<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Experience with vulnerability scanner in the internal network in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164575#M27441</link>
    <description>&lt;P&gt;hi community,&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;maybe someone can share their experience with vulnerability scans in the internal network.&lt;/P&gt;&lt;P&gt;we use tenable scanner to scan networks for vulnerabilities. This scans affect the firewall performance with twice&amp;nbsp; conncurent connections and connection per socconds. the throughput does not really increase.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do not thing that entry in the fast_accel table will help here, because we have alot of new connections oder various&amp;nbsp; destination&amp;nbsp; ports.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If you compare the throughput, connection/seconds and concurrent connection with the data sheet, then we're only at half the performance, so more should be possible.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Memory also not increasing but the cpu of snd&amp;nbsp; and fw_worker is increasing to 80% and with 100% spikes.&amp;nbsp;&lt;BR /&gt;Dynamic balancing is active.&lt;BR /&gt;&lt;BR /&gt;Do you have any tips on where I can look?&lt;BR /&gt;&lt;BR /&gt;Many thanks&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 08 Dec 2022 19:45:03 GMT</pubDate>
    <dc:creator>Kolafer</dc:creator>
    <dc:date>2022-12-08T19:45:03Z</dc:date>
    <item>
      <title>Experience with vulnerability scanner in the internal network</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164575#M27441</link>
      <description>&lt;P&gt;hi community,&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;maybe someone can share their experience with vulnerability scans in the internal network.&lt;/P&gt;&lt;P&gt;we use tenable scanner to scan networks for vulnerabilities. This scans affect the firewall performance with twice&amp;nbsp; conncurent connections and connection per socconds. the throughput does not really increase.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do not thing that entry in the fast_accel table will help here, because we have alot of new connections oder various&amp;nbsp; destination&amp;nbsp; ports.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If you compare the throughput, connection/seconds and concurrent connection with the data sheet, then we're only at half the performance, so more should be possible.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Memory also not increasing but the cpu of snd&amp;nbsp; and fw_worker is increasing to 80% and with 100% spikes.&amp;nbsp;&lt;BR /&gt;Dynamic balancing is active.&lt;BR /&gt;&lt;BR /&gt;Do you have any tips on where I can look?&lt;BR /&gt;&lt;BR /&gt;Many thanks&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 19:45:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164575#M27441</guid>
      <dc:creator>Kolafer</dc:creator>
      <dc:date>2022-12-08T19:45:03Z</dc:date>
    </item>
    <item>
      <title>Re: Experience with vulnerability scanner in the internal network</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164577#M27442</link>
      <description>&lt;P&gt;A vulnerability scanner mostly generates a lot of new connections and doesn't really pass a lot of data.&lt;BR /&gt;So this is expected behavior.&lt;/P&gt;
&lt;P&gt;You should be able to use any for both the protocol and port parameters to the fast_accel command.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 20:16:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164577#M27442</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-12-08T20:16:31Z</dc:date>
    </item>
    <item>
      <title>Re: Experience with vulnerability scanner in the internal network</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164578#M27443</link>
      <description>&lt;P&gt;We only use the fw blade. And i also put the ip's of scanner in the fast_accel table. &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Is this really all what we can do ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 22:28:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164578#M27443</guid>
      <dc:creator>Kolafer</dc:creator>
      <dc:date>2022-12-08T22:28:00Z</dc:date>
    </item>
    <item>
      <title>Re: Experience with vulnerability scanner in the internal network</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164579#M27444</link>
      <description>&lt;P&gt;Sorry, I don’t understand what “fast_accel Betty for the scanner invalidates in the table” means, can you clarify?&lt;BR /&gt;Also, what version/JHF are you running on what kind of appliance?&lt;BR /&gt;Please also provide Super Seven output:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Scripts/S7PAC-Super-Seven-Performance-Assessment-Commands/td-p/40528" target="_blank"&gt;https://community.checkpoint.com/t5/Scripts/S7PAC-Super-Seven-Performance-Assessment-Commands/td-p/40528&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 21:36:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164579#M27444</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-12-08T21:36:12Z</dc:date>
    </item>
    <item>
      <title>Re: Experience with vulnerability scanner in the internal network</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164582#M27445</link>
      <description>&lt;P&gt;I second what phoneboy said, I had seen that be indeed an expected behavior. It does not really matter, in my experience at least, how many blades you have enabled on the firewall.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 23:34:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164582#M27445</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-12-08T23:34:18Z</dc:date>
    </item>
    <item>
      <title>Re: Experience with vulnerability scanner in the internal network</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164621#M27446</link>
      <description>&lt;P&gt;Have you thought about moving the scanner?&lt;/P&gt;
&lt;P&gt;What are you actually trying to achieve, speed up the scan?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 13:01:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164621#M27446</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-12-09T13:01:48Z</dc:date>
    </item>
    <item>
      <title>Re: Experience with vulnerability scanner in the internal network</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164624#M27447</link>
      <description>&lt;P&gt;This is a 26000 Appliance and have only FW Blade active. Version R80.40 JHF 156&lt;BR /&gt;&lt;BR /&gt;s7pac attached.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 13:14:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164624#M27447</guid>
      <dc:creator>Kolafer</dc:creator>
      <dc:date>2022-12-09T13:14:53Z</dc:date>
    </item>
    <item>
      <title>Re: Experience with vulnerability scanner in the internal network</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164626#M27448</link>
      <description>&lt;P&gt;Try to unterstand why the appliance reach it limits with high 80-100% cpu.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Datasheet:&lt;/P&gt;&lt;P&gt;Performance specification:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Firewall (Gbps) ---- 106.2 Gbps&lt;BR /&gt;Connections/sec ---- 550,000&lt;BR /&gt;Concurrent connections3 -----10/20/32M&lt;/P&gt;&lt;P&gt;We have only this and the firewall are on the limit.&lt;/P&gt;&lt;P&gt;Firewall (Gbps) ---- 21.3 Gbps&lt;BR /&gt;Connections/sec ---- 90 000&lt;BR /&gt;Concurrent connections3 -----2,5 M&lt;BR /&gt;&lt;BR /&gt;nearly nothing if compare to datasheet.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 13:25:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164626#M27448</guid>
      <dc:creator>Kolafer</dc:creator>
      <dc:date>2022-12-09T13:25:34Z</dc:date>
    </item>
    <item>
      <title>Re: Experience with vulnerability scanner in the internal network</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164639#M27449</link>
      <description>&lt;P&gt;It would be nice to have somewhere in dashboard to define "internal scanners"?&lt;/P&gt;
&lt;P&gt;IOW, to whitelist them from IPS DoS attacks etc.&amp;nbsp; &amp;nbsp;Nesus, lumeta etc.&lt;/P&gt;
&lt;P&gt;I found this as well.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Allow-my-vulnerability-scanner-through-gateway/m-p/84453" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/Allow-my-vulnerability-scanner-through-gateway/m-p/84453&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 15:33:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164639#M27449</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2022-12-09T15:33:04Z</dc:date>
    </item>
    <item>
      <title>Re: Experience with vulnerability scanner in the internal network</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164644#M27450</link>
      <description>&lt;P&gt;When the scanner is running, where precisely are you seeing 80-100% CPU?&lt;BR /&gt;Is it just on a few CPUs?&lt;/P&gt;
&lt;P&gt;I suspect the vulnerability scanner traffic is kinda like an elephant flow, given it all comes from a single source.&lt;BR /&gt;Even our Hyperflow feature in R81.20 requires features other than firewall and VPN to be enabled.&lt;BR /&gt;Which means there may not be much you can do about it.&lt;/P&gt;
&lt;P&gt;I recommend engaging with the TAC here.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 15:40:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164644#M27450</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-12-09T15:40:30Z</dc:date>
    </item>
    <item>
      <title>Re: Experience with vulnerability scanner in the internal network</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164647#M27451</link>
      <description>&lt;P&gt;When creating an IPS exception, if I leave Protection/Site/File/Blade as N/A, then action as inactive, and source as my nessus scanner, will that set ALL IPS defenses as inactive?&amp;nbsp; &amp;nbsp;There is a slash Blade, but I don't see an option to set blade to IPS.&amp;nbsp; spoke too soon, I was able to select blade IPS.&amp;nbsp; &amp;nbsp;nice.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. disable IPS blade for nessus and other scanners&lt;/P&gt;
&lt;P&gt;2. add them to table.def per&amp;nbsp;&lt;SPAN&gt;sk104468&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;3. push policy&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 19:42:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164647#M27451</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2022-12-09T19:42:34Z</dc:date>
    </item>
    <item>
      <title>Re: Experience with vulnerability scanner in the internal network</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164649#M27452</link>
      <description>&lt;P&gt;On all cpu's. CPview attached. This is not one scanner there are 8 scanner &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;TAC only mention to check the scanner and check what we can do on the scanner it self.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 15:55:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164649#M27452</guid>
      <dc:creator>Kolafer</dc:creator>
      <dc:date>2022-12-09T15:55:31Z</dc:date>
    </item>
    <item>
      <title>Re: Experience with vulnerability scanner in the internal network</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164655#M27454</link>
      <description>&lt;P&gt;Believe so, yes, but if you want to ensure only Firewall and VPN are used for a specific connection, use fast_accel.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 18:05:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164655#M27454</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-12-09T18:05:45Z</dc:date>
    </item>
    <item>
      <title>Re: Experience with vulnerability scanner in the internal network</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164657#M27455</link>
      <description>&lt;P&gt;TAC is probably right in this case as you’re at the maximum number of worker cores for that platform and they’re all at ~80%.&lt;BR /&gt;Almost all your packets are being accelerated to boot.&lt;/P&gt;
&lt;P&gt;Every platform has a limit to the number of new connections per second that can be opened.&lt;BR /&gt;I believe this is represented on the data sheet in the lab performance section (meaning under ideal conditions): 550,000/sec.&lt;BR /&gt;The real world number is lower, obviously, and with 8 vulnerability scanners operating through your gateway, you could easily be bumping into this limit.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 18:47:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164657#M27455</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-12-09T18:47:25Z</dc:date>
    </item>
    <item>
      <title>Re: Experience with vulnerability scanner in the internal network</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164661#M27458</link>
      <description>&lt;P&gt;OK sorry to come in late on this thread.&amp;nbsp; After looking at your s7pac output and other screenshots:&lt;/P&gt;
&lt;P&gt;1) Looks like dynamic balancing/split has you in a 28/44 split on your 72-core firewall which is to be expected with only the FW blade active.&amp;nbsp; However one interesting side effect of this is that there are 60 firewall instances/workers, but only 44 cores available for them.&amp;nbsp; So the firewall instances are doubling and tripling up on certain cores, presumably for the duration of their existing connections to decay and the firewall instance to be eventually de-allocated.&lt;/P&gt;
&lt;P&gt;2) The high CPU on your firewall workers/instances is almost certainly caused by the very high number of rulebase lookups occuring on your firewall instances in the F2F path (and possibly exacerbated by the associated generation of logs), because the scanners are launching new accepted connections at a very high rate.&amp;nbsp; The first packet of every new connection must be handled by a worker, whether the connection is matched to a SecureXL Accept template (less likely) or has to perform a full rulebase lookup in F2F (more likely). Assuming the scanners are hitting lots of diverse destination IP addresses, very few accept templates will be formed and you will be stuck with the full overhead of F2F rule base lookups for each new connection.&lt;/P&gt;
&lt;P&gt;3) fast_accel or disabling the IPS blade will not help this situation, as those features only specify what to do after that first packet has matched a rule or template on a worker, which would be to offload subsequent packets to the SecureXL accelerated path (fast_accel), or disable IPS inspection of the subsequent data stream inside the connection which will happen anyway with fast_accel active.&lt;/P&gt;
&lt;P&gt;So trying to improve this situation will depend on your mutually-exclusive goal:&lt;/P&gt;
&lt;P&gt;Goal: Allow scans to run as fast and accurate as possible, all other traffic be damned&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;In your firewall/network policy add a rule as close to the top as possible matching the source IP addresses of the scanning systems with an action of Accept and a Track of None.&amp;nbsp; This would have made a huge difference in R77.30 and earlier, but in R80.10+ with the introduction of Column-based matching I'm not sure how much this will help (if at all) but it is worth a try. If your scanning traffic is currently being accepted after rule 1898 where it is ineligible for templating this change will definitely help, perhaps a lot.&amp;nbsp; The savings in logging overhead may improve the CPU issue on the workers&amp;nbsp; as well, also make sure Accounting is not enabled for this rule.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Ideally if you could somehow manually add broad-ranging SecureXL Accept templates for these scanning systems that would be great, but that is not possible as far as I know.&lt;/P&gt;
&lt;P&gt;Goal: Limit the impact of scans on firewall CPU to prefer non-scanning traffic, with the side effect of some (or a lot of) scan traffic getting lost/throttled&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Establish new connection quotas that will be enforced directly by SecureXL with no firewall worker involvement via the &lt;STRONG&gt;fwaccel dos rate&lt;/STRONG&gt; command:&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112454&amp;amp;partition=Advanced&amp;amp;product=SecureXL," target="_blank" rel="noopener"&gt;sk112454: How to configure Rate Limiting rules for DoS Mitigation (R80.20 and higher)&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'll give this situation some more thought, but this is the best I can come up with for now.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 20:46:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164661#M27458</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-12-09T20:46:00Z</dc:date>
    </item>
    <item>
      <title>Re: Experience with vulnerability scanner in the internal network</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164662#M27459</link>
      <description>&lt;P&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;honestly we have already a firewall policy on top of the policy rule base, which we do not log and we also change the tcp session timeout for that specific service from the default 3600 to 20.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Than we need to slow down the speed of scan as fap as possible.&lt;BR /&gt;&lt;BR /&gt;It was important for me to understand why the values ​​are much smaller in the productive environment compared to the data sheet.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 20:55:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Experience-with-vulnerability-scanner-in-the-internal-network/m-p/164662#M27459</guid>
      <dc:creator>Kolafer</dc:creator>
      <dc:date>2022-12-09T20:55:26Z</dc:date>
    </item>
  </channel>
</rss>

