<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cluster Capacity - peak/concurrent connections in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/149166#M23891</link>
    <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure why, lately we had seen an increase in memory utilization (like it doubled) and I was able to determine that it's due to some traffic spikes.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Memory utilization, it jumped from ~45% utilization to ~80% . Our GWs are 15600 with 32Gb memory (and quite some blades).&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, I tried to identify what traffic caused that, see some sources/destinations or anything that can get us close to a conclusion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sadly I wasn't lucky enough to get anywhere, therefore I come here asking for some guidance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In order to prevent this, I looked for a way to limit concurrent connections per IP/client, but I'm not yet there (using&amp;nbsp;fwaccel dos rate ) so any hints are wellcomed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is how&amp;nbsp;&lt;EM&gt;fw ctl pstat&lt;/EM&gt; results show on a node... that "&lt;STRONG&gt;1145453&lt;/STRONG&gt;&lt;STRONG&gt; peak concurrent&lt;/STRONG&gt;" bothers me&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt; - wth 1mil ?!?!?!?!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Roughly, I look for a way to get some reports, either from the Manager or from the box itself when the connections are over 500K (some value) to get the list of the connection table that I can work with and get some data out of it - still 500K or 1Mil ....&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;ALVA-FW01&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;ALVA-FW01&amp;gt; fw ctl pstat&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;System Capacity Summary:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Memory used: 48% (11578 MB out of 23889 MB) - below watermark&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;STRONG&gt;&amp;nbsp;Concurrent Connections: 54553 (Unlimited)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Aggressive Aging is enabled, not active&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hash kernel memory (hmem) statistics:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Total memory allocated: 13925134336 bytes in 3399691 (4096 bytes) blocks using 11 pools&lt;/P&gt;&lt;P&gt;&amp;nbsp; Initial memory allocated: 2503999488 bytes (Hash memory extended by 11421134848 bytes)&lt;/P&gt;&lt;P&gt;&amp;nbsp; Memory allocation&amp;nbsp; limit: 20039335936 bytes using 512 pools&lt;/P&gt;&lt;P&gt;&amp;nbsp; Total memory bytes&amp;nbsp; used:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; unused: 13925134336 (100.00%)&amp;nbsp;&amp;nbsp; peak: 14058217444&lt;/P&gt;&lt;P&gt;&amp;nbsp; Total memory blocks used:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; unused:&amp;nbsp; 3399691 (100%)&amp;nbsp;&amp;nbsp; peak:&amp;nbsp; 3592449&lt;/P&gt;&lt;P&gt;&amp;nbsp; Allocations: 3826885158 alloc, 0 failed alloc, 3801372538 free&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;System kernel memory (smem) statistics:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Total memory&amp;nbsp; bytes&amp;nbsp; used: 19378365776&amp;nbsp;&amp;nbsp; peak: 20195144584&lt;/P&gt;&lt;P&gt;&amp;nbsp; Total memory bytes wasted: 95203288&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Blocking&amp;nbsp; memory&amp;nbsp; bytes&amp;nbsp;&amp;nbsp; used: 69845532&amp;nbsp;&amp;nbsp; peak: 110230372&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Non-Blocking memory bytes used: 19308520244&amp;nbsp;&amp;nbsp; peak: 20084914212&lt;/P&gt;&lt;P&gt;&amp;nbsp; Allocations: 580197892 alloc, 0 failed alloc, 580126896 free, 0 failed free&lt;/P&gt;&lt;P&gt;&amp;nbsp; vmalloc bytes&amp;nbsp; used: 19216527896 expensive: no&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kernel memory (kmem) statistics:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Total memory&amp;nbsp; bytes&amp;nbsp; used: 8419234052&amp;nbsp;&amp;nbsp; peak: 16326533036&lt;/P&gt;&lt;P&gt;&amp;nbsp; Allocations: 112078525 alloc, 0 failed alloc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 86508537 free, 0 failed free&lt;/P&gt;&lt;P&gt;&amp;nbsp; External Allocations:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets: 66761920, SXL: 0, Reorder: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Zeco: 0, SHMEM: 94392, Resctrl: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ADPDRV: 0, PPK_CI: 0, PPK_CORR: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cookies:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 397638576 total, 394223007 alloc, 394212203 free,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4272844296 dup, 621658599 get, 2526281133 put,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2705746389 len, 2027218867 cached len, 0 chain alloc,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 chain free&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Connections:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 673523638 total, 296395981 TCP, 359631398 UDP, 17496203 ICMP,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 56 other, 39952 anticipated, 195487 recovered, 54554 concurrent,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;1145453&lt;/STRONG&gt;&lt;STRONG&gt; peak concurrent&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fragments:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8688744 fragments, 4341654 packets, 14 expired, 0 short,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 large, 0 duplicates, 0 failures&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAT:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2579202207/0 forw, 2673121164/0 bckw, 6811102365 tcpudp,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 33611286 icmp, 358817824-291829883 alloc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sync: Run "cphaprob syncstat" for cluster sync statistics.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ALVA-FW01&amp;gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A TAC will be opened on Monday....&lt;/P&gt;</description>
    <pubDate>Sat, 21 May 2022 14:05:13 GMT</pubDate>
    <dc:creator>Sorin_Gogean</dc:creator>
    <dc:date>2022-05-21T14:05:13Z</dc:date>
    <item>
      <title>Cluster Capacity - peak/concurrent connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/149166#M23891</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure why, lately we had seen an increase in memory utilization (like it doubled) and I was able to determine that it's due to some traffic spikes.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Memory utilization, it jumped from ~45% utilization to ~80% . Our GWs are 15600 with 32Gb memory (and quite some blades).&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, I tried to identify what traffic caused that, see some sources/destinations or anything that can get us close to a conclusion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sadly I wasn't lucky enough to get anywhere, therefore I come here asking for some guidance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In order to prevent this, I looked for a way to limit concurrent connections per IP/client, but I'm not yet there (using&amp;nbsp;fwaccel dos rate ) so any hints are wellcomed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is how&amp;nbsp;&lt;EM&gt;fw ctl pstat&lt;/EM&gt; results show on a node... that "&lt;STRONG&gt;1145453&lt;/STRONG&gt;&lt;STRONG&gt; peak concurrent&lt;/STRONG&gt;" bothers me&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt; - wth 1mil ?!?!?!?!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Roughly, I look for a way to get some reports, either from the Manager or from the box itself when the connections are over 500K (some value) to get the list of the connection table that I can work with and get some data out of it - still 500K or 1Mil ....&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;ALVA-FW01&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;ALVA-FW01&amp;gt; fw ctl pstat&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;System Capacity Summary:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Memory used: 48% (11578 MB out of 23889 MB) - below watermark&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;STRONG&gt;&amp;nbsp;Concurrent Connections: 54553 (Unlimited)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Aggressive Aging is enabled, not active&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hash kernel memory (hmem) statistics:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Total memory allocated: 13925134336 bytes in 3399691 (4096 bytes) blocks using 11 pools&lt;/P&gt;&lt;P&gt;&amp;nbsp; Initial memory allocated: 2503999488 bytes (Hash memory extended by 11421134848 bytes)&lt;/P&gt;&lt;P&gt;&amp;nbsp; Memory allocation&amp;nbsp; limit: 20039335936 bytes using 512 pools&lt;/P&gt;&lt;P&gt;&amp;nbsp; Total memory bytes&amp;nbsp; used:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; unused: 13925134336 (100.00%)&amp;nbsp;&amp;nbsp; peak: 14058217444&lt;/P&gt;&lt;P&gt;&amp;nbsp; Total memory blocks used:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; unused:&amp;nbsp; 3399691 (100%)&amp;nbsp;&amp;nbsp; peak:&amp;nbsp; 3592449&lt;/P&gt;&lt;P&gt;&amp;nbsp; Allocations: 3826885158 alloc, 0 failed alloc, 3801372538 free&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;System kernel memory (smem) statistics:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Total memory&amp;nbsp; bytes&amp;nbsp; used: 19378365776&amp;nbsp;&amp;nbsp; peak: 20195144584&lt;/P&gt;&lt;P&gt;&amp;nbsp; Total memory bytes wasted: 95203288&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Blocking&amp;nbsp; memory&amp;nbsp; bytes&amp;nbsp;&amp;nbsp; used: 69845532&amp;nbsp;&amp;nbsp; peak: 110230372&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Non-Blocking memory bytes used: 19308520244&amp;nbsp;&amp;nbsp; peak: 20084914212&lt;/P&gt;&lt;P&gt;&amp;nbsp; Allocations: 580197892 alloc, 0 failed alloc, 580126896 free, 0 failed free&lt;/P&gt;&lt;P&gt;&amp;nbsp; vmalloc bytes&amp;nbsp; used: 19216527896 expensive: no&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kernel memory (kmem) statistics:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Total memory&amp;nbsp; bytes&amp;nbsp; used: 8419234052&amp;nbsp;&amp;nbsp; peak: 16326533036&lt;/P&gt;&lt;P&gt;&amp;nbsp; Allocations: 112078525 alloc, 0 failed alloc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 86508537 free, 0 failed free&lt;/P&gt;&lt;P&gt;&amp;nbsp; External Allocations:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets: 66761920, SXL: 0, Reorder: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Zeco: 0, SHMEM: 94392, Resctrl: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ADPDRV: 0, PPK_CI: 0, PPK_CORR: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cookies:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 397638576 total, 394223007 alloc, 394212203 free,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4272844296 dup, 621658599 get, 2526281133 put,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2705746389 len, 2027218867 cached len, 0 chain alloc,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 chain free&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Connections:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 673523638 total, 296395981 TCP, 359631398 UDP, 17496203 ICMP,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 56 other, 39952 anticipated, 195487 recovered, 54554 concurrent,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;1145453&lt;/STRONG&gt;&lt;STRONG&gt; peak concurrent&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fragments:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8688744 fragments, 4341654 packets, 14 expired, 0 short,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 large, 0 duplicates, 0 failures&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAT:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2579202207/0 forw, 2673121164/0 bckw, 6811102365 tcpudp,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 33611286 icmp, 358817824-291829883 alloc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sync: Run "cphaprob syncstat" for cluster sync statistics.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ALVA-FW01&amp;gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A TAC will be opened on Monday....&lt;/P&gt;</description>
      <pubDate>Sat, 21 May 2022 14:05:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/149166#M23891</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-05-21T14:05:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cluster Capacity - peak/concurrent connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/149731#M24045</link>
      <description>&lt;P&gt;Almost certainly some kind of internal auditor running a port scan from the inside that is mostly accepted by the firewall, or perhaps an overly-aggressive internal Network Monitoring System doing probing.&amp;nbsp; Only way to figure out who it is would be looking at traffic logs.&amp;nbsp; They key is that a flood of connections like this have to be accepted to run up the connections table like that, so they probably came from the inside as a scan from the outside would be mostly dropped and never create entries in the connections table at all.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This situation was covered in my book, note that the&lt;STRONG&gt; fw samp/fw sam_policy&lt;/STRONG&gt; command has been deprecated since the book was published and you should use the equivalent&amp;nbsp; &lt;STRONG&gt;fwaccel dos&lt;/STRONG&gt; command in R80.40+.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="auditor1.png" style="width: 810px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/16756i52509162A06657AB/image-size/large?v=v2&amp;amp;px=999" role="button" title="auditor1.png" alt="auditor1.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="auditor2.png" style="width: 810px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/16757i8951B40DEEF64569/image-size/large?v=v2&amp;amp;px=999" role="button" title="auditor2.png" alt="auditor2.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="auditor3.png" style="width: 809px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/16758i77D09B3C021D1D56/image-size/large?v=v2&amp;amp;px=999" role="button" title="auditor3.png" alt="auditor3.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="auditor4.png" style="width: 813px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/16759i5DAAA51F33963621/image-size/large?v=v2&amp;amp;px=999" role="button" title="auditor4.png" alt="auditor4.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="auditor5.png" style="width: 810px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/16760iD22E2208B8566718/image-size/large?v=v2&amp;amp;px=999" role="button" title="auditor5.png" alt="auditor5.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 May 2022 13:34:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/149731#M24045</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-05-30T13:34:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cluster Capacity - peak/concurrent connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/149746#M24047</link>
      <description>&lt;P&gt;Also from your book, OP could use this command whilst the connections are on the table:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;fw tab -u -t connections |awk '{ print $2 }'|sort -n |uniq -c|sort -nr|head -10&lt;P&gt;This handy command will provide an output something like this:&lt;/P&gt;&lt;P&gt;12322 0a1e0b53&lt;/P&gt;&lt;P&gt;212 0a1e0b50&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then translate hex to IP&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 May 2022 16:05:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/149746#M24047</guid>
