<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: fw monitor inspection point e or E in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12835#M99513</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not yet it seems.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 23 Nov 2017 09:18:49 GMT</pubDate>
    <dc:creator>Tom_Coussement</dc:creator>
    <dc:date>2017-11-23T09:18:49Z</dc:date>
    <item>
      <title>fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12829#M99507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know the inspection points "i", "I", "o" &amp;amp; "O"&lt;/P&gt;&lt;P&gt;Now I see for example eth2:e and eth2:E in fw monitor output&lt;/P&gt;&lt;P&gt;Is this voor incomming and outgoing encrypted traffic?&lt;/P&gt;&lt;P&gt;Can't find it in documentation...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Nov 2017 14:40:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12829#M99507</guid>
      <dc:creator>Tom_Coussement</dc:creator>
      <dc:date>2017-11-16T14:40:00Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12830#M99508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please attach a screenshot of what you are seeing (with IP addresses sanitized of course if needed).&amp;nbsp; Also what level of gateway code are you running?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; now available via &lt;A href="http://maxpowerfirewalls.com" target="_blank"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Nov 2017 17:47:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12830#M99508</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2017-11-16T17:47:30Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12831#M99509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Firewall is R80.10&lt;/P&gt;&lt;P&gt;[vs_0][fw_1] eth0:i[306]: 192.168.210.11 -&amp;gt; 192.168.197.142 (UDP) len=306 id=29530&lt;BR /&gt;UDP: 53 -&amp;gt; 61872&lt;BR /&gt;[vs_0][fw_1] eth0:I[306]: 192.168.210.11 -&amp;gt; 192.168.197.142 (UDP) len=306 id=29530&lt;BR /&gt;UDP: 53 -&amp;gt; 61872&lt;BR /&gt;[vs_0][fw_1] eth2:o[306]: 192.168.210.11 -&amp;gt; 192.168.197.142 (UDP) len=306 id=29530&lt;BR /&gt;UDP: 53 -&amp;gt; 61872&lt;BR /&gt;[vs_0][fw_1] eth2:O[306]: 192.168.210.11 -&amp;gt; 192.168.197.142 (UDP) len=306 id=29530&lt;BR /&gt;UDP: 53 -&amp;gt; 61872&lt;BR /&gt;[vs_0][fw_0] &lt;STRONG&gt;eth2:e&lt;/STRONG&gt;[306]: 192.168.210.11 -&amp;gt; 192.168.197.142 (UDP) len=306 id=29530&lt;BR /&gt;UDP: 53 -&amp;gt; 61872&lt;BR /&gt;[vs_0][fw_0] &lt;STRONG&gt;eth2:E&lt;/STRONG&gt;[306]: 192.168.210.11 -&amp;gt; 192.168.197.142 (UDP) len=306 id=29530&lt;BR /&gt;UDP: 53 -&amp;gt; 61872&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think it is encrypt and decrypt as it is vpn traffic but I haven't seen it before and couldn't find it in documentation.&lt;/P&gt;&lt;P&gt;eth2 is the WAN interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Nov 2017 08:15:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12831#M99509</guid>
      <dc:creator>Tom_Coussement</dc:creator>
      <dc:date>2017-11-17T08:15:46Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12832#M99510</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you doing in R80? I think there is new parameters involved in R80 but I am not sure about meaning of :e &amp;amp; :E&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Nov 2017 16:04:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12832#M99510</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2017-11-17T16:04:35Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12833#M99511</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm interesting, notice that the iIoO packets were handled on FW Worker core instance #1, yet the same packets when shown with eE are indicated on Firewall Worker core instance #0.&amp;nbsp; In R77.30 and earlier, all IPSec VPN traffic could be handled only by the lowest-numbered Firewall Worker core (#0).&amp;nbsp; This limitation was lifted in R80.10 gateway with the introduction of multicore IPSec which is enabled by default.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my guess is that these new eE capture points have something to do with VPN handling by the new multicore IPsec feature.&amp;nbsp; You can query the status of this feature in R80.10 with the new &lt;STRONG&gt;&lt;CODE&gt;vpn tu mstats&lt;/CODE&gt;&lt;/STRONG&gt; and &lt;STRONG&gt;&lt;CODE&gt;vpn tu tlist&lt;/CODE&gt;&lt;/STRONG&gt; commands.&amp;nbsp; I bet these eE capture points would no longer appear if multicore IPSec was disabled, however doing so is not supported.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; now available via &lt;A href="http://maxpowerfirewalls.com" target="_blank"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Nov 2017 18:19:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12833#M99511</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2017-11-17T18:19:39Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12834#M99512</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I wonder if the wireshark filters for&amp;nbsp;Checkpoint will work on the fw monitor output with eE...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Nov 2017 00:24:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12834#M99512</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-11-18T00:24:40Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12835#M99513</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not yet it seems.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Nov 2017 09:18:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12835#M99513</guid>
      <dc:creator>Tom_Coussement</dc:creator>
      <dc:date>2017-11-23T09:18:49Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12836#M99514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My colleague &lt;A href="https://community.checkpoint.com/migrated-users/49204"&gt;https://community.checkpoint.com/people/jelle257658b7-4137-449e-8a0a-0baf97f9f08c&lt;/A&gt;‌ also ran into these eE inspection points on R80.10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've started a chat with TAC and asked them to point us to documentation or an SK-article regarding those eE inspection points. Unfortunatly there is no official documentation yet. I'm also quite surprised no Check Point employee responded to this thread either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the answer I've received:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;EM&gt;e is before the encryption and E is after the encryption. It's a new feature in R80.10."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I asked if there would be a dD for decryption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;EM&gt;No, you won't see the d D, as the e stands for the status when it is not encrypted yet, and E is when it is encrypted. So for outbound traffic, you will see e E, and for inbound, you will see E e."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The very helpful TAC engineer seemed to be surprised too as he also wondered if dD inspection points would exist and asked his Technical lead. So kudo's to TAC. I told them I hope this would be documented in the near future.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Nov 2017 16:52:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12836#M99514</guid>
      <dc:creator>RickHoppe</dc:creator>
