<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traffic capture with FW MONITOR in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245461#M47813</link>
    <description>&lt;P&gt;The -F flag for fw monitor was added in one of the Jumbo HFAs for R80.20 right around the time of the major rework of SecureXL.&amp;nbsp; fw monitor -F is actually starting a filtered debug in the sim driver itself on the SND core which is why the syntax is so restrictive, but it does allow a full capture regardless of the state of SecureXL.&lt;/P&gt;</description>
    <pubDate>Wed, 02 Apr 2025 11:56:36 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2025-04-02T11:56:36Z</dc:date>
    <item>
      <title>Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245408#M47793</link>
      <description>&lt;P&gt;Hello, Mates.&lt;BR /&gt;What is the correct syntax to apply the “FW MONITOR” in troubleshooting moments, where you need to capture traffic?&lt;/P&gt;
&lt;P&gt;Is it “fw monitor -e ....” or is it “fw monitor -F” ....&lt;/P&gt;
&lt;P&gt;I see that some people use one over the other, but it seems to me that it is according to a matter of “preference” of each administrator.&lt;/P&gt;
&lt;P&gt;If I want to capture traffic for example from this array:&lt;BR /&gt;IP SOURCE: 192.168.100.20&lt;BR /&gt;DESTINATION IP: 10.100.100.50&lt;BR /&gt;DESTINATION PORT: 4443&lt;/P&gt;
&lt;P&gt;Which of the fw monitor syntaxes is the most “recommended” to apply in a GW?&lt;/P&gt;
&lt;P&gt;Greetings.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 19:38:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245408#M47793</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-04-01T19:38:05Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245409#M47794</link>
      <description>&lt;P&gt;-e takes an INSPECT code fragment and effectively causes the firewall kernel to capture traffic which matches that fragment. This only works when the traffic actually makes it to the firewall kernel, though. SecureXL exists specifically to skip over this code, so when SecureXL is enabled, most of the capture points won't record anything.&lt;/P&gt;
&lt;P&gt;-F is the current way to write filters. It's not very flexible. There's no way to specify a source or destination&amp;nbsp;&lt;EM&gt;network&lt;/EM&gt;, or a range of ports. That said, it works with SecureXL enabled. As long as the traffic you want to capture can fit into the five -F filter slots, it's the method to use.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 19:59:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245409#M47794</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2025-04-01T19:59:03Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245411#M47796</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;If I have the SXL disabled on the box, the “fw monitor -F ...” filter will not work?&lt;BR /&gt;Do I have to enable SXL for it to work properly?&lt;/P&gt;
&lt;P&gt;Could you share with me, what would be the syntax of the command, if I need to use this data in the “fw monitor”, please&lt;BR /&gt;IP SOURCE: 192.168.100.20&lt;BR /&gt;DESTINATION IP: 10.100.100.50&lt;BR /&gt;DESTINATION PORT: 4443&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 20:30:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245411#M47796</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-04-01T20:30:16Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245419#M47803</link>
      <description>&lt;P&gt;In general, the following website is helpful at showing you what the correct syntax is for packet captures of all kinds:&amp;nbsp;&lt;A href="https://tcpdump101.com/" target="_blank"&gt;https://tcpdump101.com/&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;and I are both familiar with the guy behind it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;To answer your specific question: fw monitor -F "192.168.100.20,0,10.100.100.50,4443,0"&amp;nbsp; -F "10.100.100.50,4443,192.168.100.20,0,0"&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 21:54:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245419#M47803</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-04-01T21:54:16Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245420#M47804</link>
      <description>&lt;P&gt;Yes sir, and he is still trying to make that site even better, when he got time, which is not often lol&lt;/P&gt;
&lt;P&gt;Anyway, I will tell him you said hi &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 22:24:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245420#M47804</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-04-01T22:24:52Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245421#M47805</link>
      <description>&lt;P&gt;Hey Bro.&lt;/P&gt;
&lt;P&gt;To capture encrypted traffic, related to S2S VPN, the “fw monitor -F ....” filter is more than enough?&lt;/P&gt;
&lt;P&gt;Or should the “-F” be replaced by “-e” in the command syntax?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":call_me_hand:"&gt;🤙&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 22:28:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245421#M47805</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-04-01T22:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245423#M47806</link>
      <description>&lt;P&gt;If its encrypted, you would probably never see big 0, but you can try either flag.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 22:33:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245423#M47806</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-04-01T22:33:59Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245425#M47807</link>
      <description>&lt;P&gt;Encrypted traffic runs in SecureXL usually, so -F is still needed.&lt;BR /&gt;Note that you can have up to five -F statements in an fw monitor, which is enough to see both the IPsec traffic and an unencrypted flow.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 23:29:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245425#M47807</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-04-01T23:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245426#M47808</link>
      <description>&lt;P&gt;I keep forgetting 5 -F flags, tx for a reminder. I always say to people there is no limit to it, but most I had seen them run is 3 times lol&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 23:39:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245426#M47808</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-04-01T23:39:53Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245430#M47811</link>
      <description>&lt;P&gt;Bro,&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/27871"&gt;@Bob_Zimmerman&lt;/a&gt;&amp;nbsp;described it perfectly, so, keep in mind, -e flag is not super useful if sxl is on, but -F would be.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2025 01:04:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245430#M47811</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-04-15T01:04:03Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245434#M47812</link>
      <description>&lt;P&gt;The -F filters are only supported by recent versions. I forget which first added it. On versions which support it, it works all the time, regardless of whether SecureXL is enabled or disabled. The filter is in the form of five values separated by commas like this: "0,0,0,0,0". A 0 in a field is a wildcard. The fields are source IP, source port, destination IP, destination port, and IP protocol.&lt;/P&gt;
&lt;P&gt;Note that these filters are directional. If you want to catch a whole conversation, you need to use two filters. For the values you specified, I would run the capture like so:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;fw monitor \
-F "192.168.100.20,0,10.100.100.50,4443,0" \
-F "10.100.100.50,4443,192.168.100.20,0,0" \
...&lt;/LI-CODE&gt;
&lt;P&gt;The backslashes let me spread the command onto multiple lines. This helps catch errors in the filters, since the filters to catch both directions of a single conversation should be the same length. Replace the '...' with whatever other flags you want to add. -w to catch whole packets, -o &amp;lt;file&amp;gt; to write to a file, and so on.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Apr 2025 05:38:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245434#M47812</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2025-04-02T05:38:04Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245461#M47813</link>
      <description>&lt;P&gt;The -F flag for fw monitor was added in one of the Jumbo HFAs for R80.20 right around the time of the major rework of SecureXL.&amp;nbsp; fw monitor -F is actually starting a filtered debug in the sim driver itself on the SND core which is why the syntax is so restrictive, but it does allow a full capture regardless of the state of SecureXL.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Apr 2025 11:56:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245461#M47813</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2025-04-02T11:56:36Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245471#M47817</link>
      <description>&lt;P&gt;Hi.&lt;/P&gt;
&lt;P&gt;To capture ICMP traffic do you have to change the command syntax a lot?&lt;/P&gt;
&lt;P&gt;If it is required to do an ICMP test between 192.168.10.100 and IP 172.16.100.10, the command syntax changes a lot?&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Apr 2025 13:36:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245471#M47817</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-04-02T13:36:25Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245481#M47819</link>
