- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
How to check the access list in checkpoint through CLI like (Cisco: show access-list)
any help is much appreciated.
To print the rulebase in nice format, run command on the CP gateway via expert mode (R80.30+):
db_tool -p $FWDIR/state/local/FW1 get_rules
Hi Kumar,
I don't understand the question 100%. I think you want to display the policy.
Use mgmt_cli to show the firewall policy on CLI.
Check Point - Management API reference
Regards
Heiko
how to grep the rules for the source and destination how we do on Cisco (Show access-list | in 192.168.1.1)
If you are running R80.X environment, please refer to my answer below using new R80 REST API commands.
If you have R77.x and below, you'll need old CLI commands.
Robert.
The output of either mgmt_cli or dbedit are pretty verbose--a simple grep won't show you the rules you're looking for.
https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/show-access-rulebase~v1.1%20
For Example:
mgmt_cli show access-rulebase name "my_policy Network" package "my_policy" -f json
Robert.
What version are you using https://community.checkpoint.com/people/anant20d3161d-e0b2-4a74-a8ae-f942d673f5b7 ?
Most of the versions like 77.30 & 77.20, 75.40
If you're using R80 management, then you can use the mgmt_cli commands referred to above.
If you're using R77.30 or earlier management, then you do something like the following from the management:
[Expert@mgmt:0]# dbedit -local
Please enter a command, -h for help or -q to quit:
dbedit> print fw_policies ##YourPolicy
Note that in no case will you be able to easily obtain this information from the gateway itself, only on the management.
Just for completeness sake will say it is possible (I did it on few occasions) , but will agree it gets ugly - parsing <Policy name>.pf file from the gateway.
Yuri, I don't think the .pf is pushed to the gateway.
You can sort of read the policy in $FWDIR/state/local/FW1/local.rule but it is .... not pretty.
Yep, my bad .pf is kept on management as well.
how ofter are you doing this operation?
also this is not the right way to get all the rules that match a source address for example larger subnet / address group on the rule.
on R80.10 search hear for a packet based search on the smart console.
on R77.30... it wont be easy at all. if it is day to day operation i would suggest checking for 3rd party software like Tufin / AlgoSec / skybox
if you are not afraid of open source and this is not an operation you are doing on a day to day basics check the paloalto migration tool you can load in the config from the managment and export a cli commands which you can filter on linux / notepad++
if you are known to some scripting / xml / html you can use the web virtualization tool to get the policy and objects on those formats and run a query on those files.
hope this helped
To print the rulebase in nice format, run command on the CP gateway via expert mode (R80.30+):
db_tool -p $FWDIR/state/local/FW1 get_rules
@deniskr you are answering a VERY old thread, just in case you did not realize it 🙂
now this thread has a proper solution, just in case someone's looking 😉
It sure does.
Hey @deniskr
I truly appreciate an answer for the above however old it is.
It is a question that has always shown a weak point regarding Check Point management.
the suggested solution is a command impossible to remember and also requires expert mode access which is a shame.
Just a small shoutout from me to improve access list visibility localy on the gateways in a world where automated tools makes a centralized SmartCenter/MDS less and less relavant.
regards,
Henrik
As is all policy related automation targets the centralized Management today.
fw up_execute is an additional gateway side CLI tool that may assist a bit in this regard, refer:
I respectfully disagree. This question is common for newbies who come from the cisco world and do not know yet anything about Check Point architecture.
Not sure how I deserved the newbie title with more than 20 years of indepth vsx/mds experience. You could ask yourself if you understand customer needs instead.
Sure we have the API and it is very useful. Noone is questioning that.
@deniskr I know of the fw_up command, it has helped in some corner cases. Thank you
@Henrik_Noerr1 , I was referring to the topic starter, obviously. No need to take it personally.
In my experience, this is the first question that students ask on the CCSA course if they have taken switching and routing Cisco classes before that. I would even define it as one of the FAQs.
I can only base my judgment on my own experience, but with 20+ years on the field, with all those CP PS and Support Partner years, I have never had a need to see policy in text format during connectivity troubleshooting or otherwise. So yes, I may not fully understand that need, and I do apologize for that fact.
That said, db_tool is out there for some time now, and I specifically marked @deniskr's comment as the solution, to help out those who may look for it.
Finally, if there is a strong need for a user-friendly tool to print out policies and a good argument towards it, I suggest you open an RFE with your local Check Point representative.
Once again, no offense meant, and thanks for your understanding.
Hi,
This is no longer supported by R81.20. But a great command.
Cheers
BR
db_tool is in R81.20 (just checked).
It's an expert-mode command.
Hi @PhoneBoy
Yes, indeed but Check Point support just replied to me stating is no longer supported.
"After consulting with my team lead, I have been informed that the db_tool utility is currently not supported in R81.20. As a result, attempting to use this tool in this version may lead to errors, such as the one you encountered."
The error:
db_tool -p $FWDIR/state/local/FW1 get_rules OUTPUT:
RULES === ===========================================================
db_tool: symbol lookup error: db_tool: undefined symbol: _ZN12CUpDBDataSet3refEv
Cheers
BR
There's no SK or any documentation that suggests db_tool isn't supported.
However, I do see a few TAC cases mentioning that R81 was the last version this was supported in.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
6 | |
4 | |
4 | |
4 | |
4 | |
2 | |
2 | |
2 | |
2 |
Wed 03 Sep 2025 @ 11:00 AM (SGT)
Deep Dive APAC: Troubleshooting 101 for Quantum Security GatewaysThu 04 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: External Risk Management for DummiesWed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksWed 03 Sep 2025 @ 11:00 AM (SGT)
Deep Dive APAC: Troubleshooting 101 for Quantum Security GatewaysThu 04 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: External Risk Management for DummiesWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY