In This Section: |
Description These commands execute operations on the ICA (Internal Certificate Authority).
Syntax
> cpca_client
Description Prompt the ICA to issue a SIC certificate for the Security Management server.
Syntax
> cpca_client [-d] create_cert [-p <ca_port>] -n "CN=<common name>" -f <PKCS12>
Parameter |
Description |
---|---|
|
Runs the command in debug mode |
|
Specifies the port used to connect to the CA (if the CA was not run from the default port 18209) |
|
Sets the CN to |
|
Specifies the file name, |
Description Revoke a certificate issued by the ICA.
Syntax
> cpca_client [-d] revoke_cert [-p <ca_port>] -n "CN=<common name>"
Parameter |
Description |
---|---|
|
Runs the command in debug mode |
|
Specifies the port which is used to connect to the CA (if the CA was not run from the default port 18209) |
|
Sets the CN to |
Description Show all certificates issued by the ICA.
Syntax
> cpca_client [-d] lscert [-dn <substring>] [-stat {Pending|Valid|Revoked|Expired|Renewed}] [-kind SIC|IKE|User|LDAP] [-ser <ser>] [-dp <dp>]
Parameter |
Description |
---|---|
|
Runs the command in debug mode |
|
Filters results to those with a DN that matches this |
|
Filters results to the specified certificate status: |
|
Filters results for specified kind: |
|
Filters results for this serial number |
|
Filters results from this CDP (certificate distribution point) |
Description Starts or stops the ICA Management Tool.
Syntax
> cpca_client [-d] set_mgmt_tool {on|off|add|remove|clean|print} [-p <ca_port>] [-no_ssl] {-a <administrator DN>, -u <user DN>, -c <custom user DN>, ...}
Parameter |
Description |
---|---|
|
Runs the command in debug mode. |
|
|
|
Specifies the port which is used to connect to the CA. The default port is |
|
Configures the server to use HTTP instead of HTTPS. |
|
Sets the DNs of the administrators that are permitted to use the ICA Management Tool. |
|
Sets the DNs of the users that are permitted to use the ICA Management Tool. |
|
Sets the DN for custom users that can use the ICA Management Tool. |
Comments
-a
or -u
the list of the permitted users and administrators isn't changed. The server can be stopped or started with the previously defined permitted users and administrators.Description Configure/reconfigure a Security Gateway installation. The configuration available options for any machine depend on the installed configuration and products.
Syntax
> cp_conf
Description Use the
commands to manage SIC on the Security Management Server.cp_conf sic
Syntax
> cp_conf sic state
> cp_conf sic init <key> [norestart]
> cp_conf sic cert_pull <management> <object>
Parameter |
Description |
---|---|
|
Shows the SIC trust state. |
|
Restarts SIC with the Activation Key <key>. |
|
By default, the Security Gateway runs |
|
For DAIP Security Gateways, pulls a certificate from the Security Management Server for the |
< |
Name or IP address of the Security Management Server |
Description Manage Check Point system administrators for the Security Management Server
Syntax
> cp_conf admin get # Get the list of administrators.
> cp_conf admin add <user> <pass> {a|w|r}
> cp_conf admin del <admin1> <admin2>...
Parameter |
Description |
---|---|
|
Shows a list of the administrators |
|
Adds a new administrator <user> with password <pass> |
|
Sets the permissions for the new administrator: a - Read, write and manage administrators w - Read and write r - Read only |
|
Deletes one or more administrators <admin1>, <admin2>, and so on |
Description Initialize the Certificate Authority
Syntax
> cp_conf ca init
> cp_conf ca fqdn <name>
Parameter |
Description |
---|---|
|
Initializes the internal CA |
|
Sets the FQDN of the internal CA to |
Description Displays the fingerprint which will be used on first-time launch to verify the identity of the Security Management server being accessed by the SmartConsole. This fingerprint is a text string derived from the Security Management server's certificate
Syntax
> cp_conf finger get
Description Shows the installed licenses and lets you manually add new ones.
Syntax
> cp_conf lic get
> cp_conf lic add -f <file>
> cp_conf lic add -m <Host> <Date> <Key> <SKU>
> cp_conf lic del <Signature Key>
Parameter |
Description |
---|---|
|
Shows the installed licenses |
|
Adds the license from |
|
Manually adds a license with these parameters:
|
|
Deletes license |
Description Manage the GUI clients that can use SmartConsoles to connect to the Security Management Server.
Syntax
> cp_conf client get # Get the GUI clients list
> cp_conf client add <GUI client> # Add one GUI Client
> cp_conf client del < GUI client 1> < GUI client 2>... # Delete GUI Clients
> cp_conf client createlist < GUI client 1> < GUI client 2>... # Create new list.
Parameter |
Description |
---|---|
|
Shows the IP addresses of the allowed GUI clients. |
|
Adds the |
|
Deletes one or more IP addresses from the list of allowed GUI clients. |
|
Deletes allowed GUI clients and creates a new list. The new list allows |
Description Enable or disable High Availability.
Syntax
> cp_conf ha {enable|disable} [norestart]
Description Activate or deactivate SNMP.
Syntax
> cp_conf snmp get # Get SNMP Extension status.
> cp_conf snmp {activate|deactivate} [norestart] # Deactivate SNMP Extension.
Parameter |
Description |
---|---|
|
Shows the SNMP status. |
|
Enables or disables SNMP. |
|
By default, the Security Gateway runs |
Description Configure the Security Gateway and Security Management Server products that start automatically when the appliance or server reboots.
Syntax
> cp_conf auto get [fw1] [fg1] [rm] [all]
> cp_conf auto {enable|disable} <product1> <product2>...
Parameter |
Description |
---|---|
|
Shows which products start automatically |
|
Enables or disables the one or more products that start automatically |
Description Enable or disable SecureXL acceleration.
Syntax
> cp_conf sxl {enable|disable}
Description Run a command line version of the Check Point Configuration Tool. This tool is used to configure an installed Check Point product. The options shown depend on the installed configuration and products. Amongst others, these options include:
Syntax `
> cpconfig
Further Info. See the R77 Installation and Upgrade Guide.
Description - CPinfo is a utility that collects data on a machine at the time of execution. The CPinfo output file enables Check Point's support engineers to analyze setups from a remote location. Engineers can open the CPinfo file in demo mode, while viewing real Security Policies and objects. This allows for in-depth analysis of all of configuration options and environment settings.
Syntax
> cpinfo [-v] [-l] [-n] [-o ] [-r | -t [tablename]] [-c <domain> ... | -x <vs>]
Parameter |
Description |
---|---|
|
Output gzipped (effective with -o option) |
|
Includes the registry (for Windows servers - shows a large output) |
|
Prints version information |
|
Embeds log records (very large output) |
|
Does not resolve network addresses (faster) |
|
Output to a file and to the screen |
|
Output consists of tables only (SR only) |
|
Get information about the specified |
|
Get information about the specified |
Further Info: SecureKnowledge solution sk30567.
Description Start all Check Point processes and applications running on an appliance or server.
Syntax
> cpstart
Comments This command cannot be used to start
. cprid
is invoked when the machine is booted and it runs independently.cprid
Description
displays the status of Check Point applications, either on the local or on another appliance or server, in various formats. cpstat
Syntax
> cpstat [-h <host>][-p <port>][-s <SICname>][-f <flavor>][-o <polling>][-c <count>][-e <period>][-d] <application_flag>
Parameter |
Description |
---|---|
|
A resolvable hostname, a dot-notation address (for example: 192.0.2.23), or a DAIP object name. The default is localhost. |
|
Port number of the AMON server. The default is the standard AMON port (18192). |
|
Secure Internal Communication (SIC) name of the AMON server. |
|
The flavor of the output (as it appears in the configuration file). The default is the first flavor found in the configuration file. |
|
Polling interval (seconds) specifies the pace of the results. The default is 0, meaning the results are shown only once. |
|
Specifies how many times the results are shown. The default is 0, meaning the results are repeatedly shown. |
|
Specifies the interval (seconds) over which 'statistical' olds are computed. Ignored for regular olds. |
|
Debug mode. |
|
One of the following:
|
The following parameters can be added to the application flags:
fw
— "default", "interfaces", "all", "policy", "perf", "hmem", "kmem", "inspect",
"cookies", "chains", "fragments", "totals", "ufp", "http", "ftp", "telnet", "rlogin",
"smtp", "pop3", "sync"
vpn
— "default
", "product", "IKE", "ipsec", "traffic", "compression", "accelerator",
"nic", "statistics", "watermarks", "all"
fg
— "all"
ha
— "default", "all"
os
— "default", "ifconfig", "routing", "memory", "old_memory", "cpu", "disk", "perf",
"multi_cpu", "multi_disk", "all", "average_cpu", "average_memory", "statistics"
mg
— "default"
persistency
— "product", "Tableconfig", "SourceConfig"
polsrv
— "default", "all"
uas
— "default"
svr
— "default"
cpsemd
— "default"
cpsead
— "default"
asm
— "default", "WS"
ls
— "default"
ca
— "default", "crl", "cert", user", "all"
Example
|
Description Terminate all Check Point processes and applications, running on an appliance or server.
Syntax
> cpstop
> cpstop -fwflag {-proc|-default}
Parameter |
Description |
---|---|
|
Kills Check Point daemons and Security servers while maintaining the active Security Policy running in the kernel. Rules with generic allow/reject/drop rules, based on services continue to work. |
|
Kills Check Point daemons and Security servers. The active Security Policy running in the kernel is replaced with the default filter. |
Comments This command cannot be used to terminate
. cprid
is invoked when the appliance or server is booted and it runs independently.cprid
Description The
commands are used for working with various aspects of the firewall. All fw
commands are executed on the Check Point Security Gateway.fw
Typing
at the command prompt sends a list of available fw commands to the standard output.fw
Syntax
> fw
Description Generally, when Check Point Security gateway commands are executed on a Security gateway they will relate to the gateway as a whole, rather than to an individual kernel instance. For example, the
command will enable viewing or editing of a single table of information aggregated for all kernel instances.fw tab
This command specifies that certain commands apply to an individual kernel instance. By adding
after -i <kern>
in the command, where fw
is the kernel instance's number.<kern>
Syntax
applies to the following commands:> fw -i
(when used without the > fw ctl debug
parameter)-buf
> fw ctl get
> fw ctl set
> fw ctl leak
> fw ctl pstat
> fw monitor
> fw tab
For details and additional parameters for any of these commands, refer to the command's entry.
Example To view the connections table for kernel instance #1 use the following command:
> fw -i 1 tab -t connections
Description The
command controls the Firewall kernel module. fw ctl
Syntax
fw ctl {install|uninstall}
fw ctl debug [-m <module>] [+|-] {options | all | 0}
fw ctl debug -buf [buffer size]
fw ctl kdebug
fw ctl pstat [-h][-k][-s][-n][-l]
fw ctl iflist
fw ctl arp [-n]
fw ctl block {on|off}
fw ctl chain
fw ctl conn
Parameter |
Description |
---|---|
|
|
|
Generate debug messages to a buffer. See fw ctl debug. |
|
Reads the debug buffer and obtains the debug messages. If there is no debug buffer, the command will fail.
|
|
Displays Security Gateway internal statistics:
|
|
Displays the IP interfaces known to the kernel, by name and internal number. |
|
Displays ARP proxy table.
|
|
|
|
Prints the names of internal Security Gateways that deal with packets. Use to ensure that a gateway is loaded. The names of these gateways can be used in the |
|
Prints the names of the connection modules. |
Description Generate debug messages to a buffer.
Syntax A number of debug options are available:
fw ctl debug -buf [buffer size]
fw ctl debug [-m <module>] [+ | -] {options|all|0}
fw ctl debug 0
fw ctl debug [-d <comma separated list of strings>]
fw ctl debug [-d <comma separated list of ^strings>]
fw ctl debug [-s <string>]
fw ctl debug -h
fw ctl debug -x
Parameter |
Description |
---|---|
|
Allocates a buffer of size kilobytes (default 128) and starts collecting messages there. If the -buf argument is not set, the debug messages are printed to the console. |
|
Specify the Security Gateway module you wish to debug. The default module is fw. For example: |
|
Sets or resets debug flags for the requested gateway).
|
|
Print a list of debug modules and flags. |
|
Returns all flags in all gateways to their default values, releases the debug buffer (if there was one). |
|
Only lines containing these strings are included in the output. (Available in R70 or higher) |
|
Lines containing these strings are omitted from the output (Available in R70 or higher) For example:
Output shows only lines containing the words "error" or "failed" and not the word "packet" |
|
Stop debug messages when a certain string is issues (Available in R70 or higher) For example: |
|
Shuts down the debug. |
Description Sets CoreXL affinities when using multiple processors. For an explanation of kernel, daemon and interface affinities, see the R77 Performance Tuning Administration Guide.
settings are not persistent through a restart of the Security Gateway. If you want the settings to be persistent, either use:fw ctl affinity -s
sim affinity
(a Performance Pack command) fwaffinity.conf
configuration file To set interface affinities, you should use
only if Performance Pack is not running. If Performance Pack is running, you should set affinities by using the Performance Pack fw ctl affinity
command. These settings will be persistent. If Performance Pack's sim affinity
is set to Automatic mode (even if Performance Pack was subsequently disabled), you will not be able to set interface affinities by using sim affinity
.fw ctl affinity -s
Note - The VSX Gateway - Use the
|
Syntax
> fw ctl affinity -s <proc_selection> <cpuid>
is one of the following parameters: <proc_selection>
Parameter |
Description |
---|---|
|
Sets affinity for a particular process, where |
|
Sets affinity for a Check Point daemon, where |
|
Sets affinity for a kernel instance, where |
|
Sets affinity for an interface, where |
should be a processing core number or a list of processing core numbers. To have no affinity to any specific processing core, <cpuid>
should be<cpuid>
.: all
Note - Setting an Interface Affinity will set the affinities of all interfaces sharing the same IRQ to the same processing core. To view the IRQs of all interfaces, run: |
Example To set kernel instance #3 to run on processing core #5, run:
> fw ctl affinity -s -k 3 5
Description Lists existing CoreXL affinities when using multiple processors. For an explanation of kernel, daemon and interface affinities, see the R77 Performance Tuning Administration Guide.
