- Products
- Learn
- Local User Groups
- Partners
-
More
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
IDC Spotlight -
Uplevel The SOC
Important! R80 and R80.10
End Of Support around the corner (May 2021)
Hi
Anyone can advice. How to monitor bandwidth limit for application control ?
MGMT R80.10
GW R77.30
SmartEvent Views is what you are looking for.
Hi Danny
Thank you for your advice but I would like to see real time utilize or exceed drop for limit policy when user complain about slow access.
Note - The Security Gateway implements the Limit action by dropping successive packets which exceed the allowed bandwidth.
How to monitor exceed drop ? I have no see this log from SmartConsole.
Then you want to use SmartLog like this:
I do not get any results when using the filter, "bandwidth AND appi_name:YouTube". However I do get results if use the filter, "bandwidth" by itself or "appi_name:YouTube" by itself.
I am very interested in getting the results like the screen shot from Kosin.
Bandwidth management by dropping packets is a bad strategy. You can get much better results by changing (reducing) window sizes in responses and holding back acknowledgement packets.
Nothing gets dropped but you let the TCP protocol do the bandwidth limiting.
Not somethink I invented. Companies like PacketShaper (bought by Blue Coat, bought in turn by Symantec) did create great appliances with features like this.
Thank you Danny. Now I can see drop log from smartview for bandwidth limit policy.
hi
i have the same question as you.
Could you please guide me on how to get those statistics as you did?
thanks
When researching my book I dug into the APCL Limit feature, trying to find a way to disable APCL limits "on the fly" for testing purposes or to monitor real-time statistics for packets dropped due to a Limit. The goal was to ensure an enforced Limit was not the cause of poor performance. Other than the statistics that are included in the traffic logs as demonstrated by Danny Jung above, there isn't a direct way to do that. I also discovered that APCL/URLF cannot be disabled "on the fly" like Threat Prevention can with fw amw unload.
However fw ctl zdebug drop will show real-time packet drops due to an APCL limit with the message: PSL Drop: APPI_LIMIT
.
Also watch out for this issue when limits are applied to traffic subject to HTTPS Inspection:
--
Second Edition of my "Max Power" Firewall Book
Now Available at http://www.maxpowerfirewalls.com
@Timothy_Hall doesn't sk70600 only apply to R75.40? Or does it apply to the R80 trains as well?
The cpas_tcp_do_sack variable still exists in the R80.40 kernel and its default value is 1. If I'm reading the SK correctly you only need to flip this variable if the two hosts are using very large TCP windows and packet loss is present. There were a ton of changes to CPAS (R80.20) and TLS Inspection (R80.30) so this variable may not even be relevant anymore.
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY