<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SecureXL DoS Rate Limiting (samp rules) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/129082#M18878</link>
    <description>&lt;P&gt;I am running R81 in the manager and R80.40 in the gateway so I can filter by comment.&lt;BR /&gt;By the way, I have just realized a trick to be able to filter just the securexl dos logs.&lt;BR /&gt;As I was saying securexl dos inserts the securexl dos rule uid and they all have this format&amp;nbsp;&amp;lt;*,*,*,*&amp;gt;&lt;/P&gt;&lt;P&gt;So filtering by&amp;nbsp;&amp;lt;*,*,*,*&amp;gt; gives you just the securexl dos alerts.&lt;BR /&gt;&lt;BR /&gt;On a separate note, it is a pity that securexl dos rate limit has not visibility of the smartconsole objets, it would be great to be able to use the groups already defined in securexl.&lt;BR /&gt;I can understand how securexl dos penalty box, deny list, etc are designed just for emergencies etc and don't require it, however the rate limit function is more than tha. I would like to use it to control the number of concurrent sessions&amp;nbsp; to specific host anytime non stop and I can't do it with the QOS blade.&amp;nbsp; It would make it easier if I could use as I said the smartconsoler groups and perhaps the rules already defined in smartconsole or even better if we could configure the securexl dos rate limit rules from smartconsole.&lt;/P&gt;</description>
    <pubDate>Thu, 09 Sep 2021 23:58:29 GMT</pubDate>
    <dc:creator>Luis_Miguel_Mig</dc:creator>
    <dc:date>2021-09-09T23:58:29Z</dc:date>
    <item>
      <title>SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71301#M5467</link>
      <description>&lt;P&gt;I have been working a lot with the rate limiting rules via the "fw samp" CLI interface, but unfortunately I cannot get the gateway to actually enforce them.&amp;nbsp; It appears SecureXL is very unhappy when I try to enable rate limiting:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;[Expert@PROD-FW02a:0]# fwaccel dos config set --enable-rate-limit&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;ERROR: No rate limiting policy is installed, can't enable.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;What exactly is the "rate limiting policy" it is referring to?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have dug fairly deep in documentation, sks, etc. and cannot figure out what triggers the rate limiting capabilities of SecureXL to turn on, based on policy settings.&amp;nbsp; I also thought maybe enabling QoS blade and the QoS policy component would trigger things, but it had no effect on things.&lt;/P&gt;&lt;P&gt;Of course, this same status is reflected when you query the configuration (fwaccel dos config get):&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#FF0000"&gt;rate limit: disabled (without policy)&lt;/FONT&gt;&lt;BR /&gt;pbox: disabled&lt;BR /&gt;blacklists: disabled&lt;BR /&gt;drop frags: disabled&lt;BR /&gt;drop opts: disabledfwacc&lt;BR /&gt;internal: disabled&lt;BR /&gt;monitor: disabled&lt;BR /&gt;log drops: enabled&lt;BR /&gt;log pbox: enabled&lt;BR /&gt;notif rate: 100 notifications/second&lt;BR /&gt;pbox rate: 500 packets/second&lt;BR /&gt;pbox tmo: 180 seconds&lt;/P&gt;&lt;P&gt;The gateways are R80.30 5800 appliances.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 28 Dec 2019 23:07:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71301#M5467</guid>
      <dc:creator>Egenity</dc:creator>
      <dc:date>2019-12-28T23:07:08Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71302#M5468</link>
      <description>&lt;P&gt;Hi Adam,&lt;/P&gt;
&lt;P&gt;You need to add a rate-limiting rule first before you can enable enforcement.&amp;nbsp; Please see this article:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Management-Topics/How-to-completely-exclude-some-specific-traffic-from-being/m-p/34077" target="_blank"&gt;https://community.checkpoint.com/t5/General-Management-Topics/How-to-completely-exclude-some-specific-traffic-from-being/m-p/34077&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;The commands have changed slightly in R80.20+; substitute "fw samp add quota" with "fw sam_policy add quota" and "cat /proc/ppk/dos" with "fwaccel dos stats get".&amp;nbsp; You can also use "fw sam_policy get" to verify a quota rule in R80.20+ after you have added it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Dec 2019 04:17:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71302#M5468</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-12-29T04:17:44Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71343#M5469</link>
      <description>Sorry, I didn't make that totally clear in my initial post. I have a ton of samp rules configured, and verified by fw samp get output. However, it still refuses to kick in.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 30 Dec 2019 13:38:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71343#M5469</guid>
      <dc:creator>Egenity</dc:creator>
      <dc:date>2019-12-30T13:38:53Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71346#M5470</link>