      <dc:creator>Juan_</dc:creator>
      <dc:date>2022-05-30T16:05:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cluster Capacity - peak/concurrent connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/150128#M24214</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/44717"&gt;@Juan_&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for that, I'm using already below commands that are triggered when I get over 150K concurrent connections in order to determine source or destination IP with the most connections.&amp;nbsp;&lt;/P&gt;&lt;P&gt;(the -f provides the IP's in "human readable" form) (time is used to measure how loong it takes to process the whole table - whatever size it is)&lt;/P&gt;&lt;P&gt;time (fw tab -u -t connections -f |awk '{print $19}' |grep -v "+" |grep -v "^$" | sed 's/;/ /g' | sort -n | uniq -c | sort -nr | head -n 10)&lt;BR /&gt;time (fw tab -u -t connections -f |awk '{print $23}' |grep -v "+" |grep -v "^$" | sed 's/;/ /g' | sort -n | uniq -c | sort -nr | head -n 10)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With this I got smth like I show below, pointing that our external DNS server 213.6x.yy2.xx7 is getting the attention from time to time:&lt;/P&gt;&lt;P&gt;STARTED AT: Sun May 29 01:54:16 CEST 2022&lt;BR /&gt;Current connections count: 434177&lt;BR /&gt;Begin listing TOP 10 SRC conenctions: Sun May 29 01:54:16 CEST 2022&lt;BR /&gt;647748 213.6x.yy2.xx7&lt;/P&gt;&lt;P&gt;STARTED AT: Wed Jun 1 12:16:51 CEST 2022&lt;BR /&gt;Current connections count: 330492&lt;BR /&gt;Begin listing TOP 10 SRC conenctions: Wed Jun 1 12:16:52 CEST 2022&lt;BR /&gt;86756 213.6x.yy2.xx7&lt;/P&gt;&lt;P&gt;STARTED AT: Fri Jun 3 12:53:17 CEST 2022&lt;BR /&gt;Current connections count: 448174&lt;BR /&gt;Begin listing TOP 10 SRC conenctions: Fri Jun 3 12:53:25 CEST 2022&lt;BR /&gt;121168 213.6x.yy2.xx7&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jun 2022 12:38:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/150128#M24214</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-06-03T12:38:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cluster Capacity - peak/concurrent connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/150133#M24217</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for pointing that out&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; .&lt;/P&gt;&lt;P&gt;I already had some "fwaccel dos rules" that are set in monitor mode - just to catch what/where when it happens.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Like I told Juan, we manage to identify one of our external DNS servers being too used from time to time, so I just added the following rule, and we'll watch it for next days . If we're reaching to a good value, we'll change the -a n (notify) to an -a b (block) .&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;"fwaccel dos rate add &lt;/I&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;I&gt;-a n -l r -n "F5_DNSWatch"&lt;/I&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;I&gt; destination cidr:&lt;SPAN&gt;213.6x.yy2.xx7&lt;/SPAN&gt;/32 service 17/53 new-conn-rate 500 track source"&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My main problem is, I have hard time determining a good "&lt;STRONG&gt;&lt;I&gt;new-conn-rate&lt;/I&gt;&lt;/STRONG&gt;" per service .&lt;/P&gt;&lt;P&gt;Secondly, I wonder how this "fwaccel dos rate" works in conjunction with fast_accel; would it be catch by "dos rate" limit or ?&lt;/P&gt;&lt;P&gt;fw ctl fast_accel add any &lt;STRONG&gt;&lt;I&gt;&lt;SPAN&gt;213.6x.yy2.xx7&lt;/SPAN&gt;&lt;/I&gt;&lt;/STRONG&gt; 53 17&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(we did this in the past, as I wanted to take the DNS out of the inspection and send it to the other box - not convinced is the best aproach)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you and have a nice week,&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jun 2022 12:38:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/150133#M24217</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-06-03T12:38:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cluster Capacity - peak/concurrent connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/150157#M24322</link>
      <description>&lt;P&gt;Yeah DNS is a tricky one as far as new-conn-rate since UDP doesn't have connections per se but the firewall tries to track it that way; recursive lookups do cause a lot of rapid-fire DNS "connections" and setting the rate limit too low can cause intermittent DNS failures, which then can cause all kinds of strange annoying problems.&amp;nbsp; I think your approach of monitoring it for awhile to come up with a reasonable rate limit is a good one.&lt;/P&gt;
&lt;P&gt;All fast_accel does is force non-F2F traffic into the SecureXL fully-accelerated path for handling; doing so should not affect the enforcement of &lt;STRONG&gt;fwaccel dos&lt;/STRONG&gt; commands as my understanding is that they are checked first in sim/SecureXL before any further processing by sim or a Firewall Worker.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jun 2022 15:56:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/150157#M24322</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-06-03T15:56:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cluster Capacity - peak/concurrent connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/152614#M25433</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just coming back with some updates.&lt;/P&gt;
&lt;P&gt;We've taken 2 decisions, first was to lower the UDP 53 port timer from 40 sec to 10 sec for the rule(s) that were allowing external access to our public DNS, and watching the traffic for a while, we've see that this made the "attacks" lower in current session, we went from 600K (some weeks ago) to ~200-250K after we applied the lower UDP53 .&lt;/P&gt;
&lt;P&gt;Now that we manage to diminish this, we also set some fwaccel dos new-conn-rate rules with a limit of 100 new connections per second. This was kicking in when we've got new High DNS traffic, and we noticed that the timeframe of the "attack" got shorter .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hopefully it will help you too.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ty,&lt;/P&gt;</description>
      <pubDate>Sat, 09 Jul 2022 06:28:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/152614#M25433</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-07-09T06:28:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cluster Capacity - peak/concurrent connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/152677#M25460</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;, I want to ask you (and all others) for some hints, as we did applied some fwaccel dos rate with new-conn-rate set to 100.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All is good and we see that the limitation kicks in, but we don't see the pbox being triggered for this DOS Rate Limit traffic drops.&lt;/P&gt;
&lt;P&gt;So any hint on what/where we could monitor and see/understand why the DOS Rate Limit is not triggering the Pbox and get the IP's into ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ty,&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jul 2022 10:09:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/152677#M25460</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-07-11T10:09:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cluster Capacity - peak/concurrent connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/152686#M25465</link>
      <description>&lt;P&gt;By default the penalty box will only apply to traffic traversing an interface defined as external, if you want it applied to all traffic you need to run &lt;STRONG&gt;fwaccel dos config set --enable-internal&lt;/STRONG&gt;.&amp;nbsp; Also make sure you have the penalty box feature enabled and not just configured with &lt;STRONG&gt;fwaccel dos config set --enable-pbox&lt;/STRONG&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jul 2022 11:59:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/152686#M25465</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-07-11T11:59:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cluster Capacity - peak/concurrent connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/152693#M25466</link>
      <description>&lt;P&gt;hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Pbox is enabled internally also, still the DNS problem were facing comes from external interface towards Public DMZ .&lt;/P&gt;
&lt;P&gt;It can be that the 500packets/sec is not getting triggered by the "new-conn-rate 100" ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As in the CKP Logs we can clearly see that traffic gets dropped for DOS/RateLimit - like for this below we see ~200 drops in logs for the last hour.&lt;/P&gt;
&lt;P&gt;This is why I asked for some extra hints&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; .&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17146i9BB5F3A08D7D7676/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Untitled.png" alt="Untitled.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="100%"&gt;
&lt;P&gt;[Expert@ALVA-FW01:0]# fwaccel dos pbox -m&lt;/P&gt;
&lt;P&gt;Penalty box monitor_only: "on"&lt;/P&gt;
&lt;P&gt;[Expert@ALVA-FW01:0]# fwaccel dos config get&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; rate limit: enabled (with policy)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; rule cache: enabled&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;pbox: enabled&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; deny list: enabled (with policy)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop frags: disabled&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop opts: disabled&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;internal: enabled&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; monitor: disabled&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; log drops: enabled&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; log pbox: enabled&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; notif rate: 100 notifications/second&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pbox rate: 500 packets/second&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pbox tmo: 180 seconds&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;[Expert@ALVA-FW01:0]#&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ty,&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jul 2022 12:37:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cluster-Capacity-peak-concurrent-connections/m-p/152693#M25466</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-07-11T12:37:07Z</dc:date>
    </item>
  </channel>
</rss>

