<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Sniffers in VSX environments in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/244468#M47583</link>
    <description>&lt;P&gt;To run a tcpdump from VS0 capturing traffic in VS2, you would use this:&lt;/P&gt;
&lt;P&gt;ip netns exec CTX00002 tcpdump -i bond2.1095 -w capturename.pcap&amp;nbsp;&lt;SPAN&gt;host 192.168.20.100 and host 10.100.20.10&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;No -v switch, no switch needed for the filter, and the file to write is specified with -w instead of -o.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Mar 2025 23:01:07 GMT</pubDate>
    <dc:creator>Bob_Zimmerman</dc:creator>
    <dc:date>2025-03-21T23:01:07Z</dc:date>
    <item>
      <title>Sniffers in VSX environments</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/243973#M47468</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;
&lt;P&gt;Is it possible to apply a TCPDUMP or CPPCAP on a particular vsenv, and “export” the result in a pcap file?&lt;/P&gt;
&lt;P&gt;Now, if it is possible to do this, how would you get the pcap file?&lt;/P&gt;
&lt;P&gt;Would I have to connect by WinSCP (for example), to my VS0. or can I connect by WinSCP directly to a particular vsenv, to be able to extract the pcap file and be able to review it?&lt;/P&gt;
&lt;P&gt;Thanks for your comments.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 17:53:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/243973#M47468</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-17T17:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: Sniffers in VSX environments</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/243977#M47470</link>
      <description>&lt;P&gt;You can start a capture in a particular VS in a few ways:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;vsenv 5
tcpdump ...

# Or from any VS:

ip netns exec CTX00005 tcpdump ...&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The "CTX00005" is the name of the VS. It's the VSID padded with leading zeros to be five digits. VS 123 would be CTX00123. You can see all of them by running 'ip netns list'.&lt;/P&gt;
&lt;P&gt;As for getting the capture file later, VSs are just network namespaces. They have separate routing tables and firewall policies, but that's it. It's all one server running one OS with one filesystem. They're much less isolated than virtual machines, for example.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 18:18:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/243977#M47470</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2025-03-17T18:18:51Z</dc:date>
    </item>
    <item>
      <title>Re: Sniffers in VSX environments</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/243978#M47471</link>
      <description>&lt;P&gt;Bro,&lt;/P&gt;
&lt;P&gt;I literally built VSX lab this morning just to CONFIRM this, since you asked about it in the other sxl post, haha. And yes, what&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/27871"&gt;@Bob_Zimmerman&lt;/a&gt;&amp;nbsp;said is exactly right.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 18:20:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/243978#M47471</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-17T18:20:40Z</dc:date>
    </item>
    <item>
      <title>Re: Sniffers in VSX environments</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/243991#M47476</link>
      <description>&lt;P&gt;So, is it possible to run a tcpdump or cppcap from VS0 itself but ‘focused’ on a particular vsenv, and save the result in a pcap?&lt;/P&gt;
&lt;P&gt;For example I have the need to run a capture from my vsenv 2, with source 192.168.20.100 and destination 10.100.20.10 by icmp service.&lt;/P&gt;
&lt;P&gt;Could you show me the example of the syntax of the command, being 'stopped' in the VS0?&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 19:11:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/243991#M47476</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-17T19:11:58Z</dc:date>
    </item>
    <item>
      <title>Re: Sniffers in VSX environments</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/243997#M47477</link>
      <description>&lt;P&gt;cppcap -o capturenam.pcap -v 2 -f " host 192.168.20.100 and host 10.100.20.10 "&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 19:35:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/243997#M47477</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-03-17T19:35:46Z</dc:date>
    </item>
    <item>
      <title>Re: Sniffers in VSX environments</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/243998#M47478</link>
      <description>&lt;P&gt;Check out the site my colleague made ages ago, has bunch of different options for major fw vendors when doing common captures.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tcpdump101.com/#" target="_blank"&gt;https://tcpdump101.com/#&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 19:38:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/243998#M47478</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-17T19:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: Sniffers in VSX environments</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/244449#M47571</link>
      <description>&lt;P&gt;Hi, Lesley&lt;/P&gt;
&lt;P&gt;To this cppcap command syntax that you have shared, can you “add” the option to capture on a special interface?&lt;/P&gt;
&lt;P&gt;I want to capture for example the traffic related only to VS 2 on its bond2.1095 interface.&lt;/P&gt;
&lt;P&gt;Could you share with me how would be the syntax in this case, to capture it in a pcap file?&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 17:08:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/244449#M47571</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-21T17:08:48Z</dc:date>
    </item>
    <item>
      <title>Re: Sniffers in VSX environments</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/244455#M47573</link>
      <description>&lt;P&gt;Here you go:&lt;/P&gt;
&lt;P&gt;cppcap -o capturenam.pcap -v 2 -i bond2.1095 -f " host 192.168.20.100 and host 10.100.20.10"&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 19:07:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/244455#M47573</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-03-21T19:07:58Z</dc:date>
    </item>
    <item>
      <title>Re: Sniffers in VSX environments</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/244458#M47576</link>
