<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CLI command to see a rule number if logging is not enabled. in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270676#M45452</link>
    <description>&lt;P&gt;Not sure why you referenced the R80.20 docs when fw up_execute was added in R82.&lt;/P&gt;</description>
    <pubDate>Thu, 12 Feb 2026 21:19:45 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2026-02-12T21:19:45Z</dc:date>
    <item>
      <title>CLI command to see a rule number if logging is not enabled.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270621#M45437</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Strange situation here where I'm seeing traffic traverse a firewall but its not logging. Trying to find a zdebug or equivalent that would tell me the rule number being hit. Any assitance would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Anthony&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 16:38:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270621#M45437</guid>
      <dc:creator>antsvett3</dc:creator>
      <dc:date>2026-02-12T16:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command to see a rule number if logging is not enabled.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270629#M45438</link>
      <description>&lt;P&gt;As fw ctl zdebug + drop Shows all dropped connections I would say same with accept but I am not sure and id might produce heavy load even in combination with grep. Kernel debug doc should explain.&lt;/P&gt;
&lt;P&gt;Or was it&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;fw ctl zdebug + monitorall&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;or&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;fw ctl zdebug + monitor&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 17:09:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270629#M45438</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-02-12T17:09:33Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command to see a rule number if logging is not enabled.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270643#M45440</link>
      <description>&lt;P&gt;Note that grep is really bad for filtering debug output. For low-volume debugs, you have to wait for the debug to produce a certain amount of data before grep will act on it. For high-volume debugs, the firewall is doing the extra debugging work for all of the caught traffic and throwing 99.9% of it away. Instead,&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packets-lost-after-quot-fw-post-VM-outbound-quot/m-p/230890/highlight/true#M44451" target="_self"&gt;you can filter zdebug just like you do with fw monitor&lt;/A&gt;. For example:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;fw ctl zdebug -T -F "10.0.1.253,0,192.168.144.120,0,0" -m fw xlate drop&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 12 Feb 2026 18:38:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270643#M45440</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-02-12T18:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command to see a rule number if logging is not enabled.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270645#M45442</link>
      <description>&lt;P&gt;You're right, of course. Thank you for reminding me.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 18:43:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270645#M45442</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-02-12T18:43:34Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command to see a rule number if logging is not enabled.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270646#M45443</link>
      <description>&lt;P&gt;Hey Anthony,&lt;/P&gt;
&lt;P&gt;Did this ever work? One easy thing to try would be disable/re-enable the rule and install policy, test. Well, disable, install policy, re-enable, push policy again. Just make sure rule is set to log.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 18:46:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270646#M45443</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-12T18:46:05Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command to see a rule number if logging is not enabled.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270647#M45444</link>
      <description>&lt;P&gt;„the rule“&lt;/P&gt;
&lt;P&gt;Funny &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Imagine you have 5k rules and no clue witch could match.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then think again about „the rule“. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 18:52:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270647#M45444</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-02-12T18:52:51Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command to see a rule number if logging is not enabled.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270648#M45445</link>
      <description>&lt;P&gt;Geesh, I dont know why I imagined in my head it was just a single rule lol&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 18:54:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270648#M45445</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-12T18:54:07Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command to see a rule number if logging is not enabled.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270659#M45448</link>
      <description>&lt;P&gt;Poking through debug flags, I thought 'conn' might do it. That one shows it's accepted, but not why. 'monitor' and 'monitorall' just give a view of the packet at the various chain positions ('monitorall' is like an 'fw monitor -p all'). Both 'machine' and 'vm' provide information about the rule evaluation process, but don't seem to provide rule numbers.&lt;/P&gt;
&lt;P&gt;Looking at the output of 'machine' and 'vm', I noted mentions of the "Unified Policy". Looking at the output of '&lt;SPAN class="s1"&gt;fw ctl debug -m' (which lists modules you can debug and options you can enable on them), one of the modules is UP. It has these options:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="s1"&gt;error warning info verbose address subject timestamp memory vs coverage module connection policy manager clob memory account rulebase urlf_ssl btime log limit sec_rb prob prob_impl vpn mab match stats probtrc&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="s1"&gt;That looks promising, so I tried it out:&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[Expert@DallasticXL-s01-01:0]# fw ctl zdebug -T -F "10.0.3.13,0,0,0,1" -m UP + all
...
...
...
@;206102236.449831;12Feb2026 19:14:25.963349;[vs_0];[tid_0];[fw4_0];1:[SID: 5958893] {connection} up_manager_fw_handle_first_packet: handling first packet of chain: 0x7fba1e694748;
@;206102236.449832;12Feb2026 19:14:25.963357;[vs_0];[tid_0];[fw4_0];1:[SID: 5958893] {connection} up_manager_fw_handle_first_packet: [10.0.3.13:7 -&amp;gt; 10.0.1.252:0] ;
@;206102236.449833;12Feb2026 19:14:25.963362;[vs_0];[tid_0];[fw4_0];1:[SID: 5958893] {rulebase} up_handle_init: called for 0x7fba19c45f08;
@;206102236.449834;12Feb2026 19:14:25.963366;[vs_0];[tid_0];[fw4_0];1:[SID: 5958893] {rulebase} up_handle_init: setting 'match_terminating_pos_in_chain' to 0;
@;206102236.449835;12Feb2026 19:14:25.963369;[vs_0];[tid_0];[fw4_0];1:[SID: 5958893] {rulebase} up_handle_init: policy id 1757341665;
...
...
...
@;206102236.450491;12Feb2026 19:14:25.965398;[vs_0];[tid_0];[fw4_0];1:[SID: 5958893] {rulebase} up_rulebase_is_log_required: is_log_globaly_required 1;
@;206102236.450492;12Feb2026 19:14:25.965402;[vs_0];[tid_0];[fw4_0];1:[SID: 5958893] {rulebase} up_sub_policy_get_action_track_info: policy id: 0 rule: 1;
@;206102236.450493;12Feb2026 19:14:25.965405;[vs_0];[tid_0];[fw4_0];1:[SID: 5958893] {rulebase} up_sub_policy_get_rule_track: track: 0, track_code: 0;
@;206102236.450494;12Feb2026 19:14:25.965408;[vs_0];[tid_0];[fw4_0];1:[SID: 5958893] {rulebase} up_rulebase_get_rule_track: track code 0, rule 0:1;
@;206102236.450495;12Feb2026 19:14:25.965411;[vs_0];[tid_0];[fw4_0];1:[SID: 5958893] {log} up_manager_is_log_required_more_data: rule not required log: sub policy 0, match state MATCH, rule 1;
@;206102236.450496;12Feb2026 19:14:25.965413;[vs_0];[tid_0];[fw4_0];1:[SID: 5958893] {log} up_manager_handle_net_log: is_log_required 0;
@;206102236.450497;12Feb2026 19:14:25.965416;[vs_0];[tid_0];[fw4_0];1:[SID: 5958893] {connection} up_manager_fw_handle_first_packet: final action ACCEPT;&lt;/LI-CODE&gt;
&lt;P&gt;Note that this debug is &lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;extremely&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt; verbose (not on the level of 'ld', but still much more data than I quote above for a single ping). I wouldn't run it without a strict filter on the debug. It seems to contain detailed rule information, though.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 19:20:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270659#M45448</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-02-12T19:20:04Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command to see a rule number if logging is not enabled.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270665#M45450</link>
      <description>&lt;P&gt;I found this command.&lt;/P&gt;&lt;P&gt;fw up_execute&lt;BR /&gt;Usage: fw up_execute [src=&amp;lt;IP&amp;gt;] [dst=&amp;lt;IP&amp;gt;] ipp=&amp;lt;ip protocol&amp;gt; [sport=&amp;lt;source port&amp;gt;] [dport=&amp;lt;dest port&amp;gt;] [protocol=&amp;lt;protocol&amp;gt;] [application=&amp;lt;application/category&amp;gt;]&lt;/P&gt;&lt;P&gt;Notes: Parameters can be omitted, except the ipp (and dport in case of TCP or UDP).&lt;BR /&gt;The order of the parameters does not matter.&lt;BR /&gt;Applications can be entered multiple times.&lt;/P&gt;&lt;P&gt;Examples:&lt;BR /&gt;1) fw up_execute src=126.200.49.240 dst=10.1.1.1 ipp=1&lt;BR /&gt;2) fw up_execute src=10.1.1.1 ipp=6 dport=8080 protocol=HTTP application=Facebook application=Opera&lt;/P&gt;&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/html_frameset.htm?topic=documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/205069" target="_blank"&gt;Command Line Interface R80.20 Reference Guide&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Just not sure how accurate it is after reading about it in some posts.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Firewall-and-Security-Management/fw-up-execute-command/m-p/25000" target="_blank"&gt;fw up_execute command - Check Point CheckMates&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 19:48:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270665#M45450</guid>
      <dc:creator>antsvett3</dc:creator>
      <dc:date>2026-02-12T19:48:48Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command to see a rule number if logging is not enabled.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270676#M45452</link>
      <description>&lt;P&gt;Not sure why you referenced the R80.20 docs when fw up_execute was added in R82.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 21:19:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270676#M45452</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-02-12T21:19:45Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command to see a rule number if logging is not enabled.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270681#M45453</link>
      <description>&lt;P&gt;it shows it came about in r80.20. also not running it from r82.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 21:43:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270681#M45453</guid>
      <dc:creator>antsvett3</dc:creator>
      <dc:date>2026-02-12T21:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command to see a rule number if logging is not enabled.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270725#M45460</link>
      <description>&lt;P&gt;Out of curiosity, I tried it out and also sent exactly ONE echo request. Result: 715 (!!) lines. Holy cow!&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 10:19:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270725#M45460</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-02-13T10:19:52Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command to see a rule number if logging is not enabled.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270726#M45461</link>
      <description>&lt;P&gt;Just tested in R82.10. The first of the given examples does not work as not all mandatory fields&amp;nbsp;{src,dst,dport,in_ifn} given.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 10:32:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270726#M45461</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-02-13T10:32:47Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command to see a rule number if logging is not enabled.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270744#M45463</link>
      <description>&lt;P&gt;&lt;STRONG&gt;fw up_execute&lt;/STRONG&gt; existed well before R82, but sometimes did not return correct results, and it was not an officially supported tool.&amp;nbsp; Formal support for &lt;STRONG&gt;fw up_execute&lt;/STRONG&gt; was added in R82, and in my experience so far, it is now 100% accurate.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 13:20:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270744#M45463</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2026-02-13T13:20:07Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command to see a rule number if logging is not enabled.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270747#M45464</link>
      <description>&lt;P&gt;That command is pretty accurate in R82, as Tim indicated. I ran it in the lab few times, as well as with customers, gave pretty accurate results. Did you try it for affected traffic to see what rule(s) it gives?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 13:23:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270747#M45464</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-13T13:23:51Z</dc:date>
    </item>
    <item>
      <title>Re: CLI command to see a rule number if logging is not enabled.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270796#M45466</link>
      <description>&lt;P&gt;It did exist before R82, but it is far less functional since it didn't support most of the advanced object types, nor did it support NAT.&lt;BR /&gt;See the R82 doc:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_CLI_ReferenceGuide/Content/Topics-CLIG/FWG/fw-up_execute.htm?Highlight=up_execute" target="_blank"&gt;https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_CLI_ReferenceGuide/Content/Topics-CLIG/FWG/fw-up_execute.htm?Highlight=up_execute&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 16:00:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CLI-command-to-see-a-rule-number-if-logging-is-not-enabled/m-p/270796#M45466</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-02-13T16:00:10Z</dc:date>
    </item>
  </channel>
</rss>

