![]() ![]() Note: this field is irrelevant for analysis. You can use these filters in Wireshark to analyze the traffic captured with the FW Monitor tool: Field Name Left-click and hold this new line - drag the line to the desired position (recommended position is between the ' Destination' and ' Protocol').Double-click the type ' Numbers' - choose ' FW-1 monitor if/direction'.Double-click the title ' New Column' - assign a name (e.g., FW-1).Go to ' Appearance' (in v2.x) / ' User Interface' (in v1.x) - click ' Columns' - click ' +' / ' Add' button - a new line is added at the bottom of the list:.Go to ' Protocols' - click ' Ethernet' - select the box ' Attempt to interpret as FireWall-1 Monitor File' - click ' Apply'.From the top, click the ' Edit' menu - click ' Preferences.'.Check Point recommends using the latest version of the Wireshark application to analyze FW Monitor packet captures.Ĭonfigure the Wireshark application to show the Check Point FireWall chains: Note: The CPEthereal application is no longer developed. As of version 0.10.0, the Wireshark application is able to view Check Point FireWall chains in an FW Monitor packet capture in the same way CPEthereal application can.
0 Comments
Leave a Reply. |