fw tab

Description

Shows data from the specified Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. kernel tables.

This command also changes the content of dynamic kernel tables. You cannot change the content of static kernel tables.

Kernel tables (also known as State tables) store data that the Firewall and other Software Blades use to inspect packets. These kernel tables are a critical component of Stateful Inspection.

Best Practices:

  • Use the "fw tab -t connections -f" command to see the detailed (and more technical) information about the current connections in the Connections kernel table (ID 8158).

  • Use the fw ctl conntab command to see the simplified information about the current connections in the Connections kernel table (ID 8158).

Syntax

fw tab {-h | -help}

fw [-d] tab

      -v

      -t <Table>

      {-c | -s}

      -f [-r]

      -o <Output File>

      {-u | -m <Limit>}

      -a -e "<Entry>"

      -A -e "<Entry>"

      -x [-e "<Entry>"]

      -y

      -z [-l]

      <Name of Object>

Parameters

Parameter

Description

-h

-help

Shows the built-in usage.

-d

Runs the command in debug mode.

Use only if you troubleshoot the command itself.

Best Practice - If you use this parameter, then redirect the output to a file, or use the script command to save the entire CLI session.

-t <Table>

Specifies the kernel table by its name of unique ID.

To see the names and IDs of the available kernel tables, run:

fw tab -s

Because the output of this command is very long, we recommend to redirect it to a file. For example:

fw tab -s > /tmp/output.txt

Notes:

  • If you do not specify kernel tables, then the command shows the summary data for all kernel tables.

  • You can specify several different kernel tables in the same command.

-a -e "<Entry>"

Adds the specified entry to the specified kernel table.

If a kernel table has the "expire" attribute, when you add an entry with the "-a -e <Entry>" parameter, the new entry gets the default table timeout.

You can use this parameter only locally on a Security Gateway / Cluster MemberClosed Security Gateway that is part of a cluster..

Important - Each kernel table has its own internal format.

Warning - If you add a wrong entry, you can make your Security Gateway / ClusterClosed Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. Memberunresponsive.

-A -e "<Entry>"

Adds the specified entry to the specified kernel table - in all CoreXLClosed Performance-enhancing technology for Security Gateways on multi-core processing platforms. Multiple Check Point Firewall instances are running in parallel on multiple CPU cores. Firewall instances.

If a kernel table has the "expire" attribute, when you add an entry with the "-A -e <Entry>" parameter, the new entry gets the default table timeout.

You can use this parameter only locally on a Security Gateway / Cluster Member.

Important - Each kernel table has its own internal format.

Warning - If you add a wrong entry, you can make your Security Gateway / Cluster Member unresponsive.

-c

Shows formatted kernel table data in the common format. This is the default.

The parameters "-c" and "-s" are mutually exclusive.

-e "<Entry>"

Specifies the entry in the kernel table.

Important - Each kernel table has its own internal format.

For the "Connections" (ID 8158) table, see sk65133.

-f

Shows formatted kernel table data. For example, shows:

  • All IP addresses and port numbers in the decimal format.

  • All dates and times in human readable format.

The parameter "-r" resolves IP addresses into hostnames.

Note - Each table can use a different style.

Important - If the specified kernel table is large, this consumes a large amount of RAM. This can make your Security Gateway unresponsive.

-o <Output File>

Saves the output in the specified file in the CL format as a Check Point Firewall log.

You can later open this file with the fw log command.

If you do not specify the full path explicitly, this command saves the output file in the current working directory.

-m <Limit>

Specifies the maximum number of kernel table entries to show.

This command counts the entries from the beginning of the kernel table.

The parameters "-m" and "-u" are mutually exclusive.

-s

Shows a short summary of the kernel table data.

The parameters "-s" and "-c" are mutually exclusive.

-u

Specifies to show an unlimited number of kernel table entries.

The parameters "-u" and "-m" are mutually exclusive.

Important - If the specified kernel table is large, this consumes a large amount of RAM. This can make your Security Gateway unresponsive.

-v

Shows the CoreXL Firewall instance number as a prefix for each line.

-x [-e <Entry>]

Deletes all entries or the specified entry from the specified kernel table.

You can use this parameter only locally on a Security Gateway / Cluster Member.

Warning - We do not recommend this command for any production use, only for debugging and experimenting.

If you delete a wrong entry, you can break the current connections through your Security Gateway / Cluster Member.

This includes the remote SSH connection.

For more information, see sk103876.

-y

Specifies not to show a prompt before Security Gateway executes a command.

Applies to these parameters: "-a", "-A", and "-x".

-z [-l]

In the "Connections" table (ID 8158) shows only connections in Slow Path (F2FClosed Denotes non-VPN connections that SecureXL forwarded to firewall. See "Firewall Path".) and the reason why acceleration is not possible for each connection.

These are connections that SecureXLClosed Check Point product on a Security Gateway that accelerates IPv4 and IPv6 traffic that passes through a Security Gateway. cannot accelerate and forwards to the Firewall.

The parameter "-l" shows statistics for connections.

The parameter "-z" implicitly runs the parameter "-u".

See the corresponding example (with the legend) below.

<Name of Object>

Appplies only when you run this command on the Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server..

Specifies the name of the Security Gateway or Cluster Member object (as defined in SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on.), from which to show the information.

This requires the established SICClosed Secure Internal Communication. The Check Point proprietary mechanism with which Check Point computers that run Check Point software authenticate each other over SSL, for secure communication. This authentication is based on the certificates issued by the ICA on a Check Point Management Server. with the Security Gateway / Cluster Member.

If you do not use this parameter, the default is localhost.

Examples