- CheckMates
- :
- Products
- :
- Quantum
- :
- Security Gateways
- :
- Re: Packet Flow in Checkpoint Firewall
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Packet Flow in Checkpoint Firewall
Hello All,
I am very confused with the packet flow of checkpoint firewall. I have seen in many places fw ctl chain is referred to understand the packet flow but I am not able to interpret it.
Could someone please help me in understanding the packet flow in terms of
SAM
IP spoofing
Policy lookup
Dst NAT
route lookup
Src NAT
VPN
etc..
Even better if we can connect it with the output of fw ctl chain
I would really appreciate any comment.
- Tags:
- packet flow
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
here you find everything (almost!) what you need reg. the CP packet flow:
sk116255
also Heiko Ankenbrand posted some very useful diagrams recently ... look them up here
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Jerry,
I know it's an old post, but do you happen to know any other link which might help me to see those packets get dropped.
e.g: when the initial packet enters the slow path and gets dropped due to a missing firewall policy, how can I look this up.
if I run fw mon, I would only see the packet "i", but it has two places where the packet could get discarded. how to know it got discarded due to policy and not "drop template".
thanks a lot
Lance (Sonicwall :))
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Command fw ctl zdebug + drop will show you all live packet drops in both SecureXL and the INSPECT Firewall Instances and why.
March 27th with sessions for both the EMEA and Americas time zones
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thank you Very much to all of you. Got the answer. Thanks again
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
👍
