1. Check Point SecureKnowledge (SK) Article sk111013: "How to debug packet flow with 'fw monitor' in R80.x". This document clarifies the behavior of fw monitor. In the section "FW Monitor flags", it explains the default capture points. The -p flag is described as controlling the "positions in the FW chain to inspect". The all parameter for -p is specifically noted to show the packet's path through the chains for the captures taken at the four standard points.
2. Check Point R81.10 Security Gateway Administration Guide: In the "Monitoring and Troubleshooting" chapter, the fw monitor command is detailed. The guide explains that the tool captures packets at four points by default: before the inbound chain (i), after the inbound chain (I), before the outbound chain (o), and after the outbound chain (O). The -p all option is documented to provide a "trace of the packet through the firewall chains," which is an enhancement of the output for the four captured packets, not an increase in the number of capture points.
3. Check Point Certified Security Expert (CCSE) R81.10 Courseware: The official training materials for the CCSE certification, which the 156-582 exam is based on, explicitly state that fw monitor captures packets at four points. The -p all flag is taught as a method to see the detailed kernel chain path for each of these four captures, not as a way to generate more captures.