<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DoS Rate Limiting (samp rules) Logging in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/80100#M6147</link>
    <description>&lt;P&gt;Hi Mates,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have configured some test Rate Limiting rules for an R80.20 VSX environment. The config was set with "monitor only" mode enabled first and the rules are in place;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier" size="2"&gt;[Expert@fvsx_gateway:3]# fw samp get&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;operation=add uid=&amp;lt;5e7da64e,00000000,21c2f50a,000078b1&amp;gt; target=all timeout=indefinite action=drop log=log service=any source-negated=true source=cidr:172.16.0.0/12 pkt-rate=100 track=source flush=true req_type=quota&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can see that the rules are enabled and seem to be picking up traffic that should be dropped;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier" size="2"&gt;[Expert@vsx_gateway:3]# fwaccel dos stats get&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Firewall:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Number of Elements in Tables:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Penalty Box Violating IPs: 0 (size: 8192)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Blacklist Notification Handlers: 0 (size: 1024)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;SXL Device 0:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Total Active Connections: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Total New Connections/Second: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Total Packets/Second: 41&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Total Bytes/Second: 4077&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Reasons Packets Dropped:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;IP Fragment: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;IP Option: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Penalty Box: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Blacklist: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Rate Limit: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Number of Elements in Tables:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Penalty Box: 0 (size: 0)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Non-Empty Blacklists: 0 (size: 0)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Blacklisted IPs: 0 (size: 0)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Rate Limit Matches: 154 (size: 262144)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Rate Limit Source Only Tracks: 94 (size: 262144)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Rate Limit Source and Service Tracks: 0 (size: 262144)&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Are these violations also logged in SmartConsole Logs&amp;amp;Monitor?&lt;/P&gt;&lt;P&gt;I've checked against some of the source/dest addresses shown in the "dos_rate_matches" SecureXL table but I can't see anything that suggests that there would be a drop based on Rate Limiting. Has anyone got an example of one of these logs?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 29 Mar 2020 07:35:04 GMT</pubDate>
    <dc:creator>Colin_Tucker</dc:creator>
    <dc:date>2020-03-29T07:35:04Z</dc:date>
    <item>
      <title>DoS Rate Limiting (samp rules) Logging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/80100#M6147</link>
      <description>&lt;P&gt;Hi Mates,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have configured some test Rate Limiting rules for an R80.20 VSX environment. The config was set with "monitor only" mode enabled first and the rules are in place;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier" size="2"&gt;[Expert@fvsx_gateway:3]# fw samp get&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;operation=add uid=&amp;lt;5e7da64e,00000000,21c2f50a,000078b1&amp;gt; target=all timeout=indefinite action=drop log=log service=any source-negated=true source=cidr:172.16.0.0/12 pkt-rate=100 track=source flush=true req_type=quota&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can see that the rules are enabled and seem to be picking up traffic that should be dropped;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier" size="2"&gt;[Expert@vsx_gateway:3]# fwaccel dos stats get&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Firewall:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Number of Elements in Tables:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Penalty Box Violating IPs: 0 (size: 8192)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Blacklist Notification Handlers: 0 (size: 1024)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;SXL Device 0:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Total Active Connections: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Total New Connections/Second: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Total Packets/Second: 41&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Total Bytes/Second: 4077&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Reasons Packets Dropped:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;IP Fragment: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;IP Option: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Penalty Box: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Blacklist: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Rate Limit: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Number of Elements in Tables:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Penalty Box: 0 (size: 0)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Non-Empty Blacklists: 0 (size: 0)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Blacklisted IPs: 0 (size: 0)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Rate Limit Matches: 154 (size: 262144)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Rate Limit Source Only Tracks: 94 (size: 262144)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Rate Limit Source and Service Tracks: 0 (size: 262144)&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Are these violations also logged in SmartConsole Logs&amp;amp;Monitor?&lt;/P&gt;&lt;P&gt;I've checked against some of the source/dest addresses shown in the "dos_rate_matches" SecureXL table but I can't see anything that suggests that there would be a drop based on Rate Limiting. Has anyone got an example of one of these logs?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Mar 2020 07:35:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/80100#M6147</guid>
      <dc:creator>Colin_Tucker</dc:creator>
      <dc:date>2020-03-29T07:35:04Z</dc:date>
    </item>
    <item>
      <title>Re: DoS Rate Limiting (samp rules) Logging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/80159#M6155</link>
      <description>&lt;P&gt;Looks like the logs are being presented. I did some updates around actually installing the rules (using "&lt;EM&gt;&lt;STRONG&gt;w samp add -t 2 quota flush true&lt;/STRONG&gt;&lt;/EM&gt;") so that may have kicked them into life. They may also just have taken some time to get through to the Mgmt device.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rate_limit_rules_detected_smart_console_logs.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5229iB865D93823220A7E/image-size/large?v=v2&amp;amp;px=999" role="button" title="rate_limit_rules_detected_smart_console_logs.PNG" alt="rate_limit_rules_detected_smart_console_logs.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I haven't seen an easy way to search for these ones yet. Free text doesn't seem to work for any of the text or UIDs for the DOS rules. I had to grab the IP out of the fwaccel table ("&lt;EM&gt;&lt;STRONG&gt;fwaccel tab -t dos_rate_matches -f&lt;/STRONG&gt;&lt;/EM&gt;") and then search in Logs&amp;amp;Monitor.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone found an easier way to monitor these?&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2020 05:00:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/80159#M6155</guid>
      <dc:creator>Colin_Tucker</dc:creator>
      <dc:date>2020-03-30T05:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: DoS Rate Limiting (samp rules) Logging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/114492#M16018</link>
      <description>&lt;P&gt;I would also like to know&amp;nbsp; if there is an easier way to search the logs for these results. Has anyone found another method?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Mar 2021 17:18:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/114492#M16018</guid>
      <dc:creator>Chad_Stewart</dc:creator>
      <dc:date>2021-03-24T17:18:20Z</dc:date>
    </item>
    <item>
      <title>Re: DoS Rate Limiting (samp rules) Logging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/125888#M18270</link>
      <description>&lt;P&gt;Same here. The feature works well but we are a bit blind if we can't filter/search the logs in smartconsole.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Aug 2021 15:40:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/125888#M18270</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-08-06T15:40:08Z</dc:date>
    </item>
    <item>
      <title>Re: DoS Rate Limiting (samp rules) Logging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/125935#M18283</link>
      <description>&lt;P&gt;I'd be interested to see how the SmartEvent DOS mitigation rules being created in term s of acceleration. I believe you can search them by "sam rule" free text search, but it will return all of those.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Aug 2021 06:27:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/125935#M18283</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2021-08-08T06:27:01Z</dc:date>
    </item>
    <item>
      <title>Re: DoS Rate Limiting (samp rules) Logging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/125980#M18288</link>
      <description>&lt;P&gt;As that field is not indexed, you cannot search for these entries, unfortunately.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Aug 2021 04:00:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/125980#M18288</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-09T04:00:52Z</dc:date>
    </item>
    <item>
      <title>Re: DoS Rate Limiting (samp rules) Logging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/126018#M18298</link>
      <description>&lt;P&gt;Could it be indexed?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Aug 2021 08:42:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/126018#M18298</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-08-09T08:42:30Z</dc:date>
    </item>
    <item>
      <title>Re: DoS Rate Limiting (samp rules) Logging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/126075#M18302</link>
      <description>&lt;P&gt;Not without an Request for Enhancement.&lt;BR /&gt;Highly recommend working with your local Check Point office around this requirement.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Aug 2021 15:43:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/126075#M18302</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-09T15:43:56Z</dc:date>
    </item>
    <item>
      <title>Re: DoS Rate Limiting (samp rules) Logging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/128874#M18806</link>
      <description>&lt;P&gt;Hey Chad, the best way I have figured out how to help with tracking the logs is to use the "-l a" parameter which creates an alert log in logs &amp;amp; monitor. You are then able to filter by "alerts" so it should be fairly easy to locate them unless you have a lot of other alert rules/logs being generated.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 14:58:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/128874#M18806</guid>
      <dc:creator>ChrisMartel</dc:creator>
      <dc:date>2021-09-07T14:58:07Z</dc:date>
    </item>
    <item>
      <title>Re: DoS Rate Limiting (samp rules) Logging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/128875#M18807</link>
      <description>&lt;P&gt;Hi Luis, try using the parameter "-l a" when creating the rate limiting rule. This will create an alert log&amp;nbsp;&lt;SPAN&gt;in logs &amp;amp; monitor. You are then able to filter by "alerts" so it should be fairly easy to locate them unless you have a lot of other alert rules/logs being generated.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 14:59:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/128875#M18807</guid>
      <dc:creator>ChrisMartel</dc:creator>
      <dc:date>2021-09-07T14:59:55Z</dc:date>
    </item>
    <item>
      <title>Re: DoS Rate Limiting (samp rules) Logging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/128918#M18830</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;I think it is mandatory to be able to to search by source and destination ip for troubleshooting purposes.&lt;/P&gt;&lt;P&gt;But in terms of monitoring we need to be able to identify this type of alerts. The best and easiest way I can think is with the comment and name that fwaccel dos allows you to set&amp;nbsp; &amp;nbsp;with -c and -n.&amp;nbsp;&lt;BR /&gt;This way we could totally control the number of fwaccel dos, we could create graphs to track it, etc.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 09:28:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DoS-Rate-Limiting-samp-rules-Logging/m-p/128918#M18830</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-09-08T09:28:16Z</dc:date>
    </item>
  </channel>
</rss>

