- CheckMates
- :
- CheckMates Toolbox
- :
- Scripts
- :
- Re: Easy Tool - R81.20 Real time connection table ...
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Easy Tool - R81.20 Real time connection table analysis v5.0
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


Overview |
---|
Now for R81.20.
For many Check Point users the question arises again and again, which connections and services are used by a rule, a port, an destination IP or source IP in real time. For this purpose I have created a small tool, which all information about a rule can be read out in real time from the connection table.
This is good for optimizing the ruleset, as it provides a real-time view of the connection table with the corresponding info. This can be a good solution in more complex environments to see what this rule really do.
The following questions can be answered:
- In which rules is port 443 currently used?
- In which rules is the source or destination IP is used?
- Which connections, ports, protocols and are active for rule xy?
- How many connections are there for rule xy in the TCP SYN, ACK or FIN state?
- How can I simplify rules and combine them, for example, into class C or B networks?
- What IP communication is there e.g. for port 80 or for the rule xy?
This tool will help you quickly answer these questions and many more.
Tool |
---|
When you execute this oneliner, a new cli command "econn" will be created.
After that, you only need to execute the following cli command in expert mode with the parameters.
The output of the tool always show:
- Shows all rules to which the filter applies
- Shows all UDP and TCP ports to which the filter applies.
- Shows a summary of all TCP (SYN, Syn-ACK, ACK,FIN) , UDP, ICMP, VRRP, IGMP values for the filtered connections.
- Indicates which protocols are currently in use (TCP, UDP,...)
- Summary of all used Check Point services (https, echo-request, CPD_amon, FW1_log,...)
- Incoming and outgoing interface (eth0, bond1.10, ...)
- Check Point service names
- Formatted output of the connection table:
(rule, protoll ,source IP, source port, destination IP, destination port, session timeout, TCP state, interface in and out, Check Point service)
Since version 3.0 VSX is supported:
On VSX systems, change to the corresponding virtual system with "vsenv" and execute "econn" on that VS system.
Filter Syntax | Description |
-a | Show the information about the complete connection table. |
-r <rule number> | Show the information about a specific rule with the corresponding rule number. Inline rules for example 2.1 are not possible. You can only use the base rule in this case 2. |
-p <port> | Show the information about a specific destination port with the corresponding port number. |
-d <destination IP> | Show the information about a specific destination IP with the corresponding IP. |
-s <source IP> | Show the information about a specific source IP with the corresponding IP. |
-g <grep parameter> |
Search filter for the corresponding grep parameters in the raw data of "fw ctl conntab". |
-e <grep parameter> |
Search filter for the corresponding grep parameters in the connection table output view. |
Delete Connections |
Description |
-x | Attention!!! This parameter deletes all connections from the connection table that match the filters. Grep parameters (-g) cannot be deleted in the combination with this option. This parameter is only available from R81.20. |
Output extension | Description |
-c | Shows the corresponding connection table entries. |
-t | Tip! Display possible class C and B networks where the corresponding IP addresses from the connection table would match. This function is good to simplify rules. |
-i | Displays only the summarized IP communication. Also used to simplify the set of rules. |
-n |
No summary output. |
File |
Description |
-w <file name> | Write connection table to file. |
-f <file name> |
Read connection table from file. Important! |
Examples |
---|
Examples | Description |
# econn -r 10 -c | Shows all basic informations (used Ports, counter TCP/UDP/ICMP...) to rule 10 and displays the appropriate connection table entries. |
# econn -a | Gives an overview of all connectiontabel entries (used ports, used protocols and counter TCP/UDP/ICMP...). |
# econn -p 443 -c | Displays all rules where port 443 is used and prints all connection table entries. |
# econn -d 1.1.1.1 -c | Displays all rules where destination IP 1.1.1.1 is used and gives an overview of all connection table entries (used ports, used protocols and counter TCP/UDP/ICMP...) and prints all connection table entries. |
# econn -s 1.1.1.1 -c | Displays all rules where source IP 1.1.1.1 is used and gives an overview of all connection table entries (used ports, used protocols and counter TCP/UDP/ICMP...) and prints all connection table entries. |
# econn -s 1.1.1.0-1.1.1.255 |
Displays all rules where source IP range from 1.1.1.1 to 1.1.1.255 |
# econn -r 10 -t -i | Shows all basic informations to rule 10 and summarizes all IP addresses to possible class C and B networks and output the IP communication summed by source IP's. |
# econn -p 80 -t -i -c | Shows all possible informations to port 80 in the connection table: rules, connection summaries, used protocols and ports, grouped networks, IP communication |
# econn -p 443 -g SYN -c |
Shows all possible informations to port 443 in the connection table with "TCP SYN" state |
# econn -r 10 -p 53 -x | Attention!!! Delete all possible connections with port 53 in rule 10 in the connection table. |
# econn -w test -p 433 |
Write the connection table to tar file where port 443 is used. |
# econn -f test -c -e SYN |
Read the connection table from tar file and show the output with the filter view option for SYN. |
# econn -n -p 443 -e SYN_SENT |
Don't show the connection summary + show connection table for port 443 and TCP state SYN. |
Install Tool |
---|
Use this auto installer script from "Spoiler" on the Firewall Gateway as CLI command in expert mode:
curl_cli -k https://www.ankenbrand24.de/inst_econn > /tmp/inst_econn && chmod 770 /tmp/inst_econn && /tmp/inst_econn
Or "copy and past" the following script block from "Spoiler" to your Firewall Gateway (in expert mode):
cat <<EOT > /usr/bin/econn
#!/bin/bash
VERSION="4.0";
SHOW_CONN="0";
SHOW_GROUPED="0";
SHOW_IP="0";
DEL_CONN="0";
SUCHEN="";
FILTER_GREP="-v 'fgsdg'";
ENTRIE_GREP="-v 'hgdfk'";
FILE_Y="0";
FILE_FY="0";
SHOW_SUM="1";
echo "" > /tmp/econn_ip.txt
clear;
echo -e "\e[7m";printf '%.s ' {1..132}; echo;
echo " Real time connection table analysis by Heiko Ankenbrand 2021 (v\$VERSION) ";
printf '%.s ' {1..132};echo -e "\e[0m";
IsGATEWAY=`cpprod_util FwIsFirewallModule`;
if [ \$IsGATEWAY != "1" ] ;
then
echo ;
echo "This is not a gateway!";
echo ;
exit 1;
fi
while [[ \$# -gt 0 ]]
do
key1="\$1"
case \$key1 in
-h|--help.)
shift;
echo;
echo -e "\e[6m";echo -n " Help overview";printf '%.s ' {1..118};echo -e "\e[0m";
echo
echo "Filter Syntax"
echo " -a Show the information about the complete connection table.";
echo " -r <rule number> Show the information about a specific rule with the corresponding rule number.";
echo " -p <port> Show the information about a specific destination port with the corresponding port number.";
echo " -d <destination IP> Show the information about a specific destination IP with the corresponding IP.";
echo " -d <dIP_start-dIP_end> Show the information about a specific destination IP range with the corresponding IP.";
echo " -s <source IP> Show the information about a specific source IP with the corresponding IP.";
echo " -g <grep parameter> Filters the search for the corresponding grep parameters.";
echo ;
echo "Output extension";
echo " -c Shows the corresponding connection table entries.";
echo " -e Is an option that sets a grep filter only on the output of the connection table view.";
echo " -t Display possible class C and B networks where the corresponding IP addresses from ";
echo " the connection table would match. This function is good to simplify rules.";
echo " -i Displays only the summarized IP communication. Also used to simplify the set of rules.";
echo " -n No summary output";
echo ;
echo "Delete connection";
echo " -x Attention!!! This parameter deletes all connections from the connection table that match the "
echo " filters. Grep parameters (-g) cannot be deleted in the combination with this option.";
echo "File";
echo " -w <file name> Write connection table to file.";
echo " -f <file name> Read connection table from file.";
echo " Important!";
echo " Search filters only work when writing the file -w not with the option -f.";
echo -e "\e[6m";echo -n " Examples";printf '%.s ' {1..123};echo -e "\e[0m";
echo "# econn -r 10 -c Shows all basic informations (used Ports, counter TCP/UDP/ICMP...) to rule 10 and displays";
echo " the appropriate connection table entries.";
echo "# econn -a Gives an overview of all connectiontabel entries (used ports, used protocols and counter";
echo " TCP/UDP/ICMP...)";
echo "# econn -p 443 -c Displays all rules where port 443 is used and prints all connection table entries.";
echo "# econn -d 1.1.1.1 -c Displays all rules where destination IP 1.1.1.1 is used and gives an overview of all ";
echo " connection table entries (used ports, used protocols and counter TCP/UDP/ICMP...) and";
echo " prints all connection table entries.";
echo "# econn -s 1.1.1.1 -c Displays all rules where source IP 1.1.1.1 is used and gives an overview of all connection";
echo " table entries (used ports, used protocols and counter TCP/UDP/ICMP...) and prints all";
echo " connection table entries.";
echo "# econn -s 1.1.1.0-1.1.1.255 Displays all rules where source IP range from 1.1.1.1 to 1.1.1.255.";
echo "# econn -r 10 -t -i Shows all basic informations to rule 10 and summarizes all IP addresses to possible";
echo " class C and B networks and output the IP communication summed by source IP's.";
echo "# econn -p 80 -t -i -c Shows all possible informations to port 80 in the connection table: rules, connection ";
echo " summaries, used protocols and ports, grouped networks, IP communication.";
echo "# econn -p 443 -g SYN -c Shows all possible informations to port 443 in the connection table with 'TCP SYN' state";
echo "# econn -r 10 -p 53 -x Attention!!! Delete all possible connections with port 53 in rule 10 in the connection table.";
echo "# econn -w test -p 433 Write the connection table to tar file where port 443 is used.";
echo "# econn -f test Read the connection table from tar file and show the output.";
echo "# econn -f test -c -e SYN Read the connection table from tar file and show the output with the filter view option for SYN.";
echo "# econn -n -p 443 -e SYN_SENT Don't show the connection summary + show connection table for port 443 and TCP state SYN.";
echo;
exit 1;
;;
-x|-del)
shift;
SHOW_CONN="1";
DEL_CONN="1";
;;
-n)
shift;
SHOW_SUM="0";
SHOW_CONN="1";
;;
-s|--sip)
key="\$2";
FILTER="\$FILTER -sip=\$key";
SUCHEN="\$SUCHEN Source IP=\$key ";
shift;
shift;
;;
-d|--dip)
key="\$2";
FILTER="\$FILTER -dip=\$key";
SUCHEN="\${SUCHEN}Destination IP=\$key ";
shift;
shift;
;;
-p|--port)
key="\$2";
FILTER="\$FILTER -dport=\$key";
SUCHEN="\${SUCHEN}DPort=\$key ";
shift;
shift;
;;
-a|--all)
key="\$2";
FILTER="";
SUCHEN="Complete connection table!";
shift;
;;
-r|--role)
key="\$2";
FILTER="\$FILTER -rule=\$key";
SUCHEN="\${SUCHEN}Rule=\$key ";
shift;
shift;
;;
-g|--grep)
key="\$2";
FILTER_GREP="\$key";
SUCHEN="\${SUCHEN}GREP='\$key' ";
shift;
shift;
;;
-e)
ENTRIE_GREP="\$2";
SHOW_CONN="1";
if [ "x\$ENTRIE_GREP" = "x" ]
then
echo "Parameter -e not correct set!";
ENTRIE_GREP="-v dsfgdsj";
fi
shift;
shift;
;;
-t|-tip)
shift;
SHOW_GROUPED="1";
;;
-i|-ip)
shift;
SHOW_IP="1";
;;
-c|-conn)
SHOW_CONN="1";
shift;
;;
-w)
FILE_W="\$2";
FILE_W="\${FILE_W}.tgz";
FILE_Y="1";
shift;
shift;
;;
-f)
FILE_F="\$2";
FILE_F="\${FILE_F}.tgz";
FILE_FY="1";
shift;
shift;
;;
*)
POSITIONAL+=("\$1") # save it in an array for later
shift # past argument
;;
esac
done
if [ \$FILE_FY == "1" ] ;
then
if test -f "\$FILE_F";
then
echo -e "\e[6m";echo -n " Read connection table from tar archive";printf '%.s ' {1..93};echo -e "\e[0m";
echo "Read file : \$FILE_F";
tar xzfP \$FILE_F;
FILTER="";
SUCHEN="";
if [ ! -f /tmp/econn_ports ]; then
echo;
echo "File /tmp/econn_ports not found in tar!";
echo;
exit 1;
fi
if [ ! -f /tmp/econn_ip.txt ]; then
echo;
echo "File /tmp/econn_ip.txt not found in tar!";
echo;
exit 1;
fi
if [ ! -f /tmp/econn_if ]; then
echo;
echo "File /tmp/econn_if not found in tar!";
echo;
exit 1;
fi
echo -n "CT entries : ";
more /tmp/econn_ip.txt | wc -l;
else
echo;
echo "File \$FILE_F not exist";
echo;
exit 1;
fi
else
fw ctl conntab \$FILTER 2>&1 |grep \$FILTER_GREP | grep -v "Got NULL" |grep -v "gen_services_array Failed" | egrep -v '^\s*$|^#' > /tmp/econn_ip.txt;
fw ctl iflist > /tmp/econn_if;
if test -f "\$FWDIR/state/__tmp/FW1/local.set"; then
more \$FWDIR/state/__tmp/FW1/local.set | grep srv_name | awk '{split(\$0,a,","); print a[1] " " a[3];}' | sed -e 's/: (\"//g' > /tmp/econn_ports;
fi
fi
if [ \$FILE_Y == "1" ] ;
then
echo -e "\e[6m";echo -n " Write connection table to tar archive";printf '%.s ' {1..94};echo -e "\e[0m";
echo -n "Search filter : \$SUCHEN";
tar -czf \$FILE_W -P /tmp/econn_ip.txt /tmp/econn_if /tmp/econn_ports;
echo;
echo -n "Connection table entries : ";
more /tmp/econn_ip.txt | wc -l;
echo "Written in file : \$FILE_W";
echo ;
exit 1;
fi
if [ \$SHOW_SUM == "1" ] ;
then
echo -e "\e[6m";echo -n " Connection Summary";printf '%.s ' {1..113};echo -e "\e[0m";
echo -n "Search : \$SUCHEN";
vsx_system=\`fw vsx stat 2>&1 | grep -c "VSX is not supported"\`
echo ;
if [ \$vsx_system == "0" ]
then
echo -n "VSX VS : ";
vsx_vsenv1=\`vsx get | awk '{split(\$0,a,"("); sub(/ID /, "", a[2]); sub(/)./, "", a[2]); print a[2]; }'\`
echo "\$vsx_vsenv1"
fi
echo -n "Rules : ";
more /tmp/econn_ip.txt | awk '{print \$6 " "\$2 \$3 \$4 " "\$5 " "\$8}' | sed -e 's/src=//g' | sed -e 's/\],dest=\[/ /g' | sed -e 's/\],/ /g' | sed -e 's/)\;//g' | sed -e 's/\[//g' | sed -e 's/rule\=/ /g' | sed -e 's/\,/ /g' | sed -e 's/state\=/ /g' | sed -e 's/Ifn[c,s]in\=[0-9]*//g' | sed -e 's/Ifn[c,s]out\=[0-9]*//g' | egrep -v '^\s*$|^#' | awk '{printf "%s, \n", \$1}' 2>&1 | grep -v -E '^[1-9][0-9][0-9][0-9][0-9][0-9]' |grep -v '0,' | sort -n | uniq | tr -d '\n' | sed -e 's/0000002f/GRE/g' | sed -e 's/00000070/VRRP/g' | sed 's/\(.*\),/\1\t/' | sed -e 's/^, //g'
echo ;
echo -n "Protocoll : ";
more /tmp/econn_ip.txt | awk '{print \$6 " "\$2 \$3 \$4 " "\$5 " "\$8}' | sed -e 's/src=//g' | sed -e 's/\],dest=\[/ /g' | sed -e 's/\],/ /g' | sed -e 's/)\;//g' | sed -e 's/\[//g' | sed -e 's/rule\=/ /g' | sed -e 's/\,/ /g' | sed -e 's/state\=/ /g' | sed -e 's/Ifn[c,s]in\=[0-9]*//g' | sed -e 's/Ifn[c,s]out\=[0-9]*//g' | egrep -v '^\s*$|^#' | awk '{printf "%s, \n", \$6}' 2>&1 | sort -n | uniq | tr -d '\n' | sed -e 's/0000002f/GRE/g' | sed -e 's/00000070/VRRP/g' | sed 's/\(.*\),/\1\t/' | sed -e 's/^, //g'
echo;
echo -n "Used Ports : ";
more /tmp/econn_ip.txt | awk '{print \$6 " "\$2 \$3 \$4 " "\$5 " "\$8}' | sed -e 's/src=//g' | sed -e 's/\],dest=\[/ /g' | sed -e 's/\],/ /g' | sed -e 's/)\;//g' | sed -e 's/\[//g' | sed -e 's/rule\=/ /g' | sed -e 's/\,/ /g' | sed -e 's/state\=/ /g' | sed -e 's/Ifn[c,s]in\=[0-9]*//g' | sed -e 's/Ifn[c,s]out\=[0-9]*//g' | egrep -v '^\s*$|^#' | awk '{printf "%s %s, \n", \$5, \$6}' 2>&1 | sort -n | uniq | tr -d '\n' | sed -e 's/0000002f/GRE/g' | sed -e 's/00000070/VRRP/g' | sed 's/\(.*\),/\1\t/' | sed -e 's/^ , //g' | sed -e 's/0 ICMP, //g' | sed -e 's/0 IGMP, //g' | sed -e 's/0 VRRP, //g'
echo -e "\n\e[6m";echo -n " Counter";printf '%.s ' {1..124};echo -e "\e[0m";
echo -n ' TCP : ';more /tmp/econn_ip.txt | grep 'TCP' |wc -l;
echo -n ' TCP SYN : ';more /tmp/econn_ip.txt | grep 'SYN_SENT' |wc -l;
echo -n ' SYN-ACK : ';more /tmp/econn_ip.txt | grep 'SYN_ACK' |wc -l;
echo -n ' ACK : ';more /tmp/econn_ip.txt | grep 'ESTAB' |wc -l;
echo -n ' FIN : ';more /tmp/econn_ip.txt | grep 'FIN' |wc -l;
echo -n ' UDP : ';more /tmp/econn_ip.txt | grep 'UDP' |wc -l
echo -n ' ICMP : ';more /tmp/econn_ip.txt | grep 'ICMP' |wc -l;
echo -n ' IGMP : ';more /tmp/econn_ip.txt | grep 'IGMP' |wc -l;
echo -n ' VRRP : ';more /tmp/econn_ip.txt | grep '00000070)' |wc -l;
echo -n ' GRE : ';more /tmp/econn_ip.txt | grep '0000002f)' |wc -l;
echo -e "\e[6m";echo -n " Interface";printf '%.s ' {1..122};echo -e "\e[0m";
echo -n "Incomming : ";
more /tmp/econn_ip.txt | awk '{split(\$0,a,";"); print a[2];}' | awk '{split(\$0,b,",") ;print b[4];}' |grep in | sort |uniq > /tmp/econn_in
more /tmp/econn_ip.txt | awk '{split(\$0,a,";"); print a[2];}' | awk '{split(\$0,b,",") ;print b[5];}' |grep in | sort |uniq >> /tmp/econn_in
more /tmp/econn_ip.txt | awk '{split(\$0,a,";"); print a[2];}' | awk '{split(\$0,b,",") ;print b[6];}' |grep in | sort |uniq >> /tmp/econn_in
more /tmp/econn_in | sort |uniq| awk '{split(\$1,c,"=") ;system("cat /tmp/econn_if |grep ^"c[2] ); }' | awk '{split(\$0,d,":") ;print "," d[2] ;}' |sort | uniq| tr -d '\n' | sed -e 's/^, //g'
echo
echo -n "Outgoing : ";
more /tmp/econn_ip.txt | awk '{split(\$0,a,";"); print a[2];}' | awk '{split(\$0,b,",") ;print b[4];}' |grep out | sort |uniq > /tmp/econn_out
more /tmp/econn_ip.txt | awk '{split(\$0,a,";"); print a[2];}' | awk '{split(\$0,b,",") ;print b[5];}' |grep out | sort |uniq >> /tmp/econn_out
more /tmp/econn_ip.txt | awk '{split(\$0,a,";"); print a[2];}' | awk '{split(\$0,b,",") ;print b[6];}' |grep out | sort |uniq >> /tmp/econn_out
more /tmp/econn_out | sort |uniq| awk '{split(\$1,c,"=") ;system("cat /tmp/econn_if |grep ^"c[2] ); }' | awk '{split(\$0,d,":") ;print "," d[2] ;}' |sort |uniq | tr -d '\n' | sed -e 's/^, //g'
echo
echo -e "\e[6m";echo -n " Services";printf '%.s ' {1..123};echo -e "\e[0m";
echo -n "CP Service : ";
more /tmp/econn_ip.txt | awk '{split(\$0,a,";"); print a[2];}' | awk '{split(\$0,b,",") ; print b[3];}' |grep service |grep -v "(" | sort |uniq > /tmp/econn_service_used
more /tmp/econn_ip.txt | awk '{split(\$0,a,";"); print a[2];}' | awk '{split(\$0,b,",") ; print b[4];}' |grep service |grep -v "(" | sort |uniq >> /tmp/econn_service_used
more /tmp/econn_service_used | sort |uniq| awk '{split(\$1,c,"=") ;system("cat /tmp/econn_ports |grep ^"c[2] ); }' | awk '{split(\$0,b," ") ; print ", " b[2];}' | tr -d '\n' | sed -e 's/^, //g' > /tmp/econn_service_used_all
more /tmp/econn_ip.txt | awk '{split(\$0,a,";"); print a[2];}' | awk '{split(\$0,b,",") ; print b[3];}' |grep service |grep "(" |sort |uniq | awk '{split(\$1,s2,"("); sub(/)/, "[[:blank:]]",s2[2]); service_id="^"s2[2]; system("cat /tmp/econn_ports |egrep "service_id)}' |awk '{split(\$0,b," ") ; print ", " b[2];}' | tr -d '\n' >> /tmp/econn_service_used_all
more /tmp/econn_ip.txt | awk '{split(\$0,a,";"); print a[2];}' | awk '{split(\$0,b,",") ; print b[4];}' |grep service |grep "(" |sort |uniq | awk '{split(\$1,s2,"("); sub(/)/, "[[:blank:]]",s2[2]); service_id="^"s2[2]; system("cat /tmp/econn_ports |egrep "service_id)}' |awk '{split(\$0,b," ") ; print ", " b[2];}' | tr -d '\n' >> /tmp/econn_service_used_all
more /tmp/econn_service_used_all | sed -e 's/, FW1_omi-sic(40)//g' | sed -e 's/^, //g'
echo
fi
if [ \$SHOW_CONN == "1" ] ;
then
echo -e "\e[6m";echo -n " Connection Table";printf '%.s ' {1..115};echo -e "\e[0m";
echo -e "\nRule Proto Source IP S-Port Destination IP D-Port Timeout State Interface in Interface out Service";
printf '%.s-' {1..160};
echo;
more /tmp/econn_ip.txt | egrep -v '^\s*$|^#'| awk -f /opt/etool/script/econn_awk1 -v vsx_system="\$vsx_system" | sort -n | sed 's/^[1-9][0-9][0-9][0-9][0-9][0-9]/-imp->/g' | grep \$ENTRIE_GREP;
fi
if [ \$SHOW_GROUPED == "1" ] ;
then
echo -e "\e[6m";echo -n " Grouped by";printf '%.s ' {1..121};echo -e "\e[0m";
# printf '%.s-' {1..50};echo -e "\nGrouped by ";printf '%.s-' {1..50};
echo -e "\nSource Class C Networks:";
more /tmp/econn_ip.txt | awk '{print \$6 " "\$2 \$3 \$4 " "\$5 " "\$8}' | sed -e 's/src=//g' | sed -e 's/\],dest=\[/ /g' | sed -e 's/\],/ /g' | sed -e 's/)\;//g' | sed -e 's/\[//g' | sed -e 's/rule\=/ /g' | sed -e 's/\,/ /g' | sed -e 's/state\=/ /g' | sed -e 's/Ifn[c,s]in\=[0-9]*//g' | sed -e 's/Ifn[c,s]out\=[0-9]*//g' | egrep -v '^\s*$|^#'| awk '{split(\$2,a,"."); printf "\t%s.%s.%s.0\n", a[1],a[2],a[3]}' 2>&1 | sort -n | uniq | sed -e 's/\.\.\.0//g' | sed -e 's/\.\.0\.0//g'
echo -e "\nSource Class B Networks:";
more /tmp/econn_ip.txt | awk '{print \$6 " "\$2 \$3 \$4 " "\$5 " "\$8}' | sed -e 's/src=//g' | sed -e 's/\],dest=\[/ /g' | sed -e 's/\],/ /g' | sed -e 's/)\;//g' | sed -e 's/\[//g' | sed -e 's/rule\=/ /g' | sed -e 's/\,/ /g' | sed -e 's/state\=/ /g' | sed -e 's/Ifn[c,s]in\=[0-9]*//g' | sed -e 's/Ifn[c,s]out\=[0-9]*//g' | egrep -v '^\s*$|^#'| awk '{split(\$2,a,"."); printf "\t%s.%s.0.0\n", a[1],a[2],a[3]}' 2>&1 | sort -n | uniq | sed -e 's/\.\.\.0//g' | sed -e 's/\.\.0\.0//g'
echo -e "\nDestination Class C Networks:";
more /tmp/econn_ip.txt | awk '{print \$6 " "\$2 \$3 \$4 " "\$5 " "\$8}' | sed -e 's/src=//g' | sed -e 's/\],dest=\[/ /g' | sed -e 's/\],/ /g' | sed -e 's/)\;//g' | sed -e 's/\[//g' | sed -e 's/rule\=/ /g' | sed -e 's/\,/ /g' | sed -e 's/state\=/ /g' | sed -e 's/Ifn[c,s]in\=[0-9]*//g' | sed -e 's/Ifn[c,s]out\=[0-9]*//g' | egrep -v '^\s*$|^#'| awk '{split(\$4,a,"."); printf "\t%s.%s.%s.0\n", a[1],a[2],a[3]}' 2>&1 | sort -n | uniq | sed -e 's/\.\.\.0//g' | sed -e 's/\.\.0\.0//g'
echo -e "\nDestination Class B Networks:";
more /tmp/econn_ip.txt | awk '{print \$6 " "\$2 \$3 \$4 " "\$5 " "\$8}' | sed -e 's/src=//g' | sed -e 's/\],dest=\[/ /g' | sed -e 's/\],/ /g' | sed -e 's/)\;//g' | sed -e 's/\[//g' | sed -e 's/rule\=/ /g' | sed -e 's/\,/ /g' | sed -e 's/state\=/ /g' | sed -e 's/Ifn[c,s]in\=[0-9]*//g' | sed -e 's/Ifn[c,s]out\=[0-9]*//g' | egrep -v '^\s*$|^#'| awk '{split(\$4,a,"."); printf "\t%s.%s.0.0\n", a[1],a[2],a[3]}' 2>&1 | sort -n | uniq | sed -e 's/\.\.\.0//g' | sed -e 's/\.\.0\.0//g'
fi
if [ \$SHOW_IP == "1" ] ;
then
echo -e "\e[6m";echo -n " IP to IP";printf '%.s ' {1..124};echo -e "\e[0m\n";
more /tmp/econn_ip.txt | awk '{print \$6 " "\$2 \$3 \$4 " "\$5 " "\$8}' | sed -e 's/src=//g' | sed -e 's/\],dest=\[/ /g' | sed -e 's/\],/ /g' | sed -e 's/)\;//g' | sed -e 's/\[//g' | sed -e 's/rule\=/ /g' | sed -e 's/\,/ /g' | sed -e 's/state\=/ /g' | sed -e 's/Ifn[c,s]in\=[0-9]*//g' | sed -e 's/Ifn[c,s]out\=[0-9]*//g' | egrep -v '^\s*$|^#' | awk '{printf "%15s -> \t%15s \n", \$2,\$4}' 2>&1 | sort -n | uniq
fi
if [ \$DEL_CONN == "1" ] ;
then
OS=`cat /etc/cp-release | cut -c 17- | sed 's/^ *//g' | sed 's/\s*\$//g' | cut -c -3 | grep -c '^R8[1-9]'`
if [[ \$OS == "1" ]] ;
then
if [[ \$FILTER_GREP == *"fgsdg"* ]] ;
then
echo -e "\e[6m";echo -n " Delete Connections";printf '%.s ' {1..114};echo -e "\e[0m\n";
echo
echo ">>>> ATTENTION <<<<"
echo
echo "This will clear all the connections matching the filter in the connection table!!!"
echo -n "Are you sure (yes/no)? [n] "
read DEL_CONN_1
if [[ \$DEL_CONN_1 == "yes" ]] || [[ \$DEL_CONN_1 == "y" ]] ;
then
echo;
echo -n "Are you really sure you want to do this (yes/no)? [n] "
FILTER="-x\$FILTER";
if [ -f /var/log/econn_delete_connections.txt ];
then
rm /var/log/econn_delete_connections.txt 2>&1> /dev/null;
fi
echo;
echo;
echo "###########################################################################################################";
echo "There is currently a bug in R81 and R80.10. This means"
echo "that deleting does not work correctly, because the filters"
echo "do not match. Therefore I have disabled the function."
echo;
echo "fw ctl contab \$FILTER";
echo
echo "More read here:"
echo "https://community.checkpoint.com/t5/General-Topics/fw-ctl-contab-x-issue-in-R81-10/m-p/128288#M23421"
echo;
echo "###########################################################################################################";
echo;
exit 1;
fw ctl conntab \$FILTER: > /var/log/econn_delete_connections.txt;
echo
more /var/log/econn_delete_connections.txt | grep "Nothing done." | sed -e 's/Are you sure (yes\/no)? \[n\] //g'
echo
echo "All deleted connections respectively the result are listed in the following file:"
echo "/var/log/econn_delete_connections.txt";
else
echo
echo "Nothing done.";
fi
else
echo
echo "You have set grep filter. This does not work with deleting the connections!";
echo
echo "Nothing done.";
fi
else
echo "-x is only posible in R81 and above!"
