Description The fw
commands are used for working with various aspects of the firewall. All fw
commands are executed on the Check Point Security Gateway.
Typing fw
at the command prompt sends a list of available fw commands to the standard output.
Syntax
> fw
Description Generally, when Check Point Security gateway commands are executed on a Security gateway they will relate to the gateway as a whole, rather than to an individual kernel instance. For example, the fw tab
command will enable viewing or editing of a single table of information aggregated for all kernel instances.
This command specifies that certain commands apply to an individual kernel instance. By adding -i <kern>
after fw
in the command, where <kern>
is the kernel instance's number.
Syntax
> fw -i
applies to the following commands:
> fw ctl debug
(when used without the -buf
parameter) > fw ctl get
> fw ctl set
> fw ctl leak
> fw ctl pstat
> fw monitor
> fw tab
For details and additional parameters for any of these commands, refer to the command's entry.
Example To view the connections table for kernel instance #1 use the following command:
> fw -i 1 tab -t connections