<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CPT - Check Point Packet Trace Utility ? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30682#M94860</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just do it. Would be very appreciated and useful for many mates, I&amp;nbsp;am quiet sure. &lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/wink.png" /&gt;&lt;/P&gt;&lt;P&gt;There is the packet injection tool from CP but something similar to the packet tracer would be very nice.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 12 Jun 2018 14:19:06 GMT</pubDate>
    <dc:creator>Vincent_Bacher</dc:creator>
    <dc:date>2018-06-12T14:19:06Z</dc:date>
    <item>
      <title>Check Point Packet Trace Utility</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30681#M94859</link>
      <description>&lt;P&gt;Will Check Point release a management plugin that offers a similar functionality to Cisco's ASDM packet tracer anytime soon? I'm thinking about coding it on my own for quite some time. Should I start or wait for Check Point?&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/66335_pastedImage_1.png" border="0" /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 04:42:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30681#M94859</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2026-04-21T04:42:01Z</dc:date>
    </item>
    <item>
      <title>Re: CPT - Check Point Packet Trace Utility ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30682#M94860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just do it. Would be very appreciated and useful for many mates, I&amp;nbsp;am quiet sure. &lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/wink.png" /&gt;&lt;/P&gt;&lt;P&gt;There is the packet injection tool from CP but something similar to the packet tracer would be very nice.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2018 14:19:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30682#M94860</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2018-06-12T14:19:06Z</dc:date>
    </item>
    <item>
      <title>Re: CPT - Check Point Packet Trace Utility ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30683#M94861</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The only thing I know of is Packet Injector (sk110865), but that is done from the gateway itself via CLI.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2018 14:19:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30683#M94861</guid>
      <dc:creator>Alejandro_Mont1</dc:creator>
      <dc:date>2018-06-12T14:19:42Z</dc:date>
    </item>
    <item>
      <title>Re: CPT - Check Point Packet Trace Utility ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30684#M94862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think you might see something similar in R80.20. Checkpoint will implement the rule assistance utiliy which can be used to determine if there is a rule or not for certain traffic and it helps you to place the rules in the correct location.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Checkpoint has another utility that injects the packets but you have to run it from the gw&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-align: left; color: #333333; text-transform: none; text-indent: 0px; letter-spacing: normal; font-family: DIN; font-size: 22px; font-style: normal; font-weight: bold; word-spacing: 0px; float: none; display: inline !important; white-space: normal; orphans: 2; widows: 2; background-color: #ffffff; font-variant-ligatures: normal; font-variant-caps: normal; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial;"&gt;Check Point Packet Injector&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110865&amp;amp;partition=Advanced&amp;amp;product=Security"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110865&amp;amp;partition=Advanced&amp;amp;product=Security&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In R80.10 gateways there is another utility (not documented)&amp;nbsp;that doesn't inject packets but it does go through the policy files and database and tells you which rules the traffic will match but it doesn't inject the packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@GW01:0]#fw up_execute&lt;BR /&gt;Usage: fw up_execute [src=&amp;lt;IP&amp;gt;] [dst=&amp;lt;IP&amp;gt;] ipp=&amp;lt;ip protocol&amp;gt; [sport=&amp;lt;source port&amp;gt;] [dport=&amp;lt;dest port&amp;gt;] [protocol=&amp;lt;protocol&amp;gt;] [application=&amp;lt;application/category&amp;gt;]&lt;/P&gt;&lt;P&gt;Notes:&amp;nbsp; Parameters can be omitted, except the ipp (and dport in case of TCP or UDP).&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The order of the parameters does not matter.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Applications can be entered multiple times.&lt;/P&gt;&lt;P&gt;Examples:&lt;BR /&gt;1) fw up_execute src=126.200.49.240 dst=10.1.1.1 ipp=1&lt;BR /&gt;2) fw up_execute src=10.1.1.1 ipp=6 dport=8080 protocol=HTTP application=Facebook application=Opera&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2018 14:22:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30684#M94862</guid>
      <dc:creator>Houssameddine_1</dc:creator>
      <dc:date>2018-06-12T14:22:54Z</dc:date>
    </item>
    <item>
      <title>Re: CPT - Check Point Packet Trace Utility ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30685#M94863</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;See also:&amp;nbsp;&lt;A href="https://community.checkpoint.com/docs/DOC-2969" target="_blank"&gt;https://community.checkpoint.com/docs/DOC-2969&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jun 2019 09:17:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30685#M94863</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-21T09:17:19Z</dc:date>
    </item>
    <item>
      <title>Re: CPT - Check Point Packet Trace Utility ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30686#M94864</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do it.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jun 2018 06:11:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30686#M94864</guid>
      <dc:creator>ED</dc:creator>
      <dc:date>2018-06-13T06:11:04Z</dc:date>
    </item>
    <item>
      <title>Re: CPT - Check Point Packet Trace Utility ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30687#M94865</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Packet Inject tool isn't bad, but I agree with others that some kind of simulation graphic tool will be appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jun 2018 06:48:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30687#M94865</guid>
      <dc:creator>Petr_Hantak</dc:creator>
      <dc:date>2018-06-13T06:48:13Z</dc:date>
    </item>
    <item>
      <title>Re: CPT - Check Point Packet Trace Utility ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30688#M94866</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Use:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff6600;"&gt;fw monitor -p all -e "accept(...);"&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff6600;"&gt;&lt;SPAN style="color: #000000;"&gt;-&amp;gt;&amp;nbsp;The old classic!&lt;/SPAN&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff6600;"&gt;fw ctl zdebug + monitorall&amp;nbsp; | grep -A 1 &amp;lt;IP w.x.y.z&amp;gt;&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-&amp;gt; It's an undocumented command that's very helpful. It is nice that no "fwaccel off" is necessary.&amp;nbsp;With this command you can see even more details than "fw monitor" &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; The firewall worker and the CPU core are also displayed here. For more informtions: &lt;A href="https://community.checkpoint.com/docs/DOC-2982"&gt;"fw ctl zdebug" Helpful Command Combinations&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example view:&amp;nbsp;&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;eth0:&lt;SPAN style="color: #ff6600;"&gt;O12&lt;/SPAN&gt; &lt;SPAN style="color: #ff00ff;"&gt;&lt;STRONG&gt;(tcpt outbound)&lt;/STRONG&gt;&lt;/SPAN&gt;[940]:&lt;SPAN style="color: #0000ff;"&gt;10.1.1.1 -&amp;gt; 10.1.1.81&lt;/SPAN&gt; (TCP) len=940 id=18052;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;;[cpu_2];[fw4_1];TCP: &lt;SPAN style="color: #339966;"&gt;22&lt;/SPAN&gt; -&amp;gt; 10058 ...PA. seq=4ced07e1 ack=75e09a88;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;eth0:&lt;SPAN style="color: #ff9900;"&gt;O13&lt;/SPAN&gt; &lt;SPAN style="color: #ff00ff;"&gt;&lt;STRONG&gt;(TCP streaming post VM)&lt;/STRONG&gt;&lt;/SPAN&gt;[940]:&lt;SPAN style="color: #0000ff;"&gt;10.1.1.1 -&amp;gt; 10.1.1.81&lt;/SPAN&gt; (TCP) len=940 id=18052;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;;[cpu_2];[fw4_1];TCP: &lt;SPAN style="color: #339966;"&gt;22&lt;/SPAN&gt; -&amp;gt; 10058 ...PA. seq=4ced07e1 ack=75e09a88;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;eth0:&lt;SPAN style="color: #ff6600;"&gt;O14&lt;/SPAN&gt; &lt;SPAN style="color: #ff00ff;"&gt;&lt;STRONG&gt;(IP Options Restore (out))&lt;/STRONG&gt;&lt;/SPAN&gt;[940]:&lt;SPAN style="color: #0000ff;"&gt;10.1.1.1 -&amp;gt; 10.1.1.81&lt;/SPAN&gt; (TCP) len=940 id=18052;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;;[cpu_2];[fw4_1];TCP: &lt;SPAN style="color: #339966;"&gt;22&lt;/SPAN&gt; -&amp;gt; 10058 ...PA. seq=4ced07e1 ack=75e09a88;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and Packet Injector:&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110865&amp;amp;partition=Advanced&amp;amp;product=Security" rel="nofollow"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110865&amp;amp;partition=Advanced&amp;amp;product=Security&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Heiko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jun 2018 08:45:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30688#M94866</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-06-13T08:45:09Z</dc:date>
    </item>
    <item>
      <title>Re: CPT - Check Point Packet Trace Utility ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30689#M94867</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, please do it.&amp;nbsp; I came from a Cisco ASDM environment and this is definitely a feature that I miss.&amp;nbsp; In fact, I have been asking about it for a few years now with several of the SE's that have been assigned to my account.&amp;nbsp; This would be especially useful with layered rules that contain both tradition policies as well as blade specific (i.e. app/url/Antibot) policies to be able to test possible policy updates and get a graphical depiction of success or failure before they are actually installed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jun 2018 02:36:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30689#M94867</guid>
      <dc:creator>Mike_Schepers</dc:creator>
      <dc:date>2018-06-15T02:36:14Z</dc:date>
    </item>
    <item>
      <title>Re: CPT - Check Point Packet Trace Utility ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30690#M94868</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is also packet mode from SmartConsole:&amp;nbsp;&lt;A class="" href="https://youtu.be/J1r8VIxaYzQ" title="https://youtu.be/J1r8VIxaYzQ"&gt;Use R80.10 New Packet Mode Feature to Search Through Policy - YouTube&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jun 2018 18:00:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30690#M94868</guid>
      <dc:creator>Anthony_Holdswo</dc:creator>
      <dc:date>2018-06-15T18:00:54Z</dc:date>
    </item>
    <item>
      <title>Re: CPT - Check Point Packet Trace Utility ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30691#M94869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should start, do not wait for checkpoint. There is packet tracer on cisco firepower and also checkpoint packet injector, you can customize these and this would be useful.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jun 2018 21:25:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30691#M94869</guid>
      <dc:creator>Huseyin_Rencber</dc:creator>
      <dc:date>2018-06-15T21:25:16Z</dc:date>
    </item>
    <item>
      <title>Re: CPT - Check Point Packet Trace Utility ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30692#M94870</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Danny,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry to dig into such an old thread, but since no clarification regarding an Check Point implementation was mentioned (I guess it is not planned due to packet mode search/pinj/fw monitor/fw vtl debug) - did you start with an own implementation? Or would you think it makes sense to open a thread where we ask the whole community if they would be interested in such a solution? Maybe Check Point is willing to implement it in a future release if enough people show their interest. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;I personally would benefit from such a tool, maybe placed on the SMS itself to be able to search through multiple policies and/or layers at the same time without the need to do it locally on the gw.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Maik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 16 Sep 2018 12:36:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30692#M94870</guid>
      <dc:creator>Maik</dc:creator>
      <dc:date>2018-09-16T12:36:37Z</dc:date>
    </item>
    <item>
      <title>Re: CPT - Check Point Packet Trace Utility ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30693#M94871</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lets vote &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 16 Sep 2018 21:39:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30693#M94871</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2018-09-16T21:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: CPT - Check Point Packet Trace Utility ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30694#M94872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I haven't started developing this yet as I'm currently working on an accompanying Bash script to&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/41625"&gt;Timothy Hall's&lt;/A&gt; Max Power Firewalls book.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2018 00:56:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30694#M94872</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2018-09-17T00:56:11Z</dc:date>
    </item>
    <item>
      <title>Re: CPT - Check Point Packet Trace Utility ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30695#M94873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When all the competitors have it, it should be a question of when not if &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;.&lt;/P&gt;&lt;P&gt;Palo Alto:&amp;nbsp;&lt;/P&gt;&lt;P style="margin-top: 5pt; margin-bottom: 5pt; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-weight: bold;"&gt;test security-policy-match&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: bold;"&gt;test nat-policy-match&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 5pt; margin-bottom: 5pt; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-weight: bold;"&gt;test pbf-policy-match&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2018 05:05:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30695#M94873</guid>
      <dc:creator>Yuri_Slobodyany</dc:creator>
      <dc:date>2018-09-17T05:05:18Z</dc:date>
    </item>
    <item>
      <title>Re: CPT - Check Point Packet Trace Utility ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30696#M94874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We&amp;nbsp;already have this capability in the CLI, at least for the Access Policy.&lt;/P&gt;&lt;P&gt;See above comment that I marked "correct."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check Point does not not currently have this for NAT (which would be nice to have) or Policy Forwarding (which assumes routing based on Application, something not currently in the product).&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2018 05:14:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30696#M94874</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-09-17T05:14:07Z</dc:date>
    </item>
    <item>
      <title>Re: CPT - Check Point Packet Trace Utility ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30697#M94875</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;fw up_execute is really great tool and it works well. The only issue I see is that you need to run it from specific gateway.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;The best will be to execute it from management with parameter for which&amp;nbsp;gateway you want to find a match (or search all policy packages).&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2018 10:01:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30697#M94875</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2018-09-17T10:01:20Z</dc:date>
    </item>
    <item>
      <title>Re: CPT - Check Point Packet Trace Utility ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30698#M94876</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;fw up_execute is considered an "internal tool" according to my sources in R&amp;amp;D.&lt;/P&gt;&lt;P&gt;This tool does not support all the objects in the rulebase (e.g. Access Roles).&amp;nbsp;&lt;/P&gt;&lt;P&gt;Packet Injector is the supported way to do this:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110865&amp;amp;partition=Advanced&amp;amp;product=Security" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110865&amp;amp;partition=Advanced&amp;amp;product=Security"&gt;Check Point Packet Injector&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Oct 2018 23:32:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30698#M94876</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-10-03T23:32:01Z</dc:date>
    </item>
    <item>
      <title>Re: CPT - Check Point Packet Trace Utility ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30699#M94877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From the GUI or the API:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk118592&amp;amp;partition=General&amp;amp;product=SmartConsole" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk118592&amp;amp;partition=General&amp;amp;product=SmartConsole"&gt;How to use R80.10 Packet Mode feature to search in Access Control Policy?&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2018 04:47:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30699#M94877</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2018-10-04T04:47:49Z</dc:date>
    </item>
    <item>
      <title>Re: CPT - Check Point Packet Trace Utility ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30700#M94878</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is nice thread as we came to know all possibilities of troubleshooting &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2018 10:39:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Packet-Trace-Utility/m-p/30700#M94878</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2018-10-04T10:39:11Z</dc:date>
    </item>
  </channel>
</rss>