      <dc:date>2017-11-23T16:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12837#M99515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds like two new default capture points, "e" at the entrance to the vpn_encrypt chain module (between o and O) and "E" at the exit of that same module as shown in output of &lt;STRONG&gt;fw ctl chain, &lt;/STRONG&gt;yet only displayed if that module actually needs to encrypt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; now available via &lt;A class="" href="http://maxpowerfirewalls.com" rel="nofollow"&gt;http://maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Nov 2017 18:28:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12837#M99515</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2017-11-23T18:28:54Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12838#M99516</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If it's in that order I would expect it to be displayed as iIoeEO but it is displayed as iIoOeE. When looking at the output of&amp;nbsp;&lt;STRONG&gt;fw ctl chain&lt;/STRONG&gt; the &lt;EM&gt;fw VM outbound&lt;/EM&gt;&amp;nbsp;chain comes before the&amp;nbsp;&lt;EM&gt;vpn encrypt&amp;nbsp;&lt;/EM&gt;chain. That's where the inspection points are, right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Out chain:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;o&amp;nbsp; &lt;EM&gt;fw VM outbound&lt;/EM&gt;&amp;nbsp; O - - e&amp;nbsp; &lt;EM&gt;vpn encrypt&lt;/EM&gt; E&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk30583" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk30583"&gt;sk30583&lt;/A&gt;&amp;nbsp;&amp;nbsp;should be updated something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;There are&amp;nbsp;six inspection points when a packet passes through a R80.10 Security Gateway:&lt;/P&gt;&lt;TABLE border="1" cellpadding="4" style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;TBODY&gt;&lt;TR style="background-color: lightgray; font-weight: bold;"&gt;&lt;TD width="20"&gt;#&lt;/TD&gt;&lt;TD&gt;Traffic&lt;BR /&gt;direction&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SUP&gt;(*)&lt;/SUP&gt;&lt;/TD&gt;&lt;TD&gt;Relation to&lt;BR /&gt;FireWall&lt;BR /&gt;Virtual Machine&lt;/TD&gt;&lt;TD&gt;Name of&lt;BR /&gt;inspection&lt;BR /&gt;point&lt;/TD&gt;&lt;TD&gt;Notion of&lt;BR /&gt;inspection&lt;BR /&gt;point&lt;/TD&gt;&lt;/TR&gt;&lt;TR valign="top"&gt;&lt;TD&gt;1&lt;/TD&gt;&lt;TD&gt;Inbound&lt;/TD&gt;&lt;TD&gt;Before the inbound FW VM&lt;/TD&gt;&lt;TD&gt;Pre-Inbound&lt;/TD&gt;&lt;TD&gt;"i"&lt;/TD&gt;&lt;/TR&gt;&lt;TR valign="top"&gt;&lt;TD&gt;2&lt;/TD&gt;&lt;TD&gt;Inbound&lt;/TD&gt;&lt;TD&gt;After the inbound FW VM&lt;/TD&gt;&lt;TD&gt;Post-Inbound&lt;/TD&gt;&lt;TD&gt;"I"&lt;/TD&gt;&lt;/TR&gt;&lt;TR valign="top"&gt;&lt;TD&gt;3&lt;/TD&gt;&lt;TD&gt;Outbound&lt;/TD&gt;&lt;TD&gt;Before the outbound FW VM&lt;/TD&gt;&lt;TD&gt;Pre-Outbound&lt;/TD&gt;&lt;TD&gt;"o"&lt;/TD&gt;&lt;/TR&gt;&lt;TR valign="top"&gt;&lt;TD&gt;4&lt;/TD&gt;&lt;TD&gt;Outbound&lt;/TD&gt;&lt;TD&gt;After the outbound FW VM&lt;/TD&gt;&lt;TD&gt;Post-Outbound&lt;/TD&gt;&lt;TD&gt;"O"&lt;/TD&gt;&lt;/TR&gt;&lt;TR valign="top"&gt;&lt;TD&gt;5&lt;/TD&gt;&lt;TD&gt;Outbound&lt;/TD&gt;&lt;TD&gt;Before the vpn encrypt&lt;/TD&gt;&lt;TD&gt;Pre-Encrypt&lt;/TD&gt;&lt;TD&gt;"e"&lt;/TD&gt;&lt;/TR&gt;&lt;TR valign="top"&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;Outbound&lt;/TD&gt;&lt;TD&gt;After the vpn encrypt&lt;/TD&gt;&lt;TD&gt;Post-Encrypt&lt;/TD&gt;&lt;TD&gt;"E"&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;SUP&gt;(*)&lt;/SUP&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;The traffic direction (inbound/outbound) relates to each specific packet, and not to the connection.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Nov 2017 20:02:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12838#M99516</guid>
      <dc:creator>RickHoppe</dc:creator>
      <dc:date>2017-11-23T20:02:28Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12839#M99517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unless there are dD values, the eE will probably show up as Ee on the decrypting side.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Nov 2017 14:15:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12839#M99517</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-11-27T14:15:35Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12840#M99518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually i did test this in my lab. To test this I created a Star Community and initiated some HTTP traffic from&lt;/P&gt;&lt;P&gt;Site A(10.1.1.0/24) to Site B(10.2.2.0/24).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This were the results:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site A&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;HTTP Request:&lt;/STRONG&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;[vs_0][fw_2] eth1:i[52]: 10.1.1.50 -&amp;gt; 10.2.2.50 (TCP) len=52 id=8800&lt;BR /&gt;TCP: 51289 -&amp;gt; 80 .S.... seq=6cbefb2f ack=00000000&lt;BR /&gt;[vs_0][fw_2] eth1:I[52]: 10.1.1.50 -&amp;gt; 10.2.2.50 (TCP) len=52 id=8800&lt;/P&gt;&lt;P&gt;TCP: 51289 -&amp;gt; 80 .S.... seq=6cbefb2f ack=00000000&lt;/P&gt;&lt;P&gt;-------------- OS IP Stack -------------&lt;/P&gt;&lt;P&gt;[vs_0][fw_2] eth0:o[52]: 10.1.1.50 -&amp;gt; 10.2.2.50 (TCP) len=52 id=8800&lt;BR /&gt;TCP: 51289 -&amp;gt; 80 .S.... seq=6cbefb2f ack=00000000&lt;BR /&gt;[vs_0][fw_2] eth0:O[52]: 10.1.1.50 -&amp;gt; 10.2.2.50 (TCP) len=52 id=8800&lt;BR /&gt;TCP: 51289 -&amp;gt; 80 .S.... seq=6cbefb2f ack=00000000&lt;BR /&gt;&lt;STRONG&gt;[vs_0][fw_2] eth0:e[52]: 10.1.1.50 -&amp;gt; 10.2.2.50 (TCP) len=52 id=8800&lt;/STRONG&gt;&lt;BR /&gt;TCP: 51289 -&amp;gt; 80 .S.... seq=6cbefb2f ack=00000000&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site B&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;HTTP Request:&lt;/STRONG&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;[vs_0][fw_0] eth0:i[52]: 10.1.1.50 -&amp;gt; 10.2.2.50 (TCP) len=52 id=8800&lt;BR /&gt;TCP: 51289 -&amp;gt; 80 .S.... seq=6cbefb2f ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth0:I[52]: 10.1.1.50 -&amp;gt; 10.2.2.50 (TCP) len=52 id=8800&lt;BR /&gt;TCP: 51289 -&amp;gt; 80 .S.... seq=6cbefb2f ack=00000000&lt;/P&gt;&lt;P&gt;-------------- OS IP Stack -------------&lt;/P&gt;&lt;P&gt;[vs_0][fw_0] eth1:o[52]: 10.1.1.50 -&amp;gt; 10.2.2.50 (TCP) len=52 id=8800&lt;BR /&gt;TCP: 51289 -&amp;gt; 80 .S.... seq=6cbefb2f ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth1:O[52]: 10.1.1.50 -&amp;gt; 10.2.2.50 (TCP) len=52 id=8800&lt;BR /&gt;TCP: 51289 -&amp;gt; 80 .S.... seq=6cbefb2f ack=00000000&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--- &lt;STRONG&gt;W&lt;/STRONG&gt;&lt;STRONG&gt;ebserver - 10.2.2.50:80&lt;/STRONG&gt; ---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site B&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;HTTP Reply:&lt;/STRONG&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;[vs_0][fw_0] eth1:i[52]: 10.2.2.50 -&amp;gt; 10.1.1.50 (TCP) len=52 id=0&lt;BR /&gt;TCP: 80 -&amp;gt; 51289 .S..A. seq=94647385 ack=6cbefb30&lt;BR /&gt;[vs_0][fw_0] eth1:I[52]: 10.2.2.50 -&amp;gt; 10.1.1.50 (TCP) len=52 id=0&lt;BR /&gt;TCP: 80 -&amp;gt; 51289 .S..A. seq=94647385 ack=6cbefb30&lt;/P&gt;&lt;P&gt;-------------- OS IP Stack -------------&lt;/P&gt;&lt;P&gt;[vs_0][fw_0] eth0:o[52]: 10.2.2.50 -&amp;gt; 10.1.1.50 (TCP) len=52 id=0&lt;BR /&gt;TCP: 80 -&amp;gt; 51289 .S..A. seq=94647385 ack=6cbefb30&lt;BR /&gt;[vs_0][fw_0] eth0:O[52]: 10.2.2.50 -&amp;gt; 10.1.1.50 (TCP) len=52 id=0&lt;BR /&gt;TCP: 80 -&amp;gt; 51289 .S..A. seq=94647385 ack=6cbefb30&lt;BR /&gt;&lt;STRONG&gt;[vs_0][fw_1] eth0:e[52]: 10.2.2.50 -&amp;gt; 10.1.1.50 (TCP) len=52 id=0&lt;/STRONG&gt;&lt;BR /&gt;TCP: 80 -&amp;gt; 51289 .S..A. seq=94647385 ack=6cbefb30&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site A&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;HTTP Reply:&lt;/STRONG&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;[vs_0][fw_2] eth0:I[52]: 