<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: heavy connection Elephant Flows on VSX use tool connstat - sk85780 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/heavy-connection-Elephant-Flows-on-VSX-use-tool-connstat-sk85780/m-p/109607#M14940</link>
    <description>&lt;P&gt;It would help if you share a screenshot of the relevant rule with version/JHF level.&lt;BR /&gt;Also, what blades are active?&lt;BR /&gt;If the issue is truly an elephant flow, moving the rule won’t necessarily solve the issue, but it could mitigate the risk.&lt;/P&gt;</description>
    <pubDate>Tue, 02 Feb 2021 21:15:22 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2021-02-02T21:15:22Z</dc:date>
    <item>
      <title>heavy connection Elephant Flows on VSX use tool connstat - sk85780</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/heavy-connection-Elephant-Flows-on-VSX-use-tool-connstat-sk85780/m-p/109543#M14936</link>
      <description>&lt;P&gt;hello Checkmates&lt;/P&gt;&lt;P&gt;yesterday my end customer complain on have connection flow&amp;nbsp;&lt;/P&gt;&lt;P&gt;i use some of tool to try investigation the traffic that make that Elephant flow with some success to rich the problem i have to tell&amp;nbsp;&lt;/P&gt;&lt;P&gt;my question is when i use&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;connstat -&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk85780" target="_blank" rel="noopener"&gt;sk85780&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;i see&amp;nbsp; a lot of hits on rule 604 and i want to recommend to my customer to move that rule to lower number on the access rules&amp;nbsp;&lt;/P&gt;&lt;P&gt;to ‏reduce cpu load&amp;nbsp;&lt;/P&gt;&lt;P&gt;now how can i be sure that rule is been accelerated or not by use these tool&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and how can i know that rule belong to the relevant VS * i use these commend from the VS-DMZ&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;tcpdump -i&amp;nbsp; any -w /var/log/capture.cap&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you all!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2021 09:06:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/heavy-connection-Elephant-Flows-on-VSX-use-tool-connstat-sk85780/m-p/109543#M14936</guid>
      <dc:creator>RoyA</dc:creator>
      <dc:date>2021-02-02T09:06:10Z</dc:date>
    </item>
    <item>
      <title>Re: heavy connection Elephant Flows on VSX use tool connstat - sk85780</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/heavy-connection-Elephant-Flows-on-VSX-use-tool-connstat-sk85780/m-p/109607#M14940</link>
      <description>&lt;P&gt;It would help if you share a screenshot of the relevant rule with version/JHF level.&lt;BR /&gt;Also, what blades are active?&lt;BR /&gt;If the issue is truly an elephant flow, moving the rule won’t necessarily solve the issue, but it could mitigate the risk.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2021 21:15:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/heavy-connection-Elephant-Flows-on-VSX-use-tool-connstat-sk85780/m-p/109607#M14940</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-02-02T21:15:22Z</dc:date>
    </item>
    <item>
      <title>Re: heavy connection Elephant Flows on VSX use tool connstat - sk85780</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/heavy-connection-Elephant-Flows-on-VSX-use-tool-connstat-sk85780/m-p/109635#M14954</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rule number 602 have hits of 13936, and i would like to recommend to my end customer to remove it to lower number on the access rule layer&amp;nbsp;&lt;/P&gt;&lt;P&gt;version R80.30 VSX gaia user space FW&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;connstat -&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk85780" target="_blank" rel="noopener noopener noreferrer"&gt;sk85780&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;screenshot :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://bynetprod.service-now.com/sys_attachment.do?sys_id=40f3638adb0ea450e149c5cf29961986" border="0" width="1399" height="217" /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;how can i be sure that rule is been accelerated or not by use these tool&amp;nbsp; ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 07:15:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/heavy-connection-Elephant-Flows-on-VSX-use-tool-connstat-sk85780/m-p/109635#M14954</guid>
