TCPDUMP is a Linux tool which at times is not suitable for use with Gaia. Running TCPDUMP causes a significant increase in CPU usage and as a result impact the performance of the device. Even while filtering by specific interface or port still high CPU occurs. Check Point created a tool which works better with Gaia OS.
More interesting articles:
- R80.x Architecture and Performance Tuning - Link Collection
- Article list (Heiko Ankenbrand)
"CPPCAP" is a traffic capture tool which provides the most relevant outputs and is similar to Tcpdump. The tool is adjusted to Gaia operating system yet requires installation of an applicable RPM.
The good news! SecureXL can be enabled or disabled to capture with CPPCAP.
You can download this tool for R77.30, R80.10 and R80.20. Get more details here: sk141412
Instal and use:
- Download the RPM package (sk141412) and transfer the RPM package with winscp to appliance or open server.
- Install the RPM using the following command:
# rpm -ivh --force --nodeps <RPM_FILE>
# /etc/init.d/start_cppcap start
- Start cppcap to sniffing packages (for example on interface eth0 with parameter "N"):
On internal Interface (example "ping 220.127.116.11" from client IP 10.1.2.1 to server IP 18.104.22.168):
# cppcap -i eth0 -N |grep ICMP
On external Interface:
# cppcap -i eth2 -N |grep ICMP
- To have all verbos information add "-DNT" to the syntax to filter out specific interface or VS by using capital letters.
- It will provide outputs on ARP IPV4/IPV6, TCP and UDP traffic. Dynamic routing information will not show all verbose information.
In and out (see red marked point in picture):
In - Is the incoming packet on the firewall on the inbound interface from the point of view of the first packet. It is simalary to fw monitor inspection point "i" client to server packet.
Out - Is the outgoing packet on the firewall on the inbound interface from the point of view of the first packet. It is simalary to fw monitor inspection point "O" server to client packet.
On the outgoing interface (see blue marked point in picture), the view is exactly inverse.
| -vV VSID
|| lowercase to capture only from specific VSID, uppercase for all exec pt VSID
| -iI DEVICE
|| lowercase to capture only from specific DEVICE, uppercase for all execpt DEVICE
| -d DIR
|| capture specific direction ('in' for inbound, 'out' for outbound)
| -f "EXPR"
|| filter specific expression, for syntax, see pcap-filter(7)
| -o FILE
|| save capture to a FILE
| -c NUM
|| capture up to NUM bytes of frame (default 96, '0' for any size)
| -p NUM
|| capture NUM frames before stopping
| -b NUM
|| capture NUM bytes before stopping
|| verbose datalink layer
|| verbose network layer
|| verbose transport layer
|| omit time from output
➜ CCSM Elite, CCME, CCTE