<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: My Top 3 Check Point CLI commands in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4756#M502</link>
    <description>&lt;P&gt;Well looks like this has turned into the most epic Checkmates thread ever and my last 3 commands were well-received, so here are some more that have not been mentioned yet.&amp;nbsp; The focus for these is recovering from mistakes that normally would require a firewall outage:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1) &lt;STRONG&gt;Disable anti-spoofing on the fly from the gateway.&lt;/STRONG&gt;&amp;nbsp; Should you make a mistake in the anti-spoofing config the results can be dire: lots of traffic suddenly being dropped by the gateway.&amp;nbsp; Once the specific interface with the problem has been identified, best practice dictates setting the antispoofing setting for that interface to "Detect" and reinstalling policy.&amp;nbsp; On R80+ Management, quickly reverting the gateway to a known-good policy via the "Installation History" screen is a good choice as well.&amp;nbsp; At that point you can figure out what went wrong at your leisure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But what if antispoofing is now dropping all management traffic to/from the SMS itself? A corrected policy can't be pushed, and new logs can no longer be received from the firewall either to figure out what is going on.&amp;nbsp; The usual way of breaking this catch-22 that involves taking a full outage on the firewall is:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1) Log into firewall (probably on console)&lt;/P&gt;
&lt;P&gt;2) Unplug/disable externally-facing interface to protect firewall&lt;/P&gt;
&lt;P&gt;3) Run &lt;EM&gt;fw unloadlocal&lt;/EM&gt; (full outage begins)&lt;/P&gt;
&lt;P&gt;4) Race back to SmartConsole and push policy with corrected antispoofing&lt;/P&gt;
&lt;P&gt;5) Restore external-facing interface (full outage ends)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But there is a better way that does not involve taking a full outage, and these expert mode gateway commands can also be used as a bit of a "panic button" in regards to an antispoofing problem:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;fw ctl set int fw_antispoofing_enabled 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;sim feature anti_spoofing off ; fwaccel off ; fwaccel on&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All antispoofing enforcement on the gateway is immediately disabled.&amp;nbsp; While these settings will not survive a gateway reboot, &lt;EM&gt;they will survive a policy re-installation and cprestart&lt;/EM&gt;, so once the issue is corrected make sure to turn anti-spoofing back on like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;fw ctl set int fw_antispoofing_enabled 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;sim feature anti_spoofing on ; fwaccel off ; fwaccel on&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;Edit: The above commands work for R80.10 and earlier, for R80.20+ use these commands instead:&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="western lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;fw ctl set int fw_antispoofing_enabled 0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="western lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;fw ctl set int sim_anti_spoofing_enabled 0 -a&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="western lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) &lt;STRONG&gt;Recover from SIC issues between SMS and gateway without an outage.&lt;/STRONG&gt;&amp;nbsp; If SIC somehow gets broken between a single gateway and the SMS and must be reset, the traditional way of dealing with it is to run "cpconfig" on the gateway, reset SIC and enter a new activation key.&amp;nbsp; Unfortunately doing it this way causes the gateway to not only discard its current SIC certificate, but also discard its current installed security policy and load up the default "InitialPolicy", which blocks almost all traffic and causes a full outage until policy is reinstalled/fetched from the SMS.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A far more problematic situation though is when the certificate of the SMS itself gets corrupted/changed (or the ICA somehow gets reset brutally) and SIC trust gets instantly broken between all managed gateways and the SMS.&amp;nbsp; Now you're staring down the barrel of outages on all non-clustered gateways to recover control.&amp;nbsp; But there is a way to have the gateway discard its SIC certificate and set a new activation key, but without discarding its installed security policy taken from &lt;A class="" style="max-width: 840px;" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk86521&amp;amp;partition=Expert&amp;amp;product=Security" target="_blank" rel="noopener"&gt;sk86521: Reset SIC without restarting the firewall process&lt;/A&gt;:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the gateway run:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;cp_conf sic init ACTIVATIONKEY norestart&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;cpwd_admin stop -name CPD -path "$CPDIR/bin/cpd_admin" -command "cpd_admin stop"&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;cpwd_admin start -name CPD -path "$CPDIR/bin/cpd" -command "cpd"&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Trust can now be reestablished to to the gateway and policy reinstalled, all without an outage!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3) &lt;STRONG&gt;Regain gateway CLI access via SIC if admin and/or expert passwords are unknown/corrupt&lt;/STRONG&gt;.&amp;nbsp; The typical outage-inducing way to recover from this situation:&amp;nbsp; Factory reset a gateway appliance (and pray you have a good backup to restore containing passwords that you know) or on open hardware boot from a live Linux distribution DVD/USB media like Knoppix and try to hack the password that way.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The cprid_util command has been mentioned a few times in this thread, but bears repeating for this situation.&amp;nbsp; If for some reason you cannot log into the gateway CLI, assuming SIC is still established between the gateway and the SMS (and SIC traffic is not being impeded by firewall policy), you can execute commands on the gateway from the SMS via the SIC trust without a password.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is a sample command to reset the gateway's admin password, taken from &lt;A style="max-width: 840px;" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106490&amp;amp;partition=Expert&amp;amp;product=Security" target="_blank" rel="noopener"&gt;sk106490: How to remotely reset Admin / Expert password on a Security Gateway from a Security Management Server&lt;/A&gt;:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;$CPDIR/bin/cprid_util -server &amp;lt;IP_address_of_Security_Gateway&amp;gt; -verbose rexec -rcmd /bin/clish -s -c 'set user admin password-hash &amp;lt;password hash generated by grub-md5-crypt command&amp;gt;'&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;--&lt;BR /&gt;My book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt;now available via &lt;A href="http://maxpowerfirewalls.com" target="_blank" rel="noopener"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;</description>
    <pubDate>Tue, 04 Aug 2020 19:56:37 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2020-08-04T19:56:37Z</dc:date>
    <item>
      <title>My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4649#M395</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;Just had a fun geeky conversation with &lt;A _jive_internal="true" data-containerid="-1" data-containertype="-1" data-objectid="2075" data-objecttype="3" href="https://community.checkpoint.com/people/dwelccfe6e688-522c-305c-adaa-194bd7a7becc"&gt;Dameon Welch Abernathy&lt;/A&gt;&amp;nbsp;(AKA Phoneboy) &lt;A _jive_internal="true" data-containerid="-1" data-containertype="-1" data-objectid="43544" data-objecttype="3" href="https://community.checkpoint.com/people/jfiscfae7bf2f-78ab-4b00-a9b4-a6d6e32e4ab8"&gt;Jony Fischbein&lt;/A&gt; , &lt;A _jive_internal="true" data-containerid="-1" data-containertype="-1" data-objectid="43284" data-objecttype="3" href="https://community.checkpoint.com/people/JSCHWbae2c400-28e2-300c-af51-b6461d722a77"&gt;Jeff Schwartz&lt;/A&gt; and &lt;A _jive_internal="true" data-containerid="-1" data-containertype="-1" data-objectid="44126" data-objecttype="3" href="https://community.checkpoint.com/people/mpoub8476dcf5-5166-42f7-a573-b52adbfb416e"&gt;Michael Poublon&lt;/A&gt; (over 100 accumulated years of experience in Check Point products) , on what are our favorite &amp;amp; most useful commands in a Check Point environment.&lt;/P&gt;&lt;P class=""&gt;Below are my 3 , plz add yours in the comments (we will do a poll for the top 5 after getting your feedback ... &lt;SPAN class="emoticon_happy emoticon-inline" style="height: 16px; width: 16px;"&gt;&lt;/SPAN&gt;).&lt;/P&gt;&lt;P class="" style="min-height: 8pt; padding: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;1)&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;fw ctl zdebug drop&lt;/STRONG&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P class=""&gt;used to quickly see all dropped connections and more importantly the reason (e.g. anti-spoofing, IPS , FW rule , ....)