<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic cpview, tcp/1024, and sk116876 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cpview-tcp-1024-and-sk116876/m-p/192992#M35702</link>
    <description>&lt;P&gt;I've noticed on one cluster that the CPU utilization is higher than normal and the top protocol is always (and significantly) tcp/1024.&amp;nbsp; Per that SK, it seems to be saying that tcp/1024 in cpview is "&lt;SPAN&gt;represents TCP high ports in general, and not specifically TCP port 1024."&amp;nbsp; Is there a way see exactly what traffic is being thrown into this high cpu utilization bucket in cpview?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-09-18 141902.png" style="width: 542px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/22495iCE28026757D1D2BB/image-dimensions/542x397?v=v2" width="542" height="397" role="button" title="Screenshot 2023-09-18 141902.png" alt="Screenshot 2023-09-18 141902.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 18 Sep 2023 21:20:14 GMT</pubDate>
    <dc:creator>D_TK</dc:creator>
    <dc:date>2023-09-18T21:20:14Z</dc:date>
    <item>
      <title>cpview, tcp/1024, and sk116876</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cpview-tcp-1024-and-sk116876/m-p/192992#M35702</link>
      <description>&lt;P&gt;I've noticed on one cluster that the CPU utilization is higher than normal and the top protocol is always (and significantly) tcp/1024.&amp;nbsp; Per that SK, it seems to be saying that tcp/1024 in cpview is "&lt;SPAN&gt;represents TCP high ports in general, and not specifically TCP port 1024."&amp;nbsp; Is there a way see exactly what traffic is being thrown into this high cpu utilization bucket in cpview?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-09-18 141902.png" style="width: 542px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/22495iCE28026757D1D2BB/image-dimensions/542x397?v=v2" width="542" height="397" role="button" title="Screenshot 2023-09-18 141902.png" alt="Screenshot 2023-09-18 141902.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 21:20:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cpview-tcp-1024-and-sk116876/m-p/192992#M35702</guid>
      <dc:creator>D_TK</dc:creator>
      <dc:date>2023-09-18T21:20:14Z</dc:date>
    </item>
    <item>
      <title>Re: cpview, tcp/1024, and sk116876</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cpview-tcp-1024-and-sk116876/m-p/192995#M35835</link>
      <description>&lt;P&gt;I had TAC case last year for customer for this exact issue and guy gave me the same sk and closed the case, that was it. Never bothered to do little more research, maybe ask someone, nothing. If you ever find out the way to tell what port(s) its referring to, would be great.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 22:26:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cpview-tcp-1024-and-sk116876/m-p/192995#M35835</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-09-18T22:26:26Z</dc:date>
    </item>
    <item>
      <title>Re: cpview, tcp/1024, and sk116876</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cpview-tcp-1024-and-sk116876/m-p/192996#M35836</link>
      <description>&lt;P&gt;I presume you'd have to parse the connections table to see what port(s) are being used (output of fw tab -t connections -u).&lt;BR /&gt;The firth argument in the output should be the port in hex, and if it's a TCP connection, then the sixth argument will be 6 (the protocol number for TCP).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 22:29:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cpview-tcp-1024-and-sk116876/m-p/192996#M35836</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-09-18T22:29:43Z</dc:date>
    </item>
    <item>
      <title>Re: cpview, tcp/1024, and sk116876</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cpview-tcp-1024-and-sk116876/m-p/193024#M35844</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/676"&gt;@D_TK&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;The view works by categorizing ports to specific protocols and presenting only those. Known and common protocols will be presented. We can expend this view to present unknown ports as well, or add new groups. Please open an official RFE, and we will promote it from there.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 08:00:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cpview-tcp-1024-and-sk116876/m-p/193024#M35844</guid>
      <dc:creator>Elad_Chomsky</dc:creator>
      <dc:date>2023-09-19T08:00:23Z</dc:date>
    </item>
  </channel>
</rss>

