- Products
- Learn
- Local User Groups
- Partners
- More
Secure Your AI Transformation
9 April @ 12pm SGT / 3pm CET / 2PM EDT
AI Security Masters E6: When AI Goes Wrong -
Hallucinations, Jailbreaks, and the Curious Behavior of AI Agents
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hi All.
Is it available some document or content about fw ctl chain outputs? I'd like to understant deeply all columns and fields (module, chain position, function pointer, mode, etc). The concept about chain modules is a bit complicated.
Regards.
Hi @valterj,
Unfortunately, there is no overview of the chain modules.
However, you can find some information in the CCTE training materials.
I have written a few articles on the new parameters. Maybe that will help you:
- R8x - Security Gateway Architecture (Logical Packet Flow)
- R80.20 - New FW Monitor inspection points
- R80.20 - New Chain Modules?
- R80.20 - SecureXL + new chain modules + fw monitor
You can also found more information here:
Performance Tuning R81 Administration Guide -> fw monitor
SecureXL has been significantly revised in R80.20. It now works in user space. This has also led to some changes in "fw monitor"
There are new fw monitor chain (SecureXL) objects that do not run in the virtual machine.
The new fw monitor chain modules (SecureXL) do not run in the virtual machine (vm).
SecureXL inbound (sxl_in) > Packet received in SecureXL from network
SecureXL inbound CT (sxl_ct) > Accelerated packets moved from inbound to outbound processing (post routing)
SecureXL outbound (sxl_out) > Accelerated packet starts outbound processing
SecureXL deliver (sxl_deliver) > SecureXL transmits accelerated packet
There are more new chain modules in R80.20
vpn before offload (vpn_in) > FW inbound preparing the tunnel for offloading the packet (along with the connection)
fw offload inbound (offload_in) > FW inbound that perform the offload
fw post VM inbound (post_vm) > Packet was not offloaded (slow path) - continue processing in FW inbound
---
There are new fw monitor inspection points when a packet passes through a R80.20+ Security Gateway:
| Inspection point | Name of fw monitor inspection point | Relation to firewall VM | Available since version |
|---|---|---|---|
| i | Pre-Inbound | Before the inbound FireWall VM (for example, eth1:i) |
always |
| I | Post-Inbound | After the inbound FireWall VM (for example, eth1:I) |
always |
| id | Pre-Inbound VPN | Inbound before decrypt (for example, eth1:id) |
R80.20 |
| ID | Post-Inbound VPN | Inbound after decrypt (for example, eth1:ID) |
R80.20 |
| iq | Pre-Inbound QoS | Inbound before QoS (for example, eth1:iq) |
R80.20 |
| IQ | Post-Inbound QoS | Inbound after QoS (for example, eth1:IQ) |
R80.20 |
| o | Pre-Outbound | Before the outbound FireWall VM (for example, eth1:o) |
always |
| O | Post-Outbound | After the outbound FireWall VM (for example, eth1:O) |
always |
|
e oe |
Pre-Outbound VPN |
Outbound before encrypt (for example, (for example, |
R80.10 R80.20 |
|
E OE |
Post-Outbound VPN |
Outbound after encrypt (for example, (for example, |
R80.10 R80.20 |
| oq | Pre-Outbound QoS | Outbound before QoS (for example, eth1:oq) |
R80.20 |
| OQ | Post-Outbound QoS | Outbound after QoS (for example, eth1:OQ) |
R80.20 |
---
New in R80.20+:
In Firewall kernel (now also SecureXL), each kernel is associated with a key witch specifies the type of traffic applicable to the chain modul.
| Key | Function |
|---|---|
| ffffffff | all packets |
| 00000001 | stateful mode |
| 00000002 | wire mode |
| 00000003 | all packets |
| 00000000 | SecureXL offloading |
I wonder where did you get this Heiko 🙂
I have changed it!
Sorry, copy and paste issue 😉
For example, if you add "fw monitor" chain hooks in a certain position, they will also appear as "fff...ff", which means, your understanding of that key is a guess. "00..01" is also just stateful mode, nothing else. "00..00" is indeed used to for re-injecting accelerated traffic back to SXL.
Heiko explained it better than anyone would...but sadly, there is no official CP document explaining the output of fw ctl chain as he stated.
Though, I did find below and it seems very informative:
A detailed description of the inspection points would be very helpful. Maybe is there a good PDF document or SK that Check Point can publish?
I appreciate your curiosity. The exact output is only relevant to kernel developers and TAC, and might only complicate things, but here is your answer:
1 – stateful mode
2 – wired mode
3 – all packets
fff...ff – al packets (same as 3)
Some additional info about the models themselves is here: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
Once again, unless you are debugging a support case, this is 90% irrelevant
Perfect. I was just trying to understant better how chain modules and inspection happens.
Regards.
Valter Junior
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 69 | |
| 35 | |
| 16 | |
| 15 | |
| 13 | |
| 13 | |
| 10 | |
| 10 | |
| 9 | |
| 8 |
Tue 07 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Check Point WAF and IO River: Multi-CDN Security in ActionWed 08 Apr 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: The Cloud Firewall with near 100% Zero Day prevention - In 7 LanguagesWed 08 Apr 2026 @ 07:00 PM (CST)
ERM al Descubierto: Amenazas Ocultas que Pondrán a Prueba tu Empresa en 2026Tue 07 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Check Point WAF and IO River: Multi-CDN Security in ActionWed 08 Apr 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: The Cloud Firewall with near 100% Zero Day prevention - In 7 LanguagesWed 08 Apr 2026 @ 07:00 PM (CST)
ERM al Descubierto: Amenazas Ocultas que Pondrán a Prueba tu Empresa en 2026Tue 14 Apr 2026 @ 03:00 PM (PDT)
Renton, WA: Securing The AI Transformation and Exposure ManagementThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY