Difference between revisions of "Useful Check Point CLI commands"

From Tech-Wiki
Jump to: navigation, search
Line 5: Line 5:
 
'''Useful CP Commands'''
 
'''Useful CP Commands'''
 
<blockquote></blockquote>
 
<blockquote></blockquote>
{|border="1"
+
{|border="1" cellpadding="5" cellspacing="0"
 
|-
 
|-
!Command
+
!scope="col" style="background:#97CAFF;" |Command
!Description
+
!scope="col" style="background:#97CAFF;" |Description
 
|-
 
|-
 
|cpconfig
 
|cpconfig
Line 55: Line 55:
 
'''Useful FW Commands'''
 
'''Useful FW Commands'''
 
<blockquote></blockquote>
 
<blockquote></blockquote>
{|border="1"
+
{|border="1" cellpadding="5" cellspacing="0"
 
|-
 
|-
!Command
+
!scope="col" style="background:#97CAFF;" |Command
!Description
+
!scope="col" style="background:#97CAFF;" |Description
 
|-
 
|-
 
|fw ctl iflist
 
|fw ctl iflist

Revision as of 09:27, 26 September 2011


Useful Check Point commands. Check Point commands generally come under cp (general) and fw (firewall)

Useful CP Commands

Command Description
cpconfig change SIC, licenses and more
cphaprob ldstat display sync serialization statistics
cphaprob stat list the state of the high availability cluster members. Should show active and standby devices.
cphaprob syncstat display sync transport layer statistics
cphastop stop a cluster member from passing traffic. Stops synchronization. (emergency only)
cplic print license information
cpstart start all checkpoint services
cpstat fw show policy name, policy install time and interface table
cpstat ha high availability state
cpstat os -f all checkpoint interface table, routing table, version, memory status, cpu load, disk space
cpstat os -f cpu checkpoint cpu status
cpstat os -f routing checkpoint routing table
cpstop stop all checkpoint services
cpwd_admin monitor_list list processes actively monitored. Firewall should contain cpd and vpnd.

Useful FW Commands

Command Description
fw ctl iflist show interface names
fw ctl pstat show control kernel memory and connections
fw exportlog -o export the current log file to ascii
fw fetch <manager IP> get the policy from the firewall manager
fw log show the content of the connections log
fw log -b <MMM DD, YYYY HH:MM:SS> <MMM DD, YYYY HH:MM:SS> search the current log for activity between specific times, eg
fw log -c drop search for dropped packets in the active log; also can use accept or reject to search
fw log -f tail the current log
fwm logexport -i <log name> -o <output name> export an old log file on the firewall manager
fw logswitch rotate logs
fw lslogs list firewall logs
fw stat firewall status, should contain the name of the policy and the relevant interfaces.
fw stat -l show which policy is associated with which interface and package drop, accept and reject
fw tab displays firewall tables
fw tab -s -t connections number of connections in state table
fw tab -t xlate -x clear all translated entries
fw unloadlocal clear local firewall policy
fw ver firewall version