<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using Wireshark to capture packets on Firewall using standard out. in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/257912#M50571</link>
    <description>&lt;P&gt;I ended up writing a small script to handle stuff like captures on a bunch of interfaces. It can even leave them running after you log off:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;### To start:
ticket="6-1234567890"
filter="(host 192.0.2.38 or host 203.0.113.54) and (host 1.1.1.1 or host 8.8.8.8 or host 4.2.2.2)"

dateString="$(date --rfc-3339=seconds | tr ' ' 'T' | tr -d ':')"
allAddresses="$(&amp;lt;&amp;lt;&amp;lt;"${filter}" egrep -o "([0-9]{1,3}\.){3}[0-9]{1,3}")"
allInterfaces="$(&amp;lt;&amp;lt;&amp;lt;"${allAddresses}" xargs -L 1 ip route get | grep dev | awk '{print $(NF-2)}')"
for interface in $(&amp;lt;&amp;lt;&amp;lt;"${allInterfaces}" sort | uniq);do
filename="/var/log/${ticket}_${dateString}_$(hostname)_${interface}.pcap"
nohup tcpdump -i "${interface}" "${filter}" -s 128 -C 100 -W 3 -w "${filename}" &amp;amp;
done


### To kill:
ps -ef | grep "6-1234567890" | grep -v grep | awk '{print $2}' | xargs -L 1 kill&lt;/LI-CODE&gt;
&lt;P&gt;You need to update the ticket number and filter in the "To start" section, and the ticket in the "To kill" section. The ticket can be whatever you want. I use a Check Point ticket here, but in reality, I use one of my company's internal incident tickets almost every time.&lt;/P&gt;
&lt;P&gt;You write the filter one time, then it figures out all the interfaces which lead to addresses in the filter, and starts the capture on&amp;nbsp;&lt;EM&gt;all&lt;/EM&gt; of them. As written, the captures are limited to 200-300 MB per interface (a rolling set of three 100 MB captures), and they go into /var/log named like&amp;nbsp;${ticket}_${dateString}_$(hostname)_${interface}.pcap0. When running captures on many firewalls (how many issues only involve one), I typically generate the date string one time, then copy that exact date to the other firewalls instead of calculating a new date string. The names are unique enough I can collect all the files afterwards and toss them in one directory for the ticket without worry of overlap, and if I find a capture some time later, I can look into the ticket to see if it still matters.&lt;/P&gt;
&lt;P&gt;I write my filters very narrowly. I put all the possible versions of an address (e.g, before NAT and after NAT) in one parenthetical expression, then 'and' them together in the combinations to describe each flow I want to catch. Keep the filters narrow, and the captures present minimal additional load to the system.&lt;/P&gt;
&lt;P&gt;I originally wrote this to catch an issue which was hard to predict, but easy to detect. We left captures running for several days, and eventually caught it.&lt;/P&gt;</description>
    <pubDate>Mon, 22 Sep 2025 14:06:56 GMT</pubDate>
    <dc:creator>Bob_Zimmerman</dc:creator>
    <dc:date>2025-09-22T14:06:56Z</dc:date>
    <item>
      <title>Using Wireshark to capture packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/173785#M31626</link>
      <description>&lt;P&gt;Wireshark Live Capture From Check Point Firewall directly to your PC&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; Note: If a Jump box is required in your environment you need to run command from the jump box.&lt;/P&gt;
&lt;P&gt;Standard Warning applies, Do not run a capture of any kind in this manner on an loaded firewall. No CPU over 70% should be safe however after-hours is best. Theoretically this type of capture will reduce CPU utilization by relieving the need to write a file. No download needed. The capture will automatically close when the capture is stopped.&amp;nbsp; Ensure you have the bandwidth available to copy traffic. Filters also work in the command line.&lt;/P&gt;
&lt;P&gt;ssh &lt;A href="mailto:admin@192.168.199.22" target="_blank" rel="noopener"&gt;admin@192.168.199.22&lt;/A&gt; "tcpdump -s0 -w - -i eth0" | "c:/program files\wireshark\wireshark.exe" -k -i -&lt;/P&gt;
&lt;P&gt;I tried many different commands and command shells before I got the traffic redirects to work.&lt;/P&gt;
&lt;P&gt;Cygwin &amp;nbsp;did not work&lt;/P&gt;
&lt;P&gt;Mobaxterm did not work&lt;/P&gt;
&lt;P&gt;Openssh in Cygwin did not work&lt;/P&gt;
&lt;P&gt;Almost every search in google for using stdout to push firewall traffic to the PC for Wireshark to use stdin to see live traffic in real time did not work. I found no references to use the good old command window and openssh.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Openssh as the command line that will open an ssh session over port 22 to the firewall. Tcpdump to redirect the filtered traffic over the tcp encrypted ssh tunnel session on port 22 back to the workstation in raw format. Wireshark to receive the stdout via stdin and display to the screen in real time.&amp;nbsp; Amazing stuff.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2023 08:27:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/173785#M31626</guid>
      <dc:creator>KlowikiOne</dc:creator>
      <dc:date>2023-03-31T08:27:42Z</dc:date>
    </item>
    <item>
      <title>Re: Using Wireshark to cpature packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/173921#M31627</link>
      <description>&lt;P&gt;This is quite clever and well done on figuring it out.&lt;BR /&gt;You mind if I move this to a more public space?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 19:54:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/173921#M31627</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-07T19:54:57Z</dc:date>
    </item>
    <item>
      <title>Re: Using Wireshark to cpature packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/173923#M31628</link>
      <description>&lt;P&gt;Thanks for this!&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 19:59:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/173923#M31628</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2023-03-07T19:59:41Z</dc:date>
    </item>
    <item>
      <title>Re: Using Wireshark to cpature packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/173938#M31629</link>
      <description>&lt;P&gt;I do not mind.&amp;nbsp; Time for public critique.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 21:50:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/173938#M31629</guid>
      <dc:creator>KlowikiOne</dc:creator>
      <dc:date>2023-03-07T21:50:35Z</dc:date>
    </item>
    <item>
      <title>Re: Using Wireshark to cpature packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/173943#M31630</link>
      <description>&lt;P&gt;Done, moved out to Security Gateways.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 23:28:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/173943#M31630</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-07T23:28:16Z</dc:date>
    </item>
    <item>
      <title>Re: Using Wireshark to capture packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/173956#M31633</link>
      <description>&lt;P&gt;Good tip &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 00:53:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/173956#M31633</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-08T00:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: Using Wireshark to capture packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/173962#M31636</link>
      <description>&lt;P&gt;Yep a neat trick and well done!&amp;nbsp; Here is how I got to the same place awhile back through a different means but I found a number of caveats (the "timeout" one is more precautionary than anything as I saw some stuck tcpdump processes); here is the relevant lecture content along with the lab exercise from my Max Capture: Know Your Packets self-guided video:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="live1.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19977i6217B168FE269B36/image-size/large?v=v2&amp;amp;px=999" role="button" title="live1.png" alt="live1.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="live2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19978i1DF2BB49D0DA5599/image-size/large?v=v2&amp;amp;px=999" role="button" title="live2.png" alt="live2.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="live3.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19979i04749D4EFCF9915F/image-size/large?v=v2&amp;amp;px=999" role="button" title="live3.png" alt="live3.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 02:19:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/173962#M31636</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-03-08T02:19:41Z</dc:date>
    </item>
    <item>
      <title>Re: Using Wireshark to capture packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/173969#M31638</link>
      <description>&lt;P&gt;I added a ram disk as a destination for debugs and realized a 60% reduction in CPU utilization on SND cores compared to the same debug writing to disk. This was in a production environment at 3am in the morning but still worked well. Might be worth further testing for packet captures.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Process Example is using the ram disk as a destination for tcpdump.&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN&gt;Process&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV style="direction: ltr;"&gt;
&lt;TABLE style="direction: ltr; border-collapse: collapse; border: 1pt solid #A3A3A3;" border="1" cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="background-color: #1f3864; vertical-align: top; width: 7.6486in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;"&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: white;"&gt;&lt;SPAN&gt;#&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Consolas; font-size: 11.0pt; color: white;"&gt;&lt;SPAN&gt;#/*Make sure there is enough space. Memory swap does still work to disk if you go over the amount available. Ramfs does not support swap. */&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: white;"&gt;&lt;SPAN&gt;#&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: white;"&gt;&lt;SPAN&gt;#free -g&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: white;"&gt;&lt;SPAN&gt;#&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Consolas; font-size: 11.0pt; color: white;"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; total&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;used&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; free&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; shared&amp;nbsp; buff/cache&amp;nbsp;&amp;nbsp; available&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Consolas; font-size: 11.0pt; color: white;"&gt;&lt;SPAN&gt;Mem:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Consolas; font-size: 11.0pt; color: white;"&gt;&lt;SPAN&gt;Swap:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 31&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 29&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: white;"&gt;&lt;SPAN&gt;#&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: white;"&gt;&lt;SPAN&gt;#/*&amp;nbsp; Create the location the new disk will mount.&amp;nbsp; */&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: white;"&gt;&lt;SPAN&gt;#mkdir /mnt/rmdisk&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: white;"&gt;&lt;SPAN&gt;#&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: white;"&gt;&lt;SPAN&gt;#/*&amp;nbsp; Mount the ram as tmpfs and specify amount of ram to use and where to mount it. */&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: white;"&gt;&lt;SPAN&gt;#&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: white;"&gt;&lt;SPAN&gt;#mount -t tmpfs -o size=4g tmpfs /mnt/rmdisk&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: white;"&gt;&lt;SPAN&gt;#&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: white;"&gt;&lt;SPAN&gt;#/* You can cd into the directory and use it as a normal disk. Remember this is volatile memory and will be erased on reboot or dismount.&amp;nbsp; For Example: tcpdump. */&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: white;"&gt;&lt;SPAN&gt;#&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: white;"&gt;&lt;SPAN&gt;#tcpdump -enni any -w /mnt/rmdisk/dumpme.pcap&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am also investigating using tar files for tcpdump destinations for reducing CPU utilization. The whole Idea is to minimize the hardware interrupt for DMA for transfers from RAM to Disk. The process is slower than compressing data via cpu and a tar file. Sounded like a good idea anyway.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you everyone for your replies and kudos.&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 08 Mar 2023 05:43:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/173969#M31638</guid>
      <dc:creator>KlowikiOne</dc:creator>
      <dc:date>2023-03-08T05:43:34Z</dc:date>
    </item>
    <item>
      <title>Re: Using Wireshark to capture packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/174020#M31645</link>
      <description>&lt;P&gt;One other way to reduce CPU load I was investigating for live Wireshark captures was using cppcap instead of tcpdump for these live captures, as cppcap doesn't seem to cause nearly as much overhead as tcpdump which is the tool's main intent.&amp;nbsp; However I confirmed with the tool's author&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/24548"&gt;@Aviad_Hadarian&lt;/a&gt;&amp;nbsp;that cppcap does not have the option to output raw packets to the stdout, but if it did I think that would be very helpful to reduce live capture overhead.&amp;nbsp; Might it be possible for cppcap to write its raw packet output to a named pipe (FIFO) via -o instead of a regular file, then have some intermediate process such as dd read that named pipe, dump it to its stdout and directly into Wireshark's stdin?&lt;/P&gt;
&lt;P&gt;Also apparently having stuck tcpdump processes executing in the background running up CPU load on the Dispatcher cores has occurred often enough to cause the following recent SK to be created:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk172886&amp;amp;partition=Advanced&amp;amp;product=CoreXL" target="_blank" rel="noopener"&gt;sk172886: Multiple ksoftirqd processes show high CPU use&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 12:36:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/174020#M31645</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-03-08T12:36:24Z</dc:date>
    </item>
    <item>
      <title>Re: Using Wireshark to capture packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/176818#M32383</link>
      <description>&lt;P&gt;Some OpenSSH options can help this work through jump servers in the path. Specifically, check out the ProxyJump option in &lt;A href="https://man.openbsd.org/ssh_config" target="_self"&gt;ssh_config(5)&lt;/A&gt;. It uses port forwarding on a jump server to let the client connect "directly" to the end destination. Notably, this doesn't expose any key material to the jump server in the path (unlike SSH agent forwarding).&lt;/P&gt;
&lt;P&gt;A few other options can get similar results.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 21:12:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/176818#M32383</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-03-30T21:12:06Z</dc:date>
    </item>
    <item>
      <title>Re: Using Wireshark to capture packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/176820#M32384</link>
      <description>&lt;P&gt;Very nice solution!&lt;BR /&gt;&lt;BR /&gt;If you add "&lt;STRONG&gt;not port 22&lt;/STRONG&gt;", you will no longer see your own ssh packages.&lt;BR /&gt;&lt;BR /&gt;ssh admin@1.1.1.1 "tcpdump -s0 -w - -i eth0 &lt;STRONG&gt;not port 22&lt;/STRONG&gt;" | "c:/program files\wireshark\wireshark.exe" -k -i -&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 22:21:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/176820#M32384</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2023-03-30T22:21:01Z</dc:date>
    </item>
    <item>
      <title>Re: Using Wireshark to capture packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/179473#M32870</link>
      <description>&lt;P&gt;Do you know of a way to start multiple tcpdumps in a single session? I would love to see checkpoint permit "screen" to operate.&amp;nbsp; I would also like to see and updated ethtool.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2023 20:09:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/179473#M32870</guid>
      <dc:creator>KlowikiOne</dc:creator>
      <dc:date>2023-04-28T20:09:57Z</dc:date>
    </item>
    <item>
      <title>Re: Using Wireshark to capture packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/179474#M32871</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/72335"&gt;@KlowikiOne&lt;/a&gt;&amp;nbsp;Well, since you are a CP employee, your best bet for those things is to verify with R&amp;amp;D. Personally, I never heard of a way to start multiple tcpdumps in a single session.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2023 21:34:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/179474#M32871</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-04-28T21:34:00Z</dc:date>
    </item>
    <item>
      <title>Re: Using Wireshark to capture packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/179475#M32872</link>
      <description>&lt;P&gt;If you need to capture on all interfaces with tcpdump, just use an interface name of "any" but be careful as that can impact the performance of the firewall.&amp;nbsp; You could also use cppcap with the "-I (interface)" option that will capture traffic on all interfaces except the named (interface) as opposed to using "-i" for the interface specification.&amp;nbsp; ethtool was updated in Gaia 3.10.&amp;nbsp; All this was covered in my 'Max Capture: Know Your Packets" course.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2023 22:04:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/179475#M32872</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-04-28T22:04:56Z</dc:date>
    </item>
    <item>
      <title>Re: Using Wireshark to capture packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/179476#M32873</link>
      <description>&lt;P&gt;Check out site my colleague made while back on capturing with all major vendors, hope it helps you.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tcpdump101.com/#" target="_blank"&gt;https://tcpdump101.com/#&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2023 22:10:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/179476#M32873</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-04-28T22:10:00Z</dc:date>
    </item>
    <item>
      <title>Re: Using Wireshark to capture packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/179583#M32878</link>
      <description>&lt;P&gt;I actually use this site to formulate the command line to use with tcpdump and cppcap.&amp;nbsp; I find having customers use this is a helpful learning tool.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 May 2023 12:58:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/179583#M32878</guid>
      <dc:creator>KlowikiOne</dc:creator>
      <dc:date>2023-05-01T12:58:27Z</dc:date>
    </item>
    <item>
      <title>Re: Using Wireshark to capture packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/179584#M32879</link>
      <description>&lt;P&gt;I avoid using the any interface, however I do like cppcap option to capture on any interface except flag.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 May 2023 13:01:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/179584#M32879</guid>
      <dc:creator>KlowikiOne</dc:creator>
      <dc:date>2023-05-01T13:01:27Z</dc:date>
    </item>
    <item>
      <title>Re: Using Wireshark to capture packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/179587#M32880</link>
      <description>&lt;P&gt;My colleague made that site in order to actually help anyone struggling with packet captures and debugs...we all been there mate, whether we want to admit ot ir not &lt;span class="lia-unicode-emoji" title=":face_with_tears_of_joy:"&gt;😂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 May 2023 13:31:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/179587#M32880</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-05-01T13:31:45Z</dc:date>
    </item>
    <item>
      <title>Re: Using Wireshark to capture packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/179588#M32881</link>
      <description>&lt;P&gt;Thats good point, BUT, sometimes, if you dont know what interface to use, you have to use any...&lt;/P&gt;</description>
      <pubDate>Mon, 01 May 2023 13:32:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/179588#M32881</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-05-01T13:32:23Z</dc:date>
    </item>
    <item>
      <title>Re: Using Wireshark to capture packets on Firewall using standard out.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/179595#M32882</link>
      <description>&lt;P&gt;There's not a good way to. Multiple SSH sessions are basically free, though (no more overhead than a single connection carrying all the same data).&lt;/P&gt;</description>
      <pubDate>Mon, 01 May 2023 14:49:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-Wireshark-to-capture-packets-on-Firewall-using-standard/m-p/179595#M32882</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-05-01T14:49:22Z</dc:date>
    </item>
  </channel>
</rss>

