Hi fellow mates
At the moment we run a Check Point HA CloudGuard Geo Cluster R81.20 in our AWS environment over a AWS TGW architecture that checks on all east-west traffic as well as everything that comes from on-prem or over zero-trust appliances.
We consider changing the architecture to a scalable one with the AWS Gateway Loadbalancer.
There is one issue / sorrow we have: the hard limit in the GWLB of 350 seconds of stale TCP sessions.
We assume that some of our legacy services / applications that moved to AWS would be affected by this limit. So we try to investigate if such traffic would be affected by the limitation. I found an ancient article concerning a similar topic but for CP R75.40 with "fw tab" command, that would probably help us detect such stale tcp sessions exceeding the 350 seconds limit:
https://networkengineering.stackexchange.com/questions/2829/find-idle-connections-in-check-point-fir...
fw tab -t connections -u -f | grep 86400 |awk '{ split($41,a,"/"); if( a[1] < 82800) print $2,$9,$13,$15,$41; }'
As the table has changed over the years, the printable positions are not correct anymore as well as the default TCP timeout of one day...
I have tried to adapt the command to our situation but I am not completely pleased with the output as it is not consistent:
fw tab -t connections -u -f | grep 3600 | awk '{ split($49,a,"/"); if( a[1] < 350) print $18,$19,$20,$21,$22,$23,$24,$25,$48,$49; }'
fw tab -t connections -u -f | grep 3600 | awk '{ split($106,a,"/"); if( a[1] < 350) print $18,$19,$20,$21,$22,$23,$24,$25,$105,$106; }'
My questions to you guys would be: did anyone had a similar challenge yet? How did you figure out if a GWLB with its limitations would fit into your environment smoothly? Has anyone figured out a satisfying output with the "fw tab" command?
Looking forward to your reactions and have a great 1st of May (Thank God it's Tuesday)
Cyrill