- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Greetings!
I'm noticing a strange behavior in our Security Gateways related to fwaccel dos after upgrading from R81.10.
Environment
Assuming the enforcement on internal interfaces is disabled and the SecureXL Penalty Box is enabled.
fwaccel dos config get:
rate limit: enabled (without policy)
rule cache: enabled
pbox: enabled
deny list: enabled (with policy)
drop frags: disabled
drop opts: disabled
internal: disabled
monitor: disabled
log drops: enabled
log pbox: enabled
...
The strange behavior: after a while, the enforcement on internal interfaces becomes enabled WITHOUT DOING ANYTHING (internal: enabled). And then, I have to disable it again with fwaccel dos config set --disable-internal. It remains disabled for a while, but then, after a while it becomes enabled again.
Are you also experiencing the same "issue" ? Do you have any advice about the above ?
I also suppose the guide fwaccel dos config (R81.20 Performance Tuning Administration Guide) contains wrong information. On bottom of the article, it is reported:
$FWDIR/conf/fwaccel_dos_rate_on_install:
#!/bin/bash
#
# Automatically generated by fwaccel - DO NOT EDIT THIS FILE
rate.--set-enabled=1
global.--set-enforce-internal=0
pbox.--set-enabled=1
pbox.--set-log-reported=1
deny.--set-enabled=1
drop_frags.--set-enabled=0
drop_opts.--set-enabled=0
global.--set-monitor-only=0
rate.--set-rule-cache=1
global.--set-log-drops=1
...
deny.--set-name=
deny.--set-monitor-only=0
deny.--set-tcp-rst=0
pbox.--set-monitor-only=0
- I already sent feedback to Check Point about these wrong information -
That's it. I hope someone could help me with first two questions.
I suspect what you discovered about the configuration file is related to the problem you're having.
Which means a consult with TAC if you haven't already opened a case.
Hello @PhoneBoy ,
thank you for your reply. Nope, I didn't opened a case yet (but I'll do that).
What do you mean: the config. file fwaccel_dos_rate_on_install I have in R81.20 shouldn't be in that format (so the article is correct ?) ...Or there is something wrong related to fwaccel dos and config. file in general, in R81.20 ?
Thank you,
Luca
I assume it's related to whatever is auto-generating that configuration file.
Can you check the last modified date on that file and see if it tracks when you notice the issue occur?
Hello @PhoneBoy,
Enforcement on internal interfaces disabled:
-rwxr-x--- 1 **** **** 498 Apr 18 23:34 /opt/CPsuite-R81.20/fw1/conf/fwaccel_dos_rate_on_install
Enforcement on internal interfaces enabled:
-rwxr-x--- 1 **** **** 498 Apr 19 00:08 /opt/CPsuite-R81.20/fw1/conf/fwaccel_dos_rate_on_install
# more $FWDIR/conf/fwaccel_dos_rate_on_install
#!/bin/bash
#
# Automatically generated by fwaccel - DO NOT EDIT THIS FILE
rate.--set-enabled=1
global.--set-enforce-internal=1
pbox.--set-enabled=1
pbox.--set-log-reported=1
deny.--set-enabled=1
drop_frags.--set-enabled=0
drop_opts.--set-enabled=0
global.--set-monitor-only=0
rate.--set-rule-cache=1
global.--set-log-drops=1
...
deny.--set-name=
deny.--set-monitor-only=0
deny.--set-tcp-rst=0
pbox.--set-monitor-only=0
# fwaccel dos config get
rate limit: enabled (without policy)
rule cache: enabled
pbox: enabled
deny list: enabled (with policy)
drop frags: disabled
drop opts: disabled
internal: enabled
monitor: disabled
log drops: enabled
log pbox: enabled
...
Set back to disabled:
# fwaccel dos config set --disable-internal
Configuration saved to /opt/CPsuite-R81.20/fw1/conf/fwaccel_dos_rate_on_install
When the config. file changes (automatically) the output shows the change (of course).
It would be interesting to know what "global.--" prefix in config. file, means.
Sounds like a TAC case is in order
Case opened.
Let's see...
did you check out this one https://support.checkpoint.com/results/sk/sk179706 ?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 19 | |
| 17 | |
| 13 | |
| 8 | |
| 7 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY