<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AWS GW Loadbalancer TCP stale session limit of 350 seconds in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GW-Loadbalancer-TCP-stale-session-limit-of-350-seconds/m-p/212749#M4735</link>
    <description>&lt;P&gt;Hi fellow mates&lt;/P&gt;&lt;P&gt;At the moment we run a Check Point HA CloudGuard Geo Cluster R81.20 in our AWS environment over a AWS TGW architecture that checks on all east-west traffic as well as everything that comes from on-prem or over zero-trust appliances.&lt;/P&gt;&lt;P&gt;We consider changing the architecture to a scalable one with the AWS Gateway Loadbalancer.&lt;/P&gt;&lt;P&gt;There is one issue / sorrow we have: the hard limit in the GWLB of 350 seconds of stale TCP sessions.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We assume that some of our legacy services / applications that moved to AWS would be affected by this limit. So we try to investigate if such traffic would be affected by the limitation. I found an ancient article concerning a similar topic but for CP R75.40 with "fw tab" command, that would probably help us detect such stale tcp sessions exceeding the 350 seconds limit:&lt;/P&gt;&lt;P&gt;&lt;A href="https://networkengineering.stackexchange.com/questions/2829/find-idle-connections-in-check-point-firewall" target="_blank"&gt;https://networkengineering.stackexchange.com/questions/2829/find-idle-connections-in-check-point-firewall&lt;/A&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;fw tab -t connections -u -f | grep 86400 |awk '{ split($41,a,"/"); if( a[1] &amp;lt; 82800) print $2,$9,$13,$15,$41; }'&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;As the table has changed over the years, the printable positions are not correct anymore as well as the default TCP timeout of one day...&lt;/P&gt;&lt;P&gt;I have tried to adapt the command to our situation but I am not completely pleased with the output as it is not consistent:&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;fw tab -t connections -u -f | grep 3600 | awk '{ split($49,a,"/"); if( a[1] &amp;lt; 350) print $18,$19,$20,$21,$22,$23,$24,$25,$48,$49; }'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;fw tab -t connections -u -f | grep 3600 | awk '{ split($106,a,"/"); if( a[1] &amp;lt; 350) print $18,$19,$20,$21,$22,$23,$24,$25,$105,$106; }'&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;My questions to you guys would be: did anyone had a similar challenge yet? How did you figure out if a GWLB with its limitations would fit into your environment smoothly?&amp;nbsp; Has anyone figured out a satisfying output with the "fw tab" command?&lt;/P&gt;&lt;P&gt;Looking forward to your reactions and have a great 1st of May (Thank God it's Tuesday)&lt;/P&gt;&lt;P&gt;Cyrill&lt;/P&gt;</description>
    <pubDate>Tue, 30 Apr 2024 14:35:35 GMT</pubDate>
    <dc:creator>Cyrill_Kaspar</dc:creator>
    <dc:date>2024-04-30T14:35:35Z</dc:date>
    <item>
      <title>AWS GW Loadbalancer TCP stale session limit of 350 seconds</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GW-Loadbalancer-TCP-stale-session-limit-of-350-seconds/m-p/212749#M4735</link>
      <description>&lt;P&gt;Hi fellow mates&lt;/P&gt;&lt;P&gt;At the moment we run a Check Point HA CloudGuard Geo Cluster R81.20 in our AWS environment over a AWS TGW architecture that checks on all east-west traffic as well as everything that comes from on-prem or over zero-trust appliances.&lt;/P&gt;&lt;P&gt;We consider changing the architecture to a scalable one with the AWS Gateway Loadbalancer.&lt;/P&gt;&lt;P&gt;There is one issue / sorrow we have: the hard limit in the GWLB of 350 seconds of stale TCP sessions.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We assume that some of our legacy services / applications that moved to AWS would be affected by this limit. So we try to investigate if such traffic would be affected by the limitation. I found an ancient article concerning a similar topic but for CP R75.40 with "fw tab" command, that would probably help us detect such stale tcp sessions exceeding the 350 seconds limit:&lt;/P&gt;&lt;P&gt;&lt;A href="https://networkengineering.stackexchange.com/questions/2829/find-idle-connections-in-check-point-firewall" target="_blank"&gt;https://networkengineering.stackexchange.com/questions/2829/find-idle-connections-in-check-point-firewall&lt;/A&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;fw tab -t connections -u -f | grep 86400 |awk '{ split($41,a,"/"); if( a[1] &amp;lt; 82800) print $2,$9,$13,$15,$41; }'&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;As the table has changed over the years, the printable positions are not correct anymore as well as the default TCP timeout of one day...&lt;/P&gt;&lt;P&gt;I have tried to adapt the command to our situation but I am not completely pleased with the output as it is not consistent:&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;fw tab -t connections -u -f | grep 3600 | awk '{ split($49,a,"/"); if( a[1] &amp;lt; 350) print $18,$19,$20,$21,$22,$23,$24,$25,$48,$49; }'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;fw tab -t connections -u -f | grep 3600 | awk '{ split($106,a,"/"); if( a[1] &amp;lt; 350) print $18,$19,$20,$21,$22,$23,$24,$25,$105,$106; }'&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;My questions to you guys would be: did anyone had a similar challenge yet? How did you figure out if a GWLB with its limitations would fit into your environment smoothly?&amp;nbsp; Has anyone figured out a satisfying output with the "fw tab" command?&lt;/P&gt;&lt;P&gt;Looking forward to your reactions and have a great 1st of May (Thank God it's Tuesday)&lt;/P&gt;&lt;P&gt;Cyrill&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2024 14:35:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GW-Loadbalancer-TCP-stale-session-limit-of-350-seconds/m-p/212749#M4735</guid>
