Hi folks,
During a penetration test in our network a Nmap scan on port 80 for a complete /16 subnet was started. The source IP address was allowed to reach each IP address and excluded from the most inspections. But during the scan the load of the firewall reached 99% and the traffic flow nearly stopped.
Our service provider was not able to identify the reason. From my analyses later that day it happened due to CPAS (https://support.checkpoint.com/results/sk/sk179804).
CPAS act as a responder for HTTP requests and do a 3-way-handshake for each requested IP address, regardless if the address is online or not. It keeps sessions to offline IP addresses for 30 seconds open.
That means an aggressive Nmap scan would cause a lot of parallel new connections and a high load on the firewall until it stops working.
Is this an expected behaviour? Is it possible to reduce the 30 seconds for each connection or which is the suggested value? Any other suggestions to prevent such an issue?
Thank you.
Jas Man