&lt;/P&gt;&lt;P class="" style="min-height: 8pt; padding: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;2) &lt;STRONG&gt;&lt;EM&gt;cpstat fw&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;quickly see stats of number of connections (accepted,denied,logged) with a breakdown&lt;/P&gt;&lt;P class=""&gt;if the FW was under a high load i would usually run "&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;watch --interval=1 'cpstat fw&lt;/EM&gt;'&lt;/STRONG&gt; " (would see a real-time to see the interface that is causing this)&lt;/P&gt;&lt;P class="" style="min-height: 8pt; padding: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;A href="https://community.checkpoint.com/legacyfs/online/checkpoint/57498_pastedImage_6.png"&gt;&lt;IMG __jive_id="57498" class="image-1 jive-image" height="406" src="https://community.checkpoint.com/legacyfs/online/checkpoint/57498_pastedImage_6.png" style="width: auto; height: auto;" width="378" /&gt;&lt;/A&gt;&lt;/P&gt;&lt;P class=""&gt;3) &lt;STRONG&gt;&lt;EM&gt;fw tab -s -t connections&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;allowed me to quickly see how much load is (and was i.e "peak" ) on the FW&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;A href="https://community.checkpoint.com/legacyfs/online/checkpoint/57499_pastedImage_12.png"&gt;&lt;IMG __jive_id="57499" class="image-2 jive-image" height="96" src="https://community.checkpoint.com/legacyfs/online/checkpoint/57499_pastedImage_12.png" style="width: 165.33333333333334%;" width="664" /&gt;&lt;/A&gt;&lt;/P&gt;&lt;P class="" style="min-height: 8pt; padding: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;that's it (i have more , but i want to hear yours ...)&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;plz add yours in the comments (we will do a poll for the top 5 after getting your feedback ...&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="emoticon_happy emoticon-inline" style="height: 16px; width: 16px;"&gt;&lt;/SPAN&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jul 2017 07:07:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4649#M395</guid>
      <dc:creator>Moti</dc:creator>
      <dc:date>2017-07-19T07:07:20Z</dc:date>
    </item>
    <item>
      <title>Re: My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4650#M396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Some useful ones:&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. fw ctl pstat&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. cphaprob stat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jul 2017 07:26:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4650#M396</guid>
      <dc:creator>Jony_Fischbein</dc:creator>
      <dc:date>2017-07-19T07:26:34Z</dc:date>
    </item>
    <item>
      <title>Re: My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4651#M397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here some:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;fwaccel stats -s&amp;nbsp;&lt;BR /&gt;why? to check acceleration status on FW&lt;/LI&gt;&lt;LI&gt;cphaprob -a if&lt;BR /&gt;why? when troubleshooting cluster, i verify all interfaces are UP and the Virtual IP address for the cluster interfaces.&lt;/LI&gt;&lt;LI&gt;cpwd_admin list&lt;BR /&gt;why? great way to explain the CP watchdog- run the command with watch -d, and from another terminal terminate one of the PID, and observe how the watchdog bring it back.&lt;BR /&gt;and its also a great way to see that everything is up&lt;/LI&gt;&lt;/OL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jul 2017 07:32:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4651#M397</guid>
      <dc:creator>Daniel_Niazov</dc:creator>
      <dc:date>2017-07-19T07:32:33Z</dc:date>
    </item>
    <item>
      <title>Re: My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4652#M398</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;cphaprob stat&lt;/SPAN&gt;&lt;P class=""&gt;Cpview&lt;/P&gt;&lt;P class=""&gt;Top&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jul 2017 10:07:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4652#M398</guid>
      <dc:creator>aner_sagi</dc:creator>
      <dc:date>2017-07-19T10:07:22Z</dc:date>
    </item>
    <item>
      <title>Re: My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4653#M399</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Over 20 years, I've probably forgotten more CLI commands than I remember at this point &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;But here are a few of the ones I still use from time to time:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&lt;STRONG&gt;fw stat&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Shows what policy is loaded on the current gateway and what interfaces it has seen traffic on.