Syntax
> fw ctl affinity -l [<proc_selection>] [<listtype>]
is omitted, If <proc_selection>
lists affinities of all Check Point daemons, kernel instances and interfaces. Otherwise, fw ctl affinity -l
is one of the following parameters:<proc_selection>
Parameter |
Description |
---|---|
|
Displays the affinity of a particular process, where |
|
Displays the affinity of a Check Point daemon, where |
|
Displays the affinity of a kernel instance, where |
|
Displays the affinity of an interface, where |
is omitted, If <listtype>
lists items with specific affinities, and their affinities. Otherwise,fw ctl affinity -l
is one or more of the following parameters: <listtype>
Parameter |
Description |
---|---|
|
All: includes items without specific affinities. |
|
Reverse: lists each processing core and the items that have it as their affinity. |
|
Verbose: list includes additional information. |
Example To list complete affinity information for all Check Point daemons, kernel instances and interfaces, including items without specific affinities, and with additional information, run:
> fw ctl affinity -l -a -v
Description Enables the INSPECT2C engine, which dynamically converts INSPECT code to C code.
Run the command on the Check Point Security Gateway.
Syntax
> fw ctl engine {on|off|stat|setdefault}
Parameter |
Description |
---|---|
|
Compile the engine if necessary, and activate it. Because the engine may not have been previously compiled, turning the engine ON may not activate it immediately. Instead, the engine is activated in the background after the compilation. After turning the engine ON, the engine recompiles and reactivates itself every policy installation regardless of the values of |
|
Deactivates the engine if active. Subsequent policy installation on the gateway does NOT auto-activate the engine unless the command is used again. |
|
Print the status of the engine. For example: "During compilation", "Before auto-activation", "Deactivated". |
|
Restore control to database settings. Security Management server settings are ignored. At the next policy installation, return the control of the engine to the values of the following gateway database attributes:
Use GuiDBEdit to change the values of the attributes. |
Description Displays multi-kernel statistics for each kernel instance. The state and processing core number of each instance is displayed, along with:
Description The IPS performance counters measure the percentage of CPU consumed by each IPS protection. The measurement itself is divided according to the type of protection: Pattern based protections or INSPECT based protections. In addition, the IPS counters measure the percentage of CPU used by each section ("context") of the protocol, and each protocol parser.
Syntax
> fw ctl zdebug >& outputfile
> fw ctl sdstat start
> fw ctl sdstat stop
Parameter |
Description |
---|---|
|
Turn on debug mode and specify an output file. |
|
Activate the IPS counters |
|
Print a report and stop the counters. |
Example The workflow is as follows:
Run the following commands on the Check Point Security Gateway (version R70 or higher):
On the Check Point Security Gateway:
fw ctl zdebug >& outputfile
fw ctl sdstat start
Let the counters run. However- do not leave the counters on for more than 10 minutes.
fw ctl sdstat stop
It is important to stop the counters explicitly, otherwise there may be performance penalty
This generates the output file
that must be processed on the (SecurePlatform only) Security Management Server.outputfile
On the Security Management Server:
$FWDIR/script
, run the script./sdstat_analyse.csh outputfile
The output of the script is a report in csv format that can be viewed in Microsoft Excel.
If there is a problem in the report, or if more details are needed, a debug flag is available which prints extra information to outputfile.
fw ctl zdebug + spii >& outputfile
Example Debug Message |
Explanation |
---|---|
|
User tried to create a report without initializing the counters, or an error occurred during initialization and the user then tried to print a report. |
|
The measurement process failed and the total time units for IPS is zero. |
Comments
sdstat_analyse
script may contain a number instead of a protection name. This is because the original output contains a signature id, but the id is missing from the Security Policy on the Gateway.Description Fetches the Inspection Code from the specified host and installs it to the kernel.
Syntax
> fw fetch [-n] [-f <filename>] [-c] [-i] master1 [master2] ...
Parameter |
Description |
---|---|
|
Fetch the Security Policy from the Security Management server to the local |
|
Fetch the Security Policy from the Security Management server listed in <filename>. If filename is not specified, the list in |
|
Cluster mode, get policy from one of the cluster members, from the Check Point High Availability (CPHA) kernel list. |
|
Ignore SIC information (for example, SIC name) in the database and use the information in |
|
Execute command on the designated master. The IP address of the Security Management Server from which to fetch the Policy. You can specify one or more servers, which will be searched in the order listed. If no |
Description
fetches Log Files from a remote machine. You can use the fw fetchlogs
command to transfer Log Files to the machine on which the fw fetchlogs
command is executed. The Log Files are read from and written to the directory fw fetchlogs
.$FWDIR/log
Syntax
> fw fetchlogs [[-f <file name>] ... ] <module>
Parameter |
Description |
---|---|
|
The Log Files to be transferred. The file name can include wildcards. In Solaris, any file containing wildcards should be enclosed in quotes. The default parameter is Related pointer files will automatically be fetched. |
|
The name of the remote machine from where you transfer the Log Files. |
Comments The files transferred by the fw fetchlogs command are MOVED from the source machine to the target machine. This means that they are deleted from the source machine once they have been successfully copied.
Fetching Current Log Data
The active Log File (
cannot be fetched. If you want to fetch the most recent log data, proceed as follows:fw.log)
fw lslogs
to see the newly-generated file name.fw fetchlogs -f
filename
to transfer the file to the machine on which the fw fetchlogs
command is executed. The file is now available for viewing in the SmartView Tracker.After a file has been fetched, it is renamed. The gateway name and the original Log File name are concatenated to create a new file name. The new file name consists of the gateway name and the original file name separated by two (underscore) _ _ characters.
Example The following command:
> fw fetchlogs -f 2001-12-31_123414.log module3
fetches the Log File
from 2001-12-31_123414.log
.Module3
After the file has been fetched, the Log File is renamed:
module3_ _2001-12-31_123414.log
Description The
command displays information about High Availability machines and their states.fw hastat
Syntax
> fw hastat [<target>]
Parameter |
Description |
---|---|
|
A list of machines whose status will be displayed. If |
Description Takes down (or up) a redundant ISP link.
Syntax
> fw isp_link [<target>] <link-name> {up|down}
Parameter |
Description |
---|---|
|
The name of the Check Point Security Gateway. |
|
The name of the ISP link as defined in the ISP-redundancy tab. |
Comments This command can be executed locally on the Check Point Security Gateway or remotely from the Security Management server. In the latter case, the target argument must be supplied. For this command to work, the Check Point Security Gateway should be using the ISP redundancy feature.
Description Prompts the kernel to shut down all firewall daemon processes. The command is located in the
on the Security Management server or gateway machine. $FWDIR/bin directory
The firewall daemons and Security servers write their
to files in the pids
upon startup. These files are named $FWDIR/tmp directory
. For example, the file containing the $FWDIR/tmp/daemon_name.pid
of the firewall pid
daemon is: snmp
.$FWDIR/tmp/snmpd.pid
Syntax
> fw kill [-t <sig_no>] <proc-name>
Parameter |
Description |
---|---|
|
This Unix only command specifies that if the file If no signal is specified, signal 15 ( |
|
Prompt the kernel to shut down specified firewall daemon processes. |
Comments In Windows, only the default syntax is supported:
If the fw kill proc_name.
option is used it is ignored.-t
Description Send a
event to all connected lea clients, see the LEA Specification documentation. It should be used after new log files have been imported (manually or automatically) to the LEA_COL_LOGS
directory in order to avoid the scheduled update which takes 30 minutes.$FWDIR/log
This command should be run from the Security Management server.
Syntax
> fw lea_notify
Description Print a list of hosts protected by Security Gateway products. The list of hosts is in the file $fwdir/database/fwd.h
Syntax
> fw lichosts [-x] [-l]
Parameter |
Description |
---|---|
|
Use hexadecimal format |
|
Use long format |
Description
displays the content of Log files. fw log
Syntax
> fw log [-f [-t]] [-n] [-l] [-o] [-c <action>] [-h <host>] [-s <starttime>] [-e <endtime>] [-b <starttime> <endtime>] [-u <unification_scheme_file>] [-m {initial|semi|raw}] [-a] [-k {alert_name|all}] [-g] [logfile]
Parameter |
Description |
---|---|
|
After reaching the end of the currently displayed file, do not exit (the default behavior), but continue to monitor the Log file indefinitely and display it while it is being written. The
|
|
Do not perform DNS resolution of the IP addresses in the Log file (the default behavior). This option significantly speeds up the processing. |
|
Display both the date and the time for each log record (the default is to show the date only once above the relevant records, and then specify the time per log record). |
|
Show detailed log chains (all the log segments a log record consists of). |
|
Display only events whose action is action, that is, |
|
Display only log whose origin is the specified IP address or name. |
|
Display only events that were logged after the specified time (see time format below). |
|
Display only events that were logged before the specified time (see time format below). |
|
Display only events that were logged between the specified start and end times (see time format below), each of which may be a date, a time, or both. If date is omitted, then today's date is assumed. The start and end times are expected after the flag. |
|
Unification scheme file name. |
|
This flag specifies the unification mode.
|
|
Output account log records only. |
|
Display only events that match a specific alert type. The default is |
|
Do not use a delimited style. The default is:
|
|
Use |
Where the full date and time format is:
For example:MMM DD, YYYY HH:MM:SS.
May 26, 1999 14:20:00
It is possible to specify date only in the format
, or time only, in the format: MMM DD, YYYY
where time only is specified, the current date is assumed.HH:MM:SS,
Example
> fw log |
Output [<date>] <time> <action> <origin> <interface dir and name> [alert] [field name: field value;] ...
Each output line consists of a single log record, whose fields appear in the format shown above.
Example Output
14:56:39 reject jam.checkpoint.com >daemon alert src: veredr.checkpoint.com; 14:57:49 authcrypt jam.checkpoint.com >daemon src: veredr.checkpoint.com; 14:57:49 keyinst jam.checkpoint.com >daemon src: veredr.checkpoint.com; |
Description
creates a new active Log File. The current active Log File is closed and renamed by default fw logswitch
unless you define an alternative name that is unique. The format of the default name <$FWDIR/log/<current_time_stamp>.log
is current_time_stamp>.log
For example: YYYY-MM-DD_HHMMSS.log.
2003-03-26_041200.log
Warning:
$FWDIR/log/current_time_stamp.log
.The new Log File that is created is given the default name
. Old Log Files are located in the same directory.$FWDIR/log/fw.log
A Security Management server can use
to change a Log File on a remote machine and transfer the Log File to the Security Management server. This same operation can be performed for a remote machine using fw lslogs and fw fetchlogs.fw logswitch
When a log file is sent to the Security Management server, the data is compressed.
Syntax
> fw logswitch [-audit] [<filename>]
> fw logswitch -h <hostage> [+|-][<filename>]
Parameter |
Description |
---|---|
|
Does logswitch for the Security Management server audit file. This is relevant for local activation. |
|
The name of the file to which the log is saved. If no name is specified, a default name is provided. |
|
The resolvable name or IP address of the remote machine (running either a Security Gateway or a Security Management server) on which the Log File is located. The Security Management server (on which the |
|
Change a remote log and copy it to the local machine. |
|
Change a remote log and move it to the local machine thereby deleting the log from the remote machine. |
Comments Files are created in the
directory on both $FWDIR/log
and the Security Management server when the host
or +
parameters are specified. Note that if -
is specified, the Log File on the host is deleted rather than renamed.-
specified:hostage
filename
specified - On hostage
, the old Log File is renamed to old_log
. On the Security Management Server, the copied file will have the same name, prefixed by hostages
name. For example, the command fw logswitch -h venus +xyz
creates a file named venus_xyz.log
on the Security Management Server.filename
not specified - On hostage
, the new name is 2003-03-26_041200.log
.hostage_
. For example, target
_2003-03-26_041200.log
.
not specified:hostage
filename
specified - On the Security Management Server, the old Log File is renamed to old_log
.filename
not specified - On the Security Management Server, the old Log File is renamed to the current date.Compression
When log files are transmitted from one machine to another, they are compressed using the
package, a standard package used in the Unix zlib
command (see RFC 1950 to RFC 1952 for details). The algorithm is a variation of LZ77 method.gzip
The compression ratio varies with the content of the log records and is difficult to predict. Binary data are not compressed, but string data such as user names and URLs are compressed.
Description Merge several Log Files into a single Log File. The merged file can be sorted according to the creation time of the Log entries, and the times can be "fixed" according to the time zones of the origin Log servers.
Logs entries with the same Unique-ID are unified. If a Log switch was performed before all the segments of a specific log were received, this command will merge the records with the same Unique-ID from two different files, into one fully detailed record.
Syntax
<> fw mergefiles [-s] [-t <time_conversion_file>]
log_file_name_1> [... <log_file_name_n>] <output_file>
Parameter |
Description |
---|---|
|
Sort merged file by log records time field. |
|
Fix different GMT zone log records time in the event that the log files originated from Log Servers in different time zone. The time_conversion_file format is as follows: ip-address signed_date_time_in_seconds ip-address signed_date_time_in_seconds |
|
Full pathnames of the Log File(s). |
|
Full pathname of the output Log File. |
Comments It is not recommended to merge the current active
with other Log Files. Instead, run the fw.log file
command and then run fw logswitch
.fw mergefiles
Description Inspecting network traffic is an essential part of troubleshooting network deployments.
is a powerful built-in tool to simplify the task of capturing network packets at multiple capture points within the firewall chain. These packets can be inspected using industry-standard tools later on. fw monitor
In many deployment and support scenarios capturing network packets is an essential functionality.
or tcpdump
are tools normally used for this task.snoop
provides an even better functionality but omits many requirements and risks of these tools. fw monitor
tcpdump
and snoop
are normally used with network interface cards in promiscuous mode. Unfortunately the promiscuous mode allows remote attacks against these tools. fw monitor
does not use the promiscuous mode to capture packets. In addition most firewall operating systems are hardened. In most cases this hardening includes the removal of tools like tcpdump
or snoop
because of their security risk.fw monitor
is a built-in firewall tool which needs no separate installation in case capturing packets is needed. It is a functionality provided with the installation of the Firewall package.fw monitor
allows you to capture packets at multiple capture positions within the firewall kernel module chain; both for inbound and outbound packets. This enables you to trace a packet through the different functionalities of the Firewall.fw monitor
on different platforms. Tools like snoop or tcpdump are often platform dependent or have specific "enhancements" on certain platforms. fw monitor
and all its related functionality and syntax is absolutely identical across all platforms. There is no need to learn any new "tricks" on an unknown platform.Normally the Check Point kernel modules are used to perform several functions on packets (like filtering, encrypting and decrypting, QoS …).
adds its own modules to capture packets. Therefore fw monitor can capture all packets which are seen and/or forwarded by the Firewall.fw monitor
Only one instance of
can be run at a time.fw monitor
Use
(that is Control + C) to stop fw monitor from capturing packets.^C
Syntax
> fw monitor [-u|s] [-i] [-d] [-D] [{-e <expr>|{-f <filter-file>|-}}] [-l <len>] [-m <mask>]
[-x <offset>[,<len>]] [-o <file>] [[-pi <pos>] [-pI <pos>] [-po <pos>] [-pO <pos>] | -p all]] [-a]
[-ci <count>] [-co <count>] [-h] -T
Parameter |
Description |
---|---|
|
Printing the UUID or the SUUID: The option |
|
Flushing the standard output: Use to make sure that captured data for each packet is at once written to standard output. This is especially useful if you want to kill a running fw monitor process and want to be sure that all data is written to a file. |
|
Debugging fw monitor: The |
|
Filtering fw monitor packets:
|
|
Limiting the packet length: |
|
Setting capture masks: By default |
|
Printing packet/payload data: In addition to the IP and Transport header |
|
Write output to file: Save the raw packet data to a file in a standard (RFC 1761) format. The file can be examined using by tools like snoop, tcpdump or Ethereal. Note - The snoop file format is normally used to store Layer 2 frames. For "normal" capture files this means that the frame includes data like a source and a destination MAC address. |
|
Print time stamp in microseconds. |
|
Insert fw monitor chain module at a specific position: In addition to capture masks (which give the ability to look at packets in a specific position) |
|
Use absolute chain positions: If you use |
|
Capture a specific number of packets: |
|
Displays the usage. |
Example The easiest way to use
is to invoke it without any parameter. This will output every packet from every interface that passes (or at least reaches) the Check Point Security Gateway. The same packet appears several times (two times in the example below). This is caused by fw monitor
capturing the packets at different capture points. fw monitor
Output
cpmodule> fw monitor monitor: getting filter (from command line) monitor: compiling monitorfilter: Compiled OK. monitor: loading monitor: monitoring (control-C to stop) eth0:i[285]: 192.0.2.133 -> 192.0.2.2 (TCP) len=285 id=1075 TCP: 1050 -> 18190 ...PA. seq=bf8bc98e ack=941b05bc eth0:I[285]: 192.0.2.133 -> 192.0.2.2 (TCP) len=285 id=1075 TCP: 1050 -> 18190 ...PA. seq=bf8bc98e ack=941b05bc eth0:o[197]: 192.0.2.2 -> 192.0.2.133 (TCP) len=197 id=44599 TCP: 18190 -> 1050 ...PA. seq=941b05bc ack=bf8bca83 eth0:O[197]: 192.0.2.2 -> 192.0.2.133 (TCP) len=197 id=44599 TCP: 18190 -> 1050 ...PA. seq=941b05bc ack=bf8bca83 eth0:o[1500]: 192.0.2.2 -> 192.0.2.133 (TCP) len=1500 id=44600 TCP ^C : 18190 -> 1050 ....A. seq=941b0659 ack=bf8bca83 monitor: caught sig 2 monitor: unloading |
The first line of the
output isfw monitor
|
This packet was captured on the first network interface (
) in inbound direction before the virtual machine (lowercase i). The packet length is 285 bytes (in square parenthesis; repeated at the end of the line. Note that these two values may be different. The packets ID is 1075. The packet was sent from 192.0.2.133 to 192.0.2.2 and carries a TCP header/payload.eth0
The second line of the
output isfw monitor
|
The second line tells us that this is a TCP payload inside the IP packet which was sent from port 1050 to port 18190. The following element displays the TCP flags set (in this case PUSH and ACK). The last two elements are showing the sequence number (seq=bf8bc98e) of the TCP packet and the acknowledged sequence number (ack=941b05bc). You will see similar information for UDP packets.
You will only see a second line if the transport protocol used is known to fw monitor. Known protocols are for example TCP, UDP and ICMP. If the transport protocol is unknown or cannot be analyzed because it is encrypted (e.g. ESP or encapsulated (e.g. GRE) the second line is missing.
Further Info. See SecureKnowledge solution sk30583.
Description Display a list of Log Files residing on a remote or local machine. You must initialize SIC between the Security Management server and the remote machine.
