- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi Team ,
I need a way to understand if Checkpoint can show the data of Bandwidth consumed ( per source/network basis ) for the specific time of the day.
What are the possible ways i can verify the above.
Checkpoint version : R80.20
Blades enabled : Firewall , app control and content awareness
Thanks in advance.
I believe smart view monitor can show this (under logs and monitor tab in dashboard). Do you have monitoring blade enabled on the firewall?
Hi @the_rock ,
Thanks for your response.
Monitoring blade is not enabled ( not licensed ) , and the only blades that are enabled in the gateway are Firewall , app control and content awareness.
Do we have any other options please ?
Sorry, I saw you mentioned that in the description as far as blades, my bad. Hm, not really sure without monitoring blade, but I can test it in the lab tomorrow. Because, quite honestly, I dont believe there is an easy way (or any way for that matter) to filter for something like this from regular logs, but will confirm.
Thanks for your response. Very much appreciated.
I see there is an option for bandwidth when searching in logs, but not sure what value to search for, as I never used it before. I will check more tomorrow and let you know. Its under field Other Fields: and then bandwidth,
cpview on the gateway is one possibility, at least in real-time.
Make sure you are on a recent JHF.
Hi @PhoneBoy ,
Thanks for your response.
Does the cpview also shows the historical bandwidth usage per source/dest ? If not do we have any other options like cpviewer and Smartview or any other options we can really on.
@the_rock That's correct there is a bandwidth option in the other fields but not sure what option to enter since even i haven't used that before.
I did not forget about you, just been a busy day, apologies. I had been trying to figure out how to actually run that filter, but no luck so far. Will definitely work on it Friday morning and update you in this thread.
Andy
No worries , really appreciate your kind support.
Im really sorry, tried every possible option I could think of for that bandwidth setting and no luck : (. Maybe you could confirm with TAC or someone else here can chime in.
cpview has historical options (i.e. you can see what was going on at a given point in time), but I don't know that it tracks specific top connections over time or not.
Thank you for your response.
So what are the other options we can rely on to check the historical bandwidth usage per source/network basis.
Try running the fw ctl multik print_heavy_conn command every day, it will show all connections that were classified by the firewall as "heavy" (a.k.a. an elephant flow) over the last 24 hours. It won't show the top connections per se, but will help identify any bandwidth-hogging connections historically. To clarify what constitutes a "heavy" connection see here: sk164215: How to Detect and Handle Heavy Connections
Thanks for your response.
Does the command help to identify the connection which had heavy flow a week ago ?
Since the issue occurred only once and usually this is occurring whenever the Microsoft patch upgrade over the systems ( happens once in a month ) . So basically wanted to know and get proof is this because of patch upgrade it happens or does any other traffic constituting to this.
Bandwidth spike occurrences are taking from the SolarWinds monitoring , and from the CP want to identify the historical bandwidth hogging connection for that particular time.
No just the last 24 hours and that can't duration be changed, which is why I suggested running it once a day.
Another way to catch real time high bandwidth sources is to run a tcpdump on the gateway for say 10 seconds and then export it to wireshark and sort by Bytes Down
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
15 | |
12 | |
8 | |
6 | |
6 | |
6 | |
5 | |
5 | |
4 | |
3 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY