<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: fw monitor - see drop packets in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-see-drop-packets/m-p/84600#M6517</link>
    <description>&lt;P&gt;Hi Phoneboy,&lt;/P&gt;&lt;P&gt;This solution is not for me required.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i want to see dropped packets filtering one ip in clish.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards.&lt;/P&gt;</description>
    <pubDate>Fri, 08 May 2020 15:54:19 GMT</pubDate>
    <dc:creator>juanmoreno</dc:creator>
    <dc:date>2020-05-08T15:54:19Z</dc:date>
    <item>
      <title>fw monitor - see drop packets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-see-drop-packets/m-p/74108#M5721</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In our old enviroment, i had right to run expert mode and when i needed to check dropped packets from a single ip i used to run "fw ctl zdebug drop | grep x.x.x.x"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now we have a new enviroment on multidomain and i have no expert access to my gw. My problem is that when i run a fwmonitor i can´t&amp;nbsp; grep cause that is for expert mode.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I´have look a lot of official information about fw monitor and i´m sure that is not possible to do.&lt;/P&gt;&lt;P&gt;My question is:&lt;/P&gt;&lt;P&gt;Is any way to see in real-time the dropped packets running cli? ( no expert mode)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2020 12:30:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-see-drop-packets/m-p/74108#M5721</guid>
      <dc:creator>juanmoreno</dc:creator>
      <dc:date>2020-02-04T12:30:25Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor - see drop packets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-see-drop-packets/m-p/74393#M5722</link>
      <description>At a high level you could achieve similar functionality with an extended command pointing to a shell script.&lt;BR /&gt;The shell script would take the desired IP as input and run the necessary command with the argument.&lt;BR /&gt;You then configure an extended command to point to this script.&lt;BR /&gt;See: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk86583" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk86583&lt;/A&gt;</description>
      <pubDate>Fri, 07 Feb 2020 05:17:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-see-drop-packets/m-p/74393#M5722</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-02-07T05:17:08Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor - see drop packets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-see-drop-packets/m-p/74643#M5744</link>
      <description>&lt;P&gt;Hi Phoneboy,&lt;/P&gt;&lt;P&gt;Let me check your info and i tell you what i can get.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 10:13:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-see-drop-packets/m-p/74643#M5744</guid>
      <dc:creator>juanmoreno</dc:creator>
      <dc:date>2020-02-10T10:13:02Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor - see drop packets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-see-drop-packets/m-p/74680#M5753</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/33846"&gt;@juanmoreno&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;With R80.30 you can alternatively use the following command in clish:-)&lt;/P&gt;
&lt;P&gt;clish&amp;gt; &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;fw ctl zdebug monitor all&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;FONT color="#000000"&gt;or &lt;/FONT&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;clish&amp;gt; &lt;STRONG&gt;fw ctl zdebug drop&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN style="color: #ff0000;"&gt;fw ctl zdebug&lt;/SPAN&gt;&lt;/FONT&gt; is a powertool that is not exhausted from being used with "fw ctl zdebug drop". There is not much to be found in Check Point KB or in the documentation. "fw ctl zdebug" is an R&amp;amp;D tool for testing software in development. Therefore, the insert should be used with care. It starts a debugging in the background until it is aborted with CTRL+C. On productive systems it can have a &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;high performance impact&lt;/STRONG&gt;&lt;/FONT&gt;. Furthermore, the debug buffer is not the largest.&lt;/P&gt;
&lt;P&gt;More read here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-2982-fw-ctl-zdebug-helpful-command-combinations" target="_blank" rel="noopener"&gt;"fw ctl zdebug" Helpful Command Combinations&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 13:31:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-see-drop-packets/m-p/74680#M5753</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-02-10T13:31:45Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor - see drop packets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-see-drop-packets/m-p/84597#M6516</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;but with this option im not able to filter by one ip, source or destination.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you know what i mean?&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2020 15:48:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-see-drop-packets/m-p/84597#M6516</guid>
      <dc:creator>juanmoreno</dc:creator>
      <dc:date>2020-05-08T15:48:14Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor - see drop packets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-see-drop-packets/m-p/84600#M6517</link>
      <description>&lt;P&gt;Hi Phoneboy,&lt;/P&gt;&lt;P&gt;This solution is not for me required.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i want to see dropped packets filtering one ip in clish.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards.&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2020 15:54:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-see-drop-packets/m-p/84600#M6517</guid>
      <dc:creator>juanmoreno</dc:creator>
      <dc:date>2020-05-08T15:54:19Z</dc:date>
    </item>
  </channel>
</rss>