fi
fi
echo;
EOT
[ -d "/opt/etool" ] || mkdir /opt/etool;
[ -d "/opt/etool/script" ] || mkdir /opt/etool/script;
cat <<EOT > /opt/etool/script/econn_awk1
{
where=match(\$4, "TCP");
if (where !=0) { rule=\$6 ; state=\$8; service=\$9 ; timer =\$5 ; proto="TCP"; dst=\$3; src=\$2; if_in=\$10;if_out=\$11; where=match(\$13, "out"); if (where !=0) {if_out=\$13 } } ;
where=match(\$4, "UDP");
if (where !=0) { rule=\$6 ; state="state=---"; service=\$7 ; timer =\$5 ; proto="UDP"; dst=\$3; src=\$2; if_in=\$8;if_out=\$9; where=match(\$11, "out"); if (where !=0) {if_out=\$11 } } ;
where=match(\$4, "0000002f");
if (where !=0) { rule=\$6 ; state="state=---"; service=\$7 ; timer =\$5 ; proto="GRE"; dst=\$3; src=\$2; if_in=\$8;if_out=\$9} ;
where=match(\$4, "00000070");
if (where !=0) { rule=\$6 ; state="state=---"; service=\$7 ; timer =\$5 ; proto="VRRP"; dst=\$3; src=\$2; if_in=\$8;if_out=\$9} ;
where=match(\$4, "ICMP");
if (where !=0) { rule=\$6 ; state="state=---"; service=\$7 ; timer =\$5 ; proto="ICMP"; dst=\$3; src=\$2; if_in=\$8;if_out=\$9; where=match(\$11, "out"); if (where !=0) {if_out=\$11 } };
where=match(\$4, "IGMP");
if (where !=0) { rule=\$6 ; state="state=---"; service=\$7 ; timer =\$5 ; proto="IGMP"; dst=\$3; src=\$2; if_in=\$8;if_out=\$9; where=match(\$11, "out"); if (where !=0) {if_out=\$11 } };
split(service,s,"=");
service=s[2];
sub(/,/, "", service);
where=match(\$service, ")");
if (where !=0) {split(service,s1,"("); service=s1[2];sub(/)/, "", service);}
split(state,h,"=");
state=h[2];
split(rule,h,"=");
rule=h[2];
where=match(\$9, "in");
if (where !=0) { if_in=\$9};
where=match(\$10, "in");
if (where !=0) { if_in=\$10};
where=match(\$11, "in");
if (where !=0) { if_in=\$11};
where=match(\$9, "out");
if (where !=0) { if_out=\$9};
where=match(\$10, "out");
if (where !=0) { if_out=\$10};
where=match(\$11, "out");
if (where !=0) { if_out=\$11};
where=match(\$12, "out");
if (where !=0) { if_out=\$12};
where=match(\$13, "out");
if (where !=0) { if_out=\$13};
split(if_in,h,"=");
if_in=h[2];
split(if_out,h,"=");
if_out=h[2];
split(src,h,"=");
split(h[2],h1,",");
src_ip=h1[1];
src_p=h1[2] ;
split(dst,h,"=");
split(h[2],h1,",");
dst_ip=h1[1];
dst_p=h1[2];
sub(/TCP_ESTABLISHED/, "ESTABLISHED", state);
sub(/,/, "", state);
sub(/,/, "", rule);
sub(/,/, "", timer);
sub(/,/, "", service);
sub(/\[/, "", src_ip);
sub(/\[/, "", dst_ip);
sub(/\]/, "", src_p);
sub(/\]/, "", dst_p);
sub(/,/, "", if_in);
sub(/,/, "", if_out);
read_file_into_array("/tmp/econn_if", File);
where=match(\$service, ")");
if (where ==0) {
read_file_into_array1("/tmp/econn_ports", File1);
service_last=File1[service];
}
else {
service_last=service;
}
if_out_last=File[if_out];
if (length(if_out_last) <= 0) {if_out_last="---";}
if_in_last=File[if_in];
if (length(if_in_last) <= 0) {if_in_last="---";}
if (length(service_last) <= 0) {service_last="---";}
if (proto == "icmp") { dst_p="---"; src_p="---"; }
printf "%.6s \t%6s \t%15s \t%6s \t%15s \t%6s \t%10s \t%11s \t%10s \t%10s \t%.15s \n", rule, proto, src_ip, src_p, dst_ip, dst_p, timer, state , if_in_last, if_out_last, service_last ;
service="";
rule="";
timer="";
state="";
proto="" ;
dst="" ;
src="";
if_in="";
if_out="";
}
function read_file_into_array(file, array ,status, record, count ) {
count = 0;
while (1) {
status = getline record < file
if (status == -1) {
print "Failed to read file " file;
exit 1;
}
if (status == 0) break;
split(record,r,":");
sub(/ /, "", r[1]);
array[r[1]] = r[2];
}
close(file);
return count
}
function read_file_into_array1(file, array ,status, record, count ) {
count = 0;
while (1) {
status = getline record < file
if (status == -1) {
print "Failed to read file " file;
exit 1;
}
if (status == 0) break;
split(record,r," ");
sub(/ /, "", r[1]);
array[r[1]] = r[2];
}
close(file);
return count
}
EOT
chmod 770 /usr/bin/econn
chmod 770 /opt/etool/script/econn_awk1
Version |
---|
0.1 08-08-2021 - oneliner to show all connection table entries
(ONELINER - Formatted Connection Table)
0.9 08-12-2021 - Bugs fixed
1.0 08-26-2021 - Version v1.0 - This version only shows info about certain rules
(Easy Tool - Real time rule analysis v1.0)
2.0 08-25-2021 - New version for filtering by rule, port, dst IP and src IP
2.1 08-26-2021 - Bugs fixed
2.2 08-27-2021 - Add -g grep parameter
2.3 08-28-2021 - Add -x delete parameter
(This parameter is only available from R81 and higher.)
2.4 08-28-2021 - There is currently a bug in R81 and R81.10 with "fw ctl conntab -x -rule=3"
Therefore I have disabled this function -x.
('fw ctl contab -x' issue in R81.10)
2.5 09-01-2021 - Bugs fixed (conn issue)
2.6 09-08-2021 - Incoming and outgoing interface added
2.7 09-09-2021 - Check Point service names added
2.8b 09-09-2021 - Bugs fixed
( --> more \$FWDIR/state/__tmp/FW1/ )
2.9 09-10-2021 - Now with extended connection table view:
incoming interface, outgoing interface, Check Point service name
2.9i 09-10-2021 - Bugs fixed
(ICMP issues, interface issue, Check Point service issue)
3.0 09-11-2021 - VSX support
3.1 09-11-2021 - Bugs fixed
(option -g issue, VSX "fw ctl conntab" issue)
3.2 09-12-2021 - Bugs fixed
( option -r /-s /-d /-p /-g issue)
3.3 09-13-2021 - Design modification
4.0 09-15-2021 - File read and write, added -n no summary output
4.0f 09-16-2021 - Performance optimization of the script for large connection tables.
