<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Possible attacks in a VSX environment in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Possible-attacks-in-a-VSX-environment/m-p/255057#M49938</link>
    <description>&lt;P&gt;Because of the changeover to UPPAK and poll-mode NIC drivers, Linux commands like top won't show CPU utilization accurately.&lt;BR /&gt;Using Check Point specific commands like cpview should give you accurate results.&lt;/P&gt;
&lt;P&gt;Not sure this applies here since you did not mention specific hardware or software versions, but that's the first thing that comes to mind.&lt;/P&gt;</description>
    <pubDate>Wed, 13 Aug 2025 19:45:19 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2025-08-13T19:45:19Z</dc:date>
    <item>
      <title>Possible attacks in a VSX environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Possible-attacks-in-a-VSX-environment/m-p/255051#M49937</link>
      <description>&lt;P&gt;Hello, everyone.&lt;/P&gt;
&lt;P&gt;In a VSX environment, which has many VSs, is it possible to detect a behavior pattern that “points” to a DoS or DDoS attack?&lt;/P&gt;
&lt;P&gt;I have three VSs that have a CPU consumption overload of more than 90%, but I can't find the reason why.&lt;/P&gt;
&lt;P&gt;I have checked the TOP-CONNECTIONS in CPVIEW, but it doesn't show anything.&lt;BR /&gt;SXL is enabled on the VSs.&lt;/P&gt;
&lt;P&gt;What I noticed with “top -H” is that the fwk&amp;lt;ID VS&amp;gt;_X processes are consuming almost all of the CPU.&lt;/P&gt;
&lt;P&gt;So, from a VSX or FW perspective, is it possible to know if this could be related to some type of attack?&lt;/P&gt;
&lt;P&gt;Thank you for your comments.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2025 18:24:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Possible-attacks-in-a-VSX-environment/m-p/255051#M49937</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-08-13T18:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: Possible attacks in a VSX environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Possible-attacks-in-a-VSX-environment/m-p/255057#M49938</link>
      <description>&lt;P&gt;Because of the changeover to UPPAK and poll-mode NIC drivers, Linux commands like top won't show CPU utilization accurately.&lt;BR /&gt;Using Check Point specific commands like cpview should give you accurate results.&lt;/P&gt;
&lt;P&gt;Not sure this applies here since you did not mention specific hardware or software versions, but that's the first thing that comes to mind.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2025 19:45:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Possible-attacks-in-a-VSX-environment/m-p/255057#M49938</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-08-13T19:45:19Z</dc:date>
    </item>
    <item>
      <title>Re: Possible attacks in a VSX environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Possible-attacks-in-a-VSX-environment/m-p/255059#M49939</link>
      <description>&lt;P&gt;We have version R81.20 with JHF Take 84&lt;BR /&gt;On 16000 series hardware&lt;/P&gt;
&lt;P&gt;I have a question based on your comment. Is it recommended to use Check Point's own commands in general for any scenario?&lt;BR /&gt;Because based on this event we had, when we started monitoring traffic in real time with tcpdump, for example, this command did not show complete data, but when we tried cppcap, we noticed a difference (this one worked a little better).&lt;/P&gt;
&lt;P&gt;We assume that this is related to the fact that the CPU in our VSs was “flying,” and that is why tcpdump was showing incomplete data.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2025 21:25:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Possible-attacks-in-a-VSX-environment/m-p/255059#M49939</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-08-13T21:25:39Z</dc:date>
    </item>
    <item>
      <title>Re: Possible attacks in a VSX environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Possible-attacks-in-a-VSX-environment/m-p/255108#M49940</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Is Dynamic Balancing on? (check:&amp;nbsp;&lt;EM&gt;dynamic_balancing -p)&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;sk141412 - This tool (cppcap) was created to resolve various issues in the Linux tool TCPdump that significantly increased CPU load on Security Gateways.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Since you also mentioned cpview, please note:&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE id="filter1Table" class="TableStyle-TP_Table_Jumbo_Fixes" cellspacing="0"&gt;
&lt;TBODY&gt;
&lt;TR class="TableStyle-TP_Table_Jumbo_Fixes-Body-Release_Date" data-mc-pattern="8"&gt;
&lt;TD colspan="3" class="TableStyle-TP_Table_Jumbo_Fixes-BodyD-Column_Style_ID-Release_Date"&gt;
&lt;P&gt;&lt;STRONG&gt;Take 89&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;-&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Improvements and Resolved Issues&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="TableStyle-TP_Table_Jumbo_Fixes-Body-Grey_Background"&gt;
&lt;TD class="TableStyle-TP_Table_Jumbo_Fixes-BodyE-Column_Style_ID-Grey_Background"&gt;
&lt;P&gt;PRJ-54415,&lt;BR /&gt;PRHF-33710&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Jumbo_Fixes-BodyE-Column_Style_Product-Grey_Background"&gt;
&lt;P&gt;Security Gateway&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Jumbo_Fixes-BodyD-Column_Style_Description-Grey_Background"&gt;
&lt;P&gt;In a VSX Cluster environment, the CPVIEWD daemon may cause a high CPU.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Aug 2025 00:50:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Possible-attacks-in-a-VSX-environment/m-p/255108#M49940</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-08-14T00:50:18Z</dc:date>
    </item>
  </channel>
</rss>

