Hi Checkmates,
For the second week in a row, over the weekend we have been experiencing heavy (allowed) trafic through our VSX (R77.30) toward servers located behind our load balancers. This causes high CPU usage on 2 cores and now we are fearing some targetted DDOS or reconnaissance action is taking place.
We received no complaints from users or server admins. We know which VS is impacted but are having difficulties identifiying exactly what is happening.
To this end I used:
fw tab -u -t connections | awk '{ print $2 }' | sort -n | uniq -c | sort -nr | head -10
from 'My top 3 CLI commands' ( where Timothy shared a way of showing the top ten source IPs hogging slots in the connection table). This gave us some IPs, but basically we could see that in Smartlog too
How could we investigate this any deeper? Taking a .cap wouldn't help a lot, or would it?
Any ideas?