      <dc:creator>RoyA</dc:creator>
      <dc:date>2021-02-03T07:15:04Z</dc:date>
    </item>
    <item>
      <title>Re: heavy connection Elephant Flows on VSX use tool connstat - sk85780</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/heavy-connection-Elephant-Flows-on-VSX-use-tool-connstat-sk85780/m-p/109637#M14955</link>
      <description>&lt;P&gt;CLI commands such as the following will assist you in determining where in the policy acceleration stops:&lt;/P&gt;
&lt;P&gt;[Expert@FW]# fwaccel stat&lt;/P&gt;
&lt;P&gt;Accelerator Status : on&lt;BR /&gt;Accept Templates : disabled by Firewall&lt;BR /&gt;disabled from rule #179&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 07:47:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/heavy-connection-Elephant-Flows-on-VSX-use-tool-connstat-sk85780/m-p/109637#M14955</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2021-02-03T07:47:00Z</dc:date>
    </item>
    <item>
      <title>Re: heavy connection Elephant Flows on VSX use tool connstat - sk85780</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/heavy-connection-Elephant-Flows-on-VSX-use-tool-connstat-sk85780/m-p/109643#M14957</link>
      <description>&lt;P&gt;Dear RoyA,&lt;/P&gt;&lt;P&gt;you wrote "...and i want to recommend to my customer to move that rule to lower number on the access rules to ‏reduce cpu load..".&lt;/P&gt;&lt;P&gt;As far as I know, moving the most used rules to top is no more necessary since R80.x (due to the new column based matching).&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 08:58:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/heavy-connection-Elephant-Flows-on-VSX-use-tool-connstat-sk85780/m-p/109643#M14957</guid>
      <dc:creator>Christian_Koehl</dc:creator>
      <dc:date>2021-02-03T08:58:01Z</dc:date>
    </item>
    <item>
      <title>Re: heavy connection Elephant Flows on VSX use tool connstat - sk85780</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/heavy-connection-Elephant-Flows-on-VSX-use-tool-connstat-sk85780/m-p/109675#M14960</link>
      <description>&lt;P&gt;hello Chris&amp;nbsp;&lt;/P&gt;&lt;P&gt;in case these rule is been&amp;nbsp;&lt;SPAN&gt;accelerated&amp;nbsp; and i disabled by FW i think it could be lead to Impact&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;There is another way to know?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 12:30:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/heavy-connection-Elephant-Flows-on-VSX-use-tool-connstat-sk85780/m-p/109675#M14960</guid>
      <dc:creator>RoyA</dc:creator>
      <dc:date>2021-02-03T12:30:35Z</dc:date>
    </item>
    <item>
      <title>Re: heavy connection Elephant Flows on VSX use tool connstat - sk85780</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/heavy-connection-Elephant-Flows-on-VSX-use-tool-connstat-sk85780/m-p/109676#M14961</link>
      <description>&lt;P&gt;hello Christian&amp;nbsp;&lt;/P&gt;&lt;P&gt;i think it is&amp;nbsp;dependent if the rule is been&amp;nbsp;&lt;SPAN&gt;accelerated if yes then no&amp;nbsp;necessary to remove to the Top of the access layer&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 12:33:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/heavy-connection-Elephant-Flows-on-VSX-use-tool-connstat-sk85780/m-p/109676#M14961</guid>
      <dc:creator>RoyA</dc:creator>
      <dc:date>2021-02-03T12:33:27Z</dc:date>
    </item>
    <item>
      <title>Re: heavy connection Elephant Flows on VSX use tool connstat - sk85780</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/heavy-connection-Elephant-Flows-on-VSX-use-tool-connstat-sk85780/m-p/109678#M14963</link>
      <description>&lt;P&gt;You can review the policy logic against that&amp;nbsp; described in&amp;nbsp;&lt;SPAN&gt;sk32578.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For example rules with RPC / DCOM / DCE services would be a give away.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 12:36:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/heavy-connection-Elephant-Flows-on-VSX-use-tool-connstat-sk85780/m-p/109678#M14963</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2021-02-03T12:36:18Z</dc:date>
    </item>
  </channel>
</rss>