Syntax
> fw lslogs [[-f <filename>] ...] [-e] [-s {<name>|<size>|<stime>|<etime>}] [-r] [<machine>]
Parameter |
Description |
---|---|
|
The list of files to be displayed. The file name can include wildcards. In Unix, any file containing wildcards should be enclosed in quotes. The default parameter is |
|
Display an extended file list. It includes the following data:
|
|
Specify the sort order of the Log Files using one of the following sort options:
The default is |
|
Reverse the sort order (descending order). |
|
The name of the machine on which the files are located. It can be a gateway or a Log Server. The default is localhost. |
Example This example shows the extended file list you see when you use the
command: fw lslogs -e
> fw lslogs -e module3 Size Creation Time Closing Time Log file name 99KB 10Jan2002 16:46:27 10Jan2002 18:36:05 2002-01-10_183752.log 16KB 10Jan2002 18:36:05 -- fw.log |
Description Install a Check Point authentication password on a host. This password is used to authenticate internal communications between Security Gateways and between a Check Point Security Gateway and its Security Management server. A password is used to authenticate the control channel the first time communication is established. This command is required for backward compatibility scenarios.
Syntax
> fw putkey [-opsec] [-no_opsec] [-ssl] [-no_ssl] [-k <num>] [-n <myname>] [-p <pswd>] <host>...
Parameter |
Description |
---|---|
|
Only control connections are enabled. |
|
Only OPSEC control connections are enabled. |
|
The key is used for an SSL connection. |
|
The key is not used for an SSL connection. |
|
The length of the first S/Key password chain for fwa1 authentication (Check Point's proprietary authentication protocol). The default is 7. When fewer than 5 passwords remain, the hosts renegotiate a chain of length 100, based on a long random secret key. The relatively small default value ensures that the first chain, based on a short password entered by the user, is quickly exhausted. |
|
The IP address (in dot notation) to be used by the Check Point Security Gateway when identifying this host to all other hosts, instead of, for example, the resolution of the |
|
The key (password). If you do not enter the password on the command line, you will be prompted for it. |
|
The IP address(es) or the resolvable name(s) of the other host(s) on which you are installing the key (password). This should be the IP address of the interface "closest" to the host on which the command is run. If it is not, you will get error messages such as the following: |
Comments This command is never used in a script.
Description
rebuilds a Log file's pointer files. The three files: name fw repairlog
, name.logptr
and name.loginitial_ptr
are recreated from data in the specified Log file. The Log file itself is modified only if the .logaccount_ptr
flag is specified.-u
Syntax
fw repairlog [-u] <logfile>
Parameter |
Description |
---|---|
|
Indicates that the unification chains in the Log file should be rebuilt. |
|
The name of the Log file to repair. |
Description Manage the Suspicious Activity Monitoring (SAM) server. Use the SAM server to block connections to and from IP addresses without the need to change the Security Policy.
SAM commands are logged. Use this command to (also) monitor active SAM requests (see
option).-M
To configure the SAM server on the Security Management server or Security Gateway, use SmartDashboard to edit the Advanced > SAM page of the Check Point Security Gateway object.
Syntax
Add/Cancel SAM rule according to criteria:
> fw sam [-v][-s <sam server>][-S <server sic name>][-f <fw host>][-t <timeout>][-l <log>][-C] -{n|i|I|j|J} <Criteria>
Delete all SAM rules:
> fw sam [-v][-s <sam server>][-S <server sic name>][-f <fw host>] -D
Monitor all SAM rules:
> fw sam [-v][-s <sam server>][-S <server sic name>][-f <fw host>] -M -{i|j|n} all
Monitor SAM rules according to criteria:
> fw sam [-v][-s <sam server>][-S <server sic name>][-f <fw host>] -M -{i|j|n} <Criteria>
Syntax
Parameter |
Description |
---|---|
|
Verbose mode. Writes one message (describing whether the command was successful or not) to |
|
The IP address (in dot format) or the resolvable name of the FireWalled host that will enforce the command. The default is |
|
The SIC name for the SAM server to be contacted. It is expected that the SAM server will have this SIC name, otherwise the connection will fail. If no server SIC name is supplied the connection will proceed without SIC names comparison. For more information about enabling SIC refer to the OPSEC API Specification. |
|
Specify the
|
|
Cancel all inhibit ( |
|
Cancel the command to inhibit connections with the specified parameters. These connections will no longer be inhibited (rejected or dropped). The command parameters must match the ones in the original command, except for the |
|
The time period (in seconds) for which the action will be enforced. The default is forever or until cancelled. |
|
The type of the log for enforced actions can be one of the following: |
|
Notify, or generate, a long‑format log entry. Generates an alert when connections that match the specified services or IP addresses pass through the FireWall. This action does not inhibit or close connections. |
|
Inhibit (do not allow) new connections with the specified parameters. Each inhibited connection is logged according to log type. Matching connections will be rejected. |
|
Inhibit new connections with the specified parameters, and close all existing connections with the specified parameters. Each inhibited connection is logged according to the log type. Matching connections will be rejected. |
|
Inhibit new connections with the specified parameters. Each inhibited connection is logged according to the log type. Connections will be dropped. |
|
Inhibit new connections with the specified parameters, and close all existing connections with the specified parameters. Each inhibited connection is logged according to the log type. Connections will be dropped. |
|
Monitor the active SAM requests with the specified actions and criteria. |
|
Get all active requests. For monitoring purposes only. |
Usage Criteria are used to match connections, and are composed of various combinations of the following parameters:
<source ip><source netmask><destination ip><destination netmask> <service><protocol>
Possible combinations are:
src <ip> dst <ip> any <<ip> subsrc <ip><netmask> subdst <ip><netmask> subany <ip><netmask> srv <src ip><dest ip><service><protocol> subsrv <src ip><src netmask><dest ip><dest netmask><service> <protocol> subsrvs <src ip><src netmask><dest ip><service><protocol> subsrvd <src ip><dest ip><dest netmask><service><protocol> dstsrv <dest ip><service><protocol> subdstsrv <dest ip><dest netmask><service><protocol> srcpr <ip><protocol> dstpr <ip><protocol> subsrcpr <ip><netmask><protocol> subdstpr <ip><netmask><protocol> |
Syntax
Criteria Parameters |
Description |
---|---|
|
Match the source IP address of the connection. |
|
Match the destination IP address of the connection. |
|
Match either the source IP address or the destination IP address of the connection. |
|
Match the source IP address of the connections according to the netmask. |
|
Match the destination IP address of the connections according to the netmask. |
|
Match either the source IP address or destination IP address of connections according to the netmask. |
|
Match the specific source IP address, destination IP address, service and protocol. |
|
Match the specific source IP address, destination IP address, service and protocol. Source and destination IP addresses are assigned according to the netmask. |
|
Match the specific source IP address, source netmask, destination netmask, service and protocol. |
|
Match specific source IP address, destination IP, destination netmask, service and protocol. |
|
Match specific destination IP address, service and protocol. |
|
Match specific destination IP address, service and protocol. Destination IP address is assigned according to the netmask. |
|
Match the source IP address and protocol. |
|
Match the destination IP address and protocol. |
|
Match the source IP address and protocol of connections. Source IP address is assigned according to the netmask. |
|
Match the destination IP address and protocol of connections. Destination IP address is assigned according to the netmask. |
Example This command inhibits all connections originating on
for 10 minutes. Connections made during this time will be rejected:louvre
> fw sam -t 600 -i src louvre
This command inhibits all FTP connections from the
subnet to the louvre
subnet. All existing open connections will be closed. New connection will be dropped, a log is kept and an alert is sent:eifel
> fw sam -l long_alert -J subsrvs louvre 255.255.255.0 eifel 21 6
The previous command will be enforced forever - or until canceled by the following command:
> fw sam -C -l long_alert -J subsrvs louvre 255.255.255.0 eifel 21 6
This command monitors all active "inhibit" or "notify SAM" requests for which
is the source or destination address:lourve
> fw sam -M -nij any lourve
This command cancels the command in the first example:
> fw sam -C -i src louvre
Description Use
to view the policy installed on the gateway, and which interfaces are being protected.fw stat
Note - The |
Syntax
> fw stat -l
> fw stat -s
Parameter |
Description |
---|---|
|
Show a long, detailed listing of the installed policies. |
|
Shows a short summary of the installed policies. |
Examples
HOST POLICY DATE localhost Standard 18Apr2012 15:01:51 : [>eth0] [<eth0] |
Two interfaces are being protected. The arrows show the direction of the packets.
After the policy is uninstalled, the output becomes:
HOST POLICY DATE localhost - - : >eth0 <eth0 |
This shows that there is no policy installed, and the interfaces are not protected.
Description The
command shows data from the kernel tables, and lets you change the content of dynamic kernel tables. You cannot change the content of static kernel tables.fw tab
Kernel tables (also known as State tables) store data that the Firewall and other modules in the Security Gateway use to inspect packets. These kernel tables are the "memory" of the virtual computer in the kernel and are a critical component of Stateful Inspection. The kernel tables are dynamic hash tables in the kernel memories.
Syntax
fw tab [-t <table>] [-s] [-c] [-f] [-o <filename>] [-r] [-u | -m <maxval>] [{-a|-x} -e <entry>] [-y] [<hostname>]
Parameter |
Description |
---|---|
|
Specifies a table for the command. |
|
Shows a short summary of the table (s) data. |
|
Shows formatted table information in common format. |
|
Shows a formatted version of the table data. Each table can use a different style. |
|
Outputs CL formatted file called |
|
Resolves IP addresses in formatted output. |
|
Show unlimited table entries. |
|
Sets the maximum table entries that are shown to |
|
Adds ( Include the Caution - If you use the |
|
One or more entries that you add or remove from the table. |
|
Do not show a prompt to users before they run commands. |
|
One or more target appliances or servers for the fw tab command. If you do not use this parameter, the default setting is localhost. |
Example > fw tab -t arp_table -a -e "1,2,3,4,5"
Adds an entry:
to<00000001,00000002,00000003,00000004,00000005,>
arp_table
fw tab - m 100 -r sample-gw
Comments If a table has the
attribute, when you use the -a parameter to add entries, the default table timeout is added.expire
This feature only works on local machine kernel tables and does not work on a remote machine's tables like additional fw tab commands.
The -x flag can be used independently of the -e flag in which case the entire table content is deleted.
This feature should only be used for debug purposes. It is not advisable to arbitrarily change the content of any kernel table since doing so may have unexpected results including unexpected security and connectivity impacts.
Description Display the Security Gateway major and minor version number and build number.
Syntax
> fw ver [-k][-f <filename>]
Parameter |
Description |
---|---|
|
Print the version name and build number of the Kernel module. |
|
Print the version name and build number to the specified file. |
Description Perform management operations on the Security Gateway. It controls
and all Check Point daemons.fwd
Syntax
> fwm
Description Imports users into the Check Point User Database from an external file. You can create this file yourself, or use a file generated by
.fwm dbexport
Syntax
> fwm dbimport [-m] [-s] [-v] [-r] [-k <errors>] [-f <file>] [-d <delim>]
Parameter |
Description |
---|---|
|
If an existing user is encountered in the import file, the user's default values will be replaced by the values in the template (the default template or the one given in the attribute list for that user in the import file), and the original values will be ignored. |
|
Suppress the warning messages issued when an existing user's values are changed by values in the import file. |
|
verbose mode |
|
|
|
Continue processing until nerror errors are encountered. |
|
The name of the import file. The default import file is |
|
Specifies a delimiter different from the default value ( |
Comments The IKE pre shared secret does not work when exporting from one machine and importing to another.
To ensure that there is no dependency on the previous database values, use the
flag together with the ‑r
flag.-m
File Format
The import file must conform to the following Usage:
name
is included:
|
;
character. However, you can use a different character by specifying the -d
option in the command line.{}
. Values in a list must be separated by commas. If there is only one value in a list, the braces may be omitted. A +
or -
character appended to a value list means to add or delete the values in the list from the current default user values. Otherwise the default action is to replace the existing values.MON
, TUE
, WED
, THU
, FRI
, SAT
, SUN
.Undefined
, S/Key
, SecurID
, Unix Password
, VPN‑1 & FireWall‑1 Password, RADIUS, Defender
.hh:mm
.dd-mmm-yy,
where mmm
is one of {Jan
, Feb
, Mar
, Apr
, May
, Jun
, Jul
, Aug
, Sep
, Oct
, Nov
, Dec
}.encrypt
function.userc
field specifies the parameters of the user's SecuRemote connections, and has three parameters, as follows:-
DES, CLEAR, Any-
DES, CLEAR, Any
means: key encryption method is DES; no data encryption; no data integrity.{DES,CLEAR,}
!
character is considered a comment.Description Modify the expiration date of all users and administrators.
Syntax
> fw expdate dd-mmm-1976
Comments The date can be modified using a filter.
