<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VSX Tcpdump Problem in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Tcpdump-Problem/m-p/189784#M34970</link>
    <description>&lt;P&gt;Hi mates,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When we run tcpdump / cppcap on VSX gateway, we are able to see only ARP request and reply packets. Normally thorugh vsx the whole traffic is going through. in this case when we specify the interface on tcpdump syntax, still we see only arp packets. Anyone has idea?&lt;/P&gt;</description>
    <pubDate>Thu, 17 Aug 2023 15:01:30 GMT</pubDate>
    <dc:creator>starmen2000</dc:creator>
    <dc:date>2023-08-17T15:01:30Z</dc:date>
    <item>
      <title>VSX Tcpdump Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Tcpdump-Problem/m-p/189784#M34970</link>
      <description>&lt;P&gt;Hi mates,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When we run tcpdump / cppcap on VSX gateway, we are able to see only ARP request and reply packets. Normally thorugh vsx the whole traffic is going through. in this case when we specify the interface on tcpdump syntax, still we see only arp packets. Anyone has idea?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2023 15:01:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Tcpdump-Problem/m-p/189784#M34970</guid>
      <dc:creator>starmen2000</dc:creator>
      <dc:date>2023-08-17T15:01:30Z</dc:date>
    </item>
    <item>
      <title>Re: VSX Tcpdump Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Tcpdump-Problem/m-p/189785#M34971</link>
      <description>&lt;P&gt;What version/JHF?&lt;BR /&gt;What precise syntax are you using?&lt;BR /&gt;Can you see the traffic with fw monitor or through other means?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2023 15:10:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Tcpdump-Problem/m-p/189785#M34971</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-08-17T15:10:28Z</dc:date>
    </item>
    <item>
      <title>Re: VSX Tcpdump Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Tcpdump-Problem/m-p/189786#M34972</link>
      <description>&lt;P&gt;R81 / Take 68&lt;BR /&gt;&lt;BR /&gt;tcpdump -nni any&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;tcpdump -nni bond2.776 and host x.y.z.t&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;With fw monitor I can not see the traffic if I specify destination IP&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2023 15:14:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Tcpdump-Problem/m-p/189786#M34972</guid>
      <dc:creator>starmen2000</dc:creator>
      <dc:date>2023-08-17T15:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: VSX Tcpdump Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Tcpdump-Problem/m-p/189799#M34977</link>
      <description>&lt;P&gt;This is a quote from my &lt;A href="http://www.maxpowerfirewalls.com/max-capture-course.html" target="_blank" rel="noopener"&gt;Max Capture: Know Your Packets&lt;/A&gt; self-guided video series:&lt;/P&gt;
&lt;P&gt;If trying to capture traffic on a Wrp interface in a VSX environment, or on vSEC for NSX-V, &lt;STRONG&gt;fw monitor&lt;/STRONG&gt; must be used to&lt;BR /&gt;ensure a complete capture. See s&lt;A href="https://support.checkpoint.com/results/sk/sk167462" target="_blank" rel="noopener"&gt;k167462: Tcpdump / CPpcap do not show incoming packets on Virtual Switch's Wrp&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk167462" target="_blank" rel="noopener"&gt;interface&lt;/A&gt; and &lt;A href="https://support.checkpoint.com/results/sk/sk116796" target="_blank" rel="noopener"&gt;sk116796: ' tcpdump ' utility does not capture the specified traffic on vSEC for NSX / vSEC Virtual Edition&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk116796" target="_blank" rel="noopener"&gt;Hypervisor Mode&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2023 16:53:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Tcpdump-Problem/m-p/189799#M34977</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-08-17T16:53:10Z</dc:date>
    </item>
  </channel>
</rss>

