<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS Inspection logs location in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-logs-location/m-p/49436#M86801</link>
    <description>Thank you a lot!&lt;BR /&gt;But what about internal error records on the gateway, is there any file, which might be helpful to determine the problem?</description>
    <pubDate>Mon, 01 Apr 2019 11:12:56 GMT</pubDate>
    <dc:creator>Egor_Cherkasov</dc:creator>
    <dc:date>2019-04-01T11:12:56Z</dc:date>
    <item>
      <title>HTTPS Inspection logs location</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-logs-location/m-p/49424#M86799</link>
      <description>&lt;P&gt;Hello colleagues,&lt;/P&gt;&lt;P&gt;There is a problem on R77.30 with HTTPS inspection, the gw is blocking everything.&lt;/P&gt;&lt;P&gt;The reason is: internal system occured, blocking request. See SK64162 for more information.&lt;/P&gt;&lt;P&gt;Unfortunately, nothing helped in this SK, so I collected a CPinfo to analyze it.&lt;/P&gt;&lt;P&gt;Where can I find any internal files, log files that are related to the issue?&lt;/P&gt;&lt;P&gt;I don't mean debugs, that's understandable. I'd like to figure out why the CP started to block it once.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your time!&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2019 11:10:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-logs-location/m-p/49424#M86799</guid>
      <dc:creator>Egor_Cherkasov</dc:creator>
      <dc:date>2019-04-01T11:10:52Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection logs location</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-logs-location/m-p/49432#M86800</link>
      <description>&lt;P&gt;This error is usually connected to a blade, e.g. SmartLog search using&lt;/P&gt;
&lt;P&gt;blade:"URL Filtering" AND "internal error"&lt;/P&gt;
&lt;P&gt;or&lt;/P&gt;
&lt;P&gt;blade:"Application Control" AND "internal error"&lt;/P&gt;
&lt;P&gt;Also, Content Awareness or userspace RAD could be involved.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2019 10:43:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-logs-location/m-p/49432#M86800</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-04-01T10:43:55Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection logs location</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-logs-location/m-p/49436#M86801</link>
      <description>Thank you a lot!&lt;BR /&gt;But what about internal error records on the gateway, is there any file, which might be helpful to determine the problem?</description>
      <pubDate>Mon, 01 Apr 2019 11:12:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-logs-location/m-p/49436#M86801</guid>
      <dc:creator>Egor_Cherkasov</dc:creator>
      <dc:date>2019-04-01T11:12:56Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection logs location</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-logs-location/m-p/49438#M86802</link>
      <description>&lt;P&gt;For HTTPS Inspection there are gateway components in both process space and kernel space.&amp;nbsp; The initial HTTPS negotiation between the firewall and Internet web server(s) starts in process space (wstlsd/pkxld) and that is usually where issues are encountered.&amp;nbsp; Check out this log file:&amp;nbsp; $FWDIR/log/wstlsd.elg; probably also worth looking in $FWDIR/log/fwd.elg and /var/log/messages* to see if anything interesting is getting written into these files.&amp;nbsp; If you see any messages in wstlsd.elg that indicate a problem and need more debugging info go here: &lt;A class="cp_link sc_ellipsis" style="max-width: 840px;" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105559&amp;amp;partition=Advanced&amp;amp;product=HTTPS" target="_blank"&gt;sk105559: How to &lt;STRONG&gt;debug&lt;/STRONG&gt; the &lt;STRONG&gt;WSTLSD&lt;/STRONG&gt; daemon.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;On 64-bit Gaia there is also a companion process to wstlsd called pkxld that leverages the 64-bit mode of the processor along with other hardware-based acceleration capabilities for key calculations and such.&amp;nbsp; I don't think there is a log file for this daemon, but if you think the problem is located here this daemon can be disabled to force all key calculations to occur back in wstlsd (just like they would be in 32-bit Gaia) by doing a &lt;STRONG&gt;touch $FWDIR/conf/pkxl_disable&lt;/STRONG&gt; and rebooting.&lt;/P&gt;
&lt;P&gt;For HTTPS kernel debugs the main module and option/flag for use with &lt;STRONG&gt;fw ctl debug&lt;/STRONG&gt; is fw and cptls respectively.&amp;nbsp; For instructions about how to run a kernel debug in R77.30 see here: &lt;SPAN&gt;&lt;A class="cp_link sc_ellipsis" style="max-width: 840px;" href="http://downloads.checkpoint.com/dc/download.htm?ID=41899" target="_blank" rel="noopener"&gt;Kernel Debug flags - R77.30&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2019 11:17:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-logs-location/m-p/49438#M86802</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-04-01T11:17:37Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection logs location</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-logs-location/m-p/49439#M86803</link>
      <description>Thank you very much Timothy! That's what I've been looking for.</description>
      <pubDate>Mon, 01 Apr 2019 11:26:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-logs-location/m-p/49439#M86803</guid>
      <dc:creator>Egor_Cherkasov</dc:creator>
      <dc:date>2019-04-01T11:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection logs location</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-logs-location/m-p/49456#M86804</link>
      <description>&lt;P&gt;An&lt;SPAN&gt; internal error due to categorization service timeout would need a RAD debug:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-aura-rendered-by="3748:0"&gt;# rad_admin rad debug on all&lt;/P&gt;
&lt;P data-aura-rendered-by="3748:0"&gt;******************Replicate***************&lt;BR clear="none" /&gt;&lt;BR clear="none" /&gt;# rad_admin rad debug off&lt;BR clear="none" /&gt;&lt;BR clear="none" /&gt;Collect: $FWDIR/log/rad.elg*&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2019 12:26:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-logs-location/m-p/49456#M86804</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-04-01T12:26:16Z</dc:date>
    </item>
  </channel>
</rss>

