Security Analysis

Monday, 4 February 2013

Network Troubleshooting – Check Point



Route –n > routes.txt

ifconfig  -a > interfaces.txt

SecureXL is enabled or disabled <check on cpconfig>

fw monitor -e "accept src=IP_Number or dst=IP_Number;" -o monitor.out
fw ctl zdebug + drop > ctlzdebug.txt
fw ctl zdebug + dtop > ctlzdebug2.txt

[to stop the logging  “Ctrl + C”]
Posted by Ekin Tulga at 05:25
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Check Point

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

About Me

My photo
Ekin Tulga
View my complete profile

Blog Archive

  • ►  2014 (5)
    • ►  March (4)
    • ►  January (1)
  • ▼  2013 (19)
    • ►  September (2)
    • ►  August (3)
    • ►  July (2)
    • ►  May (1)
    • ▼  February (9)
      • Network Troubleshooting - Cisco Packet Flow
      • Identity Awareness - User & Machine Identification
      • IPS Update: ips scheduled update ended with errors
      • ClusterXL - Do not Consume Public IPs for ClusterXL
      • Smart Event & Reporter (CPU Peaks)
      • Check Point - Identity Awareness (Security Event L...
      • VPN Debugging – Check Point
      • Network Troubleshooting – Check Point
      • SmartDashboard Connectivity Issues
    • ►  January (2)
  • ►  2012 (19)
    • ►  December (5)
    • ►  October (3)
    • ►  September (8)
    • ►  May (1)
    • ►  February (2)

Labels

  • Check Point
  • Cisco
  • Fortinet
  • Penetration Testing
  • Python
  • Reverse Engineering
  • Tufin
Simple theme. Theme images by enot-poloskun. Powered by Blogger.