Configuring controller E1

This is my life saver command while my 1st project. I am not even aware of it. May be few aware of it, but not all. My best friend Ravi Kumar Ramachandran helped me lot while I am in on site. I cannot thank you enough for extending his support.

If you not doing following configuration you will not able to see E1 interface by default.

following are the final commands
Router(config)#controller E1 0/1/0
Router(config-controller)#framing no-crc4
Router(config-controller)#channel-group 0 timeslots 1-31
Router(config-controller)#

Router(config)#framing no-crc4
Router(config-controller)#sh
Router(config-controller)#no sh
Router(config-controller)#^Z
Router#
Router(config)#int se0/1/0:0
Router(config-if)#encapsulation frame-relay ietf
Router(config-if)#exit
Router(config)#int se0/1/0:0.1
Router(config-subif)#frame-relay interface-dlci ?
  <16-1007>  Define a switched or locally terminated DLCI

I hope this will help any of you. 

Autonegotiation Valid Configuration

There is a lot of confusion about auto negotiation. Here is a chart that will help bring things into perspective.
Autonegotiation Valid Configuration



Configuration NIC (Speed/Duplex)
Configuration Switch (Speed/Duplex)
Resulting NIC Speed/Duplex
Resulting Catalyst Speed/Duplex
Comments
AUTO
AUTO
1000 Mbps, Full-duplex
1000 Mbps, Full-duplex
Assuming maximum capability of Catalyst switch, and NIC is 1000
Mbps, full-duplex.
1000 Mbps, Full-duplex
AUTO
1000 Mbps, Full-duplex
1000 Mbps, Full-duplex
Link is established, but the switch does not see any
autonegotiation information from NIC. Since Catalyst switches support only
full-duplex operation with 1000 Mbps, they default to full-duplex, and this
happens only when operating at 1000 Mbps.
AUTO
1000 Mbps, Full-duplex
1000 Mbps, Full-duplex
1000 Mbps, Full-duplex
Assuming maximum capability of NIC is 1000 Mbps,
full-duplex.
1000 Mbps, Full-duplex
1000 Mbps, Full-duplex
1000 Mbps, Full-duplex
1000 Mbps, Full-duplex
Correct Manual Configuration
100 Mbps, Full-duplex
1000 Mbps, Full-duplex
No Link
No Link
Neither side establishes link, due to speed
mismatch
100 Mbps, Full-duplex
AUTO
100 Mbps, Full-duplex
100 Mbps, Half-duplex
Duplex Mismatch
1

AUTO
100 Mbps, Full-duplex
100 Mbps, Half-duplex
100 Mbps, Full-duplex
Duplex Mismatch
1

100 Mbps, Full-duplex
100 Mbps, Full-duplex
100 Mbps, Full-duplex
100 Mbps, Full-duplex
Correct Manual
Configuration2

100 Mbps, Half-duplex
AUTO
100 Mbps, Half-duplex
100 Mbps, Half-duplex
Link is established, but switch does not see any
autonegotiation information from NIC and defaults to half-duplex when operating
at 10/100 Mbps.
10 Mbps, Half-duplex
AUTO
10 Mbps, Half-duplex
10 Mbps, Half-duplex
Link is established, but switch does not see Fast Link Pulse
(FLP) and defaults to 10 Mbps half-duplex.
10 Mbps, Half-duplex
100 Mbps, Half-duplex
No Link
No Link
Neither side establishes link, due to speed
mismatch.
AUTO
100 Mbps, Half-duplex
100 Mbps, Half-duplex
100 Mbps, Half-duplex
Link is established, but NIC does not see any autonegotiation
information and defaults to 100 Mbps, half-duplex.
AUTO
10 Mbps, Half-duplex
10 Mbps, Half-duplex
10 Mbps, Half-duplex
Link is established, but NIC does not see FLP and defaults to
10 Mbps, half-duplex.

Hardware Troubleshooting for Cisco 12000 Series Internet Router Line Card Failures

Hardware Troubleshooting for Cisco 12000 Series Internet Router Line Card

Highlights:

  • show context summary = slot crashes
  • show logging
  • show logging summary
  • show diag <slot>
  • show context slot <slot>
  • show led
  • diag 7 verbose tftp tftp://x.x.x.x ( this test will run 5 - 20 min and the card will not be usable durung the test)
  • diag <slot> previous
http://www.cisco.com/en/US/products/hw/routers/ps167/products_tech_note09186a00800cdd58.shtml

troubleshooting high CPU utilization

For troubleshooting high CPU utilization in specific processes, refer
to the appropriate link:
  • ARP Input—ARP Input section of the document Troubleshooting High CPU
    Utilization Due to Processes
  • BGP Router—High CPU due to BGP Router Process section of the document
    Troubleshooting High CPU Caused by the BGP Scanner or BGP Router
    Process
  • BGP Scanner—High CPU due to BGP Scanner section of the document
    Troubleshooting High CPU Caused by the BGP Scanner or BGP Router
    Process
  • EXEC—High CPU
    Utilization in the EXEC and Virtual EXEC Processes
  • HyBridge Input—Troubleshooting High CPU Utilization Caused by the HyBridge Input
    Process on Routers With ATM Interfaces
  • IP Input—Troubleshooting High CPU Utilization Due to the IP Input
    Process
  • IP Simple Network Management Protocol (SNMP)—IP Simple Network Management Protocol
    (SNMP) Causes High CPU Utilization
  • LC ADJ Updater—What Causes High CPU Utilization in the LC Adjacency Updater
    Process on a Cisco 12000 Series Internet Router?
  • TCP Timer—TCP Timer section of the document Troubleshooting High CPU
    Utilization due to Processes
  • TTY Background—TTY Background section of the document Troubleshooting High
    CPU Utilization due to Processes
  • Virtual EXEC—High CPU Utilization in Exec and Virtual Exec
    Processes
  • Vtemplate Backgr—Virtual Template Background section of the document
    Troubleshooting High CPU Utilization due to Processes
  • Other processes—Other Processes section of the document Troubleshooting High
    CPU Utilization due to Processes
Source: http://www.cisco.com/en/US/products/hw/routers/ps133/products_tech_note09186a00800a70f2.shtml

NetScaler Password Recovery Procedure

Summary

This document describes how to perform a Password Recovery procedure for the NetScaler device running 6.0 and 6.1.

Procedure

Follow these steps to perform a Password Recovery procedure:

Note: Refer to the transcript in the More Information section for a complete listing of commands and output.

   1. Attach a console cable to the NetScaler Serial Console (9600 baud, 8 bits, 1 stop bit, No parity).
   2. Boot the NetScaler system.
   3. The following message is seen:

      Hit [Enter] to boot immediately, or any other key for command prompt
      Booting [kernel] in 10 seconds
      Press the SPACEBAR.
      Note: If using the NetScaler 7000 press CTRL+C here.

   4. Type boot –s.

      This starts the kernel in single user mode.

   5. You should see the message:

      Enter full pathname of shell or RETURN for /bin/sh:
      Press ENTER.
      Note: The prompt now changes to \u@\h\$.

   6. Check disk consistency by typing the following:

      \u@\h\$ /sbin/fsck /dev/ad0s1a
      Note: Be sure to include a space between /sbin/fsck and /dev/ad0s1a.

   7. Type df to view mounted partitions, then enter the following command to mount the flash drive:

      \u@\h\$ /sbin/mount /dev/ad0s1a /flash
      Note: Be sure to include spaces between /sbin/mount, dev/ad0s1a, and /flash.
      If this command fails, you can create the flash directory before issuing the mount by typing the following command:
      \u@\h\$ mkdir /flash
      Now retry the mount command. You can also type df again to view the mounted drives.

   8. Type the following command:

      \u@\h\$ cd /flash/nsconfig

   9. Type the following commands to rewrite the ns.conf file and remove the set system command defaulting to the nsroot user:

      \u@\h\$ grep –v “set system user nsroot” ns.conf > new.conf
      Rename the old ns.conf:
      \u@\h\$ mv ns.conf old.ns.conf

      Rename the new.conf file to ns.conf:
      \u@\h\$ mv new.conf ns.conf

  10. Reboot the NetScaler device by typing the reboot command.
  11. You can now log on using the following credentials:

      User name: nsroot
      Password: nsroot

  12. Change the nsroot password once you have logged on by typing the following command:

      > set system user nsroot

More Information

This is a transcript of the Password Recovery procedure.


Console: serial port
BIOS drive C: is disk0
BIOS drive D: is disk1
BIOS 637kB/1046500kB available memory

FreeBSD/i386 bootstrap loader, Revision 0.8
(murray@builder.FreeBSD.org, Tue Sep 18 10:05:43 PDT 2001)
Loading /boot/defaults/loader.conf
ns-6.1-86.1 text=0x4b6260 data=0x64908d0+0x5b50f4


Hit [Enter] to boot immediately, or any other key for command prompt.

Booting [kernel] in 2 seconds...

Type '?' for a list of commands, 'help' for more detailed help.
ok boot –s

Copyright (c) 1992-2003 The FreeBSD Project.
Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
The Regents of the University of California. All rights reserved.
FreeBSD 4.9-NETSCALER-6.1 #0: Tue Dec 6 00:52:06 PST 2005

build@amber.netscaler.com:/usr/obj/usr/home/build/rs_61/usr.src/sys/NETSCALER
Calibrating clock(s) ...



Mounting root from ufs:/dev/md0c
da0 at ahc0 bus 0 target 0 lun 0
da0: Fixed Direct Access SCSI-3 device
da0: Serial Number 3JA9380Z00007453SCPE
da0: 160.000MB/s transfers (80.000MHz, offset 63, 16bit), Tagged Queueing Enabled
da0: 35003MB (71687372 512 byte sectors: 255H 63S/T 4462C)
md0: invalid primary partition table: no magic
start_init: trying /sbin/init
Enter full pathname of shell or RETURN for /bin/sh:
\u@\h\$
\u@\h\$ /sbin/fsck /dev/ad0s1a
ad0s1: type 0xa5, start 32, end = 500735, size 500704 : OK
** /dev/ad0s1a
** Last Mounted on /flash
** Phase 1 - Check Blocks and Sizes
** Phase 2 - Check Pathnames
** Phase 3 - Check Connectivity
** Phase 4 - Check Reference Counts
** Phase 5 - Check Cyl groups
7594 files, 178477 used, 64114 free (7250 frags, 7108 blocks, 3.0% fragmentation)

***** FILE SYSTEM MARKED CLEAN *****
\u@\h\$ /sbin/mount /dev/ad0s1a /flash
ad0s1: type 0xa5, start 32, end = 500735, size 500704 : OK
\u@\h\$ cd /flash/nsconfig
\u@\h\$ df
Filesystem 1K-blocks Used Avail Capacity Mounted on
/dev/md0c 100750 86088 12648 87% /
/dev/ad0s1a 242591 178477 44707 80% /flash
\u@\h\$ grep -v "set system user nsroot" ns.conf > new.conf
\u@\h\$ mv ns.conf old.ns.conf
\u@\h\$ mv new.conf ns.conf
\u@\h\$ reboot
Waiting (max 60 seconds) for system process `vnlru' to stop...stopped
Waiting (max 60 seconds) for system process `bufdaemon' to stop...stopped
Waiting (max 60 seconds) for system process `syncer' to stop...stopped

syncing disks...
done
Uptime: 17m53s
Rebooting...


Hit [Enter] to boot immediately, or any other key for command prompt.

Booting [kernel] in 2 seconds...
Booting [kernel] in 1 second...
Booting [kernel]...



Feb 28 20:15:40 12.178.35.81 02/28/2006:20:15:35 GMT ns : EVENT STATECHANGE : Device "self node 12.178.35.81" - State UP

nssyslog nsvpnlog daemon

nsconmsg:Netscaler Syslog Daemon Starting....

nsconmsg:Netscaler Syslog Daemon Starting....

Displaying accesslogs information
Performance Data Record Version 2.0
Started
Feb 28 20:15:52 ns netscaler: self node 12.178.35.81: UP

login: nsroot
Password:
Last login: Tue Feb 28 13:33:47 from 195.153.38.125
Done

Configuring DNS

  • add dns nameServer
  • show dns nameServer
Example
> add dns nameServer 10.102.29.10
Done
> show dns nameServer 10.102.29.10
1)       10.102.29.10  -  State: DOWN
Done
>
SNMP
  • add snmp manager … [-netmask ]
  • show snmp manager
Example
> add snmp manager 10.102.29.5 -netmask 255.255.255.255
Done
> show snmp manager 10.102.29.5
1)      10.102.29.5         255.255.255.255
Done
>
  • add snmp trapspecific
  • show snmp trap
Example
> add snmp trap specific 10.102.29.3
Done
> show snmp trap
Type        DestinationIP    DestinationPort  Version     SourceIP         Min-Severity   Community
—-        ————-    —————  ——-     ——–         ————   ———
generic     10.102.29.9      162              V2          NetScaler IP     N/A            public
generic     10.102.29.5      162              V2          NetScaler IP     N/A            public
generic     10.102.120.101   162              V2          NetScaler IP     N/A            public
.
.
.
specific    10.102.29.3      162              V2          NetScaler IP     -              public
Done
>
  • set snmp alarm [-state ENABLED | DISABLED ]
  • show snmp alarm
Example
> set snmp alarm LOGIN-FAILURE -state ENABLED
Done
> show snmp alarm LOGIN-FAILURE
Alarm                            Alarm Threshold    Normal Threshold  Time  State      Severity      Logging
—–                            —————    —————-  —-  ——–   ————- ——–
1) LOGIN-FAILURE                    N/A                N/A               N/A   ENABLED    -             ENABLED
Done
>
  • set snmp alarm [-severity ]
  • show snmp alarm
Example
> set snmp alarm LOGIN-FAILURE -severity Major
Done
> show snmp alarm LOGIN-FAILURE
Alarm                            Alarm Threshold    Normal Threshold  Time  State      Severity      Logging
—–                            —————    —————-  —-  ——–   ————- ——–
1) LOGIN-FAILURE                    N/A                N/A               N/A   ENABLED    Major         ENABLED
Done
>

