<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Quantum Spark - how to monitor traffic inside a switch interface ? in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-how-to-monitor-traffic-inside-a-switch-interface/m-p/250371#M12759</link>
    <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="lan2lan.PNG" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30657i2C4396D5B74550F9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="lan2lan.PNG" alt="lan2lan.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I checked this only with tcpdump before - there was nothing.&lt;BR /&gt;But why not checking it with fw monitor as well (I expect nothing more &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; ).&lt;/P&gt;&lt;P&gt;So here you have it:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;C:\Users\marcyn&amp;gt;ping 10.99.99.2

Pinging 10.99.99.2 with 32 bytes of data:
Reply from 10.99.99.2: bytes=32 time&amp;lt;1ms TTL=64
Reply from 10.99.99.2: bytes=32 time&amp;lt;1ms TTL=64
Reply from 10.99.99.2: bytes=32 time&amp;lt;1ms TTL=64
Reply from 10.99.99.2: bytes=32 time&amp;lt;1ms TTL=64

[Expert@Spark1570]# fw monitor -F "10.99.99.1,0,10.99.99.2,0,1" -F "10.99.99.2,0,10.99.99.1,0,1"
(...)
 fw: monitoring (control-C to stop)
PPAK 0: Get before set operation succeeded of fwmonitormaxpacket
PPAK 0: Get before set operation succeeded of fwmonitormask
PPAK 0: Get before set operation succeeded of fwmonitorallocbufs
PPAK 0: Get before set operation succeeded of printuuid
PPAK 0: Get before set operation succeeded of fwmonitor_kiss_enable

(nothing ... as expected)


The same test between different networks:

[Expert@Spark1570]# fw monitor -F "10.98.98.3,0,10.99.99.2,0,1" -F "10.99.99.2,0,10.98.98.3,0,1"
(...)
 fw: monitoring (control-C to stop)
PPAK 0: Get before set operation succeeded of fwmonitormaxpacket
PPAK 0: Get before set operation succeeded of fwmonitormask
PPAK 0: Get before set operation succeeded of fwmonitorallocbufs
PPAK 0: Get before set operation succeeded of printuuid
PPAK 0: Get before set operation succeeded of fwmonitor_kiss_enable
[vs_0][ppak_0] wlan0:i[44]: 10.98.98.3 -&amp;gt; 10.99.99.2 (ICMP) len=84 id=54008
ICMP: type=8 code=0 echo request id=17 seq=1
[vs_0][fw_1] wlan0:i[44]: 10.98.98.3 -&amp;gt; 10.99.99.2 (ICMP) len=84 id=54008
ICMP: type=8 code=0 echo request id=17 seq=1
[vs_0][fw_1] wlan0:I[44]: 10.98.98.3 -&amp;gt; 10.99.99.2 (ICMP) len=84 id=54008
ICMP: type=8 code=0 echo request id=17 seq=1
[vs_0][ppak_0] br0:i[44]: 10.98.98.3 -&amp;gt; 10.99.99.2 (ICMP) len=84 id=54008
ICMP: type=8 code=0 echo request id=17 seq=1
[vs_0][fw_1] LAN1:o[44]: 10.98.98.3 -&amp;gt; 10.99.99.2 (ICMP) len=84 id=54008
ICMP: type=8 code=0 echo request id=17 seq=1
[vs_0][fw_1] LAN1:O[44]: 10.98.98.3 -&amp;gt; 10.99.99.2 (ICMP) len=84 id=54008
ICMP: type=8 code=0 echo request id=17 seq=1
[vs_0][ppak_0] LAN1:i[44]: 10.99.99.2 -&amp;gt; 10.98.98.3 (ICMP) len=84 id=10860
ICMP: type=0 code=0 echo reply id=17 seq=1
[vs_0][fw_1] LAN1:i[44]: 10.99.99.2 -&amp;gt; 10.98.98.3 (ICMP) len=84 id=10860
ICMP: type=0 code=0 echo reply id=17 seq=1
[vs_0][fw_1] LAN1:I[44]: 10.99.99.2 -&amp;gt; 10.98.98.3 (ICMP) len=84 id=10860
ICMP: type=0 code=0 echo reply id=17 seq=1
[vs_0][fw_1] wlan0:o[44]: 10.99.99.2 -&amp;gt; 10.98.98.3 (ICMP) len=84 id=10860
ICMP: type=0 code=0 echo reply id=17 seq=1
[vs_0][fw_1] wlan0:O[44]: 10.99.99.2 -&amp;gt; 10.98.98.3 (ICMP) len=84 id=10860
ICMP: type=0 code=0 echo reply id=17 seq=1&lt;/LI-CODE&gt;&lt;P&gt;As you can see above - with different networks I have perfect request and reply &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;br,&lt;BR /&gt;m.&lt;/P&gt;</description>
    <pubDate>Mon, 02 Jun 2025 15:00:22 GMT</pubDate>
    <dc:creator>marcyn</dc:creator>
    <dc:date>2025-06-02T15:00:22Z</dc:date>
    <item>
      <title>Quantum Spark - how to monitor traffic inside a switch interface ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-how-to-monitor-traffic-inside-a-switch-interface/m-p/250256#M12748</link>
      <description>&lt;P&gt;Hi Checkmates,&lt;/P&gt;&lt;P&gt;Today I faced ... a problem ... that suprized me.&lt;BR /&gt;I wanted to monitor traffic inside a switch interface on Spark ... and to my surprise I was not able to do it.&lt;/P&gt;&lt;P&gt;I have a LAN1_Switch interface that contains LAN1-LAN8 interfaces - this is 1570 model, but I believe it will work the same on other models as well.&lt;/P&gt;&lt;P&gt;Spark side:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Spark1570&amp;gt; show interfaces
name: LAN1_Switch
ipv4-address: 10.99.99.254&lt;/LI-CODE&gt;&lt;P&gt;(mask /24)&lt;/P&gt;&lt;P&gt;Client1 connected to LAN1 port:&lt;BR /&gt;10.99.99.1&lt;/P&gt;&lt;P&gt;Client2 connected to LAN2 port:&lt;BR /&gt;10.99.99.2&lt;/P&gt;&lt;P&gt;So both clients are of course inside the same network, but traffic from one to another has to go via Spark's switch interface.&lt;BR /&gt;Because of that I expected that I will see this traffic for example in tcpdump or fw monitor.&lt;BR /&gt;To my surprise there is nothing - only arp who-has messages.&lt;/P&gt;&lt;P&gt;Let's see an easy example:&lt;/P&gt;&lt;P&gt;On client1:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;root@black:/mnt/c/Users/marcyn# ping 10.99.99.2
PING 10.99.99.2 (10.99.99.2) 56(84) bytes of data.
64 bytes from 10.99.99.2: icmp_seq=1 ttl=64 time=0.691 ms
64 bytes from 10.99.99.2: icmp_seq=2 ttl=64 time=0.427 ms
^C
--- 10.99.99.2 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 1000ms
rtt min/avg/max/mdev = 0.427/0.559/0.691/0.132 ms

root@black:/mnt/c/Users/marcyn# telnet 10.99.99.2 80
Trying 10.99.99.2...
Connected to 10.99.99.2.
Escape character is '^]'.
^]

telnet&amp;gt; quit
Connection closed.
root@black:/mnt/c/Users/marcyn#&lt;/LI-CODE&gt;&lt;P&gt;And how does it look like on Spark ? - tcpdump in this example:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[Expert@Spark1570]# tcpdump -nnei any host \(10.99.99.1 or 10.99.99.2\) and \(icmp or port 80\)
tcpdump: data link type LINUX_SLL2
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes


(nothing ...
in case there would be no arp entries for 10.99.99.1 or 10.99.99.2 yet ... I would see here arp who-has messages)

&lt;/LI-CODE&gt;&lt;P&gt;So ... how to monitor traffic inside a switch ?&lt;BR /&gt;There has to be some way ... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Have you faced this "issue" before and know the solution ?&lt;/P&gt;&lt;P&gt;BTW&lt;BR /&gt;Of course there is absolutely no problem at all with monitoring traffic from one interface to another if they are not inside a switch.&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;Best&lt;BR /&gt;m.&lt;/P&gt;</description>
      <pubDate>Fri, 30 May 2025 19:11:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-how-to-monitor-traffic-inside-a-switch-interface/m-p/250256#M12748</guid>
      <dc:creator>marcyn</dc:creator>
      <dc:date>2025-05-30T19:11:43Z</dc:date>
    </item>
    <item>
      <title>Re: Quantum Spark - how to monitor traffic inside a switch interface ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-how-to-monitor-traffic-inside-a-switch-interface/m-p/250272#M12749</link>
      <description>&lt;P&gt;There is a hardware-level switch involved on the Quantum Spark appliances.&lt;BR /&gt;That traffic isn't typically inspected, but you can enable this function (with a performance impact):&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 974px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30655iCFBDA70C3F0BB0A6/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 May 2025 21:47:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-how-to-monitor-traffic-inside-a-switch-interface/m-p/250272#M12749</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-05-30T21:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: Quantum Spark - how to monitor traffic inside a switch interface ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-how-to-monitor-traffic-inside-a-switch-interface/m-p/250273#M12750</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Thank your for your reply.&lt;BR /&gt;I admit that I completely forgot to take a look at Advanced Settings ... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Unfortunately this option that you mentioned, and also some other that I checked (ex. "&lt;SPAN&gt;OS advanced settings - Enable flow-control for network&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;switch") ... doesn't change the situation.&lt;BR /&gt;I still see no packets that go from one interface to another inside a switch.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;But as you mentioned as it is a hardware switch ... it seems that I will not achieve this goal.&lt;BR /&gt;Why I want that, you may ask ... there can be a lot of reasons, for example to just see traffic flow in logs (not neccessary to inspect this traffic, but just to have better visibility of this traffic).&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;Best&lt;BR /&gt;m.&lt;/P&gt;</description>
      <pubDate>Fri, 30 May 2025 22:34:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-how-to-monitor-traffic-inside-a-switch-interface/m-p/250273#M12750</guid>
      <dc:creator>marcyn</dc:creator>
      <dc:date>2025-05-30T22:34:57Z</dc:date>
    </item>
    <item>
      <title>Re: Quantum Spark - how to monitor traffic inside a switch interface ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-how-to-monitor-traffic-inside-a-switch-interface/m-p/250364#M12758</link>
      <description>&lt;P&gt;I completely understand the need/desire for this &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;Did you try using fw monitor to check this traffic after enabling this option?&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jun 2025 13:46:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-how-to-monitor-traffic-inside-a-switch-interface/m-p/250364#M12758</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-06-02T13:46:29Z</dc:date>
    </item>
    <item>
      <title>Re: Quantum Spark - how to monitor traffic inside a switch interface ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-how-to-monitor-traffic-inside-a-switch-interface/m-p/250371#M12759</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="lan2lan.PNG" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30657i2C4396D5B74550F9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="lan2lan.PNG" alt="lan2lan.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I checked this only with tcpdump before - there was nothing.&lt;BR /&gt;But why not checking it with fw monitor as well (I expect nothing more &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; ).&lt;/P&gt;&lt;P&gt;So here you have it:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;C:\Users\marcyn&amp;gt;ping 10.99.99.2

Pinging 10.99.99.2 with 32 bytes of data:
Reply from 10.99.99.2: bytes=32 time&amp;lt;1ms TTL=64
Reply from 10.99.99.2: bytes=32 time&amp;lt;1ms TTL=64
Reply from 10.99.99.2: bytes=32 time&amp;lt;1ms TTL=64
Reply from 10.99.99.2: bytes=32 time&amp;lt;1ms TTL=64

[Expert@Spark1570]# fw monitor -F "10.99.99.1,0,10.99.99.2,0,1" -F "10.99.99.2,0,10.99.99.1,0,1"
(...)
 fw: monitoring (control-C to stop)
PPAK 0: Get before set operation succeeded of fwmonitormaxpacket
PPAK 0: Get before set operation succeeded of fwmonitormask
PPAK 0: Get before set operation succeeded of fwmonitorallocbufs
PPAK 0: Get before set operation succeeded of printuuid
PPAK 0: Get before set operation succeeded of fwmonitor_kiss_enable

(nothing ... as expected)


The same test between different networks:

[Expert@Spark1570]# fw monitor -F "10.98.98.3,0,10.99.99.2,0,1" -F "10.99.99.2,0,10.98.98.3,0,1"
(...)
 fw: monitoring (control-C to stop)
PPAK 0: Get before set operation succeeded of fwmonitormaxpacket
PPAK 0: Get before set operation succeeded of fwmonitormask
PPAK 0: Get before set operation succeeded of fwmonitorallocbufs
PPAK 0: Get before set operation succeeded of printuuid
PPAK 0: Get before set operation succeeded of fwmonitor_kiss_enable
[vs_0][ppak_0] wlan0:i[44]: 10.98.98.3 -&amp;gt; 10.99.99.2 (ICMP) len=84 id=54008
ICMP: type=8 code=0 echo request id=17 seq=1
[vs_0][fw_1] wlan0:i[44]: 10.98.98.3 -&amp;gt; 10.99.99.2 (ICMP) len=84 id=54008
ICMP: type=8 code=0 echo request id=17 seq=1
[vs_0][fw_1] wlan0:I[44]: 10.98.98.3 -&amp;gt; 10.99.99.2 (ICMP) len=84 id=54008
ICMP: type=8 code=0 echo request id=17 seq=1
[vs_0][ppak_0] br0:i[44]: 10.98.98.3 -&amp;gt; 10.99.99.2 (ICMP) len=84 id=54008
ICMP: type=8 code=0 echo request id=17 seq=1
[vs_0][fw_1] LAN1:o[44]: 10.98.98.3 -&amp;gt; 10.99.99.2 (ICMP) len=84 id=54008
ICMP: type=8 code=0 echo request id=17 seq=1
[vs_0][fw_1] LAN1:O[44]: 10.98.98.3 -&amp;gt; 10.99.99.2 (ICMP) len=84 id=54008
ICMP: type=8 code=0 echo request id=17 seq=1
[vs_0][ppak_0] LAN1:i[44]: 10.99.99.2 -&amp;gt; 10.98.98.3 (ICMP) len=84 id=10860
ICMP: type=0 code=0 echo reply id=17 seq=1
[vs_0][fw_1] LAN1:i[44]: 10.99.99.2 -&amp;gt; 10.98.98.3 (ICMP) len=84 id=10860
ICMP: type=0 code=0 echo reply id=17 seq=1
[vs_0][fw_1] LAN1:I[44]: 10.99.99.2 -&amp;gt; 10.98.98.3 (ICMP) len=84 id=10860
ICMP: type=0 code=0 echo reply id=17 seq=1
[vs_0][fw_1] wlan0:o[44]: 10.99.99.2 -&amp;gt; 10.98.98.3 (ICMP) len=84 id=10860
ICMP: type=0 code=0 echo reply id=17 seq=1
[vs_0][fw_1] wlan0:O[44]: 10.99.99.2 -&amp;gt; 10.98.98.3 (ICMP) len=84 id=10860
ICMP: type=0 code=0 echo reply id=17 seq=1&lt;/LI-CODE&gt;&lt;P&gt;As you can see above - with different networks I have perfect request and reply &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;br,&lt;BR /&gt;m.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jun 2025 15:00:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-how-to-monitor-traffic-inside-a-switch-interface/m-p/250371#M12759</guid>
      <dc:creator>marcyn</dc:creator>
      <dc:date>2025-06-02T15:00:22Z</dc:date>
    </item>
    <item>
      <title>Re: Quantum Spark - how to monitor traffic inside a switch interface ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-how-to-monitor-traffic-inside-a-switch-interface/m-p/250377#M12760</link>
      <description>&lt;P&gt;It was worth a try.&lt;BR /&gt;However, it does make me wonder how that Advanced option works...or if it still does.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jun 2025 18:44:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-how-to-monitor-traffic-inside-a-switch-interface/m-p/250377#M12760</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-06-02T18:44:25Z</dc:date>
    </item>
    <item>
      <title>Re: Quantum Spark - how to monitor traffic inside a switch interface ?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-how-to-monitor-traffic-inside-a-switch-interface/m-p/250379#M12761</link>
      <description>&lt;P&gt;To be honest ... the same from my side &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;I was thinking that maybe it works as the name suggests .... so if enabled it will inspect traffic from LAN 2 LAN ... but no, it's not working like that.&lt;BR /&gt;Simple example gave this answer - rule on top of incoming rules (local management) where source and destination is 10.99.99.0/255.255.255.0, service is icmp and action is block.&lt;BR /&gt;With such a rule if we will have inspection between LAN and LAN ... it should block ping.&lt;BR /&gt;Of course ping is working.&lt;/P&gt;&lt;P&gt;Sure, this example had no sense at all ... because if there is no visible traffic in tcpdump/fw monitor between host in this network ... such a rule will just be nonsense .... but as you wrote "It was worth a try" &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;To to summarize this discussion - it looks like there is no way ... and I have to accept this that this is hardware switch and period &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;But still .... too bad ...&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;BR,&lt;BR /&gt;m.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jun 2025 19:30:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Quantum-Spark-how-to-monitor-traffic-inside-a-switch-interface/m-p/250379#M12761</guid>
      <dc:creator>marcyn</dc:creator>
      <dc:date>2025-06-02T19:30:37Z</dc:date>
    </item>
  </channel>
</rss>

