fw
Description
-
Fetches and unloads Threat Prevention policy.
-
Controls the Firewall module.
-
Generates the Default Filter policy files.
-
Fetches the policy from the Management Server, peer Cluster Member, or local directory.
-
Fetches the specified Security or Audit log files from the specified Check Point computer.
-
Shows the list of interfaces and their IP addresses.
-
Shows information about Check Point computers in High Availability configuration and their states.
-
Controls ISP links in ISP Redundancy configuration.
-
Kills the specified Check Point processes.
-
Shows a list of hosts protected by the Security Gateway.
-
Shows the content of Check Point log files.
-
Switches the current active log file.
-
Shows a list of Security or Audit log files.
-
Merges several input log files into a single log file.
-
Runs FW Monitor to capture the traffic that passes through the Security Gateway.
-
Rebuilds pointer files for Security or Audit log files.
-
Manages the Suspicious Activity Monitoring (SAM) rules.
-
Manages the Suspicious Activity Policy editor.
-
Shows the contents of the Unified Policy kernel tables.
-
Shows the currently installed policy.
-
Shows and deletes the contents of the specified kernel tables.
-
Executes the offline Unified Policy.
-
Removes all policies from the Security Gateway or Cluster Member.
-
Shows the Security Gateway major and minor version number and build number.
Syntax
|
Parameters
Parameter |
Description |
||
---|---|---|---|
|
Runs the command in debug mode. Use only if you troubleshoot the command itself.
|
||
|
Specifies the CoreXL Firewall instance. See fw -i. |
||
|
Fetches and unloads Threat Prevention policy. See fw amw. |
||
|
Controls the Firewall module. See fw ctl. |
||
|
Generates the Default Filter policy files. See fw defaultgen. |
||
|
Fetches the policy from the Management Server, peer Cluster Member, or local directory. See fw fetch. |
||
|
Fetches the specified Security log files ( See fw fetchlogs. |
||
|
Shows the list with this information:
See fw getifs. |
||
|
Shows information about Check Point computers in High Availability configuration and their states. See fw hastat. |
||
|
Controls ISP links in the ISP Redundancy configuration. See fw isp_link. |
||
|
Kills the specified Check Point processes. See fw kill. |
||
|
Shows a list of hosts protected by the Security Gateway. See fw lichosts. |
||
|
Shows the content of Check Point log files - Security ( See fw log. |
||
|
Switches the current active log file - Security ( See fw logswitch. |
||
|
Shows a list of Security log files ( See fw lslogs. |
||
|
Merges several input log files - Security ( See fw mergefiles. |
||
|
Runs FW Monitor to capture the traffic that passes through the Security Gateway. See fw monitor. |
||
|
Rebuilds pointer files for Security log files ( See fw repairlog. |
||
|
Manages the Suspicious Activity Monitoring (SAM) rules. See fw sam. |
||
|
Manages the Suspicious Activity Policy editor. See fw sam_policy. |
||
|
Shows the contents of the Unified Policy kernel tables. See fw showuptables. |
||
|
Shows the currently installed policy. See fw stat. |
||
|
Shows and deletes the contents of the specified kernel tables. See fw tab. |
||
|
Uninstalls all policies from the Security Gateway or Cluster Member. See fw unloadlocal. |
||
|
Executes the offline Unified Policy. See fw up_execute. |
||
|
Shows the Security Gateway major and minor version number and build number. See fw ver. |