Module "NRB" (Next Rule Base)
Syntax
-
On the Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. / each Cluster Member Security Gateway that is part of a cluster., run in the Expert mode:
fw ctl debug -m NRB + {all | <List of Debug Flags>}
-
g_fw ctl debug -m NRB + {all | <List of Debug Flags>}
Flag |
Description |
||
---|---|---|---|
|
Information about connection's IP address |
||
|
Rules and applications
|
||
|
Coverage times (entering, blocking, and time spent) |
||
|
|
||
|
General errors |
||
|
General information |
||
|
|||
|
Memory allocation operations |
||
|
Operations in the NRB module (initialization, module loading, calls to the module, contexts, and so on) |
||
|
Policy installation |
||
|
Security rulebase |
||
|
Session layer |
||
|
|||
|
Prints the debug subject of each debug message |
||
|
Prints the timestamp for each debug message (changes when you enable the debug flag ' |
||
|
Prints additional information (used with other debug flags) |
||
|
Prints the VSID of the debugged Virtual System |
||
|
General warnings |