fw
Description
-
Performs various operations on Security or Audit log files.
-
Kills the specified Check Point processes.
-
Manages the Suspicious Activity Monitoring (SAM) rules.
-
Manages the Suspicious Activity Policy editor.
Syntax
|
Parameters
Parameter |
Description |
||
---|---|---|---|
|
Runs the command in debug mode. Use only if you troubleshoot the command itself.
|
||
|
Fetches the specified Check Point log files - Security ( See fw fetchlogs. |
||
|
Shows information about Check Point computers in High Availability configuration and their states. See fw hastat. |
||
|
Kills the specified Check Point process. See fw kill. |
||
|
Shows the content of Check Point log files - Security ( See fw log. |
||
|
Switches the current active Check Point log file - Security ( See fw logswitch. |
||
|
Shows a list of Check Point log files - Security ( See fw lslogs. |
||
|
Merges several Check Point log files - Security ( See fw mergefiles. |
||
|
Rebuilds pointer files for Check Point log files - Security ( See fw repairlog. |
||
|
Manages the Suspicious Activity Monitoring (SAM) rules. See fw sam. |
||
or
|
Manages the Suspicious Activity Policy editor that works with these type of rules:
See fw sam_policy. |