<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Capture shows packet drops by kernel in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capture-shows-packet-drops-by-kernel/m-p/146232#M24232</link>
    <description>&lt;P&gt;The "packets dropped by kernel" just means that captured packets streamed into tcpdump's buffer faster than they could be emptied and were lost for purposes of being captured.&amp;nbsp; You did not actually lose any traffic being processed by the firewall as traffic is copied (or "T"'ed) at the NIC driver level into tcpdump's buffer, and the original packet continues on and is not lost.&lt;/P&gt;
&lt;P&gt;I believe the default size of tcpdump's buffer is 32767 KiB (32MB), you could try increasing it via the -B option to something like 65536 and see if that eliminates the kernel drops.&amp;nbsp; Or try to apply a more stringent filter in your tcpdump syntax.&lt;/P&gt;
&lt;P&gt;Or best of all just use cppcap instead.&lt;/P&gt;</description>
    <pubDate>Wed, 13 Apr 2022 20:28:29 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2022-04-13T20:28:29Z</dc:date>
    <item>
      <title>Capture shows packet drops by kernel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capture-shows-packet-drops-by-kernel/m-p/146225#M24231</link>
      <description>&lt;P&gt;Hi Mates,&lt;/P&gt;
&lt;P&gt;We have syslog traffic passing through firewall. It is Tons of traffic. Syslog admin was saying that he is not getting enough data from all devices.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I captured tcpdump traffic on firewall, it shows only 7 to 8 packets but at the end it shows,&lt;/P&gt;
&lt;P&gt;9 packets captured&lt;/P&gt;
&lt;P&gt;2633 packets received by filter&lt;/P&gt;
&lt;P&gt;2448 packets dropped by kernel&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am not seeing any drops with fw ctl zdebug command. Sometime capture says "buffer full". We dont want to increase buffer size. Is there any suggestion how we can resolve this (dropped by kernel) issue?&lt;/P&gt;
&lt;P&gt;There is no issue with route or flow. syslog receives data but it is not enough,&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Apr 2022 18:36:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capture-shows-packet-drops-by-kernel/m-p/146225#M24231</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2022-04-13T18:36:14Z</dc:date>
    </item>
    <item>
      <title>Re: Capture shows packet drops by kernel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capture-shows-packet-drops-by-kernel/m-p/146232#M24232</link>
      <description>&lt;P&gt;The "packets dropped by kernel" just means that captured packets streamed into tcpdump's buffer faster than they could be emptied and were lost for purposes of being captured.&amp;nbsp; You did not actually lose any traffic being processed by the firewall as traffic is copied (or "T"'ed) at the NIC driver level into tcpdump's buffer, and the original packet continues on and is not lost.&lt;/P&gt;
&lt;P&gt;I believe the default size of tcpdump's buffer is 32767 KiB (32MB), you could try increasing it via the -B option to something like 65536 and see if that eliminates the kernel drops.&amp;nbsp; Or try to apply a more stringent filter in your tcpdump syntax.&lt;/P&gt;
&lt;P&gt;Or best of all just use cppcap instead.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Apr 2022 20:28:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capture-shows-packet-drops-by-kernel/m-p/146232#M24232</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-04-13T20:28:29Z</dc:date>
    </item>
    <item>
      <title>Re: Capture shows packet drops by kernel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capture-shows-packet-drops-by-kernel/m-p/146264#M24233</link>
      <description>&lt;P&gt;Hi Tim,&lt;/P&gt;
&lt;P&gt;Thanks for the explanation. Actually I was confused because I was not able to capture any packet with fw monitor as well but as it is R80.30 version, I need to use "fw monitor -F" syntax to capture traffic. Now all is set.&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Apr 2022 09:39:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capture-shows-packet-drops-by-kernel/m-p/146264#M24233</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2022-04-14T09:39:22Z</dc:date>
    </item>
    <item>
      <title>Re: Capture shows packet drops by kernel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capture-shows-packet-drops-by-kernel/m-p/146270#M24234</link>
      <description>&lt;P&gt;Yes if you can live with &lt;STRONG&gt;fw monitor -F&lt;/STRONG&gt;'s extremely limited filtering syntax that will work too.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Apr 2022 11:50:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capture-shows-packet-drops-by-kernel/m-p/146270#M24234</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-04-14T11:50:08Z</dc:date>
    </item>
  </channel>
</rss>

