<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.10 and tcpdump in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/R80-10-and-tcpdump/m-p/21426#M3962</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As the question got fully qualified answers I will only go astray a bit and tell how I introduce networking to the newcomers&amp;nbsp;(with simplification) - "Look, there is nothing magical about Checkpoint, it is just a bunch of clever kernel modules working on Layer 3,4 and 7 of OSI, below or above that it is just good old Linux. So forget for a second about Checkpoint - ethernet speed/duplex, NIC errors, routing, bringing up/down interfaces, top, tcpdump is still very basic Linux stuff you already know".&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 28 Aug 2018 19:06:45 GMT</pubDate>
    <dc:creator>Yuri_Slobodyany</dc:creator>
    <dc:date>2018-08-28T19:06:45Z</dc:date>
    <item>
      <title>R80.10 and tcpdump</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-10-and-tcpdump/m-p/21421#M3957</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI, can someone please confirm that no firewall services will do anything to any packets before tcpdump (on the incoming interface) captures the packets?&amp;nbsp; I am looking to prove that a packet which is consistently missing from a tcpdump cannot be possibly dropped by any firewall processes - in other words, that some or other IPS on the internal network must be interfering with matters.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do know that fw monitor won't work without disabling acceleration, but this is tcpdump only which I am referring to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2018 07:25:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-10-and-tcpdump/m-p/21421#M3957</guid>
      <dc:creator>Godfrey_Bennett</dc:creator>
      <dc:date>2018-08-23T07:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: R80.10 and tcpdump</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-10-and-tcpdump/m-p/21422#M3958</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In short you are correct in your assumption&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2018 09:08:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-10-and-tcpdump/m-p/21422#M3958</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-08-23T09:08:58Z</dc:date>
    </item>
    <item>
      <title>Re: R80.10 and tcpdump</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-10-and-tcpdump/m-p/21423#M3959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes libpcap/tcpdump is receiving a copy of the frames before they are being processed by SecureXL or the INSPECT driver on the inbound side.&amp;nbsp; The outbound side is a lot more complicated though depending on SecureXL and you may or may not see the packets leaving with tcpdump.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However there are four exceptions I can think of that would cause packets not to appear on the inbound interface via tcpdump:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) A SAM/ADP card is in use on a 23000 series, in this case the NIC and firewall processing silicon are tightly integrated and tcpdump may not be able to see the inbound packets at all.&amp;nbsp; Not sure if this will still apply with the new Falcon cards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) The incoming frame is errored due to framing/CRC/runt/jabber/etc.&amp;nbsp; In this case the relevant error counters visible with ethtool -S and netstat -ni (RX-ERR) will be incremented, but the errored frame will not be passed up to libpcap/SecureXL/INSPECT at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) The frame was dropped due to a hardware overrun in the NIC (++RX-OVR) or no ring buffer slots were available during hardware interrupt frame processing (++RX-DRP).&amp;nbsp; You can view these two counters and RX-ERR with netstat -ni, as long as they don't move during your tcpdump capture exceptions 2 and 3 are not happening.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) At the conclusion of your tcpdump the reported value of "dropped by kernel&lt;STRONG&gt;" &lt;/STRONG&gt;is nonzero.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2018 15:52:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-10-and-tcpdump/m-p/21423#M3959</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-08-23T15:52:12Z</dc:date>
    </item>
    <item>
      <title>Re: R80.10 and tcpdump</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-10-and-tcpdump/m-p/21424#M3960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A _jive_internal="true" class="" data-avatarid="1013" data-externalid="" data-online="false" data-presence="null" data-userid="58367" data-username="godfr6c48e693-b3f5-3b68-acb2-168b15caa948" href="https://community.checkpoint.com/people/godfr6c48e693-b3f5-3b68-acb2-168b15caa948"&gt;Godfrey,&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I agree with &lt;A _jive_internal="true" data-avatarid="1461" data-externalid="" data-online="false" data-presence="null" data-userid="41625" data-username="thalld401179d-0d5b-369d-a0f2-387c3ef54533" href="https://community.checkpoint.com/people/thalld401179d-0d5b-369d-a0f2-387c3ef54533"&gt;Timothy&lt;/A&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inbound libpcap/tcpdump works between layer 2 and layer 3. The SecureXL or IINSPECT driver is not yet effective here. Therefore you can see all packages here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outbound looks a little different. Here the SecureXL driver can bypass the libpcap code&amp;nbsp;&lt;SPAN&gt;in the Linux kernel&lt;/SPAN&gt; under certain conditions. Therefore not all packages are 100% visible. If you want to be 100% sure that you see all outbound packetes, you must switch off SecureXL "fwaccel off". It is a historical discussion whether SecureXL must be switched on or off. When I want to be 100% sure I switch SecureXL off.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can see more in my flowchart in the following article:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3041"&gt;R80.x Security Gateway Architecture (Logical Packet Flow)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is also a description of how the packets pass through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/55229"&gt;Heiko&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2018 17:41:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-10-and-tcpdump/m-p/21424#M3960</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-08-23T17:41:39Z</dc:date>
    </item>
    <item>
      <title>Re: R80.10 and tcpdump</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-10-and-tcpdump/m-p/21425#M3961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;gt; If you want to be 100% sure that you see all outbound packetes, you must switch off SecureXL "fwaccel off".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right, but in general I don't recommend doing this on a production firewall with more than 8 cores as the performance impact can be noticeable.&amp;nbsp; Would always recommend disabling SecureXL selectively for the IP address(es) you want to capture ahead of time, then you can use &lt;STRONG&gt;tcpdump&lt;/STRONG&gt; and/or &lt;STRONG&gt;fw monitor&lt;/STRONG&gt; to see all inbound and outbound traffic:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104468&amp;amp;partition=Advanced&amp;amp;product=SecureXL%22" style="max-width: 840px;"&gt;sk104468: How to &lt;STRONG&gt;disable&lt;/STRONG&gt; &lt;STRONG&gt;SecureXL&lt;/STRONG&gt; for specific IP addresses&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2018 18:16:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-10-and-tcpdump/m-p/21425#M3961</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-08-23T18:16:47Z</dc:date>
    </item>
    <item>
      <title>Re: R80.10 and tcpdump</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-10-and-tcpdump/m-p/21426#M3962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As the question got fully qualified answers I will only go astray a bit and tell how I introduce networking to the newcomers&amp;nbsp;(with simplification) - "Look, there is nothing magical about Checkpoint, it is just a bunch of clever kernel modules working on Layer 3,4 and 7 of OSI, below or above that it is just good old Linux. So forget for a second about Checkpoint - ethernet speed/duplex, NIC errors, routing, bringing up/down interfaces, top, tcpdump is still very basic Linux stuff you already know".&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2018 19:06:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-10-and-tcpdump/m-p/21426#M3962</guid>
      <dc:creator>Yuri_Slobodyany</dc:creator>
      <dc:date>2018-08-28T19:06:45Z</dc:date>
    </item>
  </channel>
</rss>

