>-----Original Message-----
>From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
>Sent: 7. mars 2001 23:24
>To: FW1-MailingList (E-mail)
>Subject: [FW1] Active connections
>
>
>
>Hi everybody,
>
>Is there any checkpoint command which can give me the active >connections
as well as the type of these connections. For >example are they http, ftp,
ssl, smtp etc..
>Is look like that ./fw tab -s connections -t command is giving only
virtual connections
>
>I'll appreciate any suggestions
>Thanks
>
>Kiril
You should be able to use the output of the fw tab -t connections - command.
Below you will find an explanation on how you should read the output. Hope
that will help you.
/erik
*********************cut/paste check point ATRG41*********************
The basic structure of a connection in a table entry
Many tables store entries that represent connections. In those tables, the
first five fields follow a common standard. An example of these five fields
is shown below along with the meaning of each field.. Other connections in
other tables will, in most cases, contain the same five key fields but will
store different field values. These first five fields are known as the "key"
part of the table entry.
<c7cb4764, 0000008a, c7cb47ff, 00000050, 00000006 ... >
Field Example value Description
1 c7cb4764 Source IP address
2 0000008a Source port
3 c7cb47ff Destination IP address
4 00000050 Destination port
5 00000006 IP protocol number, as defined in RFC 1700 (11 -
UDP, 6 - TCP 1 - ICMP...)
Note: FireWall-1 is able to search on the "key" entries of the table.
connections table
The connections table contains data on all active connections.
Example
attributes: refresh, expires 60, expcall 133279992 4, implies 2, kbuf 1,
hashsize 8192
<c7cb4764, 0000008a, c7cb47ff, 00000000, 00000011; 00000000, 00000002,
00000000; 39/40>
<c7cb4765, 0000008a, c7cb47ff, 00000000, 00000011; 00000000, 00000002,
00000000; 37/40>
The connections table uses the following format:
Field Example value Description
1. c7cb4764 source IP address
2. 0000008a source port
3. c7cb47ff destination IP address
4. 00000000 destination port
5. 00000011 IP protocol
6. 00000000 r_ckey.
This field is a pointer to the encryption key if the connection is
encrypted, otherwise it is NULL
7. 00000002 r_ctype. Described below
8. 00000000 r_cflags. Described below
9. 39/40 time left/total time. There are x of y seconds left until
the entry times out and is deleted from the table
r_ctype
The r_ctype field contains eight hexadecimal digits in the form 0000klmn.
The last four digits of the value are interpreted using the tables below.
Value of 'n' Description
1 TCP connection
2 UDP connection
3 Connection is encrypted
4 Reverse connection is encrypted
Value of 'm' Description
0 Other
8 IPSec connection
Value of 'l' Description
0 Match by protocol (the most common value)
1 Match by offset (never used)
2 Match by RPC (for RPC connections)
3 Match by getport (for RPC connections)
4 Match by callit (for RPC connections)
5 Match by seq/ack change (for encrypted/NATed connections
where the SEQ/ACK numbers may be changed.
Digit 'k' is interpreted as four binary digits of the form 0xyz. If a bit in
any position is set to 1, the
corresponding value in the table below is assumed.
Bit of digit 'k' Description
0 First bit is always 0
x Established TCP connection
y FIN sent in reverse connection (by the destination)
z FIN sent in forward connection (by the source)
r_cflags
The r_cflags field contains eight hexadecimal digits that should be
interpreted as four bytes of the form ghij. The values of g, h, i and j are
interpreted using the tables below. Byte j is interpreted as eight binary
digits of the form PQRSTUVW. If a bit in any position is set to 1, the
corresponding value in the table below is assumed.
Bit of byte 'j' Description
P Accounting flag (0 if the connection has no accounting)
Q Accounting flag (0 if the connection has no accounting)
R Accounting flag (0 if the connection has no accounting)
S More inspection needed for this connection (has prologue)
T Reverse connection accepted without going through Rule Base
U Connection accepted without going through Rule Base
V One way connection (only the destination sends data)
W One way connection (only the source sends data)
Byte i may have the following values:
Hexadecimal value Description
0x66, 0x67 IIOP connections
0x82 clear FTP PORT command
0x83 encrypted FTP PORT command
0x84 FTP PASV command
0x86 RSH stderr connection
0x88 H.245 connection
Hexadecimal value Description
0x90, 0x91, 0x92, 0x93, 0x94, 0x95 Xtreme connections
0xa1 VDOlive connection
0xa3, 0xa4, 0xa5 RealAudio / RTSP connections
0xa8 RTP connection
0xaa NetShow connection
0x00 Any other connection
Byte h holds the interface ID (the number of the interface in "fw ctl
iflist") of the interface in the direction of the destination. Byte g holds
the interface ID (the number of the interface in "fw ctl iflist") of the
interface in the direction of the source.
*****************************************end********************************
**********
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================