fw
Description
-
Fetches and unloads Threat Prevention policy.
-
Controls the Firewall module.
-
Generates the Default Filter policy files.
-
Fetches the policy from the Management Server
Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server., peer Cluster Member
Security Gateway that is part of a cluster., or local directory.
-
Fetches the specified Security or Audit log files from the specified Check Point computer.
-
Shows the list of interfaces and their IP addresses.
-
Shows information about Check Point computers in High Availability
A redundant cluster mode, where only one Cluster Member (Active member) processes all the traffic, while other Cluster Members (Standby members) are ready to be promoted to Active state if the current Active member fails. In the High Availability mode, the Cluster Virtual IP address (that represents the cluster on that network) is associated: (1) With physical MAC Address of Active member (2) With virtual MAC Address. Synonym: Active/Standby. Acronym: HA. configuration and their states.
-
Controls ISP links in ISP Redundancy configuration.
-
Kills the specified Check Point processes.
-
Shows a list of hosts protected by the Security Gateway
Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources..
-
Shows the content of Check Point log files.
-
Switches the current active
State of a Cluster Member that is fully operational: (1) In ClusterXL, this applies to the state of the Security Gateway component (2) In 3rd-party / OPSEC cluster, this applies to the state of the cluster State Synchronization mechanism. log file.
-
Shows a list of Security or Audit log files.
-
Merges several input log files into a single log file.
-
Runs FW Monitor to capture the traffic that passes through the Security Gateway.
-
Rebuilds pointer files for Security or Audit log files.
-
Manages the Suspicious Activity Monitoring (SAM) rules.
-
Manages the Suspicious Activity Policy editor.
-
Shows the contents of the Unified Policy kernel tables.
-
Shows the currently installed policy.
-
Shows and deletes the contents of the specified kernel tables.
-
Executes the offline Unified Policy.
-
Removes all policies from the Security Gateway or Cluster
Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. Member.
-
Shows the Security Gateway major and minor version number and build number.
Syntax
|
Parameters
Parameter |
Description |
||
---|---|---|---|
|
Runs the command in debug mode. Use only if you troubleshoot the command itself.
|
||
|
Specifies the CoreXL See fw -i. |
||
|
Fetches and unloads Threat Prevention policy. See fw amw. |
||
|
Controls the Firewall module. See fw ctl. |
||
|
Generates the Default Filter policy files. See fw defaultgen. |
||
|
Fetches the policy from the Management Server, peer Cluster Member, or local directory. See fw fetch. |
||
|
Fetches the specified Security log files ( See fw fetchlogs. |
||
|
Shows the list with this information:
See fw getifs. |
||
|
Shows information about Check Point computers in High Availability configuration and their states. See fw hastat. |
||
|
Controls ISP links in the ISP Redundancy configuration. See fw isp_link. |
||
|
Kills the specified Check Point processes. See fw kill. |
||
|
Shows a list of hosts protected by the Security Gateway. See fw lichosts. |
||
|
Shows the content of Check Point log files - Security ( See fw log. |
||
|
Switches the current active log file - Security ( See fw logswitch. |
||
|
Shows a list of Security log files ( See fw lslogs. |
||
|
Merges several input log files - Security ( See fw mergefiles. |
||
|
Runs FW Monitor to capture the traffic that passes through the Security Gateway. See fw monitor. |
||
|
Rebuilds pointer files for Security log files ( See fw repairlog. |
||
|
Manages the Suspicious Activity Monitoring (SAM) rules. See fw sam. |
||
|
Manages the Suspicious Activity Policy editor. See fw sam_policy. |
||
|
Shows the contents of the Unified Policy kernel tables. See fw showuptables. |
||
|
Shows the currently installed policy. See fw stat. |
||
|
Shows and deletes the contents of the specified kernel tables. See fw tab. |
||
|
Uninstalls all policies from the Security Gateway or Cluster Member. See fw unloadlocal. |
||
|
Executes the offline Unified Policy. See fw up_execute. |
||
|
Shows the Security Gateway major and minor version number and build number. See fw ver. |