fw stat

Description

Shows the following information about the policy on the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources.:

  • Name of the installed policy.

  • Date of the last policy installation.

  • Names of the interfaces protected by the installed policy, and in which direction the policy protects them.

Important - This command is outdated and exists only for backward compatibility with very old versions. Use the "cpstat -f policy fw" command instead (see cpstat).

Syntax

fw [-d] stat [-l | -s] [<Name of Object>]

Parameters

Parameter

Description

-d

Runs the command in debug mode.

Use only if you troubleshoot the command itself.

Best Practice - If you use this parameter, then redirect the output to a file, or use the script command to save the entire CLI session.

No Parameters

Shows default output - all information is on one line.

-l

Shows long output.

Shows each interface and its protected traffic direction is on a separate line.

In addition, shows this information:

  • Total - Number of packets the Security Gateway received on this interface

  • Reject - Number of packets the Security Gateway rejected on this interface

  • Drop - Number of packets the Security Gateway dropped on this interface

  • Accept - Number of packets the Security Gateway accepted on this interface

  • Log - Whether Security Gateway sends its logs from this interface (0 - no, 1 - yes)

-s

Shows short output.

Shows each interface and its protected traffic direction is on a separate line.

<Name of Object>

Specifies the name of the Security Gateway or Cluster MemberClosed Security Gateway that is part of a cluster. object (as defined in SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on.), from which to show the information. Use this parameter only on the Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server..

This requires the established SICClosed Secure Internal Communication. The Check Point proprietary mechanism with which Check Point computers that run Check Point software authenticate each other over SSL, for secure communication. This authentication is based on the certificates issued by the ICA on a Check Point Management Server. with that Check Point computer.

Example 1 - Default output

[Expert@MyGW:0]# fw stat
HOST POLICY DATE
localhost MyGW_Policy 10Sep2018 14:01:25 : [>eth0] [<eth0] [>eth1]
[Expert@MyGW:0]#

Example 2 - Short output

[Expert@MyGW:0]# fw stat -s
HOST IF POLICY DATE
localhost >eth0 MyGW_Policy 10Sep2018 14:01:25 :
localhost <eth0 MyGW_Policy 10Sep2018 14:01:25 :
localhost >eth1 MyGW_Policy 10Sep2018 14:01:25 :
[Expert@MyGW:0]#

Example 3 - Long output

[Expert@MyGW:0]# fw stat -l
HOST IF POLICY DATE TOTAL REJECT DROP ACCEPT LOG
localhost >eth0 MyGW_Policy 10Sep2018 14:01:25 : 14377 0 316 14061 1
localhost <eth0 MyGW_Policy 10Sep2018 14:01:25 : 60996 0 0 60996 0
localhost >eth1 MyGW_Policy 10Sep2018 14:01:25 : 304 0 304 0 0
[Expert@MyGW:0]#

Example 4 - Long output from the Management Server

[Expert@MGMY:0]# fw stat -l MyGW
HOST IF POLICY DATE TOTAL REJECT DROP ACCEPT LOG
MyGW >eth0 MyGW_Policy 12Sep2018 16:34:56 : 120113 0 0 120113 0
MyGW <eth0 MyGW_Policy 12Sep2018 16:34:56 : 10807 0 0 10807 0
MyGW >eth2 MyGW_Policy 12Sep2018 16:34:56 : 3 0 0 3 0
MyGW <eth2 MyGW_Policy 12Sep2018 16:34:56 : 3 0 0 3 0
[Expert@MGMT:0]#