<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Understanding fw ctl conntab / Issues with Jenkins after introducing firewall in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-fw-ctl-conntab-Issues-with-Jenkins-after/m-p/175377#M31990</link>
    <description>&lt;P&gt;Awesome news, thanks for sharing! &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 20 Mar 2023 10:40:15 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2023-03-20T10:40:15Z</dc:date>
    <item>
      <title>Understanding fw ctl conntab / Issues with Jenkins after introducing firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-fw-ctl-conntab-Issues-with-Jenkins-after/m-p/173371#M31509</link>
      <description>&lt;P&gt;Dear CheckMates,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we have an issue with our Jenkins farm since we have introduced a new security group into our internal networks.&lt;/P&gt;&lt;P&gt;Every now and then our devs complain that they lose the connection to some Jenkins Agents.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After some research on the firewall, we have seen that the Jenkins Master has sent an "ACK" after 12hours.&lt;/P&gt;&lt;P&gt;Upon this, we have set the session timeout to 24h and did some further checks, realizing that actually the session gets refreshed frequently&lt;/P&gt;&lt;P&gt;&amp;lt;(inbound, src=[10.*.*.*,51889], dest=[10.*.*.*,50001], TCP); 86070/86392, rule=45, tcp state=TCP_ESTABLISHED, service=514, Ifncin=157, Ifnsin=235, conn modules: , Authentication, FG-1&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The timer never fell below 85000 seconds. However, the latest "drop" was when the Jenkins Master has sent the "ACK" after more than 48h!&lt;/P&gt;&lt;P&gt;We then have had a discussion with the devs and he changed a setting, which removed some tunneling functionality and the fw ctl conntab changed:&lt;/P&gt;&lt;P&gt;&amp;lt;(inbound, src=[10.*.*.*,62532], dest=[10.*.*.*,50001], TCP); 86262/86357, rule=45, tcp state=TCP_ESTABLISHED, service=514, Ifncin=157&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There no longer is a "Ifnsin=235" parameter.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately, I was not able to find a proper documetation, explaining what these parameters mean, so could anyone please help us, with the meaning of&amp;nbsp;Ifnsin=235 and&amp;nbsp;Ifncin=157?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much in advance and Best Regards,&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2023 14:00:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-fw-ctl-conntab-Issues-with-Jenkins-after/m-p/173371#M31509</guid>
      <dc:creator>T_Sonnberger</dc:creator>
      <dc:date>2023-03-02T14:00:33Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding fw ctl conntab / Issues with Jenkins after introducing firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-fw-ctl-conntab-Issues-with-Jenkins-after/m-p/173374#M31512</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/50001"&gt;@T_Sonnberger&lt;/a&gt;&amp;nbsp;...seems like you did an excellent job investigating this, so kudos to you! I have some questions...&lt;/P&gt;
&lt;P&gt;1) You seem to indicate this happened with introcution of new security group. Were there any other changes done as far as security rules?&lt;/P&gt;
&lt;P&gt;2) If you do basic zdebug, are you able to see any drops to related/affected IP addresses/services?&lt;/P&gt;
&lt;P&gt;3) Have you attempted to do fw monitor -F flag command to confirm the behavior? Idea is this...fw monitor -F "srcip, srcport, dstip,dstport,protocol" -F "srcip,srcport,dstip,dstport,protocol"&lt;/P&gt;
&lt;P&gt;example, say src is 1.1.1.1 and dst is 2.2.2.2 and port is 443&lt;/P&gt;
&lt;P&gt;fw monitor -F "1.1.1.1,0,2.2.2.2,443,0" -F "2.2.2.2,0,1.1.1.1,443,0"&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2023 14:26:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-fw-ctl-conntab-Issues-with-Jenkins-after/m-p/173374#M31512</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-02T14:26:18Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding fw ctl conntab / Issues with Jenkins after introducing firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-fw-ctl-conntab-Issues-with-Jenkins-after/m-p/173380#M31515</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much for the reply.&lt;/P&gt;&lt;P&gt;To answer your questions:&lt;/P&gt;&lt;P&gt;1) No further changes were introduced. The ruleset on the new firewall is currently more or less "any any allow"&lt;/P&gt;&lt;P&gt;The security group will seperate our internal server networks and currently we are in "monitor mode" to be able to build rules based on the traffic patterns.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) I do not see any drops with fwctl zdebug or in smart log. Maybe it's worth to mention, that it is the destination that sends the "ACK" as an answer days after the initial setup of the session.&lt;/P&gt;&lt;P&gt;The latest example is:&lt;/P&gt;&lt;P&gt;28th Feb - 7:14:31 AM - Client A:65226 - Server B:50001&lt;/P&gt;&lt;P&gt;Today, 3:16:41 AM Server B:50001 - Client A:65226 - First Packet isn't syn (ACK)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Issuing the fw monitor command shows that currently there is frequent traffic flowing between two partners&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[vs_0][ppak_0] bond1.client-side:i[64]: Client A -&amp;gt; Server B (TCP) len=80 id=6722&lt;BR /&gt;TCP: 49740 -&amp;gt; 50001 ...PA. seq=631a938d ack=8da45db9&lt;BR /&gt;[vs_0][ppak_0] bond1.client-side:I[64]: Client A -&amp;gt; Server B (TCP) len=80 id=6722&lt;BR /&gt;TCP: 49740 -&amp;gt; 50001 ...PA. seq=631a938d ack=8da45db9&lt;BR /&gt;[vs_0][ppak_0] bond1.server-side:o[64]: Client A -&amp;gt; Server B (TCP) len=80 id=6722&lt;BR /&gt;TCP: 49740 -&amp;gt; 50001 ...PA. seq=631a938d ack=8da45db9&lt;BR /&gt;[vs_0][ppak_0] bond1.server-side:O[64]: Client A -&amp;gt; Server B (TCP) len=80 id=6722&lt;BR /&gt;TCP: 49740 -&amp;gt; 50001 ...PA. seq=631a938d ack=8da45db9&lt;BR /&gt;[vs_0][ppak_0] bond1.client-side:i[64]: Client A -&amp;gt; Server B (TCP) len=1500 id=6723&lt;BR /&gt;TCP: 49740 -&amp;gt; 50001 ....A. seq=631a93b5 ack=8da45db9&lt;BR /&gt;[vs_0][ppak_0] bond1.client-side:I[64]: Client A -&amp;gt; Server B (TCP) len=1500 id=6723&lt;BR /&gt;TCP: 49740 -&amp;gt; 50001 ....A. seq=631a93b5 ack=8da45db9&lt;BR /&gt;[vs_0][ppak_0] bond1.server-side:o[64]: Client A -&amp;gt; Server B (TCP) len=1500 id=6723&lt;BR /&gt;TCP: 49740 -&amp;gt; 50001 ....A. seq=631a93b5 ack=8da45db9&lt;BR /&gt;[vs_0][ppak_0] bond1.server-side:O[64]: Client A -&amp;gt; Server B (TCP) len=1500 id=6723&lt;BR /&gt;TCP: 49740 -&amp;gt; 50001 ....A. seq=631a93b5 ack=8da45db9&lt;BR /&gt;[vs_0][ppak_0] bond1.client-side:i[64]: Client A -&amp;gt; Server B (TCP) len=283 id=6724&lt;BR /&gt;TCP: 49740 -&amp;gt; 50001 ...PA. seq=631a9969 ack=8da45db9&lt;BR /&gt;[vs_0][ppak_0] bond1.client-side:I[64]: Client A -&amp;gt; Server B (TCP) len=283 id=6724&lt;BR /&gt;TCP: 49740 -&amp;gt; 50001 ...PA. seq=631a9969 ack=8da45db9&lt;BR /&gt;[vs_0][ppak_0] bond1.server-side:o[64]: Client A -&amp;gt; Server B (TCP) len=283 id=6724&lt;BR /&gt;TCP: 49740 -&amp;gt; 50001 ...PA. seq=631a9969 ack=8da45db9&lt;BR /&gt;[vs_0][ppak_0] bond1.server-side:O[64]: Client A -&amp;gt; Server B (TCP) len=283 id=6724&lt;BR /&gt;TCP: 49740 -&amp;gt; 50001 ...PA. seq=631a9969 ack=8da45db9&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to add timestamps to fw monitor and send it to a file? So we could maybe see if the traffic flow stops at some time?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2023 15:37:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-fw-ctl-conntab-Issues-with-Jenkins-after/m-p/173380#M31515</guid>
      <dc:creator>T_Sonnberger</dc:creator>
      <dc:date>2023-03-02T15:37:28Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding fw ctl conntab / Issues with Jenkins after introducing firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-fw-ctl-conntab-Issues-with-Jenkins-after/m-p/173386#M31516</link>
      <description>&lt;P&gt;Hey Thomas,&lt;/P&gt;
&lt;P&gt;[Expert@quantum-firewall:0]# fw monitor -h&lt;BR /&gt;Usage: fw monitor&lt;BR /&gt;[-o &amp;lt;file name&amp;gt;] [-l len] [-w whole packet] [-u|s uuid] [-b &amp;lt;buffer size in Kbytes&amp;gt;]&lt;BR /&gt;[-F simple filter "&amp;lt;src IP&amp;gt;,&amp;lt;src port&amp;gt;,&amp;lt;dst IP&amp;gt;,&amp;lt;dst port&amp;gt;,&amp;lt;protocol num&amp;gt;"]&lt;BR /&gt;[-U unload] [-T timestamp] [-x offset[,len]] [-D|d debug mode] [-i flush stdout]&lt;BR /&gt;[-v VS] [m mask &amp;lt;i,I,o,O,e,E&amp;gt;]&lt;BR /&gt;&amp;lt;{-e expr}+|-f &amp;lt;filter-file|-&amp;gt;&amp;gt;&lt;BR /&gt;&amp;lt;[-pi pos] [-pI pos] [-po pos] [-pO pos] | -p all [-a]&amp;gt;&lt;BR /&gt;[-ci count] [-co count]&lt;/P&gt;
&lt;P&gt;[Expert@quantum-firewall:0]#&lt;/P&gt;
&lt;P&gt;You can do -T flag for timestamps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2023 16:42:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-fw-ctl-conntab-Issues-with-Jenkins-after/m-p/173386#M31516</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-02T16:42:28Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding fw ctl conntab / Issues with Jenkins after introducing firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-fw-ctl-conntab-Issues-with-Jenkins-after/m-p/173837#M31603</link>
      <description>&lt;P&gt;Hi Andy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for the reply and apologies for the late response...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have investigated further and it appears, that the "out of state" drop is rather a symptom of the disconnect than the reason.&lt;/P&gt;&lt;P&gt;I have compared several drops with the timestamps of the server logs.&lt;/P&gt;&lt;P&gt;At the exact time, when the disconnects happen, I see the creation of a new session in smart log, while the "out of state" drop of an old session happens always approx 2-3 Minutes later.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So we were thinking if it might be the exhaustion of a connection limit. Is there any limit regarding a certain client to server connection and if so, how can you check it?&lt;/P&gt;&lt;P&gt;Or is there only the overall connection limit, which seems to be fine:&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;[Expert@vistradpsg01-ch01-02:0]# fw ctl pstat&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Virtual System Capacity Summary:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Physical memory used: 26% (7180 MB out of 26862 MB) - below watermark&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Kernel memory used: 4% (1247 MB out of 26862 MB) - below watermark&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Virtual memory used: 22% (6879 MB out of 30970 MB) - below watermark&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Used: 5707 MB by FW, 1152 MB by zeco&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Concurrent Connections: 69976 (Unlimited)&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Aggressive Aging is enabled, not active&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Kernel memory (kmem) statistics:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Total memory bytes used: 2951060456 peak: 4987824800&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Allocations: 0 alloc, 0 failed alloc&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;0 free, 0 failed free&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Cookies:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;1266493961 total, 0 alloc, 0 free,&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;936468 dup, 1846573516 get, 119656808 put,&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;4077052114 len, 1949625316 cached len, 0 chain alloc,&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;0 chain free&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Connections:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;2392359448 total, 1072002975 TCP, 647604162 UDP, 672238786 ICMP,&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;513525 other, 651 anticipated, 0 recovered, 69981 concurrent,&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;145491 peak concurrent&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Fragments:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;50478 fragments, 24473 packets, 1 expired, 0 short,&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;0 large, 5 duplicates, 0 failures&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;NAT:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;84890/0 forw, 64538/0 bckw, 0 tcpudp,&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;149428 icmp, 38427-78355 alloc&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------&lt;/P&gt;&lt;P&gt;If I look for all connections to the Master, who is contacted by lots of agents&lt;/P&gt;&lt;P&gt;[Expert@vistradpsg01-ch01-01:0]# fw ctl conntab | grep "Jenkins Master" | wc -l&lt;BR /&gt;924&lt;/P&gt;&lt;P&gt;And one specific agent has only 5 sessions...&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@vistradpsg01-ch01-01:0]# fw ctl conntab | grep 10.107.43.202 | wc -l&lt;BR /&gt;5&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Do you or anyone else think there might be an issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance and BR,&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 11:53:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-fw-ctl-conntab-Issues-with-Jenkins-after/m-p/173837#M31603</guid>
      <dc:creator>T_Sonnberger</dc:creator>
      <dc:date>2023-03-07T11:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding fw ctl conntab / Issues with Jenkins after introducing firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-fw-ctl-conntab-Issues-with-Jenkins-after/m-p/173875#M31606</link>
      <description>&lt;P&gt;Hey Thomas,&lt;/P&gt;
&lt;P&gt;I am positive you dont have connections table limit issue, thats abundantly clear from your output, so you are fine there. I remember once with a customer, we discovered after lots of troubleshooting and from debugs there was specific IPS connection causing the issue, so maybe what you could try (though I cant say for certain this would make a difference in your case) is add an exception for affected subnets as per below screenshot:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19970iCA1B08C2902E5658/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 13:51:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-fw-ctl-conntab-Issues-with-Jenkins-after/m-p/173875#M31606</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-07T13:51:59Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding fw ctl conntab / Issues with Jenkins after introducing firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-fw-ctl-conntab-Issues-with-Jenkins-after/m-p/175367#M31987</link>
      <description>&lt;P&gt;I just wanted to share an update.&lt;/P&gt;&lt;P&gt;The Jenkins team hast done some optimizations on the "Master VM" as well as configuring some "performance optimization" parameters on the agents.&amp;nbsp;&lt;/P&gt;&lt;P&gt;After these changes, the CPU Wait time on the Jenkins Master decreased from 60% - 80%&amp;nbsp; down to &amp;lt; 10% and since then, the agents do not loose the connections anymore.&lt;/P&gt;&lt;P&gt;It appears, that the disconnect happened due to an overloaded master server and the "reconnecte" failed&amp;nbsp; because the agents use an old session for the retry, which is blocked on the firewall then.&lt;/P&gt;&lt;P&gt;In the end, the firewall does not cause the connection loss, but only prevents the reconnect - which is due to bad network behaviour of Jenkins (imo).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you all for your support!&lt;/P&gt;</description>
      <pubDate>Mon, 20 Mar 2023 08:52:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-fw-ctl-conntab-Issues-with-Jenkins-after/m-p/175367#M31987</guid>
      <dc:creator>T_Sonnberger</dc:creator>
      <dc:date>2023-03-20T08:52:35Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding fw ctl conntab / Issues with Jenkins after introducing firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-fw-ctl-conntab-Issues-with-Jenkins-after/m-p/175377#M31990</link>
      <description>&lt;P&gt;Awesome news, thanks for sharing! &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Mar 2023 10:40:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-fw-ctl-conntab-Issues-with-Jenkins-after/m-p/175377#M31990</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-20T10:40:15Z</dc:date>
    </item>
  </channel>
</rss>

