<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Constant monitoring with 'zdebug drop' in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243955#M47461</link>
    <description>&lt;P&gt;For a zdebug in particular, it's pretty simple to add the simple filters. I demonstrate how to do so (and how to add multiple flags) here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Packets-lost-after-quot-fw-post-VM-outbound-quot/m-p/230890/highlight/true#M44451" target="_self"&gt;fw ctl zdebug -T -F "10.0.1.253,0,192.168.144.120,0,0" -m fw xlate drop&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 17 Mar 2025 14:21:49 GMT</pubDate>
    <dc:creator>Bob_Zimmerman</dc:creator>
    <dc:date>2025-03-17T14:21:49Z</dc:date>
    <item>
      <title>Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243859#M47429</link>
      <description>&lt;P&gt;Hi, Mates.&lt;/P&gt;
&lt;P&gt;A query, the command&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;#fw ctl zdebug drop | grep 'Destination IP'&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;can be left 'running' in the background in order to 'monitor' a particular IP and know if during the day, the command 'registers' something relevant?&lt;/P&gt;
&lt;P&gt;We do this in order to capture traffic at the exact moment, because unfortunately when we apply the command in real time everything works fine, but just when we stop testing, the connection between 1 source and 1 destination begins to fail and we have no records of those precise moments.&lt;/P&gt;
&lt;P&gt;Is this possible?&lt;/P&gt;
&lt;P&gt;Greetings.&lt;/P&gt;</description>
      <pubDate>Sat, 15 Mar 2025 16:43:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243859#M47429</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-15T16:43:54Z</dc:date>
    </item>
    <item>
      <title>Re: Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243861#M47430</link>
      <description>&lt;P&gt;I let it run in my lab before for a week, never had a problem.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 15 Mar 2025 19:41:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243861#M47430</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-15T19:41:47Z</dc:date>
    </item>
    <item>
      <title>Re: Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243862#M47431</link>
      <description>&lt;P&gt;Hey, Buddy.&lt;/P&gt;
&lt;P&gt;I think my query was not well explained.&lt;/P&gt;
&lt;P&gt;I want to leave ‘running’ the zdebug drop for example x 1 week.&lt;BR /&gt;So, if for example I connect via ssh and applied the command, it is simply not to interrupt the command with Ctrl+C?&lt;/P&gt;
&lt;P&gt;If I close the terminal (Putty, SecureCRT, etc), I can be sure that the command is still running?&lt;/P&gt;</description>
      <pubDate>Sat, 15 Mar 2025 21:21:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243862#M47431</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-15T21:21:48Z</dc:date>
    </item>
    <item>
      <title>Re: Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243863#M47432</link>
      <description>&lt;P&gt;Thats exactly what I did.&lt;/P&gt;</description>
      <pubDate>Sat, 15 Mar 2025 21:29:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243863#M47432</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-15T21:29:22Z</dc:date>
    </item>
    <item>
      <title>Re: Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243864#M47433</link>
      <description>&lt;P&gt;Is it possible to send the output of the command #fw ctl zdebug drop | grep -IP DESTINATION- to a particular ‘path’ of a vsenv (For example in /var/tmp/) and tell it to save the result in a file ending in .txt extension?&lt;/P&gt;</description>
      <pubDate>Sat, 15 Mar 2025 22:53:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243864#M47433</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-15T22:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243865#M47434</link>
      <description>&lt;P&gt;Yup...example&lt;/P&gt;
&lt;P&gt;fw ctl zdebug + drop | grep 1.1.1.1 &amp;gt; /var/log/zdebug.txt&lt;/P&gt;</description>
      <pubDate>Sat, 15 Mar 2025 23:00:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243865#M47434</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-15T23:00:29Z</dc:date>
    </item>
    <item>
      <title>Re: Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243874#M47436</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;The #fw ctl zdebug drop &lt;BR /&gt;is 100% reliable for troubleshooting?&lt;BR /&gt;The messages that appear here for a particular IP that you are having problems with, for example related to TCP RETRANSMISSIONS, is it reliable to rely on this command or are there other testing options?&lt;/P&gt;</description>
      <pubDate>Sun, 16 Mar 2025 13:56:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243874#M47436</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-16T13:56:25Z</dc:date>
    </item>
    <item>
      <title>Re: Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243875#M47437</link>
      <description>&lt;P&gt;For long-term monitoring with &lt;STRONG&gt;fw ctl zdebug + drop&lt;/STRONG&gt; (the "+" ensures you see drops by SecureXL which are rather rare) I wouldn't recommend piping the full output to a grep like that.&amp;nbsp; While the overwhelming majority of packets are accepted and don't show up in the zdebug output, the commencement of a DoS attack or even port scan will cause the amount of output to increase rapidly and potentially impact the performance (or worse) of the firewall.&lt;/P&gt;
&lt;P&gt;What I would recommend is something like this in one window:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;fw ctl zdebug + drop &amp;gt; output.txt&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Then after a few seconds (long enough for the zdebug to fully initialize) do this in another window:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;fw ctl set str simple_debug_filter_daddr_1 DESTINATION_IP&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Then after hitting CNTRL+C to stop the zdebug in the first window, now run this command in the second window just in case:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;fw ctl debug 0&lt;/STRONG&gt; (to ensure your filter has been unset, the zdebug being stopped should do this automatically though)&lt;/P&gt;
&lt;P&gt;The second command will filter the output inside the debug itself and substantially reduce the chance of a DoS flooding the output.&amp;nbsp; Unfortunately you can't run that &lt;STRONG&gt;fw ctl set&lt;/STRONG&gt; command before starting the zdebug as it will just get reset by the zdebug when it starts (and usually when it ends).&lt;/P&gt;
&lt;P&gt;If anyone knows how to add/set&amp;nbsp;&lt;STRONG&gt;simple_debug_filter_daddr_1&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;to the zdebug as part of invoking the zdebug in a single command I'd be all ears.&lt;/P&gt;</description>
      <pubDate>Sun, 16 Mar 2025 17:51:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243875#M47437</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2025-03-16T17:51:00Z</dc:date>
    </item>
    <item>
      <title>Re: Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243880#M47439</link>
      <description>&lt;P&gt;Personally, I would say its reliable, yes, but you would need to use it along with other things, such as tcpdump, logs, fw monitor, etc&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sun, 16 Mar 2025 20:23:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243880#M47439</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-16T20:23:31Z</dc:date>
    </item>
    <item>
      <title>Re: Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243915#M47450</link>
      <description>&lt;P&gt;Hi, &lt;BR /&gt;2 inquiries, please.&lt;/P&gt;
&lt;P&gt;- To capture traffic in Troubleshooting with the FW Monitor is it ‘indispensable’ to turn off the SXL?&lt;/P&gt;
&lt;P&gt;- In a VSX environment, can I capture traffic with the FW Monitor and export the output to a pcap file, in a particular vsenv?&lt;/P&gt;
&lt;P&gt;Thanks for the replies.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 11:54:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243915#M47450</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-17T11:54:23Z</dc:date>
    </item>
    <item>
      <title>Re: Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243918#M47452</link>
      <description>&lt;P&gt;1) You can, but most people dont, unless its really complicated issue or involves kernel debug (in my experience)&lt;/P&gt;
&lt;P&gt;2) Its been some timeI dealt with VSX, but I recall you can do so in VS itself&lt;/P&gt;
&lt;P&gt;example -&amp;gt; vsenv 1 -&amp;gt; fw monitor -e "accept host(1.2.3.4) and port(444);" -o /var/log/testfwmonitor.out&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 12:09:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243918#M47452</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-17T12:09:27Z</dc:date>
    </item>
    <item>
      <title>Re: Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243920#M47453</link>
      <description>&lt;P&gt;I want to capture TCP traffic with #FW Monitor and #fw ctl zdebug.... &lt;BR /&gt;In an environment of a TCP communication between 1 source and 1 destination on a particular port, as we are currently reporting a problem with TCP retransmissions.&lt;/P&gt;
&lt;P&gt;So I wanted to be sure if it is necessary to turn off the SXL, because to be honest, many times one forgets to 'turn it on' again. &lt;span class="lia-unicode-emoji" title=":smirking_face:"&gt;😏&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":grinning_face_with_sweat:"&gt;😅&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 12:16:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243920#M47453</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-17T12:16:27Z</dc:date>
    </item>
    <item>
      <title>Re: Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243925#M47454</link>
      <description>&lt;P&gt;One time when I was helping a lady with some CP upgrades and they would always turn off sxl and she says "Dont worry Andy, I always remember to turn it back on after the upgrade", there comes 6 am, I say you forgot something, she goes "What, should we go for a breakfast?"...Im thinking, YES, PLUS turn back on sxl haha &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;No shame in writting it on big piece of paper or whiteboard, all good!&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 12:23:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243925#M47454</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-17T12:23:02Z</dc:date>
    </item>
    <item>
      <title>Re: Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243932#M47456</link>
      <description>&lt;P&gt;There are very few situations where you must use &lt;STRONG&gt;fw monitor -e&lt;/STRONG&gt; (which can only capture traffic in F2F/slowpath) on a modern Check Point gateway.&amp;nbsp; If all you need to see is whether traffic was received and then whether it was transmitted (basically just capture points i and O), use &lt;STRONG&gt;cppcap&lt;/STRONG&gt;.&amp;nbsp; If you need to see all 4 capture points iIoO (say for detailed NAT troubleshooting, or to see if Gaia is dropping something instead of the Check Point code), use &lt;STRONG&gt;fw monitor -F&lt;/STRONG&gt;.&amp;nbsp; Both these tools will give you a complete capture regardless of the state of SecureXL.&amp;nbsp; SecureXL should really not be disabled for any reason via&amp;nbsp;&lt;STRONG&gt;fwaccel off&lt;/STRONG&gt; on a modern Check Point gateway.&lt;/P&gt;
&lt;P&gt;If you attempt to run &lt;STRONG&gt;fw ctl zdebug + drop&lt;/STRONG&gt; and &lt;STRONG&gt;fw monitor -F&lt;/STRONG&gt; simulteneously, be aware that you need to run them in the proper order to keep them from interfering with each other.&amp;nbsp; See here:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Debug-Filter-Battle-fw-monitor-F-vs-fw-ctl-zdebug-drop/td-p/147374" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Debug Filter Battle -- fw monitor -F vs. fw ctl zdebug + drop&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 12:52:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243932#M47456</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2025-03-17T12:52:09Z</dc:date>
    </item>
    <item>
      <title>Re: Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243933#M47457</link>
      <description>&lt;P&gt;On another note&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/82839"&gt;@Matlu&lt;/a&gt;&amp;nbsp;, what is the EXACT issue you have here? You said lots of tcp retransmissions?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 12:58:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243933#M47457</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-17T12:58:15Z</dc:date>
    </item>
    <item>
      <title>Re: Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243951#M47458</link>
      <description>&lt;P&gt;Note that filtering it with grep potentially presents a lot of load to the firewall. It's going through the extra debug code for every single drop, then you're discarding 99.9% of the drops with the grep.&lt;/P&gt;
&lt;P&gt;Also, the output is buffered, so you won't see output into the file immediately. Instead, a chunk of output will accumulate for a while, then once enough is collected, it will all be handed to grep at once. On a firewall which isn't dropping much, this could result in 10+ drops all showing up at once.&lt;/P&gt;
&lt;P&gt;I would do this like so:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;fw ctl debug 0
fw ctl debug -buf 32000
fw ctl debug -m fw + drop
fw ctl debug -F "0,0,0,0,0" -F "0,0,0,0,0" ...
# Replace 0,0,0,0,0 with a filter, like used for fw monitor.
# Be sure to filter for both directions in case a reply is dropped.
nohup fw ctl kdebug -T -f 2&amp;gt;&amp;amp;1 &amp;gt;/var/log/&amp;lt;ticket number&amp;gt;_drop.txt &amp;amp;&lt;/LI-CODE&gt;
&lt;P&gt;The '-T' adds timestamps to the debug output.&lt;/P&gt;
&lt;P&gt;Might take a little trial and error. The -F filter may need to be applied along with one of the commands. nohup allows the process it runs to survive a SIGHUP, which is the signal a closing shell sends to processes it is running. Normal output will go to /var/log/&amp;lt;ticket number&amp;gt;_drop.txt, and errors will go to nohup.out in the directory where you ran the command.&lt;/P&gt;
&lt;P&gt;The ticket number is important so you can tell what exactly that file is for when you look at the system again in six months. To kill the command once you have the data you want, you would use:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;ps -ef | grep "kdebug" | grep -v "grep" | awk '{print $2}' | xargs -L 1 kill;fw ctl debug 0&lt;/LI-CODE&gt;
&lt;P&gt;As for how to watch this and send an email when a drop is added, I would have to think about it for a while.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 13:48:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243951#M47458</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2025-03-17T13:48:26Z</dc:date>
    </item>
    <item>
      <title>Re: Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243955#M47461</link>
      <description>&lt;P&gt;For a zdebug in particular, it's pretty simple to add the simple filters. I demonstrate how to do so (and how to add multiple flags) here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Packets-lost-after-quot-fw-post-VM-outbound-quot/m-p/230890/highlight/true#M44451" target="_self"&gt;fw ctl zdebug -T -F "10.0.1.253,0,192.168.144.120,0,0" -m fw xlate drop&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 14:21:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243955#M47461</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2025-03-17T14:21:49Z</dc:date>
    </item>
    <item>
      <title>Re: Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243960#M47463</link>
      <description>&lt;P&gt;It is a problem related to “TCP Retransmissions”.&lt;/P&gt;
&lt;P&gt;I have a communication between 1 source and 1 destination going through an S2S VPN.&lt;/P&gt;
&lt;P&gt;Everything works fine, but for certain very “intermittent” periods of time, the source that is at the other end (not mine), “complains” of a “slow and intermittent” experience in its application.&lt;/P&gt;
&lt;P&gt;The connectivity between the source and the destination is through a specific port (Port: 7003).&lt;/P&gt;
&lt;P&gt;When these negative experiences occur, the remote end of the VPN, makes captures on their side, and what they observe are constant retransmissions in the connectivity, but on our side the #fw ctl zdebug and #tcpdump commands (which are the ones we have tested so far), do not show us anything relevant.&lt;/P&gt;
&lt;P&gt;Apparently for our CP, everything “flows” normally, without interruptions.&lt;/P&gt;
&lt;P&gt;That's why my questions were focused on diagnostic commands that can help me to rule out errors in the CP.&lt;/P&gt;
&lt;P&gt;Is it more useful to rely on CPPCAP than TCPDUMP, if what I want is to “analyze” the traffic from a pcap file to see it in Wireshark?&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 14:57:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243960#M47463</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-17T14:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243961#M47464</link>
      <description>&lt;P&gt;Just be CAREFUL in production environment, maybe dont leave it running for too too long (example, say for 24 or 48 hours). Just curious though, is it affecting traffic extensively or happens just randomly?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 15:05:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243961#M47464</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-17T15:05:27Z</dc:date>
    </item>
    <item>
      <title>Re: Constant monitoring with 'zdebug drop'</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243963#M47465</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;How would you apply the filter, if you have a connection with the following data:&lt;/P&gt;
&lt;P&gt;SRC IP: 10.150.1.8&lt;BR /&gt;DST IP: 10.252.30.195&lt;BR /&gt;DST PORT: 7003&lt;/P&gt;
&lt;P&gt;The objective would be that the zdebug tells me if the CP is really “dumping” some kind of traffic.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 15:19:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Constant-monitoring-with-zdebug-drop/m-p/243963#M47465</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-17T15:19:12Z</dc:date>
    </item>
  </channel>
</rss>

