<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Aggressive Aging in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Aggressive-Aging/m-p/115893#M27136</link>
    <description>&lt;P&gt;In case you don't want to download and open the screenshot:&lt;/P&gt;&lt;P&gt;Search term "aggressive_aging_general" is used.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 13 Apr 2021 06:55:47 GMT</pubDate>
    <dc:creator>Sascha_Bremshey</dc:creator>
    <dc:date>2021-04-13T06:55:47Z</dc:date>
    <item>
      <title>Aggressive Aging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Aggressive-Aging/m-p/49209#M27133</link>
      <description>&lt;P&gt;TL;DR How does one determine if a connection entry was purged because Aggressive Aging?&lt;/P&gt;&lt;P&gt;Apologies if this has been answered previously, but I'm struggling to find information about how to track down when aggressive aging has occurred. I know that "fw ctl pstat" will tell me if it is active but is there a way to track down if it has happened recently.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have some connections that are getting registered as out of state and I'd like to try and determine if they are the result of TCP start timeouts, TCP session timeouts or aggressive aging timeouts.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some of them are easy to determine. Couple minutes after an accept, you get an ACK dropped out of state, probably the start timeout. Couple hours after an accept, you get out of state drops on the same port combinations, probably a session.&amp;nbsp;&lt;/P&gt;&lt;P&gt;But the forty minute after accept drops for the same port combination are the ones that are stumping me.&amp;nbsp; Within the session timeouts, way too far out to be a start timeout (unless something is REALLY wrong with our wireless network) but within the range of the Aggressive Aging settings.&lt;/P&gt;&lt;P&gt;Our connection limit is set to Automatic and the firewall itself doesn't seem to be under too much load.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 16:35:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Aggressive-Aging/m-p/49209#M27133</guid>
      <dc:creator>Jason_Carrillo</dc:creator>
      <dc:date>2019-03-29T16:35:41Z</dc:date>
    </item>
    <item>
      <title>Re: Aggressive Aging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Aggressive-Aging/m-p/49228#M27134</link>
      <description>&lt;P&gt;Just search in smartlog, see attached screenshot&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 18:37:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Aggressive-Aging/m-p/49228#M27134</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2019-03-29T18:37:11Z</dc:date>
    </item>
    <item>
      <title>Re: Aggressive Aging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Aggressive-Aging/m-p/49230#M27135</link>
      <description>Perfect! Thank you. No sign of those logs in my walls, so AA doesn't appear to be the culprit.</description>
      <pubDate>Fri, 29 Mar 2019 18:39:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Aggressive-Aging/m-p/49230#M27135</guid>
      <dc:creator>Jason_Carrillo</dc:creator>
      <dc:date>2019-03-29T18:39:16Z</dc:date>
    </item>
    <item>
      <title>Re: Aggressive Aging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Aggressive-Aging/m-p/115893#M27136</link>
      <description>&lt;P&gt;In case you don't want to download and open the screenshot:&lt;/P&gt;&lt;P&gt;Search term "aggressive_aging_general" is used.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Apr 2021 06:55:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Aggressive-Aging/m-p/115893#M27136</guid>
      <dc:creator>Sascha_Bremshey</dc:creator>
      <dc:date>2021-04-13T06:55:47Z</dc:date>
    </item>
    <item>
      <title>Re: Aggressive Aging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Aggressive-Aging/m-p/125705#M27137</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;/P&gt;&lt;P&gt;By default when the connection table reaches 80% of its capacity the anti-Dos mechanism agressive aging takes place.&lt;/P&gt;&lt;P&gt;Has anyone configured a snmp trap mechanism in order to get&amp;nbsp; a notification if capacity of connection table reaches 70% for example?&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Kostas&lt;/P&gt;</description>
      <pubDate>Wed, 04 Aug 2021 14:41:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Aggressive-Aging/m-p/125705#M27137</guid>
      <dc:creator>KostasGR</dc:creator>
      <dc:date>2021-08-04T14:41:10Z</dc:date>
    </item>
    <item>
      <title>Re: Aggressive Aging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Aggressive-Aging/m-p/139613#M27138</link>
      <description>&lt;P&gt;Yes - we have set it to 45% to ensure we're capable of full site failover.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jan 2022 17:53:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Aggressive-Aging/m-p/139613#M27138</guid>
      <dc:creator>pjoseph</dc:creator>
      <dc:date>2022-01-26T17:53:18Z</dc:date>
    </item>
  </channel>
</rss>

