
As of March 2022, Wireshark does not show these chains. For any changes in this functionality, submit the relevant request on the Wireshark web site.įor example, the R80.20 version added new chains - Pre-Outbound VPN Encryption "e", Post-Outbound VPN Encryption "E", Pre-Inbound VPN Decryption "d", Post-Inbound VPN Decryption "D", Pre-QoS "q", and Post-QoS "Q". The ability to show the Inbound and Outbound Chains from the FW Monitor capture is built into Wireshark by its vendor. Note: this field is irrelevant for analysis. During a Wireshark packet capture, hardware forwarding happens concurrently.

You can use these filters in Wireshark to analyze the traffic captured with the FW Monitor tool: Field Name Left-click and hold this new line - drag the line to the desired position (recommended position is between the ' Destination' and ' Protocol').Double-click the type ' Numbers' - choose ' FW-1 monitor if/direction'.Double-click the title ' New Column' - assign a name (e.g., FW-1).Go to ' Appearance' (in v2.x) / ' User Interface' (in v1.x) - click ' Columns' - click ' +' / ' Add' button - a new line is added at the bottom of the list:.Go to ' Protocols' - click ' Ethernet' - select the box ' Attempt to interpret as FireWall-1 Monitor File' - click ' Apply'.From the top, click the ' Edit' menu - click ' Preferences.'.

Check Point recommends using the latest version of the Wireshark application to analyze FW Monitor packet captures.Ĭonfigure the Wireshark application to show the Check Point FireWall chains: Note: The CPEthereal application is no longer developed. As of version 0.10.0, the Wireshark application is able to view Check Point FireWall chains in an FW Monitor packet capture in the same way CPEthereal application can.
