fw tab
Description
Shows data from the specified Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. kernel tables.
This command also changes the content of dynamic kernel tables. You cannot change the content of static kernel tables.
Kernel tables (also known as State tables) store data that the Firewall and other Software Blades use to inspect packets. These kernel tables are a critical component of Stateful Inspection.
|
Best Practices:
|
Syntax
|
Parameters
Parameter |
Description |
||||
---|---|---|---|---|---|
|
Runs the command in debug mode. Use only if you troubleshoot the command itself.
|
||||
|
Shows the built-in usage. |
||||
|
Specifies the kernel table by its name of unique ID. To see the names and IDs of the available kernel tables, run:
Because the output of this command is very long, we recommend to redirect it to a file. For example:
|
||||
|
Adds the specified entry to the specified kernel table. If a kernel table has the You can use this parameter only on the local Security Gateway.
|
||||
|
Shows formatted kernel table data in the common format. This is the default. |
||||
|
Specifies the entry in the kernel table.
|
||||
|
Shows formatted kernel table data. For example, shows:
|
||||
|
Saves the output in the specified file in the CL format as a Check Point Firewall log. You can later open this file with the fw log command. If you do not specify the full path explicitly, this command saves the output file in the current working directory. |
||||
|
Specifies the maximal number of kernel table entries to show. This command counts the entries from the beginning of the kernel table. |
||||
|
Resolves IP addresses in the formatted output. |
||||
|
Shows a short summary of the kernel table data. |
||||
|
Specifies to show an unlimited number of kernel table entries.
|
||||
|
Shows the CoreXL Performance-enhancing technology for Security Gateways on multi-core processing platforms. Multiple Check Point Firewall instances are running in parallel on multiple CPU cores. Firewall instance number as a prefix for each line. |
||||
|
Deletes all entries or the specified entry from the specified kernel table. You can use this parameter only on the local Security Gateway.
|
||||
|
Specifies not to show a prompt before Security Gateway executes a command. For example, this applies to the parameters " |
||||
|
In the Connections table (ID 8158) shows only connections in Slow Path (F2F Denotes non-VPN connections that SecureXL forwarded to firewall. See "Firewall Path".) and the reason why acceleration is not possible for each connection. These are connections that SecureXL Check Point product on a Security Gateway that accelerates IPv4 and IPv6 traffic that passes through a Security Gateway. cannot accelerate and forwards to the Firewall. See the corresponding example (with the legend) below. |
||||
|
Specifies the name of the Security Gateway or Cluster Member Security Gateway that is part of a cluster. object (as defined in SmartConsole Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on.), from which to show the information. Use this parameter only on the Management Server Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server.. This requires the established SIC Secure Internal Communication. The Check Point proprietary mechanism with which Check Point computers that run Check Point software authenticate each other over SSL, for secure communication. This authentication is based on the certificates issued by the ICA on a Check Point Management Server. with that Check Point computer. If you do not use this parameter, the default is |
Example 1 - Show the summary of all kernel tables
Example 2 - Show the raw data from the Connections table
Example 3 - Show the formatted data from the Connections table
Example 4 - Show only two entries from the Connections table
Example 5 - Show the raw data from the Connections table and show the IDs of CoreXL Firewall instances for each entry
Example 6 - Show only Slow Path (F2F) entries from the Connections table
Column |
Description |
---|---|
|
The direction of the connection:
|
|
Source IP address of the connection. |
|
Source Port of the connection. |
|
Destination IP address of the connection |
|
Destination Port of the connection. |
|
Protocol number of the connection:
|
|
Connection state in the Firewall. |
|
How many seconds remain before the connection expires (based on the maximum expiration time). Also, refer to the " For example, 1990/3600 means:
|
|
SecureXL Instance ID. Currently not used. |
|
Reason for why SecureXL cannot accelerate this connection. |
|
The number of packets transferred in this connection. |
|
The number of bytes transferred in this connection. |
|
How many seconds this connection is open. Also, refer to the " |
|
How many seconds passed since the last packet transferred in this connection. |