Daemon |
Section |
Information |
Firewall Blade |
fwd
|
Description |
- Logging
- Spawning child processes (e.g., vpnd)
|
Path |
$FWDIR/bin/fwd %FWDIR%\bin\fwd (R77.30 and lower) |
Log file |
$FWDIR/log/fwd.elg %FWDIR%\log\fwd.elg (R77.30 and lower) |
Notes |
- The "cpwd_admin list" command shows the process as "FWD".
- The "top" and "ps" commands might also show "fw" process and/or "fw_full" process, which are just wrappers for the "fwd" process.
|
To Stop |
-
Security Gateway:
cpwd_admin stop -name FWD -path "$FWDIR/bin/fw" -command "fw kill fwd" or cpstop
-
VSX Gateway:
[Expert@HostName:0]# vsenv <VSID> [Expert@HostName:<VSID>]# cpwd_admin stop -name FWD -ctx <VSID> -path "$FWDIR/bin/fw" -command "fw kill fwd" -env inherit or [Expert@HostName:0]# cpstop
|
To Start |
-
Security Gateway:
cpwd_admin start -name FWD -path "$FWDIR/bin/fw" -command "fwd" or cpstart
-
VSX Gateway:
[Expert@HostName:0]# vsenv <VSID> [Expert@HostName:<VSID>]# cpwd_admin start -name FWD -ctx <VSID> -path "$FWDIR/bin/fwd" -command "fwd" -env inherit or [Expert@HostName:0]# cpstart
|
Debug |
Refer to sk86321
- Start debug:
fw debug fwd on TDERROR_ALL_ALL=5 fw debug fwd on OPSEC_DEBUG_LEVEL=3
- Replicate the issue
- Stop debug:
fw debug fwd off TDERROR_ALL_ALL=0 fw debug fwd off OPSEC_DEBUG_LEVEL=0
- Analyze:
$FWDIR/log/fwd.elg*
|
IPSec VPN Blade |
vpnd
|
Description |
R81.10 and higher:
- The single vpnd daemon handles these VPN connections:
- All connections from non-IKE Remote Access clients (SSL Network Extender, Capsule VPN).
- Multi-Portal (SSL/TLS) traffic.
R81 and lower:
- The single vpnd daemon handles these VPN connections:
- IKE (UDP/TCP)
- NAT-T
- Tunnel Test
- Reliable Datagram Protocol (RDP)
- Topology Update for SecureClient
- SSL Network Extender (SNX)
- SSL Network Extender (SNX) Portal
- Remote Access Client configuration
- Visitor Mode
- L2TP
|
Path |
On Gaia OS / SecurePlatform OS / IPSO OS:
R77.30 and lower on Windows OS:
|
Log file |
R81.20 and higher:
- $FWDIR/log/vpnd.elg*
- $FWDIR/log/vpnd.ikev1trace*
- $FWDIR/log/vpnd.ikev2trace*
R81.10:
- $FWDIR/log/vpnd.elg*
- $FWDIR/log/legacy_ike.elg*
- $FWDIR/log/legacy_ikev2.xml*
R81 and R80.40:
- $FWDIR/log/vpnd.elg*
- $FWDIR/log/ike.elg*
- $FWDIR/log/ikev2.xmll*
R80.30 and lower:
- $FWDIR/log/vpnd.elg*
- $FWDIR/log/ike.elg*
R77.30 and lower on Windows OS:
- %FWDIR%\log\vpnd.elg
- %FWDIR%\log\ike.elg
|
Notes |
This process is not monitored by Check Point WatchDog |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
Refer to sk89940 |
iked
|
Description |
This process exists starting from the R81.10 version.
R81.20 and higher:
- The multiple iked daemons (iked0, iked1, and so on) handle these VPN connections:
- All connections from IKE Remote Access clients (for example, Endpoint clients).
- All IKE Site-to-Site connections from peer Security Gateways, and Large Scale VPN (LSV) connections.
- All connections from SmartLSM ROBO gateways.
- All connections from Security Gateways with a Dynamically Assigned IP Address (DAIP).
R81.10:
- The single iked daemon handles these VPN connections:
- All connections from IKE Remote Access clients (for example, Endpoint clients).
- All IKE Site-to-Site connections from peer Security Gateways, and Large Scale VPN (LSV) connections.
- All connections from SmartLSM ROBO gateways.
- All connections from Security Gateways with a Dynamically Assigned IP Address (DAIP).
|
Path |
$FWDIR/bin/ike |
Log file |
R81.20 and higher:
- $FWDIR/log/iked*.elg*
- $FWDIR/log/iked*.ikev1trace*
- $FWDIR/log/iked*.ikev2trace*
R81.10:
- $FWDIR/log/ike.elg*
- $FWDIR/log/iked.elg*
- $FWDIR/log/ikev2.xml*
|
Notes |
This process is not monitored by Check Point WatchDog |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
Refer to sk89940 |
cccd
|
Description |
This process exists starting from the R81.10 version.
The single cccd daemon is responsible for the Client Communication Channel (CCC) protocol, while:
- IKE for the same clients runs in the IKE daemons iked.
- The TLS layer of the CCC protocol for the same clients runs in the VPN daemon vpnd.
|
Path |
$FWDIR/bin/ccc |
Log file |
$FWDIR/log/cccd.elg |
Notes |
This process is not monitored by Check Point WatchDog |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
--- |
Mobile Access Blade |
cvpnd
|
Description |
Back-end daemon of the Mobile Access Software Blade. |
Path |
$CVPNDIR/bin/cvpnd |
Log file |
$CVPNDIR/log/cvpnd.elg |
Configuration file |
$CVPNDIR/conf/cvpnd.C |
Notes |
The "cpwd_admin list" command shows the process as "CVPND" |
To Stop |
cvpnstop |
To Start |
cvpnstart |
Debug |
"cvpnd_admin debug" - refer to sk104577, sk99053 |
dbwriter
|
Description |
Offloads database commands from cvpnd (to prevent locks) and synchronize with other members. |
Path |
$CVPNDIR/bin/dbwriter |
Log file |
$CVPNDIR/log/dbwriter.elg |
Configuration file |
$CVPNDIR/conf/dbwriter.C |
Notes |
The "cpwd_admin list" command shows the process as "DBWRITER" |
To Stop |
cvpnstop |
To Start |
cvpnstart |
cvpnproc
|
Description |
Offloads blocking commands from cvpnd (to prevent locks). Example: Sending DynamicID. |
Path |
$CVPNDIR/bin/cvpnproc |
Log file |
$CVPNDIR/log/cvpnproc.elg |
Configuration file |
$CVPNDIR/conf/cvpnproc.C |
Notes |
The "cpwd_admin list" command shows the process as "CVPNPROC" |
To Stop |
cvpnstop |
To Start |
cvpnstart |
Debug |
Refer to sk104577
- Stop Mobile Access:
cvpnstop
- Verify that cvpnproc process is not running:
ps aux | grep cvpnproc
- If the cvpnproc process is still running, then kill it:
kill -KILL $(pidof cvpnproc)
- Start cvpnproc process under debug to run in background (by running these 2 commands):
export TDERROR_ALL_ALL=5 $CVPNDIR/bin/cvpnproc $CVPNDIR/log/cvpnproc.elg $CVPNDIR/conf/cvpnproc.C &
- Start Mobile Access:
cvpnstart
- Replicate the issue
- Stop debug:
unset TDERROR_ALL_ALL
- Stop Mobile Access:
cvpnstop
- Kill cvpnproc process:
kill -TERM $(pidof cvpnproc) kill -KILL $(pidof cvpnproc)
- Start Mobile Access:
cvpnstart
- Analyze:
$CVPNDIR/log/cvpnproc.elg*
|
MoveFileServer
|
Description |
Move files between cluster members to perform database synchronization. |
Path |
$CVPNDIR/bin/MoveFileServer |
Log file |
$CVPNDIR/log/MFServer.log |
Configuration file |
$CVPNDIR/conf/mfserver.C |
Notes |
The "cpwd_admin list" command shows the process:
- In R77.30 and higher:
as "MFSERVER"
- In R77.20 and lower:
as "MOVEFILESERVER"
|
To Stop |
cvpnstop |
To Start |
cvpnstart |
MoveFileDemuxer
|
Description |
Related to MoveFileServer process (moving files between cluster members to perform database synchronization). |
Path |
$CVPNDIR/bin/MoveFileDemuxer |
Log file |
$CVPNDIR/log/MFDemux.log |
Configuration file |
$CVPNDIR/conf/mfdemuxer.C |
Notes |
The "cpwd_admin list" command shows the process:
- In R77.30 and higher:
as "MFDEMUXER"
- In R77.20 and lower:
as "MOVEFILEDEMUXER"
|
To Stop |
cvpnstop |
To Start |
cvpnstart |
Pinger
|
Description |
Reduces the number of httpd processes that perform ActiveSync. |
Path |
$CVPNDIR/bin/Pinger |
Log file |
$CVPNDIR/log/Pinger.log |
Configuration file |
$CVPNDIR/conf/Pinger.C |
Notes |
The "cpwd_admin list" command shows the process as "PINGER" |
To Stop |
cvpnstop |
To Start |
cvpnstart |
Debug |
Refer to sk104577
- Verify that Pinger process is running:
ps aux | grep Pinger
- Enable debug for relevant users:
PingerAdmin debug users <user1>,<user2>,<user3>
- Set the debug level:
PingerAdmin debug set TDERROR_ALL_Pinger=3 or PingerAdmin debug set TDERROR_ALL_ALL=5
- Set the debug type:
PingerAdmin debug type All
- Delete all files from $CVPNDIR/log/trace_log/ directory:
Note: Do NOT delete the directory itself! cd $CVPNDIR/log/trace_log/ rm -i *
- Enable trace log:
Warning: This might print passwords to local files! PingerAdmin debug trace on
- Start debug:
PingerAdmin debug on
- Replicate the issue
- Stop debug:
PingerAdmin debug off
- Disable trace log:
PingerAdmin debug trace off
- Reset the debug:
PingerAdmin debug reset
- Analyze:
$CVPNDIR/log/Pinger.log*
|
CvpnUMD
|
Description |
Reports SNMP connected users to AMON. |
Path |
$CVPNDIR/bin/CvpnUMD |
Log file |
$CVPNDIR/log/CvpnUMD.log |
Notes |
The "cpwd_admin list" command shows the process as "CVPNUMD" |
To Stop |
cvpnstop |
To Start |
cvpnstart |
httpd
|
Description |
Front-end daemon of the Mobile Access Software Blade (multi-processes). |
Path |
$CPDIR/web/Apache/2.2.0/bin/httpd |
Log file |
$CVPNDIR/log/httpd.log |
Configuration file |
$CVPNDIR/conf/httpd.conf |
To Stop |
cvpnstop |
To Start |
cvpnstart |
Debug |
Refer to sk104577, sk99053 |
fwpushd
|
Description |
Mobile Access Push Notifications daemon that is controlled by "fwpush" command. It is a child of the fwd daemon (in R77.10 and higher). |
Path |
$FWDIR/bin/fwpushd |
Log file |
$FWDIR/log/fwpushd.elg |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
- Enable debug:
fwpush debug on
- Set the debug options:
fwpush debug set all all
- Check the debug state:
fwpush debug stat
- Replicate the issue
- Reset the debug options:
fwpush debug reset
- Disable debug:
fwpush debug off
- Check the debug state:
fwpush debug stat
- Analyze:
$FWDIR/log/fwpushd.elg*
|
postgres
|
Description |
PostgreSQL server. Used by Remote Access Session Visibility and Management Utility. |
Path |
$CPDIR/database/postgresql/bin/postgres |
Configuration file |
/var/log$FWDIR/datadir/postgres/sessions/postgresql.conf |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
"su cp_postgres -c "$CPDIR/database/postgresql/bin/pg_ctl -D $RTDIR/events_db/data start"
Also refer to sk93970
|
Identity Awareness Blade |
pepd
|
Description |
Policy Enforcement Point daemon:
- Receiving identities via identity sharing
- Redirecting users to Captive Portal
|
Path |
$FWDIR/bin/pep |
Log file |
$FWDIR/log/pepd.elg |
Notes |
The "cpwd_admin list" command shows the process as "PEPD" |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
"pep debug" - refer to the Identity Awareness Administration Guide for your version |
pdpd
|
Description |
Policy Decision Point daemon:
- Acquiring identities from identity sources
- Sharing identities with another gateways
|
Path |
$FWDIR/bin/pdpd |
Log file |
$FWDIR/log/pdpd.elg |
Notes |
The "cpwd_admin list" command shows the process as "PDPD" |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
"pdp debug" - refer to the Identity Awareness Administration Guide for your version |
DLP Blade |
fwdlp
|
Description |
DLP core engine that performs the scanning / inspection. |
Path |
$FWDIR/bin/fwdlp |
Log file |
- $FWDIR/log/fwdlp.elg
- $DLPDIR/log/dlpe.log (refer to sk60387)
- $DLPDIR/log/dlpe_msg.log (refer to sk73660)
- $DLPDIR/log/dlpe_files_error.log
|
To Stop |
cpstop |
To Start |
cpstart |
Debug |
Refer to sk73660, sk60388:
- Start debug:
for PROC in $(pidof fwdlp) ; do fw debug $PROC on TDERROR_ALL_ALL=5 ; done
- Replicate the issue
- Stop debug:
for PROC in $(pidof fwdlp) ; do fw debug $PROC off TDERROR_ALL_ALL=0 ; done
- Analyze:
$FWDIR/log/fwdlp.elg*
|
cp_file_convert
|
Description |
Used to convert various file formats to simple textual format for scanning by the DLP engine. |
Path |
$FWDIR/bin/cp_file_convert |
Log file |
$FWDIR/log/cp_file_convertd.elg |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
Refer to sk73660:
- Start debug:
for PROC in $(pgrep cp_file_convert) ; do fw debug $PROC on TDERROR_ALL_ALL=5 ; done
- Replicate the issue
- Stop debug:
fw debug cp_file_convert off TDERROR_ALL_ALL=0
- Analyze:
- /var/log/jail/$FWDIR/log/cp_file_convertd.elg*
- $FWDIR/log/cp_file_convertd.elg*
|
dlp_fingerprint
|
Description |
Used to identify the data according to a unique signature known as a fingerprint stored in your repository. |
Path |
$FWDIR/bin/dlp_fingerprint |
To Stop |
cpstop |
To Start |
cpstart |
cserver
|
Description |
Check Server that either stops or processes the e-mail. |
Path |
$FWDIR/bin/cserver |
Log file |
$FWDIR/log/cserver.elg |
Notes |
The "cpwd_admin list" command shows the process as "DLP_WS" |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
Refer to sk73660:
- Start debug:
fw debug cserver on TDERROR_ALL_ALL=5
- Replicate the issue
- Stop debug:
fw debug cserver off TDERROR_ALL_ALL=0
- Analyze:
$FWDIR/log/cserver.elg*
|
dlpu
|
Description |
Receives data from the Check Point kernel. |
Path |
$FWDIR/bin/dlpu |
Log file |
$FWDIR/log/dlpu.elg |
Notes |
The "cpwd_admin list" command shows the process as "DLPU_<N>" |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
Refer to sk73660:
- Start debug:
for PROC in $(pidof dlpu) ; do fw debug $PROC on TDERROR_ALL_ALL=5 ; done
- Replicate the issue
- Stop debug:
for PROC in $(pidof dlpu) ; do fw debug $PROC off TDERROR_ALL_ALL=0 ; done
- Analyze:
$FWDIR/log/dlpu.elg*
|
fwucd
|
Description |
UserCheck back-end daemon that sends approval / disapproval requests to user. |
Path |
$FWDIR/bin/fwucd |
Log file |
$FWDIR/log/fwucd.elg |
Notes |
The "cpwd_admin list" command shows the process as "FWUCD" |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
Refer to sk73660, sk60388:
- Start debug:
fw debug fwucd on TDERROR_ALL_ALL=5
- Replicate the issue
- Stop debug:
fw debug fwucd off TDERROR_ALL_ALL=0
- Analyze:
$FWDIR/log/fwucd.elg*
|
usrchkd
|
Description |
Main UserCheck daemon, which deals with UserCheck requests (from CLI / from the user) that are sent from the UserCheck Web Portal. |
Path |
$FWDIR/bin/usrchkd |
Log file |
$FWDIR/log/usrchkd.elg |
Configuration file |
- $FWDIR/conf/usrchkd.conf
- $FWDIR/orig/UCPortal/fwdir_conf/usrchkd.conf
- $FWDIR/conf/fwauthd.conf
|
Notes |
- This daemon is not monitored by Check Point WatchDog ("cpwd_admin list")
- This daemon is spawned by the FWD daemon
|
To Stop |
cpstop |
To Start |
cpstart |
To Restart |
killall usrchkd |
Debug |
Note: It might also be required to collect the relevant kernel debug.
- Start debug:
usrchk debug set all all
- Verify:
usrchk debug stat
- Replicate the issue.
- Stop debug:
usrchk debug off
- Analyze:
$FWDIR/log/usrchkd.elg*
|
usrchk
|
Description |
The CLI client for the UserCheck daemon USRCHKD (this process runs only when it is called explicitly). |
Path |
$FWDIR/bin/usrchk |
Log file |
$FWDIR/log/usrchk.elg |
Threat Emulation Blade |
ted
|
Description |
Threat Emulation daemon engine - responsible for emulating files and communication with the cloud. |
Path |
$FWDIR/teCurrentPack/temain |
Log file |
$FWDIR/log/ted.elg |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
"tecli debug" - refer to the Threat Prevention Administration Guide for your version |
dlpu
|
Description |
DLP process - receives data from Check Point kernel. |
Path |
$FWDIR/bin/dlpu |
Log file |
$FWDIR/log/dlpu.elg |
Notes |
The "cpwd_admin list" command shows the process as "DLPU_<N>" |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
Refer to sk73660:
- Start debug:
fw debug dlpu on TDERROR_ALL_ALL=5
- Replicate the issue
- Stop debug:
fw debug dlpu off TDERROR_ALL_ALL=0
- Analyze:
$FWDIR/log/dlpu.elg*
|
usrchkd
|
Description |
Main UserCheck daemon, which deals with UserCheck requests (from CLI / from the user) that are sent from the UserCheck Web Portal. |
Path |
$FWDIR/bin/usrchkd |
Log file |
$FWDIR/log/usrchkd.elg |
Configuration file |
- $FWDIR/conf/usrchkd.conf
- $FWDIR/orig/UCPortal/fwdir_conf/usrchkd.conf
- $FWDIR/conf/fwauthd.conf
|
Notes |
- This daemon is not monitored by Check Point WatchDog ("cpwd_admin list")
- This daemon is spawned by the FWD daemon
|
To Stop |
cpstop |
To Start |
cpstart |
To Restart |
killall usrchkd |
Debug |
Note: It might also be required to collect the relevant kernel debug.
- Start debug:
usrchk debug set all all
- Verify:
usrchk debug stat
- Replicate the issue.
- Stop debug:
usrchk debug off
- Analyze:
$FWDIR/log/usrchkd.elg*
|
usrchk
|
Description |
The CLI client for the UserCheck daemon USRCHKD (this process runs only when it is called explicitly). |
Path |
$FWDIR/bin/usrchk |
Log file |
$FWDIR/log/usrchk.elg |
scanengine_b
|
Description |
Third-party engine. |
Path |
$FWDIR/teCurrentPack/scanengine_b |
Log file |
$FWDIR/log/bdadvisor.elg |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
None |
scanengine_k
|
Description |
Third-party engine. |
Path |
$FWDIR/teCurrentPack/scanengine_k |
Log file |
$FWDIR/log/kavadvisor.elg |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
None |
scanengine_s
|
Description |
Third-party engine. |
Path |
$FWDIR/teCurrentPack/scanengine_s |
Log file |
$FWDIR/log/sopadvisor.elg |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
None |
Threat Extraction Blade |
scrub
|
Description |
Main CLI process for Threat Extraction. |
Path |
$FWDIR/bin/scrub |
Log file |
- $FWDIR/log/scrubd.elg
- /var/log/scrub/scrubd_messages
- $CPDIR/log/scrub_plg.log
|
Configuration file |
$FWDIR/conf/scrub_debug.conf |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
- Start Threat Extraction debug:
scrub debug on scrub debug set all all
- Verify Threat Extraction debug is enabled:
scrub debug stat
- Start debug of cp_file_convert daemon:
for PROC in $(pgrep cp_file_convert) ; do fw debug $PROC on TDERROR_ALL_ALL=5 ; done
- Replicate the issue
- Stop debug of cp_file_convert daemon:
for PROC in $(pgrep cp_file_convert) ; do fw debug $PROC off TDERROR_ALL_ALL=0 ; done
- Stop Threat Extraction debug:
scrub debug off scrub debug reset
- Verify Threat Extraction debug is disabled:
scrub debug stat
- Analyze:
$FWDIR/log/scrubd.elg* /var/log/jail/$FWDIR/log/scrub_cp_file_convertd.elg
|
scrubd
|
Description |
Main Threat Extraction daemon. |
Path |
$FWDIR/bin/scrubd |
Log file |
- $FWDIR/log/scrubd.elg
- /var/log/scrub/scrubd_messages
- $CPDIR/log/scrub_plg.log
|
Configuration file |
$FWDIR/conf/scrub_debug.conf |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
- Start Threat Extraction debug:
scrub debug on scrub debug set all all
- Verify Threat Extraction debug is enabled:
scrub debug stat
- Start debug of cp_file_convert daemon:
for PROC in $(pgrep cp_file_convert) ; do fw debug $PROC on TDERROR_ALL_ALL=5 ; done
- Replicate the issue
- Stop debug of cp_file_convert daemon:
for PROC in $(pgrep cp_file_convert) ; do fw debug $PROC off TDERROR_ALL_ALL=0 ; done
- Stop Threat Extraction debug:
scrub debug off scrub debug reset
- Verify Threat Extraction debug is disabled:
scrub debug stat
- Analyze:
$FWDIR/log/scrubd.elg* /var/log/jail/$FWDIR/log/scrub_cp_file_convertd.elg
|
scrub_cp_file_convertd
|
Description |
Used to convert various file formats to simple textual format for scanning by the DLP engine. |
Path |
$FWDIR/bin/cp_file_convert |
Log file |
- /var/log/jail/$FWDIR/log/scrub_cp_file_convertd.elg
- $FWDIR/log/cp_file_convert_start.log
|
To Stop |
cpstop |
To Start |
cpstart |
Debug |
- Start debug:
for PROC in $(pgrep cp_file_convert) ; do fw debug $PROC on TDERROR_ALL_ALL=5 ; done
- Replicate the issue
- Stop debug:
for PROC in $(pgrep cp_file_convert) ; do fw debug $PROC off TDERROR_ALL_ALL=0 ; done
- Analyze:
/var/log/jail/$FWDIR/log/scrub_cp_file_convertd.elg*
|
in.emaild.mta
|
Description |
E-Mail Security Server that receives e-mails sent by user and sends them to their destinations. |
Path |
$FWDIR/bin/fwssd |
Log file |
- $FWDIR/log/emaild.mta.elg
- /var/log/scrub/in.emaild.mta_messages
|
To Stop |
cpstop |
To Start |
cpstart |
Debug |
Refer to sk139892 - MTA Engine Debugging
|
usrchkd
|
Description |
Main UserCheck daemon, which deals with UserCheck requests (from CLI / from the user) that are sent from the UserCheck Web Portal. |
Path |
$FWDIR/bin/usrchkd |
Log file |
$FWDIR/log/usrchkd.elg |
Configuration file |
- $FWDIR/conf/usrchkd.conf
- $FWDIR/orig/UCPortal/fwdir_conf/usrchkd.conf
- $FWDIR/conf/fwauthd.conf
|
Notes |
- This daemon is not monitored by Check Point WatchDog ("cpwd_admin list")
- This daemon is spawned by the FWD daemon
|
To Stop |
cpstop |
To Start |
cpstart |
To Restart |
killall usrchkd |
Debug |
Note: It might also be required to collect the relevant kernel debug.
- Start debug:
usrchk debug set all all
- Verify:
usrchk debug stat
- Replicate the issue.
- Stop debug:
usrchk debug off
- Analyze:
$FWDIR/log/usrchkd.elg*
|
usrchk
|
Description |
The CLI client for the UserCheck daemon USRCHKD (this process runs only when it is called explicitly). |
Path |
$FWDIR/bin/usrchk |
Log file |
$FWDIR/log/usrchk.elg |
Infinity Threat Prevention Blade |
tp_conf_service
|
Description |
Updatable configuration service for Threat Prevention Software Blades (R80.40 and higher). |
Path |
$FWDIR/bin/tp_conf_service |
Notes |
The cpwd_admin list command shows the process as "TP_CONF_SERVICE" |
Log file |
$FWDIR/log/tp_conf.log |
To Stop |
cpstop |
To Start |
cpstart |
Configuration file |
$FWDIR/conf/tp_conf.json |
Debug |
- cpwd_admin stop -name TP_CONF_SERVICE
- cpwd_admin start -name TP_CONF_SERVICE -path $FWDIR/bin/tp_conf_service -command "tp_conf_service --conf=tp_conf.json --log=info"
|
tpd
|
Description |
Threat Prevention Daemon - communicates with the kernel and deals with User Space tasks (R80.40 and higher). |
Path |
$FWDIR/bin/tpd |
Log file |
$FWDIR/log/tpd.elg |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
- Start debug:
fw debug tpd on TDERROR_ALL_ALL=5
- Replicate the issue
- Stop debug:
fw debug tpd off TDERROR_ALL_ALL=0
- Analyze:
$FWDIR/log/tpd.elg*
|
IPS Blade |
in.geod
|
Description |
Updates the IPS Geo Protection Database. |
Path |
$FWDIR/bin/fwssd |
Log file |
$FWDIR/log/geod.elg |
To Stop |
kill -KILL $(pidof in.geod) |
To Start |
After being killed, it will be restarted automatically |
Debug |
Refer to sk102329:
- Start debug:
fw debug in.geod on TDERROR_ALL_ALL=5
- Replicate the issue
- Stop debug:
fw debug in.geod off TDERROR_ALL_ALL=0
- Analyze:
$FWDIR/log/geod.elg*
|
URL Filtering Blade |
rad
|
Description |
Resource Advisor - responsible for the detection of Social Network widgets. The detection is done via an online Application Control database, which identifies URLs as applications. |
Path |
$FWDIR/bin/rad |
Log file |
$FWDIR/log/rad.elg |
Configuration file |
- $FWDIR/conf/rad_scheme.C
- $FWDIR/conf/rad_settings.C
- $FWDIR/database/rad_services.C
|
Notes |
The "cpwd_admin list" command shows the process as "RAD" |
To Stop |
rad_admin stop or cpstop |
To Start |
rad_admin start or cpstart |
Debug |
Refer to sk92743:
- Start debug:
rad_admin rad debug on all
- Replicate the issue.
- Stop debug:
rad_admin rad debug off ALL
- Analyze:
$FWDIR/log/rad.elg*
|
usrchkd
|
Description |
Main UserCheck daemon, which deals with UserCheck requests (from CLI / from the user) that are sent from the UserCheck Web Portal. |
Path |
$FWDIR/bin/usrchkd |
Log file |
$FWDIR/log/usrchkd.elg |
Configuration file |
- $FWDIR/conf/usrchkd.conf
- $FWDIR/orig/UCPortal/fwdir_conf/usrchkd.conf
- $FWDIR/conf/fwauthd.conf
|
Notes |
- This daemon is not monitored by Check Point WatchDog ("cpwd_admin list")
- This daemon is spawned by the FWD daemon
|
To Stop |
cpstop |
To Start |
cpstart |
To Restart |
killall usrchkd |
Debug |
Note: It might also be required to collect the relevant kernel debug.
- Start debug:
usrchk debug set all all
- Verify:
usrchk debug stat
- Replicate the issue.
- Stop debug:
usrchk debug off
- Analyze:
$FWDIR/log/usrchkd.elg*
|
usrchk
|
Description |
The CLI client for the UserCheck daemon USRCHKD (this process runs only when it is called explicitly). |
Path |
$FWDIR/bin/usrchk |
Log file |
$FWDIR/log/usrchk.elg |
Application Control Blade |
rad |
Description |
Resource Advisor - responsible for the detection of Social Network widgets. The detection is done via an online Application Control database, which identifies URLs as applications. |
Path |
$FWDIR/bin/rad |
Log file |
$FWDIR/log/rad.elg |
Configuration file |
- $FWDIR/conf/rad_scheme.C
- $FWDIR/conf/rad_settings.C
- $FWDIR/database/rad_services.C
|
Notes |
The "cpwd_admin list" command shows the process as "RAD" |
To Stop |
rad_admin stop or cpstop |
To Start |
rad_admin start or cpstart |
Debug |
Refer to sk92743:
- Start debug:
rad_admin rad debug on all
- Replicate the issue.
