<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Check Point Inspection points-iIoO in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-Inspection-points-iIoO/m-p/34940#M7348</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Chain points from your question for the first packet:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i &amp;nbsp; &amp;lt;NAT on client side&amp;gt; I o O&lt;/P&gt;&lt;P&gt;&lt;SPAN style="display: inline !important; float: none; background-color: #ffffff; color: #222222; font-family: 'Helvetica Neue',Helvetica,Arial,'Lucida Grande',sans-serif; font-size: 15px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"&gt;i &amp;nbsp; &amp;lt;Access-rule&amp;gt; I o O&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="display: inline !important; float: none; background-color: #ffffff; color: #222222; font-family: 'Helvetica Neue',Helvetica,Arial,'Lucida Grande',sans-serif; font-size: 15px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"&gt;i &amp;nbsp; &amp;lt;Anti-spoofing&amp;gt; I o O&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="display: inline !important; float: none; background-color: #ffffff; color: #222222; font-family: 'Helvetica Neue',Helvetica,Arial,'Lucida Grande',sans-serif; font-size: 15px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"&gt;i I &amp;lt;Routing&amp;gt; o O&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="display: inline !important; float: none; background-color: #ffffff; color: #222222; font-family: 'Helvetica Neue',Helvetica,Arial,'Lucida Grande',sans-serif; font-size: 15px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"&gt;i I o &amp;lt;NAT on server side&amp;gt; O&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use&amp;nbsp;sk98799:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The kernel is the bridge between the hardware and the OS. In the Check Point kernel, packets are inspected both in Inbound (ingress) and Outbound (egress) directions. Each direction has its own modules and order of inspection.&lt;/P&gt;&lt;P&gt;Handlers (INSPECT code) decide which modules will inspect the packet. The inspection operations in the Check Point kernel are divided into modules, and the modules are divided into chains. The number of chains on every Security Gateway is different. It depends on which blades/features are enabled on the Security Gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To debug kernel packets:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#&amp;nbsp;&lt;SPAN style="display: inline !important; float: none; background-color: transparent; color: #333333; font-family: 'Helvetica Neue',Helvetica,Arial,'Lucida Grande',sans-serif; font-size: 15px; font-style: normal; font-variant: normal; font-weight: bold; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"&gt;fw ctl chain&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;# &lt;STRONG&gt;fwaccel off&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;# &lt;STRONG&gt;fw monitor -p all -e "accept( &amp;gt;&amp;gt;&amp;gt;Filter &amp;lt;&amp;lt;&amp;lt;);"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Regards&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Heiko&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 12 Mar 2018 10:36:35 GMT</pubDate>
    <dc:creator>HeikoAnkenbrand</dc:creator>
    <dc:date>2018-03-12T10:36:35Z</dc:date>
    <item>
      <title>Check Point Inspection points-iIoO</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-Inspection-points-iIoO/m-p/34938#M7346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #222222; font-weight: 400;"&gt;&lt;STRONG&gt;Hi Experts, &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #222222; background-color: #ffffff; font-weight: 400;"&gt;Thank you all for helping us. Could you guys please assist on iIoO - Checkpoint Inspection points. Even Checkpoint doesn't provide much info (Shown below). Like where Anti-spoofing/Access-rule/NAT/Routing is applied @ each stage of iIoO. Please assist.&lt;/SPAN&gt;&lt;BR data-jive-statusinputadd="true" data-jive-truncation-flag="true" style="color: #222222; font-weight: 400;" /&gt;&lt;BR data-jive-statusinputadd="true" data-jive-truncation-flag="true" style="color: #222222; font-weight: 400;" /&gt;&lt;SPAN style="color: #222222; background-color: #ffffff; font-weight: 400;"&gt;&lt;IMG __jive_id="63826" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63826_pastedImage_1.png" style="width: 620px; height: 261px;" /&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Mar 2018 03:10:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-Inspection-points-iIoO/m-p/34938#M7346</guid>
      <dc:creator>SriNarasimha005</dc:creator>
      <dc:date>2018-03-12T03:10:54Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Inspection points-iIoO</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-Inspection-points-iIoO/m-p/34939#M7347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can see the exact order of operations on your gateway by typing &lt;STRONG&gt;fw ctl chain&lt;/STRONG&gt; on your gateway.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The exact options that will show will depend on what features are enabled.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in chain refers to what happens between "little i" and "big I".&lt;/P&gt;&lt;P&gt;out chain refers to what happens between "little o" and "big O".&lt;/P&gt;&lt;P&gt;fw is the access policy.&lt;/P&gt;&lt;P&gt;Anti-spoofing I believe is done as part of stateless verifications.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What happens after "big I" but before "little o"&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Destination NAT (If "Translate destination on client side" Global Property is set)&lt;/LI&gt;&lt;LI&gt;Routing&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;[Expert@R8010:0]# &lt;STRONG&gt;fw ctl chain&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;in chain (17):&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;0: -7ffffff0 (ffffffff8903d8d0) (00000001) tcpt inbound (tcp_tun)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;1: -7f800000 (ffffffff88877f40) (ffffffff) IP Options Strip (in) (ipopt_strip)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;2: - 2000000 (ffffffff89018bb0) (00000003) vpn decrypt (vpn)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;3: - 1fffffa (ffffffff89036620) (00000001) l2tp inbound (l2tp)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;4: - 1fffff8 (ffffffff88879790) (00000001) Stateless verifications (in) (asm)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;5: - 1fffff2 (ffffffff890586c0) (00000003) vpn tagging inbound (tagging)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;6: - 1fffff0 (ffffffff89017630) (00000003) vpn decrypt verify (vpn_ver)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;7: - 1000000 (ffffffff8895c0b0) (00000003) SecureXL conn sync (secxl_sync)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;8: &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;0 (ffffffff88814ac0) (00000001) fw VM inbound&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;(fw)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;9:&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;10 (ffffffff8882a790) (00000001) fw accounting inbound (acct)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;10: &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;2000000 (ffffffff89016bd0) (00000003) vpn policy inbound (vpn_pol)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;11:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;10000000 (ffffffff88959f40) (00000003) SecureXL inbound (secxl)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;12:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;21500000 (ffffffff8ad9b960) (00000001) RTM packet in (rtm)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;13:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7f600000 (ffffffff8886cf30) (00000001) fw SCV inbound (scv)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;14:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7f730000 (ffffffff88a8e6f0) (00000001) passive streaming (in) (pass_str)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;15:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7f750000 (ffffffff88cacfb0) (00000001) TCP streaming (in) (cpas)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;16:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7f800000 (ffffffff88878300) (ffffffff) IP Options Restore (in) (ipopt_res)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;out chain (17):&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;0: -7f800000 (ffffffff88877f40) (ffffffff) IP Options Strip (out) (ipopt_strip)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;1: - 1ffffff (ffffffff89015110) (00000003) vpn nat outbound (vpn_nat)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;2: - 1fffff0 (ffffffff88cad1f0) (00000001) TCP streaming (out) (cpas)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;3: - 1ffff50 (ffffffff88a8e6f0) (00000001) passive streaming (out) (pass_str)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;4: - 1ff0000 (ffffffff890586c0) (00000003) vpn tagging outbound (tagging)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;5: - 1f00000 (ffffffff88879790) (00000001) Stateless verifications (out) (asm)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;6: - &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;1ff (ffffffff88e78d50) (00000001) NAC Packet Outbound (nac_tag)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;7: &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;0 (ffffffff88814ac0) (00000001) fw VM outbound (fw)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;8: &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;2000000 (ffffffff890154e0) (00000003) vpn policy outbound (vpn_pol)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;9:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;10000000 (ffffffff88959f40) (00000003) SecureXL outbound (secxl)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;10:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;1ffffff0 (ffffffff89037350) (00000001) l2tp outbound (l2tp)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;11:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;20000000 (ffffffff89015d80) (00000003) vpn encrypt (vpn)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;12:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;24000000 (ffffffff8ad9b960) (00000001) RTM packet out (rtm)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;13:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;60000000 (ffffffff8903e0c0) (00000001) tcpt outbound (tcp_tun)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;14:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7f000000 (ffffffff8882a790) (00000001) fw accounting outbound (acct)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;15:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7f700000 (ffffffff88cad3e0) (00000001) TCP streaming post VM (cpas)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class="" style="font-family: 'courier new', courier, monospace;"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;16:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;7f800000 (ffffffff88878300) (ffffffff) IP Options Restore (out) (ipopt_res)&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Mar 2018 04:04:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-Inspection-points-iIoO/m-p/34939#M7347</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-03-12T04:04:23Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Inspection points-iIoO</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-Inspection-points-iIoO/m-p/34940#M7348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Chain points from your question for the first packet:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i &amp;nbsp; &amp;lt;NAT on client side&amp;gt; I o O&lt;/P&gt;&lt;P&gt;&lt;SPAN style="display: inline !important; float: none; background-color: #ffffff; color: #222222; font-family: 'Helvetica Neue',Helvetica,Arial,'Lucida Grande',sans-serif; font-size: 15px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"&gt;i &amp;nbsp; &amp;lt;Access-rule&amp;gt; I o O&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="display: inline !important; float: none; background-color: #ffffff; color: #222222; font-family: 'Helvetica Neue',Helvetica,Arial,'Lucida Grande',sans-serif; font-size: 15px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"&gt;i &amp;nbsp; &amp;lt;Anti-spoofing&amp;gt; I o O&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="display: inline !important; float: none; background-color: #ffffff; color: #222222; font-family: 'Helvetica Neue',Helvetica,Arial,'Lucida Grande',sans-serif; font-size: 15px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"&gt;i I &amp;lt;Routing&amp;gt; o O&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="display: inline !important; float: none; background-color: #ffffff; color: #222222; font-family: 'Helvetica Neue',Helvetica,Arial,'Lucida Grande',sans-serif; font-size: 15px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"&gt;i I o &amp;lt;NAT on server side&amp;gt; O&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use&amp;nbsp;sk98799:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The kernel is the bridge between the hardware and the OS. In the Check Point kernel, packets are inspected both in Inbound (ingress) and Outbound (egress) directions. Each direction has its own modules and order of inspection.&lt;/P&gt;&lt;P&gt;Handlers (INSPECT code) decide which modules will inspect the packet. The inspection operations in the Check Point kernel are divided into modules, and the modules are divided into chains. The number of chains on every Security Gateway is different. It depends on which blades/features are enabled on the Security Gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To debug kernel packets:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#&amp;nbsp;&lt;SPAN style="display: inline !important; float: none; background-color: transparent; color: #333333; font-family: 'Helvetica Neue',Helvetica,Arial,'Lucida Grande',sans-serif; font-size: 15px; font-style: normal; font-variant: normal; font-weight: bold; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"&gt;fw ctl chain&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;# &lt;STRONG&gt;fwaccel off&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;# &lt;STRONG&gt;fw monitor -p all -e "accept( &amp;gt;&amp;gt;&amp;gt;Filter &amp;lt;&amp;lt;&amp;lt;);"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Regards&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Heiko&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Mar 2018 10:36:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-Inspection-points-iIoO/m-p/34940#M7348</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-03-12T10:36:35Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Inspection points-iIoO</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-Inspection-points-iIoO/m-p/34941#M7349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Think of iIoO as different stages of processing on the firewall, but bear in mind that these four inspection/capture points are only relevant to traffic that is not accelerated at all and is going through the Firewall Path (F2F); this is what the command &lt;STRONG&gt;fw ctl chain&lt;/STRONG&gt; is showing.&amp;nbsp; Unaccelerated packets that are permitted through the firewall will cross all four capture points.&amp;nbsp; Traffic that is partially or fully accelerated (via the PXL or SXL paths, respectively) takes a "shorter" path across the firewall as shown in the diagram below excerpted from my book:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="63845" alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63845_Paths.png" style="width: 620px; height: 613px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not every Firewall Path operation below has its own dedicated chain module, and many of these operations occur inside the same chain module.&amp;nbsp; The vast majority of firewall security operations (and possible drops) happen on the inbound/client side of the firewall kernel between "i" and "I" such as:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Inbound Anti-spoofing&lt;/LI&gt;&lt;LI&gt;Geo Policy&lt;/LI&gt;&lt;LI&gt;HTTPS/VPN decryption&lt;/LI&gt;&lt;LI&gt;Connections state table lookups&lt;/LI&gt;&lt;LI&gt;Access Control policy layer evaluation&lt;/LI&gt;&lt;LI&gt;Destination IP NAT&lt;/LI&gt;&lt;LI&gt;Threat Prevention policy layer evaluation&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Between "I" and "o" the Gaia IP driver performs routing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Between "o" and "O" on the outbound/server side of the firewall kernel, the following types of operations occur:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Outbound Anti-spoofing&lt;/LI&gt;&lt;LI&gt;HTTPS/VPN encryption&lt;/LI&gt;&lt;LI&gt;Source IP NAT&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Obviously things get a lot more complicated if the traffic is accelerated; you can get a basic sense of how much traffic is accelerated on your firewall by running &lt;STRONG&gt;fwaccel stats -s&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Mar 2018 12:26:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-Inspection-points-iIoO/m-p/34941#M7349</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-03-12T12:26:17Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Inspection points-iIoO</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-Inspection-points-iIoO/m-p/34942#M7350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;In addition to iIoO we also have “e” and “E” with R80.10, which is discussed here:&amp;nbsp;&lt;A _jive_internal="true" href="https://community.checkpoint.com/thread/6176-fw-monitor-inspection-point-e-or-e"&gt;https://community.checkpoint.com/thread/6176-fw-monitor-inspection-point-e-or-e&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 15 Jul 2018 18:48:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-Inspection-points-iIoO/m-p/34942#M7350</guid>
      <dc:creator>RickHoppe</dc:creator>
      <dc:date>2018-07-15T18:48:46Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Inspection points-iIoO</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-Inspection-points-iIoO/m-p/34943#M7351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes.&amp;nbsp;&lt;SPAN style="display: inline !important; float: none; background-color: transparent; color: #333333; font-family: 'Helvetica Neue',Helvetica,Arial,'Lucida Grande',sans-serif; font-size: 15px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"&gt;“e” and “E”&lt;/SPAN&gt; comes in picture only when we monitor traffic flow of IPSEC VPN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2018 16:49:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-Inspection-points-iIoO/m-p/34943#M7351</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2018-07-16T16:49:34Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Inspection points-iIoO</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-Inspection-points-iIoO/m-p/63236#M12820</link>
      <description>&lt;P&gt;Hi Heiko,&lt;/P&gt;&lt;P&gt;Could you post fw monitor filters so I can capture &amp;amp; see all inspection points.&lt;/P&gt;&lt;P&gt;My goal is to capture traffic across the firewall with fw monitor and find all inspection points.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2019 09:09:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-Inspection-points-iIoO/m-p/63236#M12820</guid>
      <dc:creator>s_milidrag</dc:creator>
      <dc:date>2019-09-20T09:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Inspection points-iIoO</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-Inspection-points-iIoO/m-p/63261#M12830</link>
      <description>&lt;P&gt;You can see all the new inspection points in R80.20+ here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Enterprise-Appliances-and-Gaia/R80-20-New-FW-Monitor-inspection-points/m-p/17526" target="_blank"&gt;https://community.checkpoint.com/t5/Enterprise-Appliances-and-Gaia/R80-20-New-FW-Monitor-inspection-points/m-p/17526&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If you use the option &lt;STRONG&gt;-p all&lt;/STRONG&gt; with fw monitor it will capture a matched packet every time it transits from one chain module to another; on a typical firewall a single accepted packet will be displayed at least 20 times, so make sure you apply a very tight and specific filter to traffic that you are trying to capture in this fashion.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2019 14:03:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-Inspection-points-iIoO/m-p/63261#M12830</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-09-20T14:03:06Z</dc:date>
    </item>
  </channel>
</rss>

