- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
I need to see what firewall rules match some traffic. There are a lot of rules in my policy, accordingly, not all rules are logged. What kind of debug and which flags can I use for this purpose (except the flag "conn")? Or what method can I use for this purpose?
Not exactly what you want, but sort of ![]()
https://community.checkpoint.com/thread/5319-my-top-3-check-point-cli-commands#comment-14596
EDIT: Check this thread:
CPT - Check Point Packet Trace Utility ?
EDIT2:
And the winner is (hidden tool in R80):
Maybe this helps: sk85780 - How to use the 'connstat' utility
Unfortunately, no. Connstat we can use only for Windows. For Gaia we can use CPmonitor, but is not supported on a 64-bit based OS.
I do not understand - you can collect the table using
fw tab -t connections -u > /var/log/Connections_Table.txt
transfer it to the PC and run the utility with the relevant flags:
C:\> connStat.exe -f Name_of_Table_File.txt [-a|-c|-s|-r|-l|-p|-d|-n <number>] > Name_of_Output_File.txt
Also, CPMonitor 32bit limitation should not apply here.
Thanks for explanation, but it does not suit me, unfortunately.
I need to see what rule number match traffic with specific dst and src address.
Now i understand! This is all in the used connections table, but you must analyze it yourself, see sk65133: Connections Table Format
Not exactly what you want, but sort of ![]()
https://community.checkpoint.com/thread/5319-my-top-3-check-point-cli-commands#comment-14596
EDIT: Check this thread:
CPT - Check Point Packet Trace Utility ?
EDIT2:
And the winner is (hidden tool in R80):
fw up_execute is a winner, you are right)
Hello
The easy Way enable on Smart Console the Option Hit than you can see if the all the Policys are in use.
Alexander
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 5 | |
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 | |
| 2 |
Tue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceWed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactThu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY