<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic tcpdump and fw monitor missed packets in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24423#M4869</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are digging a issue with our application department.&lt;/P&gt;&lt;P&gt;Testing by our QA dept. the http connection could be a 5-6s latency occasionally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So we did a packet capture.&lt;/P&gt;&lt;P&gt;the normal post and response:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-5 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70014_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the post that occurring latency as follows:&lt;/P&gt;&lt;P&gt;&lt;IMG class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70013_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;You could see the red column should be the POST request but the tcpdump shows "not captured"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and we also captured via fw monitor:&lt;/P&gt;&lt;P&gt;we can only see the POST request but no reponse:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-6 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70015_pastedImage_3.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you guys meeting this issues before?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 04 Sep 2018 10:19:52 GMT</pubDate>
    <dc:creator>Dawei_Ye</dc:creator>
    <dc:date>2018-09-04T10:19:52Z</dc:date>
    <item>
      <title>tcpdump and fw monitor missed packets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24423#M4869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are digging a issue with our application department.&lt;/P&gt;&lt;P&gt;Testing by our QA dept. the http connection could be a 5-6s latency occasionally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So we did a packet capture.&lt;/P&gt;&lt;P&gt;the normal post and response:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-5 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70014_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the post that occurring latency as follows:&lt;/P&gt;&lt;P&gt;&lt;IMG class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70013_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;You could see the red column should be the POST request but the tcpdump shows "not captured"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and we also captured via fw monitor:&lt;/P&gt;&lt;P&gt;we can only see the POST request but no reponse:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-6 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70015_pastedImage_3.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you guys meeting this issues before?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Sep 2018 10:19:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24423#M4869</guid>
      <dc:creator>Dawei_Ye</dc:creator>
      <dc:date>2018-09-04T10:19:52Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump and fw monitor missed packets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24424#M4870</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maybe because of SecureXL enabled ? Did you turn it off during debugs ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check following thread before&amp;nbsp;disable SecureXL:&lt;/P&gt;&lt;P&gt;&lt;A __default_attr="1137" __jive_macro_name="polls" _jive_internal="true" class="jive_macro_polls jive_macro link-titled" data-orig-content="fw monitor/tcpdump  and  &amp;quot;fwaccel off&amp;quot; - yes or no" href="https://community.checkpoint.com/polls/1137-fw-monitortcpdump-and-fwaccel-off-yes-or-no"&gt;&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To get the full output of fw monitor (and tcpdump) you should disable Secure XL with the command: "fwaccel off". You can re-enable it after debugs with the command: "fwaccel on". Another alternative is to disable SecureXL only for particular&amp;nbsp;IPs, as is mentioned in the link above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS: You should blurry IPs in your screenshots.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Sep 2018 11:15:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24424#M4870</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2018-09-04T11:15:28Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump and fw monitor missed packets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24425#M4871</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you ,Jozko.Blurred screenshots.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We disabled SecureXL.&lt;/P&gt;&lt;P&gt;Still the outputs as my screenshots.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Sep 2018 11:25:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24425#M4871</guid>
      <dc:creator>Dawei_Ye</dc:creator>
      <dc:date>2018-09-04T11:25:17Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump and fw monitor missed packets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24426#M4872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If this is a cluster of the gateways, I'd suggest using a span or mirror port on the switch(es) for definitive packet capture.&lt;/P&gt;&lt;P&gt;Have seen some asymmetrical weirdness a few times.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Sep 2018 12:11:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24426#M4872</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-09-04T12:11:53Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump and fw monitor missed packets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24427#M4873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vladimir&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes,our gateways are running clusterXL in Bridge mode.&lt;/P&gt;&lt;P&gt;You could see my second screenshots (captured on my WAN interface),actually ,the POST request is sent ,I think.But the tcpdump shows "TCP previous segment not captured".&lt;/P&gt;&lt;P&gt;Meanwhile,there is a normal output from our LAN interface ,but with latency.&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70023_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I don't think it is an asymmetrical problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Sep 2018 13:02:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24427#M4873</guid>
      <dc:creator>Dawei_Ye</dc:creator>
      <dc:date>2018-09-04T13:02:45Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump and fw monitor missed packets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24428#M4874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My point being is that you are looking at the traffic from L3 point of view only.&lt;/P&gt;&lt;P&gt;Incidentally, are you using vMAC on your clustered bridge?&lt;/P&gt;&lt;P&gt;And have you, perchance, added any other interfaces besides those in the bridge?&lt;/P&gt;&lt;P&gt;What kind of switches are on both sides of the bridge?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vladimir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Sep 2018 13:19:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24428#M4874</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-09-04T13:19:42Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump and fw monitor missed packets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24429#M4875</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please paste tcpdump and fw monitor command you have used ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Sep 2018 14:05:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24429#M4875</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2018-09-04T14:05:54Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump and fw monitor missed packets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24430#M4876</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jozko,&lt;/P&gt;&lt;P&gt;these are commands for capture:&lt;/P&gt;&lt;P&gt;fw monitor -T -e "host(52.xx.xx.xx) or host(&lt;SPAN&gt;52.&lt;/SPAN&gt;&lt;SPAN&gt;xx.xx.xx&lt;/SPAN&gt;) and accept; "&lt;/P&gt;&lt;P&gt;tcpdump -e -w fw036-0904-wan.cap -i eth2-01 -nn host &lt;SPAN&gt;52.&lt;/SPAN&gt;&lt;SPAN&gt;xx.xx.xx&lt;/SPAN&gt; or &lt;SPAN&gt;52.&lt;/SPAN&gt;&lt;SPAN&gt;xx.xx.xx&lt;/SPAN&gt; -s 0&lt;BR /&gt;tcpdump -e -w fw036-0904-lan.cap -i eth2-02 -nn host &lt;SPAN&gt;52.&lt;/SPAN&gt;&lt;SPAN&gt;xx.xx.xx&lt;/SPAN&gt; or &lt;SPAN&gt;52.&lt;/SPAN&gt;&lt;SPAN&gt;xx.xx.xx&lt;/SPAN&gt; -s 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;52.&lt;/SPAN&gt;&lt;SPAN&gt;xx.xx.xx are two servers used for test.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2018 09:08:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24430#M4876</guid>
      <dc:creator>Dawei_Ye</dc:creator>
      <dc:date>2018-09-05T09:08:12Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump and fw monitor missed packets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24431#M4877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes ,the customer have already check the issues with Application dept. and they have already captured the packets on server side ,there is no latency.&lt;/P&gt;&lt;P&gt;We didnt' use vMAC feature.&lt;/P&gt;&lt;P&gt;and besides brigde interfaces,there is only one Mgmt interface for updates and management.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Dawei Ye&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2018 09:20:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24431#M4877</guid>
      <dc:creator>Dawei_Ye</dc:creator>
      <dc:date>2018-09-05T09:20:43Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump and fw monitor missed packets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24432#M4878</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px; color: #000000;"&gt;SecureXL "&lt;STRONG&gt;fwaccel off&lt;/STRONG&gt;" does &lt;STRONG&gt;not&lt;/STRONG&gt; have to be &lt;STRONG&gt;disabled on R80.20&lt;/STRONG&gt; to run "fw monitor". This is good for performance, so "fw monitor" does not affect performance any more.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px; color: #000000;"&gt;More see here: &lt;A href="https://community.checkpoint.com/docs/DOC-3351"&gt;R80.x Performance Tuning and Debug Tips – fw monitor&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px; color: #000000;"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px; color: #000000;"&gt;Heiko&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Nov 2018 20:02:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/24432#M4878</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-11-18T20:02:25Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump and fw monitor missed packets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/62332#M12649</link>
      <description>Did you ever get an answer to your question? We are seeing very similar to what you are getting</description>
      <pubDate>Mon, 09 Sep 2019 22:17:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/62332#M12649</guid>
      <dc:creator>Alan_Long</dc:creator>
      <dc:date>2019-09-09T22:17:59Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump and fw monitor missed packets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/62810#M12727</link>
      <description>&lt;P&gt;Could be indicative of frame loss at the NIC and/or NIC driver level, what does output of &lt;STRONG&gt;netstat -ni&lt;/STRONG&gt; show?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 15 Sep 2019 19:14:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/62810#M12727</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-09-15T19:14:05Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump and fw monitor missed packets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/62814#M12729</link>
      <description>We found the issue was due to a rule that should have no affect on the traffic flow. We disabled the rule and all is good. This same rule is on several of our other external clusters, and they have no issue at all. Support is looking into it now.</description>
      <pubDate>Sun, 15 Sep 2019 20:10:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/62814#M12729</guid>
      <dc:creator>Alan_Long</dc:creator>
      <dc:date>2019-09-15T20:10:49Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump and fw monitor missed packets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/174941#M29191</link>
      <description>&lt;P&gt;Hi Alan,&lt;/P&gt;&lt;P&gt;did you get an anwser from support about this?or they creat any SK?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2023 11:41:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/174941#M29191</guid>
      <dc:creator>Setu2</dc:creator>
      <dc:date>2023-03-15T11:41:53Z</dc:date>
    </item>
    <item>
      <title>Re: tcpdump and fw monitor missed packets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/174943#M29192</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/67927"&gt;@Setu2&lt;/a&gt;&amp;nbsp;this is a very old thread. With all supported versions today, fw monitor should show all the traffic, including fully accelerated packets. If you are still struggling, please open a new thread to discuss your issue.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2023 11:53:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/tcpdump-and-fw-monitor-missed-packets/m-p/174943#M29192</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-03-15T11:53:21Z</dc:date>
    </item>
  </channel>
</rss>