4.0g 09-23-2021 - Add -h option
4.0h 14-11-2021 - Performance optimization for VSX environments
5.0 01-02-2023 - now for R81.20 / enable -x option for deleting connection table entries
Overview |
---|
Now for R81.20.
For many Check Point users the question arises again and again, which connections and services are used by a rule, a port, an destination IP or source IP in real time. For this purpose I have created a small tool, which all information about a rule can be read out in real time from the connection table.
This is good for optimizing the ruleset, as it provides a real-time view of the connection table with the corresponding info
...;Disclaimer: Check Point does not provide maintenance services or technical or customer support for third party content provided on this Site, including in CheckMates Toolbox. See also our Third Party Software Disclaimer.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

Heiko, what is the reason to post the same tool, version by version, as a new post? Why not to update the existing ones?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


It is a new version that supports R81.20, as some things have changed in the "fw ctl conntab" tool in R81.20.
For example, since about R80.40 the parameter -x was specified, but this did not work in the older versions. As of R81.20, this parameter works.
Furthermore, the formatting in R81.20 is different and it is not so easy to adapt in this complex code.
Therefore, I had to adapt the script a bit and it now works with R81.20.
From my point of view it is easier to download the script in version 5 for R81.20. Therefore a new article.
It is a new version that supports R81.20, as some things have changed in the "fw ctl conntab" tool in R81.20.
For example, since about R80.40 the parameter -x was specified, but this did not work in the older versions. As of R81.20, this parameter works.
Furthermore, the formatting in R81.20 is different and it is not so easy to adapt in this complex code.
Therefore, I had to adapt the script a bit and it now works with R81.20.
From my point of view it is easier to download the script in
...;- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


[Expert@GW8120:0]# curl_cli -k http://www.ankenbrand24.de/inst_econn5 > /tmp/inst_econn5 && chmod 770 /tmp/inst_econn5 && /tmp/inst_econn5
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 22 100 22 0 0 153 0 --:--:-- --:--:-- --:--:-- 282
/tmp/inst_econn5: line 1: Imperva_WAF_Protected: command not found
[Expert@GW8120:0]# econn -a
Real time connection table analysis by Heiko Ankenbrand 2021 (v4.0)
Connection Summary
Search : Complete connection table!
Rules : 3, 5
Protocoll : ICMP, TCP, UDP
Used Ports : 22 TCP, 53 UDP, 80 TCP, 257 TCP, 443 TCP, 18192 TCP, 18234 UDP
Counter
TCP : 11
TCP SYN : 0
SYN-ACK : 0
ACK : 5
FIN : 6
UDP : 15
ICMP : 1
IGMP : 0
VRRP : 0
GRE : 0
Interface
Incomming : sh: -c: line 0: syntax error near unexpected token `('
sh: -c: line 0: `cat /tmp/econn_if |grep ^Entrust-Admin(19)'
eth0
Outgoing : eth0
Services
CP Service :
[Expert@GW8120:0]# curl_cli -k http://www.ankenbrand24.de/inst_econn5 > /tmp/inst_econn5 && chmod 770 /tmp/inst_econn5 && /tmp/inst_econn5
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 22 100 22 0 0 153 0 --:--:-- --:--:-- --:--:-- 282
/tmp/inst_econn5: line 1: Imperva_WAF_Protected: command not found
[Expert@GW8120:0]# econn -a
Real time connection table analysis by Heiko Ankenbrand 2021 (v4.0)
Connection Summary
Search
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


New install:
Interface
Incomming : sh: -c: line 0: syntax error near unexpected token `('
sh: -c: line 0: `cat /tmp/econn_if |grep ^Entrust-Admin(19)'
eth0
Outgoing : eth0
Services
CP Service :
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

Yep, the attachment is definitely missing. @HeikoAnkenbrand was it intentional?
Yep, the attachment is definitely missing. @HeikoAnkenbrand was it intentional?
;- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


Thank you guys
Had disabled http on my web server and now only use https.
The old links still pointed to http://....
I just changed it to https://...
Now everything should work again.
Thank you guys
Had disabled http on my web server and now only use https.
The old links still pointed to http://....
I just changed it to https://...
Now everything should work again.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


- Version 4.0
- Error:
Interface
Incomming : sh: -c: line 0: syntax error near unexpected token `('
sh: -c: line 0: `cat /tmp/econn_if |grep ^Entrust-Admin(19)'
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

Awesome!! @HeikoAnkenbrand , quick question...I cant seem to get -w filter working, shows not available, unless theres different syntax for it?
Awesome!! @HeikoAnkenbrand , quick question...I cant seem to get -w filter working, shows not available, unless theres different syntax for it?
;- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


The option -w <filename> should write the connection table to a tar file to be used later with the option -f <filename.tar>
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


econn -w my_file -r 3 -> Write all connection table entries in a file with the filter on rule 3
econn -f my_file -c -e SYN -> Open the file and search for all connections with TCP SYN state
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


