Fill in the blank: The R80 utility fw monitor is used to troubleshoot _____________
A.
User data base corruption
B.
LDAP conflicts
C.
Traffic issues
D.
Phase two key negotiation
Explanation:
Check Point’s FW Monitor is a powerful built-in tool for capturing network traffic at the packet
level. The FW Monitor utility captures network packets at multiple capture points along the FireWall inspection
chains. These captured packets can be inspected later using the WireShark
https://supportcenter.checkpoint.com/supportcenter/portal?
eventSubmit_doGoviewsolutiondetails=&solutionid=sk30583