10.2.2.50 -&amp;gt; 10.1.1.50 (TCP) len=52 id=0&lt;BR /&gt;TCP: 80 -&amp;gt; 51289 .S..A. seq=94647385 ack=6cbefb30&lt;/P&gt;&lt;P&gt;-------------- OS IP Stack -------------&lt;/P&gt;&lt;P&gt;[vs_0][fw_2] eth1:o[52]: 10.2.2.50 -&amp;gt; 10.1.1.50 (TCP) len=52 id=0&lt;BR /&gt;TCP: 80 -&amp;gt; 51289 .S..A. seq=94647385 ack=6cbefb30&lt;BR /&gt;[vs_0][fw_2] eth1:O[52]: 10.2.2.50 -&amp;gt; 10.1.1.50 (TCP) len=52 id=0&lt;BR /&gt;TCP: 80 -&amp;gt; 51289 .S..A. seq=94647385 ack=6cbefb30&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interesting stuff here if you ask me. I am not seeing the "E" (Post-Encrypt) in my fw monitor.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CoreXL is enabled on Site A:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;[Expert@GW1:0]# fw ctl affinity -l -a&lt;BR /&gt;eth0: CPU 0&lt;BR /&gt;eth1: CPU 0&lt;BR /&gt;eth2: CPU 0&lt;BR /&gt;eth3: CPU 0&lt;BR /&gt;Kernel fw_0: CPU 3&lt;BR /&gt;Kernel fw_1: CPU 2&lt;BR /&gt;Kernel fw_2: CPU 1&lt;BR /&gt;Daemon in.asessiond: CPU 1 2 3&lt;BR /&gt;Daemon fwd: CPU 1 2 3&lt;BR /&gt;Daemon mpdaemon: CPU 1 2 3&lt;BR /&gt;Daemon cprid: CPU 1 2 3&lt;BR /&gt;Daemon cpd: CPU 1 2 3&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe it has something to do with the same instance handling the traffic?&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;[Expert@GW1:0]# vpn tu mstats&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Instance#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; # of inSPIs&amp;nbsp;&amp;nbsp;&amp;nbsp; # of outSPIs&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp; -----------------------------------------&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Summary:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;CoreXL is disabled on Site B, but we do see the "e" (Pre-Encrypt)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also in the previous post by &lt;A href="https://community.checkpoint.com/migrated-users/45785"&gt;Rick Hoppe&lt;/A&gt; the following was stated by TAC:&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;EM&gt;So for outbound traffic, you will see e E, and for inbound, you will see E e."&lt;/EM&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not seeing this behavior in my fw monitor.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Dec 2017 23:27:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12840#M99518</guid>
      <dc:creator>_Jelle</dc:creator>
      <dc:date>2017-12-07T23:27:02Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12841#M99519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you have a SecureXL disabled while running fw monitor?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Dec 2017 15:50:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12841#M99519</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-12-08T15:50:47Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12842#M99520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, to get this results i disabled SecureXL&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Dec 2017 02:06:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12842#M99520</guid>
      <dc:creator>_Jelle</dc:creator>
      <dc:date>2017-12-09T02:06:16Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12843#M99521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perhaps "E" inspection point is for already encripted traffic destined to the peer?&lt;/P&gt;&lt;P&gt;Did you make a fw monitor capture between peer addresses (those who negotiate IPSec tunnel) for IKE and ESP traffic to verify if "E" inspection point is visible ??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Dec 2017 15:36:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12843#M99521</guid>
      <dc:creator>KennyManrique</dc:creator>
      <dc:date>2017-12-09T15:36:37Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12844#M99522</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104760&amp;amp;partition=Advanced&amp;amp;product=IPSec" style="max-width: 840px;"&gt;sk104760: ATRG: &lt;STRONG&gt;VPN&lt;/STRONG&gt; &lt;STRONG&gt;Core&lt;/STRONG&gt;&lt;/A&gt; has been updated with the following to describe the encrypt operation (oOeE):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL type="A"&gt;&lt;LI&gt;In R77.30 and lower, a packet enters the Security Gateway on CoreXL FW instance #0 (at Pre-Inbound chain "i").&lt;BR /&gt; In R80.10 and above, a packet enters the Security Gateway on the &lt;STRONG&gt;&lt;EM&gt;connection&lt;/EM&gt;&lt;/STRONG&gt; CoreXL FW instance.&lt;/LI&gt;&lt;LI&gt;The packet is inspected by the Firewall and sent to the OS Kernel (at Post-Inbound chain "I").&lt;/LI&gt;&lt;LI&gt;The OS routes the packet, using the &lt;EM&gt;destination&lt;/EM&gt; IP address of the original packet.&lt;/LI&gt;&lt;LI&gt;The outgoing packet is inspected by the FireWall (at Pre-Outbound chain "o").&lt;/LI&gt;&lt;LI&gt;Encryption information is prepared in &lt;EM&gt;vpnk&lt;/EM&gt; module (at Post-Outbound chain "O").&lt;/LI&gt;&lt;LI&gt;In R80.10 and above, the &lt;EM&gt;vpnk&lt;/EM&gt; module on the &lt;STRONG&gt;&lt;EM&gt;tunnel&lt;/EM&gt;&lt;/STRONG&gt; CoreXL FW instance gets the packet before encryption (at chain "e").&lt;/LI&gt;&lt;LI&gt;In R80.10 and above, packet is encrypted by &lt;EM&gt;vpnk&lt;/EM&gt; module (at chain "E").&lt;/LI&gt;&lt;LI&gt;IPsec packet is sent out.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note the distinction between "connection" CoreXL instance and "tunnel" CoreXL instance, which does not exist for the decrypt operation at iI.&amp;nbsp; So it looks like on the encrypt side (oOeE) a different CoreXL FW instance can perform the encrypt operation (the tunnel instance) vs. execute the regular firewall inspection for rest of the connection (the connection instance). &amp;nbsp; eE was added to help see which CoreXL instance actually did the encrypt operation as it can be different from the CoreXL instance that did the rest of the inspection.&amp;nbsp; I was puzzled by this core number difference in my Nov 17th reply to &lt;SPAN class=""&gt;&lt;A _jive_internal="true" class="" href="https://community.checkpoint.com/thread/6176-fw-monitor-inspection-point-e-or-e?commentID=11636#comment" title="Go to message"&gt;Tom Coussement&lt;/A&gt;&lt;/SPAN&gt; and this explains it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My Book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; Second Edition Coming Soon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Dec 2017 13:08:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12844#M99522</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2017-12-13T13:08:09Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12845#M99523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/45044"&gt;Kenny Manrique&lt;/A&gt;‌, I don't think you would see the inspection points if you capture "outer layer" tunnel traffic (if i understand you correct), based on earlier outputs from the topic starter we are seeing the following "inner layer" behavior:&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;[vs_0][fw_1] eth0:i[306]: 192.168.210.11 -&amp;gt; 192.168.197.142 (UDP) len=306 id=29530&lt;BR /&gt;UDP: 53 -&amp;gt; 61872&lt;BR /&gt;[vs_0][fw_1] eth0:I[306]: 192.168.210.11 -&amp;gt; 192.168.197.142 (UDP) len=306 id=29530&lt;BR /&gt;UDP: 53 -&amp;gt; 61872&lt;BR /&gt;[vs_0][fw_1] eth2:o[306]: 192.168.210.11 -&amp;gt; 192.168.197.142 (UDP) len=306 id=29530&lt;BR /&gt;UDP: 53 -&amp;gt; 61872&lt;BR /&gt;[vs_0][fw_1] eth2:O[306]: 192.168.210.11 -&amp;gt; 192.168.197.142 (UDP) len=306 id=29530&lt;BR /&gt;UDP: 53 -&amp;gt; 61872&lt;BR /&gt;[vs_0][fw_0] &lt;STRONG&gt;eth2:e&lt;/STRONG&gt;[306]: 192.168.210.11 -&amp;gt; 192.168.197.142 (UDP) len=306 id=29530&lt;BR /&gt;UDP: 53 -&amp;gt; 61872&lt;BR /&gt;[vs_0][fw_0] &lt;STRONG&gt;eth2:E&lt;/STRONG&gt;[306]: 192.168.210.11 -&amp;gt; 192.168.197.142 (UDP) len=306 id=29530&lt;BR /&gt;UDP: 53 -&amp;gt; 61872&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Dec 2017 16:46:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12845#M99523</guid>
      <dc:creator>_Jelle</dc:creator>
      <dc:date>2017-12-13T16:46:39Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12846#M99524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;SPAN class=""&gt;&lt;A href="https://community.checkpoint.com/migrated-users/49204"&gt;Jelle Hazenberg&lt;/A&gt;‌&lt;A _jive_internal="true" class="" href="https://community.checkpoint.com/thread/6176-fw-monitor-inspection-point-e-or-e?commentID=11822#comment" title="Ir al mensaje"&gt;&lt;BR /&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yesterday I deployed an R80.10 Cluster for a customer and established some Site to Site VPN.&lt;/P&gt;&lt;P&gt;For not staying with the doubt, I did a fw capture of internal hosts (those networks who communicate through VPN) and external interfaces (those who negotiate the tunnel); to me the inspection point E (Post-encrypt) is visible on external side.&lt;/P&gt;&lt;P&gt;I had to do two separate fw monitor's due the expression filter can only be applied once (make the capture simultaneously on two ssh sessions break my original filters defined).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To test the tunnel I did a ping from 192.168.42.13 (R80.10 GW LAN) to 192.168.2.25 (External GW LAN) with 800 bytes for discriminate from other traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;INTERNAL CAPTURE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[Expert@FIREWALL:0]# fw monitor -e "host(192.168.42.13) and host(192.168.2.25), accept;"&lt;BR /&gt; monitor: getting filter (from command line)&lt;BR /&gt; monitor: compiling&lt;BR /&gt;monitorfilter:&lt;BR /&gt;Compiled OK.&lt;BR /&gt; monitor: loading&lt;BR /&gt; monitor: monitoring (control-C to stop)&lt;BR /&gt;[vs_0][fw_1] bond1:i[828]: 192.168.42.13 -&amp;gt; 192.168.2.25 (ICMP) len=828 id=17837&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=22445&lt;BR /&gt;[vs_0][fw_1] bond1:I[828]: 192.168.42.13 -&amp;gt; 192.168.2.25 (ICMP) len=828 id=17837&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=22445&lt;BR /&gt;[vs_0][fw_1] eth4:o[828]: 192.168.42.13 -&amp;gt; 192.168.2.25 (ICMP) len=828 id=17837&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=22445&lt;BR /&gt;[vs_0][fw_1] eth4:O[828]: 192.168.42.13 -&amp;gt; 192.168.2.25 (ICMP) len=828 id=17837&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=22445&lt;BR /&gt;[vs_0][fw_1] eth4:&lt;STRONG&gt;e&lt;/STRONG&gt;[828]: 192.168.42.13 -&amp;gt; 192.168.2.25 (ICMP) len=828 id=17837&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=22445 --&amp;gt; &lt;STRONG&gt;PRE ENCRYPT PING (ECHO-REQUEST)&lt;/STRONG&gt;&lt;BR /&gt;[vs_0][fw_1] eth3:I[828]: 192.168.2.25 -&amp;gt; 192.168.42.13 (ICMP) len=828 id=12130&lt;BR /&gt;ICMP: type=0 code=0 echo reply id=1 seq=22445 --&amp;gt; &lt;STRONG&gt;DECRYPTED PING (ECHO-REPLY)&lt;/STRONG&gt;&lt;BR /&gt;[vs_0][fw_1] bond1:o[828]: 192.168.2.25 -&amp;gt; 192.168.42.13 (ICMP) len=828 id=12130&lt;BR /&gt;ICMP: type=0 code=0 echo reply id=1 seq=22445&lt;BR /&gt;[vs_0][fw_1] bond1:O[828]: 192.168.2.25 -&amp;gt; 192.168.42.13 (ICMP) len=828 id=12130&lt;BR /&gt;ICMP: type=0 code=0 echo reply id=1 seq=22445&lt;/P&gt;&lt;P&gt;monitor: caught sig 2&lt;BR /&gt; monitor: unloading&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;EXTERNAL CAPTURE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;For security reasons, external addresses were changed to X.X.X.X (R80.10 GW) and Y.Y.Y.Y (External GW)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;[Expert@FIREWALL:0]# fw monitor -e "host(X.X.X.X) and host(Y.Y.Y.Y), accept;"&lt;BR /&gt;&amp;nbsp;monitor: getting filter (from command line)&lt;BR /&gt;&amp;nbsp;monitor: compiling&lt;BR /&gt;monitorfilter:&lt;BR /&gt;Compiled OK.&lt;BR /&gt;&amp;nbsp;monitor: loading&lt;BR /&gt;&amp;nbsp;monitor: monitoring (control-C to stop)&lt;/P&gt;&lt;P&gt;[vs_0][fw_1] eth3:&lt;STRONG&gt;E&lt;/STRONG&gt;[880]: X.X.X.X -&amp;gt; Y.Y.Y.Y (50)&amp;nbsp; len=880 id=11150 --&amp;gt; &lt;STRONG&gt;ENCRYPTED&lt;/STRONG&gt; &lt;STRONG&gt;OUTGOING PING (ECHO-REQUEST)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[vs_0][fw_1] eth3:i[880]: Y.Y.Y.Y -&amp;gt; X.X.X.X (50)&amp;nbsp; len=880 id=35654 --&amp;gt; &lt;STRONG&gt;ENCRYPTED&lt;/STRONG&gt;&amp;nbsp; &lt;STRONG&gt;INCOMING PING (ECHO-REPLY)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;monitor: caught sig 2&lt;BR /&gt;&amp;nbsp;monitor: unloading&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP Header adds 8 bytes to packet while IP header adds 20 bytes so this way the original packet of 800 bytes is seen as one of 828 bytes on internal interface.&lt;/P&gt;&lt;P&gt;The encryption adds 52 bytes to original packet (new IP header, ESP data), resulting on 880 bytes packet leaving the gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can view, on my scenario, "E" inspection point is visible on external addresses while "e" inspection point is visible on internal addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Dec 2017 18:48:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12846#M99524</guid>
      <dc:creator>KennyManrique</dc:creator>
      <dc:date>2017-12-13T18:48:34Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12847#M99525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well Kenny, it seems like in our case you're correct. But that this doesn't make any sense to me. Why are we seeing other behavior in the capture from the topic starter? &lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;[vs_0][fw_1] eth0:i[306]: 192.168.210.11 -&amp;gt; 192.168.197.142 (UDP) len=306 id=29530&lt;BR /&gt;UDP: 53 -&amp;gt; 61872&lt;BR /&gt;[vs_0][fw_1] eth0:I[306]: 192.168.210.11 -&amp;gt; 192.168.197.142 (UDP) len=306 id=29530&lt;BR /&gt;UDP: 53 -&amp;gt; 61872&lt;BR /&gt;[vs_0][fw_1] eth2:o[306]: 192.168.210.11 -&amp;gt; 192.168.197.142 (UDP) len=306 id=29530&lt;BR /&gt;UDP: 53 -&amp;gt; 61872&lt;BR /&gt;[vs_0][fw_1] eth2:O[306]: 192.168.210.11 -&amp;gt; 192.168.197.142 (UDP) len=306 id=29530&lt;BR /&gt;UDP: 53 -&amp;gt; 61872&lt;BR /&gt;[vs_0][fw_0] &lt;STRONG&gt;eth2:e&lt;/STRONG&gt;[306]: 192.168.210.11 -&amp;gt; 192.168.197.142 (UDP) len=306 id=29530&lt;BR /&gt;UDP: 53 -&amp;gt; 61872&lt;BR /&gt;[vs_0][fw_0] &lt;STRONG&gt;eth2:E&lt;/STRONG&gt;[306]: 192.168.210.11 -&amp;gt; 192.168.197.142 (UDP) len=306 id=29530&lt;BR /&gt;UDP: 53 -&amp;gt; 61872&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is also "inner layer" traffic right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Dec 2017 10:21:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12847#M99525</guid>
      <dc:creator>_Jelle</dc:creator>
      <dc:date>2017-12-14T10:21:47Z</dc:date>
    </item>
    <item>
      <title>Re: fw monitor inspection point e or E</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12848#M99526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You're right, it seems inner layer traffic. I'm not sure why "E" inspection point is visible, the only reason I can think is fwaccel was enabled on the capture maybe?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Dec 2017 13:06:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-monitor-inspection-point-e-or-E/m-p/12848#M99526</guid>
      <dc:creator>KennyManrique</dc:creator>
      <dc:date>2017-12-18T13:06:34Z</dc:date>
    </item>
  </channel>
</rss>

