<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What is 'IN' and 'OUT' of g_tcpdump? in Hyperscale Firewall (Maestro)</title>
    <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/What-is-IN-and-OUT-of-g-tcpdump/m-p/19946#M1929</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;g_tcpdump&lt;/STRONG&gt; can indeed be a little confusing since it shows the packet from all SGMs and the same packet can be seen several times especially if there is correction.&lt;/P&gt;&lt;P&gt;Better way to use tcpdump in scalable platforms is to find the traffic flow by using &lt;STRONG&gt;asg search&lt;/STRONG&gt; and then taking tcpdump locally on the SGM shown by asg search.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 23 Aug 2018 02:09:45 GMT</pubDate>
    <dc:creator>Lari_Luoma</dc:creator>
    <dc:date>2018-08-23T02:09:45Z</dc:date>
    <item>
      <title>What is 'IN' and 'OUT' of g_tcpdump?</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/What-is-IN-and-OUT-of-g-tcpdump/m-p/19942#M1925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was asked to capture some packets:&lt;/P&gt;&lt;P&gt;g_tcpdump -enni any host 1.1.1.1 and 2.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;P&gt;[1_04]10:33:23.330521&amp;nbsp; In aa:aa:aa:aa:aa:aa ethertype IPv4 (0x0800), length 76: 2.2.2.2.42814 &amp;gt; 1.1.1.1.25: S 2726345066:2726345066(0) win 29200 &amp;lt;mss 1376,sackOK,timestamp 1052353694 0,nop,wscale 7&amp;gt; &lt;BR /&gt;[1_04]10:33:23.331136 Out bb:bb:bb:bb:bb:bb ethertype IPv4 (0x0800), length 76: 2.2.2.2.42814 &amp;gt; 1.1.1.1.25: S 2726345066:2726345066(0) win 29200 &amp;lt;mss 1376,sackOK,timestamp 1052353694 0,nop,wscale 7&amp;gt; &lt;BR /&gt;[1_04]10:33:23.331141 Out bb:bb:bb:bb:bb:bb ethertype IPv4 (0x0800), length 76: 2.2.2.2.42814 &amp;gt; 1.1.1.1.25: S 2726345066:2726345066(0) win 29200 &amp;lt;mss 1376,sackOK,timestamp 1052353694 0,nop,wscale 7&amp;gt; &lt;BR /&gt;[1_04]10:33:23.331142 Out bb:bb:bb:bb:bb:bb ethertype IPv4 (0x0800), length 76: 2.2.2.2.42814 &amp;gt; 1.1.1.1.25: S 2726345066:2726345066(0) win 29200 &amp;lt;mss 1376,sackOK,timestamp 1052353694 0,nop,wscale 7&amp;gt; &lt;BR /&gt;[1_04]10:33:23.376815&amp;nbsp; In aa:aa:aa:aa:aa:aa ethertype IPv4 (0x0800), length 76: 1.1.1.1.25 &amp;gt; 2.2.2.2.42814: S 316929424:316929424(0) ack 2726345067 win 8192 &amp;lt;mss 1460,nop,wscale 8,sackOK,timestamp 3937627326 1052353694&amp;gt; &lt;BR /&gt;[1_04]10:33:23.376841 Out bb:bb:bb:bb:bb:bb ethertype IPv4 (0x0800), length 76: 1.1.1.1.25 &amp;gt; 2.2.2.2.42814: S 316929424:316929424(0) ack 2726345067 win 8192 &amp;lt;mss 1460,nop,wscale 8,sackOK,timestamp 3937627326 1052353694&amp;gt; &lt;BR /&gt;[1_03]10:33:23.376140&amp;nbsp; In aa:aa:aa:aa:aa:aa ethertype IPv4 (0x0800), length 76: 1.1.1.1.25 &amp;gt; 2.2.2.2.42814: S 316929424:316929424(0) ack 2726345067 win 8192 &amp;lt;mss 1460,nop,wscale 8,sackOK,timestamp 3937627326 1052353694&amp;gt; &lt;BR /&gt;[1_03]10:33:23.376233 Out aa:aa:aa:aa:aa:aa ethertype IPv4 (0x0800), length 76: 1.1.1.1.25 &amp;gt; 2.2.2.2.42814: S 316929424:316929424(0) ack 2726345067 win 8192 &amp;lt;mss 1460,nop,wscale 8,sackOK,timestamp 3937627326 1052353694&amp;gt; &lt;BR /&gt;[1_03]10:33:23.376253 Out aa:aa:aa:aa:aa:aa ethertype IPv4 (0x0800), length 76: 1.1.1.1.25 &amp;gt; 2.2.2.2.42814: S 316929424:316929424(0) ack 2726345067 win 8192 &amp;lt;mss 1460,nop,wscale 8,sackOK,timestamp 3937627326 1052353694&amp;gt; &lt;BR /&gt;[1_04]10:33:23.376842 Out bb:bb:bb:bb:bb:bb ethertype IPv4 (0x0800), length 76: 1.1.1.1.25 &amp;gt; 2.2.2.2.42814: S 316929424:316929424(0) ack 2726345067 win 8192 &amp;lt;mss 1460,nop,wscale 8,sackOK,timestamp 3937627326 1052353694&amp;gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;What exactly does 'IN' and 'OUT' mean?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I first suggested that it has something to do with an Interface, but then I saw that every combination between MAC and IN/OUT exists. Furthermore, no interface is displayed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any idea?&lt;/P&gt;&lt;P&gt;My internet search didn't work with IN/OUT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Maurice&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2018 06:41:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/What-is-IN-and-OUT-of-g-tcpdump/m-p/19942#M1925</guid>
      <dc:creator>morris</dc:creator>
      <dc:date>2018-08-17T06:41:33Z</dc:date>
    </item>
    <item>
      <title>Re: What is 'IN' and 'OUT' of g_tcpdump?</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/What-is-IN-and-OUT-of-g-tcpdump/m-p/19943#M1926</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Maurice,&amp;nbsp;&lt;/P&gt;&lt;P&gt;the output shows you the same packet twice, inbound and outbound directions, which are marked accordingly: IN and OUT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2018 08:14:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/What-is-IN-and-OUT-of-g-tcpdump/m-p/19943#M1926</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-08-17T08:14:35Z</dc:date>
    </item>
    <item>
      <title>Re: What is 'IN' and 'OUT' of g_tcpdump?</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/What-is-IN-and-OUT-of-g-tcpdump/m-p/19944#M1927</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Valeri,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you for your answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a result, the sum of IN and OUT should be the same? But this is not the case.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2018 08:32:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/What-is-IN-and-OUT-of-g-tcpdump/m-p/19944#M1927</guid>
      <dc:creator>morris</dc:creator>
      <dc:date>2018-08-17T08:32:38Z</dc:date>
    </item>
    <item>
      <title>Re: What is 'IN' and 'OUT' of g_tcpdump?</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/What-is-IN-and-OUT-of-g-tcpdump/m-p/19945#M1928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What do you mean, "the sum"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here for example it is a single packet being forwarded:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[1_04]10:33:23.330521&amp;nbsp; In aa:aa:aa:aa:aa:aa ethertype IPv4 (0x0800), length 76: 2.2.2.2.42814 &amp;gt; 1.1.1.1.25: S 2726345066:2726345066(0) win 29200 &amp;lt;mss 1376,sackOK,timestamp 1052353694 0,nop,wscale 7&amp;gt;&amp;nbsp;&lt;BR /&gt;[1_04]10:33:23.331136 Out bb:bb:bb:bb:bb:bb ethertype IPv4 (0x0800), length 76: 2.2.2.2.42814 &amp;gt; 1.1.1.1.25: S 2726345066:2726345066(0) win 29200 &amp;lt;mss 1376,sackOK,timestamp 1052353694 0,nop,wscale 7&amp;gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If, however, packets are being dropped, you will see IN but not OUT. If there is NAT performed, packets will look differently on IN and OUT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is all normal. I am not sure what you are trying to achive with this command, but if you are interested in troubleshooting FW operations, fw monitor is advised, tcpdump is a bit less informative.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2018 10:14:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/What-is-IN-and-OUT-of-g-tcpdump/m-p/19945#M1928</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-08-17T10:14:26Z</dc:date>
    </item>
    <item>
      <title>Re: What is 'IN' and 'OUT' of g_tcpdump?</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/What-is-IN-and-OUT-of-g-tcpdump/m-p/19946#M1929</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;g_tcpdump&lt;/STRONG&gt; can indeed be a little confusing since it shows the packet from all SGMs and the same packet can be seen several times especially if there is correction.&lt;/P&gt;&lt;P&gt;Better way to use tcpdump in scalable platforms is to find the traffic flow by using &lt;STRONG&gt;asg search&lt;/STRONG&gt; and then taking tcpdump locally on the SGM shown by asg search.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2018 02:09:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/What-is-IN-and-OUT-of-g-tcpdump/m-p/19946#M1929</guid>
      <dc:creator>Lari_Luoma</dc:creator>
      <dc:date>2018-08-23T02:09:45Z</dc:date>
    </item>
    <item>
      <title>Re: What is 'IN' and 'OUT' of g_tcpdump?</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/What-is-IN-and-OUT-of-g-tcpdump/m-p/19947#M1930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Hi Maurice,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #333333;"&gt;IN/OUT&amp;nbsp;is showing direction of the packet for current&amp;nbsp;interface. You can see the packet few time&amp;nbsp;&lt;SPAN style="caret-color: #333333;"&gt;because it passes few virtual&amp;nbsp;&lt;SPAN style="background-color: #ffffff;"&gt;interfaces. Please add "-P" flag to&amp;nbsp;g_tcpdump to see interface name in the output: "&lt;SPAN&gt;g_tcpdump -Penni any host 1.1.1.1&lt;/SPAN&gt;"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Sep 2018 21:17:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/What-is-IN-and-OUT-of-g-tcpdump/m-p/19947#M1930</guid>
      <dc:creator>AndyY</dc:creator>
      <dc:date>2018-09-27T21:17:43Z</dc:date>
    </item>
  </channel>
</rss>