      <dc:creator>Cyrill_Kaspar</dc:creator>
      <dc:date>2024-04-30T14:35:35Z</dc:date>
    </item>
    <item>
      <title>Re: AWS GW Loadbalancer TCP stale session limit of 350 seconds</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GW-Loadbalancer-TCP-stale-session-limit-of-350-seconds/m-p/213639#M4740</link>
      <description>&lt;P&gt;Hello Cyrill,&lt;/P&gt;
&lt;P&gt;It appears the community hasn't proposed any ideas yet. I'll look into it internally and keep you informed.&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 12:31:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GW-Loadbalancer-TCP-stale-session-limit-of-350-seconds/m-p/213639#M4740</guid>
      <dc:creator>Shay_Levin</dc:creator>
      <dc:date>2024-05-08T12:31:40Z</dc:date>
    </item>
    <item>
      <title>Re: AWS GW Loadbalancer TCP stale session limit of 350 seconds</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GW-Loadbalancer-TCP-stale-session-limit-of-350-seconds/m-p/213641#M4741</link>
      <description>&lt;P&gt;Hello Shay&lt;/P&gt;&lt;P&gt;Fantastic. Your support is very welcome and much appreciated!&lt;/P&gt;&lt;P&gt;Best regards&lt;BR /&gt;Cyrill&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 12:42:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GW-Loadbalancer-TCP-stale-session-limit-of-350-seconds/m-p/213641#M4741</guid>
      <dc:creator>Cyrill_Kaspar</dc:creator>
      <dc:date>2024-05-08T12:42:35Z</dc:date>
    </item>
    <item>
      <title>Re: AWS GW Loadbalancer TCP stale session limit of 350 seconds</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GW-Loadbalancer-TCP-stale-session-limit-of-350-seconds/m-p/213972#M4753</link>
      <description>&lt;P&gt;Run “fwaccel conns” for the accelerated connections and “fw tab –t connections –z” for the slow path.&lt;/P&gt;
&lt;P&gt;Both commands will show you the info you want.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="1.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25631iA49E367141449FD9/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Duration is the time the connection is alive&lt;/P&gt;
&lt;P&gt;Last seen is the time that passed since last packet.&lt;/P&gt;
&lt;P&gt;So connections that are ideal for longer than 350 sec will have in the “last seen” column a number larger than 350s (note its not showing only sec, it will show min or hours )&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please inform me if this information is helpful. Additionally, if you have any interesting discoveries you're willing to share, it would greatly benefit other members contemplating a switch to GWLB&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Sun, 12 May 2024 15:35:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GW-Loadbalancer-TCP-stale-session-limit-of-350-seconds/m-p/213972#M4753</guid>
      <dc:creator>Shay_Levin</dc:creator>
      <dc:date>2024-05-12T15:35:35Z</dc:date>
    </item>
    <item>
      <title>Re: AWS GW Loadbalancer TCP stale session limit of 350 seconds</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GW-Loadbalancer-TCP-stale-session-limit-of-350-seconds/m-p/213995#M4754</link>
      <description>&lt;P&gt;Hi Shay&lt;/P&gt;&lt;P&gt;Many thanx for the commands and the explanation.&lt;/P&gt;&lt;P&gt;I think, I have figured out the&amp;nbsp;filter parameters we need to identify the stale sessions that would run into the GWLB hard limit of 350 seconds:&lt;/P&gt;&lt;P&gt;fw tab -t connections -z | grep Estab. | awk '{ split($9,a,"/"); if( a[1] &amp;lt; 3250) print $2, $3, $4, $5, $9, $16; }'&lt;BR /&gt;This prints: [Source IP] [Sourec Port] [Destination IP] [Destination Port] [Expires] [Last Seen]&lt;/P&gt;&lt;P&gt;fwaccel conns | grep Established | awk '{ split ($17,a,"/"); if( a[1] &amp;lt; 3250 ) print $1, $2, $3, $4, $17, $15; }'&lt;BR /&gt;This prints: [Source IP] [Sourec Port] [Destination IP] [Destination Port] [TTL/Timeout] [Last Seen]&lt;/P&gt;&lt;P&gt;Looking up&amp;nbsp; &lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_CLI_ReferenceGuide/Content/Topics-CLIG/FWG/fw-tab.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_CLI_ReferenceGuide/Content/Topics-CLIG/FWG/fw-tab.htm&lt;/A&gt;, I found in the legend for the command, that for "Expires" it states:&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How many seconds remain before the connection expires (based on the maximum expiration time).&lt;BR /&gt;Also, refer to the "Duration" column.&lt;BR /&gt;For example, 1990/3600 means:&lt;BR /&gt;The maximum expiration time is 3600 seconds.&lt;BR /&gt;If the connection remains idle for the next 1990 seconds, it expires from the Firewall Connections table&lt;/P&gt;&lt;P&gt;So I assume that to discover idle sessions that would run into the 350 seconds GWLB timeout, I would need do look after a value 3600 - 350 = 3250. If I understood correctly, everything below 3250 seconds would have been dropped already by the GWLB.&lt;/P&gt;&lt;P&gt;We will look into this in depth and will hopefully identify only a few legacy services hitting the hard limit.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Cyrill&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2024 08:14:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GW-Loadbalancer-TCP-stale-session-limit-of-350-seconds/m-p/213995#M4754</guid>
      <dc:creator>Cyrill_Kaspar</dc:creator>
      <dc:date>2024-05-13T08:14:43Z</dc:date>
    </item>
  </channel>
</rss>

