- Products
- Learn
- Local User Groups
- Partners
- More
The State of Ransomware Q1 2026
Key Trends and Their Impact
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
When researching my book I dug into the APCL Limit feature, trying to find a way to disable APCL limits "on the fly" for testing purposes or to monitor real-time statistics for packets dropped due to a Limit. The goal was to ensure an enforced Limit was not the cause of poor performance. Other than the statistics that are included in the traffic logs as demonstrated by Danny Jung above, there isn't a direct way to do that. I also discovered that APCL/URLF cannot be disabled "on the fly" like Threat Prevention can with fw amw unload.
However fw ctl zdebug drop will show real-time packet drops due to an APCL limit with the message: PSL Drop: APPI_LIMIT.
Also watch out for this issue when limits are applied to traffic subject to HTTPS Inspection:
--
Second Edition of my "Max Power" Firewall Book
Now Available at http://www.maxpowerfirewalls.com
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY