 - 192.168.254.40
(6) 192.168.254.41 - 255.255.255.255
Rule base destination ranges (ip):
(0) 0.0.0.0 - 192.168.204.0
(1) 192.168.204.1 - 192.168.204.1
(2) 192.168.204.2 - 192.168.204.39
(3) 192.168.204.40 - 192.168.204.40
(4) 192.168.204.41 - 192.168.254.39
(5) 192.168.254.40 - 192.168.254.40
(6) 192.168.254.41 - 255.255.255.255
Rule base dport ranges (port, proto):
(0) 0, 0 - 138, 6
(1) 139, 6 - 139, 6
(2) 140, 6 - 18189, 6
(3) 18190, 6 - 18190, 6
(4) 18191, 6 - 18191, 6
(5) 18192, 6 - 18192, 6
(6) 18193, 6 - 19008, 6
(7) 19009, 6 - 19009, 6
(8) 19010, 6 - 136, 17
(9) 137, 17 - 138, 17
(10) 139, 17 - 65535, 65535
[Expert@MyGW:0]#
Example 3 - Show the full information for the specified range from a non-VSX Gateway
[Expert@MyGW:0]# fwaccel ranges -p 0
SecureXL device 0:
Rule base source ranges (ip):
(0) 0.0.0.0 - 192.168.204.0
(1) 192.168.204.1 - 192.168.204.1
(2) 192.168.204.2 - 192.168.204.39
(3) 192.168.204.40 - 192.168.204.40
(4) 192.168.204.41 - 192.168.254.39
(5) 192.168.254.40 - 192.168.254.40
(6) 192.168.254.41 - 255.255.255.255
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel ranges -p 1
SecureXL device 0:
Rule base destination ranges (ip):
(0) 0.0.0.0 - 192.168.204.0
(1) 192.168.204.1 - 192.168.204.1
(2) 192.168.204.2 - 192.168.204.39
(3) 192.168.204.40 - 192.168.204.40
(4) 192.168.204.41 - 192.168.254.39
(5) 192.168.254.40 - 192.168.254.40
(6) 192.168.254.41 - 255.255.255.255
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel ranges -p 2
SecureXL device 0:
Rule base dport ranges (port, proto):
(0) 0, 0 - 138, 6
(1) 139, 6 - 139, 6
(2) 140, 6 - 18189, 6
(3) 18190, 6 - 18190, 6
(4) 18191, 6 - 18191, 6
(5) 18192, 6 - 18192, 6
(6) 18193, 6 - 19008, 6
(7) 19009, 6 - 19009, 6
(8) 19010, 6 - 136, 17
(9) 137, 17 - 138, 17
(10) 139, 17 - 65535, 65535
[Expert@MyGW:0]#
Example 4 - Show the summary information for the specified range from a non-VSX Gateway
[Expert@MyGW:0]# fwaccel ranges -s 0
SecureXL device 0:
List name "Rule base source ranges (ip):", ID 0, Number of ranges 7
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel ranges -s 1
SecureXL device 0:
List name "Rule base destination ranges (ip):", ID 1, Number of ranges 7
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel ranges -s 2
SecureXL device 0:
List name "Rule base dport ranges (port, proto):", ID 2, Number of ranges 11
[Expert@MyGW:0]#
Example 6 - Show the full information for all loaded ranges from a VSX Gateway
[Expert@MyVSXGW:2]# vsenv 0
Context is set to Virtual Device VSX2_192.168.3.242 (ID 0).
[Expert@MyVSXGW:0]# fwaccel ranges
SecureXL device 0:
Anti spoofing ranges eth0:
(0) 0.0.0.0 - 10.20.29.255
(1) 10.20.31.0 - 126.255.255.255
(2) 128.0.0.0 - 192.168.2.255
(3) 192.168.3.1 - 192.168.3.241
(4) 192.168.3.243 - 192.168.3.254
(5) 192.168.4.0 - 223.255.255.255
(6) 240.0.0.0 - 255.255.255.254
Anti spoofing ranges eth1:
(0) 10.20.30.1 - 10.20.30.241
(1) 10.20.30.243 - 10.20.30.254
[Expert@MyVSXGW:0]#
[Expert@MyVSXGW:1]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]# fwaccel ranges
SecureXL device 0:
Anti spoofing ranges eth3:
(0) 40.50.60.0 - 40.50.60.255
(1) 192.168.196.17 - 192.168.196.17
(2) 192.168.196.19 - 192.168.196.30
Anti spoofing ranges eth2.52:
(0) 70.80.90.0 - 70.80.90.255
(1) 192.168.196.1 - 192.168.196.1
(2) 192.168.196.3 - 192.168.196.14
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 2
Context is set to Virtual Device VS2 (ID 2).
[Expert@MyVSXGW:2]# fwaccel ranges
SecureXL device 0:
Anti spoofing ranges eth4:
(0) 100.100.100.0 - 100.100.100.255
(1) 192.168.196.17 - 192.168.196.17
(2) 192.168.196.19 - 192.168.196.30
Anti spoofing ranges eth2.53:
(0) 192.168.196.1 - 192.168.196.1
(1) 192.168.196.3 - 192.168.196.14
(2) 200.200.200.0 - 200.200.200.255
[Expert@MyVSXGW:2]#
Example 7 - Show the summary information for the specified range from a VSX Gateway
[Expert@MyVSXGW:2]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel ranges -s 0
SecureXL device 0:
List name "Anti spoofing ranges eth3:", ID 0, Number of ranges 3
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel ranges -s 1
SecureXL device 0:
List name "Anti spoofing ranges eth2.52:", ID 1, Number of ranges 3
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel ranges -s 2
SecureXL device 0:
The requested range table is empty
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 2
Context is set to Virtual Device VS2 (ID 2).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:2]# fwaccel ranges -s 0
SecureXL device 0:
List name "Anti spoofing ranges eth4:", ID 0, Number of ranges 3
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:2]# fwaccel ranges -s 1
SecureXL device 0:
List name "Anti spoofing ranges eth2.53:", ID 1, Number of ranges 3
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:2]# fwaccel ranges -s 2
SecureXL device 0:
The requested range table is empty
[Expert@MyVSXGW:2]#
fwaccel stat
Description
The fwaccel stat and fwaccel6 stat commands show the SecureXL status, the list of the
accelerated interfaces and the list of the accelerated features on the local Security Gateway,
or Cluster Member.
Parameters
Parameter Description
[Expert@MyGW:0]#
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# vsenv 1
Context is set to Virtual Device VS1 (ID 1).
[Expert@MyVSXGW:1]#
[Expert@MyVSXGW:1]# fwaccel stat
+-----------------------------------------------------------------
------------+
|Id|Name |Status |Interfaces |Features
|
+-----------------------------------------------------------------
------------+
|0 |SND |enabled |eth1,eth2,eth3
|Acceleration,Cryptography |
| | | | |Crypto:
Tunnel,UDPEncap,MD5, |
| | | |
|SHA1,NULL,3DES,DES,CAST, |
| | | | |CAST-40,AES-
128,AES-256,ESP, |
| | | |
|LinkSelection,DynamicVPN, |
| | | | |NatTraversal,AES-
XCBC,SHA256 |
+-----------------------------------------------------------------
------------+
fwaccel stats
Description
The fwaccel stats and fwaccel6 stats commands show acceleration statistics for IPv4 on the
local Security Gateway, or Cluster Member.
fwaccel stats
[-c]
[-d]
[-l]
[-m]
[-n]
[-o]
[-p]
[-q]
[-r]
[-s]
[-x]
fwaccel6 stats
[-c]
[-d]
[-l]
[-m]
[-n]
[-o]
[-p]
[-q]
[-r]
[-s]
[-x]
Parameters
Parameter Description
In addition, see:
n "Description of the Statistics Counters in the "fwaccel stats" Output" on page 1376
n "Example Outputs on the "fwaccel stats" Commands" on page 1385
Counter Description
Counter Description
Counter Description
Counter Description
Counter Description
Counter Description
Counter Description
Enqueued OUT bytes Number of waiting bytes in Firewall QoS outbound queue.
Counter Description
Enqueued OUT bytes Number of waiting bytes in SecureXL QoS outbound queue.
Counter Description
F2F packets Number of packets that SecureXL forwarded to the Firewall kernel in
Slow Path.
F2F bytes Number of bytes that SecureXL forwarded to the Firewall kernel in
Slow Path.
F2V packets Number of packets that SecureXL forwarded to the Firewall kernel
and the Firewall re-injected back to SecureXL.
F2V bytes Number of bytes that SecureXL forwarded to the Firewall kernel and
the Firewall re-injected back to the SecureXL.
Counter Description
gtp f2f pkts Number of GTP packets the SecureXL forwarded to the
Firewall kernel.
gtp apn err pkts Number of GTP packets with APN errors.
Counter Description
C tcp handshake Number of current TCP connections that are not yet established.
conn
C tcp pxl Number of not yet established PXL TCP connections the
handshake SecureXL currently handles.
C tcp pxl Number of closed PXL TCP connections the SecureXL currently
closed con handles.
Accelerated Path
--------------------------------------------------------------------------------------
accel packets 0 accel bytes 0
outbound packets 0 outbound bytes 0
conns created 0 conns deleted 0
C total conns 0 C TCP conns 0
C non TCP conns 0 nat conns 0
dropped packets 0 dropped bytes 0
fragments received 0 fragments transmit 0
fragments dropped 0 fragments expired 0
IP options stripped 0 IP options restored 0
IP options dropped 0 corrs created 0
corrs deleted 0 C corrections 0
corrected packets 0 corrected bytes 0
QoS Paths
--------------------------------------------------------------------------------------
QoS General Information:
------------------------
Total QoS Conns 0 QoS Classify Conns 0
QoS Classify flow 0 Reclassify QoS policy 0
Firewall Path
--------------------------------------------------------------------------------------
F2F packets 35324 F2F bytes 1797781
TCP violations 0 F2V conn match pkts 0
F2V packets 0 F2V bytes 0
GTP
--------------------------------------------------------------------------------------
gtp tunnels created 0 gtp tunnels 0
gtp accel pkts 0 gtp f2f pkts 0
gtp spoofed pkts 0 gtp in gtp pkts 0
gtp signaling pkts 0 gtp tcpopt pkts 0
gtp apn err pkts 0
General
--------------------------------------------------------------------------------------
memory used 38798784 C tcp handshake conns 0
C tcp established conns 0 C tcp closed conns 0
C tcp pxl handshake conns 0 C tcp pxl established conns 0
C tcp pxl closed conns 0 outbound cpasxl packets 0
outbound pslxl packets 0 outbound cpasxl bytes 0
outbound pslxl bytes 0 DNS DoR stats 0
(*) Statistics marked with C refer to current value, others refer to total value
Appliaction: F2V
Statistic Value
----------------------------------- --------------------
Queued pkts 0
Max queued pkts 0
Timer triggered 0
Callback hahndling unhold 0
Callback hahndling unhold and drop 0
Callback hahndling reset 0
Dequeued pkts resumed 0
Queue ent allocated 0
Queue ent freed 0
Queues allocated 0
Queues freed 0
Ack notif sent 0
Ack respones handling 0
Dequeued pkts dropped 0
Reached max queued pkt limit 0
Set timer failed 0
Error already held 0
Queue ent alloc failed 0
Queue alloc failed 0
Ack notif failed 0
Ack respones handling failed 0
----------------------------------------------------
Appliaction: Route
Statistic Value
----------------------------------- --------------------
Queued pkts 0
Max queued pkts 0
Timer triggered 0
Callback hahndling unhold 0
Callback hahndling unhold and drop 0
Callback hahndling reset 0
Dequeued pkts resumed 0
Queue ent allocated 0
Queue ent freed 0
Queues allocated 0
Queues freed 0
Ack notif sent 0
Ack respones handling 0
Dequeued pkts dropped 0
Reached max queued pkt limit 0
Set timer failed 0
Error already held 0
Queue ent alloc failed 0
Queue alloc failed 0
Ack notif failed 0
Ack respones handling failed 0
----------------------------------------------------
Appliaction: F2P
Statistic Value
----------------------------------- --------------------
Queued pkts 0
Max queued pkts 0
Timer triggered 0
Callback hahndling unhold 0
Callback hahndling unhold and drop 0
Callback hahndling reset 0
Dequeued pkts resumed 0
Queue ent allocated 0
Queue ent freed 0
Queues allocated 0
Queues freed 0
Ack notif sent 0
Ack respones handling 0
Dequeued pkts dropped 0
Reached max queued pkt limit 0
Set timer failed 0
Error already held 0
Queue ent alloc failed 0
Queue alloc failed 0
Ack notif failed 0
Ack respones handling failed 0
----------------------------------------------------
F2F packets:
--------------
Violation Packets Violation Packets
-------------------- --------------- -------------------- ---------------
pkt has IP options 0 ICMP miss conn 3036
TCP-SYN miss conn 8 TCP-other miss conn 32224
UDP miss conn 3772 other miss conn 0
VPN returned F2F 0 uni-directional viol 0
possible spoof viol 0 TCP state viol 0
out if not def/accl 0 bridge, src=dst 0
routing decision err 0 sanity checks failed 0
fwd to non-pivot 0 broadcast/multicast 0
cluster message 0 cluster forward 0
chain forwarding 0 F2V conn match pkts 0
general reason 0 route changes 0
fwaccel synatk
Description
The fwaccel synatk and fwaccel6 synatk commands control the Accelerated SYN Defender on
the local Security Gateway, or Cluster Member.
Important - See sk120476 for information about the 'SYN Attack' protection in
SmartConsole.
fwaccel synatk
-a
-c <options>
-d
-e
-g
-m
-t <options>
config
monitor <options>
state <options>
{whitelist | allow} <options>
fwaccel6 synatk
-a
-c <options>
-d
-e
-g
-m
-t <options>
config
monitor <options>
state <options>
{whitelist | allow} <options>
Parameters
Parameter Description
whitelist Starting from R80.40 Jumbo Hotfix Accumulator Take 92, the "allow"
<options> parameter replaces the "whitelist" parameter.
allow Controls the Accelerated SYN Defender whitelist.
<options> See "fwaccel synatk allow / whitelist" on page 1403.
fwaccel synatk -a
Description
The "fwaccel synatk -a" and "fwaccel6 synatk -a" commands apply the Accelerated SYN
Defender configuration from the default $FWDIR/conf/synatk.conf file.
Notes:
n Both IPv4 and IPv6 use the same configuration file.
n Interface specific state settings that you define in the configuration file, override
the settings that you define with these commands:
l "fwaccel synatk -d" on page 1397
fwaccel synatk -a
fwaccel6 synatk -a
Description
The "fwaccel synatk -c <Configuration File>" and "fwaccel6 synatk -c <Configuration File>"
commands apply the Accelerated SYN Defender configuration from the specified file.
Important - If you use this parameter, then it must be the first parameter in the syntax.
Notes:
n Both IPv4 and IPv6 use the same configuration file.
n The state settings of a specific interface that you configure in the configuration
file, override the settings that you configure with these commands:
l "fwaccel synatk -d" on page 1397
Parameters
Parameter Description
<Configuration File> Specifies the full path and the name of the file.
For reference, see the default file:
$FWDIR/conf/synatk.conf
fwaccel synatk -d
Description
The "fwaccel synatk -d" and "fwaccel6 synatk -d" commands disable the Accelerated SYN
Defender on all interfaces.
Notes:
n This command:
1. Modifies the default configuration file $FWDIR/conf/synatk.conf, or
the configuration file specified with the "-c" parameter.
2. Loads the modified file.
3. Does not show any output.
n Output of the "fwaccel synatk monitor" on page 1411 command shows:
l In the row "Configuration": Disabled
fwaccel synatk -d
fwaccel6 synatk -d
fwaccel synatk -e
Description
The "fwaccel synatk -e" and "fwaccel6 synatk -e" commands:
n Enable the Accelerated SYN Defender on interfaces with topology "External".
n Enable the Accelerated SYN Defender in Monitor (Detect only) mode on interfaces with
topology "Internal".
Notes:
n This command:
1. Modifies the default configuration file $FWDIR/conf/synatk.conf, or
the configuration file specified with the "-c" parameter.
2. Loads the modified file.
n Output of the "fwaccel synatk monitor" on page 1411 command shows for
"External" interfaces:
l Configuration: Enforcing
l Enforce: Prevent
l State: Ready (may change later depending on what the SYN Defender
detects)
n Output of the "fwaccel synatk monitor" on page 1411 command shows for
"Internal" interfaces:
l Configuration: Enforcing
l Enforce: Detect
l State: Monitor
l enforce 1
fwaccel synatk -e
fwaccel6 synatk -e
fwaccel synatk -g
Description
The "fwaccel synatk -g" and "fwaccel6 synatk -g" commands enable the Accelerated SYN
Defender on all interfaces.
Notes:
n This command:
1. Modifies the default configuration file $FWDIR/conf/synatk.conf, or
the configuration file specified with the "-c" parameter.
2. Loads the modified file.
n Output of the "fwaccel synatk monitor" on page 1411 command shows for
"External" interfaces:
l Configuration: Enforcing
l Enforce: Prevent
l State: Ready (may change later depending on what the SYN Defender
detects)
n Output of the "fwaccel synatk monitor" on page 1411 command shows for
"Internal" interfaces:
l Configuration: Enforcing
l Enforce: Detect
l State: Monitor
l enforce 2
fwaccel synatk -g
fwaccel6 synatk -g
fwaccel synatk -m
Description
The "fwaccel synatk -m" and "fwaccel6 synatk -m" commands enable the Accelerated SYN
Defender in Monitor (Detect only) mode on all interfaces.
In this state, the Accelerated SYN Defender only sends a log when it recognizes a TCP SYN
Flood attack.
Notes:
n This command:
1. Modifies the default configuration file $FWDIR/conf/synatk.conf, or
the configuration file specified with the "-c" parameter.
2. Loads the modified file.
n Output of the "fwaccel synatk monitor" on page 1411 command shows:
l Configuration: Monitoring
l Enforce: Detect
l State: Monitor
l enforce 0
fwaccel synatk -m
fwaccel6 synatk -m
Description
The "fwaccel synatk -t <Threshold>" and "fwaccel6 synatk -t <Threshold>" commands
configure the threshold numbers of half-opened TCP connections that trigger the Accelerated
SYN Defender.
Notes:
n This command:
1. Modifies the default configuration file $FWDIR/conf/synatk.conf, or
the configuration file specified with the "-c" parameter.
2. Loads the modified file.
n Threshold values are independent for IPv4 and IPv6.
Thresholds
n The Global high attack threshold number is configured to the specified value
<Threshold>.
This is the number of half-open TCP connections on all interfaces required for the
Accelerated SYN Defender to engage.
l Valid values: 100 and greater
l Default: 10000
n The High attack threshold number is configured to 1/2 of the specified value
<Threshold>.
This is the high number of half-open TCP connections on an interface required for the
Accelerated SYN Defender to engage.
l Valid values: (Low attack threshold) < (High attack threshold) <= (Global high
attack threshold)
l Default: 5000
n The Low attack threshold number is configured to 1/10 of the specified value
<Threshold>.
This is the low number of half-open TCP connections on an interface required for the
Accelerated SYN Defender to engage.
l Valid values: 10 and greater
l Default: 1000
Description
The "fwaccel synatk whitelist" / "fwaccel synatk allow" and "fwaccel6 synatk whitelist" /
"fwaccel6 synatk allow" commands control the Accelerated SYN Defender allow-list.
Important - Starting from R80.40 Jumbo Hotfix Accumulator Take 92, these
commands were renamed:
n from "fwaccel synatk whitelist" to "fwaccel synatk allow"
n from "fwaccel6 synatk whitelist" to "fwaccel6 synatk allow"
Notes:
n This allow-list overrides which packet the Accelerated SYN Defender drops.
Before you use a 3rd-party or automatic blacklists, add trusted networks and
hosts to the allow-list to avoid outages.
n Also, see the "fwaccel dos allow / whitelist" on page 1325 command.
Important - In Cluster, you must configure the Rate Limiting in the same way on all
the Cluster Members.
Parameters
Parameter Description
whitelist Starting from R80.40 Jumbo Hotfix Accumulator Take 92, the
allow "allow" parameter replaces the "whitelist" parameter.
-a <IPv4 Adds the specified IPv4 address to the Accelerated SYN Defender
Address> allow-list.
[/<Subnet
n <IPv4 Address>
Prefix>]
Can be an IPv4 address of a network or a host.
n <Subnet Prefix>
Must specify the length of the subnet mask in the format
/<bits>.
Optional for a host IPv4 address.
Mandatory for a network IPv4 address.
Range - from /1 to /32.
Important - If you do not specify the subnet prefix
explicitly, this command uses the subnet prefix /32.
Examples:
n For a host:
192.168.20.30
192.168.20.30/32
n For a network:
192.168.20.0/24
Parameter Description
-a <IPv6 Adds the specified IPv6 address to the Accelerated SYN Defender
Address> allow-list.
[/<Subnet
n <IPv6 Address>
Prefix>]
Can be an IPv6 address of a network or a host.
n <Subnet Prefix>
Must specify the length of the subnet mask in the format
/<bits>.
Optional for a host IPv6 address.
Mandatory for a network IPv6 address.
Range - from /1 to /128.
Important - If you do not specify the subnet prefix
explicitly, this command uses the subnet prefix /128.
Examples:
n For a host:
2001:0db8:85a3:0000:0000:8a2e:0370:7334
2001:0db8:85a3:0000:0000:8a2e:0370:7334/128
n For a network:
2001:cdba:9abc:5678::/64
-d <IPv4 Removes the specified IPv4 address from the Accelerated SYN
Address> Defender allow-list.
[/<Subnet
n <IPv4 Address>
Prefix>]
Can be an IPv4 address of a network or a host.
n <Subnet Prefix>
Optional. Must specify the length of the subnet mask in the
format /<bits>.
Optional for a host IPv4 address.
Mandatory for a network IPv4 address.
Range - from /1 to /32.
Important - If you do not specify the subnet prefix
explicitly, this command uses the subnet prefix /32.
Parameter Description
-d <IPv6 Removes the specified IPv6 address from the Accelerated SYN
Address> Defender allow-list.
[/<Subnet
n <IPv6 Address>
Prefix>]
Can be an IPv6 address of a network or a host.
n <Subnet Prefix>
Optional. Must specify the length of the subnet mask in the
format /<bits>.
Optional for a host IPv6 address.
Mandatory for a network IPv6 address.
Range - from /1 to /128.
Important - If you do not specify the subnet prefix
explicitly, this command uses the subnet prefix /128.
Parameter Description
Example
Description
The "fwaccel synatk config" and "fwaccel6 synatk config" commands show the current
Accelerated SYN Defender configuration.
Example
Parameter Description
enforce When the Accelerated SYN Defender is enabled, shows it enforces the
protection.
Valid values:
n 0 - The Accelerated SYN Defender is in Monitor (Detect only)
mode on all interfaces.
n 1 - The Accelerated SYN Defender is engaged only on external
interfaces when the number of half-open TCP connections
exceeds the threshold.
n 2 - The Accelerated SYN Defender is engaged on both external
and internal interfaces when the number of half-open TCP
connections exceeds the threshold.
min_frag_sz During the TCP SYN Flood attack, the Accelerated SYN Defender
prevents TCP fragments smaller than this minimal size value.
n Valid values: 80 and greater
n Default: 80
Parameter Description
Description
The "fwaccel synatk monitor" and "fwaccel6 synatk monitor" commands show the Accelerated
SYN Defender status.
Important - To enable the Accelerated SYN Defender in Monitor (Detect only) mode
on all interfaces, you must run the "fwaccel synatk -m" on page 1400 command.
Parameters
Important - You can specify only one of these parameters: -a, -s, or -v.
Parameter Description
-p Shows the Accelerated SYN Defender status for each SecureXL instance
("PPAK ID: 0" is the Host Security Appliance).
[-p] -a Shows the Accelerated SYN Defender statistics for all interfaces (for each
SecureXL instance).
[-p] -s Shows the attack state in short form (for each SecureXL instance).
[-p] -v Shows the attack state in verbose form (for each SecureXL instance).
Examples
Example 1 - Default output before and after enabling the Accelerated SYN Defender
[Expert@MyGW:0]# fwaccel synatk monitor
+-----------------------------------------------------------------------------+
| SYN Defender status |
+-----------------------------------------------------------------------------+
| Configuration Disabled |
| Status Normal |
| Non established connections 0 |
| Global Threshold 10000 |
| Interface Threshold 5000 |
+-----------------------------------------------------------------------------+
| IF | Topology | Enforce | State (sec) | Non-established conns |
| | | | | Peak | Current |
+-----------------------------------------------------------------------------+
| eth0 | External | Disable | Disable | N/A | N/A |
| eth1 | Internal | Disable | Disable | N/A | N/A |
+-----------------------------------------------------------------------------+
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel synatk -m
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel synatk monitor
+-----------------------------------------------------------------------------+
| SYN Defender status |
+-----------------------------------------------------------------------------+
| Configuration Monitoring |
| Status Normal |
| Non established connections 0 |
| Global Threshold 10000 |
| Interface Threshold 5000 |
+-----------------------------------------------------------------------------+
| IF | Topology | Enforce | State (sec) | Non-established conns |
| | | | | Peak | Current |
+-----------------------------------------------------------------------------+
| eth0 | External | Detect | Monitor | 0 | 0 |
| eth1 | Internal | Detect | Monitor | 0 | 0 |
+-----------------------------------------------------------------------------+
[Expert@MyGW:0]#
Example 2 - Showing the Accelerated SYN Defender status for each SecureXL instance
[Expert@MyGW:0]# fwaccel synatk monitor -p
+-----------------------------------------------------------------------------+
| SYN Defender status |
+-----------------------------------------------------------------------------+
| Configuration Monitoring |
| Status Normal |
| Non established connections 0 |
| Global Threshold 10000 |
| Interface Threshold 5000 |
+-----------------------------------------------------------------------------+
| IF | Topology | Enforce | State (sec) | Non-established conns |
| | | | | Peak | Current |
+-----------------------------------------------------------------------------+
| eth0 | External | Detect | Monitor | 0 | 0 |
| eth1 | Internal | Detect | Monitor | 0 | 0 |
+-----------------------------------------------------------------------------+
PPAK ID: 0
----------
+-----------------------------------------------------------------------------+
| SYN Defender status |
+-----------------------------------------------------------------------------+
| Configuration Monitoring |
| Status Normal |
| Non established connections 0 |
| Global Threshold 10000 |
| Interface Threshold 5000 |
+-----------------------------------------------------------------------------+
| IF | Topology | Enforce | State (sec) | Non-established conns |
| | | | | Peak | Current |
+-----------------------------------------------------------------------------+
| eth0 | External | Detect | Monitor | 0 | 0 |
| eth1 | Internal | Detect | Monitor | 0 | 0 |
+-----------------------------------------------------------------------------+
[Expert@MyGW:0]#
Example 3 - Showing the Accelerated SYN Defender statistics for all interfaces and for each
SecureXL instance.
[Expert@MyGW:0]# fwaccel synatk monitor -p -a
Global:
status attached
nr_active 0
Firewall
----------
Per-interface:
eth0 eth1
---------- ----------
topology External Internal
state Monitor Monitor
syn ready 0 0
syn active prev 0 0
syn active curr 0 0
active_score 0 0
msec grace 0 0
msec active 0 0
sent cookies 0 0
fail validations 0 0
succ validations 0 0
early packets 0 0
no conn data 0 0
bogus syn 0 0
peak non-estab 0 0
int sent cookies 0 0
int succ validations 0 0
msec interval 0 0
PPAK ID: 0
----------
Per-interface:
eth0 eth1
---------- ----------
topology External Internal
state Monitor Monitor
syn ready 0 0
syn active prev 0 0
syn active curr 0 0
active_score 0 0
msec grace 0 0
msec active 0 0
sent cookies 0 0
fail validations 0 0
succ validations 0 0
early packets 0 0
no conn data 0 0
bogus syn 0 0
peak non-estab 0 0
int sent cookies 0 0
int succ validations 0 0
msec interval 0 0
[Expert@MyGW:0]#
Example 4 - Showing the attack state in short form (for each SecureXL instance)
[Expert@MyGW:0]# fwaccel synatk monitor -p -s
M,N,0,0
PPAK ID: 0
----------
M,N,0,0
[Expert@MyGW:0]#
Example 5 - Showing the attack state in verbose form (for each SecureXL instance)
[Expert@MyGW:0]# fwaccel synatk monitor -p -v
+-----------------------------------------------------------------------------+
| SYN Defender statistics |
+-----------------------------------------------------------------------------+
| Status Normal |
| Spoofed SYN/sec 0 |
+-----------------------------------------------------------------------------+
PPAK ID: 0
----------
+-----------------------------------------------------------------------------+
| SYN Defender statistics |
+-----------------------------------------------------------------------------+
| Status Normal |
| Spoofed SYN/sec 0 |
+-----------------------------------------------------------------------------+
[Expert@MyGW:0]#
Description
The "fwaccel synatk state" and "fwaccel6 synatk state" commands control the Accelerated
SYN Defender states.
The states are independent for IPv4 and IPv6.
Important - This command is not intended for end-user usage. Transitions between
states (Ready, Grace, and Active) occur automatically. This command provides a way
to force temporarily a state transition on an interface or group of interfaces.
Parameters
Important - You can specify only one of these parameters: -a, -d, -g, -m, or -r.
Parameter Description
fwaccel tab
Description
The fwaccel tab and fwaccel6 tab commands show the contents of the specified SecureXL
kernel table.
Notes:
n Dynamic tables, such as the connections table can change while this
command prints their contents.
This may cause some values to be missed or reported twice.
n For some tables, the command prints their contents on the screen.
n For some tables, the command prints their contents to the
/var/log/messages file.
n Also, see the "fw tab" on page 1152 command.
Parameters
Parameter Description
-m <Number of Rows> Specifies how many rows to show from the kernel
table.
Note - The command counts from the top of the table.
Default : 1000
Parameter Description
Examples
[Expert@MyGW:0]# fwaccel tab -f -m 200 -t connections
Table connections is empty
[Expert@MyGW:0]#
fwaccel templates
Description
The fwaccel templates and fwaccel6 templates commands show the contents of the SecureXL
templates tables:
n Accept Templates
n Drop Templates
fwaccel templates
[-h]
[-d]
[-m <Number of Rows>]
[-s]
[-S]
fwaccel6 templates
[-h]
[-d]
[-m <Number of Rows>]
[-s]
[-S]
Parameters
Parameter Description
No Parameters Shows the contents of the SecureXL Accept Templates table (Table
Name - cphwd_tmpl, Table ID - 8111).
-m <Number Specifies how many rows to show from the templates table.
of Rows> Note - The command counts from the top of the table.
Default : 1000
Flag Description
B Connection is created for a rule that contains an Identity Awareness object, or for
a rule below that rule.
M Connection is created for a rule that contains a Domain object, or for a rule below
that rule.
O Connection is created for a rule that contains a Dynamic object, or for a rule below
that rule.
R Connection is created for a rule that contains a Traceroute object, or for a rule
below that rule.
T Connection is created for a rule that contains a Time object, or for a rule below
that rule.
U Connection is unidirectional.
Z Connection is created for a rule that contains a Security Zone object, or for a rule
below that rule.
Flag Description
Examples
Example 1 - Default output
[Expert@MyGW:0]# fwaccel templates
Source SPort Destination DPort PR Flags LCT DLY C2S i/f S2C i/f
--------------- ----- --------------- ----- -- ------------ ---- --- ------- -------
192.168.10.20 * 192.168.10.50 80 6 0 0 0 eth5/eth1 eth1/eth5
[Expert@MyGW:0]#
Templates stats:
[Expert@MyGW:0]#
fwaccel ver
Description
Shows this information:
n Firewall Version and Build
n Accelerator Version
n Firewall API version
n Accelerator API version
Syntax
fwaccel ver
Example
fw sam_policy
Description
Manages the Suspicious Activity Policy editor that works with these types of rules:
n Suspicious Activity Monitoring (SAM) rules.
See sk112061: How to create and view Suspicious Activity Monitoring (SAM) Rules.
n Rate Limiting rules.
See sk112454: How to configure Rate Limiting rules for DoS Mitigation.
Also, see these commands:
n "fw sam" on page 271
n "sam_alert" on page 376
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw [-d] sam_policy
add <options>
batch
del <options>
get <options>
fw [-d] samp
add <options>
batch
del <options>
get <options>
Parameters
Parameter Description
del <options> Deletes one configured Rate Limiting rule one at a time.
See "fw sam_policy del" on page 297.
fw sam_policy add
Description
The "fw sam_policy add" and "fw6 sam_policy add" commands:
n Add one Suspicious Activity Monitoring (SAM) rule at a time.
n Add one Rate Limiting rule at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>]
[-f <Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] ip <IP Filter Arguments>
fw6 [-d] sam_policy add [-u] -a {d|n|b} [-l {r|a}] [-t <Timeout>]
[-f <Target>] [-n <"Rule Name">] [-c <"Rule Comment">] [-o <"Rule
Originator">] [-z "<Zone>"] quota <Quota Filter Arguments
Parameters
Parameter Description
-u Optional.
Specifies that the rule category is User-defined.
Default rule category is Auto.
-a {d | n | Mandatory.
b} Specifies the rule action if the traffic matches the rule conditions:
n d - Drop the connection.
n n - Notify (generate a log) about the connection and let it through.
n b - Bypass the connection - let it through without checking it against
the policy rules.
Note - Rules with action set to Bypass cannot have a log or limit
specification. Bypassed packets and connections do not count
towards overall number of packets and connection for limit
enforcement of type ratio.
-l {r | a} Optional.
Specifies which type of log to generate for this rule for all traffic that
matches:
n -r - Generate a regular log
n -a - Generate an alert log
Parameter Description
-t Optional.
<Timeout> Specifies the time period (in seconds), during which the rule will be
enforced.
Default timeout is indefinite.
-f <Target> Optional.
Specifies the target Security Gateways, on which to enforce the Rate
Limiting rule.
<Target> can be one of these:
n all - This is the default option. Specifies that the rule should be
enforced on all managed Security Gateways.
n Name of the Security Gateway or Cluster object - Specifies that the
rule should be enforced only on this Security Gateway or Cluster
object (the object name must be as defined in the SmartConsole).
n Name of the Group object - Specifies that the rule should be
enforced on all Security Gateways that are members of this Group
object (the object name must be as defined in the SmartConsole).
-n "<Rule Optional.
Name>" Specifies the name (label) for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must
write a backslash (\) character. Example:
"This\ is\ a\ rule\ name\ with\ a\ backslash\
\\"
-c "<Rule Optional.
Comment>" Specifies the comment for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must
write a backslash (\) character. Example:
"This\ is\ a\ comment\ with\ a\ backslash\ \\"
Parameter Description
-o "<Rule Optional.
Originator Specifies the name of the originator for this rule.
>" Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
n Before each space or a backslash character in this string, you must
write a backslash (\) character. Example:
"Created\ by\ John\ Doe"
-z "<Zone>" Optional.
Specifies the name of the Security Zone for this rule.
Notes:
n You must enclose this string in double quotes.
n The length of this string is limited to 128 characters.
Parameter Description
Important:
n The Quota rules are not applied immediately to the Security
Gateway. They are only registered in the Suspicious Activity
Monitoring (SAM) policy database. To apply all the rules from
the SAM policy database immediately, add "flush true" in
the fw samp add command syntax.
n Explanation:
For new connections rate (and for any rate limiting in general),
when a rule's limit is violated, the Security Gateway also drops
all packets that match the rule.
The Security Gateway computes new connection rates on a
per-second basis.
At the start of the 1-second timer, the Security Gateway allows
all packets, including packets for existing connections.
If, at some point, during that 1 second period, there are too
many new connections, then the Security Gateway blocks all
remaining packets for the remainder of that 1-second interval.
At the start of the next 1-second interval, the counters are
reset, and the process starts over - the Security Gateway
allows packets to pass again up to the point, where the rule’s
limit is violated.
Explanation for the IP Filter Arguments syntax for Suspicious Activity Monitoring (SAM)
rules
Argument Description
-m <Source Mask> Specifies the Source subnet mask (in dotted decimal format -
x.y.z.w).
-M <Destination Specifies the Destination subnet mask (in dotted decimal format -
Mask> x.y.z.w).
-p <Port> Specifies the port number (see IANA Service Name and Port
Number Registry).
Explanation for the Quota Filter Arguments syntax for Rate Limiting rules
Argument Description
flush true Specifies to compile and load the quota rule to the
SecureXL immediately.
(xxxx:yyyy:...:zzzz)
n cidr:<IP Address>/<Prefix>
The rule is applied to packets sent from:
l IPv4 address with Prefix from 0 to 32
n cc:<Country Code>
The rule matches the country code to the
source IP addresses assigned to this
country, based on the Geo IP database.
The two-letter codes are defined in ISO
3166-1 alpha-2.
n asn:<Autonomous System Number>
The rule matches the AS number of the
organization to the source IP addresses that
are assigned to this organization, based on
the Geo IP database.
The valid syntax is ASnnnn, where nnnn is a
number unique to the specific organization.
Notes:
n Default is: source-negated false
n The source-negated true processes all
source types, except the specified type.
Argument Description
(xxxx:yyyy:...:zzzz)
n cidr:<IP Address>/<Prefix>
The rule is applied to packets sent to:
l IPv4 address with Prefix from 0 to 32
n cc:<Country Code>
The rule matches the country code to the
destination IP addresses assigned to this
country, based on the Geo IP database.
The two-letter codes are defined in ISO
3166-1 alpha-2.
n asn:<Autonomous System Number>
The rule matches the AS number of the
organization to the destination IP addresses
that are assigned to this organization, based
on the Geo IP database.
The valid syntax is ASnnnn, where nnnn is a
number unique to the specific organization.
Notes:
n Default is: destination-negated false
n The destination-negated true will
process all destination types except the
specified type
Argument Description
Argument Description
Argument Description
Examples
Example 1 - Rate Limiting rule with a range
fw sam_policy add -a d -l r -t 3600 quota service any source range:172.16.7.11-172.16.7.13 new-conn-rate 5 flush true
Explanations:
n This rule drops packets for all connections (-a d) that exceed the quota set by this
rule, including packets for existing connections.
n This rule logs packets (-l r) that exceed the quota set by this rule.
n This rule will expire in 3600 seconds (-t 3600).
n This rule limits the rate of creation of new connections to 5 connections per second
(new-conn-rate 5) for any traffic (service any) from the source IP addresses in
the range 172.16.7.11 - 172.16.7.13 (source range:172.16.7.11-
172.16.7.13).
Note - The limit of the total number of log entries per second is configured with the
fwaccel dos config set -n <rate> command.
n This rule will be compiled and loaded on the SecureXL, together with other rules in the
Suspicious Activity Monitoring (SAM) policy database immediately, because this rule
includes the "flush true" parameter.
Explanations:
n This rule logs and lets through all packets (-a n) that exceed the quota set by this
rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to all packets except (service-negated true) the packets with
IP protocol number 1, 50-51, 6 port 443 and 17 port 53 (service 1,50-
51,6/443,17/53).
n This rule applies to all packets from source IP addresses that are assigned to the
country with specified country code (cc:QQ).
n This rule does not let any traffic through (byte-rate 0) except the packets with IP
protocol number 1, 50-51, 6 port 443 and 17 port 53.
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to packets from the Autonomous System number 64500
(asn:AS64500).
n This rule applies to packets from source IPv6 addresses FFFF:C0A8:1100/120
(cidr:[::FFFF:C0A8:1100]/120).
n This rule applies to all traffic (service any).
n This rule does not let any traffic through (pkt-rate 0).
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
Explanations:
n This rule bypasses (-a b) all packets that match this rule.
Note - The Access Control Policy and other types of security policy rules still apply.
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to packets from the source IP addresses in the range 172.16.8.17 -
172.16.9.121 (range:172.16.8.17-172.16.9.121).
n This rule applies to packets sent to TCP port 80 (service 6/80).
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
Explanations:
n This rule drops (-a d) all packets that match this rule.
n This rule does not log any packets (the -l r parameter is not specified).
n This rule does not expire (the timeout parameter is not specified). To cancel it, you
must delete it explicitly.
n This rule applies to all traffic (service any).
n This rule applies to all sources except (source-negated true) the source IP
addresses that are assigned to the country with specified country code (cc:QQ).
n This rule limits the maximal number of concurrent active connections to
655/65536=~1% (concurrent-conns-ratio 655) for any traffic (service any)
except (service-negated true) the connections from the source IP addresses
that are assigned to the country with specified country code (cc:QQ).
n This rule counts connections, packets, and bytes for traffic only from sources that
match this rule, and not cumulatively for this rule.
n This rule will not be compiled and installed on the SecureXL immediately, because it
does not include the "flush true" parameter.
fw sam_policy batch
Description
The "fw sam_policy batch" and "fw6 sam_policy batch" commands:
n Add and delete many Suspicious Activity Monitoring (SAM) rules at a time.
n Add and delete many Rate Limiting rules at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Procedure
1. Start the batch mode
add -a d -l r -t 3600 -c "Limit\ conn\ rate\ to\ 5\ conn/sec from\ these\ sources" quota service
any source range:172.16.7.13-172.16.7.13 new-conn-rate 5
del <501f6ef0,00000000,cb38a8c0,0a0afffe>
EOF
[Expert@HostName]#
fw sam_policy del
Description
The "fw sam_policy del" and "fw6 sam_policy del" commands:
n Delete one configured Suspicious Activity Monitoring (SAM) rule at a time.
n Delete one configured Rate Limiting rule at a time.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
Parameters
Parameter Description
'<Rule UID>' Specifies the UID of the rule you wish to delete.
Important:
n The quote marks and angle brackets
('<...>') are mandatory.
n To see the Rule UID, run the "fw
sam_policy get" command.
Procedure
1. List all the existing rules in the Suspicious Activity Monitoring policy database
List all the existing rules in the Suspicious Activity Monitoring policy database.
n For IPv4, run:
fw sam_policy get
operation=add uid=<5ac3965f,00000000,3403a8c0,0000264a>
target=all timeout=300 action=notify log=log name=Test\ Rule
comment=Notify\ about\ traffic\ from\ 1.1.1.1
originator=John\ Doe src_ip_addr=1.1.1.1 req_tpe=ip
Explanation:
The "fw samp del" and "fw6 samp del" commands only remove a rule from the
persistent database. The Security Gateway continues to enforce the deleted rule until
the next time you compiled and load a policy. To force the rule deletion immediately,
you must enter a flush-only rule right after the "fw samp del" and "fw6 samp del"
command. This flush-only rule immediately deletes the rule you specified in the
previous step, and times out in 2 seconds.
Best Practice - Specify a short timeout period for the flush-only rules. This
prevents accumulation of rules that are obsolete in the database.
fw sam_policy get
Description
The "fw sam_policy get" and "fw6 sam_policy get" commands:
n Show all the configured Suspicious Activity Monitoring (SAM) rules.
n Show all the configured Rate Limiting rules.
Notes:
n These commands are interchangeable:
l For IPv4: "fw sam_policy" and "fw samp".
Important:
n Configuration you make with these commands, survives reboot.
n VSX mode does not support Suspicious Activity Policy configured in SmartView
Monitor. See sk79700.
n In VSX mode, you must go to the context of an applicable Virtual System.
l In Gaia Clish, run: set virtual-system <VSID>
n In a Cluster, you must configure all the Cluster Members in the same way.
Best Practice - The SAM Policy rules consume some CPU resources on Security
Gateway. Set an expiration for rules that gives you time to investigate, but does not
affect performance. Keep only the required SAM Policy rules. If you confirm that an
activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.
fw6 [-d] sam_policy get [-l] [-u '<Rule UID>'] [-k '<Key>' -t
<Type> [+{-v '<Value>'}] [-n]]
Parameters
Note - All these parameters are optional.
Parameter Description
-u '<Rule Prints the rule specified by its Rule UID or its zero-based rule index.
UID>' The quote marks and angle brackets ('<...>') are mandatory.
Examples
Example 1 - Output in the default format
[Expert@HostName:0]# fw samp get
uid
<5ac3965f,00000000,3403a8c0,0000264a>
target
all
timeout
2147483647
action
notify
log
log
name
Test\ Rule
comment
Notify\ about\ traffic\ from\ 1.1.1.1
originator
John\ Doe
src_ip_addr
1.1.1.1
req_type
ip
Files
File Description
affinity Contains status and the thresholds for SecureXL New Affinity
mechanism.
See "/proc/ppk/affinity" on page 1455.
File Description
profile_ Contains IDs of the CPU cores and status of Traffic Profiling
cpu_stat See "/proc/ppk/profile_cpu_stat" on page 1470.
rlc Contains SecureXL statistics for drops due to Rate Limiting for DoS
Mitigation.
See "/proc/ppk/rlc" on page 1471.
stats Contains the IRQ numbers and names of interfaces the SecureXL uses.
See "/proc/ppk/stats" on page 1474.
/proc/ppk/affinity
Description
Contains the number of accelerated packets per second and rate of encrypted bytes.
/proc/ppk/conf
Description
Contains the SecureXL configuration and basic statistics.
Debug flags :
0 : 0x1
1 : 0x1
2 : 0x1
3 : 0x1
4 : 0x1
5 : 0x1
6 : 0x1
7 : 0x1
8 : 0x100
9 : 0x8
10 : 0x1
11 : 0x10
[Expert@MyGW:0]#
/proc/ppk/conns
Description
Contains the list of the SecureXL connections.
Important - This file is for future use. Refer to the "fwaccel conns" on page 1313
command.
/proc/ppk/cpls
Description
Contains SecureXL configuration for ClusterXL Load Sharing (CPLS).
Important - This file is for future use. Refer to the "fwaccel cfg -h" command (see
"fwaccel cfg" on page 1310).
/proc/ppk/cqstats
Description
Contains statistics for SecureXL connections queue.
/proc/ppk/drop_statistics
Description
Contains SecureXL statistics for dropped packets.
Note - This is the same information that the "fwaccel stats -d" command shows
(see "fwaccel stats" on page 1374).
/proc/ppk/ifs
Description
Contains the list of interfaces that SecureXL uses.
Explanation about the configuration flags in the "F" and "SIM F" columns
The "F" column shows the internal configuration flags that Firewall set on these interfaces.
The "SIM F" column shows the internal configuration flags that SecureXL set on these
interfaces.
Flag Description
0x001 If this flag is set, the SecureXL drops the packet at the end of the inbound
inspection, if the packet is a "cut-through" packet.
In outbound, SecureXL forwards all the packets to the network.
0x002 If this flag is set, the SecureXL sends an applicable notification when a TCP
state change occurs (connection is established or torn down).
0x004 If this flag is set, the SecureXL it sets the UDP header's checksum field
correctly when the SecureXL encapsulates an encrypted packet (UDP
encapsulation).
If this flag is not set, SecureXL sets the UDP header's checksum field to zero.
It is safe to ignore this flag, if it is set to 0 (SecureXL continues to calculate the
UDP packet's checksum).
0x008 If this flag is set, the SecureXL does not create new connections that match a
template, and SecureXL drops the packet that matches the template, when the
number of entries in the Connections Table reaches the specified limit.
If this flag is not set, the SecureXL forwards the packet to the Firewall.
Flag Description
0x010 If this flag is set, the SecureXL forwards fragments to the Firewall.
0x020 If this flag is set, the SecureXL does not create connections from TCP
templates anymore.
The Firewall offloads connections to SecureXL when necessary.
This flag only disables the creation of TCP templates.
0x040 If this flag is set, the SecureXL notifies the Firewall at intervals, so it refreshes
the accelerated connections in the Firewall kernel tables.
0x080 If this flag is set, the SecureXL does not create connections from non-TCP
templates anymore.
The Firewall offloads connections to SecureXL when necessary.
This flag only disables the creation of non-TCP templates.
0x100 If this flag is set, the SecureXL allows sequence verification violations for
connections that did not complete the TCP 3-way handshake process.
If this flag is not set, SecureXL must forward the violating packets to the
Firewall.
0x200 If this flag is set, the SecureXL allows sequence verification violations for
connections that completed the TCP 3-way handshake process.
If this flag is not set, SecureXL must forward the violating packets to the
Firewall.
0x400 If this flag is set, the SecureXL forwards TCP [RST] packets to the Firewall.
0x0001 If this flag is set, the SecureXL notifies the Firewall about HitCount data.
0x0002 If this flag is set, the VSX Virtual System works as a junction, rather than a
regular Virtual System (only the local Virtual System flag is applicable).
0x0004 If this flag is set, the SecureXL disables the reply counter of inbound encrypted
traffic.
At a result, SecureXL kernel module works in the same way as the VPN kernel
module.
0x0008 If this flag is set, the SecureXL enables the MSS Clamping.
Refer to the kernel parameters "fw_clamp_tcp_mss" and "fw_clamp_vpn_
mss" in sk101219.
0x0010 If this flag is set, the SecureXL disables the "No Match Ranges" (NMR)
Templates (see sk117755).
Flag Description
0x0020 If this flag is set, the SecureXL disables the "No Match Time" (NMT) Templates
(see sk117755).
0x0040 If this flag is set, the SecureXL does not send Drop Templates notifications
about dropped packets to the Firewall (to update the drop counters).
For example, if you set the value of the kernel parameter "activate_
optimize_drops_support_now" to 1, it disables the Drop Templates
notifications.
0x0080 If this flag is set, the SecureXL enables the MultiCore support for IPsec VPN
(see sk118097).
0x0100 If this flag is set, the SecureXL enables the support for CoreXL Dynamic
Dispatcher (see sk105261).
0x0800 If this flag is set, the SecureXL does not enforce the Path MTU Discovery for IP
multicast packets.
0x1000 If this flag is set, the SecureXL disables the SIM "drop_templates" feature.
0x2000 If this flag is set, it indicates that an administrator enabled the Link Selection
Load Sharing feature.
0x4000 If this flag is set, the SecureXL disables the asynchronous notification feature.
0x8000 If this flag is set, it indicates that the capacity of the Firewall Connections Table
is unlimited.
Examples:
Value Description
/proc/ppk/mcast_statistics
Description
Contains SecureXL statistics for multicast traffic.
Note - This is the same information that the "fwaccel stats -m" command shows
(see "fwaccel stats" on page 1374).
/proc/ppk/nac
Description
Contains SecureXL statistics for Identity Awareness Network Access Control (NAC) traffic.
Note - This is the same information that the "fwaccel stats -n" command shows
(see "fwaccel stats" on page 1374).
/proc/ppk/notify_statistics
Description
Contains SecureXL statistics for notifications SecureXL sent to Firewall about accelerated
connections.
/proc/ppk/profile_cpu_stat
Description
This file is for Check Point use only.
Contains IDs of the CPU cores and status of Traffic Profiling:
n The first column shows the IDs of the CPU cores.
n The second column shows the status of Traffic Profiling for the applicable CPU core.
/proc/ppk/rlc
Description
Contains SecureXL statistics for drops due to Rate Limiting for DoS Mitigation.
/proc/ppk/statistics
Description
Contains SecureXL overall statistics.
To see these statistics in a better way, run the "fwaccel stats" on page 1374 command.
/proc/ppk/stats
Description
Contains the IRQ numbers and names of interfaces the SecureXL uses.
/proc/ppk/viol_statistics
Description
Contains SecureXL statistics for violations - packets SecureXL forwarded (F2F) to the
Firewall.
Note - This is the same information that the "fwaccel stats -p" command shows
(see "fwaccel stats" on page 1374).
[Expert@MyGW:0]#
SecureXL Debug
To understand how SecureXL processes the traffic, enable the SecureXL debug while the
traffic passes through the Security Gateway.
fwaccel dbg
Description
The fwaccel dbg command controls the SecureXL debug. See "SecureXL Debug Procedure"
on page 1483.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
fwaccel dbg
-h
-m <Name of SecureXL Debug Module>
all
+ <Debug Flags>
- <Debug Flags>
reset
-f {"<5-Tuple Debug Filter>" | reset}
list
resetall
Parameters
Parameter Description
all Enables all debug flags for the specified debug module.
+ <Debug Flags> Enables the specified debug flags for the specified debug
module:
Syntax:
+ Flag1 [Flag2 Flag3 ... FlagN]
Note - You must press the space bar key after the plus
(+) character.
Parameter Description
- <Debug Flags> Disables all debug flags for the specified debug module.
Syntax:
- Flag1 [Flag2 Flag3 ... FlagN]
Note - You must press the space bar key after the
minus (-) character.
reset Resets all debug flags for the specified debug module to
their default state.
-f "<5-Tuple Debug Configures the debug filter to show only debug messages
Filter>" that contain the specified connection.
The filter is a string of five numbers separated with commas:
"<Source IP Address>,<Source
Port>,<Destination IP
Address>,<Destination Port>,<Protocol
Number>"
Notes:
n You can configure only one debug filter at one
time.
n You can use the asterisk "*" as a wildcard for an
IP Address, Port number, or Protocol number.
n For more information, see IANA Service Name
and Port Number Registry and IANA Protocol
Numbers.
resetall Reset all debug flags for all debug modules to their default
state.
Examples
Example 1 - Default output
[Expert@MyGW:0]# fwaccel dbg
Usage: fwaccel dbg [-m <...>] [resetall | reset | list | all | +/- <flags>]
-m <module> - module of debugging
-h - this help message
resetall - reset all debug flags for all modules
reset - reset all debug flags for module
all - set all debug flags for module
list - list all debug flags for all modules
-f reset | "<5-tuple>" - filter debug messages
+ <flags> - set the given debug flags
- <flags> - unset the given debug flags
Module: db
err get save del tmpl tmo init ant profile nmr nmt
Module: api
err init add update del acct conf stat vpn notif tmpl sv pxl qos gtp infra tmpl_info upd_conf
upd_if_inf add_sa del_sa del_all_sas misc get_features get_tab get_stat reset_stat tag long_
ver del_all_tmpl get_state upd_link_sel
Module: pkt
err f2f frag spoof acct notif tcp_state tcp_state_pkt sv cpls routing drop pxl qos user
deliver vlan pkt nat wrp corr caf
Module: infras
err reorder pm
Module: tmpl
err dtmpl_get dtmpl_notif tmpl
Module: vpn
err vpnpkt linksel routing vpn
Module: nac
err db db_get pkt pkt_ex signature offload idnt ioctl nac
Module: cpaq
init client server exp cbuf opreg transport transport_utils error
Module: synatk
init conf conn err log pkt proxy state msg
Module: adp
err rt nh eth heth wrp inf mbs bpl bplinf mbeinf if drop bond xmode ipsctl xnp
Module: dos
fw1-cfg fw1-pkt sim-cfg sim-pkt err detailed drop
[Expert@MyGW:0]#
Module: db (1)
err
Module: db (1)
err
err
Example 4 - Configuring debug filter for an SSH connection from 192.168.20.30 to 172.16.40.50
[Expert@MyGW:0]# fwaccel dbg -f 192.168.20.30,*,172.16.40.50,22,6
Debug filter was set.
[Expert@MyGW:0]#
[Expert@MyGW:0]# fwaccel dbg list
... ...
Note - For more information, see the R80.40 Quantum Security Gateway Guide -
Chapter Kernel Debug on Security Gateway.
Important:
n We strongly recommend to schedule a full maintenance window to minimize the
impact on your production traffic.
n We strongly recommend to connect over serial console to your Security
Gateway.
This is to avoid a possible issue when you cannot work with the CLI because of
a high load on the CPU.
n In cluster, you must collect this debug from all Cluster Members in the same
way.
n Debug the specific SecureXL instance only when you are sure that only that
SecureXL instance processes the traffic.
Procedure
1. Connect to the command line on your Security Gateway
expert
Run:
fw ctl debug 0
4. Reset all the SecureXL debug flags in all SecureXL debug modules
Run:
6. Make sure the Security Gateway allocated the kernel debug buffer
Run:
7. Configure the applicable kernel debug modules and kernel debug flags
Run:
8. Configure the applicable SecureXL debug modules and SecureXL debug flags
Run:
fw ctl debug
10. Examine the SecureXL debug configuration for SecureXL debug modules
11. Remove all entries from both the Firewall Connections table and SecureXL Connections
table
Run:
fw tab -t connections -x -y
Important:
n This step makes sure that you collect the debug of the real issue that is
Run:
fw tab -t cphwd_tmpl -x -y
Note - This command does not interrupt the existing connections. This step
makes sure that you collect the debug of the real issue that is not affected by
the existing connection templates.
Run:
Perform the steps that cause the issue to occur, or wait for it to occur.
Press CTRL+C.
16. Reset all kernel debug flags in all kernel debug modules
Run:
fw ctl debug 0
17. Reset all the SecureXL debug flags in all SecureXL debug modules
18. Examine the kernel debug configuration to make sure it returned to the default
Run:
fw ctl debug
19. Examine the SecureXL debug configuration to make sure it returned to the default
/var/log/kernel_debug.txt
Best Practice - Compress this file with the "tar -zxvf" command and
transfer it from the Security Gateway to your computer. If you transfer to an
FTP server, do so in the binary mode.
Flag Description
init Initialization
ioctl Changes in the configuration, which were initiated from the user space
Flag Description
tag Tags that were added to the packets by the SecureXL before
forwarding them to the Firewall
util Utilization
Flag Description
Flag Description
Flag Description
nmr "No Match Ranges" templates, which allow SecureXL Accept Templates
for rules that contain Dynamic objects or Domain objects (or for rules
located below such rules)
Flag Description
nmt "No Match Time" templates, which allow SecureXL Accept Templates for
rules that contain Time objects (or for rules located below such rules)
Flag Description
Flag Description
tag Tags that were added to the packets by the SecureXL before forwarding
them to the Firewall
upd_if_ Prints some text that shows if SecureXL updated information about
inf interfaces
Module "adp"
Flag Description
pm Pattern Matcher
Flag Description
ioctl Changes in the configuration, which were initiated from the user space
Flag Description
Flag Description
Flag Description
detailed Detailed tracing of DoS Rate Limiting logic in the packet flow.
Important - This debug flag is not suitable for large traffic volumes
because it prints a large number of messages. This causes high load on
the CPU.
fw1-cfg Information about DoS Rate Limiting configuration in the Firewall kernel
module
fw1-pkt Information about DoS Rate Limiting packet flow in the Firewall kernel
module
sim-pkt Information about DoS Rate Limiting packet flow in the SecureXL kernel
module
Flag Description
log Prints time of the last sent monitor log and interval between the monitor logs
Flag Description
CoreXL Commands
For more information about CoreXL, see the R80.40 Performance Tuning Administration
Guide - Chapter CoreXL.
cp_conf corexl
Description
Enables or disables CoreXL.
For more information, see the R80.40 Performance Tuning Administration Guide.
Important:
n This command is for Check Point use only.
To configure CoreXL, use the Check Point CoreXL option in the "cpconfig" on
page 936 menu.
n After all changes in CoreXL configuration on the Security Gateway, you must
reboot it.
n In Custer, you must configure all the Cluster Members in the same way.
Syntax
n To enable CoreXL with 'n' IPv4 Firewall instances and optionally 'k' IPv6 Firewall
instances:
n To disable CoreXL:
Parameters
Parameter Description
Example
Currently, the Security Gateway runs two IP4v CoreXL Firewall instances (KERN_INSTANCE_
NUM = 2).
We change the number of IP4v CoreXL Firewall instances to three.
dynamic_split
Description
On Check Point Appliances, R80.40 added the ability to change the number of CoreXL
Firewall and SND instances without reboot (Dynamic Split).
Important:
n By default, this feature is disabled.
n We do not recommend manual configuration of CoreXL Firewall and SND
instances, because such configuration disables the CoreXL Dynamic Split.
To enable the CoreXL Dynamic Split again, you must disable it and enable it.
n For CoreXL Dynamic Split requirements, see sk164155.
The dynamic_split command controls the Dynamic Split of CoreXL Firewall and SND
instances on the local Security Gateway, or Cluster Member.
For more information, see R80.40 Performance Tuning Administration Guide - Chapter
CoreXL.
Syntax
dynamic_split
-o disable
-o enable
-o start
-o stop
Important:
n You must run these commands in the Expert mode.
n In a Cluster, you must configure all the Cluster Members in the
same way.
Parameters
Parameter Description
Parameter Description
fw ctl multik
Description
The fw ctl multik and fw6 ctl multik commands control CoreXL for IPv4 and IPv6, respectively.
fw ctl multik
add_bypass_port <options>
del_bypass_port <options>
dynamic_dispatching <options>
gconn <options>
get_instance <options>
print_heavy_conn
prioq <options>
show_bypass_ports
stat
start
stop
utilize
Parameters
Parameter Description
add_bypass_port Adds the specified TCP and UDP ports to the CoreXL Dynamic
<options> Dispatcher bypass list.
See "fw ctl multik add_bypass_port" on page 1502.
del_bypass_port Removes the specified TCP and UDP ports from the CoreXL
<options> Dynamic Dispatcher bypass list.
See "fw ctl multik del_bypass_port" on page 1504.
get_instance Shows CoreXL Firewall instance that processes the specified IPv4
<options> connection.
See "fw ctl multik get_instance" on page 1512.
print_heavy_conn Shows the table with Heavy Connections (that consume the most
CPU resources) in the CoreXL Dynamic Dispatcher.
See "fw ctl multik print_heavy_conn" on page 1514.
prioq <options> Configures the CoreXL Firewall Priority Queues (see sk105762).
See "fw ctl multik prioq" on page 1516.
show_bypass_ Shows the TCP and UDP ports configured in the bypass port list of
ports the CoreXL Dynamic Dispatcher.
See "fw ctl multik show_bypass_ports" on page 1517.
utilize Shows the CoreXL queue utilization for each CoreXL Firewall
instance.
See "fw ctl multik utilize" on page 1522.
Description
Adds the specified TCP and UDP ports to the bypass port list of the CoreXL Dynamic
Dispatcher.
For more information about the CoreXL Dynamic Dispatcher, see sk105261.
Syntax
Parameters
Parameter Description
<Port Number> Specifies the numbers of TCP and UDP ports to add to the list.
Example
Description
Removes the specified TCP and UDP ports from the bypass port list of the CoreXL Dynamic
Dispatcher.
For more information about the CoreXL Dynamic Dispatcher, see sk105261.
Syntax
Parameters
Parameter Description
<Port Number> Specifies the numbers of TCP and UDP ports to remove from the list.
Example
Description
Shows and controls the CoreXL Dynamic Dispatcher that dynamically assigns new
connections to a CoreXL Firewall instances based on the utilization of CPU cores.
For more information, see sk105261.
Parameters
Parameter Description
Example
Description
Shows statistics about CoreXL Global Connections that Security Gateway stores in the kernel
table fw_multik_ld_gconn_table.
The CoreXL Global Connections table contains information about which CoreXL Firewall
instance owns which connections.
Notes:
n This command does not support
VSX.
n This command does not support
IPv6.
Syntax
Parameters
Parameter Description
none Shows the interactive menu for the CoreXL Firewall Priority Queues.
Parameter Description
-sec Shows the additional information about each CoreXL Firewall instance:
n I/O (In or Out)
n Inst. ID (CoreXL Firewall instance ID)
n Flags
n Seq (Sequence)
n Hold_ref (Hold reference)
-seg Shows the default information about the specified Global Connections
<Number> Segment.
===============================================================================================
===========================
| Segm | Src IP | S.port | Dst IP | D.port | Proto | Flags | PP |Ref Cnt(I/O)|Inst|PPAK ID|clstr
mem ID|Rec. ref|Rec. Type|
===============================================================================================
===========================
| 0 | 192.168.3.52 | 18192 | 192.168.3.240 | 46082 | 6 |FP .. ..| No | 0/0 | 1 | 32 |
0 | 0 | UNDEF |
| 0 | 192.168.3.52 | 54216 | 192.168.3.240 | 257 | 6 |FP .. ..| No | 0/0 | 1 | 32 |
0 | 0 | UNDEF |
| 0 | 192.168.3.240 | 53925 | 192.168.3.53 | 18192 | 6 |FP .. ..| No | 0/0 | 0 | 32 |
1 | 0 | UNDEF |
| 0 | 192.168.3.240 | 257 | 192.168.3.52 | 54216 | 6 |FP .. ..| No | 0/0 | 1 | 32 |
0 | 0 | UNDEF |
| 0 | 192.168.3.53 | 18192 | 192.168.3.240 | 64216 | 6 |FP .. ..| No | 0/0 | 1 | 32 |
15 | 0 | UNDEF |
| 0 | 0.0.0.0 | 8116 | 192.168.3.53 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 |
1 | 0 | UNDEF |
| 0 | 0.0.0.0 | 8116 | 192.168.3.52 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 |
0 | 0 | UNDEF |
| 0 | 192.168.3.240 | 64216 | 192.168.3.53 | 18192 | 6 |FP .. ..| No | 0/0 | 1 | 32 |
15 | 0 | UNDEF |
| 0 | 192.168.3.52 | 8116 | 0.0.0.0 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 |
0 | 0 | UNDEF |
| 0 | 172.20.168.16 | 63800 | 192.168.3.53 | 22 | 6 |FP .. ..| No | 0/0 | 0 | 32 |
1 | 0 | UNDEF |
| 0 | 192.168.3.240 | 46082 | 192.168.3.52 | 18192 | 6 |FP .. ..| No | 0/0 | 1 | 32 |
0 | 0 | UNDEF |
| 0 | 192.168.3.53 | 8116 | 0.0.0.0 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 |
1 | 0 | UNDEF |
| 0 | 192.168.3.53 | 22 | 172.20.168.16 | 63800 | 6 |FP .. ..| No | 0/0 | 0 | 32 |
1 | 0 | UNDEF |
| 0 | 192.168.3.53 | 18192 | 192.168.3.240 | 53925 | 6 |FP .. ..| No | 0/0 | 0 | 32 |
1 | 0 | UNDEF |
===============================================================================================
===========================
FP - from pool. T - temporary connection. PP - pending pernament.
[Expert@MyGW:0]#
Example 3 - Additional information about each CoreXL Firewall instance, including the
information about Firewall Priority Queues
================================================================================================
================================================================================================
=======
| Segm | Src IP | S.port | Dst IP | D.port | Proto | Flags | PP |Ref Cnt(I/O)|Inst|PPAK ID|clstr
mem ID|Rec. ref|Rec. Type|Inst. Section: I/O|Inst. ID|Flags| Seq | Hold_ref |Prio:|last_enq_
jiff|queue_indx|conn_tokens
================================================================================================
================================================================================================
=======
| 0 | 192.168.3.52 | 18192 | 192.168.3.240 | 46082 | 6 |FP .. ..| No | 0/0 | 1 | 32 |
0 | 0 | UNDEF |Inst. Section: Out | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.240 | 53925 | 192.168.3.53 | 18192 | 6 |FP .. ..| No | 0/0 | 0 | 32 |
1 | 0 | UNDEF |Inst. Section: In | 0 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.240 | 257 | 192.168.3.52 | 35883 | 6 |FP .. ..| No | 0/0 | 1 | 32 |
0 | 0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.53 | 18192 | 192.168.3.240 | 64216 | 6 |FP .. ..| No | 0/0 | 1 | 32 |
15 | 0 | UNDEF |Inst. Section: Out | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 0.0.0.0 | 8116 | 192.168.3.53 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 |
1 | 0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 0.0.0.0 | 8116 | 192.168.3.52 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 |
0 | 0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.240 | 64216 | 192.168.3.53 | 18192 | 6 |FP .. ..| No | 0/0 | 1 | 32 |
15 | 0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.52 | 8116 | 0.0.0.0 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 |
0 | 0 | UNDEF |Inst. Section: Out | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 172.20.168.16 | 63800 | 192.168.3.53 | 22 | 6 |FP .. ..| No | 0/0 | 0 | 32 |
1 | 0 | UNDEF |Inst. Section: In | 0 | Perm | 494 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.240 | 46082 | 192.168.3.52 | 18192 | 6 |FP .. ..| No | 0/0 | 1 | 32 |
0 | 0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.52 | 35883 | 192.168.3.240 | 257 | 6 |FP .. ..| No | 0/0 | 1 | 32 |
0 | 0 | UNDEF |Inst. Section: Out | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.53 | 8116 | 0.0.0.0 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 |
1 | 0 | UNDEF |Inst. Section: Out | 1 | Perm | 0 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.53 | 22 | 172.20.168.16 | 63800 | 6 |FP .. ..| No | 0/0 | 0 | 32 |
1 | 0 | UNDEF |Inst. Section: Out | 0 | Perm | 280 | 0 |Prio:| 0 | -1 | 0 |
| 0 | 192.168.3.53 | 18192 | 192.168.3.240 | 53925 | 6 |FP .. ..| No | 0/0 | 0 | 32 |
1 | 0 | UNDEF |Inst. Section: Out | 0 | Perm | 219 | 0 |Prio:| 0 | -1 | 0 |
================================================================================================
================================================================================================
=======
FP - from pool. T - temporary connection. PP - pending pernament. In - inbound. Out
- outbound.
[Expert@MyGW:0]#
===============================================================================================
=======================================================================
| Segm | Src IP | S.port | Dst IP | D.port | Proto | Flags | PP |Ref Cnt(I/O)|Inst|PPAK ID|clstr
mem ID|Rec. ref|Rec. Type|Inst. Section: I/O|Inst. ID|Flags| Seq | Hold_ref |
===============================================================================================
=======================================================================
| 0 | 192.168.3.52 | 18192 | 192.168.3.240 | 46082 | 6 |FP .. ..| No | 0/0 | 1 | 32 |
0 | 0 | UNDEF |Inst. Section: Out | 1 | Perm | 0 | 0 |
| 0 | 192.168.3.52 | 52864 | 192.168.3.240 | 257 | 6 |FP .. ..| No | 0/0 | 2 | 32 |
0 | 0 | UNDEF |Inst. Section: Out | 2 | Perm | 0 | 0 |
| 0 | 192.168.3.240 | 53925 | 192.168.3.53 | 18192 | 6 |FP .. ..| No | 0/0 | 0 | 32 |
1 | 0 | UNDEF |Inst. Section: In | 0 | Perm | 0 | 0 |
| 0 | 192.168.3.53 | 18192 | 192.168.3.240 | 64216 | 6 |FP .. ..| No | 0/0 | 1 | 32 |
15 | 0 | UNDEF |Inst. Section: Out | 1 | Perm | 0 | 0 |
| 0 | 192.168.3.53 | 60186 | 192.168.3.240 | 257 | 6 |FP .. ..| No | 0/0 | 1 | 32 |
1 | 0 | UNDEF |Inst. Section: Out | 1 | Perm | 76 | 0 |
| 0 | 0.0.0.0 | 8116 | 192.168.3.53 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 |
1 | 0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |
| 0 | 0.0.0.0 | 8116 | 192.168.3.52 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 |
0 | 0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |
| 0 | 192.168.3.240 | 64216 | 192.168.3.53 | 18192 | 6 |FP .. ..| No | 0/0 | 1 | 32 |
15 | 0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |
| 0 | 192.168.3.52 | 8116 | 0.0.0.0 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 |
0 | 0 | UNDEF |Inst. Section: Out | 1 | Perm | 0 | 0 |
| 0 | 172.20.168.16 | 63800 | 192.168.3.53 | 22 | 6 |FP .. ..| No | 0/0 | 0 | 32 |
1 | 0 | UNDEF |Inst. Section: In | 0 | Perm | 479 | 0 |
| 0 | 192.168.3.240 | 46082 | 192.168.3.52 | 18192 | 6 |FP .. ..| No | 0/0 | 1 | 32 |
0 | 0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |
| 0 | 192.168.3.53 | 8116 | 0.0.0.0 | 8116 | 17 |FP .. ..| No | 0/0 | 1 | 32 |
1 | 0 | UNDEF |Inst. Section: Out | 1 | Perm | 0 | 0 |
| 0 | 192.168.3.240 | 257 | 192.168.3.52 | 52864 | 6 |FP .. ..| No | 0/0 | 2 | 32 |
0 | 0 | UNDEF |Inst. Section: In | 2 | Perm | 0 | 0 |
| 0 | 192.168.3.53 | 22 | 172.20.168.16 | 63800 | 6 |FP .. ..| No | 0/0 | 0 | 32 |
1 | 0 | UNDEF |Inst. Section: Out | 0 | Perm | 257 | 0 |
| 0 | 192.168.3.53 | 18192 | 192.168.3.240 | 53925 | 6 |FP .. ..| No | 0/0 | 0 | 32 |
1 | 0 | UNDEF |Inst. Section: Out | 0 | Perm | 219 | 0 |
| 0 | 192.168.3.240 | 257 | 192.168.3.53 | 60186 | 6 |FP .. ..| No | 0/0 | 1 | 32 |
1 | 0 | UNDEF |Inst. Section: In | 1 | Perm | 0 | 0 |
===============================================================================================
=======================================================================
FP - from pool. T - temporary connection. PP - pending pernament. In - inbound. Out
- outbound.
[Expert@MyGW:0]#
Description
Shows CoreXL Firewall instance that processes the specified IPv4 connection.
Important - This command works only if the CoreXL Dynamic Dispatcher is disabled
(see sk105261).
Syntax
n To show the CoreXL Firewall instance that processes the specified IPv4 connection:
n To show the CoreXL Firewall instance that processes the specified range of IPv4
connections:
Parameters
Parameter Description
<Source IPv4 Address First source IPv4 address of the specified range of
Start> IPv4 addresses
<Source IPv4 Address Last source IPv4 address of the specified range of IPv4
End> addresses
Description
Shows the table with Heavy Connections (that consume the most CPU resources) in the
CoreXL Dynamic Dispatcher.
For more information about the CoreXL Dynamic Dispatcher, see sk105261.
CoreXL suspects that a connection is "heavy" if it meets these conditions:
n Security Gateway detected the suspected connection during the last 24 hours
n The suspected connection lasts more than 10 seconds
n CoreXL Firewall instance that processes this connection causes a CPU load of over 60%
n The suspected connection utilizes more than 50% of the total work the applicable
CoreXL Firewall instance does
The output table shows this information about the Heavy Connections:
n Source IP address
n Source Port
n Destination IP address
n Destination Port
n Protocol Number
n CoreXL Firewall instance ID that processes this connection
n CoreXL Firewall instance load on the CPU
n Connection's relative load on the CoreXL Firewall instance
Notes:
n This command shows the suspected heavy connections even if they are already
closed.
n In the "cpview" on page 1724 utility, go to CPU > Top-Connections >
InstancesX-Y > InstanceZ. Refer to the Top Connections section.
Syntax
Parameters
Parameter Description
Example
Description
Configures the CoreXL Firewall Priority Queues. For more information, see sk105762.
Parameters
Parameter Description
Example
Available modes:
0. Off
1. Evaluator-only
2. On
Description
Shows the TCP and UDP ports configured in the bypass port list of the CoreXL Dynamic
Dispatcher with the "fw ctl multik add_bypass_port" on page 1502 command.
For more information about the CoreXL Dynamic Dispatcher, see sk105261.
Syntax
Example
Description
Shows information for each CoreXL Firewall instance.
Parameters
Parameter Description
Example
Description
Starts all CoreXL Firewall instances on-the-fly, if they were stopped with the "fw ctl multik stop"
on page 1521 command.
Example
Description
Stops all CoreXL Firewall instances on-the-fly.
Important - To start all CoreXL Firewall instances on-the-fly, run the "fw ctl multik
start" on page 1520 command.
Example
Description
Shows the CoreXL queue utilization for each CoreXL Firewall instance.
Example
fw ctl affinity
The fw ctl affinity command shows and configures the CoreXL affinity settings for:
n Interfaces
n User-space processes
n CoreXL Firewall instances
Description
The fw ctl affinity -l command shows the current CoreXL affinity settings on a
Security Gateway for:
n Interfaces
n User-space processes
n CoreXL Firewall instances
Syntax
n To see the built-in help:
fw ctl affinity
n To show the number of system CPU cores allowed by the installed CoreXL license:
Parameters
Parameter Description
-k <CoreXL Shows the affinity for the specified CoreXL Firewall instance.
Firewall instance
ID>
-p <Process ID> Shows the affinity for the Check Point user-space process (for
example: fwd, vpnd) specified by its PID.
-n <Process Name> Shows the affinity for the Check Point user-space process (for
example: fwd, vpnd) specified by its name.
all Shows the affinity for all CPU cores (numbers start from zero).
<CPU ID0> ... <CPU Shows the affinity for the specified CPU cores (numbers start
IDn> from zero).
Example 1
Example 2
Example 3
Example 4
[Expert@MyGW:0]# fw ctl affinity -l -i eth0
eth0: CPU 0
[Expert@MyGW:0]#
Example 5
Example 6
Example 7
Description
The fw ctl affinity -l command shows the CoreXL affinity settings on a VSX Gateway
for:
n Interfaces
n User-space processes
n CoreXL Firewall instances
Syntax
n To show the affinities in VSX mode (you can combine the optional parameters):
fw ctl affinity -l -x
[-vsid <VSID ranges>]
[-cpu <CPU ID ranges>]
[-flags {e | k | t | n | h | o}]
n To show the number of system CPU cores allowed by the installed CoreXL license:
Parameters
Parameter Description
Example 1
Example 2
Description
The fw ctl affinity -s command configures the CoreXL affinity settings on a Security
Gateway for:
n Interfaces
n User-space processes
n CoreXL Firewall instances
Syntax
n To see the built-in help:
fw ctl affinity
Parameters
Parameter Description
-p <Process ID> Configures the affinity for the Check Point user-space process
(for example: fwd, vpnd) specified by its PID.
-n <Process Name> Configures the affinity for the Check Point user-space process
(for example: fwd, vpnd) specified by its name.
all Configures the affinity for all CPU cores (numbers start from
zero).
<CPU ID0> ... <CPU Configures the affinity for the specified CPU cores (numbers
IDn> start from zero).
Example 3 - Affine the process CPD by its PID to the CPU core #2
Example 4 - Affine the process CPD by its name to the CPU core #2
Description
The fw ctl affinity -s command configures the CoreXL affinity settings on a VSX
Gateway for:
n Interfaces
n User-space processes
n CoreXL Firewall instances
Syntax
n To see the built-in help:
fw ctl affinity
fw ctl affinity
-vsx_factory_defaults
-vsx_factory_defaults_no_prompt
Important
n The VSX Gateway saves these changes in the $FWDIR/conf/fwaffinity.conf
configuration file.
n When you configure affinity of an interface, it automatically configures the affinities of all
other interfaces that share the same IRQ to the same CPU core.
Parameters
Parameter Description
-pname <Process Configures the affinity for the Check Point daemon specified by its
Name> name (for example: fwd, vpnd).
Parameter Description
-fwkall <Number Configures the affinity for all running FWK daemon instances to
of CPUs> the specified number of CPU cores.
If it is necessary to affine all running FWK daemon instances to all
CPU cores, enter the number of all available CPU cores.
-vsx_factory_ Deletes all existing affinity settings and creates the default affinity
defaults settings during the next reboot.
Important - Before this operation, the command prompts the
user whether to proceed. You must reboot to complete the
operation.
-vsx_factory_ Deletes all current affinity settings and creates the default affinity
defaults_no_ settings during the next reboot.
prompt Important - Before this operation, the command does not
prompt the user whether to proceed. You must reboot to
complete the operation.
Example 1 - Affine the Virtual Devices #0,1,2,4,7,8 to the CPU cores #0,1,2,4
Example 2 - Affine the process CPD by its name for Virtual Devices #0-12 to the CPU core
#7
Example 3 - Affine the FWK daemon instances #0,2,4 to the CPU core #5
Example 4 - Affine all FWK daemon instances to the last two CPU cores
fw -i
Description
By default, the "fw" on page 1004 commands apply to the entire Security Gateway.
The fw commands show aggregated information for all CoreXL Firewall instances.
The fw -i commands apply to the specified CoreXL Firewall instance.
Syntax
Parameters
Parameter Description
fwboot bootconf
Description
Configures boot security options.
Notes:
n You must run this command from the Expert mode.
n The settings are saved in the
$FWDIR/boot/boot.conf file.
Warning - To avoid issues, do not edit the
$FWDIR/boot/boot.conf file manually. Edit the
file only with this command.
n Refer to these related commands:
l "fwboot corexl" on page 1176
Parameters
Parameter Description
get_def Shows the configured path and the name of the Default Filter policy
file (default is $FWDIR/boot/default.bin).
Note - In the $FWDIR/boot/boot.conf file, refer to the
value of the DEFAULT_FILTER_PATH.
Parameter Description
Notes:
n In the $FWDIR/boot/boot.conf file, refer to the value
of the COREXL_INSTALLED.
n To configure CoreXL, use the "cpconfig" on page 936
menu.
set_def Configures the path and the name of the Default Filter policy file
[< (default is $FWDIR/boot/default.bin).
/path/filename Notes:
>]
n In the $FWDIR/boot/boot.conf file, refer to the value
of the DEFAULT_FILTER_PATH.
n If you do not specify the path and the name explicitly,
then the value of the DEFAULT_FILTER_PATH is set to
0.
As a result, Security Gateway does not load a Default
Filter during boot.
Parameter Description
Notes:
n In the $FWDIR/boot/boot.conf file, refer to the value
of the IPV6_INSTALLED.
n Configure the IPv6 Support in Gaia Portal, or Gaia Clish.
See the R80.40 Gaia Administration Guide.
fwboot corexl
Description
Configures and monitors the CoreXL.
Important:
n The configuration commands are for Check Point use only. To configure
CoreXL, use the Check Point CoreXL option in the "cpconfig" on page 936
menu.
n After all changes in CoreXL configuration on the Security Gateway, you must
reboot it.
n In a Cluster, you must configure all the Cluster Members in the same way.
Parameters
Parameter Description
Parameter Description
curr_ Returns the current configured number of IPv4 CoreXL Firewall instances.
instance4_
count Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl curr_
instance4_count
[Expert@MyGW:0]# echo $?
3
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 11 | 18
1 | Yes | 2 | 12 | 18
2 | Yes | 1 | 13 | 18
[Expert@MyGW:0]#
curr_ Returns the current configured number of IPv6 CoreXL Firewall instances.
instance6_
count Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl curr_
instance6_count
[Expert@MyGW:0]# echo $?
2
[Expert@MyGW:0]#
[Expert@MyGW:0]# fw6 ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 11 | 18
1 | Yes | 2 | 12 | 18
[Expert@MyGW:0]#
def_by_ Sets the default configuration for CoreXL according to the specified
allowed allowed number of CPU cores.
[n]
Parameter Description
def_ Returns the default number of IPv4 CoreXL Firewall instances for this
instance4_ Security Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl def_
instance4_count
[Expert@MyGW:0]# echo $?
3
[Expert@MyGW:0]#
def_ Returns the default number of IPv4 CoreXL Firewall instances for this
instance6_ Security Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl def_
instance6_count
[Expert@MyGW:0]# echo $?
2
[Expert@MyGW:0]#
Parameter Description
[-v] Enables CoreXL with 'n' IPv4 Firewall instances and optionally 'k' IPv6
enable [n] Firewall instances.
[-6 k]
n -v - Leaves the high memory (vmalloc) unchanged.
n n - Denotes the number of IPv4 CoreXL Firewall instances.
n k - Denotes the number of IPv6 CoreXL Firewall instances.
See the "cp_conf corexl" on page 926 command.
max_ Returns the maximal allowed number of IPv4 CoreXL Firewall instances
instance4_ for this Security Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instance4_count
[Expert@MyGW:0]# echo $?
4
[Expert@MyGW:0]#
max_ Returns the maximal allowed number of IPv4 CoreXL Firewall instances
instances for a Security Gateway that runs Gaia with 32-bit kernel.
4_32bit
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances4_32bit
[Expert@MyGW:0]# echo $?
14
[Expert@MyGW:0]#
Parameter Description
max_ Returns the maximal allowed number of IPv4 CoreXL Firewall instances
instances for a Security Gateway that runs Gaia with 64-bit kernel.
4_64bit
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances4_64bit
[Expert@MyGW:0]# echo $?
38
[Expert@MyGW:0]#
max_ Returns the maximal allowed number of IPv6 CoreXL Firewall instances
instance6_ for this Security Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instance6_count
[Expert@MyGW:0]# echo $?
3
[Expert@MyGW:0]#
max_ Returns the total maximal allowed number of CoreXL Firewall instances
instances_ (IPv4 and IPv6) for this Security Gateway.
count
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances_count
[Expert@MyGW:0]# echo $?
40
[Expert@MyGW:0]#
max_ Returns the total maximal allowed number of CoreXL Firewall instances
instances_ for a Security Gateway that runs Gaia with 32-bit kernel.
32bit
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances_32bit
[Expert@MyGW:0]# echo $?
16
[Expert@MyGW:0]#
Parameter Description
max_ Returns the total maximal allowed number of CoreXL Firewall instances
instances_ for a Security Gateway that runs Gaia with 64-bit kernel.
64bit
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl max_
instances_64bit
[Expert@MyGW:0]# echo $?
40
[Expert@MyGW:0]#
min_ Returns the minimal allowed number of IPv4 CoreXL Firewall instances.
instance_
count Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl min_
instance_count
[Expert@MyGW:0]# echo $?
2
[Expert@MyGW:0]#
unsupporte Returns 1 if at least one feature is configured, which CoreXL does not
d_features support.
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot corexl
unsupported_features
corexl unsupported feature: QoS is configured.
[Expert@MyGW:0]# echo $?
1
[Expert@MyGW:0]#
fwboot cpuid
Description
Shows the number of available CPUs and CPU cores on this Security Gateway.
Syntax
Parameters
Parameter Description
No Shows the IDs of the available CPU cores on this Security Gateway.
Parameters
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid
3 2 1 0
[Expert@MyGW:0]#
Parameter Description
--full Shows a full map of the available CPUs and CPU cores on this Security
Gateway.
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid --full
cpuid phys_id core_id thread_id
0 0 0 0
1 2 0 0
2 4 0 0
3 6 0 0
[Expert@MyGW:0]#
ht_aware Shows the CPU cores in the order of their awareness of Hyper-Threading.
Example
[Expert@MyGW:0]# $FWDIR/boot/fwboot cpuid ht_aware
3 2 1 0
[Expert@MyGW:0]#
fwboot ht
Important - This command is obsolete and is not supported. To configure SMT
(HyperThreading) feature, follow sk93000.
fwboot multik_reg
Description
Shows the internal memory address of the registration function for the specified CoreXL
Firewall instance.
Note - You must run this command from the Expert mode.
Syntax
Parameters
Parameter Description
Example
fwboot post_drv
Description
Loads the Firewall driver for CoreXL during boot.
Important:
n This command is for Check Point use only.
n If you run this command, Security Gateway can block all traffic. In such case,
you must connect to the Security Gateway over a console and restart Check
Point services with the "cpstop" on page 967 and "cpstart" on page 957
commands. Alternatively, you can reboot the Security Gateway.
Note - You must run this command from the Expert mode.
Syntax
Parameters
Parameter Description
Multi-Queue Commands
For more information about Multi-Queue, see the R80.40 Performance Tuning Administration
Guide - Chapter Multi-Queue.
mq_mng
In This Section:
Description
The mq_mng utility shows and configures the Multi-Queue on supported interfaces.
Syntax
Important:
n In a Cluster, you must configure all the Cluster Members in the
same way.
n You must run these commands in the Expert mode.
n Change in the Multi-Queue mode can cause short packet loss.
n To see the built-in help
Parameters
Parameter Description
Parameter Description
Notes:
n To specify interfaces:
l Use this syntax:
-i eth2).
l To specify several interfaces, enter their names separates
example: -c 1).
l To specify several nonconsecutive CPU cores, enter their
Parameter Description
Examples
Show the current Multi-Queue configuration on all interfaces
[Expert@MyGW:0]# mq_mng --show
Set manual Multi-Queue mode on the interfaces eth1 and eth2 to CPU cores 0, 1, 2, 4, 5, and 6
mq_mng -s manual -i eth1 eth2 -c 0-2 4-6
Syntax
Important:
n In a Cluster, you must configure all the Cluster Members in the
same way.
n You must run these commands in Gaia Clish.
n Change in the Multi-Queue mode can cause short packet loss.
n To show the existing Multi-Queue configuration for the specified interface:
Parameters
Parameter Description
Parameter Description
Examples
Show Multi-Queue configuration on the interface eth2
MyGW> show interface eth2 multi-queue
Note: The output does not include network interfaces that are currently in the down state.
MyGW>
Set manual Multi-Queue mode on the interface eth2 to CPU cores 0, 1, 2, 4, 5, and 6
set interface eth2 multi-queue manual core 0-2,4-6
Term Description
ADLOG The module responsible for the acquisition of identities of entities (users or
computers) from the Active Directory.
The adlog runs on:
n An Identity AwarenessSecurity Gateway, for which you enabled the AD
Query.
The AD Query serves the Identity AwarenessSoftware Blade, which
enforces the policy and logs identities.
n A Log Server. The adlog logs identities.
The adlog is the command line process used to control and monitor the
ADLOG feature.
The command line tool helps control users' statuses, as well as troubleshoot
and monitor the system.
The PEP and PDP processes are key components of the system. Through them,
administrators control user access and network protection.
adlog
Description
Provides commands to control and monitor the AD Query process.
Syntax
n When the adlog runs on a Security Gateway, the AD Query serves the Identity
Awareness Software Blade, which enforces policy and logs identities.
In this case, the command syntax is:
Note - Parameters for the "adlog a" and "adlog l" commands are identical.
Parameters
Parameter Description
Parameter Description
adlog control
Description
Sends control commands to the AD Query.
Syntax
adlog {a | l} control
muh <options>
reconf
srv_accounts <options>
stop
Parameters
Parameter Description
Parameter Description
adlog dc
Description
Shows the status of a connection to the AD domain controller.
Syntax
adlog a dc
adlog l dc
adlog debug
Description
Enables and disables the adlog debug output.
Syntax
adlog {a | l} debug
extended
mode
off
on
Parameters
Parameter Description
adlog query
Description
Shows the database of identities acquired by the AD Query, according to the specified filter.
Syntax
adlog {a | l} query
all
ip <IP Address>
machine <Computer Name>
string <String>
user <Username>
Parameters
Parameter Description
string <String> Filters identity mappings based on the specified text string.
Example - Show the entry that contains the string "jo" in the user name
adlog a query user jo
adlog statistics
Description
Shows statistics about NT Event logs received by adlog, for each IP address and total.
Also shows the number of identified IP addresses.
Syntax
adlog a statistics
adlog l statistics
pdp
Description
These commands control and monitor the pdpd process.
Syntax
Commands
Parameter Description
ad <parameter> For the AD Query, adds (or removes) an identity to the Identity
<option> Awareness database on the Security Gateway.
See "pdp ad" on page 1577.
connections Shows the PDP connections with the PEP gateways, Terminal
<parameter> Servers, and Identity Collectors.
See "pdp connections" on page 1589.
Parameter Description
vpn <parameter> Shows connected VPN gateways that send identity data from
VPN Remote Access Clients.
See "pdp vpn" on page 1620.
pdp ad
General Syntax
pdp ad
associate <options>
disassociate <options>
Description
For the AD Query, adds an identity to the Identity Awareness database on the Security
Gateway.
The group data must be in the AD.
Syntax
Parameters
Parameter Description
Description
For the AD Query, removes the identity from the Identity Awareness database on the Security
Gateway.
Identity Awareness does not authenticate a user that is removed.
Syntax
Parameters
Parameter Description
m <Computer Name> Specifies the computer that is defined for the identity.
pdp auth
Description
Configures authentication/authorization options for PDP.
Syntax
pdp auth
allow_empty_result <options>
count_in_non_ldap_group <options>
fetch_by_sid <options>
force_domain <options>
kerberos_any_domain <options>
kerberos_encryption <options>
reauth_agents_after_policy <options>
recovery_interval <options>
username_password <options>
Parameters
Parameter Description
allow_empty_ Shows the current configuration of fetching of local groups from the
result AD server based on SID.
<options> Configures that the fetching of local groups from the AD server
based on SID should succeed, even if all SIDs are foreign.
The available <options> are:
n Disable the fetching of local groups:
pdp auth allow_empty_result disable
n Enable the fetching of local groups:
pdp auth allow_empty_result enable
n Show the current configuration:
pdp auth allow_empty_result status
Parameter Description
fetch_by_sid Shows and configures the fetching of local groups from the AD
<options> server based on SID.
The available <options> are:
n Disable the fetching of local groups:
pdp auth fetch_by_sid disable
n Enable the fetching of local groups:
pdp auth fetch_by_sid enable
n Show the current configuration:
pdp auth fetch_by_sid status
force_domain Shows and configures the PDP to match the identity's source,
<options> based on the reported domain and authorization domain.
The available <options> are:
n Disable the match the identity's source:
pdp auth force_domain disable
n Enable the match the identity's source:
pdp auth force_domain enable
n Show the current configuration:
pdp auth force_domain status
Parameter Description
kerberos_any_ Shows and configures the use of all available Kerberos principles.
domain The available <options> are:
<options>
n Disable the use of all available Kerberos principles:
pdp auth kerberos_any_domain disable
n Enable the use of all available Kerberos principles:
pdp auth kerberos_any_domain enable
n Show the current configuration:
pdp auth kerberos_any_domain status
Parameter Description
pdp broker
Description
These commands control the PDP Identity Broker.
Syntax
pdp broker
debug {set | unset} <options>
discard <options>
reconnect <options>
status [-e]
sync <options>
Parameters
Parameter Description
Parameter Description
Parameter Description
Notes:
n For more information about the debug, see "pdp debug"
on page 1591.
n To see the HTTP related issues, run this command to
enable the debug on the Publisher PDP side:
pdp debug set HttpClient all
To see more information for some errors, run this
command:
pdp broker status [-e]
discard <option> Controls the timeout for discarding sessions received from the
specified Publisher PDP during a disconnection.
The available <options> are:
n Show the current timeout:
pdp broker discard show_timeout <IP
Address of Publisher PDP>
n Configure the new timeout (in seconds):
pdp broker discard set_timeout <IP
Address of Publisher PDP> <Timeout>
Parameter Description
status [-e] Shows the status of remote Publisher PDPs and Subscriber
PDPs.
The option "-e" flag adds more information (Subscriber PDP port
and the last error time and description).
pdp conciliation
Description
Controls the session conciliation mechanism.
Syntax
pdp conciliation
adq_single_user <option>
api_multiple_users <option>
idc_multiple_users <option>
rad_multiple_users <option>
Parameters
Parameter Description
adq_single_user Shows and controls the assumption that single AD Query user is
<option> connected on each computer.
The available <options> are:
n Disable this behavior:
pdp conciliation adq_single_user disable
n Enable this behavior:
pdp conciliation adq_single_user enable
n Show the current status (enabled or disabled):
pdp conciliation adq_single_user stat
api_multiple_ Shows and controls the assumption that multiple Web-API users
users <option> are connected on each computer.
The available <options> are:
n Disable this behavior:
pdp conciliation api_multiple_users
disable
n Enable this behavior:
pdp conciliation api_multiple_users
enable
n Show the current status (enabled or disabled):
pdp conciliation api_multiple_users stat
Parameter Description
idc_multiple_ Shows and controls the assumption that multiple Identity Collector
users <option> users are connected on each computer.
The available <options> are:
n Disable this behavior:
pdp conciliation idc_multiple_users
disable
n Enable this behavior:
pdp conciliation idc_multiple_users
enable
n Show the current status (enabled or disabled):
pdp conciliation idc_multiple_users stat
rad_multiple_ Shows and controls the assumption that multiple RADIUS users
users <option> are connected on each computer.
The available <options> are:
n Disable this behavior:
pdp conciliation rad_multiple_users
disable
n Enable this behavior:
pdp conciliation rad_multiple_users
enable
n Show the current status (enabled or disabled):
pdp conciliation rad_multiple_users stat
pdp connections
Description
Shows the PDP connections with PEP gateways, Terminal Servers, and Identity Collectors.
Syntax
pdp connections
idc
pep
ts
Parameters
Parameter Description
pep Shows the connection status of all the PEPs, which the current PDP should
update.
pdp control
Description
Provides commands to control the PDP.
Syntax
pdp control
revoke_ip <IP address>
sync
Parameters
Parameter Description
revoke_ip Logs out the session that is related to the specified IP address.
<IP address>
pdp debug
Description
Controls the debug of the PDP.
Syntax
pdp debug
async1
ccc {off | on}
memory
off
on
reset
rotate
set <Topic Name> <Severity>
spaces [<0 - 5>]
stat
unset <Topic Name>
Parameters
Parameter Description
async1 Tests the async command line with the echo command for 30
seconds.
ccc {off | on} Configures whether to write the CCC debug logs into the PDP log
file - $FWDIR/log/pdpd.elg
n on - Writes the CCC debug logs
n off - Does not write the CCC debug logs
Parameter Description
reset Resets the PDP debug options for Debug Topic and Severity.
Important - After you run this command "pdp debug
reset", you must run the command "pdp debug off" to
turn off the debug.
rotate Rotates the PDP log files - increases the index of each log file:
1. $FWDIR/log/pdpd.elg becomes
$FWDIR/log/pdpd.elg.0
2. $FWDIR/log/pdpd.elg.0 becomes
$FWDIR/log/pdpd.elg.1
3. And so on.
set <Topic Name> Filters which debug logs PDP writes to the log file based on the
<Severity> specified Debug Topics and Severity:
The available Debug Topics are:
n all
n Check Point Support provides more specific topics, based
on the reported issue
The available Severities are:
n all
n critical
n events
n important
n surprise
spaces [<0 - 5>] Shows and configures the number of indentation spaces in the
$FWDIR/log/pdpd.elg file.
You can specify the number of spaces:
n 0 (this is the default)
n 1
n 2
n 3
n 4
n 5
Parameter Description
Important - When you enable the debug, it affects the performance of the pdpd
daemon. Make sure to disable the debug after you complete your troubleshooting.
pdp idc
Description
Operations related to Identity Collector.
Syntax
pdp idc
groups_consolidation <options>
groups_update <options>
muh <options>
service_accounts <options>
status
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Parameters
Parameter Description
Parameter Description
Parameter Description
Parameter Description
pdp idp
Description
Operations related to SAML-based authentication.
Syntax
Parameters
Parameter Description
groups Shows and configures the consolidation of external groups with the fetched
<options> groups.
The available <options> are:
n Configure the authorization behavior for user groups:
pdp idp groups set {only | prefer | union |
ignore}
l only - Considers only groups the Identity Provider sends.
Ignore groups received from configured User Directories.
l prefer -Prefers groups the Identity Provider sends. Considers
pdp ifmap
Description
Controls the Interface to Metadata Access Points (IF-MAP) sessions.
Syntax
pdp ifmap
connect <options>
disconnect <options>
revoke <options>
status <options>
Parameters
Parameter Description
Parameter Description
pdp monitor
Description
Monitors the status of connected PDP sessions.
You can run different queries with the commands below to get the output, in which you are
interested.
Syntax
pdp monitor
all
client_type <Client Type>
cv_ge <Version>
cv_le <Version>
groups <Group Name>
ip <IP address>
machine <Computer Name>
machine_exact
mad
network
s_port
summary
user <Username>
user_exact
Parameters
Parameter Description
client_type Shows all sessions that connect through the specified client type.
<Client Type> Possible client types are:
n "AD Query" - User was identified by the AD Query.
n "Identity Agent" - User or computer was identified by an
Identity Awareness Agent.
n portal - User was identified by the Captive Portal.
n unknown - User was identified by an unknown source.
cv_ge Shows all sessions that are connected with a client version that is
<Version> higher than (or equal to) the specified version.
Parameter Description
cv_le Shows all sessions that are connected through a client version that is
<Version> lower than (or equal to) the specified version.
groups <Group Shows all sessions of users or computers that are members of the
Name> specified group.
s_port Shows sessions filtered by the assigned source port (MUH sessions
only).
pdp muh
Description
Shows Multi-User Hosts (MUHs).
Syntax
pdp nested_groups
Description
Configures the Security Gateway queries LDAP Nested Groups.
Shows the current configuration LDAP Nested Group queries.
Syntax
pdp nested_groups
auto_tune {enable | disable}
clear
depth <options>
disable
enable
show
status
__set_state <options>
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Parameters
Parameter Description
auto_tune Note - This feature is available only in the R80.40 Jumbo Hotfix
{enable | Accumulator Take 119 and higher.
disable} Enables and disables the auto-tune feature.
This feature calculates and automatically selects the state of Nested
Groups based on the LDAP configuration on the Security Gateway and the
Management Server.
Notes:
n When you enable this feature, the Security Gateway
automatically configures the best the state of Nested Groups it
calculated.
n When you disable this feature, the Security Gateway
automatically returns to the state of Nested Groups you
configured earlier with the "__set_state" parameter.
Best Practice - Enable this feature on the Policy Decision Point (PDP)
to increase the performance.
clear Clears the list of users, for which the depth was not enough.
depth <1 - Configures the nested groups depth (between 1 and 40).
40>
show Shows a list of users, for which the depth was not enough.
Parameter Description
includes all groups for the specified user, including the nesting
levels. The response includes all groups for the given user,
including nesting levels. This query shows groups from any
branch in the Active Directory forest. This type of query are sent
to the Global Catalog ports (TCP 3268 or 3269).
l We recommend this method for environments that have a policy
includes all groups for the specified user, including the nesting
levels. This query shows groups from the branch specified in
the LDAP account unit. This type of query can work over all
LDAP ports (TCP 3268 or 3269, TCP 389 or 636).
l Use this state if you work with a single branch on each account
unit.
Note - This state "4" is available only in the R80.40 Jumbo Hotfix
Accumulator Take 91 and higher.
pdp network
Description
Shows information about network related features.
Syntax
Parameters
Parameter Description
pdp radius
Description
Shows and configures the RADIUS accounting options.
Syntax
pdp radius
ip
reset
set <options>
groups
fetch <options>
reset
set <options>
parser
reset
set <options>
roles
fetch <options>
reset
set <options>
status
Parameters
Parameter Description
Parameter Description
Parameter Description
pdp roles
General Syntax
pdp roles
extract
fetch <options>
Description
Extracts and shows the roles from the file $FWDIR/tmp/roles_command_output.txt that
was created with the "pdp roles fetch" command.
Syntax
Description
Fetches the roles that match the provided Access Role information and saves the output in the
$FWDIR/tmp/roles_command_output.txt file.
Syntax
Parameters
Parameter Description
Parameter Description
pdp status
Description
Shows PDP status information, such as start time or configuration time.
Syntax
Parameters
Parameter Description
pdp tasks_manager
Description
Shows the status of the PDP tasks (current running, previous, and pending tasks).
Syntax
Parameters
Parameter Description
pdp timers
Description
Shows PDP timers information for each PDP session.
Syntax
Parameters
Parameter Description
pdp topology_map
Description
Shows topology of all PDP and PEP addresses.
Syntax
pdp topology_map
pdp tracker
Description
During the PDP debug, adds the TRACKER debug topic to the PDP logs (this is enabled by
default).
This is very useful when you monitor the PDP-to-PEP identity sharing and other
communication in distributed environments.
You can set this manually if you add the TRACKER topic to the PDP debug.
Syntax
Parameters
Parameter Description
pdp update
Description
Initiates a recalculation of group membership for all users and computers.
Syntax
Parameters
Parameter Description
pdp vpn
Description
Shows the connected VPN gateways that send VPN Remote Access Client identity data.
Syntax
Parameters
Parameter Description
pep
Description
Provides commands to control and monitor the PEPD process (see below for options).
Syntax
Commands
Command Description
tracker <parameter> During the PEP debug, adds the TRACKER debug topic to
the PEP logs.
See "pep tracker" on page 1628.
pep control
Description
Provides commands to control the PEP.
Syntax
pep control
extended_info_storage <options>
portal_dual_stack <options>
tasks_manager status <options>
Parameters
Parameter Description
portal_dual_stack Controls the support for portal dual stack (IPv4 and IPv6).
<options> The available <options> are:
n disable - Disables the support.
n enable - Enables the support.
pep debug
Description
Controls the debug of the PEP.
Syntax
pep debug
memory
off
on
reset
rotate
set <options>
spaces [<options>]
stat
unset <options>
Parameters
Parameter Description
reset Resets the PEP debug options for Debug Topics and Severities.
Important - After you run this command "pep debug
reset ...", you must run the command "pep debug
off" to turn off the debug.
rotate Rotates the PEP log files - increases the index of each log file:
n $FWDIR/log/pepd.elg becomes
$FWDIR/log/pepd.elg.0,
n $FWDIR/log/pepd.elg.0 becomes
$FWDIR/log/pepd.elg.1
n And so on.
Parameter Description
set <Topic Name> Filters which debug logs PEP writes to the log file based on the
<Severity> specified Debug Topics and Severity.
Available Debug Topics are:
n all
n Check Point Support provides more specific topics, based
on the reported issue
Available Severities are:
n all
n critical
n events
n important
n surprise
Important - When you enable the debug, it affects the performance of the pepd
daemon. Make sure to turn off the debug after you complete your troubleshooting.
pep show
Description
Shows information about PEP.
Syntax
pep show
conciliation_clashes
all
clear
ip <Session IP Address>
network
pdp
registration
pdp
all
id <ID of PDP>
stat
topology_map
user
all
query
cid <IP[,ID]>
cmp <Compliance>
mchn <Computer Name>
mgrp <Group>
pdp <IP[,ID]>
role <Identity Role>
ugrp <Group>
uid <UID String>
usr <Username>
Parameters
Parameter Description
pdp <options> Shows the communication channel between the PEP and the
PDP.
Available <options> are:
n all - Shows all connected PDPs.
n id - Shows the information for the specified PDP.
stat Shows the last time the pepd daemon was started and the last
time a policy was received.
Important - Each time the pepd daemon starts, it loads the
policy and the two timers. The times between the pepd
daemon start and when it fetched the policy are very close.
Parameter Description
specified compliance.
l mchn <Computer Name> - Matches entries with
machine group.
l pdp <IP[,ID]> - Matches entries, which the
user group.
l uid <UID String> - Matches entries with the
specified username.
Note - You can use multiple query filters at the same
time to create a logical AND correlation between
them.
For example, to show all users that have a sub-string
of "jo" AND are part of the user group "Employees"
you can use this query syntax:
# pep show user query usr jo ugrp
Employees
pep tracker
Description
During the PEP debug, adds the TRACKER debug topic to the PEP logs (this is enabled by
default).
This is very useful when you monitor the PDP-to-PEP identity sharing and other
communication in distributed environments.
You can set this manually if you add the TRACKER topic to the PEP debug.
Syntax
Parameters
Parameter Description
test_ad_connectivity
Description
This utility runs connectivity tests from the Security Gateway to an AD domain controller.
You can define the parameters for this utility in one of these ways:
n In the command line as specified below
n In the $FWDIR/conf/test_ad_connectivity.conf configuration file.
Parameters you define in the $FWDIR/conf/test_ad_connectivity.conf file
cannot contain white spaces and cannot be within quotation marks.
Important:
n Parameters you define in the command line override the parameters you define
in the configuration file.
n This utility saves its output in the file you specify with the -o parameter.
In addition, examine the $FWDIR/log/test_ad_connectivity.elg file.
Syntax
[Expert@HostName:0]# $FWDIR/bin/test_ad_connectivity -h
[Expert@HostName:0]# $FWDIR/bin/test_ad_connectivity <Parameter_1
Value_1> <Parameter Value_2> ... <Parameter_N Value_N>
...<Parameters And Options>
Parameters
Mandatory /
Parameter Description
Optional
Mandatory /
Parameter Description
Optional
-D <User DN> Mandatory Overrides the LDAP user DN (the utility does not try to
figure out the DN automatically).
Mandatory /
Parameter Description
Optional
-L <Timeout> Optional Specifies the timeout (in milliseconds) for the LDAP
test only.
If this timeout expires, and the LDAP test still runs,
then both LDAP connectivity and WMI connectivity
tests fail.
-t <Timeout> Optional Specifies the total timeout (in milliseconds) for both
LDAP connectivity and WMI connectivity tests.
Example
IPv4 of AD 192.168.230.240
DC
Domain mydc.local
Username Administrator
Password aaaa
Note - In order to know the output is authentic, pay attention that the timestamp is the
same as the local time.
VPN Commands
VPN commands generate status information regarding VPN processes, or are used to stop
and start specific VPN services.
All VPN commands are executed on the Security Gateway and Cluster Members.
For more information about VPN, see the:
n R80.40 Site to Site VPN Administration Guide.
n R81 Remote Access VPN Administration Guide.
vpn
Description
Configures VPN settings.
Shows VPN information.
Syntax
vpn
check_ttm
compreset
compstat
crl_zap
crlview
debug
dll
drv
dump_psk
ipafile_check
ipafile_users_capacity
macutil
mep_refresh
neo_proto
nssm_topology
overlap_encdom
rim_cleanup
rll
set_slim_server
set_snx_encdom_groups
set_trac
shell
show_tcpt
sw_topology
{tunnelutil | tu}
ver
Parameters
Parameter Description
crl_zap Erases all Certificate Revocation Lists (CRLs) from the cache.
See "vpn crl_zap" on page 1640.
macutil Shows a generated MAC address for each user name when you use
Remote Access VPN with Office Mode.
See "vpn macutil" on page 1651.
Parameter Description
set_slim_ Deprecated.
server See "vpn set_slim_server" on page 1659.
set_snx_ Controls the encryption domain per usergroup feature for SSL
encdom_groups Network Extender.
See "vpn set_snx_encdom_groups" on page 1660.
ver Shows the major version number and build number of the VPN kernel
module.
See "vpn ver" on page 1681.
vpn check_ttm
Description
Makes sure the specified TTM file contains valid syntax.
Syntax
Parameters
Parameter Description
<Path to TTM file> Specifies the full path and name of the TTM file.
Example
[Expert@MyGW:0]#
vpn compreset
Description
Resets compression and decompression statistics counters.
Syntax
vpn compreset
Example
vpn compstat
Description
Shows compression and decompression statistics counters.
Syntax
vpn compstat
Example
Compression:
============
Bytes before compression : 0
Bytes after compression : 0
Compression overhead (bytes) : 0
Bytes that were not compressed : 0
Compressed packets : 0
Packets that were not compressed : 0
Compression errors : 0
Decompression:
==============
Bytes before decompression : 0
Bytes after decompression : 0
Decompression overhead (bytes) : 0
Decompressed packets : 0
Decompression errors : 0
Pure decompression ratio : 0.000000
[Expert@MyGW:0]#
vpn crl_zap
Description
Erases all Certificate Revocation Lists (CRLs) from the cache.
Syntax
vpn crl_zap
Return Values
n 0 (zero) for success
n any other value for failure
vpn crlview
Description
Retrieves the Certificate Revocation List (CRL) from various distribution points and shows it for
the user.
Syntax
Parameters
Parameter Description
-obj <Network Object Name> Specifies the name of the CA network object.
-f <Certificate File> Specifies the path and the name of the certificate
file.
Return Values
n 0 (zero) for success
n any other value for failure
Example 1
vpn crlview -obj <MyCA> -cert <MyCert>
1. The VPN daemon contacts the Certificate Authority called MyCA and locates the
certificate called MyCert.
2. The VPN daemon extracts the certificate distribution point from the certificate.
3. The VPN daemon goes to the distribution point and retrieves the CRL. The distribution
point can be an LDAP or HTTP server.
4. The VPN daemon shows it to the standard output.
Example 2
vpn crlview -f /var/log/MyCert
1. The VPN daemon extracts the certificate distribution point from the certificate file called
MyCert.
2. The VPN daemon goes to the distribution point and retrieves the CRL. The distribution
point can be an LDAP or HTTP server.
3. The VPN daemon shows the CRL to the standard output.
Example 3
vpn crlview -view <Lastest CRL>
If the CRL was retrieved in the past, this command instructs the VPN daemon to show the
contents to the standard output.
vpn debug
Description
Instructs the VPN daemon vpnd to write debug messages to the $FWDIR/log/vpnd.elg*
and $FWDIR/log/ike.elg* log files.
Debugging of the VPN daemon takes place according to Debug Topics and Debug Levels:
n A Debug Topic is a specific area, on which to perform debugging.
For example, if the Debug Topic is LDAP, all traffic between the VPN daemon and the
LDAP server is written to the log file.
Check Point Support provides the specific Debug Topics when needed.
n Debug Levels range from 1 (least informative) to 5 (most informative - write all debug
messages).
For more information, see sk180488.
Syntax
vpn debug
on [<Debug_Topic>=<Debug_Level>]
off
ikeon [-s <Size_in_MB>]
ikeoff
trunc [<Debug_Topic>=<Debug_Level>]
truncon [<Debug_Topic>=<Debug_Level>]
truncoff
timeon [<Seconds>]
timeoff
ikefail [-s <Size_in_MB>]
mon
moff
say ["String"]
tunnel [<Level>]
Parameters
Parameter Description
Parameter Description
Parameter Description
timeoff Disables the timestamp in the log files every number of seconds.
Return Values
n 0 (zero) for success
n any other value for failure (typically, -1 or 1)
vpn dll
Description
Works with VPN DNS Lookup Layer:
n Save the DNS Lookup Layer information to the specified file.
n Resolve the specified hostname.
Syntax
vpn dll
dump <File>
resolve <HostName>
Parameters
Parameter Description
dump <File> Saves the DNS Lookup Layer information (DNS Names and IP
Addresses) to the specified file.
vpn drv
Description
Controls the VPN kernel module.
Syntax
Parameters
Parameter Description
Example
vpn dump_psk
Description
Shows hash (SHA256) of peers' pre-shared-keys.
Syntax
vpn dump_psk
vpn ipafile_check
Description
Verifies a candidate for the $FWDIR/conf/ipassignment.conf file.
Syntax
Parameters
Parameter Description
<File> Specifies the full path and name of the candidate file.
{err | warn | Specifies the how much information to show about the
detail} candidate file:
n err - Only errors
n warn - Only warnings
n detail - All details
vpn ipafile_users_capacity
Description
n Shows the current capacity in the $FWDIR/conf/ipassignment.conf file.
n Configures the new capacity in the $FWDIR/conf/ipassignment.conf file.
Syntax
Parameters
Parameter Description
set <128-32768> Configures the new capacity to the specified number of users.
Notes:
n The default is 1024 entries.
n This command configures the amount of memory
reserved to store usernames.
Example
vpn macutil
Description
Shows a generated MAC address for each user name when you use Remote Access VPN with
Office Mode.
This command is applicable only when allocating IP addresses through DHCP.
Remote Access VPN users in Office Mode receive an IP address, which is mapped to a
hardware or MAC address.
Syntax
Example
# vpn macutil John
20-0C-EB-26-80-7D, "John"
vpn mep_refresh
Description
Initiates MEP re-decision.
Used in "backup stickiness" configuration to initiate MEP re-decision (fail back to primary
Security Gateway, if possible).
Syntax
vpn mep_refresh
vpn neo_proto
Description
Controls the NEO client protocol.
Syntax
Parameters
Parameter Description
vpn nssm_toplogy
Description
Generates and uploads a topology in NSSM format to an NSSM server.
Syntax
Parameters
Parameter Description
-dn <"dn"> Distinguished Name of the NSSM server (needed to establish an SSL
connection).
-action Specifies the action that the Symbian client should take, if the packet is
{bypass | not destined for an IP address in the VPN domain.
drop} Bypass is the default.
vpn overlap_encdom
Description
Shows all overlapping VPN domains.
Some IP addresses might belong to two or more VPN domains.
The command alerts for overlapping encryption domains if one or both of the following
conditions exist:
n The same VPN domain is defined for both Security Gateways.
n If the Security Gateway has multiple interfaces, and one or more of the interfaces has the
same IP address and netmask.
Syntax
Parameters
Parameter Description
communities Shows all pairs of objects with overlapping VPN domains, only if the
objects (that represent VPN sites) are included in the same VPN
community.
This parameter is also used, if the same destination IP can be reached
through more than one VPN community.
Example
The objects Paris and Chicago have overlapping encryption domains. The overlapping domain is:
10.8.8.1 - 10.8.8.1
- Same destination address can be reached in more than one community (MyIntranet, NewStar). This
configuration is not supported.
vpn rim_cleanup
Description
Cleans RIM routes.
Syntax
vpn rim_cleanup
vpn rll
Description
Controls the VPN Route Lookup Layer:
n Saves the Route Lookup Layer information to the specified file.
n Synchronizes the routing table.
Syntax
vpn rll
dump <File>
sync
Parameters
Parameter Description
dump <File> Saves the Route Lookup Layer information to the specified file:
n ISP Redundancy Default Routes (Next Hop, Interface,
Metric)
n Route Shadow (Interface and Metric, IP/Mask, Next Hop)
n Monitored IP Addresses (Data, IP/Mask)
vpn set_slim_server
Description
This command is deprecated.
Delete the $FWDIR/conf/slim.conf file and use the Management Server to configure SSL
Network Extender.
As long as the $FWDIR/conf/slim.conf file exists, it overrides the settings you configure
on the Management Server.
vpn set_snx_encdom_groups
Description
Controls the encryption domain per usergroup feature for SSL Network Extender.
Syntax
vpn set_snx_encdom_groups
off
on
Parameters
Parameter Description
vpn set_trac
Description
Controls the TRAC server.
Syntax
vpn set_trac
disable
enable
Parameters
Parameter Description
Example
vpn shell
Description
VPN Command Line Interface.
vpn shell
vpn6 shell
Menu Options
Menu Sub-Options
interface
add
modify
delete
show
show
interface
tunnels
IKE
all
peer <Internal Peer IP>
IPsec
all
peer <Internal Peer IP>
tunnels
show
IKE
all
peer <Internal Peer IP>
IPsec
all
peer <Internal Peer IP>
delete
IKE
peer <Security Gateway>
user <Username>
all
IPsec
peer <Security Gateway>
user <Username>
all
all
IKE
IPsec
license
scm
status
list
Option Description
quit Quits the VPN shell (available only in the main level).
Option Description
Option Description
Option Description
Option Description
vpn show_tcpt
Description
Shows users connected in Visitor Mode.
Syntax
vpn show_tcpt
vpn sw_topology
Note - R80.40 does not support UTM-1 Edge and Safe@Office devices. The
information about this command is provided only to describe the existing syntax
option until it is removed completely.
Description
Downloads the topology for a UTM-1 Edge or Safe@Office device.
Syntax
Parameters
Parameter Description
-profile Name of the UTM-1 Edge or Safe@Office profile, for which the
<profile> topology is created.
vpn tu
Description
Launches the TunnelUtil tool, which is used to control VPN tunnels.
General Syntax
vpn tu
vpn tunnelutil
Menu Options
[Expert@MyGW:0]# vpn tu
(Q) Quit
*******************************************
Note - When you view Security Associations for a specific VPN peer, you must
specify the IP address in dotted decimal notation.
Advanced Syntax
vpn tu
help
del <options>
list <options>
mstats
tlist <options>
Parameters
Parameter Description
vpn tu del
Description
Deletes IPsec Security Associations (SAs) and IKE Security Associations (SAs).
Parameters
Parameter Description
all Deletes all IPsec SAs and IKE SAs for all VPN peers and users.
Note - This command is the same as:
n In the main "vpn tu" on page 1671 menu, the option (0)
Delete all IPsec+IKE SAs for ALL peers and users.
n In the "vpn shell" on page 1662 menu, the option
tunnels > delete > all > IKE and the option tunnels >
delete > all > IPsec..
Parameter Description
n Delete all IPsec SAs for the specified VPN peer and the
specified user:
vpn tu [-w] del ipsec <IPv4 Address>
<Username>
Notes:
l This command is the same as:
<IP Address> Deletes all IPsec SAs and IKE SAs for the specified VPN peer.
Note - This command is the same as the option (7) Delete
all IPsec+IKE SAs for a given peer (GW) in the main "vpn
tu" on page 1671 menu.
Parameter Description
<IP Address> Deletes all IPsec SAs and IKE SAs for the specified VPN peer
<Username> and the specified user.
Note - This command is the same as the option (8) Delete
all IPsec+IKE SAs for a given User (Client) in the main
"vpn tu" on page 1671 menu.
vpn tu list
Description
Shows IPsec SAs and IKE SAs.
Parameters
Parameter Description
Parameter Description
peer_ike <IP Address> Shows all IKE SAs for the specified VPN peer.
Note - This command is the same as:
n In the main "vpn tu" on page 1671 menu, the
option (3) List all IKE SAs for a given peer
(GW).
n In the "vpn shell" on page 1662 menu, the
option show > tunnels > IKE > peer <Internal
Peer IP> or the option tunnels > show > IKE
> peer <Internal Peer IP>.
peer_ipsec <IP Address> Shows all IPsec SAs for the specified VPN peer.
Note - This command is the same as:
n In the main "vpn tu" on page 1671 menu, the
option (4) List all IPsec SAs for a given peer
(GW).
n In the "vpn shell" on page 1662 menu, the
option show > tunnels > IPsec > peer
<Internal Peer IP> or the option tunnels >
show > IPsec > peer <Internal Peer IP>.
vpn tu mstats
Description
Shows the distribution of VPN traffic between CoreXL Firewall instances.
For more information, see sk118097 - MultiCore Support for IPsec VPN in R80.10 and above.
Parameters
Item Description
[Expert@MyGW:0]#
[Expert@MyGW:0]#
vpn tu tlist
Description
Shows information about VPN tunnels.
Parameters
Parameter Description
Parameter Description
vpn ver
Description
Shows the major version number and build number of the VPN kernel module.
Syntax
Parameters
Parameter Description
-k Shows the version name and build number and the kernel build number.
Example
mcc
Description
The VPN Multi-Certificate CA (MCC) commands let you manage certificates and Certificate
Authorities on a Security Management Server or Domain Management Server:
n Shows Certificate Authorities
n Shows certificates
n Adds certificates
n Deletes certificates
Important:
n Before you run this command, you must close all SmartConsole clients,
Database Tool (GuiDBEdit Tool) clients (see sk13009), and "dbedit" clients
(see skI3301) to prevent a lock of the management database. The only
exceptions are the "mcc lca" and "mcc show" commands.
n The mcc commands require the cpca process to be up and running. Run this
command:
ps auxw | egrep "cpca|COMMAND"
n On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Syntax
mcc
-h
add <options>
add2main <options>
del <options>
lca
main2add <options>
show <options>
Parameters
Parameter Description
Parameter Description
mcc add
Description
Adds a certificate stored in DER format in a specified file, as an additional certificate to the
specified CA. The new certificate receives an index number higher by one than the highest
existing certificate index number.
The new certificate receives an index number higher by one than the highest existing
certificate index number.
Syntax
Parameters
Parameter Description
<CA Name> Specifies the name of the CA, as defined in the Management Server
database.
<Certificate Specifies the path and the name of the certificate file.
File> To show the main certificate of a CA, omit this parameter.
Example - Add the certificate stored in the /var/log/Mycert.cer file to the CA called
"MyCA"
mcc add MyCA /var/log/Mycert.cer
mcc add2main
Description
Copies the additional certificate of the specified index number of the specified CA to the main
position and overwrites the previous main certificate.
Syntax
Parameters
Parameter Description
<CA Name> Specifies the name of the CA, as defined in the Management
Server database.
mcc del
Description
Removes the additional certificate of the specified index number from the specified CA.
Greater index numbers (of other additional certificates) are reduced by one.
Syntax
Parameters
Parameter Description
<CA Name> Specifies the name of the CA, as defined in the Management
Server database.
mcc lca
Description
Shows all Certificate Authorities (CAs) defined in the Management Server database, with the
number of additional CA certificates for each CA.
Syntax
mcc lca
Note
On a Multi-Domain Server, you must run this command in the context of the
applicable Domain Management Server:
mdsenv <IP Address or Name of Domain Management Server>
Example
mcc main2add
Description
Copies the main certificate of the specified CA to an additional position.
The copied certificate receives an index number higher by one than the highest existing
certificate index number.
Syntax
Parameters
Parameter Description
<CA Name> Specifies the name of the CA, as defined in the Management Server
database.
Example
The CA called "MyCA" has a main certificate and one additional certificate.
If you run this command, then the CA will have two additional certificates, and additional
certificate #2 will be identical to the main certificate:
mcc main2add MyCA
mcc show
Description
Shows details for a specified certificate of a specified CA.
Syntax
Parameters
Parameter Description
<CA Name> Specifies the name of the CA, as defined in the Management
Server database.
[Expert@MGMT:0]#
admin_wizard
Description
Runs the administration client wizard to test connectivity to websites, Exchange server
services, or LDAP server.
Syntax
admin_wizard
cancel
estimation
exchange_wizard <Exchange Server Address> <User Name>
<Password> [<Options>]
ldap <LDAP server>
wizard <Web Site Address>
Parameters
Parameter Description
Parameter Description
Parameter Description
(default)
l as - Tests ActiveSync
Parameter Description
Example 3 - Check accessibility for username 'user1' to ActiveSync and EWS on the
Exchange server 'exchange.example.com'
cvpnd_admin
Description
Changes the behavior of the Mobile Access cvpnd process.
Syntax
cvpnd_admin
appMonitor status
clear_kernel_tables
clear_portal_cache
debug <options>
ics_update
isEnabled
license <options>
policy [{graceful | hard}]
revoke <Certificate Serial Number>
Parameters
Parameter Description
clear_portal_ Clears the cache for the applications presented in the Mobile
cache Access Portal for all open sessions.
Parameter Description
debug set Enables all cvpnd debug output for the running cvpnd process.
TDERROR_ALL_ The output is in the $CVPNDIR/log/cvpnd.elg file.
ALL=5 Note - When you enable all debug topics, it might impact the
performance. Debug topics are provided by Check Point
Support.
Important:
n The TraceLogger feature has a major effect on
performance, because all traffic is saved as files.
n The TraceLogger feature uses a lot of disk space,
because all traffic is saved as files. After a maximum
number of files is saved, the oldest files are removed
from the disk, which also has a performance cost.
n The TraceLogger feature creates a security concern:
end-user passwords that are sent to internal resources
might appear in the capture files.
ics_update Updates the Mobile Access services after you published a new
ICS update.
Parameter Description
cvpnd_settings
Description
Changes a Mobile Access Gateway local configuration file $CVPNDIR/conf/cvpnd.C.
The cvpnd_settings commands allow to get attribute values or set them in order to
configure the cvpnd process.
Important - Changes made by with the cvpnd_settings command are not saved
during the Mobile Access Gateway upgrade. Keep a backup of your
$CVPNDIR/conf/cvpnd.C file after you make manual changes.
Warning - The cvpnd process may not start, if you make a mistake in the syntax -
attribute names or their values.
General Syntax
Parameters
Run this command to see the full explanation of the parameters: cvpnd_settings -h
Parameter Description
<Configuration Specifies the path and the name of configuration file to change.
File>
Parameter Description
Examples 3 - Empty the value of the attribute 'myFlag', or create a new attribute/list
'myFlag'
cvpnd_settings set myFlag
Examples 4 - Add the attribute 'myFlag' with the value 'a.example.com' to a list
cvpnd_settings listAdd myFlag a.example.com
cvpn_ver
Description
Shows the version of the Mobile Access Software Blade.
Best Practice - Run the "fw ver -k" command to get all version details (see "fw
ver" on page 1168).
Syntax
cvpn_ver
Example
[Expert@MyGW:0]# cvpn_ver
This is Check Point Mobile Access R80.40 - Build 123
[Expert@MyGW:0]#
cvpnrestart
Description
Restarts all Mobile Access blade services.
Warning - While this command does not terminate sessions, it closes all TCP
connections. End-users might lose their work.
Syntax
cvpnrestart [--with-pinger]
Parameters
Parameter Description
--with- Restarts the Pinger service, responsible for ActiveSync and Outlook Web
pinger Access push mail notifications.
cvpnstart
Description
Starts all Mobile Access blade services, after you stopped them with the "cvpnstop" on
page 1704 command.
Syntax
cvpnstart
cvpnstop
Description
Stops all Mobile Access blade services.
Warning - While this command does not terminate sessions, it closes all TCP
connections. End-users might lose their work.
Syntax
cvpnstop
deleteUserSettings
Description
Deletes all persistent settings (favorites, cookies, credentials) of one or more end-users.
Syntax
Parameters
Parameter Description
fwpush
Description
Sends command interrupts to the fwpushd process on the Mobile Access Gateway.
Note - Users get the push notifications only while they are logged in.
Syntax
fwpush
debug <options>
del <options>
info
print
send <options>
unsub <options>
Parameters
Parameter Description
debug {off | on | reset | set all all Controls the debug of the Mobile
| stat} Access Push Notifications daemon.
For more information, see sk109039.
Parameter Description
Parameter Description
UserSettingsUtil show_exchange_registered_users
Example output:
Notes:
n To use the "<Token>" parameter in the "fwpush" commands, use the value of
the Push Token attribute.
In the above example:
xxxxxxxxxxxxx65b48e424023ebxxxxxxxxca22ea788cfb3cxxxxxxxxxx
n To use the "<Username>" parameter in the "fwpush" commands, use the value
of the CN attribute.
In the above example: JohnD
n To use the "<User-UID>" parameter in the "fwpush" commands, use the value
of the User Settings id attribute.
In the above example: c4b6c6fbb0c4xxxxxxxx265e93e0e372
Example
[Expert@MyGW:0]# fwpush send -uid JohnD -msg "Hello - push"
ics_updates_script
Description
Manually starts an Endpoint Security on Demand (ESOD) update on the Mobile Access
Gateway.
For more information, see the contents of the $CVPNDIR/bin/ics_updates_script file.
Syntax
Parameters
Parameter Description
<Path to Local ICS Updates Specifies the full path to the local ICS Updates
Package> package.
Do not specify the name of the ICS Updates
package.
Notes
n Usually, it is not necessary to run this command, and you start the ESOD updates from
SmartConsole:
1. Connect with SmartConsole to the Management Server.
2. From the left navigation panel, click Manage & Settings.
3. In the Mobile Access section, click Configure in SmartDashboard.
The SmartDashboard opens on the Mobile Access tab.
4. From the left tree, click Endpoint Security on Demand > Endpoint Compliance
Updates.
listusers
Description
Shows a list of end-users connected to the Mobile Access Gateway, along with their source IP
addresses.
Syntax
listusers
Example
[Expert@MyGW:0]# listusers
------------------------------
UserName | IP
------------------------------
Tom , 192.168.0.51
John , 192.168.0.130
Jane , 192.168.0.7
[Expert@MyGW:0]#
rehash_ca_bundle
Description
Imports all of the Certificate Authority (CA) files from the $CVPNDIR/var/ssl/ca-bundle/
directory into the Mobile Access trusted CA bundle.
The trusted CA bundle is used when the Mobile Access Gateway accesses an internal server
(such as OWA) through HTTPS.
If the SSL server certificate of the internal server is not trusted by the Mobile Access Gateway,
the Mobile Access Gateway responds based on the settings for the Internal Web Server
Verification feature. The default setting is Monitor.
To accept certificates from a specified server, add its server certificate CA to the CA bundle.
Syntax
rehash_ca_bundle
Example
[Expert@MyGW:0]# rehash_ca_bundle
Doing /opt/CPcvpn-R80.40/var/ssl/ca-bundle/
AC_Ra__z_Certic__mara_S.A..pem => 6f2c1157.0
AOL_Time_Warner_Root_Certification_Authority_1.pem => ed9bb25c.0
... ... ...
beTRUSTed_Root_CA_-_RSA_Implementation.pem => 16b3fe3c.0
thawte_Primary_Root_CA.pem => 2e4eed3c.0
[Expert@MyGW:0]#
UserSettingsUtil
Description
Shows details of users connected to the Mobile Access Gateway.
Syntax
Parameters
Parameter Description
dlpcmd
Description
Control the Data Loss Prevention Engine on Security Gateway.
dlpcmd [-s]
action_by_admin <options>
getquarantined
getquarantinedcount
getquarantinedsize
ramdisk <options>
Parameters
Parameter Description
Notes:
n You must enclose the email ID in curly brackets
{}.
n You can see this action in Audit Logs in
SmartConsole. For example, see sk117753.
Example
VSX Commands
For more information about VSX, see the R80.40 VSX Administration Guide.
cpconfig
Description
This command starts the Check Point Configuration Tool.
This tool configures specific settings for the installed Check Point products.
Important - In a Cluster, you must configure all the Cluster Members in the same way.
Syntax
cpconfig
Menu Options
Note - The options shown depend on the configuration and installed products.
Licenses and contracts Manages Check Point licenses and contracts on this
Security Gateway or Cluster Member.
Enable cluster membership Enables the cluster membership on the Security Gateway.
for this gateway This change requires a reboot of the Security Gateway.
For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Disable cluster membership Disables the cluster membership on the Security Gateway.
for this gateway This change requires a reboot of the Security Gateway.
For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Enable Check Point Per Enables Virtual System Load Sharing on the VSX Cluster
Virtual System State Member.
For more information, see the R80.40 VSX Administration
Guide.
Disable Check Point Per Disables Virtual System Load Sharing on the VSX Cluster
Virtual System State Member.
For more information, see the R80.40 VSX Administration
Guide.
Enable Check Point Enables Check Point ClusterXL for Bridge mode.
ClusterXL for Bridge This change requires a reboot of the Cluster Member.
Active/Standby For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Disable Check Point Disables Check Point ClusterXL for Bridge mode.
ClusterXL for Bridge This change requires a reboot of the Cluster Member.
Active/Standby For more information, see the:
n R80.40 Installation and Upgrade Guide.
n R80.40 ClusterXL Administration Guide.
Automatic start of Check Shows and controls which of the installed Check Point
Point Products products start automatically during boot.
[Expert@MySingleGW:0]# cpconfig
This program will let you re-configure
your Check Point products configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) SNMP Extension
(3) PKCS#11 Token
(4) Random Pool
(5) Secure Internal Communication
(6) Enable cluster membership for this gateway
(7) Check Point CoreXL
(8) Automatic start of Check Point Products
(9) Exit
[Expert@MyClusterMember:0]# cpconfig
This program will let you re-configure
your Check Point products configuration.
Configuration Options:
----------------------
(1) Licenses and contracts
(2) SNMP Extension
(3) PKCS#11 Token
(4) Random Pool
(5) Secure Internal Communication
(6) Disable cluster membership for this gateway
(7) Enable Check Point Per Virtual System State
(8) Enable Check Point ClusterXL for Bridge Active/Standby
(9) Check Point CoreXL
(10) Automatic start of Check Point Products
(11) Exit
cpview
Overview of CPView
Description
CPView is a text based built-in utility on a Check Point computer.
CPView Utility shows statistical data that contain both general system information (CPU,
Memory, Disk space) and information for different Software Blades (only on Security
Gateway).
The CPView continuously updates the data in easy to access views.
On Security Gateway, you can use this statistical data to monitor the performance.
For more information, see sk101878.
Syntax
cpview --help
Section Description
Header This view shows the time the statistics in the third view are collected.
It updates when you refresh the statistics.
Navigation This menu bar is interactive. Move between menus with the arrow keys and
mouse.
A menu can have sub-menus and they show under the menu bar.
Using CPView
Use these keys to navigate the CPView:
Key Description
Q Quits CPView.
Key Description
Use these keys to save statistics, show help, and refresh statistics:
Key Description
C Saves the current page to a file. The file name format is:
cpview_<ID of the cpview process>.cap<Number of the
capture>
vsenv
Description
Changes the shell's current context to the specified Virtual Device.
Syntax
Parameters
Parameter Description
Note - To see the configured Virtual Devices, run the "vsx stat -v" command.
[Expert@MyVsxGW:0]# vsenv
Context is set to Virtual Device VSX2_192.168.3.242 (ID 0).
[Expert@MyVsxGW:0]#
[Expert@MyVsxGW:0]# vsenv 2
Context is set to Virtual Device VS2 (ID 2).
[Expert@MyVsxGW:2]#
vsx
Description
n Shows VSX configuration.
n Fetches VSX configuration.
n Shows and configures Memory Resource Control.
Syntax
vsx
fetch <options>
fetch_all_cluster_policies
fetchvs <options>
get
mstat <options>
resctrl
showncs <options>
sicreset
stat <options>
unloadall
vspurge
Parameters
Parameter Description
fetch_all_cluster_ Fetches security policy for all Virtual Systems and Virtual
policies Routers from cluster peers.
See "vsx fetch_all_cluster_policies" on page 1732.
Parameter Description
resctrl From R80.40, the CPU Resource Control is integrated into the
CPView utility.
1. Go to the context of Virtual System 0:
n In the Expert mode:
vsenv
n In Gaia Clish:
set virtual-system 0
2. Run the CPView:
cpview
See "cpview" on page 1724.
3. From the top, click:
Advanced > VSX > VSs > Physical-Resources
Notes:
n This tab shows the CPU consumption by
Gateway.
l The processes of the Virtual System
Parameter Description
showncs <options> Shows Check Point Network Configuration Script (NCS) for
Virtual Device.
See "vsx showncs" on page 1739.
sicreset Resets SIC for Virtual System or Virtual Router in the current
VSX context.
See "vsx sicreset" on page 1740.
unloadall Unloads security policy for all Virtual Systems and Virtual
Routers.
See "vsx unloadall" on page 1744.
vsx fetch
Description
Fetches the most current configuration files from the Security Management Server or Main
Domain Management Server, and applies it to the VSX Gateway.
Syntax
Parameters
Parameter Description
Parameter Description
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
Example
vsx fetch_all_cluster_policies
Description
Fetches security policy for all Virtual Systems and Virtual Routers from cluster peers.
Syntax
Parameters
Parameter Description
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
vsx fetchvs
Description
Fetches configuration file for the specified Virtual Device based on information stored locally
on the VSX Gateway.
Syntax
Parameters
Parameter Description
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
Example
[Expert@MyVsxGW:0]# vsx fetchvs 2
vsx get
Description
Shows the information about the current VSX context.
Syntax
vsx get
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
Example
vsx mstat
Description
Shows and configures Memory Resource Control.
Output shows these global memory resources:
Resource Description
In addition:
1. Run the cpview command (see "cpview" on page 1724).
2. From the top, click:
Advanced > VSX > VSs > Physical-Resources
Syntax
vsx mstat
[-vs <VSID>] [unit <Unit>] [sort {<Number> | all}]
debug
disable
enable
status
swap <Minutes>
Parameters
Parameter Description
No Parameters Shows the total memory consumption for each Virtual System.
Parameter Description
Note - You can combine all the available options (separate them
with spaces). Example: -vs 1 4-6
unit <Unit> Specifies the memory measurement unit shown in the command output:
n B - bytes
n K - kilobytes
n M - megabytes (default)
n G - gigabytes
sort Sorts the Virtual Systems in the output by their memory size.
{<Number> | Specifies the number of Virtual Systems shown in the command output.
all} Use all to show all Virtual Systems.
If you do not specify this flag, the Virtual Systems in the output are sorted
by their VSID.
debug Shows memory consumption debug information for each Virtual System
by fields, which are defined in the configuration file.
Parameter Description
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
Example 1
[Expert@MyVsxGW:0]#
Example 2
[Expert@MyVsxGW:0]#
Example 3
======+===============+===============+=================+================+=============+=======
===========+=================+===========
0 | 34456.00 KB | 182104.00 KB | 6.09 KB | 0.00 KB | 51071.91 KB |
0.00 KB | 0.00 KB | 0.00 KB
1 | 0.00 KB | 0.00 KB | 0.00 KB | 0.00 KB | 0.00 KB |
0.00 KB | 0.00 KB | 0.00 KB
Note: To add a field to memory table please uncomment the required field (delete the leading
'#')
To remove a field from memory table please comment out the required field (add a leading
'#')
Configuration is done in the file /opt/CPsuite-R80.40/fw1/conf/memoryinfo.conf
[Expert@MyVsxGW:0]#
vsx showncs
Description
Shows Check Point Network Configuration Script (NCS) for a Virtual Device.
Syntax
Parameters
Parameter Description
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
vsx sicreset
Description
Resets SIC for Virtual System or Virtual Router in the current VSX context.
Notes:
n This operation is not supported for the context of VSX Gateway itself (VS0).
n On the Management Server, run the "cpca_client revoke_cert" on page 108
command to cancel the old certificate.
n In SmartConsole, open the Virtual System object and immediately click OK.
This action creates a new certificate, and transfers the certificate to the VSX
Gateway.
Syntax
Parameters
Parameter Description
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
vsx stat
Description
Shows status information for VSX Gateway.
Syntax
Parameters
Parameter Description
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy | SIC
Stat
-----+-------------+-----------------------+-----------------+--------------------------+-------
--
1 | S VS1 | VS_Policy | 20Sep2019 22:07 | <No Policy> | Trust
2 | S VS2 | VS_Policy | 20Sep2019 22:07 | <No Policy> | Trust
[Expert@MyVsxGW:2]#
Example 2 - Show a list of all Virtual Devices and their applicable information.
VSID: 0
VRID: 0
Type: VSX Gateway
Name: VSX1_192.168.3.241
Security Policy: VSX_Cluster_VSX
Installed at: 20Sep2019 22:06:33
SIC Status: Trust
Connections number: 5
Connections peak: 43
Connections limit: 14900
VSID: 1
VRID: 1
Type: Virtual System
Name: VS1
Security Policy: VS_Policy
Installed at: 20Sep2019 22:07:03
SIC Status: Trust
Connections number: 0
Connections peak: 3
Connections limit: 14900
VSID: 2
VRID: 2
Type: Virtual System
Name: VS2
Security Policy: VS_Policy
Installed at: 20Sep2019 22:07:01
SIC Status: Trust
Connections number: 0
Connections peak: 2
Connections limit: 14900
[Expert@MyVsxGW:2]#
VSID: 2
VRID: 2
Type: Virtual System
Name: VS2
Security Policy: VS_Policy
Installed at: 20Sep2019 22:07:01
SIC Status: Trust
Connections number: 0
Connections peak: 2
Connections limit: 14900
[Expert@MyVsxGW:2]#
vsx unloadall
Description
Unloads security policy for all Virtual Systems and Virtual Routers.
See sk33065: Unloading policy from a VSX Security Gateway.
Syntax
vsx unloadall
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
vsx vspurge
Description
Removes Virtual Devices that are no longer defined in the management database, but were
not removed from the VSX Gateway, because the VSX Gateway was down or disconnected
when the management server pushed the updated VSX configuration.
This command cleans all unused Virtual Devices entries (from the NCS local.vskeep) and
fetches the VSX configuration file (NCS local.vskeep) again.
Syntax
Parameters
Parameter Description
-f <purge_ Specifies the path and the name of the file, in which the command saves
file> the purged information.
Return Values
n 0 (zero) indicates that the command executed successfully.
n Any other value indicates an error.
vsx_util
Description
Performs various VSX maintenance tasks.
You run this command from the Expert mode on the Management Server (Security
Management Server, or a Main Domain Management Server on Multi-Domain Server).
Syntax
vsx_util -h
vsx_util <Command> [-s <Mgmt Server>] [-u <UserName>] [-c <Name of
VSX Object>] [-m <Name of VSX Cluster Member>]
Parameters
Parameter Description
-c <Name of VSX Specifies the name of the VSX Gateway or VSX Cluster object.
Object>
-m <Name of VSX Specifies the name of the VSX Gateway or VSX Cluster Member
Cluster Member> object.
Sub-command Description
vsx_util Adds a new Cluster Member to a VSX Cluster and pushes the VSX
add_member Cluster configuration to the new VSX Cluster Member.
See "vsx_util add_member" on page 1751.
You run this command from the Expert mode on the Management
Server (Security Management Server, or a MainDomain Management
Server on Multi-Domain Server).
vsx_util Changes the VSX Management IP address (within the same subnet) of
change_mgmt_ a VSX Gateway or VSX Cluster Member.
ip See "vsx_util change_mgmt_ip" on page 1757.
You run this command from the Expert mode on the Management
Server (Security Management Server, or a MainDomain Management
Server on Multi-Domain Server).
vsx_util Converts the VSX Cluster mode between High Availability (default) and
convert_ Virtual System Load Sharing.
cluster See "vsx_util convert_cluster" on page 1762.
You run this command from the Expert mode on the Management
Server (Security Management Server, or a MainDomain Management
Server on Multi-Domain Server).
Sub-command Description
Sub-command Description
vsx_util Shows the configuration menu for Virtual System Load Sharing - see
vsls status, redistribute, export and import configuration.
See "vsx_util vsls" on page 1780.
You run this command from the Expert mode on the Management
Server (Security Management Server, or a MainDomain Management
Server on Multi-Domain Server).
Notes
n This command writes its messages to the vsx_util_YYYYMMDD_HH_MM.log file on
the Management Server:
l On a Security Management Server:
$FWDIR/log/vsx_util_YYYYMMDD_HH_MM.log
/opt/CPsuite-R80.40/fw1/log/vsx_util_YYYYMMDD_HH_MM.log
n If it is necessary to exit from the vsx_util command's menu, press the CTRL C keys.
Important - Do not press these keys, it this command already started to perform
a change. If you press these keys during the operation, the command does not
save its log file.
vsx_util add_member
Description
Adds a new Cluster Member to a VSX Cluster and pushes the VSX Cluster configuration to the
new VSX Cluster Member.
Syntax
vsx_util add_member
Required Input
n The applicable VSX Cluster object.
n Name of the new VSX Cluster Member.
n IP address for the management interface.
n IP address for the synchronization interface.
n The one-time Activation Key (SIC activation key)
Comments
n Execute the command and follow the instructions on the screen.
n After the command adds a new Cluster Member to the management database, the
command prompts you to reconfigure the new VSX Cluster Member (to push the VSX
Cluster configuration to it).
l If you enter "y" to reconfigure the new VSX Cluster Member at this time, then the
"vsx_util reconfigure" on page 1764 operation starts automatically on the new VSX
Cluster Member.
Important - You must reboot the new VSX Cluster Member after the
reconfigure operation finishes.
l If you enter "n" to cancel the reconfigure operation on the new VSX Cluster
Member at this time, then later you must manually run the "vsx_util reconfigure" on
page 1764 command for the new VSX Cluster Member.
vsx_util change_interfaces
Description
Automatically replaces designated existing interfaces with new interfaces on all Virtual
Devices, to which the existing interfaces connect.
This command is useful when converting a deployment to use Link Aggregation, especially
where VLANs connect to many Virtual Devices.
Syntax
vsx_util change_interfaces
Required Input
n The applicable VSX Gateway or VSX Cluster object.
n Where to apply the change (Management Server only, or Management Server and VSX
Gateway / VSX Cluster Members).
n Name of the interface to be replaced.
n Name of the new (replacement) interface.
Comments
n Execute the command and follow the instructions on the screen.
n This command supports the resume feature.
n You can use this command to migrate a VSX deployment from an Open Server to a
Check Point appliance by using the Management Only mode.
n Refer to the Notes section below for additional information.
Procedure
Step Instructions
1 Close all SmartConsole clients that are connected to the Security Management
Server or Domain Management Servers.
5 Run:
vsx_util change_interfaces
Step Instructions
13 If you selected the option Apply changes to the management database only,
you can remove the old (replaced) interfaces from the management database.
When prompted, enter y:
Would you like to remove the old interfaces from the
database? (y|n) [n]: y
Notes
n The option "Apply changes to the management database and to the VSX
Gateway/Cluster members immediately" verifies connectivity between the
Management Server and the VSX Gateway or VSX Cluster Members. In the event of a
connectivity failure one of the following actions occur:
1. If all of the newly changed interfaces fail to establish connectivity, the process
terminates unsuccessfully.
2. If one or more interfaces successfully establish connectivity, while one or more
other interfaces fail, you may optionally continue the process.
In this case, those interfaces for which connectivity was established successfully
will be changed.
For those interfaces that failed, you must then resolve the issue and then run the
"vsx_util reconfigure" on page 1764 command to complete the process.
n If you select the option "Apply changes to the management database only", you can
select one of these:
l Another interface from list (if any are available).
l Option to add a new interface.
vsx_util change_mgmt_ip
Description
Changes the VSX Management IP address of a VSX Gateway or VSX Cluster Member.
This command changes the Management IP address within the same subnet.
For more information, see sk92425.
Syntax
vsx_util change_mgmt_ip
Required Input
n The applicable VSX Cluster object.
n The applicable VSX Cluster Member object.
n New management IP address.
Comments
n Execute the command and follow the instructions on the screen.
vsx_util change_mgmt_subnet
Description
Changes the VSX Management IP address of a VSX Gateway or VSX Cluster Member.
This command changes the Management IP address from the current subnet to a different
subnet.
For more information, see sk92425.
Syntax
vsx_util change_mgmt_subnet
Required Input
n The applicable VSX Gateway or VSX Cluster object.
n New management IPv4 address.
n New management IPv4 netmask.
n New management IPv6 address.
n New management IPv6 prefix.
n New IPv4 default gateway.
n New IPv6 default gateway.
Comments
n Execute the command and follow the instructions on the screen.
n This command updated only routes that were automatically generate.
You must remove and/or change all manually created routes that use the previous
management subnet.
n You must reboot the VSX Gateway (all VSX Cluster Members) after the command
finishes.
vsx_util change_private_net
Description
Changes the IP address of the Internal Communication Network in a VSX Cluster (cluster
private network).
Syntax
vsx_util change_private_net
Required Input
n The applicable VSX Cluster object.
n New IPv4 address for the cluster private network.
n New IPv4 netmask for the cluster private network.
n New IPv6 address and prefix for the cluster private network.
Comments
n Run the command and follow the instructions on the screen.
n The IP address of the Internal Communication Network must be unique.
This IP address must not be used anywhere in your environment, including the Virtual
Devices on this VSX Cluster.
n The illegal IPv4 addresses are: 0.0.0.0, 127.0.0.0, and 255.255.255.255
n For IPv4 address, the network mask must be one of these:
l 255.255.0.0, or /16
l 255.255.128.0, or /17
l 255.255.192.0, or /18
l 255.255.224.0, or /19
l 255.255.240.0, or /20
l 255.255.248.0, or /21
l 255.255.252.0, or /22 (this is the default)
n For IPv6 address, the new prefix must be /80.
vsx_util convert_cluster
Description
Converts the VSX Cluster mode between High Availability (default) and Virtual System Load
Sharing.
Syntax
vsx_util convert_cluster
Required Input
n The applicable VSX Cluster object.
n The ClusterXL mode (case sensitive).
Comments
n Execute the command and follow the instructions on the screen.
n When you convert from Virtual System Load Sharing to High Availability:
l All Virtual Systems are Active on the same VSX Cluster Member by default.
l Peer Virtual Systems are Standby on other VSX Cluster Members.
vsx_util downgrade
Description
Downgrades the version of a VSX Gateway or VSX Cluster in the management database.
Important - You can use this command only if you did not make any configuration
changes after you used the "vsx_util upgrade" command.
Important - Before you run the vsx_util commands:
n Back up the VSX environment. See sk100395: How to backup and restore VSX
gateway.
n You must close all SmartConsole clients. Failure to do so may result in a
database lock error.
n On a Multi-Domain Security Management Server, you must switch to the
context of the Main Domain Management Server that manages the VSX
Gateway / VSX Cluster object.
Use the command "mdsenv <IP Address or Name of Domain
Management Server>".
Syntax
vsx_util downgrade
Required Input
n The applicable VSX Gateway or VSX Cluster object.
n The applicable Check Point version.
Comments
n Used only to revert the upgraded VSX Gateway or VSX Cluster object.
n Execute the command and follow the instructions on the screen.
n To deploy the version change to the VSX Cluster Members, you must run the "vsx_util
reconfigure" on page 1764 command.
vsx_util reconfigure
Description
Restores VSX configuration on a VSX Gateway or VSX Cluster Member (for example, after
you perform clean install after a system failure).
Syntax
vsx_util reconfigure
Important - Before you run the vsx_util commands:
n Back up the VSX environment. See sk100395: How to backup and restore VSX
gateway.
n You must close all SmartConsole clients. Failure to do so may result in a
database lock error.
n On a Multi-Domain Security Management Server, you must switch to the
context of the Main Domain Management Server that manages the VSX
Gateway / VSX Cluster object.
Use the command "mdsenv <IP Address or Name of Domain
Management Server>".
Important - Before you run this command on the Management Server, you must
configure specific settings on the cleanly installed VSX Gateway or VSX Cluster
Member as they were:
n IP address of Gaia management interface
n Enable IPv6 support in Gaia
n Configure the applicable interfaces (Bond, VLAN, and so on)
n Configure kernel parameters and their values:
l $FWDIR/boot/modules/fwkern.conf
l $FWDIR/boot/modules/vpnkern.conf
l $PPKDIR/conf/simkern.conf
n Configure CoreXL:
l Number of CoreXL Firewall instances (for IPv4 and IPv6) in the context of
VS0 (run the cpconfig command and select the option Check Point
CoreXL)
l $FWDIR/conf/fwaffinity.conf
Required Input
n The applicable VSX Gateway or VSX Cluster object.
n The one-time Activation Key (SIC activation key).
Comments
n Execute the command and follow the instructions on the screen.
n The new VSX Gateway or VSX Cluster Member:
l Must be a new installation.
You cannot use a VSX Gateway or VSX Cluster Member with a previous VSX
configuration.
l Must have the same hardware specifications as the original.
Most importantly, it must have at least the same number of interfaces.
l Must have the same Gaia OS configuration as the original.
Limitations
The reconfigure process does not restore the local configuration that was performed on VSX
Gateway or VSX Cluster Member itself (because this configuration is not stored on the
Management Server).
Important - After the reconfigure process is complete and you rebooted VSX
Gateway or VSX Cluster Member, you must manually configure these settings from
scratch or from backed up files.
These settings and files are not restored during the reconfigure process and you must
manually configure them again:
n Any OS configuration (for example, DNS, NTP, DHCP, Dynamic Routing, DHCP Relay,
and so on).
n Backup files and Gaia snapshots saved in the past on the VSX Gateway or VSX Cluster
Member.
n Any settings manually defined in various configuration files on the VSX Gateway or VSX
Cluster Member.
n Any Check Point configuration files.
Note - Some of these files do not exist by default. Some files are configured on
each VSX Gateway and VSX Cluster Member, and some files are configured for
each Virtual System.
l simkern.conf
o In R80.20 and higher: $PPKDIR/conf/simkern.conf
o In R80.10 and lower: $PPKDIR/boot/modules/simkern.conf
l sim_aff.conf
o In R80.20 and higher: $PPKDIR/conf/sim_aff.conf
o In R80.10 and lower: $PPKDIR/boot/modules/sim_aff.conf
l /var/ace/sdconf.rec
l /var/ace/sdopts.rec
l /var/ace/sdstatus.12
l /var/ace/securid
Example
This example shows how the VSX configuration is restored on a VSX Cluster Member.
******************************************************************************************
* Note: the operation you are about to perform changes the information in the management *
* database. Back up the database before continuing. *
******************************************************************************************
Enter Security Management Server/main Domain Management Server IP address (Hit 'ENTER' for
'localhost'): 192.168.3.240
Enter Administrator Name: ******
Enter Administrator Password: ******
Select VSX gateway/cluster object name:
1) VSX_Cluster
Select: 1
************************************************************
IMPORTANT:
When you are managing a VSX cluster,
make sure that the new reconfigured member has the same number of
IPv4, and IPv6 firewall instances as the other VSX cluster members.
Run cpconfig command to show and edit CoreXL settings.
NOTE:
In case of adding a new cluster member to a VSX Cluster,
while using 'ClusterXL Virtual System Load Sharing'
make sure to run 'vsx_util vsls' after rebooting the
gateway in order for the Virtual Systems to become active
on the newly added VSX cluster member.
************************************************************
[Expert@MDS:0]#
vsx_util remove_member
Description
Removes a Cluster Member from a VSX Cluster.
Syntax
vsx_util remove_member
Required Input
n The applicable VSX Cluster object.
n The applicable VSX Cluster Member object.
Comments
n Before you run this command:
l Make sure to remove (detach) the license from the VSX Cluster Member.
l Make sure to run the "cphastop" on page 1287 command to avoid unexpected
failover from the VSX Cluster Member.
l Make sure to disconnect the VSX Cluster Member from all networks, except from
the Management Server.
n Execute the command and follow the instructions on the screen.
vsx_util show_interfaces
Description
Shows configuration of selected interfaces - interface types, connections to Virtual Devices,
and IP addresses.
The command shows the information on the screen and also saves it to the
interfacesconfig.csv file in the current working directory.
Syntax
vsx_util show_interfaces
Required Input
n The applicable VSX Gateway or VSX Cluster object.
n Which interfaces to show:
4) A Specific Interface Prompts you to enter the name of the specific interface to
show.
Note - You cannot specify a VLAN tag as a parameter.
You can, however, specify an interface used as a
VLAN (without the tag) to see all VLAN tags
associated with that interface. See the example below.
Example
+-------------------+---------------------+----+---------------------------------------------------
--+
| Type & Interface | Virtual Device Name |VSID| IP / Mask length
|
+-------------------+---------------------+----+---------------------------------------------------
--+
|M eth0 |VSX_Cluster_1 |0 |v4 172.16.16.98/24 v6 2001:0DB8::98/64
|
+-------------------+---------------------+----+---------------------------------------------------
--+
|S eth1 |VSX_Cluster_1 |0 |v4 10.0.0.0/24
|
+-------------------+---------------------+----+---------------------------------------------------
--+
|U eth2 |VS1 |1 |v4 192.0.2.2/24 v6 2001:0DB8:c::1/64
|
+-------------------+---------------------+----+---------------------------------------------------
--+
|U eth3 |VS1 |1 |v4 192.168.3.3/24 v6 2001:0DB8:b::1/64
|
+-------------------+---------------------+----+---------------------------------------------------
--+
|A eth4 | | |
|
+-------------------+---------------------+----+---------------------------------------------------
--+
|U eth5 |VS2 |2 |v4 10.10.10.10/24 v6 2001:0DB8:a::1/64
|
+-------------------+---------------------+----+---------------------------------------------------
--+
|A eth6 | | |
|
+-------------------+---------------------+----+---------------------------------------------------
--+
[Expert@MGMT:0]#
[Expert@MGMT:0]# cat interfacesconfig.csv
Interface Name , Type ,Virtual Device Name , VSID , IPv4 Address , IPv4 mask length, IPv6 Address,
IPv6 mask length
eth0,M,VSX_Cluster_1,0,172.16.16.98,24,2001:0DB8::98,64
eth1,S,VSX_Cluster_1,0,10.0.0.0,24,,
eth2,U,VS1,192.0.2.2,24,2001:0DB8:c::1,64
eth3,U,VS1,192.168.3.3,24,2001:0DB8:b::1,64
eth4,A
eth5,U,VS2,10.10.10.10,24,2001:0DB8:a::1,64
eth6,A
[Expert@MGMT:0]#
vsx_util upgrade
Description
Upgrades the version of a VSX Gateway or VSX Cluster in the management database.
Syntax
vsx_util upgrade
Required Input
n The applicable VSX Gateway or VSX Cluster object.
n The applicable Check Point version.
Comments
n Execute the command and follow the instructions on the screen.
n After the command finishes, you must run the "vsx_util reconfigure" on page 1764
command.
n To revert this upgrade, run the "vsx_util downgrade" on page 1763 command.
vsx_util view_vs_conf
Description
Compares the configuration of all Virtual Devices on the Management Server and the actual
configuration on the VSX Gateway or VSX Cluster Members.
Syntax
vsx_util view_vs_conf
Required Input
n The applicable VSX Gateway or VSX Cluster object.
n The applicable Virtual Device object.
Example
+---------------------------------------------------+-----+-------------------+
|Interfaces |Mgmt |VSX GW(s) |
+----------+----------------------------------------+-----+---------+---------+
|Name |IP / Mask length | |mem 1 |mem2 |
+----------+----------------------------------------+-----+---------+---------+
|eth2 |v4 10.0.0.0/24 v6 2001:db8::abc::1/64 | V | V | V |
|eth3 |v4 10.10.10.10/24 v6 2001:db8::3121/64 | V | V | V |
+----------+----------------------------------------+-----+---------+---------+
V - Interface exists on the gateway and matches management information (if defined on the
management).
- - Interface does not exist on the gateway.
N/A - Fetching Virtual Device configuration from the gateway failed.
!IP - Interface exists on the gateway, but there is an IP address mismatch.
!MASK - Interface exists on the gateway, but there is a Net Mask mismatch.
Routing table:
+----------------------------------------------------------+-----+-------------+
|Ipv4 Routes |Mgmt |VSX GW(s) |
+--------------------------+--------------------+----------+-----+------+------+
|Destination / Mask Length |Gateway |Interface | |mem1 |mem2 |
+--------------------------+--------------------+----------+-----+------+------+
|2.2.2.0/24 | |eth2 | V | V | V |
|3.3.3.0/24 | |eth3 | V | V | V |
+--------------------------+--------------------+----------+-----+------+------+
+--------------------------+--------------------+----------+-----+------+------+
+----------------------------------------------------------+-----+-------------+
|Ipv6 Routes |Mgmt |VSX GW(s) |
+--------------------------+--------------------+----------+-----+------+------+
|Destination / Mask Length |Gateway |Interface | |mem1 |mem2 |
+--------------------------+--------------------+----------+-----+------+------+
|2001:db8::abc::/64 | |eth2 | V | !NH | !NH |
|2001:db8:0a::/64 | |eth3 | V | !NH | !NH |
+--------------------------+--------------------+----------+-----+------+------+
|2001:db8::1ffe:0:0:0/112 | |eth2 | - | V | V |
|2001:db8::fd9a:0:1:0/112 | |eth3 | - | V | V |
+--------------------------+--------------------+----------+-----+------+------+
V - Route exists on the gateway and matches management information (if defined on the
management).
- - Route does not exist on the gateway.
N/A - Fetching Virtual Device configuration from the gateway failed.
!NH - Route exists on the gateway, but there is a Next Hop mismatch.
Note: Routes can be created automatically on the gateways by the Operating System.
Therefore, routes that appear on all gateways, but are not defined on the management,
do not necessarily indicate a problem.
[Expert@MGMT:0]#
vsx_util vsls
Description
Shows the configuration menu for Virtual System Load Sharing - status, redistribute, export,
and import of configuration.
Syntax
vsx_util vsls
Required Input
n The applicable VSX Cluster object.
n The applicable redistribution option.
Comments
n Execute the command and follow the instructions on the screen.
n If the command output shows "Operation not allowed. Object is not a
Virtual System Load Sharing cluster.", then run the "vsx_util convert_
cluster" on page 1762 command.
Example
vsx_provisioning_tool
This section describes the VSX Provisioning Tool (the vsx_provisioning_tool
command).
Description
This tool allows the VSX administrator to add and remove Virtual Devices (Virtual Systems,
Virtual Routers, Virtual Switches), interfaces and routes from the command line of a Security
Management Server or Domain Management Server.
This allows the automation of the required VSX Provisioning operations in the environment.
Syntax
vsx_provisioning_tool -h
vsx_provisioning_tool [-s <Mgmt Server>] {-u <Username> | -c
<Certificate>} -p <Password>
-o <Commands> [-a] -L
-f <Input File> [-l <Line>] [-a] -L
Parameters
Parameter Description
-c Specifies the path and the name for the Management Server
< administrator's certificate file.
Certificate>
Parameter Description
-f <Input Specifies the path and the name for the file with the commands to
File> execute.
The tool treats all text begins with a hash sign (#) as a comment and
ignores it.
This way you can add comments on separate lines, or in-line.
See:
n "Transactions" on page 1785
n "vsx_provisioning_tool Commands" on page 1786
-l <Line> Specifies the line number in <Input File>, from which to start to
execute the commands.
You can use this "-l" parameter only together with the "-f" parameter.
-a Specifies that before the tool executes the specified commands, it must
make sure it can connect to all VSX Gateways.
Note - This does not guarantee that a VSX Gateway can
successfully apply all the specified commands.
Exit Codes
Exit
Description
Code
0 The tool successfully applied all changes, on all VSX Cluster Members.
1 The tool successfully applied all changes to the management database, but not
to all VSX Cluster Members.
2 The tool successfully applied all changes, but SIC communication failed to
establish with at least one VSX Cluster Member.
3 Connectivity test failed with at least one VSX Cluster Member (if you used the "-
a" parameter).
The tool did not apply changes to the management database, or to the VSX
Cluster Member.
4 The tool failed to apply changes (due to internal error, syntax error, or another
reason).
Note - If commands are executed from a file with multiple transactions, the exit code
refers to the last transaction processed.
Example 1
Run the tool on the Security Management Server.
Example 2
Run the tool on the Multi-Domain Server in the context of the Domain Management Server
called MyDomain.
Create a new Virtual System object called VS1 on the VSX Cluster object called
VSXCluster1
In the new Virtual System object, on the interface eth4, add a VLAN interface with VLAN ID
100 and IPv4 address 1.1.1.1/24.
mdsenv MyDomain
vsx_provisioning_tool -s localhost -u admin -p mypassword -o add vd name VS1 vsx VSXCluster1, add interface name eth4.100 ip 1.1.1.1/24
Transactions
Notes:
n A transaction is a set of operations performed on one Virtual Device.
n The utility commits all operations to the management database together when
the transaction ends.
If the transaction fails, the utility discards all its commands.
n You must specify the name of the Virtual Device with a parameter in the first
command.
You do not need to specify this name again in other commands of the same
transaction.
n You cannot send operations to different Virtual Devices in one transaction.
n You cannot start a new transaction until you exit the one before.
n When you send commands with the "-o" parameter, you can enter multiple
commands (for example: add a Virtual System and then add interfaces and
routes to it).
Separate the commands with a comma ( , ).
All the commands are one transaction.
The "-o" parameter does not support explicit transaction commands.
n When you send commands with the "-f" parameter, you can use explicit
transaction commands (see "vsx_provisioning_tool Commands" on page 1786).
n Commands from a file can be one or more transactions:
l If not inside a transaction, the current line is one transaction, which the
vsx_provisioning_tool Commands
All vsx_provisioning_tool commands are pairs of a key and a value.
The first two words in each command must appear in the correct order.
Other pairs can be written in any order.
Note - SIC with the Virtual System is established automatically. If it fails, operations
continue, and the transaction returns error code 2.
Description
This command adds a new VSX Gateway object.
Syntax
add vsx type gateway name <Name of VSX Gateway Object> version
<Version> main_ip <Main IPv4 Address> main_ip6 <Main IPv6 Address>
sic_otp <Activation Key> [rule_snmp {enable | disable}] [rule_ssh
{enable | disable}] [rule_ping {enable | disable} [rule_ping6
{enable | disable}] [rule_https {enable | disable}] [rule_drop
{enable | disable}]
Note - In this transaction, you can only add the "set physical interface"
command.
Parameters
name <Name of Object name Defines the name of the VSX Gateway object.
VSX Gateway You cannot use spaces of Check Point
Object> reserved words.
version Check Point Defines the Check Point version of the VSX
<Version> version Gateway object.
You must enter the exact version as appears in
SmartConsole (case-sensitive).
main_ip <Main IPv4 Address Defines the main IPv4 Address of the VSX
IPv4 Address> Gateway object.
main_ip6 <Main IPv6 Address Defines the main IPv6 Address of the VSX
IPv6 Address> Gateway object.
sic_otp SIC password You must enter the same Activation Key you
<Activation entered during the First Time Configuration
Key> Wizard of the VSX Gateway.
Example
vsx_provisioning_tool -s localhost -u admin -p mypassword -o add vsx name VSX_GW1 type gateway main_ip 192.168.20.1 version R80.40 sic_
otp ABCDEFG rule_ssh enable rule_ping enable
Description
This command adds a new VSX Cluster object.
Syntax
add vsx type cluster name <Name of VSX Cluster Object> version
<Version> main_ip <Main Virtual IPv4 Address> main_ip6 <Main
Virtual IPv6 Address> cluster_type {vsls | ha | crbm} sync_if_name
<Name of Sync Interface> sync_netmask <Sync Interface Netmask>
[rule_snmp {enable | disable}] [rule_ssh {enable | disable}]
[rule_ping {enable | disable} [rule_ping6 {enable | disable}]
[rule_https {enable | disable}] [rule_drop {enable | disable}]
Important - You must run the "add vsx_member" command for each VSX Cluster
Member in the same transaction as the "add vsx type cluster name"
command.
Parameters
name <Name of Object name Defines the name of the VSX Cluster object.
VSX Cluster You cannot use spaces of Check Point
Object> reserved words.
version Check Point Defines the Check Point version of the VSX
<Version> version Cluster object.
You must enter the exact version as appears
in SmartConsole (case-sensitive).
main_ip <Main IPv4 Address Defines the main IPv4 Virtual Address of the
Virtual IPv4 VSX Cluster object.
Address>
main_ip6 <Main IPv6 Address Defines the main IPv6 Virtual Address of the
Virtual IPv6 VSX Cluster object.
Address>
Example
vsx_provisioning_tool -s localhost -u admin -p mypassword -o add vsx name VSX1 type cluster cluster_type vsls main_ip 192.168.1.1 version
R80.40 sync_if_name eth3 sync_netmask 255.255.255.0 rule_ssh enable rule_ping enable
Description
This command adds a new Virtual Device object:
n Virtual System
n Virtual System in Bridge Mode
n Virtual Switch
n Virtual Router
Syntax
Parameters
name <Name of Virtual Object name Defines the name of the Virtual Device
Device Object> object.
Mandatory parameter, if this is the first
command in a transaction.
vsx <Name of VSX Parent object Defines the name of the applicable VSX
Gateway or VSX name Gateway or VSX Cluster object, in which
Cluster Object > you create this Virtual Device.
You cannot use spaces or Check Point
reserved words.
Mandatory parameter.
type {vs | vsbm | vsw Type of Virtual Defines the type of the Virtual Device:
| vr} Device
n vs - Virtual System (default)
n vsbm - Virtual System in Bridge
Mode
n vsw - Virtual Switch
n vr - Virtual Router
vs_mtu <MTU> Integer Defines the Global MTU value for all
interfaces.
This parameter is applicable only for a:
n Virtual System in Bridge Mode
(type vsbm)
n Virtual Switch (type vsw)
Default is 1500 bytes.
Note - For a Virtual Switch, if you do
not add a VLAN or physical interface
in the same transaction, the utility
ignores this value.
main_ip <Main IPv4 IPv4 Address Defines the main IPv4 Address of the
Address> Virtual Device object.
This parameter is applicable only for a:
n Virtual System (type vs)
n Virtual Router (type vr)
main_ip6 <Main IPv6 IPv6 Address Defines the main IPv6 Address of the
Address> Virtual Device object.
This parameter is applicable only for a:
n Virtual System (type vs)
n Virtual Router (type vr)
Description
This command deletes a Virtual Device object:
n Virtual System
n Virtual System in Bridge Mode
n Virtual Switch
n Virtual Router
You cannot delete a Virtual Device if:
n It is referenced by a policy rule.
n It is referenced by other objects.
n It is enabled for global use in a Multi-Domain Security Management environment.
Important - After you delete a Virtual Device, you cannot have more commands in the
same transaction.
Syntax
Parameters
name <Name of Virtual Object Specifies the name of the Virtual Device
Device Object> name object.
Mandatory parameter, if this is the first
command in a transaction.
Example
vsx_provisioning_tool -s localhost -u admin -p mypassword -o remove vd name VirtSwitch1
Description
This command changes the settings of an existing Virtual Device object:
n Virtual System
n Virtual System in Bridge Mode
n Virtual Switch
n Virtual Router
Syntax
Parameters
name <Name of Virtual Object name Specifies the name of the Virtual
Device Object> Device object.
Mandatory parameter, if this is the first
command in a transaction.
vs_mtu <MTU> Integer Specifies the Global MTU value for all
interfaces.
This parameter is applicable only for a:
n Virtual System in Bridge Mode
n Virtual Switch
Default is 1500 bytes.
main_ip <Main IPv4 IPv4 Address Specifies the main IPv4 Address of the
Address> Virtual Device object.
This parameter is applicable only for a:
n Virtual System
n Virtual Router
main_ip6 <Main IPv6 IPv6 Address Specifies the main IPv6 Address of the
Address> Virtual Device object.
This parameter is applicable only for a:
n Virtual System
n Virtual Router
Example
vsx_provisioning_tool -s localhost -u admin -p mypassword -o set vd name VS1 instances 8 main_ip 192.0.2.6 calc_topo_auto false
Description
This command adds an interface to an existing Virtual Device object:
n Virtual System
n Virtual System in Bridge Mode
n Virtual Switch
n Virtual Router
Syntax
Parameters
vd <Device Object name Specifies the name of the Virtual Device object.
Object Mandatory parameter, if this is the first command in a
Name> transaction.
name Interface name Specifies the name of the physical or VLAN interface.
< Note - You must use the "name" or "leads_to"
Interface> parameter, but not both.
leads_to Object name Specifies the name of the Virtual Switch or Virtual
<VSW or VR Router object, to which this interface connects.
Object This parameter is applicable only for a Virtual System.
Name> Note - You must use the "name" or "leads_to"
parameter, but not both.
mtu <MTU> Integer Specifies the MTU value for this interface.
Default is 1500 bytes.
This parameter is applicable only for a:
n Virtual System
n Virtual Router
Example - Add VLAN interface eth4.100 with IPv4 1.1.1.1/24 to the Virtual System
'VirtSystem1'
vsx_provisioning_tool-s localhost -u admin -p mypassword -o add interface vd VirtSystem1 name eth4.100 ip 1.1.1.1/24
Description
This command removes an interface from an existing Virtual Device object:
n Virtual System
n Virtual System in Bridge Mode
n Virtual Switch
n Virtual Router
Important:
n If the interface you remove leads to a Virtual Router, all routes through that
interface are removed automatically.
n You must remove all subordinate interfaces of a bridge interface in the same
transaction. This also removes the bridge interface.
Note - If there are routes that have a next-hop IP address, which would become
inaccessible without this interface, the transaction fails.
Syntax
Parameters
leads_to <Name of Object Specifies the name of the Virtual Switch or Virtual
VSW or VR Object> name Router object, to which this interface connects.
This parameter is applicable only for a Virtual
System.
Note - You must use the "name" or "leads_
to" parameter, but not both.
Example 2 - Removing all subordinate interfaces "eth2" and "eth3" of a bridge interface in
the Virtual System "VS1"
vsx_provisioning_tool -s localhost -u admin -p mypassword -o remove interface vd VS1 name eth2, remove interface vd VS1 name eth3
Description
This command changes the settings of an interface that belongs to an existing Virtual Device
object:
n Virtual System
n Virtual System in Bridge Mode
n Virtual Switch
n Virtual Router
Syntax
Parameters
new_name <Name of New Interface name You can change the name, but not
Interface> the type of interface.
Note - You can change a VLAN
or physical interface only to a
VLAN or physical interface.
leads_to <Name of VSW Object name Specifies the name of the Virtual
or VR Object> Switch or Virtual Router object, to
which this interface connects.
This parameter is applicable only for
a Virtual System.
Note - You must use the "name"
or "leads_to" parameter, but
not both.
new_leads_to <Name of Object name You can where the interface leads:
New VSW or VR Object>
n You can change an interface
that leads to a Virtual Switch
only to lead to a different
Virtual Switch.
n You can change an interface
that leads to a Virtual Router
only to lead to a different
Virtual Router.
Example - On the Virtual System "VS1", change the VLAN interface eth4.10 to the physical
interface eth5
vsx_provisioning_tool -s localhost -u admin -p mypassword -o set interface vd VS1 name eth4.100 new_name eth5 propagate true topology
internal_specific specific_group NYGWs
Adding a Route
Description
This command adds an IPv4 or IPv6 route to an existing Virtual System or Virtual Router
object.
Syntax
Parameters
vd <Name of Object name Specifies the name of the Virtual System or Virtual
VS or VR Router object.
Object> Mandatory parameter, if this is the first command in a
transaction.
next_hop IP Address Specifies the IP address of the next hop of the route.
<Next Hop Notes:
IP Address>
n This IP address must be on a subnet of an
existing interface.
n You must use the "next_hop" or "leads_
to" parameter, but not both.
leads_to Object name Specifies the name of the Virtual System or Virtual
<Name of VS Router object, which is the next hop for the configured
or VR route.
Object> Note - You must use the "next_hop" or "leads_
to" parameter, but not both.
Example - Adding a route on the Virtual System "VS1" that uses the default IPv4 route as a
destination and the Virtual Router "VR3" as a next hop
vsx_provisioning_tool -s localhost -u admin -p mypassword -o add route vd VS1 destination default leads_to VR3
Removing a Route
Description
This command removes an IPv4 or IPv6 route from an existing Virtual System or Virtual Router
object.
Syntax
Parameters
vd <Name of Object Specifies the name of the Virtual System or Virtual Router
VS or VR name object.
Object> Mandatory parameter, if this is the first command in a
transaction.
Example - Removing a route from the Virtual System "VS1" that uses the default IPv6
route as a destination
vsx_provisioning_tool -s localhost -u admin -p mypassword -o remove route vd VS1 destination default6
Description
This command shows the information about an existing Virtual Device object.
Syntax
Parameters
Comments
n The command shows only non-automatic routes.
n The command does not show routes that are created automatically with route
propagation.
n For a Virtual Router and Virtual Switch:
The command does not show the wrpj interfaces (created automatically) that connect to
Virtual Systems.
Script Examples
Note - Line numbers in the left column are written only to make it easier to read the
script examples.
Example 1
Create a Virtual System connected to a Virtual Router.
Add a default route on the Virtual System that routes the traffic to the Virtual Router.
Add applicable routes on the Virtual Router to route the traffic to the Virtual System.
Line Command
1 transaction begin
4 transaction end
5 transaction begin
8 transaction end
9 transaction begin
15 transaction end
Example 2
Create a Virtual System connected to a Virtual Switch, with manual topology.
Line Command
1 transaction begin
4 transaction end
5 transaction begin
11 transaction end
Example 3
Add CoreXL Firewall instances to the Virtual System made in the last example.
Turn on automatic calculation of topology.
Change the name of the internal interface, and decrease its MTU.
Line Command
1 transaction begin
4 transaction end
QoS Commands
For more information about QoS, see the R80.40 QoS Administration Guide.
etmstart
Description
Starts the QoS Software Blade on the Security Gateway - starts the QoS daemon fgd50, and
fetches the QoS policy from the Management Servers configured in the
$FWDIR/conf/masters file on the Security Gateway.
For more information, see:
n R80.40 QoS Administration Guide
n sk41585: How to control and debug FloodGate-1 (QoS)
Syntax
etmstart
Example
[Expert@MyGW:0]# etmstart
QoS: Starting fgd50
eth0(inbound), eth0(outbound).
Download OK.
Done.
QoS started
[Expert@MyGW:0]#
etmstop
Description
Stops the QoS Software Blade on the Security Gateway - kills the QoS daemon fgd50 and
then unloads the QoS policy.
For more information, see:
n R80.40 QoS Administration Guide
n sk41585: How to control and debug FloodGate-1 (QoS)
Syntax
etmstop
Example
[Expert@CXL1_192.168.3.52:0]# etmstop
Unloading QoS Policy:
Target(s): CXL1_192.168.3.52
CXL1_192.168.3.52: QoS policy unloaded successfully.
Done.
QoS stopped
[Expert@CXL1_192.168.3.52:0]#
fgate
This section describes:
The 'fgate' command on Management Server
Description
Installs and uninstalls the QoS policy on the managed Security Gateways.
Shows the status of the QoS Software Blade on the managed Security Gateways.
For more information, see:
n R80.40 QoS Administration Guide
n sk41585: How to control and debug FloodGate-1 (QoS)
Syntax
fgate [-d]
load <Name of QoS Policy>.F <GW1> <GW2> ... <GWN>
stat
-h
<GW1> <GW2> ... <GWN>
unload <GW1> <GW2> ... <GWN>
ver
Parameters
Parameter Description
Parameter Description
stat <GW1> <GW2> Shows the status of the QoS Software Blade and policy on
... <GWN> the managed Security Gateways.
Note - To specify a Security Gateway, enter the main IP
address of the name of its object as configured in
SmartConsole. You can specify several Security
Gateways or cluster members in the same command.
Important - This command is outdated and exists only
for backward compatibility with very old versions. Use
the ""cpstat" on page 958" command.
unload <GW1> <GW2> Uninstalls the QoS Policy from the specified Security
... <GWN> Gateways <GW1> <GW2> ... <GWN>.
Note - To specify a Security Gateway, enter the main IP
address of the name of its object as configured in
SmartConsole. You can specify several Security
Gateways or cluster members in the same command.
Examples
Example 1 - Installing the QoS policy on one Security Gateway specified by its IP address
[Expert@MGMT:0]# fgate load MyPolicy.F 192.168.3.52
QoS rules verified OK!
Downloading QoS Policy: MyPolicy.F...
Target(s): MyGW
MyGW: QoS policy transferred to module: MyGW.
MyGW: QoS policy installed succesfully.
Done.
[Expert@MGMT:0]#
Example 2 - Installing the QoS policy on two cluster members specified by their object names
[Expert@MGMT:0]# fgate load MyPolicy.F MyClusterMember1 MyClusterMember2
QoS rules verified OK!
Downloading QoS Policy: MyPolicy.F...
MyClusterMember1: QoS policy transferred to module: MyClusterMember1.
MyClusterMember1: QoS policy installed succesfully.
MyClusterMember2: QoS policy transferred to module: MyClusterMember2.
MyClusterMember2: QoS policy installed succesfully.
Done.
[Expert@MGMT:0]#
Example 3 - Viewing the QoS status on one Security Gateway specified by its object name
[Expert@MGMT:0]# fgate stat MyGW
Interface table
----------------------------------------------------------------
|Name|Dir|Limit (Bps)|Avg Rate (Bps)|Conns|Pend pkts|Pend bytes|
----------------------------------------------------------------
|eth0|in | 1250000000| 0| 0| 0| 0|
|eth0|out| 1250000000| 0| 0| 0| 0|
----------------------------------------------------------------
[Expert@MGMT:0]#
Description
Installs and uninstalls the QoS policy on the managed Security Gateways.
Shows the status of the QoS Software Blade on the managed Security Gateways.
Controls the QoS debug.
For more information, see:
n R80.40 QoS Administration Guide
n sk41585: How to control and debug FloodGate-1 (QoS)
Syntax
fgate [-d]
ctl
-h
<QoS Module> {on | off}
debug
on
off
fetch
-f
<Management Server>
kill [-t <Signal Number>] <Name of QoS Process>
load
log
on
off
stat
stat [-h]
ver [-k]
unload
Parameters
Parameter Description
ctl -h Shows the expected syntax and the list of the available
QoS modules.
debug {on | off} Controls the debug mode of the QoS user space
daemon fgd50 (see sk41585):
n on - Enables the debug
n off - Disables the debug (default)
This sends additional debugging information to the
fgd50 daemon's log file $FGDIR/log/fgd.elg.
fetch -f Fetches and installs the QoS Policy from all the
Management Servers configured in the
$FWDIR/conf/masters file.
fetch <Management Fetches and installs the QoS Policy from the specified
Server> Management Server.
Enter the main IP address or the name of the
Management Server object as configured in
SmartConsole.
Parameter Description
kill [-t <Signal Sends the specified signal to the specified QoS user
Number>] <Name of QoS space process.
Process> Notes:
n In R80.40, the only available QoS user space
process is fgd50.
n The QoS fgd50 daemon, upon its startup,
writes the PIDs of the applicable QoS user
spaces processes to the
$FWDIR/tmp/<Name of QoS
Process>.pid files.
For example: $FWDIR/tmp/fgd50.pid
n If the file $FWDIR/tmp/<Name of QoS
Process>.pid exists, then this command
sends the specified Signal Number to the PID
in that file.
n If you do not specify the signal explicitly, the
command sends Signal 15 (SIGTERM).
n For the list of available signals and their
numbers, run the kill -l command. For
information about the signals, see the manual
pages for the kill and signal.
n To restart the QoS fgd50 daemon manually,
run the "etmstop" on page 1821 and then
"etmstart" on page 1820 commands.
log {on | off | stat} Controls the state of QoS logging in the Security
Gateway kernel:
n on - Enables the QoS logging (default)
n off - Disables the QoS logging
n stat - Shows the current QoS logging status
You can disable the QoS logging to save resources
without reinstalling the QoS policy.
Parameter Description
stat [-h] Shows the status of the QoS Software Blade and policy
on the Security Gateway.
The -h parameter shows the built-in usage for the
"stat" parameter.
Important - This command is outdated and exists
only for backward compatibility with very old
versions. Use the ""cpstat" on page 958" command.
Examples
Example 1 - Fetching the QoS policy based on the $FWDIR/conf/masters file
[Expert@MyGW]# fgate fetch -f
Fetching QoS Software Blade Policy:
Received Policy. Downloading...
eth0(inbound), eth0(outbound).
Download OK.
Done.
[Expert@MyGW]#
Example 2 - Fetching the QoS policy from the Management Server specified by its IP address
[Expert@MyGW]# fgate fetch 192.168.3.240
Fetching QoS Software Blade Policy:
Received Policy. Downloading...
eth0(inbound), eth0(outbound).
Download OK.
Done.
[Expert@MyGW]#
Interface table
----------------------------------------------------------------
|Name|Dir|Limit (Bps)|Avg Rate (Bps)|Conns|Pend pkts|Pend bytes|
----------------------------------------------------------------
|eth0|in | 1250000000| 0| 0| 0| 0|
|eth0|out| 1250000000| 0| 0| 0| 0|
----------------------------------------------------------------
[Expert@MyGW]#
IPS Commands
For more information about IPS, see the R80.40 Threat Prevention Administration Guide.
IPS commands let you configure and show the IPS on the Security Gateway without installing
a new policy.
Important - Changes in the IPS configuration made with these commands are not persistent. If
you install a policy or restart the Security Gateway, the changes are deleted.
ips
Description
Shows various information about the IPS Software Blade.
Controls the IPS Software Blade.
Syntax
ips
bypass <options>
debug <options>
off
on
pmstats <options>
refreshcap
stat
stats <options>
Parameters
Parameter Description
Parameter Description
stats <options> Shows statistics for the IPS performance and Pattern Matcher.
See "ips stats" on page 1841.
ips bypass
Description
Controls the IPS Bypass mode:
n When CPU and/or Memory utilization reaches the configured higher threshold, IPS
Software Blade disables itself.
n When CPU and/or Memory utilization goes down to the configured lower threshold, IPS
Software Blade enables itself.
Syntax
ips bypass
off
on
set <options>
stat
Parameters
Parameter Description
Parameter Description
set Configures the utilization thresholds (in per cent), at which to engage
<options> (higher threshold) or disengage (lower threshold) the IPS Bypass mode.
The available options are:
n Configure the lower CPU threshold:
ips bypass set cpu low <0-100>
n Configure the higher CPU threshold:
ips bypass set cpu high <0-100>
n Configure the lower Memory threshold:
ips bypass set mem low <0-100>
n Configure the higher Memory threshold:
ips bypass set mem high <0-100>
Example:
ips bypass set cpu low 80
ips debug
Description
Collects the IPS debug information.
Note - For information about the kernel debug, see the R80.40 Quantum Security
Gateway Guide - Chapter Kernel Debug on Security Gateway.
Syntax
Parameters
Parameter Description
-o <Output Specifies the path and the name of the output debug file.
File>
Example
ips debug -o /var/log/IPS_debug.txt
ips off
Description
Disables the IPS Software Blade on-the-fly.
Syntax
ips off
Example 1
[Expert@MyGW:0]# ips off
IPS is disabled
Please note that for the configuration to apply for connections from existing templates, you have to run this command with -n flag which
deletes existing templates.
Without '-n', it will fully take effect in a few minutes.
[Expert@MyGW:0]#
Example 2
[Expert@MyGW:0]# ips off -n
IPS is disabled
Deleting templates
ips on
Description
Enables the IPS Software Blade on-the-fly, if it was disabled with the ""ips off" on page 1836"
command.
Syntax
ips on [-n]
Example 1
[Expert@MyGW:0]# ips on
IPS is enabled
Please note that for the configuration to apply for connections from existing templates, you have to run this command with -n flag which
deletes existing templates.
Without '-n', it will fully take effect in a few minutes.
[Expert@MyGW:0]#
Example 2
[Expert@MyGW:0]# ips on -n
IPS is enabled
Deleting templates
ips pmstats
ips refreshcap
Description
After you install a new policy, the IPS Software Blade captures the first packet for each IPS
protection and saves it in the packet capture repository.
This command refreshes the packet capture repository.
The IPS designates the next packet of each IPS protection as the first packet.
The new first packet replaces the previous one in the packet capture repository.
Syntax
ips refreshcap
Example
ips stat
Description
Shows this information:
n IPS Status (Enabled or Disabled)
n IPS Update Version
n Global Detect (On or Off)
n Bypass Under Load (On or Off)
Syntax
ips stat
Example
Note - The section "Active Profiles:" is available only from R80.40 Jumbo
Hotfix Accumulator Take 91.
ips stats
Description
This tool generates a report that includes both IPS and Pattern Matcher statistics.
The report can help administrators and protection writers analyze, which IPS protections or
IPS components cause performance issues.
The output files are located in the $FWDIR/ips/statistics_results/ directory.
On a Standalone, the tool creates a directory for each specified IP address.
The output files are:
File Description
tier1_output_file.csv Contains the statistics for the Pattern Matcher first tier.
Syntax
ips stats -h
ips stats
ips stats <Seconds>
ips stats -g <Seconds>
ips stats <IP Address of Gateway>
ips stats <IP Address of Gateway> <Seconds>
ips stats <IP Address of Gateway> -m
Important - To generate a report on a VSX Gateway, you must use the Manual Mode.
Parameters
Parameter Description
ips stats <IP Collects the IPS and Pattern Matcher statistics for the Security
Address of Gateway with the main specified IP address during 20 seconds.
Gateway>
ips stats <IP Collects the IPS and Pattern Matcher statistics for the Security
Address of Gateway with the main specified IP address during the specified
Gateway> <Seconds> number of seconds.
Related SK article
sk43733: How to measure CPU time consumed by IPS protections.
Example 1 - Collect the statistics on the Security Gateway with IP address 192.168.20.14
during 40 seconds
Example 2- Collect the statistics on the current Security Gateway during 30 seconds
ips stats -g 30
Example - Analyze the statistics you collected from the Security Gateway with IP address
192.168.20.14
Monitoring Commands
For more information, see the R80.40 Logging and Monitoring Administration Guide.
This section contains commands for the Monitoring Software Blade (former SmartView
Monitor) on the Security Gateway / each Cluster Member.
rtm
Description
Controls the Monitoring Software Blade (former SmartView Monitor) on the Security Gateway
/ each Cluster Member.
Shows the information about the Monitoring Software Blade.
Syntax
rtm
debug <options>
drv <options>
monitor <options>
rtmd
stat <options>
ver <options>
Parameters
Parameter Description
"rtm drv" on page 1847 Starts, stops, or shows the status of the SmartView Monitor
kernel driver.
"rtm rtmd" on page 1854 Starts the SmartView Monitor daemon manually.
"rtm monitor" on Starts the monitoring process for an interface or a virtual link.
page 1848
"rtm stat" on page 1855 Shows information about the SmartView Monitor.
rtm debug
Description
Collects the SmartView Monitor debug information in the $FWDIR/log/rtmd.elg file on the
Security Gateway / each Cluster Member.
Syntax
Parameters
Parameter Description
Example
rtm drv
Description
Starts, stops, or shows the status of the SmartView Monitor kernel driver on the Security
Gateway / each Cluster Member.
Important - Do not run this command manually. Run the "rtmstart" on page 1859 and
"rtmstop" on page 1860 commands.
Syntax
rtm drv
off
on
stat
Parameters
Parameter Description
rtm monitor
Description
Starts the monitoring process for an interface or a Virtual Link on the Security Gateway / each
Cluster Member.
If options and grouping are not used, this command monitors all traffic, on all interfaces, in
both directions.
Syntax
Parameters
Parameter Description
Parameter Description
l 1 - regular
l 2 - permanent
l url_mod=host
l url_mod=host_path
l url_mod=path
l url_mod=scheme
l url_mod=scheme_host
Parameter Description
l wb - Shows wire-bytes
o acc=lineUtil
o acc=rate (default)
o acc=sum
l If <Value Type>=conn:
o acc=concurrent (default)
o acc=new
l If <Value Type>=pkt:
o acc=rate (default)
o acc=sum
l If <Value Type>=session:
o acc=new
l If <Value Type>=wb:
o acc=lineUtil
o acc=rate (default)
o acc=sum
l sort=bottom
l dir=out
l dir=both (default)
l enc=no
l enc=both (default)
Parameter Description
l 1 - regular
l 2- permanent
l url_mod=host
l url_mod=host_path
l url_mod=path
l url_mod=scheme
l url_mod=scheme_host
Parameter Description
Notes
n Use the tilde character "~~" to specify a subrule (rule~~subrule).
To monitor for the QoS Policy, use: rule~~fgrule
n The specified entities correspond to the specified grouping option.
For example, if the monitoring process works according to a service (svc), add all the
monitored services, separated by a space.
Examples
Example 1
This command shows top services (based on bytes per seconds) on external interfaces in
the inbound direction:
Example 2
This command shows top Access Control rules (based on average concurrent
connections):
Example 3
Example 4
This command shows bottom inbound IP addresses versus outbound IP addresses (based
on packets per interval):
Example 5
Example 6
This command shows packet size distribution (based on packets per interval):
Example 7
This command shows top URLs (based on sessions per seconds) - host part only:
rtm rtmd
Description
Starts the SmartView Monitor daemon manually on the Security Gateway / each Cluster
Member.
This also occurs manually when you run the "rtmstart" on page 1859 command.
Syntax
Parameters
Parameter Description
rtm stat
Description
Show this information on the Security Gateway / each Cluster Member:
n The status of the Monitoring Software Blade
n The status of the SmartView Monitor daemon
n The status of the SmartView Monitor driver
n Number of opened Virtual Links
n Number of opened Views
n Some performance counters
Syntax
rtm stat -h
rtm stat [vl | view] [perf [{on | off | reset}] [-i <Interval>] [-
r <View_ID>] [-v[v][v]]
Parameters
Parameter Description
Parameter Description
-i <Interval> The command runs in the loop and shows the output every
specified number of seconds.
Examples
Example 1
[Expert@MyGW:0]# rtm stat
-------------------------------------------------------
SmartView Monitor Status: Sun Mar 20 18:25:51 2022
-------------------------------------------------------
Product is Enabled
Daemon is ON
-------------------------------------------------------
Status for kernel instance 0
-------------------------------------------------------
Driver is ON
Open Virtual-Links: 0
Open Views: 0
-------------------------------------------------------
Status for kernel instance 1
-------------------------------------------------------
Driver is ON
Open Virtual-Links: 0
Open Views: 0
-------------------------------------------------------
Status for kernel instance ...
-------------------------------------------------------
... (truncated for brevity) ...
[Expert@MyGW:0]#
Example 2
[Expert@MyGW:0]# rtm stat view -vvv
-------------------------------------------------------
SmartView Monitor Status: Sun Mar 20 18:25:51 2022
-------------------------------------------------------
Product is Enabled
Daemon is ON
-------------------------------------------------------
Status for kernel instance 0
-------------------------------------------------------
Driver is ON
Open Virtual-Links: 0
Open Views: 0
-------------------------------------------------------
Status for kernel instance 1
-------------------------------------------------------
Driver is ON
Open Virtual-Links: 0
Open Views: 0
-------------------------------------------------------
Status for kernel instance ...
-------------------------------------------------------
... (truncated for brevity) ...
----------------------------------------------------------------
---------------------------
VIEW 1: svc | wb(rate) interval: 2 Seconds
60016,60016 | 5148
11008a,11008a | 229
Aggregate | 5377
Number of Entries(2)
Keys(-k svc acc=replace )
Values(-v wb acc=rate )
Sort(-s top )
Filter(-)
Daemon id:5 kernel id:0 timeUntilUpdate: 1 [Sec]
----------------------------------------------------------------
---------------------------
[Expert@MyGW:0]#
rtm ver
Description
Shows the SmartView Monitor version on the Security Gateway / each Cluster Member.
Syntax
Parameters
Parameter Description
rtmstart
Description
Loads the SmartView Monitor kernel module and starts the SmartView Monitor daemon on the
Security Gateway / each Cluster Member.
Syntax
rtmstart
rtmstop
Description
Kills the SmartView Monitor daemon and unloads the SmartView Monitor kernel module on the
Security Gateway / each Cluster Member.
Syntax
rtmstop
#!/bin/bash
source /etc/profile.d/CP.sh
#!/bin/bash
source /etc/profile.d/CP.sh
source $MDSDIR/scripts/MDSprofile.sh
source $MDS_SYSTEM/shared/mds_environment_utils.sh
source $MDS_SYSTEM/shared/sh_utilities.sh
#!/bin/bash
source /etc/profile.d/CP.sh
#!/bin/bash
source /etc/profile.d/CP.sh
source /etc/profile.d/vsenv.sh
Glossary
3
3rd-party Cluster
Cluster of Check Point Security Gateways that work together in a redundant
configuration. These Check Point Security Gateways are installed on X-Series XOS, or
IPSO OS. VRRP Cluster on Gaia OS is also considered a 3rd-party cluster. The 3rd-
party cluster handles the traffic, and Check Point Security Gateways perform only State
Synchronization.
Accelerated Path
Packet flow on the Host appliance, when the packet is completely handled by the
SecureXL device. It is processed and forwarded to the network.
Access Role
Access Role objects let you configure network access according to: Networks, Users
and user groups, Computers and computer groups, Remote Access Clients. After you
activate the Identity Awareness Software Blade, you can create Access Role objects and
use them in the Source and Destination columns of Access Control Policy rules.
Active
State of a Cluster Member that is fully operational: (1) In ClusterXL, this applies to the
state of the Security Gateway component (2) In 3rd-party / OPSEC cluster, this applies to
the state of the cluster State Synchronization mechanism.
Active-Active
A cluster mode (in versions R80.40 and higher), where cluster members are located in
different geographical areas (different sites, different cloud availability zones). This mode
supports the configuration of IP addresses from different subnets on all cluster
interfaces, including the Sync interfaces. Each cluster member inspects all traffic routed
to it and synchronizes the recorded connections to its peer cluster members. The traffic
is not balanced between the cluster members.
Active Up
ClusterXL in High Availability mode that was configured as Maintain current active
Cluster Member in the cluster object in SmartConsole: (1) If the current Active member
fails for some reason, or is rebooted (for example, Member_A), then failover occurs
between Cluster Members - another Standby member will be promoted to be Active (for
example, Member_B). (2) When former Active member (Member_A) recovers from a
failure, or boots, the former Standby member (Member_B) will remain to be in Active
state (and Member_A will assume the Standby state).
Active(!)
In ClusterXL, state of the Active Cluster Member that suffers from a failure. A problem
was detected, but the Cluster Member still forwards packets, because it is the only
member in the cluster, or because there are no other Active members in the cluster. In
any other situation, the state of the member is Down. Possible states: ACTIVE(!),
ACTIVE(!F) - Cluster Member is in the freeze state, ACTIVE(!P) - This is the Pivot
Cluster Member in Load Sharing Unicast mode, ACTIVE(!FP) - This is the Pivot Cluster
Member in Load Sharing Unicast mode and it is in the freeze state.
AD Query
Check Point clientless identity acquisition tool. It is based on Active Directory integration
and it is completely transparent to the user. The technology is based on querying the
Active Directory Security Event Logs and extracting the user and computer mapping to
the network address from them. It is based on Windows Management Instrumentation
(WMI), a standard Microsoft protocol. The Check Point Security Gateway communicates
directly with the Active Directory domain controllers and does not require a separate
server. No installation is necessary on the clients, or on the Active Directory server.
Affinity
The assignment of a specified CoreXL Firewall instance, VSX Virtual System, interface,
user space process, or IRQ to one or more specified CPU cores.
Anti-Bot
Check Point Software Blade on a Security Gateway that blocks botnet behavior and
communication to Command and Control (C&C) centers. Acronyms: AB, ABOT.
Anti-Spam
Check Point Software Blade on a Security Gateway that provides comprehensive
protection for email inspection. Synonym: Anti-Spam & Email Security. Acronyms: AS,
ASPAM.
Anti-Virus
Check Point Software Blade on a Security Gateway that uses real-time virus signatures
and anomaly-based protections from ThreatCloud to detect and block malware at the
Security Gateway before users are affected. Acronym: AV.
Application Control
Check Point Software Blade on a Security Gateway that allows granular control over
specific web-enabled applications by using deep packet inspection. Acronym: APPI.
ARP Forwarding
Forwarding of ARP Request and ARP Reply packets between Cluster Members by
encapsulating them in Cluster Control Protocol (CCP) packets. Introduced in R80.10
version.
Ask
UserCheck rule action that blocks traffic and files and shows a UserCheck message. The
user can agree to allow the activity.
Audit Log
Log that contains administrator actions on a Management Server (login and logout,
creation or modification of an object, installation of a policy, and so on).
Backup
(1) In VRRP Cluster on Gaia OS - State of a Cluster Member that is ready to be promoted
to Master state (if Master member fails). (2) In VSX Cluster configured in Virtual System
Load Sharing mode with three or more Cluster Members - State of a Virtual System on a
third (and so on) VSX Cluster Member. (3) A Cluster Member or Virtual System in this
state does not process any traffic passing through cluster.
Blocking Mode
Cluster operation mode, in which Cluster Member does not forward any traffic (for
example, caused by a failure).
Bot
Malicious software that neutralizes Anti-Virus defenses, connects to a Command and
Control center for instructions from cyber criminals, and carries out the instructions.
Bridge Mode
Security Gateway or Virtual System that works as a Layer 2 bridge device for easy
deployment in an existing topology.
Browser-Based Authentication
Authentication of users in Check Point Identity Awareness web portal - Captive Portal, to
which users connect with their web browser to log in and authenticate.
Burstiness
Data that is transferred or transmitted in short, uneven spurts. LAN traffic is typically
bursty. Opposite of streaming data.
Captive Portal
A Check Point Identity Awareness web portal, to which users connect with their web
browser to log in and authenticate, when using Browser-Based Authentication.
Cloud Credentials
Specific credentials from identity providers used by the Identity Collector to connect
seamlessly to the Infinity Portal. These credentials are essential for establishing a secure
and efficient connection between the Identity Client and the Infinity Portal.
Cloud Services
Refers to a centralized identities solution provided by Infinity Identity and Directory Sync.
These services offer identity management and directory synchronization capabilities,
hosted and managed in the cloud.
Cluster
Two or more Security Gateways that work together in a redundant configuration - High
Availability, or Load Sharing.
Cluster Interface
An interface on a Cluster Member, whose Network Type was set as Cluster in
SmartConsole in cluster object. This interface is monitored by cluster, and failure on this
interface will cause cluster failover.
Cluster Member
Security Gateway that is part of a cluster.
Cluster Mode
Configuration of Cluster Members to work in these redundant modes: (1) One Cluster
Member processes all the traffic - High Availability or VRRP mode (2) All traffic is
processed in parallel by all Cluster Members - Load Sharing.
Cluster Topology
Set of interfaces on all members of a cluster and their settings (Network Objective, IP
address / Net Mask, Topology, Anti-Spoofing, and so on).
ClusterXL
Cluster of Check Point Security Gateways that work together in a redundant
configuration. The ClusterXL both handles the traffic and performs State
Synchronization. These Check Point Security Gateways are installed on Gaia OS: (1)
ClusterXL supports up to 5 Cluster Members, (2) VRRP Cluster supports up to 2 Cluster
Members, (3) VSX VSLS cluster supports up to 13 Cluster Members. Note: In ClusterXL
Load Sharing mode, configuring more than 4 Cluster Members significantly decreases
the cluster performance due to amount of Delta Sync traffic.
Compliance
Check Point Software Blade on a Management Server to view and apply the Security
Best Practices to the managed Security Gateways. This Software Blade includes a
library of Check Point-defined Security Best Practices to use as a baseline for good
Security Gateway and Policy configuration.
Content Awareness
Check Point Software Blade on a Security Gateway that provides data visibility and
enforcement. Acronym: CTNT.
Cooperative Enforcement
Integration of an on-premises Harmony Endpoint Security Server and Security Gateway.
CoreXL
Performance-enhancing technology for Security Gateways on multi-core processing
platforms. Multiple Check Point Firewall instances are running in parallel on multiple
CPU cores.
CoreXL SND
Secure Network Distributer. Part of CoreXL that is responsible for: Processing incoming
traffic from the network interfaces; Securely accelerating authorized packets (if
SecureXL is enabled); Distributing non-accelerated packets between Firewall kernel
instances (SND maintains global dispatching table, which maps connections that were
assigned to CoreXL Firewall instances). Traffic distribution between CoreXL Firewall
instances is statically based on Source IP addresses, Destination IP addresses, and the
IP 'Protocol' type. The CoreXL SND does not really "touch" packets. The decision to stick
to a particular FWK daemon is done at the first packet of connection on a very high level,
before anything else. Depending on the SecureXL settings, and in most of the cases, the
SecureXL can be offloading decryption calculations. However, in some other cases,
such as with Route-Based VPN, it is done by FWK daemon.
CPHA
General term in Check Point Cluster that stands for Check Point High Availability
(historic fact: the first release of ClusterXL supported only High Availability) that is used
only for internal references (for example, inside kernel debug) to designate ClusterXL
infrastructure.
CPUSE
Check Point Upgrade Service Engine for Gaia Operating System. With CPUSE, you can
automatically update Check Point products for the Gaia OS, and the Gaia OS itself.
Critical Device
A special software device on each Cluster Member, through which the critical aspects for
cluster operation are monitored. When the critical monitored component on a Cluster
Member fails to report its state on time, or when its state is reported as problematic, the
state of that member is immediately changed to Down. The complete list of the
configured critical devices (pnotes) is printed by the 'cphaprob -ia list' command or 'show
cluster members pnotes all' command. Synonyms: Pnote, Problem Notification.
Custom Report
User-defined report for a Check Point product, typically based on a predefined report.
DAIP Gateway
Dynamically Assigned IP (DAIP) Security Gateway is a Security Gateway, on which the
IP address of the external interface is assigned dynamically by the ISP.
Data Type
Classification of data in a Check Point Security Policy for the Content Awareness
Software Blade.
Dead
State reported by a Cluster Member when it goes out of the cluster (due to 'cphastop'
command (which is a part of 'cpstop'), or reboot).
Decision Function
A special cluster algorithm applied by each Cluster Member on the incoming traffic in
order to decide, which Cluster Member should process the received packet. Each
Cluster Members maintains a table of hash values generated based on connections
tuple (source and destination IP addresses/Ports, and Protocol number).
Delta Sync
Synchronization of kernel tables between all working Cluster Members - exchange of
CCP packets that carry pieces of information about different connections and operations
that should be performed on these connections in relevant kernel tables. This Delta Sync
process is performed directly by Check Point kernel. While performing Full Sync, the
Delta Sync updates are not processed and saved in kernel memory. After Full Sync is
complete, the Delta Sync packets stored during the Full Sync phase are applied by order
of arrival.
Detect
UserCheck rule action that allows traffic and files to enter the internal network and logs
them.
Directory Sync
Abstracts identity providers by offering a unified schema and a single API, consolidating
all logic in one centralized location.
Distributed Deployment
Configuration in which the Check Point Security Gateway and the Security Management
Server products are installed on different computers.
Down
State of a Cluster Member during a failure when one of the Critical Devices reports its
state as "problem": In ClusterXL, applies to the state of the Security Gateway
component; in 3rd-party / OPSEC cluster, applies to the state of the State
Synchronization mechanism. A Cluster Member in this state does not process any traffic
passing through cluster.
Dying
State of a Cluster Member as assumed by peer members, if it did not report its state for
0.7 second.
Dynamic Object
Special object type, whose IP address is not known in advance. The Security Gateway
resolves the IP address of this object in real time.
Encryption Domain
The networks that a Security Gateway protects and for which it encrypts and decrypts
VPN traffic.
Event
Record of a security or network incident that is based on one or more logs, and on a
customizable set of rules that are defined in the Event Policy.
Event Correlation
Procedure that extracts, aggregates, correlates, and analyzes events from the logs.
Event Policy
Set of rules that define the behavior of SmartEvent.
Expert Mode
The name of the elevated command line shell that gives full system root permissions in
the Check Point Gaia operating system.
F2F
Denotes non-VPN connections that SecureXL forwarded to firewall. See "Firewall Path".
Failback
Recovery of a Cluster Member that suffered from a failure. The state of a recovered
Cluster Member is changed from Down to either Active, or Standby (depending on
Cluster Mode). Synonym: Fallback.
Failed Member
A Cluster Member that cannot send or accept traffic because of a hardware or software
problem.
Failover
Transferring of a control over traffic (packet filtering) from a Cluster Member that suffered
a failure to another Cluster Member (based on internal cluster algorithms). Synonym:
Fail-over.
Failure
A hardware or software problem that causes a Security Gateway to be unable to serve
as a Cluster Member (for example, one of cluster interface has failed, or one of the
monitored daemon has crashed). Cluster Member that suffered from a failure is declared
as failed, and its state is changed to Down (a physical interface is considered Down only
if all configured VLANs on that physical interface are Down).
Firewall Path
Packet flow on the Host Security Appliance, when the SecureXL device is unable to
process the packet. The packet is passed to the CoreXL layer and then to one of the
CoreXL Firewall instances for full processing. This path also processes all packets when
SecureXL is disabled. Synonym: Slow Path.
Flapping
Consequent changes in the state of either cluster interfaces (cluster interface flapping),
or Cluster Members (Cluster Member flapping). Such consequent changes in the state
are seen in the 'Logs & Monitor' > 'Logs' (if in SmartConsole > cluster object, the cluster
administrator set the 'Track changes in the status of cluster members' to 'Log').
Forwarding
Process of transferring of an incoming traffic from one Cluster Member to another
Cluster Member for processing. There are two types of forwarding the incoming traffic
between Cluster Members - Packet forwarding and Chain forwarding. For more
information, see "Forwarding Layer in Cluster" and "ARP Forwarding".
Forwarding Layer
The Forwarding Layer is a ClusterXL mechanism that allows a Cluster Member to pass
packets to peer Cluster Members, after they have been locally inspected by the firewall.
This feature allows connections to be opened from a Cluster Member to an external host.
Packets originated by Cluster Members are hidden behind the Cluster Virtual IP address.
Thus, a reply from an external host is sent to the cluster, and not directly to the source
Cluster Member. This can pose problems in the following situations: (1) The cluster is
working in High Availability mode, and the connection is opened from the Standby
Cluster Member. All packets from the external host are handled by the Active Cluster
Member, instead. (2) The cluster is working in a Load Sharing mode, and the decision
function has selected another Cluster Member to handle this connection. This can
happen since packets directed at a Cluster IP address are distributed between Cluster
Members as with any other connection. If a Cluster Member decides, upon the
completion of the firewall inspection process, that a packet is intended for another
Cluster Member, it can use the Forwarding Layer to hand the packet over to that Cluster
Member. In High Availability mode, packets are forwarded over a Synchronization
network directly to peer Cluster Members. It is important to use secured networks only,
as encrypted packets are decrypted during the inspection process, and are forwarded as
clear-text (unencrypted) data. In Load Sharing mode, packets are forwarded over a
regular traffic network. Packets that are sent on the Forwarding Layer use a special
source MAC address to inform the receiving Cluster Member that they have already
been inspected by another Cluster Member. Thus, the receiving Cluster Member can
safely hand over these packets to the local Operating System, without further inspection.
Full Sync
Process of full synchronization of applicable kernel tables by a Cluster Member from the
working Cluster Member(s) when it tries to join the existing cluster. This process is meant
to fetch a "snapshot" of the applicable kernel tables of already Active Cluster Member(s).
Full Sync is performed during the initialization of Check Point software (during boot
process, the first time the Cluster Member runs policy installation, during 'cpstart', during
'cphastart'). Until the Full Sync process completes successfully, this Cluster Member
remains in the Down state, because until it is fully synchronized with other Cluster
Members, it cannot function as a Cluster Member. Meanwhile, the Delta Sync packets
continue to arrive, and the Cluster Member that tries to join the existing cluster, stores
them in the kernel memory until the Full Sync completes. The whole Full Sync process is
performed by fwd daemons on TCP port 256 over the Sync network (if it fails over the
Sync network, it tries the other cluster interfaces). The information is sent by fwd
daemons in chunks, while making sure they confirm getting the information before
sending the next chunk. Also see "Delta Sync".
Gaia
Check Point security operating system that combines the strengths of both
SecurePlatform and IPSO operating systems.
Gaia Clish
The name of the default command line shell in Check Point Gaia operating system. This
is a restricted shell (role-based administration controls the number of commands
available in the shell).
Gaia Portal
Web interface for the Check Point Gaia operating system.
Geo Cluster
A High Availability cluster mode (in versions R81.20 and higher), where cluster members
are located in different cloud availability zones. This mode supports the configuration of
IP addresses from different subnets on all cluster interfaces, including the Sync
interfaces. The Active cluster member inspects all traffic routed to the cluster and
synchronizes the recorded connections to its peer cluster members. The traffic is not
balanced between the cluster members. See "High Availability".
Global Domain
Domain on a Multi-Domain Security Management Server, on which the Multi-Domain
Server administrator creates and manages objects, security policies and settings that
apply to the entire Multi-Domain Security Management environment.
Global Objects
On a Multi-Domain Security Management Server, all objects defined in the Global
Domain. You can use this objects in a Global Policy or Local Policies on Domains.
Global Policy
On a Multi-Domain Security Management Server, a policy defined in the Global Domain.
You can assigns this Global Policy to Domains.
HA not started
Output of the 'cphaprob <flag>' command or 'show cluster <option>' command on the
Cluster Member. This output means that Check Point clustering software is not started
on this Security Gateway (for example, this machine is not a part of a cluster, or
'cphastop' command was run, or some failure occurred that prevented the ClusterXL
product from starting correctly).
High Availability
A redundant cluster mode, where only one Cluster Member (Active member) processes
all the traffic, while other Cluster Members (Standby members) are ready to be promoted
to Active state if the current Active member fails. In the High Availability mode, the
Cluster Virtual IP address (that represents the cluster on that network) is associated: (1)
With physical MAC Address of Active member (2) With virtual MAC Address. Synonym:
Active/Standby. Acronym: HA.
Hotfix
Software package installed on top of the current software version to fix a wrong or
undesired behavior, and to add a new behavior.
HTTPS Inspection
Feature on a Security Gateway that inspects traffic encrypted by the Secure Sockets
Layer (SSL) protocol for malware or suspicious patterns. Synonym: SSL Inspection.
Acronyms: HTTPSI, HTTPSi.
HTU
Stands for "HA Time Unit". All internal time in ClusterXL is measured in HTUs (the times
in cluster debug also appear in HTUs). Formula in the Check Point software: 1 HTU = 10
x fwha_timer_base_res = 10 x 10 milliseconds = 100 ms.
Hybrid
Starting in R80.20, on Security Gateways with 40 or more CPU cores, Software Blades
run in the user space (as 'fwk' processes). The Hybrid Mode refers to the state when you
upgrade Cluster Members from R80.10 (or below) to R80.20 (or above). The Hybrid
Mode is the state, in which the upgraded Cluster Members already run their Software
Blades in the user space (as fwk processes), while other Cluster Members still run their
Software Blades in the kernel space (represented by the fw_worker processes). In the
Hybrid Mode, Cluster Members are able to synchronize the required information.
ICA
Internal Certificate Authority. A component on Check Point Management Server that
issues certificates for authentication.
ICAP Client
The ICAP Client functionality in your Security Gateway or Cluster (in versions R80.40
and higher) enables it to interact with an ICAP Server responses (see RFC 3507), modify
their content, and block the matched HTTP connections.
ICAP Server
The ICAP Server functionality in your Security Gateway or Cluster (in versions R80.40
and higher) enables it to interact with an ICAP Client requests, send the files for
inspection, and return the verdict.
Identity Agent
Check Point dedicated client agent installed on Windows-based user endpoint
computers. This Identity Agent acquires and reports identities to the Check Point Identity
Awareness Security Gateway. The administrator configures the Identity Agents (not the
end users). There are two types of Identity Agents - Full and Light. You can download the
Full and Light Identity Agent package from the Captive Portal - 'https://<Gateway_IP_
Address>/connect' or from Support Center.
Identity Awareness
Check Point Software Blade on a Security Gateway that enforces network access and
audits data based on network location, the identity of the user, and the identity of the
computer. Acronym: IDA.
Identity Broker
Identity Sharing mechanism between Identity Servers (PDP): (1) Communication
channel between PDPs based on Web-API (2) Identity Sharing capabilities between
PDPs - ability to add, remove, and update the identity session.
Identity Collector
Check Point dedicated client agent installed on Windows Servers in your network.
Identity Collector collects information about identities and their associated IP addresses,
and sends it to the Check Point Security Gateways for identity enforcement. You can
download the Identity Collector package from Support Center.
Identity Logging
Check Point Software Blade on a Management Server to view Identity Logs from the
managed Security Gateways with enabled Identity Awareness Software Blade.
Identity Server
Check Point Security Gateway with enabled Identity Awareness Software Blade.
Indicator
Pattern of relevant observable malicious activity in an operational cyber domain, with
relevant information on how to interpret it and how to handle it.
Infinity Identity
A centralized solution for identity-based security. It aggregates identity information from
various sources, including identity providers and Check Point products, and supplies this
information to users.
Init
State of a Cluster Member in the phase after the boot and until the Full Sync completes.
A Cluster Member in this state does not process any traffic passing through cluster.
Inline Layer
Set of rules used in another rule in Security Policy.
Internal Network
Computers and resources protected by the Firewall and accessed by authenticated
users.
IoC
Indicator of Compromise. Artifact observed on a network or in an operating system that,
with high confidence, indicates a computer intrusion. Typical IoCs are virus signatures
and IP addresses, MD5 hashes of Malware files, or URLs or domain names of botnet
command and control servers. Identified through a process of incident response and
computer forensics, intrusion detection systems and anti-virus software can use IoC's to
detect future attacks.
IP Tracking
Collecting and saving of Source IP addresses and Source MAC addresses from
incoming IP packets during the probing. IP tracking is a useful for Cluster Members to
determine whether the network connectivity of the Cluster Member is acceptable.
IP Tracking Policy
Internal setting that controls, which IP addresses should be tracked during IP tracking:
(1) Only IP addresses from the subnet of cluster VIP, or from subnet of physical cluster
interface (this is the default) (2) All IP addresses, also outside the cluster subnet.
IPS
Check Point Software Blade on a Security Gateway that inspects and analyzes packets
and data for numerous types of risks (Intrusion Prevention System).
IPsec VPN
Check Point Software Blade on a Security Gateway that provides a Site to Site VPN and
Remote Access VPN access.
IRQ Affinity
A state of binding an IRQ to one or more CPU cores.
Jitter
Variation in the delay of received packets. On the sending side, packets are spaced
evenly apart and sent in a continuous stream. On the receiving side, the delay between
each packet can vary according to network congestion, improper queuing or
configuration errors.
Kerberos
An authentication server for Microsoft Windows Active Directory Federation Services
(ADFS).
LLQ
Low Latency Queuing is a feature developed by Cisco to bring strict priority queuing (PQ)
to class-based weighted fair queuing (CBWFQ). LLQ allows delay-sensitive data (such
as voice) to be given preferential treatment over other traffic by letting the data to be
dequeued and sent first.
Load Sharing
A redundant cluster mode, where all Cluster Members process all incoming traffic in
parallel. For more information, see "Load Sharing Multicast Mode" and "Load Sharing
Unicast Mode". Synonyms: Active/Active, Load Balancing mode. Acronym: LS.
Log Server
Dedicated Check Point server that runs Check Point software to store and process logs.
Malware Database
The Check Point database of commonly used signatures, URLs, and their related
reputations, installed on a Security Gateway and used by the ThreatSpect engine.
Management Interface
(1) Interface on a Gaia Security Gateway or Cluster member, through which
Management Server connects to the Security Gateway or Cluster member. (2) Interface
on Gaia computer, through which users connect to Gaia Portal or CLI.
Management Server
Check Point Single-Domain Security Management Server or a Multi-Domain Security
Management Server.
Master
State of a Cluster Member that processes all traffic in cluster configured in VRRP mode.
Medium Path
Packet flow on the Host Security Appliance, when the packet is handled by the SecureXL
device. The CoreXL layer passes the packet to one of the CoreXL Firewall instances to
process it. Even when CoreXL is disabled, the SecureXL uses the CoreXL infrastructure
to send the packet to the single CoreXL Firewall instance that still functions. When the
Medium Path is available, the SecureXL fully accelerates the TCP handshake. Rule
Base match is achieved for the first packet through an existing connection acceleration
template. The SecureXL also fully accelerates the TCP [SYN-ACK] and TCP [ACK]
packets. However, once data starts to flow, to stream it for Content Inspection, an FWK
instance now handles the packets. The SecureXL sends all packets that contain data to
FWK for data extraction in order to build the data stream. Only the SecureXL handles the
TCP [RST], TCP [FIN] and TCP [FIN-ACK] packets, because they do not contain data
that needs to be streamed. The Medium Path is available only when CoreXL is enabled.
Exceptions are: IPS (some protections); VPN (in some configurations); Application
Control; Content Awareness; Anti-Virus; Anti-Bot; HTTPS Inspection; Proxy mode;
Mobile Access; VoIP; Web Portals. Synonym: PXL.
Mobile Access
Check Point Software Blade on a Security Gateway that provides a Remote Access VPN
access for managed and unmanaged clients. Acronym: MAB.
Multi-Domain Server
Dedicated Check Point server that runs Check Point software to host virtual Security
Management Servers called Domain Management Servers. Synonym: Multi-Domain
Security Management Server. Acronym: MDS.
Multi-Queue
An acceleration feature on Security Gateway that configures more than one traffic queue
for each network interface. Multi-Queue assigns more than one receive packet queue
(RX Queue) and more than one transmit packet queue (TX Queue) to an interface. Multi-
Queue is applicable only if SecureXL is enabled (this is the default). Acronym: MQ.
Multi-Version Cluster
The Multi-Version Cluster mechanism lets you synchronize connections between cluster
members that run different versions. This lets you upgrade to a newer version without a
loss in connectivity and lets you test the new version on some of the cluster members
before you decide to upgrade the rest of the cluster members. Acronym: MVC.
NAC
Network Access Control. This is an approach to computer security that attempts to unify
endpoint security technology (such as Anti-Virus, Intrusion Prevention, and Vulnerability
Assessment), user or system authentication and network security enforcement. Check
Point's Network Access Control solution is called Identity Awareness Software Blade.
Network Object
Logical object that represents different parts of corporate topology - computers, IP
addresses, traffic protocols, and so on. Administrators use these objects in Security
Policies.
Network Objective
Defines how the cluster will configure and monitor an interface - Cluster, Sync,
Cluster+Sync, Monitored Private, Non-Monitored Private. Configured in SmartConsole >
cluster object > 'Topology' pane > 'Network Objective'.
Non-Blocking Mode
Cluster operation mode, in which Cluster Member keeps forwarding all traffic.
Non-Monitored Interface
An interface on a Cluster Member, whose Network Type was set as Private in
SmartConsole, in cluster object.
Non-Pivot
A Cluster Member in the Unicast Load Sharing cluster that receives all packets from the
Pivot Cluster Member.
Non-Sticky Connection
A connection is called non-sticky, if the reply packet returns via a different Cluster
Member, than the original packet (for example, if network administrator has configured
asymmetric routing). In Load Sharing mode, all Cluster Members are Active, and in
Static NAT and encrypted connections, the Source and Destination IP addresses
change. Therefore, Static NAT and encrypted connections through a Load Sharing
cluster may be non-sticky.
Observable
Event or stateful property that can be observed in an operational cyber domain.
Open Server
Physical computer manufactured and distributed by a company, other than Check Point.
Package Repository
Collection of software packages that were uploaded to the Management Server. You can
easily install these packages in SmartConsole on the managed Security Gateways.
Packet Selection
Distinguishing between different kinds of packets coming from the network, and
selecting, which member should handle a specific packet (Decision Function
mechanism): CCP packet from another member of this cluster; CCP packet from another
cluster or from a Cluster; Member with another version (usually older version of CCP);
Packet is destined directly to this member; Packet is destined to another member of this
cluster; Packet is intended to pass through this Cluster Member; ARP packets.
PDP
Check Point Identity Awareness Security Gateway that acts as Policy Decision Point:
acquires identities from identity sources; shares identities with other gateways.
PEP
Check Point Identity Awareness Security Gateway that acts as Policy Enforcement
Point: receives identities via identity sharing; redirects users to Captive Portal.
Permission Profile
Predefined group of SmartConsole access permissions assigned to Domains and
administrators. With this feature you can configure complex permissions for many
administrators with one definition.
Pingable Host
Some host (that is, some IP address) that Cluster Members can ping during probing
mechanism. Pinging hosts in an interface's subnet is one of the health checks that
ClusterXL mechanism performs. This pingable host will allow the Cluster Members to
determine with more precision what has failed (which interface on which member). On
Sync network, usually, there are no hosts. In such case, if switch supports this, an IP
address should be assigned on the switch (for example, in the relevant VLAN). The IP
address of such pingable host should be assigned per this formula: IP_of_pingable_host
= IP_of_physical_interface_on_member + ~10. Assigning the IP address to pingable
host that is higher than the IP addresses of physical interfaces on the Cluster Members
will give some time to Cluster Members to perform the default health checks. Example:
IP address of physical interface on a given subnet on Member_A is 10.20.30.41; IP
address of physical interface on a given subnet on Member_B is 10.20.30.42; IP address
of pingable host should be at least 10.20.30.5
Pivot
A Cluster Member in the Unicast Load Sharing cluster that receives all packets. Cluster
Virtual IP addresses are associated with Physical MAC Addresses of this Cluster
Member. This Pivot Cluster Member distributes the traffic between other Non-Pivot
Cluster Members.
Policy Layer
Layer (set of rules) in a Security Policy.
Policy Package
Collection of different types of Security Policies, such as Access Control, Threat
Prevention, QoS, and Desktop Security. After installation, Security Gateways enforce all
Policies in the Policy Package.
Preconfigured Mode
Cluster Mode, where cluster membership is enabled on all Cluster Members to be.
However, no policy had been yet installed on any of the Cluster Members - none of them
is actually configured to be primary, secondary, and so on. The cluster cannot function, if
one Cluster Member fails. In this scenario, the "preconfigured mode" takes place. The
preconfigured mode also comes into effect when no policy is yet installed, right after the
Cluster Members came up after boot, or when running the 'cphaconf init' command.
Predefined Report
Default report included in a Check Point product that you can run right out of the box.
Prevent
UserCheck rule action that blocks traffic and files and can show a UserCheck message.
Primary Up
ClusterXL in High Availability mode that was configured as Switch to higher priority
Cluster Member in the cluster object in SmartConsole: (1) Each Cluster Member is given
a priority (SmartConsole > cluster object > 'Cluster Members' pane). Cluster Member
with the highest priority appears at the top of the table, and Cluster Member with the
lowest priority appears at the bottom of the table. (2) The Cluster Member with the
highest priority will assume the Active state. (3) If the current Active Cluster Member with
the highest priority (for example, Member_A), fails for some reason, or is rebooted, then
failover occurs between Cluster Members. The Cluster Member with the next highest
priority will be promoted to be Active (for example, Member_B). (4) When the Cluster
Member with the highest priority (Member_A) recovers from a failure, or boots, then
additional failover occurs between Cluster Members. The Cluster Member with the
highest priority (Member_A) will be promoted to Active state (and Member_B will return
to Standby state).
Private Interface
An interface on a Cluster Member, whose Network Type was set as 'Private' in
SmartConsole in cluster object. This interface is not monitored by cluster, and failure on
this interface will not cause any changes in Cluster Member's state.
Probing
If a Cluster Member fails to receive status for another member (does not receive CCP
packets from that member) on a given segment, Cluster Member will probe that segment
in an attempt to illicit a response. The purpose of such probes is to detect the nature of
possible interface failures, and to determine which module has the problem. The
outcome of this probe will determine what action is taken next (change the state of an
interface, or of a Cluster Member).
Provisioning
Check Point Software Blade on a Management Server that manages large-scale
deployments of Check Point Security Gateways using configuration profiles. Synonyms:
SmartProvisioning, SmartLSM, Large-Scale Management, LSM.
PSL
Passive Streaming Library. Packets may arrive at Security Gateway out of order, or may
be legitimate retransmissions of packets that have not yet received an acknowledgment.
In some cases, a retransmission may also be a deliberate attempt to evade IPS
detection by sending the malicious payload in the retransmission. Security Gateway
ensures that only valid packets are allowed to proceed to destinations. It does this with
the Passive Streaming Library (PSL) technology. (1) The PSL is an infrastructure layer,
which provides stream reassembly for TCP connections. (2) The Security Gateway
makes sure that TCP data seen by the destination system is the same as seen by code
above PSL. (3) The PSL handles packet reordering, congestion, and is responsible for
various security aspects of the TCP layer, such as handling payload overlaps, some DoS
attacks, and others. (4) The PSL is capable of receiving packets from the Firewall chain
and from the SecureXL. (5) The PSL serves as a middleman between the various
security applications and the network packets. It provides the applications with a
coherent stream of data to work with, free of various network problems or attacks. (6)
The PSL infrastructure is wrapped with well-defined APIs called the Unified Streaming
APIs, which are used by the applications to register and access streamed data.
PSLXL
Technology name for combination of SecureXL and PSL (Passive Streaming Library) in
versions R80.20 and higher. In versions R80.10 and lower, this technology was called
PXL (PacketXL).
Publisher PDP
Check Point Identity Awareness Security Gateway that gets identities from an identity
source/remote PDP and shares identities to a remote PDP. The Publisher PDP: (1)
Initiates an HTTPS connection to the Subscriber PDP for each Identity to be shared (2)
Verifies the CN and OU present in the subject field of the certificate presented (3)
Verifies that the CA's certificate matches the certificate that was approved in advance by
the administrator (4) Checks if the certificate presented is revoked (5) Shares identities
including the information about user(s), machine(s) and Access Roles in the form of
HTTP POST requests.
QoS
Check Point Software Blade on a Security Gateway that provides policy-based traffic
bandwidth management to prioritize business-critical traffic and guarantee bandwidth
and control latency.
RDED
Retransmit Detect Early Drop. The bottleneck that results from the connection of a LAN
to the WAN causes TCP to retransmit packets. RDED prevents inefficiencies by
detecting retransmits in TCP streams and preventing the transmission of redundant
packets when multiple copies of a packet are concurrently queued on the same flow.
Ready
State of a Cluster Member during after initialization and before promotion to the next
required state - Active / Standby / VRRP Master / VRRP Backup (depending on Cluster
Mode). A Cluster Member in this state does not process any traffic passing through
cluster. A member can be stuck in this state due to several reasons.
Report
Summary of network activity and Security Policy enforcement that is generated by Check
Point products, such as SmartEvent.
Route-Based VPN
A routing method for participants in a VPN community, defined by network routes.
Rule
Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause
specified actions to be taken for a communication session.
Rule Base
All rules configured in a given Security Policy. Synonym: Rulebase.
Same VMAC
Same Virtual MAC Address (see "VMAC"). When this feature is enabled in a ClusterXL
(in the High Availability or Load Sharing Unicast mode), the Cluster Members use Virtual
MAC (VMAC) addresses on the cluster interfaces instead of the real MAC addresses.
Cluster interfaces that belong to the same subnet get the same VMAC address instead
of their real MAC address. This feature helps avoid issues during the cluster operation,
when switches block ports connected to the Cluster Members.
SecureXL
Check Point product on a Security Gateway that accelerates IPv4 and IPv6 traffic that
passes through a Security Gateway.
Security Gateway
Dedicated Check Point server that runs Check Point software to inspect traffic and
enforce Security Policies for connected network resources.
Security Policy
Collection of rules that control network traffic and enforce organization guidelines for
data protection and access to resources with packet inspection.
Selection
The packet selection mechanism is one of the central and most important components in
the ClusterXL product and State Synchronization infrastructure for 3rd-party clustering
solutions. Its main purpose is to decide (to select) correctly what has to be done to the
incoming and outgoing traffic on the Cluster Member. (1) In ClusterXL, the packet is
selected by Cluster Member(s) depending on the cluster mode: In HA modes - by Active
member; In LS Unicast mode - by Pivot member; In LS Multicast mode - by all members.
Then the Cluster Member applies the Decision Function (and the Cluster Correction
Layer). (2) In 3rd-party / OPSEC cluster, the 3rd-party software selects the packet, and
Check Point software just inspects it (and performs State Synchronization).
Service Account
In Microsoft® Active Directory, a user account created explicitly to provide a security
context for services running on Microsoft® Windows® Server.
SIC
Secure Internal Communication. The Check Point proprietary mechanism with which
Check Point computers that run Check Point software authenticate each other over SSL,
for secure communication. This authentication is based on the certificates issued by the
ICA on a Check Point Management Server.
Silent Standby
In the ClusterXL High Availability mode, this feature configures the Standby cluster
member to communicate only through the Active cluster member. This feature is useful
when it is necessary to connect from Standby cluster members to a host / server on the
network.
SmartConsole
Check Point GUI application used to manage a Check Point environment - configure
Security Policies, configure devices, monitor products and events, install updates, and
so on.
SmartDashboard
Legacy Check Point GUI client used to create and manage the security settings in
versions R77.30 and lower. In versions R80.X and higher is still used to configure
specific legacy settings.
SmartEvent Server
Dedicated Check Point server with the enabled SmartEvent Software Blade that hosts
the events database.
SmartProvisioning
Check Point Software Blade on a Management Server (the actual name is
"Provisioning") that manages large-scale deployments of Check Point Security
Gateways using configuration profiles. Synonyms: Large-Scale Management,
SmartLSM, LSM.
SmartUpdate
Legacy Check Point GUI client used to manage licenses and contracts in a Check Point
environment.
Software Blade
Specific security solution (module): (1) On a Security Gateway, each Software Blade
inspects specific characteristics of the traffic (2) On a Management Server, each
Software Blade enables different management capabilities.
Standalone
Configuration in which the Security Gateway and the Security Management Server
products are installed and configured on the same server.
Standby
State of a Cluster Member that is ready to be promoted to Active state (if the current
Active Cluster Member fails). Applies only to ClusterXL High Availability Mode.
State Synchronization
Technology that synchronizes the relevant information about the current connections
(stored in various kernel tables on Check Point Security Gateways) among all Cluster
Members over Synchronization Network. Due to State Synchronization, the current
connections are not cut off during cluster failover.
Sticky Connection
A connection is called sticky, if all packets are handled by a single Cluster Member (in
High Availability mode, all packets reach the Active Cluster Member, so all connections
are sticky).
STIX
Structured Threat Information eXpression™. A language that describes cyber threat
information in a standardized and structured way.
Subscriber PDP
Check Point Identity Awareness Security Gateway that gets identities from a remote
PDP. The Subscriber PDP: (1) Presents the configured SSL certificate to the Publisher
PDP (2) Receives the information from the Publisher PDP after verifying the pre-shared
secret in the POST requests.
Subscribers
User Space processes that are made aware of the current state of the ClusterXL state
machine and other clustering configuration parameters. List of such subscribers can be
obtained by running the 'cphaconf debug_data' command.
Sync Interface
An interface on a Cluster Member, whose Network Type was set as Sync or
Cluster+Sync in SmartConsole in cluster object. This interface is monitored by cluster,
and failure on this interface will cause cluster failover. This interface is used for State
Synchronization between Cluster Members. The use of more than one Sync Interfaces
for redundancy is not supported because the CPU load will increase significantly due to
duplicate tasks performed by all configured Synchronization Networks. Synonyms:
Secured Interface, Trusted Interface.
Synchronization Network
A set of interfaces on Cluster Members that were configured as interfaces, over which
State Synchronization information will be passed (as Delta Sync packets ). The use of
more than one Synchronization Network for redundancy is not supported because the
CPU load will increase significantly due to duplicate tasks performed by all configured
Synchronization Networks. Synonyms: Sync Network, Secured Network, Trusted
Network.
System Counter
SmartView Monitor data or report on status, activity, and resource usage of Check Point
products.
Threat Emulation
Check Point Software Blade on a Security Gateway that monitors the behavior of files in
a sandbox to determine whether or not they are malicious. Acronym: TE.
Threat Extraction
Check Point Software Blade on a Security Gateway that removes malicious content from
files. Acronym: TEX.
ThreatCloud
The cyber intelligence center of all of Check Point products. Dynamically updated based
on an innovative global network of threat sensors and invites organizations to share
threat data and collaborate in the fight against modern malware.
ThreatCloud Repository
Cloud database with more than 250 million Command and Control (C&C) IP, URL, and
DNS addresses and over 2,000 different botnet communication patterns, used by the
ThreatSpect engine to classify bots and viruses. See:
https://www.checkpoint.com/infinity-vision/threatcloud/
ThreatSpect Engine
Unique multi-tiered engine that analyzes network traffic and correlates data across
multiple layers (reputation, signatures, suspicious mail outbreaks, behavior patterns) to
detect bots and viruses.
Transactions
In the context of the Identity Collector, involves the aggregation of events from identity
sources, the creation of a request, and the sending of this request to a target. The target
then replies with a response. A transaction refers to this request-response.
Updatable Object
Network object that represents an external service, such as Microsoft 365, AWS, Geo
locations, and more.
URL Filtering
Check Point Software Blade on a Security Gateway that allows granular control over
which web sites can be accessed by a given group of users, computers or networks.
Acronym: URLF.
User Database
Check Point internal database that contains all users defined and managed in
SmartConsole.
User Directory
Check Point Software Blade on a Management Server that integrates LDAP and other
external user management servers with Check Point products and security solutions.
User Group
Named group of users with related responsibilities.
User Template
Property set that defines a type of user on which a security policy will be enforced.
UserCheck
Functionality in your Security Gateway or Cluster and endpoint clients that gives users a
warning when there is a potential risk of data loss or security violation. This helps users
to prevent security incidents and to learn about the organizational security policy.
Virtual Device
Logical object that emulates the functionality of a type of physical network object. Virtual
Device can be on of these: Virtual Router, Virtual System, or Virtual Switch.
Virtual Router
Virtual Device on a VSX Gateway or VSX Cluster Member that functions as a physical
router. Acronym: VR.
Virtual Switch
Virtual Device on a VSX Gateway or VSX Cluster Member that functions as a physical
switch. Acronym: VSW.
Virtual System
Virtual Device on a VSX Gateway or VSX Cluster Member that implements the
functionality of a Security Gateway. Acronym: VS.
VMAC
Virtual MAC Address. When this feature is enabled in a ClusterXL (in the High
Availability or Load Sharing Unicast mode), the current Active or Pivot Cluster Member
sends Gratuitous ARP Requests (G-ARP) for its Cluster Virtual IP (VIP) addresses and
Virtual MAC (VMAC) addresses in G-ARP updates. Cluster Members create a VMAC
address for each Cluster VIP address. This feature helps avoid issues during a cluster
failover, when switches do not integrate G-ARP updates into their ARP cache table.
VPN Community
A named collection of VPN domains, each protected by a VPN gateway.
VPN Tunnel
An encrypted connection between two hosts using standard protocols (such as L2TP) to
encrypt traffic going in and decrypt it coming out, creating an encapsulated network
through which data can be safely shared as though on a physical private line.
VSX
Virtual System Extension. Check Point virtual networking solution, hosted on a computer
or cluster with virtual abstractions of Check Point Security Gateways and other network
devices. These Virtual Devices provide the same functionality as their physical
counterparts.
VSX Gateway
Physical server that hosts VSX virtual networks, including all Virtual Devices that provide
the functionality of physical network devices. It holds at least one Virtual System, which
is called VS0.
Warp Jump
If two Virtual Systems connect to the same Virtual Switch or Virtual Router, then
internally traffic that must pass from a network behind one Virtual System to a network
behind another Virtual System, "jumps" from one Virtual System to another Virtual
System without passing through the Virtual Switch or Virtual Router.
Warp Link
Logical interface that is created automatically in a VSX topology between: (1) Virtual
System and Virtual Switch (2) Virtual System and Virtual Router. Acronym: WRP.
WFQ
Weighted Fair Queuing. An algorithm to precisely control bandwidth allocation in QoS.
WFRED
Weighted Flow Random Early Drop. A mechanism for managing the packet buffers of
QoS. Adjusting automatically and dynamically to the network traffic situation, WFRED
remains transparent to the user.
Zero Phishing
Check Point Software Blade on a Security Gateway (R81.20 and higher) that provides
real-time phishing prevention based on URLs. Acronym: ZPH.