<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.40, fw monitor -F not capturing HTTP/Get &amp;amp; OK ? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-fw-monitor-F-not-capturing-HTTP-Get-amp-OK/m-p/94453#M7341</link>
    <description>&lt;P&gt;You can replace&amp;nbsp;&lt;SPAN&gt;-e "accept (src=172.16.10.150 and dst=192.168.1.100) or (src=192.168.1.100 and dst=67.83.0.1) (src=67.83.0.1 and dst=192.168.1.100);" with this:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-e "accept (host(192.168.1.100) AND host(172.16.10.150)) OR (host(192.168.1.100) AND host(67.83.0.1))&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 18 Aug 2020 07:53:27 GMT</pubDate>
    <dc:creator>Maarten_Sjouw</dc:creator>
    <dc:date>2020-08-18T07:53:27Z</dc:date>
    <item>
      <title>R80.40, fw monitor -F not capturing HTTP/Get &amp; OK ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-fw-monitor-F-not-capturing-HTTP-Get-amp-OK/m-p/94103#M7311</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;I am currently trying to get a better understanding on how "fw monitor" works and how to use it. For that, I am currently comparing output from R80.10 and R80.40(take_67) in my Lab.&lt;/P&gt;&lt;P&gt;I am capturing http traffic from Host A to Webserver B . My topology looks like this:&lt;/P&gt;&lt;P&gt;Webserver B ---- FW R80.10&amp;nbsp; ---- FW R80.40 ---- Host A&lt;/P&gt;&lt;P&gt;Webserver B IP: 192.168.1.100&lt;/P&gt;&lt;P&gt;Host A: 172.16.10.150 - NAT to 67.83.0.1(FW R80.40)&lt;/P&gt;&lt;P&gt;I am capturing the traffic from Host A to Webserver B in both directions on both Gateways.&lt;/P&gt;&lt;P&gt;On R80.10 I disabled SecureXL to capture accelerated packets aswell and on R80.40 I am using the -F flag to capture accelerated and non accelerated traffic.&lt;/P&gt;&lt;P&gt;It works to a certain point, but I am running into an issue which I haven't found a solution for&amp;nbsp; so far.&lt;/P&gt;&lt;P&gt;I can see the 3-way handshake in both captures, on R80.10 I see the HTTP/Get &amp;amp; OK but on R80.40 it is not beeing captured...&lt;/P&gt;&lt;P&gt;These are the filters I am using:&lt;/P&gt;&lt;P&gt;R80.10:&lt;/P&gt;&lt;P&gt;fwaccell off&lt;/P&gt;&lt;P&gt;fw monitor -e "accept (src=67.83.0.1 and dst=192.168.1.100) or (src=192.168.1.100 and dst=67.83.0.1);" -o fwmonR8010AccCap.pcap&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;R80.40:&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;fw monitor -F "172.16.10.150,0,192.168.1.100,80" -F "192.168.1.100,80,67.83.0.1,0" -o fwmonR8040AccCap.pcap&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Can you tell me what I am doing wrong or missing here?&lt;/DIV&gt;&lt;DIV&gt;Thank you very much!!&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;greeting,&lt;/DIV&gt;&lt;DIV&gt;con&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2020 10:38:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-fw-monitor-F-not-capturing-HTTP-Get-amp-OK/m-p/94103#M7311</guid>
      <dc:creator>796570686578</dc:creator>
      <dc:date>2020-08-14T10:38:32Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40, fw monitor -F not capturing HTTP/Get &amp; OK ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-fw-monitor-F-not-capturing-HTTP-Get-amp-OK/m-p/94435#M7338</link>
      <description>&lt;P&gt;Pretty sure you use the same syntax that you used in R80.10 on R80.40.&lt;BR /&gt;However, will admit the SK isn’t that clear on this.&lt;/P&gt;
&lt;P&gt;See:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk30583" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk30583&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Aug 2020 04:07:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-fw-monitor-F-not-capturing-HTTP-Get-amp-OK/m-p/94435#M7338</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-08-18T04:07:21Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40, fw monitor -F not capturing HTTP/Get &amp; OK ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-fw-monitor-F-not-capturing-HTTP-Get-amp-OK/m-p/94451#M7339</link>
      <description>&lt;P&gt;Hey&amp;nbsp; PhoneBoy,&lt;/P&gt;&lt;P&gt;thanks for your help! Unfortunately, this didn't show different results.&lt;/P&gt;&lt;P&gt;I have used the equivalent syntax on R80.40 as I did on R80.10 and still didn't capture the HTTP messages. I also disabled SecureXL beforehand on R80.40.&lt;/P&gt;&lt;P&gt;When using the -e Flag on R80.40 it actually says in the output:&amp;nbsp;&lt;/P&gt;&lt;P&gt;*** Using "-e" filter will not monitor accelerated traffic. To monitor and filter accelerated traffic please use the "-F" filter ***&lt;/P&gt;&lt;P&gt;I was able to start the capture but again only saw 3-Way HS &amp;amp; PSH,ACKs on R80.40 while on R80.10 I was able to capture the http packets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also read the SK, thanks for sharing it. What I gathered from it, is, that since R80.40, Accelerated Traffic will be captured by default and the "-F" flag can be used for that.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN&gt;In R80.40, Default behavior will be to monitor all traffic.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;EM&gt;Since R80.20 Jumbo take 73, using the "-e" flag will not filter accelerated traffic (all accelerated traffic will be monitored). To Filter accelerated traffic use the "-F" flag (exists from Jumbo take 73)&lt;/EM&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;EM&gt;Since R80.20 Jumbo take 117, using the "-e" flag will filter out all accelerated traffic. To filter and monitor Accelerated traffic use "-F" (exists from Jumbo take 73)&lt;/EM&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/STRONG&gt;From the R80.40 Admin Guide:&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;"-F" - Specifies the capture filter (for both accelerated and non-accelerated traffic)&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The more I read about it, the more I am convinced that it is not working as intended or I am doing some major mistakes..&lt;/P&gt;&lt;P&gt;Summary of capture Filters I have used so far on R80.40:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;fw monitor&lt;/SPAN&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;EM&gt;-F "172.16.10.150,0,192.168.1.100,80" -F "192.168.1.100,80,67.83.0.1,0"&lt;/EM&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;-&lt;/EM&gt;&lt;/STRONG&gt;F "0,0,0,0,0" &amp;lt;-&amp;nbsp;Capture everything&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;-F "172.16.10.150,0,192.168.1.100,0" -F "192.168.1.100,0,67.83.0.1,0" &amp;lt;- Capture all traffic between 2 hosts&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;-e "accept (src=172.16.10.150 and dst=192.168.1.100) or (src=192.168.1.100 and dst=67.83.0.1) or (src=67.83.0.1 and dst=192.168.1.100);"&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;-e "accept;" &amp;lt;- Capture everything&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I really like the idea of capturing accelerated traffic without the need to disable SecureXL on the whole system. I will test this with other protocols aswell and report back my findings &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Aug 2020 08:07:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-fw-monitor-F-not-capturing-HTTP-Get-amp-OK/m-p/94451#M7339</guid>
      <dc:creator>796570686578</dc:creator>
      <dc:date>2020-08-18T08:07:05Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40, fw monitor -F not capturing HTTP/Get &amp; OK ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-fw-monitor-F-not-capturing-HTTP-Get-amp-OK/m-p/94453#M7341</link>
      <description>&lt;P&gt;You can replace&amp;nbsp;&lt;SPAN&gt;-e "accept (src=172.16.10.150 and dst=192.168.1.100) or (src=192.168.1.100 and dst=67.83.0.1) (src=67.83.0.1 and dst=192.168.1.100);" with this:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-e "accept (host(192.168.1.100) AND host(172.16.10.150)) OR (host(192.168.1.100) AND host(67.83.0.1))&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Aug 2020 07:53:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-fw-monitor-F-not-capturing-HTTP-Get-amp-OK/m-p/94453#M7341</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-08-18T07:53:27Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40, fw monitor -F not capturing HTTP/Get &amp; OK ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-fw-monitor-F-not-capturing-HTTP-Get-amp-OK/m-p/94452#M7340</link>
      <description>&lt;P&gt;I suspect even after disabling SecureXL, traffic is being accelerated:&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk162492" target="_self"&gt;sk162492&lt;/A&gt;. In essense, you cannot disable SXL in R8020 and above completely.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;What to do to make sure no accelerated traffic is passing?&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Disable acceleration on both cluster members&lt;/LI&gt;
&lt;LI&gt;Fail over&lt;/LI&gt;
&lt;LI&gt;Run traces on the new active member&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 18 Aug 2020 07:53:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-fw-monitor-F-not-capturing-HTTP-Get-amp-OK/m-p/94452#M7340</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-08-18T07:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40, fw monitor -F not capturing HTTP/Get &amp; OK ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-fw-monitor-F-not-capturing-HTTP-Get-amp-OK/m-p/94454#M7342</link>
      <description>&lt;P&gt;Good Morning Val!&lt;/P&gt;&lt;P&gt;Sorry, I might not have expressed my issue correctly. It's not that accelerated traffic isn't passing, it works fine. The issue is, that I am not able to capture it (No HTTP/Get &amp;amp; OK packets) with the -F filter. So I just tested it with the -e Flag as PhoneBoy suggested.&lt;/P&gt;&lt;P&gt;I will do a Fail over later and report back!&lt;/P&gt;</description>
      <pubDate>Tue, 18 Aug 2020 08:02:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-fw-monitor-F-not-capturing-HTTP-Get-amp-OK/m-p/94454#M7342</guid>
      <dc:creator>796570686578</dc:creator>
      <dc:date>2020-08-18T08:02:46Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40, fw monitor -F not capturing HTTP/Get &amp; OK ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-fw-monitor-F-not-capturing-HTTP-Get-amp-OK/m-p/94457#M7343</link>
      <description>&lt;P&gt;Hey Maarten,&lt;/P&gt;&lt;P&gt;thanks for that. Great way to simplify it and much easier to read! Thanks alot &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Aug 2020 08:12:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-fw-monitor-F-not-capturing-HTTP-Get-amp-OK/m-p/94457#M7343</guid>
      <dc:creator>796570686578</dc:creator>
      <dc:date>2020-08-18T08:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40, fw monitor -F not capturing HTTP/Get &amp; OK ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-fw-monitor-F-not-capturing-HTTP-Get-amp-OK/m-p/94463#M7344</link>
      <description>&lt;P&gt;I found the issue...&lt;span class="lia-unicode-emoji" title=":grinning_face_with_sweat:"&gt;😅&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I had to use the "-w" flag aswell in order to capture the GET &amp;amp; OK packets. I tried it with ftp aswell and when not using the "-w" flag, these packets are not captured. Weird hmmm..&lt;/P&gt;&lt;P&gt;so syntax would be:&amp;nbsp;&lt;EM&gt;fw monitor &lt;STRONG&gt;-w&lt;/STRONG&gt; -F etc.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;But at least it works now &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="1" width="100%" cellpadding="5"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="4.634721131186175%"&gt;-w&lt;/TD&gt;&lt;TD width="95.28672427337%"&gt;&lt;P&gt;When using -o/ -x flag, there is an option to print whole raw data of packet.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note: Relevant for R80.20 from Jumbo Hotfix Accumulator for R80.20 (Take 73).&amp;nbsp;Currently, not relevant for R80.30.&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your help!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Aug 2020 09:32:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-fw-monitor-F-not-capturing-HTTP-Get-amp-OK/m-p/94463#M7344</guid>
      <dc:creator>796570686578</dc:creator>
      <dc:date>2020-08-18T09:32:56Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40, fw monitor -F not capturing HTTP/Get &amp; OK ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-fw-monitor-F-not-capturing-HTTP-Get-amp-OK/m-p/108093#M14537</link>
      <description>&lt;P&gt;You can replace -e "accept (host(192.168.1.100) AND host(172.16.10.150)) OR (host(192.168.1.100) AND host(67.83.0.1));" with this:&lt;/P&gt;&lt;P&gt;-e "accept host(192.168.1.100) and (host(172.16.10.150) or host(67.83.0.1));"&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jan 2021 12:16:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-fw-monitor-F-not-capturing-HTTP-Get-amp-OK/m-p/108093#M14537</guid>
      <dc:creator>Václav_Brožík</dc:creator>
      <dc:date>2021-01-18T12:16:32Z</dc:date>
    </item>
  </channel>
</rss>

