Print Download PDF Send Feedback

Previous

Next

fw

Description

Syntax

fw [-d]

fetchlogs <options>

hastat <options>

kill <options>

log <options>

logswitch <options>

lslogs <options>

mergefiles <options>

repairlog <options>

sam <options>

sam_policy <options>

Parameters

Item

Description

-d

Runs the command in debug mode.

Use only if you troubleshoot the command itself.

fetchlogs <options>

Fetches the specified Security log files ($FWDIR/log/*.log*) or Audit log files ($FWDIR/log/*.adtlog*) from the specified Check Point computer.

hastat <options>

Shows information about Check Point computers in High Availability configuration and their states.

kill <options>

Kills the specified Check Point processes.

log <options>

Shows the content of Check Point log files - Security ($FWDIR/log/*.log) or Audit ($FWDIR/log/*.adtlog).

logswitch <options>

Switches the current active log file - Security ($FWDIR/log/fw.log) or Audit ($FWDIR/log/fw.adtlog)

lslogs <options>

Shows a list of Security log files ($FWDIR/log/*.log*) or Audit log files ($FWDIR/log/*.adtlog*) residing on the local computer or a remote computer.

mergefiles <options>

Merges several input log files - Security ($FWDIR/log/*.log) or Audit ($FWDIR/log/*.adtlog) - into a single log file.

repairlog <options>

Rebuilds pointer files for Security ($FWDIR/log/*.log) or Audit ($FWDIR/log/*.adtlog) log files.

sam <options>

Manages the Suspicious Activity Monitoring (SAM) rules.

sam_policy <options>

or

samp <options>

Manages the Suspicious Activity Policy editor that lets you work with these type of rules:

  • Suspicious Activity Monitoring (SAM) rules.
  • Rate Limiting rules.