<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SecureXL dos feature adjustment and information collection in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-dos-feature-adjustment-and-information-collection/m-p/145985#M23115</link>
    <description>&lt;P&gt;I believe your "Catch All" rule is taking precedence because it is the most stringent (i.e. enforcing the lowest new-conn-rate and also matching any/any), which is how Threat Prevention policies in general work.&amp;nbsp; What happens if you set the new-conn-rate to 200 or 201 in your Catch All rule?&lt;/P&gt;</description>
    <pubDate>Mon, 11 Apr 2022 15:57:03 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2022-04-11T15:57:03Z</dc:date>
    <item>
      <title>SecureXL dos feature adjustment and information collection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-dos-feature-adjustment-and-information-collection/m-p/145983#M23114</link>
      <description>&lt;P&gt;Hello Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've encountered a special challenge with SecurexL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've also opend&amp;nbsp; a SR.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;He're the case.&lt;/P&gt;&lt;P&gt;We had false-positive dos drops, so we had to enable the monitor mode with '&lt;STRONG&gt;&lt;EM&gt;fwaccel dos config set --enable-monitor'&amp;nbsp;&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;as described in&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112454&amp;amp;partition=Advanced&amp;amp;product=SecureXL" target="_self"&gt;sk112454&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We've also added rate limit rule like&lt;/P&gt;&lt;P&gt;fwaccel dos rate add -a d -l r -n "comment 1 " service 6/53 source cidr:&amp;lt;NET1&amp;gt; destination cidr:&amp;lt;NET4&amp;gt; new-conn-rate 200 track source&lt;BR /&gt;fwaccel dos rate add -a d -l r -n "comment 2" service 6/53 source cidr:&amp;lt;NET2&amp;gt; destination cidr:&amp;lt;NET4&amp;gt; new-conn-rate 200 track source&lt;BR /&gt;fwaccel dos rate add -a d -l r -n "comment 3" service 6/53 source cidr:&amp;lt;NET3&amp;gt; destination cidr:&amp;lt;NET4&amp;gt; new-conn-rate 200 track source&lt;BR /&gt;fwaccel dos rate add -a d -l r -n "comment 4 " service 17/53 source cidr:&amp;lt;NET1&amp;gt; destination cidr:&amp;lt;NET4&amp;gt; new-conn-rate 200 track source&lt;BR /&gt;fwaccel dos rate add -a d -l r -n "comment 5" service 17/53 source cidr:&amp;lt;NET2&amp;gt; destination cidr:&amp;lt;NET4&amp;gt; new-conn-rate 200 track source&lt;BR /&gt;fwaccel dos rate add -a d -l r -n "comment 6" service 17/53 source cidr:&amp;lt;NET3&amp;gt; destination cidr:&amp;lt;NET4&amp;gt; new-conn-rate 200 track source&lt;/P&gt;&lt;P&gt;'&lt;STRONG&gt;fwaccel dos rate get'&amp;nbsp;&lt;/STRONG&gt;shows the correct output like&lt;BR /&gt;operation=add uid=&amp;lt;624fcac1,00000000,f96a15ac,00000ffe&amp;gt; target=all timeout=none action=drop log=regular name=&amp;lt;&amp;gt; service=6/53 source=cidr:&amp;lt;NET1&amp;gt; destination=cidr:&amp;lt;NET4&amp;gt; new-conn-rate=200 track=source&lt;BR /&gt;operation=add uid=&amp;lt;624fff4a,00000000,f96a15ac,0000583d&amp;gt; target=all timeout=none action=drop log=regular name=&amp;lt;&amp;gt; service=17/53 source=cidr:&amp;lt;NET2&amp;gt; destination=cidr:&amp;lt;NET4&amp;gt; new-conn-rate=200 track=source&lt;BR /&gt;operation=add uid=&amp;lt;624fff53,00000000,f96a15ac,00005856&amp;gt; target=all timeout=none action=drop log=regular name=&amp;lt;&amp;gt; service=17/53 source=cidr:&amp;lt;NET1&amp;gt; destination=cidr:&amp;lt;NET4&amp;gt; new-conn-rate=200 track=source&lt;BR /&gt;operation=add uid=&amp;lt;624fcac5,00000000,f96a15ac,0000100c&amp;gt; target=all timeout=none action=drop log=regular name=&amp;lt;&amp;gt; service=6/53 source=cidr:&amp;lt;NET3&amp;gt; destination=cidr:&amp;lt;NET4&amp;gt; new-conn-rate=200 track=source&lt;BR /&gt;operation=add uid=&amp;lt;624fcc20,00000000,f96a15ac,00001d20&amp;gt; target=all timeout=none action=drop log=regular name=Catch All source=any destination=any new-conn-rate=20 track=source service=any&lt;BR /&gt;operation=add uid=&amp;lt;624fff58,00000000,f96a15ac,00005867&amp;gt; target=all timeout=none action=drop log=regular name=&amp;lt;&amp;gt; service=17/53 source=cidr:&amp;lt;NET3&amp;gt; destination=cidr:&amp;lt;NET4&amp;gt; new-conn-rate=200 track=source&lt;BR /&gt;operation=add uid=&amp;lt;624fcab8,00000000,f96a15ac,00000fd9&amp;gt; target=all timeout=none action=drop log=regular name=&amp;lt;&amp;gt; service=6/53 source=cidr:&amp;lt;NET2&amp;gt; destination=cidr:&amp;lt;NET4&amp;gt; new-conn-rate=200 track=source&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now the connections got still detected (due monitoring mode), but the logs shows int the SecureXL message:&lt;/P&gt;&lt;P&gt;'&lt;EM&gt;The packet violated the DOS module's rate limiting rulebase (SecureXL device 0) (policy: 22) (total rules: 1)'&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;In the comment section it shows : '&lt;EM&gt;&amp;lt;624fcc20,00000000,f96a15ac,00001d20&amp;gt;&lt;/EM&gt;' which refers to the default rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SO, tl;dr&lt;/P&gt;&lt;P&gt;Why the custom rules not working, and why the SecureXL message show only total rules:1?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Follow UP question: Does anyone have a good oneline to show the numer ob new connections to an ip with/without serice: i.e. all new dns requests to 8.8.8.8? The fwaccel dos stats get if not really detailed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Christoph Hornung&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2022 15:46:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-dos-feature-adjustment-and-information-collection/m-p/145983#M23114</guid>
      <dc:creator>Christoph_Hornu</dc:creator>
      <dc:date>2022-04-11T15:46:05Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL dos feature adjustment and information collection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-dos-feature-adjustment-and-information-collection/m-p/145985#M23115</link>
      <description>&lt;P&gt;I believe your "Catch All" rule is taking precedence because it is the most stringent (i.e. enforcing the lowest new-conn-rate and also matching any/any), which is how Threat Prevention policies in general work.&amp;nbsp; What happens if you set the new-conn-rate to 200 or 201 in your Catch All rule?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2022 15:57:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-dos-feature-adjustment-and-information-collection/m-p/145985#M23115</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-04-11T15:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL dos feature adjustment and information collection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-dos-feature-adjustment-and-information-collection/m-p/146062#M23135</link>
      <description>&lt;P&gt;Thanks, that would explain the behaviour. I will try if we can set up this for testing.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 10:13:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SecureXL-dos-feature-adjustment-and-information-collection/m-p/146062#M23135</guid>
      <dc:creator>Christoph_Hornu</dc:creator>
      <dc:date>2022-04-12T10:13:46Z</dc:date>
    </item>
  </channel>
</rss>