- Stop debug:
rad_admin rad debug off ALL
- Analyze:
$FWDIR/log/rad.elg*
|
Anti-Bot Blade |
in.acapd
|
Description |
Packet capturing daemon for SmartView Tracker logs. |
Path |
$FWDIR/bin/fwssd |
Log file |
$FWDIR/log/acapd.elg |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
Refer to sk108179:
- Start debug:
fw debug in.acapd on TDERROR_ALL_ALL=5
- Replicate the issue
- Stop debug:
fw debug in.acapd off TDERROR_ALL_ALL=0
- Analyze:
$FWDIR/log/acapd.elg*
|
rad
|
Description |
Resource Advisor - responsible for the detection of Social Network widgets. The detection is done via an online Application Control database, which identifies URLs as applications. |
Path |
$FWDIR/bin/rad |
Log file |
$FWDIR/log/rad.elg |
Configuration file |
- $FWDIR/conf/rad_scheme.C
- $FWDIR/conf/rad_settings.C
- $FWDIR/database/rad_services.C
|
Notes |
The "cpwd_admin list" command shows the process as "RAD" |
To Stop |
rad_admin stop or cpstop |
To Start |
rad_admin start or cpstart |
Debug |
Refer to sk92264:
- Start debug:
rad_admin rad debug on all
- Replicate the issue.
- Stop debug:
rad_admin rad debug off ALL
- Analyze:
$FWDIR/log/rad.elg*
|
usrchkd
|
Description |
Main UserCheck daemon, which deals with UserCheck requests (from CLI / from the user) that are sent from the UserCheck Web Portal. |
Path |
$FWDIR/bin/usrchkd |
Log file |
$FWDIR/log/usrchkd.elg |
Configuration file |
- $FWDIR/conf/usrchkd.conf
- $FWDIR/orig/UCPortal/fwdir_conf/usrchkd.conf
- $FWDIR/conf/fwauthd.conf
|
Notes |
- This daemon is not monitored by Check Point WatchDog ("cpwd_admin list")
- This daemon is spawned by the FWD daemon
|
To Stop |
cpstop |
To Start |
cpstart |
To Restart |
killall usrchkd |
Debug |
Note: It might also be required to collect the relevant kernel debug.
- Start debug:
usrchk debug set all all
- Verify:
usrchk debug stat
- Replicate the issue.
- Stop debug:
usrchk debug off
- Analyze:
$FWDIR/log/usrchkd.elg*
|
usrchk
|
Description |
The CLI client for the UserCheck daemon USRCHKD (this process runs only when it is called explicitly). |
Path |
$FWDIR/bin/usrchk |
Log file |
$FWDIR/log/usrchk.elg |
Anti-Virus Blade |
in.acapd
|
Description |
Packet capturing daemon for SmartView Tracker logs. |
Path |
$FWDIR/bin/fwssd |
Log file |
$FWDIR/log/acapd.elg |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
Refer to sk108179:
- Start debug:
fw debug in.acapd on TDERROR_ALL_ALL=5
- Replicate the issue
- Stop debug:
fw debug in.acapd off TDERROR_ALL_ALL=0
- Analyze:
$FWDIR/log/acapd.elg*
|
in.emaild.mta
|
Description |
E-Mail Security Server that receives e-mails sent by user and sends them to their destinations. |
Path |
$FWDIR/bin/fwssd |
Log file |
$FWDIR/log/emaild.mta.elg |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
Refer to sk60387:
- Start debug:
fw debug in.emaild.mta on TDERROR_ALL_ALL=5
- Replicate the issue
- Stop debug:
fw debug in.emaild.mta off TDERROR_ALL_ALL=0
- Analyze:
$FWDIR/log/emaild.mta.elg*
|
in.emaild.smtp
|
Description |
SMTP Security Server that receives e-mails sent by user and sends them to their destinations. |
Path |
$FWDIR/bin/fwssd |
Log file |
$FWDIR/log/emaild.smtp.elg |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
Refer to sk60387:
- Start debug:
fw debug in.emaild.smtp on TDERROR_ALL_ALL=5
- Replicate the issue
- Stop debug:
fw debug in.emaild.smtp off TDERROR_ALL_ALL=0
- Analyze:
$FWDIR/log/emaild.smtp.elg*
|
in.emaild.pop3
|
Description |
POP3 Security Server that receives e-mails sent by user. |
Path |
$FWDIR/bin/fwssd |
Log file |
$FWDIR/log/emaild.pop3.elg |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
- Start debug:
fw debug in.emaild.pop3 on TDERROR_ALL_ALL=5
- Replicate the issue
- Stop debug:
fw debug in.emaild.pop3 off TDERROR_ALL_ALL=0
- Analyze:
$FWDIR/log/emaild.pop3.elg*
|
dlpu
|
Description |
DLP process - receives data from Check Point kernel. |
Path |
$FWDIR/bin/dlpu |
Log file |
$FWDIR/log/dlpu.elg |
Notes |
The "cpwd_admin list" command shows the process as "DLPU_<N>" |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
Refer to sk73660:
- Start debug:
fw debug dlpu on TDERROR_ALL_ALL=5
- Replicate the issue
- Stop debug:
fw debug dlpu off TDERROR_ALL_ALL=0
- Analyze:
$FWDIR/log/dlpu.elg*
|
rad
|
Description |
Resource Advisor - responsible for the detection of Social Network widgets. The detection is done via an online Application Control database, which identifies URLs as applications. |
Path |
$FWDIR/bin/rad |
Log file |
$FWDIR/log/rad.elg |
Configuration file |
- $FWDIR/conf/rad_scheme.C
- $FWDIR/conf/rad_settings.C
- $FWDIR/database/rad_services.C
|
Note |
The "cpwd_admin list" command shows the process as "RAD" |
To Stop |
rad_admin stop or cpstop |
To Start |
rad_admin start or cpstart |
Debug |
Refer to sk92264:
- Start debug:
rad_admin rad debug on all
- Replicate the issue.
- Stop debug:
rad_admin rad debug off ALL
- Analyze:
$FWDIR/log/rad.elg*
|
usrchkd
|
Description |
Main UserCheck daemon, which deals with UserCheck requests (from CLI / from the user) that are sent from the UserCheck Web Portal. |
Path |
$FWDIR/bin/usrchkd |
Log file |
$FWDIR/log/usrchkd.elg |
Configuration file |
- $FWDIR/conf/usrchkd.conf
- $FWDIR/orig/UCPortal/fwdir_conf/usrchkd.conf
- $FWDIR/conf/fwauthd.conf
|
Notes |
- This daemon is not monitored by Check Point WatchDog ("cpwd_admin list")
- This daemon is spawned by the FWD daemon
|
To Stop |
cpstop |
To Start |
cpstart |
To Restart |
killall usrchkd |
Debug |
Note: It might also be required to collect the relevant kernel debug.
- Start debug:
usrchk debug set all all
- Verify:
usrchk debug stat
- Replicate the issue.
- Stop debug:
usrchk debug off
- Analyze:
$FWDIR/log/usrchkd.elg*
|
usrchk
|
Description |
The CLI client for the UserCheck daemon USRCHKD (this process runs only when it is called explicitly). |
Path |
$FWDIR/bin/usrchk |
Log file |
$FWDIR/log/usrchk.elg |
Anti-Spam Blade |
in.emaild.smtp
|
Description |
SMTP Security Server that receives e-mails sent by user and sends them to their destinations. |
Path |
$FWDIR/bin/fwssd |
Log file |
$FWDIR/log/emaild.smtp.elg |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
Refer to sk60387:
- Start debug:
fw debug in.emaild.smtp on TDERROR_ALL_ALL=5
- Replicate the issue
- Stop debug:
fw debug in.emaild.smtp off TDERROR_ALL_ALL=0
- Analyze:
$FWDIR/log/emaild.smtp.elg*
|
in.msd
|
Description |
Mail Security Daemon that queries the Commtouch engine for reputation. |
Path |
$FWDIR/bin/fwssd |
Log file |
$FWDIR/log/msd.elg |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
Refer to sk92264:
- Start debug:
fw debug in.msd on TDERROR_ALL_ALL=5
- Replicate the issue
- Stop debug:
fw debug in.msd off TDERROR_ALL_ALL=0
- Analyze:
$FWDIR/log/msd.elg*
|
ctasd
|
Description |
Commtouch Anti-Spam daemon. |
Path |
/opt/aspam_engine/ctipd/bin/ctasd |
Configuration file |
/opt/aspam_engine/ctasd/conf/ctasd.conf |
To Stop |
cpstop |
To Start |
pstart |
ctipd
|
Description |
Commtouch IP Reputation daemon. |
Path |
/opt/aspam_engine/ctipd/bin/ctipd |
Log file |
None |
Configuration file |
/opt/aspam_engine/ctipd/conf/ctipd.conf |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
None |
Monitoring Blade |
rtmd
|
Description |
Real Time traffic statistics. |
Path |
$FWDIR/bin/rtm %FWDIR%\bin\rtm (R77.30 and lower) |
Log file |
$FWDIR/log/rtmd.elg %FWDIR%\log\rtmd.elg (R77.30 and lower) |
Notes |
The "cpwd_admin list" command shows the process as "RTMD" |
To Stop |
rtmstop |
To Start |
rtmstart |
Debug |
Refer to skI2821:
- Start debug:
rtm debug on TDERROR_ALL_ALL=5 rtm debug on OPSEC_DEBUG_LEVEL=3
- Replicate the issue
- Stop debug:
rtm debug off TDERROR_ALL_ALL=0 rtm debug off OPSEC_DEBUG_LEVEL=0
- Analyze:
$FWDIR/log/rtmd.elg*
|
cpstat_monitor
|
Description |
Process is responsible for collecting and sending information to SmartView Monitor. |
Path |
$FWDIR/bin/cpstat_monitor %FWDIR%\bin\cpstat_monitor (R77.30 and lower) |
Log file |
$FWDIR/log/cpstat_monitor.elg %FWDIR%\log\cpstat_monitor.elg (R77.30 and lower) |
Notes |
- The "cpwd_admin list" command shows the process as "CPSM".
- By default, does not run in the context of Domain Management Servers.
- By default, in MGMT HA runs only on "Active" Security Management Server.
|
To Stop |
cpwd_admin stop -name CPSM |
To Start |
cpwd_admin start -name CPSM -path "$FWDIR/bin/cpstat_monitor" -command "cpstat_monitor" |
Debug |
Refer to sk108177 |
HTTPS Inspection |
wstlsd
|
Description |
Handles SSL handshake for HTTPS Inspected connections. |
Path |
$CPDIR/bin/wstlsd |
Log file |
$FWDIR/log/wstlsd.elg |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
Refer to sk105559:
- Start debug:
for PROC in $(pidof wstlsd) ; do fw debug $PROC on TDERROR_ALL_ALL=6 ; done
- Replicate the issue (it is very important to collect the relevant traffic using both TCPDump tool and the FW Monitor).
- Stop debug:
for PROC in $(pidof wstlsd) ; do fw debug $PROC off TDERROR_ALL_ALL=0 ; done
- Analyze:
$FWDIR/log/wstlsd.elg*
|
pkxld
|
Description |
Performs asymmetric key operations for HTTPS Inspection (R77.30 and higher) |
Path |
$CPDIR/bin/pkxld |
Log file |
none |
Notes |
Refer to sk104717 |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
None |
HTTP/HTTPS Proxy |
wsdnsd
|
Description |
DNS Resolver (in R77.30 and higher) - activated when Security Gateway is configured as HTTP/HTTPS Proxy, and no next proxy is used. The process is started and stopped during policy installation. |
Path |
$FWDIR/bin/wsdnsd %FWDIR%\bin\wsdnsd (R77.30 only) |
Log file |
$FWDIR/log/wsdnsd.elg %FWDIR%\log\wsdnsd.elg (R77.30 only) |
Notes |
The "cpwd_admin list" command shows the process as "WSDNSD" |
To Stop |
cpwd_admin stop -name WSDNSD -path "$FWDIR/bin/wsdnsd" -command "kill -SIGTERM $(pidof $FWDIR/bin/wsdnsd)" |
To Start |
cpwd_admin start -name WSDNSD -path "$FWDIR/bin/wsdnsd" -command "wsdnsd" |
Debug |
Refer to sk106443:
- Start debug:
fw debug wsdnsd on TDERROR_ALL_ALL=5
- Replicate the issue
- Stop debug:
fw debug wsdnsd off TDERROR_ALL_ALL=0
- Analyze:
$FWDIR/log/wsdnsd.elg*
|
Cluster |
cphamcset
|
Description |
Clustering daemon - responsible for opening sockets on the NICs to allow them to pass multicast traffic (CCP) to the machine. |
Path |
$FWDIR/bin/cphamcset %FWDIR%\bin\cphamcset (R77.30 and lower) |
Log file |
$FWDIR/log/cphamcset.elg %FWDIR%\log\cphamcset.elg (R77.30 and lower) |
Notes |
|
To Stop |
cphastop |
To Start |
cphastart |
Debug |
- Stop clustering:
cphastop
- Start under debug:
cphamcset -d
- Stop Check Point services:
cphastop
- Start clustering:
cphastart
|
cphaprob
|
Description |
Process that lists the state of cluster members, cluster interfaces and Critical Devices (Pnotes). |
Path |
$FWDIR/bin/cphaprob %FWDIR%\bin\cphaprob (R77.30 and lower) |
Configuration file |
$FWDIR/conf/cphaprob.conf %FWDIR%\conf\cphaprob.conf (R77.30 and lower) |
Notes |
Refer to ATRG: ClusterXL R6x and R7x - Chapter "ClusterXL Monitoring and Troubleshooting" - 'cphaprob' command. |
To Stop |
None |
To Start |
None |
Debug |
"cphaprob -D <command>" (e.g., "cphaprob -D state") |
cphaconf
|
Description |
Cluster configuration process - installs the cluster configuration into Check Point kernel on cluster members. |
Path |
$FWDIR/bin/cphaconf %FWDIR%\bin\cphaconf (R77.30 and lower) |
Log file |
$FWDIR/log/cphaconf.elg %FWDIR%\log\cphaconf.elg (R77.30 and lower) |
Notes |
- Refer to ATRG: ClusterXL R6x and R7x - Chapter "ClusterXL Monitoring and Troubleshooting" - 'cphaconf' command.
- Log file exists only in R77.20 and higher
|
To Stop |
None |
To Start |
None |
Debug |
Refer to ATRG: ClusterXL R6x and R7x - Chapter "ClusterXL Monitoring and Troubleshooting" - 'cphaconf' command - 'cphaconf debug_data'. |
cphastart
|
Description |
Starts the cluster and state synchronization. |
Path |
$FWDIR/bin/cphastart %FWDIR%\bin\cphastart (R77.30 and lower) |
Log file |
$FWDIR/log/cphastart.elg %FWDIR%\log\cphastart.elg (R77.30 and lower) |
Notes |
- Refer to ATRG: ClusterXL R6x and R7x - Chapter "ClusterXL Monitoring and Troubleshooting" - 'cphastart' and 'cphastop' commands.
- Log file exists only in R77.20 and higher
|
To Stop |
None |
To Start |
None |
Debug |
"cphastart -d" - refer to sk39842 |
cphastop
|
Description |
Stops the cluster and state synchronization. |
Path |
$FWDIR/bin/cphastop %FWDIR%\bin\cphastop (R77.30 and lower) |
Notes |
Refer to ATRG: ClusterXL R6x and R7x - Chapter "ClusterXL Monitoring and Troubleshooting" - 'cphastart' and 'cphastop' commands. |
To Stop |
None |
To Start |
None |
Debug |
Standard CSH script debugging (csh -x -v $FWDIR/bin/cphastop) |
cxld
|
Description |
Runs the cluster Full Sync (R81 and higher). |
Path |
$FWDIR/bin/cxld |
Log file |
$FWDIR/log/cxld.elg |
To Stop |
cpstop |
To Start |
cpstart |
Debug |
Runs with debug by default |
SecureXL |
sxl_statd
|
Description |
Daemon that collects statistics information from the SecureXL on the Host appliance (R80.20 and higher). |
Path |
$FWDIR/bin/sxl_statd |
Log File |
None |
Notes |
The "cpwd_admin list" command shows the process as "SXL_STATD" |
To Stop |
cpwd_admin stop -name SXL_STATD |
To Start |
cpwd_admin start -name SXL_STATD -path "$FWDIR/bin/sxl_statd" -command "sxl_statd" |
Debug |
None |
CoreXL |
dsd
|
Description |
Dynamic Balancing (initially called "Dynamic Split") - responsible for dynamically adjusting CoreXL for optimized CPU resources allocation, based on continuous monitoring of system resources (R80.40 and higher) |
Path |
$FWDIR/bin/dsd |
Log File |
$FWIDR/log/dsd.elg |
Notes |
|
To Stop |
dynamic_split -o disable |
To Start |
- dynamic_split -o enable
- reboot
In R81 and higher, this feature is enabled by default |
Debug |
None |
VSX |
CPUS_USGS
|
Description |
Special task in the Check Point WatchDog on a Scalable Platform Security Group in the VSX mode (Maestro and Chassis) in R81 and higher.
This task runs a Python script that collects the Resource Control data (CPU and Memory utilization) from each Virtual System and sends it to the "asg perf" tool.
|
Path |
/usr/scripts/get_cpus_usages/get_cpus_usages |
Log File |
/var/log/cpus_usages.log /tmp/cpus_usages.txt |
To See the Current Status |
service get_cpus_usages status |
To Stop |
service get_cpus_usages stop |
To Start |
service get_cpus_usages start |
To Restart |
service get_cpus_usages restart |
Debug |
Standard Python script debugging |