fw tab
Description
Shows data from the specified Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. kernel tables.
This command also changes the content of dynamic kernel tables. You cannot change the content of static kernel tables.
Kernel tables (also known as State tables) store data that the Firewall and other Software Blades use to inspect packets. These kernel tables are a critical component of Stateful Inspection.
|
Best Practices:
|
Syntax
|
Parameters
Parameter |
Description |
||||
---|---|---|---|---|---|
|
Runs the command in debug mode. Use only if you troubleshoot the command itself.
|
||||
|
Shows the built-in usage. |
||||
|
Specifies the kernel table by its name of unique ID. To see the names and IDs of the available kernel tables, run:
Because the output of this command is very long, we recommend to redirect it to a file. For example:
|
||||
|
Adds the specified entry to the specified kernel table. If a kernel table has the You can use this parameter only on the local Security Gateway.
|
||||
|
Shows formatted kernel table data in the common format. This is the default. |
||||
|
Specifies the entry in the kernel table.
|
||||
|
Shows formatted kernel table data. For example, shows:
|
||||
|
Saves the output in the specified file in the CL format as a Check Point Firewall log. You can later open this file with the fw log command. If you do not specify the full path explicitly, this command saves the output file in the current working directory. |
||||
|
Specifies the maximal number of kernel table entries to show. This command counts the entries from the beginning of the kernel table. |
||||
|
Resolves IP addresses in the formatted output. |
||||
|
Shows a short summary of the kernel table data. |
||||
|
Specifies to show an unlimited number of kernel table entries.
|
||||
|
Shows the CoreXL |
||||
|
Deletes all entries or the specified entry from the specified kernel table. You can use this parameter only on the local Security Gateway.
|
||||
|
Specifies not to show a prompt before Security Gateway executes a command. For example, this applies to the parameters " |
||||
|
In the Connections table (ID 8158) shows only connections in Slow Path (F2F These are connections that SecureXL See the corresponding example (with the legend) below. |
||||
|
Specifies the name of the Security Gateway or Cluster Member This requires the established SIC If you do not use this parameter, the default is |
Example 1 - Show the summary of all kernel tables
Example 2 - Show the raw data from the Connections table
Example 3 - Show the formatted data from the Connections table
Example 4 - Show only two entries from the Connections table
Example 5 - Show the raw data from the Connections table and show the IDs of CoreXL Firewall instances for each entry
Example 6 - Show only Slow Path (F2F) entries from the Connections table
![Closed](transparent.gif)
Column |
Description |
---|---|
|
The direction of the connection:
|
|
Source IP address of the connection. |
|
Source Port of the connection. |
|
Destination IP address of the connection |
|
Destination Port of the connection. |
|
Protocol number of the connection:
|
|
Connection state in the Firewall. |
|
How many seconds remain before the connection expires (based on the maximum expiration time). Also, refer to the " For example, 1990/3600 means:
|
|
SecureXL Instance ID. Currently not used. |
|
Reason for why SecureXL cannot accelerate this connection. |
|
The number of packets transferred in this connection. |
|
The number of bytes transferred in this connection. |
|
How many seconds this connection is open. Also, refer to the " |
|
How many seconds passed since the last packet transferred in this connection. |