<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: high cpu allowed but unknown trafic in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/58328#M11765</link>
    <description>&lt;P&gt;It seems that most responses focus on performance. But is that in effect your greatest concern?&lt;/P&gt;
&lt;P&gt;I also sense a request to understand the nature of the traffic. Is that correct?&lt;/P&gt;</description>
    <pubDate>Tue, 16 Jul 2019 08:08:14 GMT</pubDate>
    <dc:creator>Hugo_vd_Kooij</dc:creator>
    <dc:date>2019-07-16T08:08:14Z</dc:date>
    <item>
      <title>high cpu allowed but unknown trafic</title>
      <link>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/57705#M11630</link>
      <description>&lt;P&gt;Hi Checkmates,&lt;/P&gt;&lt;P&gt;For the second week in a row, over the weekend we have been experiencing heavy (&lt;U&gt;&lt;STRONG&gt;allowed&lt;/STRONG&gt;&lt;/U&gt;) trafic through our VSX (R77.30) toward servers located behind our load balancers. This causes high CPU usage on 2 cores and now we are fearing some targetted DDOS or reconnaissance action is taking place.&lt;/P&gt;&lt;P&gt;We received &lt;U&gt;no&lt;/U&gt; complaints from users or server admins. We know which VS is impacted but are having difficulties identifiying exactly what is happening.&amp;nbsp;&lt;/P&gt;&lt;P&gt;To this end I used:&lt;/P&gt;&lt;P&gt;fw tab -u -t connections | awk '{ print $2 }' | sort -n | uniq -c | sort -nr | head -10&lt;/P&gt;&lt;P&gt;from '&lt;A href="https://community.checkpoint.com/t5/General-Topics/My-Top-3-Check-Point-CLI-commands/td-p/4649" target="_self"&gt;My top 3 CLI commands&lt;/A&gt;' ( where Timothy shared a way of showing the top ten source IPs hogging slots in the connection table). This gave us some IPs, but basically we could see that in Smartlog too&lt;/P&gt;&lt;P&gt;How could we investigate this any deeper? Taking a .cap wouldn't help a lot, or would it?&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 13:58:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/57705#M11630</guid>
      <dc:creator>Philip_W</dc:creator>
      <dc:date>2019-07-08T13:58:33Z</dc:date>
    </item>
    <item>
      <title>Re: high cpu allowed but unknown trafic</title>
      <link>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/57728#M11637</link>
      <description>&lt;P&gt;Hi Philip,&lt;/P&gt;&lt;P&gt;My first course of action would be to run Timothy's super seven commands as found here:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Super-Seven-Performance-Assessment-Commands-s7pac/td-p/40528" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/Super-Seven-Performance-Assessment-Commands-s7pac/td-p/40528&lt;/A&gt;&lt;/P&gt;&lt;P&gt;In addition, could you answer the following questions please:&lt;/P&gt;&lt;P&gt;1) What are the blades enabled on the affected VSX?&lt;/P&gt;&lt;P&gt;2) Are you aware of any changes that might have taken place two weeks ago?&lt;/P&gt;&lt;P&gt;3) What are the interesting services that are responsible for this increased CPU usage?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 18:17:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/57728#M11637</guid>
      <dc:creator>Nick_Doropoulos</dc:creator>
      <dc:date>2019-07-08T18:17:45Z</dc:date>
    </item>
    <item>
      <title>Re: high cpu allowed but unknown trafic</title>
      <link>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/57765#M11649</link>
      <description>&lt;P&gt;Hi Nick,&lt;/P&gt;&lt;P&gt;Thanks for pointing me toward Rick Hoppe's s7pac script, I'll run it asap.&lt;/P&gt;&lt;P&gt;1) Enabled blades on that VS: only fw &amp;amp; ips (i know...)&lt;/P&gt;&lt;P&gt;2) Any changes : the environment changes constantly. If anything changes (or if tests are done) this is not always communicated to the network/security guys so it is as good as impossible to find out.&lt;/P&gt;&lt;P&gt;3) Interesting services : we were seeing mainly http/https.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2019 06:44:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/57765#M11649</guid>
      <dc:creator>Philip_W</dc:creator>
      <dc:date>2019-07-09T06:44:16Z</dc:date>
    </item>
    <item>
      <title>Re: high cpu allowed but unknown trafic</title>
      <link>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/57770#M11650</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;According to your description, you know the (DDOS) IP addresses.&lt;/P&gt;
&lt;P&gt;I'd block the IP addresses. You can read this article&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-DDoS-fw-sam-vs-fwaccel-dos/td-p/41525" target="_self"&gt;R80.x Performance Tuning Tip – DDoS „fw sam“ vs. „fwaccel dos“&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;On R77:30 ( is out of support in september 2019) use „fw sam“ to block DDOS IP‘s&lt;/P&gt;
&lt;P&gt;On R80.10 and above block the DDOS IP on SecureXL layer.&lt;/P&gt;
&lt;P&gt;# fwaccel dos blacklist -a &amp;lt;DDOS IP&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2019 07:10:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/57770#M11650</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-07-09T07:10:36Z</dc:date>
    </item>
    <item>
      <title>Re: high cpu allowed but unknown trafic</title>
      <link>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/57771#M11651</link>
      <description>&lt;DIV class="lia-quilt-row lia-quilt-row-message-subject"&gt;
&lt;DIV class="lia-quilt-column lia-quilt-column-24 lia-quilt-column-single lia-quilt-column-message-subject-content"&gt;
&lt;DIV class="lia-quilt-column-alley lia-quilt-column-alley-single"&gt;
&lt;DIV class="topic-subject-wrapper"&gt;
&lt;DIV class="lia-message-subject lia-component-message-view-widget-subject"&gt;
&lt;DIV&gt;"&lt;FONT size="4"&gt;fw ctl zdebug" is a powertool that is not exhausted from being used with "fw ctl zdebug drop". "fw ctl zdebug" is an R&amp;amp;D tool for testing software in development. Therefore, the insert should be used with care. It starts a debugging in the background until it is aborted with CTRL+C. &lt;FONT color="#FF0000"&gt;On productive systems it can have a high performance impact.&amp;nbsp;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT size="4"&gt;More see here:&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV class="MessageSubject"&gt;&lt;SPAN style="font-family: inherit; color: #2b2b29; -webkit-tap-highlight-color: transparent; -webkit-text-size-adjust: 100%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Enterprise-Appliances-and-Gaia/quot-fw-ctl-zdebug-quot-Helpful-Command-Combinations/m-p/40680/highlight/true#M3392" target="_self"&gt;"fw ctl zdebug" Helpful Command Combinations&lt;/A&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT size="4"&gt;To debug the DDOS IP use the following command:&lt;/FONT&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;fw ctl zdebug + &amp;nbsp;monitorall | grep -A 40 -B 20 &amp;lt;DDOS IP&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now you can analyze the session in more detail.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Start Top and take a closer look at the process and cores.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;top&lt;/STRONG&gt; (+ buttom 1)&lt;/P&gt;
&lt;P&gt;Check daemons with high CPU load. More see sk97638 &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk97638&amp;amp;partition=General&amp;amp;product=All%22&amp;amp;t=1562657798885" target="_self"&gt;Check Point Processes and Daemons&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Check the affinity:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;fw ctl affinity -l -a -v&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Check enabled blades:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;enabled_blades&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;Check the DDOS IP in the connection table:&lt;STRONG&gt;&lt;BR /&gt;fw tab -t connections -f -u | grep &amp;lt;DDOS IP&amp;gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Is "aggressive aging" enabled for this IP?&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;TIP:&lt;/P&gt;
&lt;P&gt;Set stricter values in IPS for DDOS attacks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2019 07:49:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/57771#M11651</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-07-09T07:49:04Z</dc:date>
    </item>
    <item>
      <title>Re: high cpu allowed but unknown trafic</title>
      <link>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/57772#M11652</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;Thanks for the great troubleshooting tips!&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2019 07:30:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/57772#M11652</guid>
      <dc:creator>Philip_W</dc:creator>
      <dc:date>2019-07-09T07:30:04Z</dc:date>
    </item>
    <item>
      <title>Re: high cpu allowed but unknown trafic</title>
      <link>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/58328#M11765</link>
      <description>&lt;P&gt;It seems that most responses focus on performance. But is that in effect your greatest concern?&lt;/P&gt;
&lt;P&gt;I also sense a request to understand the nature of the traffic. Is that correct?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2019 08:08:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/58328#M11765</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2019-07-16T08:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: high cpu allowed but unknown trafic</title>
      <link>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/58346#M11768</link>
      <description>&lt;P&gt;Sorry, didn't have much time to follow up lately.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, indeed Hugo - we were more concerned in detecting exactly what was causing the high CPU. We were thinking of taking a .pcap next time it happens.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2019 12:56:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/58346#M11768</guid>
      <dc:creator>Philip_W</dc:creator>
      <dc:date>2019-07-16T12:56:57Z</dc:date>
    </item>
    <item>
      <title>Re: high cpu allowed but unknown trafic</title>
      <link>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/58349#M11769</link>
      <description>&lt;P&gt;Try using &lt;STRONG&gt;cpview&lt;/STRONG&gt; while the high CPU is happening and look at primarily CPU...Top Connections and secondarily Network...Top Connections.&amp;nbsp; Not sure how this info will be presented in the VSX environment but these screens can usually help identify elephant flows if that is indeed your issue, also take a look at the Connections/sec on the Overview screen in the event the CPU issue is caused by a burst of new connections and subsequent rule base lookup overhead.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2019 13:21:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/58349#M11769</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-07-16T13:21:45Z</dc:date>
    </item>
    <item>
      <title>Re: high cpu allowed but unknown trafic</title>
      <link>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/58590#M11809</link>
      <description>&lt;P&gt;When the issue reoccured yesterday, we took a .pcap and saw that the load balancers were keeping sending duplicate ACKs between each other. When the session was killed, the problem was solved.&lt;/P&gt;&lt;P&gt;Probably a bug in the loadbalancers...&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2019 13:17:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/high-cpu-allowed-but-unknown-trafic/m-p/58590#M11809</guid>
      <dc:creator>Philip_W</dc:creator>
      <dc:date>2019-07-19T13:17:03Z</dc:date>
    </item>
  </channel>
</rss>