      <description>&lt;P&gt;ICMP always goes slowpath, so you can use &lt;STRONG&gt;fw monitor -e&lt;/STRONG&gt; if desired, obviously &lt;STRONG&gt;-F&lt;/STRONG&gt; will work too.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Apr 2025 14:09:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245481#M47819</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2025-04-02T14:09:08Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245495#M47824</link>
      <description>&lt;P&gt;Hi. &lt;BR /&gt;On many occasions I often forget to turn off SXL, and so I want to run a 'FW Monitor...' that does not depend on SXL. &lt;BR /&gt;I understand that the best option in this case would be to apply the ‘F’ in the command syntax, right? &lt;BR /&gt;Greetings. &lt;span class="lia-unicode-emoji" title=":folded_hands:"&gt;🙏&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Apr 2025 15:55:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245495#M47824</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-04-02T15:55:07Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245506#M47833</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;in such case I would run&lt;/P&gt;&lt;P&gt;- &lt;STRONG&gt;g_&lt;/STRONG&gt; as I am happy user of Maestro - always suprises me&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;- I am assuming, that TCP is considered, thus I am using IANA number protocol of &lt;STRONG&gt;6&lt;/STRONG&gt;,&lt;/P&gt;&lt;P&gt;- I also like to see packets path so adding a&lt;STRONG&gt; -p all&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- &lt;/STRONG&gt;Sometimes I am adding &lt;STRONG&gt;-T&lt;/STRONG&gt;, but only when someone is complaining about latency&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;g_fw monitor -F "192.168.100.20,0,10.100.100.50,4443,6" -F "10.100.100.50,4443,192.168.100.20,0,6" -p all&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Apr 2025 18:57:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245506#M47833</guid>
      <dc:creator>JaAnd</dc:creator>
      <dc:date>2025-04-02T18:57:19Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245508#M47835</link>
      <description>&lt;P&gt;Oof, be careful using the &lt;STRONG&gt;-p all&lt;/STRONG&gt; option on a production gateway.&amp;nbsp; Instead of showing each accepted packet 4-6 times (iIoO),&amp;nbsp;&lt;STRONG&gt;-p all&lt;/STRONG&gt; will show each accepted packet at least 40 times, basically as it transitions between each individual software chain module (&lt;STRONG&gt;fw ctl chain&lt;/STRONG&gt;).&lt;/P&gt;</description>
      <pubDate>Wed, 02 Apr 2025 19:13:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245508#M47835</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2025-04-02T19:13:50Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245516#M47841</link>
      <description>&lt;P&gt;Note the IP protocol is 0, the special wildcard value, in both of the filters I listed. If you just set the port to 0 as well, you will catch ICMP, TCP, UDP, ESP, whatever else between those two endpoints:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;fw monitor \
-F "192.168.100.20,0,10.100.100.50,0,0" \
-F "10.100.100.50,0,192.168.100.20,0,0" \
...&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 02 Apr 2025 19:34:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245516#M47841</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2025-04-02T19:34:03Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245523#M47843</link>
      <description>&lt;P&gt;Good point, thanks ! I never had any issues while using this parameter, I have seen the warning of high CPU usage, but many (if not the most) of the CP debugging tools bare this badge &lt;span class="lia-unicode-emoji" title=":thinking_face:"&gt;🤔&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Luckily my setup is scaled very well - lot's of umff left for debugs. I should have added, that I will use -p only in case of "difficult customers", the beautiful output it gives might be overwhelming &lt;span class="lia-unicode-emoji" title=":rolling_on_the_floor_laughing:"&gt;🤣&lt;/span&gt;&lt;/P&gt;&lt;P&gt;And once again - THANK THANK THAAANK you Sir, for your last webinar, what a great knowledge booster ! I am still studying it, but I have already found solutions to some of the problems on my setup.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Apr 2025 20:00:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245523#M47843</guid>
      <dc:creator>JaAnd</dc:creator>
      <dc:date>2025-04-02T20:00:01Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic capture with FW MONITOR</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245524#M47844</link>
      <description>&lt;P&gt;I would say using -F flag is probably safest.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 02 Apr 2025 20:42:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-capture-with-FW-MONITOR/m-p/245524#M47844</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-04-02T20:42:38Z</dc:date>
    </item>
  </channel>
</rss>