Configuring Link Aggregate Channels

> add channel LA/1
 Done
> bind channel LA/1 1/8
 Done
> show channel LA/1
1)      Interface LA/1 (802.3ad Link Aggregate) #9
        flags=0x1004000 
        MTU=1514, native vlan=1, MAC=02:d0:68:15:fd:3b, downtime 0h00m00s
        Requested: media NONE, speed NONE, duplex NONE, fctl NONE,
                 throughput 0
        Actual: throughput 0
        LA mode: MANUAL, distribution: Conn: ENABLED, MAC: BOTH
                1/8: unknown                    DOWN 162h40m02s

        RX: Pkts(0) Bytes(0) Errs(0) Drops(0) Stalls(0)
        TX: Pkts(0) Bytes(0) Errs(0) Drops(0) Stalls(0)
        NIC: InDisc(0) OutDisc(0) Fctls(0) Stalls(0) Hangs(0) Muted(0)
        Bandwidth thresholds are not set.

 Done
>

To configure a VLAN by using the NetScaler command line

Type the following commands to create a VLAN, bind interfaces to it, verify the configuration, and display the statistics. If you have already created the VLAN, skip the first command.
  • add vlan
  • bind vlan [-ifnum ]
  • show vlan []
Example
> add vlan 2
 Done
> bind vlan 2 -ifnum 1/8
 Done
> show vlan 2

1)      VLAN ID: 2
        Member Interfaces : 1/8         Tagged: None
 Done
>
> stat vlan 2
VLAN ID 2Rate (/s)                                     Total
Packets received                                   0                    0
Bytes received                                     0                    0
Packets sent                                       0                    0
Bytes sent                                         0                    0
Packets dropped                                   --                    0
Broadcast pkts sent & received                    --                    0
 Done
>

Configuring Network Interfaces

set interface 1/8 -duplex full
 Done
> show interface 1/8
        Interface 1/8 (Gig Ethernet 10/100/1000 MBits) #2
        flags=0x4000 
        MTU=1514, native vlan=1, MAC=00:d0:68:15:fd:3d, downtime 162h01m03s
        Requested: media UTP, speed AUTO, duplex FULL, fctl OFF,
                 throughput 0

        RX: Pkts(0) Bytes(0) Errs(0) Drops(0) Stalls(0)
        TX: Pkts(0) Bytes(0) Errs(0) Drops(0) Stalls(0)
        NIC: InDisc(0) OutDisc(0) Fctls(0) Stalls(0) Hangs(0) Muted(0)
        Bandwidth thresholds are not set.

 Done

Enabling and Disabling MAC-Based Forwarding Mode

enable ns mode mbf
 Done
> show ns mode

        Mode                           Acronym              Status
        -------                        -------              ------
 1)     Fast Ramp                      FR                   ON
 2)     Layer 2 mode                   L2                   OFF
 .
 .
 .
 6)     MAC-based forwarding           MBF                  ON
 .
 .
 .
 Done
> 

> disable ns mode mbf
 Done
> show ns mode

        Mode                           Acronym              Status
        -------                        -------              ------
 1)     Fast Ramp                      FR                   ON
 2)     Layer 2 mode                   L2                   OFF
 .
 .
 .
 6)     MAC-based forwarding           MBF                  OFF
 .
 .
 .
 Done
>

Enabling and Disabling Layer 2 or 3 Mode

  • enable ns mode
  • disable ns mode
  • show ns mode
Examples
> enable ns mode l3
Done
> show ns mode
Mode                           Acronym              Status
——-                        ——-              ——
1)     Fast Ramp                      FR                   ON
2)     Layer 2 mode                   L2                   OFF
.
.
.
9)     Layer 3 mode (ip forwarding)   L3                   ON
.
.
.
Done
>
> disable ns mode l3
Done
> show ns mode
Mode                           Acronym              Status
——-                        ——-              ——
1)     Fast Ramp                      FR                   ON
2)     Layer 2 mode                   L2                   OFF
.
.
.
9)     Layer 3 mode (ip forwarding)   L3                   OFF
.
.
.
Done

Binding the SSL Policy to an SSL Vserver

  • bind ssl vserver -policyName
  • show ssl vserver
Example
> bind ssl vserver Vserver-SSL-1 -policyName Policy-SSL-1
Done
> show ssl vserver Vserver-SSL-1
Advanced SSL configuration for VServer Vserver-SSL-1:
DH: DISABLED
Ephemeral RSA: ENABLED          Refresh Count: 0
Session Reuse: ENABLED          Timeout: 120 seconds
Cipher Redirect: ENABLED
SSLv2 Redirect: ENABLED
ClearText Port: 0
Client Auth: DISABLED
SSL Redirect: DISABLED
Non FIPS Ciphers: DISABLED
SSLv2: DISABLED SSLv3: ENABLED TLSv1: ENABLED
1)      CertKey Name: CertKey-SSL-1 Server Certificate
1)      Policy Name: Policy-SSL-1
Priority: 0
1)      Cipher Name: DEFAULT
Description: Predefined Cipher Alias
Done
>

Creating SSL Policies

  • show ssl policy
Example
> add ssl policy Policy-SSL-1 -rule ns_true -reqaction Action-SSL-OWA
Done
> show ssl policy Policy-SSL-1
Name: Policy-SSL-1      Rule: ns_true
Action: Action-SSL-OWA  Hits: 0
Policy is bound to following entities
1)      PRIORITY : 0
Done

Creating an SSL Action to Enable OWA Support

  • add ssl action -OWASupport ENABLED
  • show SSL action
> add ssl action Action-SSL-OWA -OWASupport enabled
Done
> show SSL action Action-SSL-OWA
Name: Action-SSL-OWA
Data Insertion Action: OWA
Support: ENABLED
Done

