Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 

Zdebug drop script

the_rock
MVP Platinum
MVP Platinum

This script does exact same thing as if you were to run the actual command itself, but, PLEASE be careful, because this one does generic debug, not grep for any IP address. dos2unix and chmod 777 required to run it. MAKE SURE to run fw ctl debug 0 afterwards to turn the debugs off.

See the output from my lab fw:


[Expert@CP-GW:0]# ./cp_watch_drops.sh
Defaulting all kernel debugging options, may take a while
Debug state was reset to default.
PPAK 0: Get before set operation succeeded of

...;
TO ACCESS CHECKMATES TOOLBOX it's simple and free

Disclaimer: Check Point does not provide maintenance services or technical or customer support for third party content provided on this Site, including in CheckMates Toolbox. See also our Third Party Software Disclaimer.




0 Kudos
2 Replies

Timothy_Hall
MVP Gold
MVP Gold

You may want to add a "+" to the command like this: fw ctl zdebug + drop.  Without the +, drops that occur on the SND cores will not appear; only drops on the Firewall Workers (mainly from rules being hit with a Drop action) will appear. Drops almost always happen on the Firewall Worker cores.  Packet drops in the Check Point SecureXL code on SND cores are rare but can occur when DoS protections, such as the SecureXL Penalty Box or Drop Templates, are configured.

;
TO ACCESS CHECKMATES TOOLBOX it's simple and free


the_rock
MVP Platinum
MVP Platinum

Thanks Tim.

;
TO ACCESS CHECKMATES TOOLBOX it's simple and free


0 Kudos