      <description>&lt;P&gt;Thanks for the help, Lesly.&lt;/P&gt;
&lt;P&gt;Just out of curiosity and concern.&lt;/P&gt;
&lt;P&gt;Does this way of working with “cppcap” apply the same if anyone uses “tcpdump”?&lt;/P&gt;
&lt;P&gt;I mean for example, from my VS 0, I can still run a “tcpdump” pointing to a particular VS?&lt;/P&gt;
&lt;P&gt;Thanks for the clarification.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 19:58:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/244458#M47576</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-21T19:58:52Z</dc:date>
    </item>
    <item>
      <title>Re: Sniffers in VSX environments</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/244460#M47577</link>
      <description>&lt;P&gt;Yes you still can tcpdump as stated before in this topic. In VS0 or any other VS.&lt;/P&gt;
&lt;P&gt;But officially Check Point recommends cppcap for various reasons like:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Symptoms&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="symptoms"&gt;
&lt;DIV&gt;
&lt;UL&gt;
&lt;LI&gt;In some scenarios, when running tcpdump with a filter to "any" interface, the output shows no traffic.&lt;/LI&gt;
&lt;LI&gt;When removing the Health Probe configuration from the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;fwkern.conf&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;file, the traffic is captured.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV id="cause"&gt;
&lt;H2 class="css-3eqwxe"&gt;Cause&lt;/H2&gt;
&lt;DIV&gt;Some traffic types go directly to a specific interface's queue, while avoiding any socket tcpdump listens to. This causes tcpdump to not catch this traffic.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV id="solution"&gt;
&lt;H2 class="css-3eqwxe"&gt;Solution&lt;/H2&gt;
&lt;DIV&gt;Use&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk141412" target="_blank" rel="noopener"&gt;CPPCAP - a Check Point Traffic Capture Tool&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;instead. It show all traffic in these scenarios.&lt;BR /&gt;Check Point recommends to use CPPCAP for traffic capture. CPPCAP is a traffic capture tool which provides the most relevant outputs and is similar to tcpdump.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Or:&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P&gt;Check Point created a traffic capture tool for Gaia OS -&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;CPPCAP&lt;/STRONG&gt;.&lt;BR /&gt;This is a traffic capture tool that provides the most relevant outputs and is similar to the Linux tool TCPdump.&lt;BR /&gt;This tool was created to resolve various issues in the Linux tool TCPdump that significantly increased CPU load on Security Gateways.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Notes:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;CPPCAP is supported only on Gaia OS in the 64-bit mode (default in R80.40 and higher).&lt;/LI&gt;
&lt;LI&gt;CPPCAP also captures traffic that is accelerated in SecureXL.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 21 Mar 2025 20:58:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/244460#M47577</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-03-21T20:58:43Z</dc:date>
    </item>
    <item>
      <title>Re: Sniffers in VSX environments</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/244462#M47578</link>
      <description>&lt;P&gt;Either one works fone from my personal experience.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk141412" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk141412&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 21:26:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/244462#M47578</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-21T21:26:16Z</dc:date>
    </item>
    <item>
      <title>Re: Sniffers in VSX environments</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/244467#M47582</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;
&lt;P&gt;So, if I were to use tcpdump instead of “cppcap”, the syntax in a VSX environment, would be something like this?&lt;/P&gt;
&lt;P&gt;tcpdump -o capturenam.pcap -v 2 -i bond2.1095 -f “ host 192.168.20.100 and host 10.100.20.10”&lt;/P&gt;
&lt;P&gt;The parameters like “-f” and “-v” are kept?&lt;/P&gt;
&lt;P&gt;Because the idea is to apply the command from VS0 and capture the traffic from the VS 2 instance.&lt;/P&gt;
&lt;P&gt;Thanks for the comments.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 22:36:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/244467#M47582</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-21T22:36:17Z</dc:date>
    </item>
    <item>
      <title>Re: Sniffers in VSX environments</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/244468#M47583</link>
      <description>&lt;P&gt;To run a tcpdump from VS0 capturing traffic in VS2, you would use this:&lt;/P&gt;
&lt;P&gt;ip netns exec CTX00002 tcpdump -i bond2.1095 -w capturename.pcap&amp;nbsp;&lt;SPAN&gt;host 192.168.20.100 and host 10.100.20.10&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;No -v switch, no switch needed for the filter, and the file to write is specified with -w instead of -o.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 23:01:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/244468#M47583</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2025-03-21T23:01:07Z</dc:date>
    </item>
    <item>
      <title>Re: Sniffers in VSX environments</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/244469#M47584</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;
&lt;P&gt;This part of the command #ip netns exec CTX00002 tcpdump -i bond2.1095 .... I understand that “CTX00002” is the name VS 2?&lt;/P&gt;
&lt;P&gt;If it were a different VS ID like 6, it is replaced by CTX00006?&lt;/P&gt;
&lt;P&gt;Or am I misunderstanding the information?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 23:24:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/244469#M47584</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-21T23:24:08Z</dc:date>
    </item>
    <item>
      <title>Re: Sniffers in VSX environments</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/244470#M47585</link>
      <description>&lt;P&gt;You got it.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 23:29:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sniffers-in-VSX-environments/m-p/244470#M47585</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-21T23:29:45Z</dc:date>
    </item>
  </channel>
</rss>