Binding an SSL Certificate Key Pair to the Vserver

  • bind ssl vserver -certkeyName
  • show ssl vserver
Example
> bind ssl vserver Vserver-SSL-1 -certkeyName CertKey-SSL-1
Done
> show ssl vserver Vserver-SSL-1
Advanced SSL configuration for VServer Vserver-SSL-1:
DH: DISABLED
Ephemeral RSA: ENABLED Refresh Count: 0
Session Reuse: ENABLED Timeout: 120 seconds
Cipher Redirect: ENABLED
SSLv2 Redirect: ENABLED
ClearText Port: 0
Client Auth: DISABLED
SSL Redirect: DISABLED
Non FIPS Ciphers: DISABLED
SSLv2: DISABLED SSLv3: ENABLED TLSv1: ENABLED
1) CertKey Name: CertKey-SSL-1 Server Certificate
1) Cipher Name: DEFAULT
Description: Predefined Cipher Alias
Done

Adding a Certificate Key Pair

  • add ssl certKey -cert [-key ]
  • show sslcertkey
Example
> add ssl certKey CertKey-SSL-1 -cert ns-root.cert -key ns-root.key
Done
> show sslcertkey CertKey-SSL-1
Name: CertKey-SSL-1 Status: Valid,
Days to expiration:4811 Version: 3
Serial Number: 00 Signature Algorithm: md5WithRSAEncryption Issuer: C=US,ST=California,L=San
Jose,O=Citrix ANG,OU=NS Internal,CN=de fault
Validity Not Before: Oct 6 06:52:07 2006 GMT Not After : Aug 17 21:26:47 2022 GMT
Subject: C=US,ST=California,L=San Jose,O=Citrix ANG,OU=NS Internal,CN=d efault Public Key Algorithm: rsaEncryption Public Key
size: 1024
Done

Binding Services to the SSL Vserver

  • bind lb vserver
  • show lb vserver
Example
> bind lb vserver vserver-SSL-1 SVC_HTTP1
Done
> show lb vserver vserver-SSL-1 vserver-SSL-1 (10.102.29.50:443) – SSL Type:
ADDRESS State: DOWN[Certkey not bound]
Last state change was at Tue Jun 16 06:33:08 2009 (+174 ms)
Time since last state change: 0 days, 00:31:53.70
Effective State: DOWN Client Idle
Timeout: 180 sec
Down state flush: ENABLED Disable Primary Vserver On Down :
DISABLED No. of Bound Services : 1 (Total) 0 (Active)
Configured Method: LEASTCONNECTION Mode: IP Persistence: NONE Vserver IP and
Port insertion: OFF Push: DISABLED Push VServer: Push Multi Clients: NO Push Label Rule:
1) SVC_HTTP1 (10.102.29.18: 80) – HTTP
State: DOWN Weight: 1
Done

Adding an SSL-Based Vserver

  • add lb vserver [ ]
  • show lb vserver
Example
> add lb vserver vserver-SSL-1 SSL 10.102.29.50 443
Done
> show lb vserver vserver-SSL-1
vserver-SSL-1 (10.102.29.50:443) – SSL Type: ADDRESS
State: DOWN[Certkey not bound] Last state change was at Tue Jun 16 06:33:08 2009 (+176 ms)
Time since last state change: 0 days, 00:03:44.120
Effective State: DOWN Client Idle Timeout: 180 sec
Down state flush: ENABLED
Disable Primary Vserver On Down : DISABLED
No. of Bound Services : 0 (Total) 0 (Active)
Configured Method: LEASTCONNECTION Mode: IP
Persistence: NONE
Vserver IP and Port insertion: OFF
Push: DISABLED Push VServer: Push Multi Clients: NO Push Label Rule: Done
Caution: To ensure secure connections, you must bind a valid SSL certificate to the SSL-based vserver before you enable it.

Securing Load Balanced Traffic by Using SSL

  • enable feature SSL
  • show ns feature
Example
> enable feature ssl
Done
> show ns feature
Feature Acronym Status
——- ——- ——
1) Web Logging WL ON
2) SurgeProtection SP OFF
3) Load Balancing LB ON . . .
9) SSL Offloading SSL ON
10) Global Server Load Balancing GSLB ON . .
Done >

Binding a Compression Policy to a Vserver

To bind a compression policy to a vserver by using the NetScaler command line

At the NetScaler command prompt, type the following commands to bind a compression policy to an LB vserver and verify the configuration:
  • bind lb vserver -policyName
  • show lb vserver
Example
                            > bind lb vserver lbvip -policyName ns_cmp_msapp
                            Done
                            > show lb vserver lbvip
                            lbvip (8.7.6.6:80) - HTTP       Type: ADDRESS
                            State: UP
                            Last state change was at Thu May 28 05:37:21 2009 (+685 ms)
                            Time since last state change: 19 days, 04:26:50.470
                            Effective State: UP
                            Client Idle Timeout: 180 sec
                            Down state flush: ENABLED
                            Disable Primary Vserver On Down : DISABLED
                            Port Rewrite : DISABLED
                            No. of Bound Services :  1 (Total)       1 (Active)
                            Configured Method: LEASTCONNECTION
                            Current Method: Round Robin, Reason: Bound service's state changed to UP
                            Mode: IP
                            Persistence: NONE
                            Vserver IP and Port insertion: OFF
                            Push: DISABLED  Push VServer:
                            Push Multi Clients: NO
                            Push Label Rule:

                            Bound Service Groups:
                            1)      Group Name: Service-Group-1

                            1) Service-Group-1 (10.102.29.252: 80) - HTTP State: UP Weight:                                              1

                            1)      Policy : ns_cmp_msapp Priority:0
                            Done

Configuring Services to Compress Data

  • set service -CMP YES
  • show service
Example
> show service SVC_HTTP1
SVC_HTTP1 (10.102.29.18:80) – HTTP
State: UP
Last state change was at Tue Jun 16 06:19:14 2009 (+737 ms)
Time since last state change: 0 days, 03:03:37.200
Server Name: 10.102.29.18
Server ID : 0   Monitor Threshold : 0
Max Conn: 0     Max Req: 0      Max Bandwidth: 0 kbits
Use Source IP: NO
Client Keepalive(CKA): NO
Access Down Service: NO
TCP Buffering(TCPB): NO
HTTP Compression(CMP): YES
Idle timeout: Client: 180 sec   Server: 360 sec
Client IP: DISABLED
Cacheable: NO
SC: OFF
SP: OFF
Down state flush: ENABLED
1)      Monitor Name: tcp-default
State: DOWN     Weight: 1
Probes: 1095    Failed [Total: 1095 Current: 1095]
Last response: Failure – TCP syn sent, reset received.
Response Time: N/A
Done

Enabling Compression

By default, compression is not enabled. You must enable the compression feature to allow compression of HTTP responses that are sent to the client.
  • enable ns feature CMP
  • show ns feature
Example
> enable ns feature CMP
Done
> show ns feature
Feature                        Acronym              Status
——-                        ——-              ——
1)     Web Logging                    WL                   ON
2)     Surge Protection               SP                   OFF
.
7)     Compression Control            CMP                  ON
8)     Priority Queuing               PQ                   OFF
.
Done

Configuring Backup Vservers

Most of them may not aware of this. Here is the steps...
  • set lb vserver [-backupVserver ]
  • show lb vserver
Example
> set lb vserver vserver-LB-1 -backupVserver vserver-LB-2
Done
> show lb vserver vserver-LB-1
vserver-LB-1 (10.102.29.60:80) – HTTP   Type: ADDRESS
State: DOWN
Last state change was at Wed Jun 17 08:56:34 2009 (+661 ms)
.
.
.
Backup: vserver-LB-2
.
.
.
Done

Configuring URL Redirection

You can configure URL redirection to provide notifications of vserver malfunctions, and you can configure backup vservers to take over if a primary vserver becomes unavailable.
  • set lb vserver -redirectURL
  • show lb vserver
Example
> set lb vserver vserver-LB-1 -redirectURL http://www.newdomain.com/mysite/maint                                             enance
Done
> show lb vserver vserver-LB-1
vserver-LB-1 (10.102.29.60:80) – HTTP   Type: ADDRESS
State: DOWN
Last state change was at Wed Jun 17 08:56:34 2009 (+666 ms)
.
.
.
Redirect URL: http://www.newdomain.com/mysite/maintenance
.
.
.
Done

How To Perform a SecurePlatform Firewall Health Check Part 2

Checking dmesg and the Messages File

The output of the dmesg command and the /var/log/messages file should be examined for tell-tale messages:

 ‘Neighbour table overflow’

If this message is seen it indicates that the default limit of the kernel ARP cache (1024) is set too low. This will only occur if there is a large subnet connected directly to the firewall or cluster. If the message is seen it is possible to increase the size of the table by editing the /etc/sysctl.conf file to include the lines:
     net.ipv4.neigh.default.gc_thresh1    =    1024
     net.ipv4.neigh.default.gc_thresh2    =    2048
     net.ipv4.neigh.default.gc_thresh3    =    4096

This will increase the ARP cache to 4096 after the firewall has been re-booted.

  ‘FW-1: State synchronization is in risk. Please examine your synchronization network to avoid further problems!’

If this message is seen it indicates that there is an issue with the state synchronization network which can impede network performance. Consult the „State Synchronization‟ section in the „Firewall Application Checks‟ for further information.

By default all services are state synchronized but some services do not need syncing and may cause excessive load on the sync network (e.g. DNS). Disable state sync for all short lived connections and/or services which don‟t require state full failover.

  ‘FW-1: SecureXL: Connection templates are not possible for the installed policy (network quota is active). Please refer to the documentation for further details.'

If this message is seen it indicates that there is a SmartDefense option active (in this case „network quota‟) that has disabled templating of connections in SecureXL. Disabling SecureXL templates restricts the performance of SecureXL and is therefore undesirable. In this case, disabling the „network quota‟ option would restore the ability to produce templates and increase the performance of the firewall.

 ‘Out of Memory: Killed process ()’

If this message is seen it means there is no more memory available in the user space. As a result, SecurePlatform starts to kill processes.
From time to time other messages of a similar nature may appear in dmesg, the /var/log/messages file and on the console. It is always a good idea to research the message in the Check Point Secure Knowledge if you are unsure of the meaning.

For further information see: sk33219: Critical error messages and logs



Processes

A lisof processes running on the firewall can be displayed with the following commands:
top
ps auxw


Use the ‘top’ comman to check if any process is hogging CPU or Memory and to see if there are any
Zombie processes.

Example output:

[Expert@Zulu]# top
09:46:44  up 24 days,  9:40,  1 user,  load average: 0.30, 0.19, 0.14
55 processes: 50 sleeping, 2 running, 3 zombie, 0 stopped
CPU states:  cpu
user
nice
system
irq
softirq
iowait
idle
total
15.0%
0.0%
1.0%
10.0%
24.0%
0.0%
150.0%
cpu00
7.0%
0.0%
0.0%
0.0%
1.0%
0.0%
92.0%
cpu01
8.0%
0.0%
1.0%
10.0%
23.0%
0.0%
58.0%
Mem:  4091376k av, 1390028k used, 2701348k free,       0k shrd,   90864k buff
786476k active,             140320k inactive
Swap: 4192944k av,       0k used, 4192944k free                  278224k cached

PID
1526
USER
root
PRI
25
NI
0
SIZE
97280
RSS
95M
SHARE
11396
STAT R
%CPU
15.8
%MEM
2.3
TIME
2590m
CPU
1
COMMAND
fw
1
root
15
0
512
512
452
S
0.0
0.0
0:17
0
init
2
root
RT
0
0
0
0
SW
0.0
0.0
0:00
0
migration
3
root
RT
0
0
0
0
SW
0.0
0.0
0:00
1
migration
4
root
15
0
0
0
0
SW
0.0
0.0
0:00
1
keventd
5
root
34
19
0
0
0
SWN
0.0
0.0
0:00
0
ksoftirqd
6
root
34
19
0
0
0
SWN
0.0
0.0
0:00
1
ksoftirqd
9
root
25
0
0
0
0
SW
0.0
0.0
0:00
1
bdflush
7
root
15
0
0
0
0
SW
0.0
0.0
0:10
0
kswapd
8
root
15
0
0
0
0
SW
0.0
0.0
0:12
0
kscand
10
root
15
0
0
0
0
SW
0.0
0.0
0:14
0
kupdated
17
root
25
0
0
0
0
SW
0.0
0.0
0:00
0
scsi_eh_0
22
root
15
0
0
0
0
SW
0.0
0.0
0:14
0
kjournald
90
root
25
0
0
0
0
SW
0.0
0.0
0:00
1
khubd

The above example output indicates there are 3 zombie processes but there are no resource hogginprocesses. The Zombie processes should be identified to see if there is any cause for action.
Use ‘ps auxw | more’ to examine the value ithe START column of the process INIT, check thSTART column of cpd, fwd and vpnd processes and other daemons to see if they have restarted since thlasboot. Identify any Zombie processes.

Example output:

[Expert@Zulu]# ps auxw | more
USER       PID %CPU %MEM   VSZ  RSS TTY      STAT START   TIME COMMAND
root         1  0.0  0.0  1524  512 ?        S    Jun13   0:17 init
root       731  0.0  0.0  1524  476 ?        S    Jun13   0:00 klogd -x -c 1
root      1174  0.0  0.0  3040 1348 ?        S    Jun13   0:00 /usr/sbin/sshd -4 root 1212          0.0   0.0  1572 620 ? S            Jun13        0:00 crond
root      1265  0.0  0.0  2724  904 ?        S    Jun13   0:00 /bin/sh
/opt/spwm/bin/cpwmd_wd
root      1269  0.0  0.1 34412 7348 ?        S    Jun13   0:18 cpwmd -D -app SPLATWebUI root          1389  0.0  0.1  7948 4608 ?        S    Jun13   0:00 /opt/CPshrd-R65/bin/cprid root          1402  0.0  0.0  9120 3908 ?        S    Jun13   2:30 /opt/CPshrd-R65/bin/cpwd root          1416  0.2  4.9 331348 204012 ?     S    Jun13  88:42 cpd
root      1526  7.3  2.3 422392 97280 ?      S    Jun13 2590:42 fwd
root
1578
0.0
1.6
220252
66864
?
S
Jun13
0:42
in.asessiond 0
root
1579
0.0
1.6
220220
66800
?
S
Jun13
0:43
in.aufpd 0
root
1580
0.1
1.7
240988
69844
?
S
Jun13
57:51
vpnd 0
root
1586
0.2
0.1
11508 6172 ?

S
Jun13
95:09
dtlsd 0
root
1680
0.0
2.0
273760 82716
?
S
Jun13
15:20
rtmd

No daemonithe pauxw output have restarted.

Any daemon processes that have restarted may not necessarily indicate a fault because somebody may have restarted it, for example by performing cpstop;cpstart. Normally the cause of a process restart can be determined by looking at the /var/log/messages file oby examining the daemon‟s error log fil(cpd.elgfwd.elg, vpnd.elg etc).

In the above example of ‘top’ output there were 3 Zombie processes. Zombie processes do noconsume resources but should not be present. Check the proceslist to identify the Zombie (Statz) processes and determine if action is required.

[Expert@Zulu]# ps auxw | more
USER       PID %CPU %MEM   VSZ  RSS TTY      STAT START   TIME COMMAND
root
18374
0.5
0.0
4680
1932 ttyp0
S
09:46
0:00 cpinfo -n -z -o BCCF-CWH-EXT.cpinfo
root
18399
0.0
0.0
0
0 ttyp0
Z
09:46
0:00 [cpprod_util ]
root
18403
0.2
0.0
0
0 ttyp0
Z
09:46
0:00 [cpprod_util ]
root
18413
0.4
0.0
0
0 ttyp0
Z
09:46
0:00 [cpprod_util ]
The process „cpprod_util was called by a process used by CPinfo to gather Ethernet stats. The Zombie‟ process is also marked defunct‟ which means the same as „Zombie‟. A defunct or Zombie process is a process that has finished but still depends on parent which is still alive. After the completion and termination of the parent process these Zombie processes should terminate and no longer be shown ithe process list. If the Zombie processes are still there aftecompletion of the CPinfo, killing the parent process will be required to removthem from the proceslist.

Sometimes Zombie processes are the result of an error ithe daemon coding. For example if a
Zombie vpnd procesis seen there is a hotfifor it, refer to:
sk33941: "Zombie" vpnd process
Capacity Optimization

The maximum number of concurrent connectionthat a firewall can handle is configured ithe CapacitOptimization section of the firewall or cluster object. It is recommended undenormal circumstances to use the automatic hash table size and memory pool configuration when increasing or decreasing the number of maximum concurrent connections (default 25,000).

To check what value the maximum number of concurrent connectionhas been set to eithecheck thsettinithe GUI firewall/cluster object or run the following command on the firewall:
fw tab –t connections | grep limit

Example output:

[Expert@Zulu] #fw tab –t connections | grep limit
dynamic, id 8158, attributes: keep, sync, aggressive aging, expires 25, refresh, limit 100000, hashsize 534288, kbuf 17 18 19 20 21 22 23 24 25
26 27 28 29 30 31, free function c0b98510 0, post sync handler c0b9a370

The numbe(100000) directly after ‘limit’ is the maximum value as set in the Capacity Optimization‟
page on the firewall or cluster object (GUI).

To check the number of concurrent connections (#VALSand the peak value (#PEAK) use the following commanon the firewall:
fw tab –t connections –s

Example output:

[Expert@Zulu]# fw tab –t connections -s
HOST              NAME                           ID #VALS #PEAK #SLINKS
localhost         connections                  8158 23055 77921  29141
[Expert@Zulu]#

The values that we are interested iare the limit‟ and peak values. Ensure that there is about 15-20% headroom before Aggressive Ageing is activated to ensure theris adequate spare capacity in the connections table to cope with an increase in connections. If necessary, change the value ithe capacity optimization section on the firewall object and push the policy to make ieffective. Greatly over-prescribing the maximum concurrent connections is not recommended as it can leato inefficient use of memory.

In the above example, a maximum of 100,000 concurrent connectionhas been set ithe
Capacity Optimization section for the firewall and the peak number of connections (#PEAK) was
77,921 over the last 124 day(uptime).

The headroom above the #PEAis set too low because the Aggressive Ageing default threshold of 80% will be activated at 80,000. Increase the concurrent connectionlimit to around 120,000 connections to give between 15-20% head-room before Aggressive Ageing becomes active.

If NAT is performed on the module check the fwx_cache table using the command:
fw tab –t fwx_cache -s

Example output:

[Expert@Zulu]# fw tab –t fwx_cache -s
HOST                  NAME                         ID #VALS #PEAK #SLINKS
localhost             fwx_cache                  8116 10000 10000       0
[Expert@Zulu]#

In the above example, the value of #PEAK is equal to 10,000 iindicates that the NAT cache table (default 10,000) was full at some time. (#VALS equal to 10,000 indicates that the NAT cache tablis still full.)

For improved NAT cache performance the size of the NAT cache should be increased or the time entries are held in the table decreased. For further information see:

sk21834: How to modify the values of the propertierelated to the NAT cache table


ClusterXL and State Synchronization

The health of ClusterXL can be examined using a number of different commands:

cphaprob –a if cphaprob state cphaprob list
cpstat ha –f all | more
fw ctl pstat

Use the ‘cphaprob –a if’ command on the cluster members to check which interfaces have beeconfigured for state synchronization and verify the sync mode is consistent on the cluster members:

Example output:

[Expert@Zulu]# cphaprob –a if eth1c0  non sync(non secured) eth2c0  non sync(non secured) eth3c0     non sync(non secured) eth4c0      sync(secured), multicast
Virtual cluster interfaces: 3 eth1c0                192.168.1.1
eth2c0          192.168.2.1 eth3c0                10.1.1.1 [Expert@Zulu]#


[Expert@Shaka]# cphaprob –a if eth1c0  non sync(non secured) eth2c0  non sync(non secured) eth3c0    non sync(non secured) eth4c0      sync(secured), broadcast
Virtual cluster interfaces: 3 eth1c0                192.168.1.1
eth2c0          192.168.2.1
eth3c0          10.1.1.1 [Expert@Shaka]#

In the above example, interfaceth4c0 has been configured on both cluster members for statsync but the sync mode is inconsistentone is using multicast and the other broadcast modeEnsure the cluster members use the same mode. (The default mode is multicast.)

The following document explains how to change betweebroadcast and multicast mode:
sk20576: How to set ClusterXL Control Protocol (CCP) in broadcast mode in ClusterXL

Use the  ‘cphaprob state’ command to check if state sync is up and running. The local and remote statsynchronization IP addresses should be displayed and theistate should be  shown as  ‘Active’ on the HA Master an Standby’ on the HA Backup. In a load-sharing cluster the state should be shown as
‘Active’ on both the local and remote firewalls:

Example output - HA:

[Expert@Zulu]# cphaprob state
Cluster Mode:   New High Availability (Active Up)

Number
Unique Address
Assigned
Load
State

1 (local)

1.1.1.1

100%


Active
2
1.1.1.2
0%

Standby
[Expert@Zulu]#

In a HA cluster configuration (above), one member should be Active and the other Standby.


Example output  Load-Sharing:

[Expert@Dingaan]# cphaprob state
Cluster Mode:   New High Availability (Active Up)

Number
Unique Address
Assigned
Load
State

1 (local)

1.1.1.3

50%


Active
2
1.1.1.4
50%

Active
[Expert@Dingaan]#

In a load-sharing cluster configuration (above), botmembers should be shown as Active.

Example output  HA or Load-Sharing:

[Expert@Zulu]# cphaprob state
Cluster Mode:   New High Availability (Active Up)

Number     Unique Address  Assigned Load   State

1 (local)  1.1.1.1         100%            Active
[Expert@Zulu]#

Remote cluster partner is missing!

If the remote partner is not shown it will be usually be due to one of the following:

·      There is no network connectivity between the members of the cluster on the state sync network
·      The partnedoenot have state synchronization enabled
·      One partneis using broadcast mode and the otheis using multicast mode
·      One of the monitored processes has an issuesuch as no policy loaded
·      The partnefirewall is down.

Example output - HA or Load-Sharing:

[Expert@Zulu]# cphaprob state
Cluster Mode:   New High Availability (Active Up)

Number
Unique Address
Assigned
Load
State

1 (local)

1.1.1.1

100%


Active
2
1.1.1.2
0%

Ready
[Expert@Zulu]#

Partner is ithReady state. If one of the partners is ithe ‘Ready’ state it indicates that there is an issue with state synchronization.

The ‘Ready’ state is normally caused by anothemember of the cluster running a higher version of codor HFA, for example, as would happen during an upgrade. Thistate is also seen when CoreXhas been configured to use a different number of cores on the individual cluster members. For further information see:
sk42096: Cluster member with CoreXL is i'Ready' state

The ‘Ready’ state can also occur if a cluster member receives state synchronization traffic from a different cluster that is using the same mac magic number and the other cluster is running a higher versioof code. For further information see:
sk36913: Connecting several clusteron the same network

Example output - HA or Load-Sharing:

[Expert@Zulu]# cphaprob state
Cluster Mode:   New High Availability (Active Up)

Number
Unique Address
Assigned
Load
State

1 (local)

1.1.1.1

100%


Active
2
1.1.1.2
0%

Down
[Expert@Zulu]#

A remote cluster member is in the ‘Down’ state indicates that theris either a problem on thremote member or the state synchronization network between the cluster members is broken.

To investigate why a member showitself to be locally ‘Down’ use the cpstat ha –f all | more’ commanon the firewall that shows ‘Down’. Thicommand displaythe „Problem Notification Table‟ and the state of health of the monitored processes:

Example output (truncated):

[Expert@Zulu]# cpstat ha –f all | more
Problem Notification table
-------------------------------------------------
|Name           |Status |Priority|Verified|Descr|
-------------------------------------------------
|Synchronization|OK     |       0|    3383|     |
|Filter
|OK
|
0|
3383|
|
|cphad
|OK
|
0|
0|
|
|fwd
|OK
|
0|
0|
|
-------------------------------------------------
All monitored processes have th ‘OK’ status.

Example output (truncated):

[Expert@Shaka]# cpstat ha –f all | more
Problem Notification table
-------------------------------------------------
|Name           |Status |Priority|Verified|Descr|
-------------------------------------------------
|Synchronization|problem|       0|    3383|     |
|Filter         |problem|       0|    3383|     |
|cphad          |OK     |       0|       0|     |
|fwd            |OK     |       0|       0|     |
-------------------------------------------------

State synchronization is in a problem state because the policy is unloaded on this cluster member. Installing the policy will fix this issue.

Alternatively, the cphaprob list’ command displays the same information plus some additional details:

Example output:

[Expert@Zulu]# cphaprob list
Registered Devices:

Device Name: Synchronization
Registration number: 0
Timeout: none
Current state: OK
Time since last report: 12139.6 sec

Device Name: Filter
Registration number: 1
Timeout: none
Current state: OK
Time since last report: 12124.5 sec

Device Name: cphad
Registration number: 2
Timeout: 5 sec
Current state: OK
Time since last report: 0.6 sec

Device Name: fwd
Registration number: 3
Timeout: 5 sec
Current state: OK
Time since last report: 0.6 sec

All monitored processes are shown as  ‘OK’.

Assuming that state synchronization on the cluster is healthy, use the following command to check if the stattables are synchronized:

fw tab –t connections –s

Simultaneously execute the command on both cluster members; compare the values of #VALS. The values on both firewalls should be similar if the state synchronization mechanism is working unless a lot of delayed notification is iuse.

Example output:
[Expert@Zulu]# fw tab –t connections -s
HOST              NAME                           ID #VALS #PEAK #SLINKS
localhost         connections                  8158  3222 38026    9820 [Expert@Zulu]#

[Expert@Shaka]# fw tab –t connections -s
HOST              NAME                           ID #VALS #PEAK #SLINKS
localhost         connections                  8158  3187 38026    9808 [Expert@Shaka]#



The #PEAK may be different depending on the uptime and when the last peak number oconnections occurred.

The #VALS on a HA pair should always be similar.
  
Examine the output of the synsection of ‘fw ctl pstat.