Example fw expdate 02-mar-2003 -f 01-mar-2003
Description Export the Check Point User Database to a file. The file may be in one of the following formats:
fwm dbimport
ldapmodify
Syntax
To export the User Database to a file that can be used with
:fwm dbimport
> fwm dbexport [ [-g group | -u user] [-d delim] [-a {attrib1, attrib2, ...} ] [-f file] ]
To export the User Database as an LDIF file:
> fwm dbexport -l -p [-d] -s subtree [-f file] [-k IKE-shared-secret]
Parameter |
Description |
---|---|
|
Specifies a group ( |
|
Specifies that only one user ( |
|
Debug flag |
|
Specifies the attributes to export, in the form of a comma-separated list, between {} characters, for example, |
|
file specifies the name of the output file. The default output file is $FWDIR/conf/user_def_file. |
|
Create an LDIF format file for importation by an LDAP server. |
|
The profile name. |
|
The branch under which the users are to be added. |
|
This is the Account Unit's IKE shared secret (IKE Key in the Encryption tab of the Account Unit Properties window.) |
Comments Note:
-a
parameter to specify a list of attributes, and then import the created file using fwm dbimport
, the attributes not exported will be deleted from the user database.fwm dbexport
and fwm dbimport
(non-LDIF Usage) cannot export and import user groups. To export and import a user database, including groups, proceed as follows:* Run
on the source Security Management server.fwm dbexport
* On the destination Security Management server, create the groups manually.
* Run
on the destination Security Management server.fwm dbimport
The users will be added to the groups to which they belonged on the source Security Management server.
fwm dbexport
once for each subtree, for example:
|
Next, import the individual files into the LDAP server one after the other. For information on how to do this, refer to the documentation for your LDAP server.
Example Suppose the User Database contains two users, "maryj" and "ben".
|
creates a LDIF file consisting of two entries with the following DNs:
|
Description Download the user database and network objects information to selected targets. If no target is specified, then the database is downloaded to localhost.
Syntax
gw> fwm dbload [-a|-c <conffile>] [<targets>]
Parameter |
Description |
---|---|
|
Execute command on all targets specified in the default system configuration file ( |
|
Only OPSEC control connections in the file are enabled. |
|
Execute command on the designated targets. |
Description
command line encrypts the password of a SecuRemote user using IKE. The resulting string must then be stored in the LDAP database. fwm ikecrypt
Syntax
> fwm ikecrypt <shared-secret> <user-password>
Parameter |
Description |
---|---|
|
The IKE Key defined in the Encryption tab of the LDAP Account Unit Properties window. |
|
The SecuRemote user's password. |
Comments An internal CA must be created before implementing IKE encryption. An Internal CA is created during the initial configuration of the Security Management server, following installation.
Description
command line fetches the packet capture. fwm getpcap
Syntax > fwm getpcap -g <gw> -u <cap id> [-p <path>] [-c <domain>]
Parameter |
Description |
---|---|
|
Host name of the gateway |
|
Capture UID |
|
Output pathname |
|
Host name of the Domain Management Server |
Note - This command only works with IPS packet captures stored on the Gateway in $FWDIR//opt/CPsuite-R77/fw1/log/captures_repository. It does not work with other blades such as Anti-Bot and Anti-Virus that store packet captures in $FWDIR/log/blob.
Description Compile and install a Security Policy or a specific version of the Security Policy on the target's Security Gateways. This is done in one of two ways:
fwm load
compiles and installs an Inspection Script (*.pf
) file on the designated Security Gateways.fwm load
converts a Rule Base (*.W
) file created by the GUI into an Inspection Script (*.pf
) file then installs it to the designated Security Gateways.Versions of the Security Policy and databases are maintained in a version repository on the Security Management server. Using this command, specific versions of the Security Policy can be installed on a gateway (local or remote) without changing the definition of the current active database version on the Security Management server.
To protect a target, you must load a Policy that contains rules whose scope matches the target. If none of the rules are enforced on the target, then all traffic through the target is blocked.
Syntax > fwm load [-p <plug-in>] [-S] <rulebase> <targets>
Parameter |
Description |
---|---|
|
The targets are UTM-1 Edge gateways. |
|
Specifies the product name |
|
A Rule Base created by the GUI. Specify the name of the rulebase, such as |
|
Execute command on the designated target. |
Example The following command installs the Security Policy
in the target gateway standard
johnny.
fwm load Standard johnny
Description View and unlock locked administrators.
Syntax >fwm lock_admin [-v][-u <administrator>][-ua]
Parameter |
Description |
---|---|
|
View the names of all locked administrators. |
|
Unlock a single administrator. |
|
Unlock all locked administrators. |
Description
exports the Log file to an ASCII file. fwm logexport
Syntax > fwm logexport [-d <delimiter>] [-i <filename>] [-o <outputfile>] [-n] [-p]
[-f] [-m {initial|semi|raw}] [-a]
Parameter |
Description |
---|---|
|
Set the output delimiter. The default is a semicolon ( |
|
The name of the input Log file. The default is the active Log file, |
|
The name of the output file. The default is printing to the screen. |
|
Do not perform DNS resolution of the IP addresses in the Log file (this option significantly speeds the processing). |
|
Do not perform service resolution. A service port number is displayed. |
|
If this is the active Log file ( |
|
This flag specifies the unification mode.
|
|
Show account records only (the default is to show all records). |
Comments Controlling the Output of
using fwm logexport
logexport.ini
The output of
can be controlled by creating a file called fwm logexport
and placing it in the logexport.ini
directory: conf
. The $FWDIR/conf
file should be in the following format:logexport.ini
[Fields_Info] included_fields = field1,field2,field3,<REST_OF_FIELDS>,field100 excluded_fields = field10,field11 |
note that:
num
field will always appear first, and cannot be manipulated using logexport.ini
<REST_OF_FIELDS>
is a reserved token that refers to a list of fields. It is optional. If -f
option is set, <REST_OF_FIELDS>
is based on a list of fields taken from the file logexport_default.C
.-f
is not set, <REST_OF_FIELDS>
will be based on the given input log file. included_fields
and excluded_fields.
Format:
The
output appears in tabular format. The first row lists the names of all fields included in the subsequent records. Each of the subsequent rows consists of a single log record, whose fields are sorted in the same order as the first row. If a record has no information on a specific field, this field remains empty (as indicated by two successive semi-colons).fwm logexport
Example
|
Description Reset the Internal CA and delete all the certificates from the Internal CA and the Internal CA itself. After running
, the ICA should be initialized through the sic_reset
command. If this command is run all the certified IKE from the Internal CA should be removed (using the SmartConsole).cpconfig
Syntax > fwm sic_reset
Description Uninstall the currently loaded Inspection Code from selected targets.
Syntax > fwm unload <targets> [-all|-c <conffile>]
Parameter |
Description |
---|---|
|
Execute command on the designated targets. |
|
Execute command on all targets specified in the default system configuration file ( |
|
Execute command on targets specified in the |
Description
shows the build number. fwm ver
Syntax > fwm ver [-f <filename>]
Parameter |
Description |
---|---|
|
Exports the build number data to a file |
Description The
command verifies the specified policy package without installing it.fwm verify
Syntax > fwm verify <policy>
Parameter |
Description |
---|---|
|
The name of an available policy package. |