<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Wrieshark run for long period in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrieshark-run-for-long-period/m-p/86139#M6645</link>
    <description>&lt;P&gt;hey.&lt;/P&gt;&lt;P&gt;for inconstant problems which we need to run wireshark / fw monitor to get a packet capture form the FW.. how do you run this in a way that will keep the fw "safe from crush" and without being connected to the FW.&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;dor&lt;/P&gt;</description>
    <pubDate>Sun, 24 May 2020 07:08:00 GMT</pubDate>
    <dc:creator>Dor_Marcovitch</dc:creator>
    <dc:date>2020-05-24T07:08:00Z</dc:date>
    <item>
      <title>Wrieshark run for long period</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrieshark-run-for-long-period/m-p/86139#M6645</link>
      <description>&lt;P&gt;hey.&lt;/P&gt;&lt;P&gt;for inconstant problems which we need to run wireshark / fw monitor to get a packet capture form the FW.. how do you run this in a way that will keep the fw "safe from crush" and without being connected to the FW.&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;dor&lt;/P&gt;</description>
      <pubDate>Sun, 24 May 2020 07:08:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrieshark-run-for-long-period/m-p/86139#M6645</guid>
      <dc:creator>Dor_Marcovitch</dc:creator>
      <dc:date>2020-05-24T07:08:00Z</dc:date>
    </item>
    <item>
      <title>Re: Wrieshark run for long period</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrieshark-run-for-long-period/m-p/86161#M6646</link>
      <description>&lt;P&gt;For long-running captures I'd suggest using cppcap:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk141412&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank" rel="noopener"&gt;sk141412: Running tcpdump causes high CPU usage - Introducing &lt;STRONG&gt;cppcap&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Use of &lt;STRONG&gt;fw monitor&lt;/STRONG&gt; for long-running captures is potentially more likely to impact firewall performance since it is essentially "in line" with the chain module sequences (&lt;STRONG&gt;fw ctl chain&lt;/STRONG&gt;), and also if someone reinstalls policy to the gateway while an &lt;STRONG&gt;fw monitor&lt;/STRONG&gt; is running, the capture will be automatically terminated due to the chain sequences being rebuilt as part of the installation process.&lt;/P&gt;</description>
      <pubDate>Sun, 24 May 2020 18:22:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrieshark-run-for-long-period/m-p/86161#M6646</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-05-24T18:22:47Z</dc:date>
    </item>
    <item>
      <title>Re: Wrieshark run for long period</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrieshark-run-for-long-period/m-p/86166#M6647</link>
      <description>&lt;P&gt;TCPDUMP is a Linux tool which at times is not suitable for use with Gaia. Running TCPDUMP causes a significant increase in CPU usage and as a result impact the performance of the device. Even while filtering by specific interface or port still high CPU occurs. Check Point created a tool which works better with Gaia OS.&lt;/P&gt;
&lt;P&gt;"CPPCAP" is a traffic capture tool which provides the most relevant outputs and is similar to Tcpdump. The tool is adjusted to Gaia operating system yet requires installation of an applicable RPM. The good news!&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;SecureXL can be enabled&lt;/STRONG&gt;&lt;/SPAN&gt; or disabled to capture with CPPCAP.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;More read here:&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3406-r80x-performance-tuning-and-debug-tips-tcpdump-vs-cppcap" target="_blank" rel="noopener"&gt;- R80.x - Performance Tuning and Debug Tips - TCPDUMP vs. CPPCAP&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 24 May 2020 18:15:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrieshark-run-for-long-period/m-p/86166#M6647</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-05-24T18:15:37Z</dc:date>
    </item>
    <item>
      <title>Re: Wrieshark run for long period</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrieshark-run-for-long-period/m-p/86256#M6658</link>
      <description>There's also the "set up a mirror port on your switch" option and running a packet capture on a machine connected to said mirror port.&lt;BR /&gt;That obviously requires having a switch where that is possible and having an extra machine.</description>
      <pubDate>Mon, 25 May 2020 19:32:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrieshark-run-for-long-period/m-p/86256#M6658</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-05-25T19:32:25Z</dc:date>
    </item>
  </channel>
</rss>

