- Products
- Learn
- Local User Groups
- Partners
- More
Ink Dragon: A Major Nation-State Campaign
Watch HereAI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
The Great Exposure Reset
AI Security Masters E4:
Introducing Cyata, Securing the Agentic AI Era
CheckMates Go:
CheckMates Fest
I see just too much of "fw ctl zdebug..." flying around these days. To explain my issue with this practice, I have posted an entry in my blog:
https://checkpoint-master-architect.blogspot.ch/2017/11/kernel-debug-best-practices-or-why-fw.html
Feel free to read and comment
debug kernel_debug best practices
So in theory if there was ‘fw ctl lzdebug’ (“l” for Loukine) macro , what would u have it do ?
Do not get me wrong, as internal R&D tool, zdebug is just fine. My problem is that you guys do not discourage using it on the field and even post SK articles of HOWTO kind to promote it.
My issues are:
Fixing the buffer is no brainer, Tamir could fix it with a blink of an eye. The other two points are a bit more tricky. Ideally, if you really want CP users to run debug in production (which is questionable by itself), do a GUI based tool. Because, if you don't someone else will. Actually, there is already something for the matter: Check Point debugging GUI
Valeri Loukine wrote:
Ideally, if you really want CP users to run debug in production (which is questionable by itself), do a GUI based tool.
like Packet-Mode search and SmartLog search?
When I think about it, yes. SmartConsole extension with particular limited kernel debug abilities would be an ideal solution. You can call it ldebug, where L stands for "light"
so can we open this discussion to at which cases would you choose to kernel debug rather than search a log or a matched rule? just rules with Track=none or other cases?
There is not much to discuss. kernel debug should be only employed when other means of troubleshooting, mentioned above included, are exhausted. This is my main personal issue with zdebug: people use it instead of other means to find their config errors.
However, there are troubleshooting scenarios, where log and policy search may not produce conclusive results, if any. In these cases kernel debug, if performed in educated and controlled manner, might help
So what you're saying is you're against the idea of putting fw ctl zdebug on a t-shirt ![]()
As part of wider subject, yes. why should check point promote a debug command in the first place, I might ask? Some people say, a good product does not need to be debugged on the field after being released to GA 🙂
I'd much rather see this T-Shirt instead

I guess it has more to do with the Geek factor.
You are not debugging the product - you are debugging traffic.
You are not promoting the debug command but the tool to check issues - and having this visibility is what makes a tool good.
In my opinion you are "apple-ing" all your customers and considering them to be morons that can only use GUI. This is the same approach as thinking that eliminating expert mode is a good idea , etc. (where it's one of the only product that still allows scripting and complex custom customer commands that you can't run on a Forti/Cisco)
Finally why this commands won't show TCP flags and why Check Point considers RFCs are trash and closes established fw sessions at RST/FIN then drops RST+ACK and FIN+ACK as "First Packet isn't SYN" so that you can't properly differentiate between
[1] Actual Asymmetric routing
[2] Prematurely closed sessions and drops on the follow-up +ACK that would come anyway
[3] Other traffic issues
[4] Actual attacks such as ACK/FIN crafted packets etc.
You have kicked now couple very old topics. Also this post seems not relevant tbh. If you want to compare TCP flags etc I would recommend tcpdump(cppcap) / Wireshark on both ends, so you can compare. Otherwise there is no point. You can even add interfaces to the Wireshark capture so you can spot asymmetric routing. As far as I know debug commands will be maybe moved to a gui, so still possible but then more accessible.
I've used zdebug a lot and never got into trouble. It also helped me fixing issues. Perhaps I was lucky.
On the other hand...more often I had to issue specific debug commands (received from TAC) that really did make things worse on production environments.
I understand your concerns about debugging but I guess you need to be carefull with every debug command. With or without 'z' in front of it.
Absolutely correct, Rick. To execute kernel debug, one needs to understand and appreciate the implications. However, using zdebug shortcut saves you all those efforts of understanding and appreciation.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 11 | |
| 7 | |
| 6 | |
| 6 | |
| 5 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 |
Tue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERWed 18 Mar 2026 @ 10:00 AM (CET)
The Cloud Architects Series: An introduction to Check Point Hybrid Mesh in 2026 - In Seven LanguagesThu 19 Mar 2026 @ 11:00 AM (EDT)
Tips and Tricks 2026 #2: AI Security Challenges and SolutionsTue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERWed 18 Mar 2026 @ 10:00 AM (CET)
The Cloud Architects Series: An introduction to Check Point Hybrid Mesh in 2026 - In Seven LanguagesThu 19 Mar 2026 @ 11:00 AM (EDT)
Tips and Tricks 2026 #2: AI Security Challenges and SolutionsTue 24 Mar 2026 @ 04:00 PM (CET)
Maestro Masters EMEA: Hyperscale Firewall Architectures and OptimizationTue 24 Mar 2026 @ 06:00 PM (COT)
San Pedro Sula: Spark Firewall y AI-Powered Security ManagementThu 26 Mar 2026 @ 06:00 PM (COT)
Tegucigalpa: Spark Firewall y AI-Powered Security ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY