- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
When researching my book I dug into the APCL Limit feature, trying to find a way to disable APCL limits "on the fly" for testing purposes or to monitor real-time statistics for packets dropped due to a Limit. The goal was to ensure an enforced Limit was not the cause of poor performance. Other than the statistics that are included in the traffic logs as demonstrated by Danny Jung above, there isn't a direct way to do that. I also discovered that APCL/URLF cannot be disabled "on the fly" like Threat Prevention can with fw amw unload.
However fw ctl zdebug drop will show real-time packet drops due to an APCL limit with the message: PSL Drop: APPI_LIMIT.
Also watch out for this issue when limits are applied to traffic subject to HTTPS Inspection:
--
Second Edition of my "Max Power" Firewall Book
Now Available at http://www.maxpowerfirewalls.com
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY