- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hi Guys
Is it possible to run a "fw monitor" from the VS0 of a VSX Cluster environment?
I have several VS's, and I want to capture traffic from a particular VS (VS 5).
Is this possible, without having to "jump" to the instance?
Can you share with me the syntax of the command, how it could be done, based on the following example:
Source: 172.16.10.5
Destination: 10.100.20.10
Port: TCP 8080
Thanks
This is all you need:
Under Check Point -> FW Monitor -> New version
There you go buddy 🙂
fw monitor -v 5 -o vs5.cap -F "172.16.10.5,0,10.100.20.10,8080,0"
Andy
fw monitor -v 0 -e accept "host 172.16.10.5 and host 10.200.20.10 and port 8080;"
This applies if you are ‘standing’ on VS0 and want to capture traffic from VS 5?
Just replace 0 with 5 🙂
The command syntax varies greatly if you need to send the command result to a file such as Wireshark?
Just add -o /path/filename.cap at the end
This is all you need:
Under Check Point -> FW Monitor -> New version
There you go buddy 🙂
fw monitor -v 5 -o vs5.cap -F "172.16.10.5,0,10.100.20.10,8080,0"
Andy
One doubt, is there much difference in the ‘fw monitor ...’ command between using the -e vs -F parameter?
Is one better than the other?
Buddy,
Have a look at your own post 😉
Andy
https://community.checkpoint.com/t5/Security-Gateways/Traffic-capture-with-FW-MONITOR/m-p/245408
Use -F if you can deal with the extremely limited matching syntax. You will always get a complete capture regardless of the acceleration state of the traffic.
Hello,
So, as a "best practice" it is always better to use the "-F" before the "-e"?
Greetings.
I'd say so, there are still some limited situations where -e is needed instead but they are fairly obscure. The upcoming CCTA R82 class is being heavily updated to explore packet capturing & analysis in detail, and it covers this very topic.
For what its worth, I usually use -F flag and works real well.
Andy
@Matlu Did command we shared work for you?
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 66 | |
| 19 | |
| 13 | |
| 12 | |
| 11 | |
| 9 | |
| 9 | |
| 7 | |
| 7 | |
| 7 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY