Description
Shows the content of Check Point log files - Security ($FWDIR/log/*.log
) or Audit ($FWDIR/log/*.adtlog
).
Syntax
|
|
Parameters
Parameter |
Description |
---|---|
|
Shows the built-in usage. Note - The built-in usage does not show some of the parameters described in this table. |
|
Runs the command in debug mode. Use only if you troubleshoot the command itself. Note - If you use this parameter, then redirect the output to a file, or use the |
|
Shows only Account log entries. |
|
Shows only entries that were logged between the specified start and end times.
|
|
Shows only events with the specified action. One of these:
Notes:
|
|
Shows only entries that were logged before the specified time. Notes:
|
|
Note - Applies only to active log file |
|
Does not show delimiters. The default behavior is:
|
|
Shows the High Level Log key. |
|
Shows only logs that were generated by the Security Gateway with the specified IP address or object name (as configured in SmartConsole). |
|
Shows log UID. |
|
Shows entries that match a specific alert type:
|
|
Shows both the date and the time for each log entry. The default is to show the date only once above the relevant entries, and then specify the time for each log entry. |
|
Specifies the log unification mode:
|
|
Does not perform DNS resolution of the IP addresses in the log file (this is the default behavior). This significantly speeds up the log processing. |
|
Shows detailed log chains - shows all the log segments in the log entry. |
|
Does not perform resolution of the port numbers in the log file (this is the default behavior). This significantly speeds up the log processing. |
|
Shows the names of log header fields. |
|
Shows the Sequence Number. |
|
Shows only entries that were logged after the specified time. Notes:
|
|
Note - Applies only to active log file |
|
Specifies the path and name of the log unification scheme file. The default log unification scheme file is:
|
|
Shows the flags of each log entry (different bits used to specify the "nature" of the log - for example, control, audit, accounting, complementary, and so on). |
|
Shows only entries from the specified log entry number and below, counting from the beginning of the log file. |
|
Shows only entries until the specified log entry number, counting from the beginning of the log file. |
|
In case of an error (for example, wrong field value), continues to show log entries. The default behavior is to stop. |
|
Show confidential logs in clear text. |
|
Specifies the log file to read. If you do not specify the log file explicitly, the command opens the You can specify a switched log file. |
Date and Time format
Part of timestamp |
Format |
Example |
---|---|---|
Date only |
|
|
Time only Note - In this case, the command assumes the current date. |
|
|
Date and Time |
|
|
Output
Each output line consists of a single log entry, whose fields appear in this format:
Note - The fields that show depends on the connection type.
HeaderDateHour ContentVersion HighLevelLogKey Uuid SequenceNum Flags Action Origin IfDir InterfaceName LogId ... |
This table describes some of the fields:
Field Header |
Description |
Example |
|
Date and Time |
|
|
Version |
|
|
High Level Log Key |
|
|
Log UUID |
|
|
Log Sequence Number |
|
|
Internal flags that specify the "nature" of the log - for example, control, audit, accounting, complementary, and so on |
|
|
Action performed on this connection |
|
|
Object name of the Security Gateway that generated this log |
|
|
Traffic direction through interface:
|
|
|
Name of the Security Gateway interface, on which this traffic was logged
If a Security Gateway performed some internal action (for example, log switch), then the log entry shows |
|
|
Log ID |
|
|
Alert Type |
|
|
SIC name of the Security Gateway that generated this log |
|
|
Inbound Security Zone |
|
|
Outbound Security Zone |
|
|
Name of the service used to inspect this connection |
|
|
Object name or IP address of the connection's source computer |
|
|
Object name or IP address of the connection's destination computer |
|
|
Name of the connection's protocol |
|
|
Source port of the connection |
|
|
Name of the Check Point product that generated this log |
|
|
Name of the Check Point product family that generated this log |
|
Example 1 - Show all log entries with both the date and the time for each log entry.
fw log -l |
Example 2 - Show all log entries that start after the specified timestamp
[Expert@MyGW:0]# fw log -l -s "June 12, 2018 12:33:00" 12Jun2018 12:33:00 5 N/A 1 accept MyGW > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; fg-1_client_in_rule_name: Default; fg-1_client_out_rule_name: Default; fg-1_server_in_rule_name: Host Redirect; fg-1_server_out_rule_name: ; ProductName: FG; ProductFamily: Network;
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933; ProductFamily: Network;
... ... ...
[Expert@MyGW:0]# |
Example 3 - Show all log entries between the specified timestamps
[Expert@MyGW:0]# fw log -l -b "June 12, 2018 12:33:00" 'June 12, 2018 12:34:00' 12Jun2018 12:33:00 5 N/A 1 accept MyGW > N/A LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; fg-1_client_in_rule_name: Default; fg-1_client_out_rule_name: Default; fg-1_server_in_rule_name: Host Redirect; fg-1_server_out_rule_name: ; ProductName: FG; ProductFamily: Network;
12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933; ProductFamily: Network;
12Jun2018 12:33:45 5 N/A 1 ctl MyGW > LogId: <max_null>; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; description: Contracts; reason: Could not reach "https://productcoverage.checkpoint.com/ProductCoverageService". Check DNS and Proxy configuration on the gateway.; Severity: 2; status: Failed; version: 1.0; failure_impact: Contracts may be out-of-date; update_service: 1; ProductName: Security Gateway/Management; ProductFamily: Network; [Expert@MyGW:0]# |
Example 4 - Show all log entries with action "drop"
[Expert@MyGW:0]# fw log -l -c drop 12Jun2018 12:33:39 5 N/A 1 drop MyGW < eth0 LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933; ProductFamily: Network; [Expert@MyGW:0]# |
Example 5 - Show all log entries with action "drop", show all field headers, and show log flags
[Expert@MyGW:0]# fw log -l -q -w -c drop HeaderDateHour: 12Jun2018 12:33:39; ContentVersion: 5; HighLevelLogKey: <max_null>; LogUid: ; SequenceNum: 1; Flags: 428292; Action: drop; Origin: MyGW; IfDir: <; InterfaceName: eth0; Alert: ; LogId: 0; ContextNum: <max_null>; OriginSicName: CN=MyGW,O=MyDomain_Server.checkpoint.com.s6t98x; inzone: Local; outzone: External; service_id: ftp; src: MyGW; dst: MyFTPServer; proto: tcp; UP_match_table: TABLE_START; ROW_START: 0; match_id: 2; layer_uuid: 4e26fc30-b345-4c96-b8d7-9db6aa7cdd89; layer_name: MyPolicy Network; rule_uid: 802020d9-5cdc-4c74-8e92-47e1b0eb72e5; rule_name: ; ROW_END: 0; UP_match_table: TABLE_END; UP_action_table: TABLE_START; ROW_START: 0; action: 0; ROW_END: 0; UP_action_table: TABLE_END; ProductName: VPN-1 & FireWall-1; svc: ftp; sport_svc: 64933; ProductFamily: Network; [Expert@MyGW:0]# |
Example 6 - Show only log entries from 0 to 10 (counting from the beginning of the log file)
[Expert@MyGW:0]# fw log -l -x 0 -y 10 ... ... [Expert@MyGW:0]# |