      <description>&lt;P&gt;By default samp rules will only apply to traffic traversing interfaces defined as External in the firewall topology, have you done a &lt;STRONG&gt;fwaccel dos config set –-enable-internal&lt;/STRONG&gt; yet?&lt;/P&gt;</description>
      <pubDate>Mon, 30 Dec 2019 14:21:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71346#M5470</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-12-30T14:21:26Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71348#M5471</link>
      <description>Well, in this case, it is really only intended for external interface, so that angle shouldn't matter at this point.&lt;BR /&gt;&lt;BR /&gt;BACKGROUND: Customer wanted to implement an IP block list from a feed. I modified some scripts that Check Point originally supplied in an SK to work properly with the feed and create the SAM rules. That part works perfectly. The gateway just won't actually do anything with them.&lt;BR /&gt;&lt;BR /&gt;Small example of configured SAM policy rules:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;[Expert@MDC-PROD-FW02a:0]# fw samp get | more&lt;BR /&gt;&lt;BR /&gt;operation=add uid=&amp;lt;5e09eea8,000020a9,0501010a,0000089f&amp;gt; target=all timeout=1367 action=drop log=log comment=intelligo_ip_block service=any source=range:&lt;BR /&gt;&lt;BR /&gt;1.4.244.35-1.4.244.35 pkt-rate=0 req_type=quota&lt;BR /&gt;&lt;BR /&gt;operation=add uid=&amp;lt;5e09eea8,000020ab,0501010a,0000089f&amp;gt; target=all timeout=1367 action=drop log=log comment=intelligo_ip_block service=any source=range:&lt;BR /&gt;&lt;BR /&gt;1.4.246.250-1.4.246.250 pkt-rate=0 req_type=quota&lt;BR /&gt;&lt;BR /&gt;operation=add uid=&amp;lt;5e09eea8,000020ac,0501010a,0000089f&amp;gt; target=all timeout=1367 action=drop log=log comment=intelligo_ip_block service=any source=range:&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 30 Dec 2019 14:32:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71348#M5471</guid>
      <dc:creator>Egenity</dc:creator>
      <dc:date>2019-12-30T14:32:35Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71355#M5472</link>
      <description>&lt;P&gt;After a lot of troubleshooting, it appears to be a size limitation.&amp;nbsp; When I remove the long list and simply configure a test rule, the rate-limiting fires up.&lt;/P&gt;&lt;P&gt;The /var/log/messages gave some clues:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;Dec 30 09:54:00 2019 MDC-PROD-FW02a kernel: [SIM4];ERROR: [sxl0]dos_db_rate_rset_rules_alloc (dos_db.c:2838): halloc failed: size=397592&lt;BR /&gt;Dec 30 09:54:00 2019 MDC-PROD-FW02a kernel: [SIM4];ERROR: [sxl0]dos_db_rate_policy_alloc (dos_db.c:3518): dos_db_rate_rset_alloc failed&lt;BR /&gt;Dec 30 09:54:00 2019 MDC-PROD-FW02a kernel: [SIM4];ERROR: [sxl0]dos_db_rate_install (dos_db.c:4049): dos_db_rate_policy_alloc failed&lt;BR /&gt;Dec 30 09:54:00 2019 MDC-PROD-FW02a kernel: [SIM4];ERROR: [sxl0]dos_q_rate_install (dos_q.c:1257): dos_db_rate_install&lt;BR /&gt;Dec 30 09:54:00 2019 MDC-PROD-FW02a kernel: [fw4_0];cphwd_api_q_request_blocking: SecureXL device responded with an error (CPHWD_API_RESPONSE_ERROR). Retry = 0&lt;BR /&gt;Dec 30 09:54:00 2019 MDC-PROD-FW02a kernel: [fw4_0];ERROR: vs0: i0: cphwd_dos_ioctl_rate_install_g (cphwd_dos_ioctl.c:422): cphwd_dos_q_request_blocking: sxl_dev_id=0&lt;/P&gt;&lt;P&gt;The block list the customer wants implemented currently has 49,000+ entries (IP ranges).&lt;/P&gt;&lt;P&gt;TAC is a bit perplexed (&lt;SPAN&gt;6-0001867439)&lt;/SPAN&gt;, and I am not sure they totally understand the issue.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am curious if there are some adjustments somewhere to accommodate this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Dec 2019 16:48:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71355#M5472</guid>
      <dc:creator>Egenity</dc:creator>
      <dc:date>2019-12-30T16:48:05Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71363#M5473</link>
      <description>&lt;P&gt;Looking at your sample rules, it appears you are trying to perform a block with quotas by setting a packet rate of 0 for a single IP address in each statement.&amp;nbsp; The number of quota rules you are trying to install appears to be exceeding some kind of fixed memory/table size in SecureXL, and I don't see any SecureXL kernel variables exposed that could be tweaked to increase the limit.&lt;/P&gt;
&lt;P&gt;If you are doing a packet rate of zero to implement a block for all your samp rules, could you perhaps use the new&lt;STRONG&gt; &lt;SPAN class="lia-search-match-lithium lia-search-match-lithium"&gt;fw&lt;/SPAN&gt;accel dos blacklist&lt;/STRONG&gt; command added in R80.20 instead?&amp;nbsp; It is a much simpler feature and may have higher limits for the number of entries you can add.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Dec 2019 18:24:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71363#M5473</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-12-30T18:24:40Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71372#M5474</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/23568"&gt;@Egenity&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;to &lt;STRONG&gt;fwaccel dos blacklist&lt;/STRONG&gt; read more here: &lt;A href="https://community.checkpoint.com/docs/DOC-3407-r80x-performance-tuning-tip-ddos-fw-sam-vs-fwaccel-dos" target="_blank" rel="noopener"&gt;R80.x - Performance Tuning Tip - DDoS „fw sam“ vs. „fwaccel dos“&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The SecureXL penalty box is a mechanism that performs an early drop of packets arriving from suspected sources. This mechanism is supported starting in R75.40VS.&lt;/P&gt;
