- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Please share useful debug command in checkpoint cli if any.
"fw ctl zdebug" is a powertool that is not exhausted from being used with "fw ctl zdebug drop". There is not much to be found in Check Point KB or in the documentation. "fw ctl zdebug" is an R&D tool for testing software in development. Therefore, the insert should be used with care. It starts a debugging in the background until it is aborted with CTRL+C. On productive systems it can have a high performance impact. Furthermore, the debug buffer is not the largest.
fw ctl zdebug" Helpful Command Combinations
fw ctl zdebug + packet
fw ctl zdebug + packet | grep -B 1 TCP |grep -B 1 "(SYN)" <<< change SYN-ACK,ACK,FIN,... and/or UDP,TCP...
fw ctl zdebug + all |grep -A 1 "Monitor" | grep "1.1.1.1" <<< change IP address
fw ctl zdebug + all |grep -A 2 "Monitor"
fw ctl zdebug + sync
fw ctl zdebug + conn |grep "After VM:" |grep "(SYN)"
fw ctl zdebug + xlate
fw ctl zdebug + monitorall <<< use with host IP "| grep 1.1.1.1" or network range "| grep 1.1."
fw ctl zdebug + monitor <<< use with host IP "| grep 1.1.1.1" or network range "| grep 1.1."
fw ctl zdebug + filter conn | grep -A 8 "rule 1" <<< change rule number - show connetions to rule xyz
fw ctl zdebug + filter monitor | grep -A 8 "rule 2" <<< change rule number - show connetions to rule xyz
Attention, if you turn on debugging, this will affect the performance of the firewall.
A list with kernel debug flags can be found here:
Debug command for which blade ?
sk37030: Debugging Full Synchronization in ClusterXL
sk99008: How to debug and collect VRRP traces in Gaia OS
sk92598: How to debug PIM and Multicast on Gaia
sk84520: How to debug OSPF and RouteD daemon on Gaia
sk101399: How to debug BGP and RouteD daemon on Gaia
sk63560: How to run complete VPN debug on Security Gateway to troubleshoot VPN issues?
sk33327 - How to generate a valid VPN debug, IKE debug and FW Monitor?
sk89940: How to debug VPND daemon
skI4326 - Enabling IKE and VPN debugging
sk34467: Debugging Site-to-Site VPN
sk103212: Traffic analysis using the 'CPMonitor' tool
sk85780: How to use the 'connstat' utility
sk120260: MTA Debugging and Performance Troubleshooting Toolkit
sk115557: R80.x Security Management server main processes debugging
sk60387: Troubleshooting and debugging Data Loss Prevention (DLP)
sk86320: How to debug CPD daemon
sk86186: How to debug FWM daemon
sk86321: How to debug FWD daemon
And do not forget that fw ctl zdebug - this is wrong...
thanks for your time and help
How can this epic CheckMates thread not be included:
My Top 3 Check Point CLI commands
--
Second Edition of my "Max Power" Firewall Book
Now Available at http://www.maxpowerfirewalls.com
"fw ctl zdebug" is a powertool that is not exhausted from being used with "fw ctl zdebug drop". There is not much to be found in Check Point KB or in the documentation. "fw ctl zdebug" is an R&D tool for testing software in development. Therefore, the insert should be used with care. It starts a debugging in the background until it is aborted with CTRL+C. On productive systems it can have a high performance impact. Furthermore, the debug buffer is not the largest.
fw ctl zdebug" Helpful Command Combinations
fw ctl zdebug + packet
fw ctl zdebug + packet | grep -B 1 TCP |grep -B 1 "(SYN)" <<< change SYN-ACK,ACK,FIN,... and/or UDP,TCP...
fw ctl zdebug + all |grep -A 1 "Monitor" | grep "1.1.1.1" <<< change IP address
fw ctl zdebug + all |grep -A 2 "Monitor"
fw ctl zdebug + sync
fw ctl zdebug + conn |grep "After VM:" |grep "(SYN)"
fw ctl zdebug + xlate
fw ctl zdebug + monitorall <<< use with host IP "| grep 1.1.1.1" or network range "| grep 1.1."
fw ctl zdebug + monitor <<< use with host IP "| grep 1.1.1.1" or network range "| grep 1.1."
fw ctl zdebug + filter conn | grep -A 8 "rule 1" <<< change rule number - show connetions to rule xyz
fw ctl zdebug + filter monitor | grep -A 8 "rule 2" <<< change rule number - show connetions to rule xyz
Attention, if you turn on debugging, this will affect the performance of the firewall.
A list with kernel debug flags can be found here:
Hello, @HeikoAnkenbrand
Is there a “debug” command for scenarios where you cannot view logs in real time with SmartConsole?
I need to “know” why a particular traffic is passing through the CLI, as I am now limited to viewing the logs in SmartConsole.
Source: 10.20.100.10
Destination: google.com
I already have a rule created, but I want to “capture” the traffic when the source tries to access google.com from the CLI, to know if the traffic exactly “MATCHES” the defined rule.
Is this possible?
Cheers
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
13 | |
12 | |
11 | |
10 | |
9 | |
8 | |
7 | |
6 | |
5 | |
5 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY