<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SYN defender - fwaccel synatk in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SYN-defender-fwaccel-synatk/m-p/218761#M41803</link>
    <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;Today I configured SYN defender. I have enabled the IPS protection. R81.10 take 130&lt;/P&gt;
&lt;P&gt;I have a few questions&lt;/P&gt;
&lt;P&gt;- Is there any way to see in a log that the threshold was reached and traffic was blocked? Or can you see it live, for example with fw ctl zdebug?&lt;/P&gt;
&lt;P&gt;- If the peak connection amount was reached in the&amp;nbsp;fwaccel synatk monitor output, does this mean the protection was active?&lt;/P&gt;
&lt;P&gt;So now the peak is set to 5000 and total on 10000 it will match the peak table?&lt;/P&gt;
&lt;P&gt;- Why does my CLI config get's overwritten without a reason? The admin guide states:&lt;/P&gt;
&lt;P&gt;Configure the applicable settings in the profile:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;On the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;General Properties&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;page:&lt;/P&gt;
&lt;P&gt;If you select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Override with Action&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and then&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Accept&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Drop&lt;/SPAN&gt;, it overrides the settings you make on the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;with the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="MCXref xref" href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_PerformanceTuning_AdminGuide/Topics-PTG/CLI/fwaccel-synatk.htm" target="_blank"&gt;fwaccel synatk&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;commands.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;On the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Advanced&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;page:&lt;/P&gt;
&lt;P&gt;The option you select in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Activation Settings&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(&lt;SPAN class="Menu_Options"&gt;Protect all interfaces&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Protect external interfaces only&lt;/SPAN&gt;) overrides the settings you make on the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;with the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="MCXref xref" href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_PerformanceTuning_AdminGuide/Topics-PTG/CLI/fwaccel-synatk.htm" target="_blank"&gt;fwaccel synatk&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;commands.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Source:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_PerformanceTuning_AdminGuide/Topics-PTG/SecureXL-Accelerated-SYN-Defender.htm?tocpath=SecureXL%7C_____9" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_PerformanceTuning_AdminGuide/Topics-PTG/SecureXL-Accelerated-SYN-Defender.htm?tocpath=SecureXL%7C_____9&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Here you can see I put eth7 in disabled mode&lt;/P&gt;
&lt;P&gt;fwaccel synatk state -i eth7 -d&lt;/P&gt;
&lt;P&gt;fwaccel synatk monitor&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| SYN Defender status &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Configuration &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Enforcing |&lt;BR /&gt;| Status &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Normal |&lt;BR /&gt;| Non established connections &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;73 |&lt;BR /&gt;| Global Threshold &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10000 |&lt;BR /&gt;| Interface Threshold &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;5000 |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| IF &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| Topology | Enforce | State (sec) &amp;nbsp;| Non-established conns |&lt;BR /&gt;| &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| Peak &amp;nbsp; &amp;nbsp; &amp;nbsp;| Current &amp;nbsp; |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| eth2.X&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | External | Prevent | Ready &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| 80 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| 73 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;|&lt;BR /&gt;| eth3.X&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | Internal | Disable | Disable &amp;nbsp; &amp;nbsp; &amp;nbsp;| N/A &amp;nbsp; &amp;nbsp; &amp;nbsp; | N/A &amp;nbsp; &amp;nbsp; &amp;nbsp; |&lt;BR /&gt;| eth4.X&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | External | Prevent | Ready &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; |&lt;BR /&gt;| eth7 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| Internal | Disable | Disable &amp;nbsp; &amp;nbsp; &amp;nbsp;| N/A &amp;nbsp; &amp;nbsp; &amp;nbsp; | N/A &amp;nbsp; &amp;nbsp; &amp;nbsp; |&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After some time config is resetted, I think it was policy push but this was not active. Also according the SK if I configure the IPS protection correctly it should not change it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;| SYN Defender status |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Configuration Enforcing |&lt;BR /&gt;| Status Normal |&lt;BR /&gt;| Non established connections 141 |&lt;BR /&gt;| Global Threshold 10000 |&lt;BR /&gt;| Interface Threshold 5000 |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| IF | Topology | Enforce | State (sec) | Non-established conns |&lt;BR /&gt;| | | | | Peak | Current |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| eth2.X | External | Prevent | Ready | 101 | 84 |&lt;BR /&gt;| eth3.X | Internal | Detect | Monitor | 0 | 0 |&lt;/P&gt;
&lt;P&gt;| eth4.X | External | Prevent | Ready |&lt;BR /&gt;| eth7 | Internal | Detect | Monitor | 0 | 0 |&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 26 Jun 2024 09:18:21 GMT</pubDate>
    <dc:creator>Lesley</dc:creator>
    <dc:date>2024-06-26T09:18:21Z</dc:date>
    <item>
      <title>SYN defender - fwaccel synatk</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SYN-defender-fwaccel-synatk/m-p/218761#M41803</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;Today I configured SYN defender. I have enabled the IPS protection. R81.10 take 130&lt;/P&gt;
&lt;P&gt;I have a few questions&lt;/P&gt;
&lt;P&gt;- Is there any way to see in a log that the threshold was reached and traffic was blocked? Or can you see it live, for example with fw ctl zdebug?&lt;/P&gt;
&lt;P&gt;- If the peak connection amount was reached in the&amp;nbsp;fwaccel synatk monitor output, does this mean the protection was active?&lt;/P&gt;
&lt;P&gt;So now the peak is set to 5000 and total on 10000 it will match the peak table?&lt;/P&gt;
&lt;P&gt;- Why does my CLI config get's overwritten without a reason? The admin guide states:&lt;/P&gt;
