Checkpoints Commands
Checkpoints Commands
tcpdump or fw monitor
Dumps current TCP/IP activity to the terminal. Conrol+C to stop logging.
For SecuRemote Client use: sr monitor
To see total packets dropped / passed use:
fw stat -i &endash;l
fw debug
This option writes debuging info to the local log ($FWDIR/log/*.elg)
fw debug fwd on Start writing debug information.
fw debug fwd off Stop writing debug information.
(The debug output is automatically redirected to $FWDIR/log/fwd.elg.)
Syntax:
fw debug fwd on
fw debug fwd on TDERROR_ALL_ALL=3
fw debug fwd off
fw debug fwm on OPSEC_DEBUG_LEVEL
fw debug mdq on (Usefull to see why mail is being dropped, might want to try "fw
debug in.asmtpd on" as well)
fw ctl arp
View proxy arp entries
In 4.1 and earlier releases, or in NG if manual NAT is used, you can use the
command 'arp -s' to add an "proxy" arp entry in Unix. See 'man arp'= for more
information. To use 'arp -s', you will need to know the MAC address of the external
interface. In Unix, use 'ifconfig -a' to get that information.
fw ctl debug &endash;m fw memory : Assign the debug option memory for the fw
module:
fw ctl debug &endash;m fw : Verify that the debug option memory is assigned to the
fw module.
fw tab -s
Examine the firewall kernel tables counts. Look for a table with high counts.
cpstat fw -f smtp
SMTP statistics can be viewed
cpinfo
cpinfo is used to collect information that is used for debugging and solving VPN-
1/FireWall-1 problems. cpinfo gathers information on the system parameters of the
machine on which VPN-1/FireWall-1 is installed, and on VPN-1/FireWall-1 parameters
such as interfaces and tables. cpinfo gathers the information by running operating
system and VPN-1/FireWall-1 commands and. The resulting file will usually be sent
to Check Point Support ([email protected]) for analysis.
netstat &endash;na
To check whether SIC is listening to its network port.
netstat -na | find "18211" (Windows)
netstat -na | grep 18211 (Linux)
netstat &endash;r
Displays the routing table.
cpd &endash;d
To verify that the module is listening. Might give some clues regarding SIC
communications.
fw lichosts
Determin the number of IP's behind the firewall, usefull if you've got a node
limited license
fw log
There are four modes for showing the log database. These modes are used for support
purposes, and make it possible to compare log events seen in the Log Viewer to the
actual log records in the VPN-1/FireWall-1 log database (fw.log or any other log
switch log file).
Syntax:
fw log -m initial
fw log -m raw
fw log -m semi
fw log -m account
fw log &endash;f : Displays the log continuously.
cpmad -f
Two cpmad process cannot normally run simultaneously. If there is a need to run a
second cpmad process, run it with the &endash;f switch.
dbedit
The utility (dbedit) allows administrators to make changes to the objects_5_0.C
file like creating or modifying properties.
Syntax:
create
modify
rename
update
delete
print
addelement
rmelement
Fw tab &endash;t
Displays firewall state tables
fwm psload
The fw psload command is run on the Management Server. It installs the Desktop
Security policy on the Policy Server.
fwm psfetch
The fw psfetch command is run on the VPN/FireWall Module. It fetches the Desktop
Security policy from the Management Server
fwm fingerprint
Running the fw fingerprint command on the Management Server displays the
Management Server�s fingerprint.
fwd -d
Running fwd manually with the '-d' parameter will give you a lot more information
debug information in the cpwd.elg log file.
cphaprob state
Status of high availability modules, shows which gateway is active, standby and
down
netsod
Verifying the UAG Daemon is operating properly
Syntax:
netsod d #initialize uas daemon
netsod drv #uas driver commands
netsod query #perform command line uas query command
netsod update #perform command line uas update command
netsod kill #terminate uas daemon
netsod simple #initialize uas simple proxy
netsod simplekill #terminate uas simple proxy
netsod ver # display the uas version
numbernetsod debug # Turn on/off UAS debug printings
kill
Use kill &endash;9 pid where the pid is from top or from ps aux. (First try to
reboot system, killing a kernel process will leave the firewall in an unstable
state)
ps &endash;al
List current processes and the path, eg:
ps -ef | grep httpd ps list running processes, grep reads the output of ps and
prints only those lines containing the letters httpd.
top
Displays running processes and system uptime. (When running the top command from a
remote ssh connection, use the export TERM=vt100 command to resolve display issues)
free
Displays memory and swap file useage
last
last user login
dmesg
Displays system messages and hardware details
Networking
To add a route:
route add -net 192.168.22.0 netmask 255.255.255.0 gw 192.168.22.254
To delete a route
route del -net 192.168.22.0 netmask 255.255.255.0 gw 192.168.22.254
Verify connectivity:
ping 192.168.22.254
Use to stop pinging
Environment Variables
Example:
Only files on path (i.e. in directories listed in the PATH variable) can be
executed directly. Thus to execute a command in a directory that is not on path,
you must specify the path. Alternatively, rather than add a directory to PATH, you
can make a symbolic link to the script in a directory which is already on path such
as /usr/bin/ or /usr/local/bin/. It may even be easier just to move the script file
to one of these directories.
If /sbin is in the path then users can use the command, if not and you want to add
them you would need to add it to their profile.
vi /etc/profile
add or modify PATH variable:
PATH=$PATH:/sbin
SecuRemote Client
Configure the dialer to run scc.exe after connection has been made to establish VPN
tunnel. EG: Scc cn Jgreen >>>>>>> Jgreen is the profile name
fdisk /dev/hda
Displays Partition Tables for first IDE hard disk
fdisk /dev/hda &endash;l (Only prints the partition table)
(df is a safer command to use)
Log Files
In general, each NG log file is composed of four files:
xx.log &emdash; stores the log records
Troubleshooting
xx.logptr &emdash; pointers to beginning of each log records
xx.loginitial_ptr &emdash; pointers to beginning of each log chain (logs with the
same connection id) ,
xx.logaccount_ptr &emdash; pointers to beginning of each accounting record.
In the case of the audit log file the files are xx.adtlog, xx.adtlogptr,
xx.adtloginitial_ptr, and xx.adtlogaccount_ptr.
df Displays drive and partition info (df -h - Displays in human readable format)
rm (-R) Removes a file (-R forces delete of non empty directories, (f switch
disables prompting of file deleting: WARNING use -Rf with care, )
cp Copies files, (-r &emdash; recursive. copy the whole directory tree,
subdirectories and all)
cd Change Directories
fsck -a -p /dev/hda1 Does a disk check (Find partitions using the df command)
touch file1 file2 file3 creates files file1 file2 file3 or updates their time stamp
if they already exist.
find /home -name httpd.conf searches /home and its subdirectories for the file
httpd.conf.
Tip:
SSH File Transfer provides file editing and copying in an Windows environment. You
can download it from here:
http://www.ssh.com/support/downloads/secureshellwks/non-commercial.html
(for non-commercial use)
I prefer WinSCP a much better tool and suitable for commercial use.
http://winscp.vse.cz/eng/
But one caveat with editing files on a Windows/DOS machine is that there is
a potential danger that those non-Unix editors are messing with the
end-of-line markers in the text file (only LF (0Ah) in Unix, CR-LF
(0Dh-0Ah) in DOS/Windows) and can cause the resulting file not to work.
Still a great way to navigate and copy files over a secure tunnel.