Difference between revisions of "Useful Check Point CLI commands"

From Tech-Wiki
Jump to: navigation, search
Line 47: Line 47:
 
|cpstat os -f cpu
 
|cpstat os -f cpu
 
|checkpoint cpu status
 
|checkpoint cpu status
 +
|-
 +
|cpstat -f multi_cpu os
 +
|checkpoint cpu load distribution
 
|-
 
|-
 
|cpstat os -f routing
 
|cpstat os -f routing
Line 71: Line 74:
 
|fw ctl pstat
 
|fw ctl pstat
 
|show control kernel memory and connections
 
|show control kernel memory and connections
 +
|-
 +
|fwaccel stat
 +
|show SecureXL status
 
|-
 
|-
 
|fw exportlog -o
 
|fw exportlog -o

Revision as of 20:44, 2 October 2016

Back to Gaia

Useful Check Point commands. Check Point commands generally come under cp (general) and fw (firewall)

Useful CP Commands

Table 1. Useful CP Commands
Command Description
cpconfig change SIC, licenses and more
cphaprob ldstat display sync serialization statistics
cphaprob stat list the state of the high availability cluster members. Should show active and standby devices.
cphaprob syncstat display sync transport layer statistics
cphaprob -a if display status of monitored interfaces in a cluster
cphastop stop a cluster member from passing traffic. Stops synchronization. (emergency only)
cplic print license information
cpstart start all checkpoint services
cpstat fw show policy name, policy install time and interface table
cpstat ha high availability state
cpstat os -f all checkpoint interface table, routing table, version, memory status, cpu load, disk space
cpstat os -f cpu checkpoint cpu status
cpstat -f multi_cpu os checkpoint cpu load distribution
cpstat os -f routing checkpoint routing table
cpstop stop all checkpoint services
cpwd_admin monitor_list list processes actively monitored. Firewall should contain cpd and vpnd.

Useful FW Commands

Table 2. Useful FW Commands
Command Description
fw ctl iflist show interface names
fw ctl pstat show control kernel memory and connections
fwaccel stat show SecureXL status
fw exportlog -o export the current log file to ascii
fw fetch <manager IP> get the policy from the firewall manager
fwm load <policy name> <gateway name> compile and install a policy on the target's gateways.
fw log show the content of the connections log
fw log -b <MMM DD, YYYY HH:MM:SS> <MMM DD, YYYY HH:MM:SS> search the current log for activity between specific times, eg
fw log -c drop search for dropped packets in the active log; also can use accept or reject to search
fw log -f tail the current log
fwm logexport -i <log name> -o <output name> export an old log file on the firewall manager
fw logswitch rotate logs
fw lslogs list firewall logs
fw stat firewall status, should contain the name of the policy and the relevant interfaces.
fw stat -l show which policy is associated with which interface and package drop, accept and reject
fw tab displays firewall tables
fw tab -s -t connections number of connections in state table
fw tab -t xlate -x clear all translated entries
fw unloadlocal clear local firewall policy
fw monitor -e "accept host(10.1.1.10);" trace the packet flow to/from the specified host
fw ver firewall version