&lt;P&gt;Configure the applicable settings in the profile:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;On the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;General Properties&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;page:&lt;/P&gt;
&lt;P&gt;If you select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Override with Action&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and then&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Accept&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Drop&lt;/SPAN&gt;, it overrides the settings you make on the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;with the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="MCXref xref" href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_PerformanceTuning_AdminGuide/Topics-PTG/CLI/fwaccel-synatk.htm" target="_blank"&gt;fwaccel synatk&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;commands.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;On the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Advanced&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;page:&lt;/P&gt;
&lt;P&gt;The option you select in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Activation Settings&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(&lt;SPAN class="Menu_Options"&gt;Protect all interfaces&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Protect external interfaces only&lt;/SPAN&gt;) overrides the settings you make on the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;with the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="MCXref xref" href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_PerformanceTuning_AdminGuide/Topics-PTG/CLI/fwaccel-synatk.htm" target="_blank"&gt;fwaccel synatk&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;commands.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Source:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_PerformanceTuning_AdminGuide/Topics-PTG/SecureXL-Accelerated-SYN-Defender.htm?tocpath=SecureXL%7C_____9" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_PerformanceTuning_AdminGuide/Topics-PTG/SecureXL-Accelerated-SYN-Defender.htm?tocpath=SecureXL%7C_____9&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Here you can see I put eth7 in disabled mode&lt;/P&gt;
&lt;P&gt;fwaccel synatk state -i eth7 -d&lt;/P&gt;
&lt;P&gt;fwaccel synatk monitor&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| SYN Defender status &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Configuration &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Enforcing |&lt;BR /&gt;| Status &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Normal |&lt;BR /&gt;| Non established connections &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;73 |&lt;BR /&gt;| Global Threshold &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10000 |&lt;BR /&gt;| Interface Threshold &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;5000 |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| IF &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| Topology | Enforce | State (sec) &amp;nbsp;| Non-established conns |&lt;BR /&gt;| &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| Peak &amp;nbsp; &amp;nbsp; &amp;nbsp;| Current &amp;nbsp; |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| eth2.X&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | External | Prevent | Ready &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| 80 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| 73 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;|&lt;BR /&gt;| eth3.X&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | Internal | Disable | Disable &amp;nbsp; &amp;nbsp; &amp;nbsp;| N/A &amp;nbsp; &amp;nbsp; &amp;nbsp; | N/A &amp;nbsp; &amp;nbsp; &amp;nbsp; |&lt;BR /&gt;| eth4.X&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | External | Prevent | Ready &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; |&lt;BR /&gt;| eth7 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| Internal | Disable | Disable &amp;nbsp; &amp;nbsp; &amp;nbsp;| N/A &amp;nbsp; &amp;nbsp; &amp;nbsp; | N/A &amp;nbsp; &amp;nbsp; &amp;nbsp; |&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After some time config is resetted, I think it was policy push but this was not active. Also according the SK if I configure the IPS protection correctly it should not change it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;| SYN Defender status |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Configuration Enforcing |&lt;BR /&gt;| Status Normal |&lt;BR /&gt;| Non established connections 141 |&lt;BR /&gt;| Global Threshold 10000 |&lt;BR /&gt;| Interface Threshold 5000 |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| IF | Topology | Enforce | State (sec) | Non-established conns |&lt;BR /&gt;| | | | | Peak | Current |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| eth2.X | External | Prevent | Ready | 101 | 84 |&lt;BR /&gt;| eth3.X | Internal | Detect | Monitor | 0 | 0 |&lt;/P&gt;
&lt;P&gt;| eth4.X | External | Prevent | Ready |&lt;BR /&gt;| eth7 | Internal | Detect | Monitor | 0 | 0 |&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2024 09:18:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SYN-defender-fwaccel-synatk/m-p/218761#M41803</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-06-26T09:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: SYN defender - fwaccel synatk</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SYN-defender-fwaccel-synatk/m-p/219170#M41886</link>
      <description>&lt;P&gt;It's been a while, but I believe when SYN Defender activates, you should see something in the traffic logs to that effect.&lt;BR /&gt;It also sounds like it's acting as expected with the fwaccel synatk commands as you've specified an override with the action drop.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jun 2024 20:15:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SYN-defender-fwaccel-synatk/m-p/219170#M41886</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-28T20:15:15Z</dc:date>
    </item>
    <item>
      <title>Re: SYN defender - fwaccel synatk</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SYN-defender-fwaccel-synatk/m-p/219185#M41890</link>
      <description>&lt;P&gt;I think individual interface states set in CLI are not permanent and a policy push or reboot will override them. However, the thresholds and enforcement options (-e and -g) should be kept if you uncheck&amp;nbsp;"Override Security Gateways SYNDefender Configuration" in SmartConsole . Inspection Settings &amp;gt; SYN Attack.&lt;BR /&gt;&lt;BR /&gt;You will get logs when the attack starts or ends, but the best place to check attack state is in the CLI with fwaccel synatk monitor. It will display a message of "Under attack" for the interface after the threshold is crossed and the connection count will be suppressed. While that does not happen, it will be shown as ready.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jun 2024 22:50:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SYN-defender-fwaccel-synatk/m-p/219185#M41890</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2024-06-28T22:50:08Z</dc:date>
    </item>
  </channel>
</rss>

