Firewall kernel table limit approaching for Check Point

Vendor

Check Point

Description

Check Point firewalls have multiple kernel tables used for on-going traffic processing. If any of them is nearing its limit, an alert will be issued.

Remediation Steps

Review the specific tables, determine what they are used for and why they are approaching capacity. It is possible that certain configuration changes should be made to increase the capacity of a table in order to allow it to handle larger loads.

How does this work?

Retreive the current usage and limit from the kernel tables using the Check Point built-ind "fw tab" command.

Why is this important?

Retreive the current usage and limit from the kernel tables using the Check Point built-ind "fw tab" command.

Without Indeni how would you find this?

An administrator could login and manually run the command.


View Source Code