<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.30 TCP Ping tool in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/96418#M7467</link>
    <description>&lt;P&gt;Thank you for the information. I'm afraid I'm unable to specify arbitrary source IP addresses with netcat to test the connectivity, as it accepts only security gateway's real interface addresses:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Error: Couldn't create connection (err=-3): Cannot assign requested address&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;This limitation makes it impossible to emulate specific connection traffic from security gw.&lt;/P&gt;</description>
    <pubDate>Wed, 09 Sep 2020 23:37:40 GMT</pubDate>
    <dc:creator>Flanger</dc:creator>
    <dc:date>2020-09-09T23:37:40Z</dc:date>
    <item>
      <title>R80.30 TCP Ping tool</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/96370#M7462</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;I'm relatively new with checkpoint firewalls. Previously I've worked with Cisco ASA devices, which have TCP Ping tool letting you test TCP connectivity on specified destination's TCP port (ASA sends TCP SYN packets and evaluates reply on specified destination IP:Port). This utility also lets you source it from any source IP you want. That way you're not limited only to appliance's local interfaces' IP addresses and can emulate traffic, as if it was forwarded by the appliance.&lt;/P&gt;&lt;P&gt;This is very handy when troubleshooting network access issues, to make sure security policies are correct and that destination host/server is causing the problem.&lt;/P&gt;&lt;P&gt;Is there any similar tool/functionality within Checkpoint R80.30 virtual security gateways?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2020 15:40:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/96370#M7462</guid>
      <dc:creator>Flanger</dc:creator>
      <dc:date>2020-09-09T15:40:48Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 TCP Ping tool</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/96408#M7463</link>
      <description>&lt;P&gt;Check maybe the &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110865&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank" rel="noopener"&gt;packet injector&lt;/A&gt;?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2020 19:51:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/96408#M7463</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2020-09-09T19:51:23Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 TCP Ping tool</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/96409#M7464</link>
      <description>&lt;P&gt;There used to be a tool called &lt;STRONG&gt;pinj&lt;/STRONG&gt; that did exactly what you want, but it stopped working in R80.20, closest you can get now is the &lt;STRONG&gt;tcptraceroute&lt;/STRONG&gt; tool.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2020 20:25:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/96409#M7464</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-09-09T20:25:42Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 TCP Ping tool</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/96414#M7465</link>
      <description>&lt;P&gt;Thank you for the reply.&lt;BR /&gt;I've read SK link provided by Alex and &lt;STRONG&gt;Packet Injector&lt;/STRONG&gt; seems to be exactly what I want. I was going to install it on one of my R80.30 security gateways. Too bad it does not work now. Does it fail during installation as well, or maybe I should give it a try?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2020 21:09:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/96414#M7465</guid>
      <dc:creator>Flanger</dc:creator>
      <dc:date>2020-09-09T21:09:40Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 TCP Ping tool</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/96417#M7466</link>
      <description>&lt;P&gt;&lt;A href="http://netcat.sourceforge.net" target="_self"&gt;GNU netcat&lt;/A&gt; is available on Gaia.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2020 22:20:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/96417#M7466</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-09-09T22:20:51Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 TCP Ping tool</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/96418#M7467</link>
      <description>&lt;P&gt;Thank you for the information. I'm afraid I'm unable to specify arbitrary source IP addresses with netcat to test the connectivity, as it accepts only security gateway's real interface addresses:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Error: Couldn't create connection (err=-3): Cannot assign requested address&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;This limitation makes it impossible to emulate specific connection traffic from security gw.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2020 23:37:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/96418#M7467</guid>
      <dc:creator>Flanger</dc:creator>
      <dc:date>2020-09-09T23:37:40Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 TCP Ping tool</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/96419#M7468</link>
      <description>&lt;P&gt;so tcptraceroute and traceroute are the same binary. I guess its just using the -T flag by default?&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 01:28:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/96419#M7468</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2020-09-10T01:28:22Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 TCP Ping tool</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/96420#M7469</link>
      <description>&lt;P&gt;hping2?&lt;BR /&gt;From the CLI help it appears to allow spoofing a source address.&lt;BR /&gt;Will admit haven’t tried.&lt;BR /&gt;Goes without saying you need to be an admin user with uid 0.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 04:39:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/96420#M7469</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-09-10T04:39:09Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 TCP Ping tool</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/96517#M7483</link>
      <description>&lt;P&gt;It works! Generated traffic shows in logs as well. Thank you again.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 20:12:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/96517#M7483</guid>
      <dc:creator>Flanger</dc:creator>
      <dc:date>2020-09-10T20:12:57Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 TCP Ping tool</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/115168#M16164</link>
      <description>&lt;P&gt;this is very simple&lt;/P&gt;&lt;P&gt;ping -s --source ip--&amp;nbsp; destination ip&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 03 Apr 2021 14:05:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/115168#M16164</guid>
      <dc:creator>vikassharma</dc:creator>
      <dc:date>2021-04-03T14:05:13Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 TCP Ping tool</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/151694#M24919</link>
      <description>&lt;P&gt;ping -I [source_ip|interface] destination&lt;/P&gt;&lt;P&gt;from clish, just like regular linux ping&amp;nbsp;&lt;/P&gt;&lt;P&gt;limited to addresses configured on the firewall&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 08:25:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-TCP-Ping-tool/m-p/151694#M24919</guid>
      <dc:creator>irek</dc:creator>
      <dc:date>2022-06-24T08:25:22Z</dc:date>
    </item>
  </channel>
</rss>

