<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Concurrent Connections in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164635#M29499</link>
    <description>&lt;P&gt;You’d have to create a custom report in SmartEvent.&lt;BR /&gt;That assumes you’ve logged all the relevant traffic, of course.&lt;/P&gt;
&lt;P&gt;cpview might be another option.&lt;/P&gt;
&lt;P&gt;Why are you not checking this on the web servers directly, though?&lt;/P&gt;</description>
    <pubDate>Fri, 09 Dec 2022 15:02:34 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2022-12-09T15:02:34Z</dc:date>
    <item>
      <title>Concurrent Connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164511#M29450</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I need to know that how to find out concurrent session count per single IP Address.. As a example, how many https session for Single web server concurrently..&lt;/P&gt;&lt;P&gt;Also need to know that, what is the meaning of below highlighted count (Attached snap shot)..&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 08 Dec 2022 10:33:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164511#M29450</guid>
      <dc:creator>Scheer</dc:creator>
      <dc:date>2022-12-08T10:33:34Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent Connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164539#M29464</link>
      <description>&lt;P&gt;fw ctl conntab | grep ip.add.ress | wc -l&amp;nbsp; &amp;nbsp; &amp;nbsp;from the gateway should do it&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 14:10:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164539#M29464</guid>
      <dc:creator>Lloyd_Braun</dc:creator>
      <dc:date>2022-12-08T14:10:54Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent Connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164549#M29469</link>
      <description>&lt;P&gt;Number of records refers to the number of log entries in that file.&lt;/P&gt;
&lt;P&gt;Of course, the fact you're showing a screenshot from SmartView Tracker tells me you're probably on a pre-R80 release, which is no longer supported.&lt;BR /&gt;SmartView Tracker on R8x isn't supported either (though the binaries are still there).&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 15:12:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164549#M29469</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-12-08T15:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent Connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164553#M29470</link>
      <description>&lt;P&gt;Our Management Server is R81.10 and Security Gateway is R80.30. I am using &lt;STRONG&gt;C:\Program Files (x86)\CheckPoint\SmartConsole\R81.10\PROGRAM\CPlgv.exe&lt;/STRONG&gt; to track the concurrent sessions.&lt;/P&gt;&lt;P&gt;Is there other method to fulfill my requirement?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 15:23:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164553#M29470</guid>
      <dc:creator>Scheer</dc:creator>
      <dc:date>2022-12-08T15:23:20Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent Connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164554#M29471</link>
      <description>&lt;P&gt;Thats a good command, never seen it before.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 15:30:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164554#M29471</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-12-08T15:30:19Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent Connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164556#M29473</link>
      <description>&lt;P&gt;Even though we include the SmartView Tracker binaries as part of the SmartConsole installation still, it's no longer supported as of R80.&lt;BR /&gt;Which means you should find a different way to achieve the same result.&lt;/P&gt;
&lt;P&gt;The method&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8834"&gt;@Lloyd_Braun&lt;/a&gt;&amp;nbsp;specified is the best way to do it.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 15:45:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164556#M29473</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-12-08T15:45:38Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent Connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164558#M29474</link>
      <description>&lt;P&gt;Thanks for your reply. How can I identify that this session is relevant to the service like http https exactly?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 15:47:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164558#M29474</guid>
      <dc:creator>Scheer</dc:creator>
      <dc:date>2022-12-08T15:47:53Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent Connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164560#M29475</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;How can I identify that this session is relevant to the service like http https exactly?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 15:58:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164560#M29475</guid>
      <dc:creator>Scheer</dc:creator>
      <dc:date>2022-12-08T15:58:11Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent Connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164563#M29476</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8834"&gt;@Lloyd_Braun&lt;/a&gt;&amp;nbsp;Is this result for session count or request count?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 16:37:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164563#M29476</guid>
      <dc:creator>Scheer</dc:creator>
      <dc:date>2022-12-08T16:37:46Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent Connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164568#M29478</link>
      <description>&lt;P&gt;If you look at the output of fw ctl conntab, you have your answer:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;lt;(outbound, src=[10.6.5.251,44738], dest=[3.234.44.184,&lt;STRONG&gt;443], TCP&lt;/STRONG&gt;); 2503/3600, rule=0, tcp state=DST_FIN, service=nfsd(393), Ifnsin=1, Ifnsout=1, conn modules: Authentication, FG-1, ISP-Redundancy, SynDoSDefender&amp;gt;&lt;/P&gt;
&lt;P&gt;This connection is related to https (TCP 443, as bolded in the above output).&lt;BR /&gt;If you just want to see the number of https connections from a specific IP, from expert mode:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;fw ctl conntab | grep x.y.z.w | grep ",443], TCP" | wc -l&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 18:04:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164568#M29478</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-12-08T18:04:40Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent Connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164576#M29480</link>
      <description>&lt;P&gt;It's active sessions (i.e. TCP connection is still open).&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 19:46:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164576#M29480</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-12-08T19:46:36Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent Connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164588#M29482</link>
      <description>&lt;P&gt;I still feel that could be wrong use case from CP perspective and correct one is you will always get it&amp;nbsp; or should get it from your web server directly. I mean any one even just telnetting to server on port 443 and killing session; firewall will keep this entry idle for 3600 seconds as per a default timer and he might not be browsing the pages however firewall could still consider this as a session though not valid.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 02:42:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164588#M29482</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2022-12-09T02:42:20Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent Connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164590#M29483</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1551"&gt;@Blason_R&lt;/a&gt;&amp;nbsp;Currently we are using cloud WAF and only permitted public IP addresses can access the web server. We need to figure out LB issue. Therefore, need to check concurrent session count from the firewall level (Sessions or Request count).&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 03:23:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164590#M29483</guid>
      <dc:creator>Scheer</dc:creator>
      <dc:date>2022-12-09T03:23:32Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent Connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164591#M29484</link>
      <description>&lt;P&gt;Correct !! In this case you can easily get the actual hits on your WAF rather than your firewall because firewall is only going to see the traffic single source or pool of ip addresses belongs to your waf cloud provider.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 03:26:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164591#M29484</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2022-12-09T03:26:39Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent Connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164593#M29485</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1551"&gt;@Blason_R&lt;/a&gt;&amp;nbsp;Yes we can get that information on WAF. Unfortunately App support team inform that, https web traffic is not balancing among the&amp;nbsp; servers (04 web servers). They use Zabbix to monitor their utilization. WAF provide details with TCP connections and Zabbix provides details with per-request. That is why we need to figure out concurrent session count.&lt;/P&gt;&lt;P&gt;Also, is there any way to get old logs detail (Currently we have one month logs in our MGMT) ? like traffic distribution per IP with tcp level...!&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 03:37:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164593#M29485</guid>
      <dc:creator>Scheer</dc:creator>
      <dc:date>2022-12-09T03:37:42Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent Connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164635#M29499</link>
      <description>&lt;P&gt;You’d have to create a custom report in SmartEvent.&lt;BR /&gt;That assumes you’ve logged all the relevant traffic, of course.&lt;/P&gt;
&lt;P&gt;cpview might be another option.&lt;/P&gt;
&lt;P&gt;Why are you not checking this on the web servers directly, though?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 15:02:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/164635#M29499</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-12-09T15:02:34Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent Connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/170231#M30849</link>
      <description>&lt;P&gt;Is there a way to determine top ten high concurrent connections?&amp;nbsp; I have high spikes of connections on a regular bases and want to determine the IPs involved during this spike event.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 10:32:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/170231#M30849</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2023-02-03T10:32:21Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent Connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/170232#M30850</link>
      <description>&lt;P&gt;Look into&amp;nbsp;&lt;SPAN&gt;sk172229. Also, there are tools like connstat.exe from&amp;nbsp;sk85780, and at least a couple of third-party tools in the ToolBox, by Heiko&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 10:43:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/170232#M30850</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-02-03T10:43:37Z</dc:date>
    </item>
    <item>
      <title>Re: Concurrent Connections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/170260#M30858</link>
      <description>&lt;P&gt;Will take a look, thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 12:22:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Concurrent-Connections/m-p/170260#M30858</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2023-02-03T12:22:56Z</dc:date>
    </item>
  </channel>
</rss>

