Module 'fw' (Firewall)
Syntax
- 
                                                
On the Security Gateway
 Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. / each Cluster Member
 Security Gateway that is part of a cluster., run in the Expert mode:fw ctl debug -m fw + {all | <List of Debug Flags>} - 
                                                
On the Scalable Platform Security Group, run in the Expert mode:
g_fw ctl debug -m fw + {all | <List of Debug Flags>} 
| 
                                                         Flag  | 
                                                    
                                                         Description  | 
                                                ||
|---|---|---|---|
| 
                                                         
  | 
                                                    
                                                         Accounting data in logs for Application Control  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Advanced Patterns (signatures over port ranges) - runs under ASPII and CMI  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Accelerated Stateful Protocol Inspection Infrastructure (INPSECT streaming)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         ConnectControl - logical servers in kernel, load balancing  | 
                                                ||
| 
                                                         
  | 
                                                    |||
| 
                                                         
  | 
                                                    
                                                         Universal Bypass on CoreXL  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Mirror and Decrypt feature - only mirror operations on all traffic  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Carrier Grade NAT (CGN/CGNAT)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Connection Chain modules, cookie chain  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Chain forwarding - related to cluster  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Processing of Microsoft Common Internet File System (CIFS) protocol  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Processing of Citrix connections  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Context Management Interface  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Processing of all connections  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Connections statistics for Evaluation of Heavy Connections in CPView (see sk105762)  | 
                                                ||
| 
                                                         
  | 
                                                    |||
| 
                                                         
  | 
                                                    
                                                         Operations on Memory context and CPU context in Module 'kiss' (Kernel Infrastructure)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Virtual de-fragmentation , cookie issues (cookies in the data structure that holds the packets)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Correction layer  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         SSH Inspection 
  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         CRYPTO-PRO Transport Layer Security (HTTPS Inspection  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Encryption and decryption of packets (algorithms and keys are printed in clear text and cipher text)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Processing of connections handled by the Mobile Access  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Operations in the debug filters (see Kernel Debug Filters)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Processing of Data Loss Prevention  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         DNS tunnels  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         DNS queries  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         DDoS attack mitigation (part of IPS)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Check Point kernel attachment (access to kernel is shown as log entries)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Reason for (almost) every dropped packet  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Operations in Drop Templates  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Dynamic log enhancement (INSPECT logs)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         End Point Quarantine (and AMD)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         General errors  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Event App features (DNS, HTTP, SMTP, FTP)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Expiration issues (time-outs) in dynamic kernel tables  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Fast acceleration of connections  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Packet filtering performed by the Check Point kernel and all data loaded into kernel  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Processing of FTP Data connections (used to call applications over FTP Data - i.e., Anti-Virus)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Operations related to the Context Management Interface / Infrastructure Loader 
  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Cluster configuration - changes in the configuration and information about interfaces during traffic processing  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Holding mechanism and all packets being held / released  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         ICMP tunnels  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         interface-related information (accessing the interfaces, installing a filter on an interfaces)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Driver installation - NIC attachment (actions performed by the "  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Integrity Client (enforcement cooperation)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         IOCTL control messages (communication between kernel and daemons, loading and unloading of the FireWall)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Enforcement of IP Options  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         IPS logs and IPS IOCTL  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Processing of IPv6 traffic  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Kernel-buffer memory pool (for example, encryption keys use these memory allocations)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Kernel dynamic tables infrastructure (reads from / writes to the tables) 
  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Memory leak detection mechanism  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Creation of links in Connections kernel table (ID 8158)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Everything related to calls in the log  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         INSPECT Virtual Machine (actual assembler commands being processed) 
  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Issues with e-mails over POP3, IMAP  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Matching of connections to Threat Prevention Layers (multiple rulebases) 
  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Does not apply anymore Only on Security Gateway that runs on Windows OS: Transport Driver Interface information (interface-related information)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Memory allocation operations  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Media Gateway Control Protocol (complementary to H.323 and SIP)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Miscellaneous helpful information (not shown with other debug flags)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         ISP Redundancy  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Prints output similar to the " 
  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Prints output similar to the " 
  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Synchronization between cluster members of Multicast Routes that are added when working with Dynamic Routing Multicast protocols  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         MSN over MSMS (MSN Messenger protocol) In addition, always enable the debug flag '  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Processing of connections in CoreXL Firewall instances 
  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Network Access Control (NAC) feature in Identity Awareness  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         NAT issues - basic information  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Hit Count in NAT Rule Base  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         NAT issues - NAT port allocation operations in Check Point cluster  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         NAT issues - 6in4 tunnels (IPv6 over IPv4) and 4in6 tunnels (IPv4 over IPv6)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         IPS protection "Network Quota"  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Non-TCP / Non-UDP traffic policy (traffic parser)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Actions performed on packets (like Accept, Drop, Fragment)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Stateless verifications (sequences, fragments, translations and other header verifications)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Prevention of port scanning  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Connection profiler for Firewall Priority Queues (see sk105762)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Driver queue (for example, cluster synchronization operations) This debug flag is crucial for the debug of Check Point cluster synchronization issues  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         QoS (FloodGate-1)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Resource Advisor policy (for Application Control, URL Filtering  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Routing issues This debug flag is crucial for the debug of ISP Redundancy issues  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Suspicious Activity Monitoring  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Processing of Stream Control Transmission Protocol (SCTP) connections  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         SecureClient Verification  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Currently is not used  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         VoIP traffic - SIP and H.323 
  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Issues with e-mails over SMTP  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Sockstress TCP DoS attack (CVE-2008-4609)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Monitor mode (mirror / span port)  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Stateful Protocol Inspection Infrastructure and INSPECT Streaming Infrastructure  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         IPS protection 'SYN Attack' (SYNDefender) 
  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Synchronization operations in Check Point cluster 
  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         TCP streaming mechanism  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Prints the name of an interface for incoming connection from Threat Emulation  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Currently is not used  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Operations in the Threat Prevention container  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Processing of Universal Alcatel "UA" connections  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Processing of UserCheck connections in Check Point cluster  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Universal Bypass on CoreXL Firewall Instances during load  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         User Space communication with Kernel Space (most useful for configuration and VSX  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Currently is not used  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Virtual Machine chain decisions on traffic going through the   | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Processing of Wireless Application Protocol (WAP) connections  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         General warnings  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Wire-mode Virtual Machine chain module  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         NAT issues - basic information  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         NAT issues - additional information - going through NAT rulebase  | 
                                                ||
| 
                                                         
  | 
                                                    
                                                         Memory allocations in the Zero-Copy kernel module  |