- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
Hi Guys
Is it possible to run a "fw monitor" from the VS0 of a VSX Cluster environment?
I have several VS's, and I want to capture traffic from a particular VS (VS 5).
Is this possible, without having to "jump" to the instance?
Can you share with me the syntax of the command, how it could be done, based on the following example:
Source: 172.16.10.5
Destination: 10.100.20.10
Port: TCP 8080
Thanks
This is all you need:
Under Check Point -> FW Monitor -> New version
There you go buddy 🙂
fw monitor -v 5 -o vs5.cap -F "172.16.10.5,0,10.100.20.10,8080,0"
Andy
fw monitor -v 0 -e accept "host 172.16.10.5 and host 10.200.20.10 and port 8080;"
This applies if you are ‘standing’ on VS0 and want to capture traffic from VS 5?
Just replace 0 with 5 🙂
The command syntax varies greatly if you need to send the command result to a file such as Wireshark?
Just add -o /path/filename.cap at the end
This is all you need:
Under Check Point -> FW Monitor -> New version
There you go buddy 🙂
fw monitor -v 5 -o vs5.cap -F "172.16.10.5,0,10.100.20.10,8080,0"
Andy
One doubt, is there much difference in the ‘fw monitor ...’ command between using the -e vs -F parameter?
Is one better than the other?
Buddy,
Have a look at your own post 😉
Andy
https://community.checkpoint.com/t5/Security-Gateways/Traffic-capture-with-FW-MONITOR/m-p/245408
Use -F if you can deal with the extremely limited matching syntax. You will always get a complete capture regardless of the acceleration state of the traffic.
Hello,
So, as a "best practice" it is always better to use the "-F" before the "-e"?
Greetings.
I'd say so, there are still some limited situations where -e is needed instead but they are fairly obscure. The upcoming CCTA R82 class is being heavily updated to explore packet capturing & analysis in detail, and it covers this very topic.
For what its worth, I usually use -F flag and works real well.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 22 | |
| 16 | |
| 10 | |
| 9 | |
| 9 | |
| 7 | |
| 7 | |
| 7 | |
| 6 | |
| 6 |
Thu 30 Oct 2025 @ 03:00 PM (CET)
Cloud Security Under Siege: Critical Insights from the 2025 Security Landscape - EMEAThu 30 Oct 2025 @ 11:00 AM (EDT)
Tips and Tricks 2025 #15: Become a Threat Exposure Management Power User!Thu 30 Oct 2025 @ 02:00 PM (EDT)
Cloud Security Under Siege: Critical Insights from the 2025 Security Landscape - AMERThu 30 Oct 2025 @ 03:00 PM (CET)
Cloud Security Under Siege: Critical Insights from the 2025 Security Landscape - EMEAThu 30 Oct 2025 @ 11:00 AM (EDT)
Tips and Tricks 2025 #15: Become a Threat Exposure Management Power User!Thu 30 Oct 2025 @ 02:00 PM (EDT)
Cloud Security Under Siege: Critical Insights from the 2025 Security Landscape - AMERWed 05 Nov 2025 @ 11:00 AM (EST)
TechTalk: Access Control and Threat Prevention Best PracticesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY