fw tab

Description

Shows data from the specified Security Gateway kernel tables.

This command also changes the content of dynamic kernel tables. You cannot change the content of static kernel tables.

Kernel tables (also known as State tables) store data that the Firewall and other Software Blades use to inspect packets. These kernel tables are a critical component of Stateful Inspection.

Best Practices:

  • Use the "fw tab -t connections -f" command to see the detailed (and more technical) information about the current connections in the Connections kernel table (ID 8158).

  • Use the fw ctl conntab command to see the simplified information about the current connections in the Connections kernel table (ID 8158).

Important:

  • You can run this command in the Expert mode or in Gaia Clish (Gaia gClish on Scalable Platforms).

  • On Scalable Platforms, you must connect to the applicable Security Group.

Syntax

fw tab {-h | -help}

fw [-d] tab

      -v

      -t <Table>

      {-c | -s}

      -f [-r]

      -o <Output File>

      {-u | -m <Limit>}

      -a -e "<Entry>"

      -A -e "<Entry>"

      -x [-e "<Entry>"]

      -y

      {-z [-l] | -M}

      <Name of Object>

Parameters

Parameter

Description

-d

Runs the command in debug mode.

Use only if you troubleshoot the command itself.

Best Practice - If you use this parameter, then redirect the output to a file, or use the script command to save the entire CLI session.

-h

-help

Shows the built-in usage.

-t <Table>

Specifies the kernel table by its name of unique ID.

To see the names and IDs of the available kernel tables, run:

fw tab -s

Because the output of this command is very long, we recommend to redirect it to a file. For example:

fw tab -s > /tmp/output.txt

Notes:

  • If you do not specify kernel tables, then the command shows the summary data for all kernel tables.

  • You can specify several different kernel tables in the same command.

-a -e "<Entry>"

Adds the specified entry to the specified kernel table.

If a kernel table has the "expire" attribute, when you add an entry with the "-a -e <Entry>" parameter, the new entry gets the default table timeout.

You can use this parameter only locally on a Security Gateway / Cluster Member.

Important - Each kernel table has its own internal format.

Warning - If you add a wrong entry, you can make your Security Gateway / Cluster Memberunresponsive.

-A -e "<Entry>"

Adds the specified entry to the specified kernel table - in all CoreXL Firewall instances.

If a kernel table has the "expire" attribute, when you add an entry with the "-A -e <Entry>" parameter, the new entry gets the default table timeout.

You can use this parameter only locally on a Security Gateway / Cluster Member.

Important - Each kernel table has its own internal format.

Warning - If you add a wrong entry, you can make your Security Gateway / Cluster Member unresponsive.

-c

Shows formatted kernel table data in the common format. This is the default.

The parameters "-c" and "-s" are mutually exclusive.

-e "<Entry>"

Specifies the entry in the kernel table.

Important - Each kernel table has its own internal format.

For the "Connections" (ID 8158) table, see sk65133.

-f

Shows formatted kernel table data. For example, shows:

  • All IP addresses and port numbers in the decimal format.

  • All dates and times in human readable format.

The parameter "-r" resolves IP addresses into hostnames.

Note - Each table can use a different style.

Important - If the specified kernel table is large, this consumes a large amount of RAM. This can make your Security Gateway unresponsive.

-o <Output File>

Saves the output in the specified file in the CL format as a Check Point Firewall log.

You can later open this file with the fw log command.

If you do not specify the full path explicitly, this command saves the output file in the current working directory.

-m <Limit>

Specifies the maximum number of kernel table entries to show.

This command counts the entries from the beginning of the kernel table.

The parameters "-m" and "-u" are mutually exclusive.

-s

Shows a short summary of the kernel table data.

The parameters "-s" and "-c" are mutually exclusive.

-u

Specifies to show an unlimited number of kernel table entries.

The parameters "-u" and "-m" are mutually exclusive.

Important - If the specified kernel table is large, this consumes a large amount of RAM. This can make your Security Gateway unresponsive.

-v

Shows the CoreXL Firewall instance number as a prefix for each line.

-x [-e <Entry>]

Deletes all entries or the specified entry from the specified kernel table.

You can use this parameter only locally on a Security Gateway / Cluster Member.

Warning - We do not recommend this command for any production use, only for debugging and experimenting.

If you delete a wrong entry, you can break the current connections through your Security Gateway / Cluster Member.

This includes the remote SSH connection.

For more information, see sk103876.

-y

Specifies not to show a prompt before Security Gateway executes a command.

Applies to these parameters: "-a", "-A", and "-x".

-z [-l]

In the "Connections" table (ID 8158) shows only connections in Slow Path (F2F) and the reason why acceleration is not possible for each connection.

These are connections that SecureXL cannot accelerate and forwards to the Firewall.

The parameter "-l" shows statistics for connections.

The parameter "-z" implicitly runs the parameter "-u".

The parameters "-z" and "-M" are mutually exclusive.

See the corresponding example (with the legend) below.

-M

In the "Connections" table (ID 8158) shows Used Memory and Peak Memory for each connection.

The parameter "-M"implicitly runs the parameter "-u".

The parameters "-M" and "-z" are mutually exclusive.

See the corresponding example (with the legend) below.

<Name of Object>

Appplies only when you run this command on the Management Server.

Specifies the name of the Security Gateway or Cluster Member object (as defined in SmartConsole), from which to show the information.

This requires the established SIC with the Security Gateway / Cluster Member.

If you do not use this parameter, the default is localhost.

Examples