This section presents the usage of standard firewall (fw) commands as applicable to VSX Gateways and Virtual Systems.
Included Topics |
Description
Shows a driver interface list for a specific Virtual System. By default, the VSX Gateway interface is displayed.
Run
to change context and show an interface list for a different Virtual System.vsenv <vsid>
Syntax
fw getifs
Return Value
(zero) indicates that the command executed successfully. Any other response indicates an error.0
Output
|
Description
Captures network packets at multiple points within the VSX environment. You can only run one instance of this command at a time on VSX Gateway.
This section only presents the syntax relevant for VSX Gateways or clusters.
For more information, see sk30583: What is FW Monitor?
Syntax
fw monitor [-v vsid]
Parameters
Parameter |
Description |
[-v vsid] |
Specify a gateway or Virtual System by its ID. The specific Virtual System on which packets should be captured. The default gives the VSX Gateway. |
Return Value
0 (zero) indicates that the command executed successfully. Any other response indicates an error.
Example
fw monitor -v 2 -e 'accept ip_p=6 shows all TCP packets passing through Virtual System 2.
Output
|
Description
Displays state tables for a specific Virtual System. State tables are used to store state information that Virtual Systems use to correctly inspect packets.
Run
to change context and show an interface list for a different Virtual System.vsenv <vsid>
Syntax
fw tab [-t table name] [...]
Parameters
Parameter |
Description |
-t table name |
Shows the state table for the specified Virtual System. |
[...] |
Arguments as defined for non-VSX machines. |
Example
vsenv 1
fw tab -t connections
Output
|
Description
Fetches the Inspection Code from the specified host and installs it to the kernel.
First, run
to change the context to the applicable Virtual System.vsenv <VSID>
Syntax
fw fetch [-n] [-f] [-c] [-i] master1 [master2] ...
Argument |
Description |
---|---|
|
Fetch the Security Policy from the Security Management Server to the local |
|
Fetch the Security Policy from the Security Management Server listed in the |
|
In cluster, fetches Security Policy from one of the peer cluster members, according to the Check Point High Availability kernel list on the local cluster member. |
|
Ignore SIC information (for example, SIC name) in the database and use the information in the |
|
Runs the command on the designated master. The name of the Security Management Server, from which to fetch the Policy. You may specify a list of one or more Security Management Servers, such as If |