&lt;P&gt;Why not sam policy rules?&lt;/P&gt;
&lt;P&gt;The SAM policy rules consume some CPU resources on Security Gateway. We recommend to set an expiration that gives you time to investigate, but does not affect performance. The best practice is to keep only the SAM policy rules that you need. If you confirm that an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk. Or better use SecureXL penalty box from a performance point of view.&lt;/P&gt;
&lt;P&gt;The purpose of this feature is to allow the Security Gateway to cope better under high load, possibly caused by a DoS/DDoS attack. These commands „fwaccel dos“ and „fwaccel6 dos“&amp;nbsp; control the Rate Limiting for DoS mitigation techniques in SecureXL on the local security gateway or cluster member.&lt;/P&gt;
&lt;P&gt;In version R80.20, the penalty box feature is now supported in VSX mode and each virtual system can be independently configured for penalty box operation.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Attention!&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In R80.20, all "sim erdos" commands are no longer supported. They have been replaced with equivalent commands which can be found under "fwaccel dos". Penalty box is configured separately for IPv4 and IPv6. IPv4 configuration is performed using the "fwaccel dos" command. IPv6 configuration is performed using the "fwaccel6 dos" command.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Dec 2019 21:17:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71372#M5474</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-12-30T21:17:36Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71422#M5475</link>
      <description>&lt;P&gt;I will examine the blacklist function, but I suspect the same type of limitation may be present.&amp;nbsp; I went with the zero rate limit&amp;nbsp; process, as described in "&lt;SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103154%20   " target="_self"&gt;sk103154 -&amp;nbsp;How to block traffic coming from known malicious IP addresses&lt;/A&gt;" -- it appears to be what Check Point recommends.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The other method I tested was a script that builds a dynamic object with all the IP ranges from the black list.&amp;nbsp; It was based on the script and idea from openDBL (discussed in another thread here).&amp;nbsp; Then just referencing the object in the rulebase from drop/log action.&lt;/P&gt;&lt;P&gt;Although, the concept worked, the dyanmic_objects process was a little clunky and performed poorly with 49000+ entries which is why I started down the SecureXL DoS layer implementation.&amp;nbsp; Also, I could never get the dynamic_objects API to pull in all the entries, it would always reject about 5% of the ranges.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Dec 2019 21:06:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71422#M5475</guid>
      <dc:creator>Egenity</dc:creator>
      <dc:date>2019-12-31T21:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71438#M5476</link>
      <description>&lt;P&gt;From a performance point of view, I would always use fwaccel dos.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jan 2020 20:51:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71438#M5476</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-01-01T20:51:45Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71779#M5479</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;A major update to sk112454 was just published.&amp;nbsp; &amp;nbsp;It provides a lot more detail regarding DOS/Rate limiting rules, blacklist, and penalty box.&amp;nbsp; Hopefully it will help.&lt;/P&gt;
&lt;P&gt;If you are just trying to block specific source IP addresses, I recommend using fwaccel dos blacklist.&amp;nbsp; Per the sk, there is a hotfix available that will scale the blacklist to millions of IPs.&amp;nbsp; &amp;nbsp;It will be rolled into the R80.20 R80.30 JHF soon.&lt;/P&gt;
&lt;P&gt;I can confirm that fw samp rules tend to have resource allocation issues when using more than about 10,000 rules.&amp;nbsp; The root cause is memory allocation failures in the kernel.&amp;nbsp; &amp;nbsp;The work-around is to use the blacklist (create fewer fw samp rules).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jan 2020 15:13:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71779#M5479</guid>
      <dc:creator>Eric_Dale</dc:creator>
      <dc:date>2020-01-07T15:13:52Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71783#M5480</link>
      <description>&lt;P&gt;Wow, the updated SK answered all my questions and then some.&amp;nbsp; Great job!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jan 2020 15:26:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/71783#M5480</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-01-07T15:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/77310#M5931</link>
      <description>&lt;P&gt;Has the hotfix been rolled in to R80.30 JHF 155?&amp;nbsp; I looked down the list of fixes, but nothing stood out as matching.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Adam&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 14:48:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/77310#M5931</guid>
      <dc:creator>Egenity</dc:creator>
      <dc:date>2020-03-05T14:48:45Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/77441#M5935</link>
      <description>&lt;P&gt;Not delivered yet.&amp;nbsp; It is approved and I expect it will be included in the next ongoing take.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 12:07:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/77441#M5935</guid>
      <dc:creator>Eric_Dale</dc:creator>
      <dc:date>2020-03-06T12:07:31Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/79999#M6141</link>
      <description>Just to confirm, is the fix in R80.40 release already?</description>
      <pubDate>Fri, 27 Mar 2020 17:51:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/79999#M6141</guid>
      <dc:creator>Egenity</dc:creator>
      <dc:date>2020-03-27T17:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/80000#M6142</link>
      <description>&lt;P&gt;Yes - it is in R80.40 already.&amp;nbsp;&amp;nbsp; Also an easier to use command line for managing fw samp rules.&amp;nbsp; See&amp;nbsp; "fwaccel dos rate --help"&lt;/P&gt;</description>
      <pubDate>Fri, 27 Mar 2020 18:14:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/80000#M6142</guid>
      <dc:creator>Eric_Dale</dc:creator>
      <dc:date>2020-03-27T18:14:32Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/128862#M18800</link>
      <description>&lt;P&gt;Securexl ddos is a great feature and it works really well. I love it.&amp;nbsp;&lt;BR /&gt;However it is a pity that the logs generated by securexl DDOS are not indexed and therefore we have not visibility over the feature.&lt;BR /&gt;The reality is that it is quite risky to put in production a feature like this without logging/visibility.&lt;BR /&gt;When will the logs be indexed? It is very important for&amp;nbsp; a lot of customers I think.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 11:45:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/128862#M18800</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-09-07T11:45:51Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/128872#M18804</link>
      <description>&lt;P&gt;I agree - the logs need to be easily searchable.&amp;nbsp;&amp;nbsp; I know that there is some minimal indexing, but perhaps it is not enough.&lt;/P&gt;
&lt;P&gt;Log indexing is outside my area of expertise - if you could provide some details on the limitations you are encountering, and suggestions on what improvements are needed, I will see what can be done.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 14:41:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/128872#M18804</guid>
      <dc:creator>Eric_Dale</dc:creator>
      <dc:date>2021-09-07T14:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/128880#M18811</link>
      <description>&lt;P&gt;Well I think it is mandatory to be able to to search by source and destination ip for troubleshooting purposes.&lt;/P&gt;&lt;P&gt;But in terms of monitoring we need to be able to identify this type of alerts. The best and easiest way I can think is with the comment and name that fwaccel dos allows you to set&amp;nbsp; &amp;nbsp;with -c and -n.&amp;nbsp;&lt;BR /&gt;This way we could totally control the number of fwaccel dos, we could create graphs to track it, etc.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 16:35:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/128880#M18811</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-09-07T16:35:39Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL DoS Rate Limiting (samp rules)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/128942#M18833</link>
      <description>&lt;P&gt;Making logs searchable by comment/name is needed and is already in our list of things to do. I don't have an specific timeframe, but your request should help move it higher in the priority queue.&lt;/P&gt;
&lt;P&gt;I confirmed that the logs are already searchable by source/dest IP in SmartConsole. I tested with R81.10 and also R80.20 and it seems to be working.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 12:54:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-DoS-Rate-Limiting-samp-rules/m-p/128942#M18833</guid>
      <dc:creator>Eric_Dale</dc:creator>
      <dc:date>2021-09-08T12:54:15Z</dc:date>
    </item>
  </channel>
</rss>

