<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: tcpdump any interface didn't show interface in R80.40 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcpdump-any-interface-didn-t-show-interface-in-R80-40/m-p/111910#M15504</link>
    <description>&lt;P&gt;Thanks for the fast answer.&lt;/P&gt;&lt;P&gt;If "-P" is always build in: If I start (on R80.40)&lt;/P&gt;&lt;P&gt;tcpdump -s0 -w file.cap -enni any host &amp;lt;pcap-filter&amp;gt;&lt;/P&gt;&lt;P&gt;I can't see the interface information inside Wireshark as shown in my screenshot in my first post (and also not with my preferred tool cppcap &lt;span class="lia-unicode-emoji" title=":smirking_face:"&gt;😏&lt;/span&gt;).&lt;/P&gt;&lt;P&gt;BTW: I read you presentation and didn't got the information that "-P" is build in&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":face_with_open_mouth:"&gt;😮&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 26 Feb 2021 15:26:42 GMT</pubDate>
    <dc:creator>Daniel_</dc:creator>
    <dc:date>2021-02-26T15:26:42Z</dc:date>
    <item>
      <title>tcpdump any interface didn't show interface in R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcpdump-any-interface-didn-t-show-interface-in-R80-40/m-p/111899#M15501</link>
      <description>&lt;P&gt;Hello Experts,&lt;/P&gt;&lt;P&gt;with pre R80.40 systems I captured with&lt;/P&gt;&lt;P&gt;tcpdump -Penni any &amp;lt;pcap-filter&amp;gt;&lt;/P&gt;&lt;P&gt;and got the interface:&lt;/P&gt;&lt;P&gt;12:19:15.061879 Mgmt.600[out]: 10.238.1.1.22 &amp;gt; 10.238.0.4.52825: P 443932:444192(260) ack 1769 win 47888&lt;BR /&gt;12:19:15.061883 Mgmt[out]: 10.238.1.1.22 &amp;gt; 10.238.0.4.52825: P 443932:444192(260) ack 1769 win 47888&lt;BR /&gt;12:19:15.062010 Mgmt.600[out]: 10.238.1.1.22 &amp;gt; 10.238.0.4.52825: P 444192:444452(260) ack 1769 win 47888&lt;BR /&gt;12:19:15.062014 Mgmt[out]: 10.238.1.1.22 &amp;gt; 10.238.0.4.52825: P 444192:444452(260) ack 1769 win 47888&lt;BR /&gt;12:19:15.062141 Mgmt.600[out]: 10.238.1.1.22 &amp;gt; 10.238.0.4.52825: P 444452:444712(260) ack 1769 win 47888&lt;BR /&gt;12:19:15.062145 Mgmt[out]: 10.238.1.1.22 &amp;gt; 10.238.0.4.52825: P 444452:444712(260) ack 1769 win 47888&lt;BR /&gt;12:19:15.062277 Mgmt.600[out]: 10.238.1.1.22 &amp;gt; 10.238.0.4.52825: P 444712:444972(260) ack 1769 win 47888&lt;/P&gt;&lt;P&gt;With R80.40 "-P" is not possible. I used "-Q inout" but I didn't get the interfaces.&lt;/P&gt;&lt;P&gt;With cppcap you can get it in text output but not in capture/wireshark.&lt;/P&gt;&lt;P&gt;I need something like this (captured with "tcpdump -Penni any" on R80.20)&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="wireshark.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10687i2B3E2CCE80246C5F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="wireshark.png" alt="wireshark.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Any ideas to get interfaces in text output with tcpdump and also in capture file (for wireshark) back?&lt;/P&gt;&lt;P&gt;Bye&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 12:03:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcpdump-any-interface-didn-t-show-interface-in-R80-40/m-p/111899#M15501</guid>
      <dc:creator>Daniel_</dc:creator>
      <dc:date>2021-02-26T12:03:26Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump any interface didn't show interface in R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcpdump-any-interface-didn-t-show-interface-in-R80-40/m-p/111907#M15503</link>
      <description>&lt;P&gt;As mentioned in my Max Capture class, the &lt;STRONG&gt;tcpdump&lt;/STRONG&gt; 3.9.4 version bundled with Gaia 2.6.18 had the &lt;STRONG&gt;-P&lt;/STRONG&gt; flag directly hacked in to the &lt;STRONG&gt;tcpdump&lt;/STRONG&gt; binary by Check Point to display the interface name in CLI output.&lt;/P&gt;
&lt;P&gt;When Gaia 3.10 was introduced the version of &lt;STRONG&gt;tcpdump&lt;/STRONG&gt; was updated to version 4.9.0 and the &lt;STRONG&gt;-P&lt;/STRONG&gt; hack went away with it.&amp;nbsp; Will probably need to submit an RFE to get this put back in.&amp;nbsp; Alternatively it looks like &lt;STRONG&gt;tcpdump&lt;/STRONG&gt; version 4.9.9 now natively supports displaying the interface name in the CLI output.&amp;nbsp; As a further motivator for an RFE, the &lt;STRONG&gt;tcpdump&lt;/STRONG&gt; changelog (&lt;A href="https://www.tcpdump.org/tcpdump-changes.txt" target="_blank" rel="noopener"&gt;https://www.tcpdump.org/tcpdump-changes.txt&lt;/A&gt;) notes that literally dozens of CVE vulnerabilities were fixed in &lt;STRONG&gt;tcpdump&lt;/STRONG&gt; versions 4.9.2 and 4.9.3, so perhaps R&amp;amp;D could just update &lt;STRONG&gt;tcpdump&lt;/STRONG&gt; to 4.9.9 via Jumbo HFA and kill two birds with one stone.&amp;nbsp; Tagging&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;for R&amp;amp;D coordination.&lt;/P&gt;
&lt;P&gt;As an workaround for now just use &lt;STRONG&gt;cppcap&lt;/STRONG&gt; (my preferred tool) or there is the "anydump" script:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sebastianhaas.de/anydump-release/" target="_blank" rel="noopener"&gt;https://sebastianhaas.de/anydump-release/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 14:53:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcpdump-any-interface-didn-t-show-interface-in-R80-40/m-p/111907#M15503</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-02-26T14:53:04Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump any interface didn't show interface in R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcpdump-any-interface-didn-t-show-interface-in-R80-40/m-p/111910#M15504</link>
      <description>&lt;P&gt;Thanks for the fast answer.&lt;/P&gt;&lt;P&gt;If "-P" is always build in: If I start (on R80.40)&lt;/P&gt;&lt;P&gt;tcpdump -s0 -w file.cap -enni any host &amp;lt;pcap-filter&amp;gt;&lt;/P&gt;&lt;P&gt;I can't see the interface information inside Wireshark as shown in my screenshot in my first post (and also not with my preferred tool cppcap &lt;span class="lia-unicode-emoji" title=":smirking_face:"&gt;😏&lt;/span&gt;).&lt;/P&gt;&lt;P&gt;BTW: I read you presentation and didn't got the information that "-P" is build in&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":face_with_open_mouth:"&gt;😮&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 15:26:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcpdump-any-interface-didn-t-show-interface-in-R80-40/m-p/111910#M15504</guid>
      <dc:creator>Daniel_</dc:creator>
      <dc:date>2021-02-26T15:26:42Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump any interface didn't show interface in R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcpdump-any-interface-didn-t-show-interface-in-R80-40/m-p/111914#M15507</link>
      <description>&lt;P&gt;You can't see the interface name in Wireshark because it is not embedded in the pcap file in the first place.&amp;nbsp; If doing a live capture or a replay with version 4.9.9, &lt;STRONG&gt;tcpdump&lt;/STRONG&gt; can only display the interface information because it is looking at the live interface configuration of the system it is running on, and can calculate the interface name for display.&amp;nbsp; If a pcap file created by tcpdump/cppcap is replayed on a different system or viewed in Wireshark, the interface name information is not supported by the pcap format at all, and is simply not available.&amp;nbsp; Using the hacked-in&amp;nbsp;&lt;STRONG&gt;-P&lt;/STRONG&gt; option embedded the interface name into the pcap file in what I assume is an unsupported way, as seen in your screenshot.&amp;nbsp; pcapng (which is still experimental) will address this by including interface name information right in the capture file.&lt;/P&gt;
&lt;P&gt;So without the &lt;STRONG&gt;-P&lt;/STRONG&gt; hack you are basically stuck, and cannot see interface information in Wireshark with pcap captures generated by cppcap/tcpdump.&amp;nbsp; It would be a very interesting feature if &lt;STRONG&gt;cppcap&lt;/STRONG&gt; had an option to output its captures in pcapng format (which would include interface name information embedded in the capture) instead of standard pcap format, so I'm going to tag cppcap's author&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/24548"&gt;@Aviad_Hadarian&lt;/a&gt;&amp;nbsp;who also got a shout out in my &lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/484/2/CPX_Preso_TimHall_FINAL.pdf" target="_self"&gt;2021 CPX presentation.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;As a workaround you could use&lt;STRONG&gt; fw monitor -F&lt;/STRONG&gt;, which can capture accelerated traffic and has the interface name information along with capture points embedded in its capture file output in the "snoop" file format, which does support including the interface name.&amp;nbsp; You'll need to set up Wireshark to display this properly as described here: &lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk39510&amp;amp;partition=Basic&amp;amp;product=Other" target="_blank" rel="noopener"&gt;sk39510: How to configure &lt;STRONG&gt;Wireshark&lt;/STRONG&gt; to display Check Point FireWall chains in an FW Monitor packet.&lt;/A&gt;&amp;nbsp; However be sure to read my stern warning in the presentation about how &lt;STRONG&gt;fw monitor -F&lt;/STRONG&gt; can blast you with an unfiltered capture if you make a mistake with your filter, so double-check your filtering syntax and always use the &lt;STRONG&gt;-ci&lt;/STRONG&gt; and/or &lt;STRONG&gt;-co&lt;/STRONG&gt; options to automatically limit the number of packets captured by &lt;STRONG&gt;fw monitor -F&lt;/STRONG&gt; just in case you do make a mistake.&lt;/P&gt;
&lt;P&gt;I suppose you could take the older &lt;STRONG&gt;tcpdump&lt;/STRONG&gt; binary from a R80.20 system and copy it over to a Gaia 3.10 system and try to run it, but that is unlikely to work and most definitely not supported.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 16:10:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcpdump-any-interface-didn-t-show-interface-in-R80-40/m-p/111914#M15507</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-02-26T16:10:43Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump any interface didn't show interface in R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcpdump-any-interface-didn-t-show-interface-in-R80-40/m-p/111983#M15523</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp; thank you for you kind words, I don't think it too problematic to add interface names if such thing is available in libpcap, will look&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2021 06:29:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcpdump-any-interface-didn-t-show-interface-in-R80-40/m-p/111983#M15523</guid>
      <dc:creator>Aviad_Hadarian</dc:creator>
      <dc:date>2021-02-28T06:29:00Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump any interface didn't show interface in R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcpdump-any-interface-didn-t-show-interface-in-R80-40/m-p/112051#M15533</link>
      <description>&lt;P&gt;Thanks to take a look to this. And an other RFE &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Can you add a fileinfo in the pcap file (as f5 does)?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fileinfo.png" style="width: 1197px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10707i84C5D55C173759C7/image-dimensions/1197x39?v=v2" width="1197" height="39" role="button" title="fileinfo.png" alt="fileinfo.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;This would also help TAC to interpret captures.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Mar 2021 07:30:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcpdump-any-interface-didn-t-show-interface-in-R80-40/m-p/112051#M15533</guid>
      <dc:creator>Daniel_</dc:creator>
      <dc:date>2021-03-01T07:30:47Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump any interface didn't show interface in R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcpdump-any-interface-didn-t-show-interface-in-R80-40/m-p/112066#M15537</link>
      <description>&lt;P&gt;That's Nice but will require special extension in wireshark&lt;/P&gt;</description>
      <pubDate>Mon, 01 Mar 2021 09:35:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcpdump-any-interface-didn-t-show-interface-in-R80-40/m-p/112066#M15537</guid>
      <dc:creator>Aviad_Hadarian</dc:creator>
      <dc:date>2021-03-01T09:35:06Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump any interface didn't show interface in R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcpdump-any-interface-didn-t-show-interface-in-R80-40/m-p/112080#M15541</link>
      <description>&lt;P&gt;I'm running Wireshark 3.4.3 and didn't installed any plugins (AFAIK)...&lt;/P&gt;</description>
      <pubDate>Mon, 01 Mar 2021 12:04:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcpdump-any-interface-didn-t-show-interface-in-R80-40/m-p/112080#M15541</guid>
      <dc:creator>Daniel_</dc:creator>
      <dc:date>2021-03-01T12:04:40Z</dc:date>
    </item>
  </channel>
</rss>

