Understanding how a particular connection is matched through your security policy is vital. There is now a tool for that, Check Point Packet Injector.
This utility is executed on the Security Gateway, simulating packets arriving from the sender on their way to the target host. After the packets are sent, Packet Injector listens for response packets from the target host back to the sender passing through the Security Gateway, letting the user know they arrived.
For more details, please refer to the article.