&lt;/P&gt;&lt;P&gt;If it's DefaultFilter, then your gateway isn't running a real policy and is probably blocking all traffic &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P class="" style="padding-left: 30px;"&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;[Expert@oscar:0]# &lt;STRONG&gt;fw stat&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="" style="padding-left: 30px;"&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;HOST&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;POLICY &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;DATE &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="" style="padding-left: 30px;"&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;localhost IntFW&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;18Jul2017 19:11:16 :&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;[&amp;gt;eth0] [&amp;lt;eth0] [&amp;gt;eth1] [&amp;lt;eth1] [&amp;gt;eth2] [&amp;lt;eth2]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&lt;STRONG&gt;fw fetch &lt;EM&gt;mastername&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Fetches the policy&amp;nbsp;from the management station named mastername. You can also use localhost as a way to reload the previously installed policy on the gateway. Note this is not to be confused with &lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&lt;STRONG&gt;fw fetchlocal -d directory&lt;/STRONG&gt;&lt;/SPAN&gt; which is used in troubleshooting policy installation issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&lt;STRONG&gt;push_cert –s Cust_CMA –u admin –p adminpw –o examplegw –k test123&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;This is probably a command you haven't seen before and there's not even a public SK on it &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;It is used on the management to establish SIC with a newly installed security gateway without using SmartConsole or SmartDashboard, making it extremely useful in automation scenarios.&lt;/P&gt;&lt;P&gt;Arguments are as follows:&lt;/P&gt;&lt;P style="text-align: center;"&gt;&lt;/P&gt;&lt;TABLE class="j-table jiveBorder" style="border: 1px solid #c6c6c6; width: 75.9966%; margin-left: auto; margin-right: auto;"&gt;&lt;THEAD&gt;&lt;TR style="background-color: #efefef; height: 25px;"&gt;&lt;TH style="height: 25px; width: 17%;"&gt;Switch&lt;/TH&gt;&lt;TH style="height: 25px; width: 58.0611%;"&gt;Description&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY&gt;&lt;TR style="height: 25px;"&gt;&lt;TD style="height: 25px; width: 17%;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;–s Cust_CMA&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="height: 25px; width: 58.0611%;"&gt;Management or CMA IP/hostname (can be localhost)&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 25px;"&gt;&lt;TD style="height: 25px; width: 17%;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;–u admin&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="height: 25px; width: 58.0611%;"&gt;Username of admin user in SmartConsole/SmartDashboard&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 25px;"&gt;&lt;TD style="height: 25px; width: 17%;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;–p adminpw&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="height: 25px; width: 58.0611%;"&gt;Password of admin user specified above&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 25px;"&gt;&lt;TD style="height: 25px; width: 17%;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;–o examplegw&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="height: 25px; width: 58.0611%;"&gt;Name (in SmartConsole/SmartDashboard) of gateway to establish SIC with&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 25px;"&gt;&lt;TD style="height: 25px; width: 17%;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;–k test123&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="height: 25px; width: 58.0611%;"&gt;SIC one-time-password (should match what was specified on the gateway during first-time wizard)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P style="text-align: left;"&gt;&lt;BR /&gt;Looking forward to see what everyone else comes up with.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jul 2017 15:06:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4653#M399</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-07-19T15:06:57Z</dc:date>
    </item>
    <item>
      <title>Re: My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4654#M400</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;config_system - never having to use the FTW via web browser &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;any clish command - ability to completely script the configuration of an appliance&lt;/P&gt;&lt;P&gt;upgrade_export/ migrate export - best backup method - easiest to recover when you have it!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jul 2017 15:41:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4654#M400</guid>
      <dc:creator>Hugh_McGauran</dc:creator>
      <dc:date>2017-07-19T15:41:56Z</dc:date>
    </item>
    <item>
      <title>Re: My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4655#M401</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) cphaprob state / cphaprob -a if / cphaprob -l list&lt;/P&gt;&lt;P&gt;To view Cluster health status&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) cpview (with top)&lt;/P&gt;&lt;P&gt;To troubleshoot gateway performance (cpu, memory, connections,...)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) cpwd_admin list&lt;/P&gt;&lt;P&gt;To check the CP process status&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) fw ctl zdebug drop&amp;nbsp;&lt;/P&gt;&lt;P&gt;To search for any "silent" drop (such as IPS)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) fw monitor&amp;nbsp;&lt;/P&gt;&lt;P&gt;To do a live packet capture&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jul 2017 19:00:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4655#M401</guid>
      <dc:creator>Nader_Assi__Old</dc:creator>
      <dc:date>2017-07-19T19:00:29Z</dc:date>
    </item>
    <item>
      <title>Re: My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4656#M402</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. mgmt_cli show groups&amp;nbsp;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/show-groups~v1.1" title="https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/show-groups~v1.1"&gt;Check Point - Management API reference&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2. mgmt_cli add access-rule&amp;nbsp;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/add-access-rule~v1.1" title="https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/add-access-rule~v1.1"&gt;Check Point - Management API reference&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;3. mgmt_cli install-policy&amp;nbsp;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/install-policy~v1.1" title="https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/install-policy~v1.1"&gt;Check Point - Management API reference&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/laugh.png" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 05:30:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4656#M402</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2017-07-20T05:30:54Z</dc:date>
    </item>
    <item>
      <title>Re: My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4657#M403</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would expect you to pick management commands &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 05:51:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4657#M403</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-07-20T05:51:29Z</dc:date>
    </item>
    <item>
      <title>Re: My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4658#M404</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;Surprised no one picked 'cp_merge'&lt;/P&gt;&lt;P class=""&gt;And also though not a part of Gaia/splat&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;ofiller /odumper by Martin Hoz saved me precious hours in long nights&lt;/P&gt;&lt;P class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/people/valerdd022dbd-e3ef-33cc-ac9c-4ac6f9e1743d"&gt;Valeri Loukine&amp;nbsp;&lt;/A&gt;curious , what's yours ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 07:36:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4658#M404</guid>
      <dc:creator>Moti</dc:creator>
      <dc:date>2017-07-20T07:36:28Z</dc:date>
    </item>
    <item>
      <title>Re: My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4659#M405</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;fw ctl affinity -l -v -r&lt;/P&gt;&lt;P&gt;multik stat + cphaprob stat&lt;/P&gt;&lt;P&gt;cplic print&lt;/P&gt;&lt;P&gt;cpview&amp;nbsp;&lt;/P&gt;&lt;P&gt;fw ctl zdebug drop&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 08:22:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4659#M405</guid>
      <dc:creator>Peter_Sandkuijl</dc:creator>
      <dc:date>2017-07-20T08:22:50Z</dc:date>
    </item>
    <item>
      <title>Re: My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4660#M406</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;&lt;A _jive_internal="true" class="jive-link-profile-small jive_macro jive_macro_user" href="https://community.checkpoint.com/people/PSAND83534e26-73a4-3440-8480-c6cd6698258f"&gt;Peter Sandkuijl&amp;nbsp;&lt;/A&gt;what does the first one achieve?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 08:23:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4660#M406</guid>
      <dc:creator>Moti</dc:creator>
      <dc:date>2017-07-20T08:23:47Z</dc:date>
    </item>
    <item>
      <title>Re: My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4661#M407</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;fw ctl affinity -l -v -r is a useful command when you're attempting to finetune the affinity of an IRQ to an interface. This is especially useful when looking at the amount of traffic received by an interface that deserves more "horsepower" and should not be sharing CPU time with other interfaces. This command will list what interface is connected to what IRQ to what core. "fw ctl affinity -s" will subsequently allow you to set the values.&lt;/P&gt;&lt;P&gt;Note that Multi Queue enabled interfaces will not show up as they are assigned "automagically"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 08:28:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4661#M407</guid>
      <dc:creator>Peter_Sandkuijl</dc:creator>
      <dc:date>2017-07-20T08:28:39Z</dc:date>
    </item>
    <item>
      <title>Re: My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4662#M408</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;plus&lt;/P&gt;&lt;P&gt;netstat -ni - check drop on interfaces;&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;ps axwf -o pid,cpuid,pcpu,pmem,time,comm -&amp;nbsp;processes and daemons&amp;nbsp;utilization by&amp;nbsp;cpu-core, mem;&lt;/P&gt;&lt;P&gt;it's all for multicore performance tuning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;ak.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 11:34:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4662#M408</guid>
      <dc:creator>Andrejs__Андрей</dc:creator>
      <dc:date>2017-07-20T11:34:41Z</dc:date>
    </item>
    <item>
      <title>Re: My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4663#M409</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will prefer below commands.&lt;/P&gt;&lt;P&gt;fw ctl zdebug drop&lt;/P&gt;&lt;P&gt;cpview&lt;/P&gt;&lt;P&gt;fw tab -s -t&amp;nbsp;connections&lt;/P&gt;&lt;P&gt;fw ctl pstat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 14:08:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4663#M409</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2017-07-20T14:08:07Z</dc:date>
    </item>
    <item>
      <title>Re: My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4664#M410</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. cpstat mg - (SMS/CMA) Shows connected clients and status.&lt;BR /&gt;2. cpstat ha -f all - (GW) Shows sync details.&lt;BR /&gt;3. cpstat blades - (GW) Shows packets accepted, dropped, peak connections, and top rule hits.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 16:14:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4664#M410</guid>
      <dc:creator>Mark_Sowell</dc:creator>
      <dc:date>2017-07-20T16:14:43Z</dc:date>
    </item>
    <item>
      <title>Re: My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4665#M411</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would have to say:&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk30583"&gt;fwmon&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk100021&amp;amp;partition=Advanced&amp;amp;product=X-Series%22"&gt;tcpdump&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101878&amp;amp;partition=General&amp;amp;product=Security"&gt;cpview&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 16:32:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4665#M411</guid>
      <dc:creator>Kirsten_Turnbul</dc:creator>
      <dc:date>2017-07-20T16:32:52Z</dc:date>
    </item>
    <item>
      <title>Re: My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4666#M412</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This command allowed me to execute commands, transfer files etc with a remote gateway without needing credentials. &amp;nbsp;I was able to use it to copy a new shadow file to the remote gateway when password was lost/corrupted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cprid_util (--help)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 18:48:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4666#M412</guid>
      <dc:creator>Lon_Kaut</dc:creator>
      <dc:date>2017-07-20T18:48:48Z</dc:date>
    </item>
    <item>
      <title>Re: My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4667#M413</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) I created a "watch" command with many tecli commands to monitor TE (deployed on Cloud) live emulations:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="margin-bottom: 12.0pt;"&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;SPAN style="font-size: 9.0pt; color: #002060;"&gt;watch -d -n 1 "echo \_______________________;echo TE Engine Status:;echo \_______________________;tecli control status;tecli show statistics | grep -E '(engine version is)';echo;echo \_______________________;echo VM Cloud Images;echo \_______________________;tecli ca du al | grep -E '(Image UID)';echo;echo \_______________________;echo Live Cloud Queue:;echo \_______________________;tecli show cloud queue;echo;echo \_______________________;echo History Malicious:;echo \_______________________;echo;tecli ca du al | grep -E '(-----|sha1|malicious)';echo;echo \_______________________;echo TE Cloud Quota Stats:;echo \_______________________;tecli show statistics | grep -E '(day)';echo .......................................................................................................;tecli show statistics | grep -E '(Scanned files:|static analysis|local cache|cloud cache|cloud process time)';echo .......................................................................................................;echo;tecli show cloud quota| grep -E '(Quota identifier|Quota subscription:|Usage for gw:|Remain:|Exceeded:)'"&lt;/SPAN&gt;&lt;/BLOCKQUOTE&gt;&lt;/PRE&gt;&lt;P&gt;The outcome would be something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="57525" alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/57525_TEmonitor.png" style="width: 620px; height: 345px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) cpview&amp;nbsp;&lt;/P&gt;&lt;P&gt;Definitely, the most complete clish command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) fw monitor&lt;/P&gt;&lt;P&gt;Very helpful debugging tool.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 19:05:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4667#M413</guid>
      <dc:creator>Eduardo_Pereira</dc:creator>
      <dc:date>2017-07-20T19:05:08Z</dc:date>
    </item>
    <item>
      <title>Re: My Top 3 Check Point CLI commands</title>
      <link>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4668#M414</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lots of good ones so far, but just to be different the following commands are somewhat obscure but certainly come in handy occasionally (yes I'm well aware of the -f option for #1 and #2 but using it makes the commands take forever to execute):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) fw tab -u -t connections | awk '{ print $2 }' | sort -n | uniq -c | sort -nr | head -10&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;This will show the top ten source IPs hogging slots in the connection table in descending order, however you will need to manually convert the IP addresses displayed&amp;nbsp; from hex to decimal like so: 0a1e0b53 = 10.30.11.83. &amp;nbsp;&amp;nbsp; For the top 10 destinations, substitute $4 for $2 in the awk command above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) How many concurrent connections are currently using a particular Hide NAT address and how close are we to the 50k concurrent connection limit?&amp;nbsp; Going over the 50k limit causes the new traffic to be dropped and the infamous "NAT Hide failure - there are currently no available ports for hide operation" message. &lt;STRONG&gt;Edit: The 50k limit can be surpassed by setting up what I call a "many to fewer" NAT, see my post in the following thread:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://community.checkpoint.com/message/6516-r8010-hide-behind-many-question" target="_blank"&gt;https://community.checkpoint.com/message/6516-r8010-hide-behind-many-question&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assume the Hide NAT address in question is 203.0.113.1:&lt;BR /&gt; &lt;BR /&gt; &lt;SPAN class=""&gt;fw&lt;/SPAN&gt; &lt;SPAN class=""&gt;tab&lt;/SPAN&gt; -u &lt;SPAN class=""&gt;-t&lt;/SPAN&gt; &lt;SPAN class=""&gt;connections&lt;/SPAN&gt; | grep -ci cb007101&lt;BR /&gt; &lt;BR /&gt; Divide the number reported by 2, and you have your answer. The result must be divided by 2 because each post-NATted connection is represented by 2 flows, one outbound (c2s) and one inbound (s2c). Also the NAT IP address must be converted from the dotted quad format to hexadecimal as shown.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) show routed cluster-state detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An undocumented clish command introduced in R77.30 that shows a concise timeline of ClusterXL failover events in a single display.&amp;nbsp; Very handy when trying to correlate unexpected ClusterXL failovers to external network events, or trying to determine if unexplained failovers occur with any suspicious regularity that may point to the real culprit.&amp;nbsp; Definitely beats trying to pore through a sea of Control events (grey wrench icon) in the firewall logs!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; now available via &lt;A href="http://maxpowerfirewalls.com" target="_blank" rel="nofollow noopener noreferrer"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jun 2019 08:56:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/m-p/4668#M414</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-06-21T08:56:16Z</dc:date>
    </item>
  </channel>
</rss>