Example output:

Sync: Version: new
Status: Able to Send/Receive sync packets
Sync packets sent:
total : 13880231,  retransmitted : 5, retrans reqs : 524,  acks : 70
Sync packets received:
total : 692409645,  were queued : 720, dropped by net : 517
retrans reqs : 5, received 43019 acks retrans reqs for illegal seq : 0
dropped updates as a result of sync overload: 0
Callback statistics: handled 42940 cb, average delay : 1,   max delay : 4

If the dropped by net counter has incremented then some sync packets have been losand the
problem needs to be investigateto find the cause.

For further information please refer to:
sk34476: Explanatioof Sync section in the output of fw ctl pstat command

SecureXL

For optimum gateway performance SecureXL needs to be enabled, the SmartDefense and Web-Intelligence or IPS options that are enforced do not interfere with SecureXL and the extent that templating is performed
is maximized by careful rulebase ordering.

For further information, refer to:
sk42401: Factors that adversely affect performance in SecureXL

The following command can be used to determine that SecureXL is turned on and the creation of templates has not been disabled:

fwaccel stat
Example output showing SecureXL turned on and templating is enabled:-
 [Expert@Zulu]# fwaccel stat Accelerator Status : on Accept Templates : on
Accelerator Features : Accounting, NAT, Cryptography, Routing,
HasClock, Templates, VirtualDefrag, GenerateIcmp,
IdleDetection, Sequencing, TcpStateDetect, AutoExpire, DelayedNotif, McastRouting, WireMode
Cryptography Features : Tunnel, UDPEncapsulation, MD5, SHA1, NULL,
3DES, DES, AES-128, AES-256, ESP, LinkSelection,
DynamicVPN, NatTraversal, EncRouting
[Expert@Zulu]#

 If SecureXL is disabled it can be turned on from ‘cpconfig.
 Note: SecureXL is incompatible with FloodGate and will be disabled if FloodGate is active. 
The following command can be used to examine the SecureXL statistics to get an understanding on how well SecureXL is configured and performing:
fwaccel stats

Examine the output of ‘fwaccel stats:

·      Check that templates are being created  this number rises and falls as templates are created and expire.

·      Examine the ratio of F2F packets to packets being accelerated for best performance the firewalshoulbe accelerating the majority of the packets; the amount of packets being forwarded to thfirewal(F2F) should be minimal.
  
Example output showing the SecureXL statistics:-
  




 Templates are being formed and only a small amount of F2F packets to accel packets.

 Aggressive Ageing

Aggressive Aging helps manage the connections table capacity and memory consumption of the firewall to increase durability and stability; allowing the gatewamachine to handle largamounts of unexpected trafficespecially during a Denial of Service attack.

Aggressive Aging uses short timeouts called aggressive timeouts. When a connection is idlfor more thaits aggressive timeout iis marked as "eligible for deletion". When the connections table omemorconsumption reaches a certain user defined threshold (highwatemark), Aggressive Aging begins to delete eligiblfor deletion” connections, until memory consumption or connections capacity decreases back to the desired level.

The user defined thresholds are set ithe GUI for the specific protection enforced by the firewall
(SmartDefense > Network Security > Denial of Service > Aggressive Ageing). 

To check the state of Aggressive Ageing on the firewall use the fw ctl pstat command:

Example output:

[Expert@Zulu]# fw ctl pstat | grep Aggressive
Aggressive Ageing is not active
[Expert@Zulu]#

The above output indicates that Aggressive Ageing has been set iSmartDefense to „Protect‟ but the
thresholds have not been reached to make iaggressively close connections that are eligible for deletion.


If Aggressive Aging habeen set in SmartDefense to Inactive the output wilsay that
Aggressive Ageing is disabled:

[Expert@Zulu]# fw ctl pstat | grep Aggressive
Aggressive Ageing is disabled
[Expert@Zulu]#

If Aggressive Aging is iDetect mode the output will say it is monitor only:

[Expert@Zulu]# fw ctl pstat | grep Aggressive
Aggressive Ageing is in monitor only
[Expert@Zulu]#


There were some issues with the Aggressive Ageing mechanism which arfixed in R65 HFA_50:

Improved SecureXL notifications to the firewall resolve a connectivity issue that occurs when the Sequence
Verifier is enabled together with the Aggressive Aging mechanism.

Implementation: An immediate workaround is to disable eithethe Sequence Verifier or the Aggressive
Aging mechanism.

HFA Patching

Use the fwm ver‟ and fver k commands to inspect the patching on the management station and the
firewall modules.

Check that the HFA patching on the module is the same version (HFA_50) or lower that the patching on the Provider-management station. The firewall module must never be patched with a higher version than thmanagemenstation.

Ensure patching on cluster members is identical.

Example output: Provider-Management:-
[Expert@Manager]# fwm verThis is Check Point SmartCenter Server NGX (R65) HFA_50, Hotfix 650 - Build 011
Installed Plug-ins:  Connectra NGX R62CM [Expert@Manager]#

Cluster:-

[Expert@Zulu]# fw ver –k
This is Check Point VPN-1(TM) & FireWall-1(R) NGX (R65) HFA_40, Hotfix
640 - Build 091
kernel: NGX (R65) HFA_40, Hotfix 640 - Build 091
[Expert@Zulu]#

[Expert@Shaka]# fw ver –k
This is Check Point VPN-1(TM) & FireWall-1(R) NGX (R65) HFA_40, Hotfix
640 - Build 091
kernel: NGX (R65) HFA_40, Hotfix 640 - Build 091
[Expert@Shaka]#

Versions on the clustered firewalls (HFA_40) are identical and the versions are not above the
Provider-1 version (HFA_50)


Although the patching is good ithe above example it is out of date. Check Point always recommends applying the latest HFA and Security Hotfixes on the SmartCenter and firewall modules.

The latest HFAs and Security Hotfix release notes are available on the Check Point website:

http://www.checkpoint.com/downloads/latest/hfa/index.html


CPinfo Package:

For troubleshooting purposes ChecPoint TAC will require a CPinfo taken from the firewall anSmartCenter Server or CMA. Ensure the CPinfo package is higher than 911000023 so the full set of diagnostics from the appliance can be gathered successfully.

CPinfo version 911000023 often hangs during gathering the firewall‟s connection tables and produces a
truncated output so ishould be replaced with the latesversion.

 The version installed on the appliance can be determined by running the following command:
cpvinfo /opt/CPinfo-10/bin/cpinfo |grep Build

Example output:

[Expert@Zulu]# cpvinfo /opt/CPinfo-10/bin/cpinfo |grep Build
Build number = 911000023
[Expert@Zulu]#

The above version is problematic and should be upgraded.

The most up to date version of CPinfo can be downloaded using the following link:
sk30567: The CPinfo utility

Search This Blog

Blog Archive

Total Pageviews