<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to find reason for RX_DRP in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274537#M104582</link>
    <description>&lt;P&gt;Is this interface part of a bond and what hashing is used on either side?&lt;/P&gt;</description>
    <pubDate>Tue, 31 Mar 2026 12:37:58 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2026-03-31T12:37:58Z</dc:date>
    <item>
      <title>Unable to find reason for RX_DRP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274430#M104545</link>
      <description>&lt;P&gt;Hello guys,&lt;/P&gt;&lt;P&gt;Our firewall is a CP6600 with 6-core. Recently we are observing high RX_DRP counts on one 10G interface when traffic across interface starts reaching 5-6G. No RX_DROP on other interfaces.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="solarwinds_drop.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33886iA421785C5A40D290/image-size/medium?v=v2&amp;amp;px=400" role="button" title="solarwinds_drop.png" alt="solarwinds_drop.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; check&lt;/P&gt;&lt;P&gt;What we have observe:&lt;/P&gt;&lt;P&gt;1. From cpview -t, CPU load can reach 80+% at peak traffic (packet count of ~800K), where we see fastest RX_DRP count. We also observe RX_DRP count increments when CPU is working at 40-60% load but at a lower rate.&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. RX_OVR is 0, which I believe indicates that we are not lacking ring-size buffer on the interface. It is set to max buffer 4096 anyways.&lt;/P&gt;&lt;P&gt;3. Error is 0 under ethtool -S.&lt;/P&gt;&lt;P&gt;&amp;gt; ethtool -S eth1-01 | grep -i error&lt;BR /&gt;rx_errors: 0&lt;BR /&gt;tx_errors: 0&lt;BR /&gt;rx_length_errors: 0&lt;BR /&gt;rx_crc_errors: 0&lt;BR /&gt;veb.tx_errors: 0&lt;BR /&gt;port.tx_errors: 0&lt;BR /&gt;port.rx_crc_errors: 0&lt;BR /&gt;port.rx_length_errors: 0&lt;/P&gt;&lt;P&gt;&amp;lt;snip&amp;gt;&lt;/P&gt;&lt;P&gt;3. We suspected that it could be due to software buffer but 2nd column of softnet_stat is 0.&lt;/P&gt;&lt;P&gt;&amp;gt; cat /proc/net/softnet_stat&lt;BR /&gt;788b4e9b 00000000 00000460 00000000 00000000 00000000 00000000 00000000 00000000 00000000&lt;BR /&gt;d5685693 00000000 000007d9 00000000 00000000 00000000 00000000 00000000 00000000 00000000&lt;BR /&gt;0267b0ff 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000&lt;BR /&gt;02661ccc 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000&lt;BR /&gt;026d8472 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000&lt;BR /&gt;02583552 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone suggest other possible causea for this issue and how to check? So far Checkpoint support hasn't been able to pin down the issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2026 08:49:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274430#M104545</guid>
      <dc:creator>kkiat98</dc:creator>
      <dc:date>2026-03-30T08:49:30Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to find reason for RX_DRP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274433#M104547</link>
      <description>&lt;P&gt;Have you seen this article?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk166424" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk166424&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;It may be that such drops are normal 'background noise'.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2026 10:21:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274433#M104547</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2026-03-30T10:21:06Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to find reason for RX_DRP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274447#M104550</link>
      <description>&lt;P&gt;Please post the full output of &lt;STRONG&gt;ethtool -S&lt;/STRONG&gt; for the interface in question; be on the lookout for nonzero counters containing "fifo" or "missed" which are legitimate ring buffer misses resulting in dropped frames.&amp;nbsp; But it is likely "junk" traffic that is incrementing the RX-DRP counter, such as invalid EtherTypes or improperly pruned VLAN tags.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2026 12:21:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274447#M104550</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2026-03-30T12:21:19Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to find reason for RX_DRP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274522#M104577</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt; and &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/71054"&gt;@emmap&lt;/a&gt;&amp;nbsp;, I cannot find "fifo" or "missed" in my output.&lt;/P&gt;&lt;P&gt;Refering to the article shared, I did a 30s pcap at peak traffic to check on the possible causes suggested for drops.&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The softnet backlog is full &amp;gt;&amp;gt; &lt;SPAN&gt;cat /proc/net/softnet_stat 2nd column is 0&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;Ethernet frames are received with bad VLAN tags &amp;gt;&amp;gt; It is an access port&lt;/LI&gt;&lt;LI&gt;Packets are received with unknown or unregistered protocols &amp;gt;&amp;gt; EtherType seen in pcap is 0x8100 only&lt;/LI&gt;&lt;LI&gt;IPv6 packets are received while IPv6 is disabled in Gaia &amp;gt;&amp;gt; Only IPv4 seen in PCAP, plus, our application does not use IPv6&lt;/LI&gt;&lt;LI&gt;MTU size mismatch, CRC errors, speed or duplex mismatch &amp;gt;&amp;gt; No errors seen in ethtool&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Tue, 31 Mar 2026 06:05:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274522#M104577</guid>
      <dc:creator>kkiat98</dc:creator>
      <dc:date>2026-03-31T06:05:01Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to find reason for RX_DRP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274537#M104582</link>
      <description>&lt;P&gt;Is this interface part of a bond and what hashing is used on either side?&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2026 12:37:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274537#M104582</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2026-03-31T12:37:58Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to find reason for RX_DRP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274545#M104583</link>
      <description>&lt;P&gt;What tool did you use for the pcap?&amp;nbsp; &lt;STRONG&gt;fw monitor&lt;/STRONG&gt; will not show you packets that are RX-DRPed.&amp;nbsp; tcpdump will show you those due to promiscuous mode, but I'm not sure about cppcap.&lt;/P&gt;
&lt;P&gt;Please characterize how the RX-DRP counter is being incremented.&amp;nbsp; &lt;STRONG&gt;sar -n EDEV&lt;/STRONG&gt; can help with this for the last 30 days.&amp;nbsp; Are they steadily going up over time?&amp;nbsp; If so, the traffic is probably garbage.&amp;nbsp; If the counter is going up constantly, does it stop for as long as you are running a tcpdump on that interface (the filter does not matter, but specify a good one anyway to keep from bogging down the firewall), and then start incrementing again after stopping the tcpdump?&lt;/P&gt;
&lt;P&gt;If the counter is occasionally going up in big clumps (&lt;STRONG&gt;sar -n EDEV&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;can help), those may be legitimate ring buffer misses.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2026 16:03:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274545#M104583</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2026-03-31T16:03:55Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to find reason for RX_DRP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274671#M104626</link>
      <description>&lt;P&gt;Nope. It is a physical interface. One of checkpoint's suggestion is to bond it and see if that helps with the drops. We might give that a try.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 16:28:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274671#M104626</guid>
      <dc:creator>kkiat98</dc:creator>
      <dc:date>2026-04-01T16:28:02Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to find reason for RX_DRP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274672#M104627</link>
      <description>&lt;P&gt;I am using an external tool to take the pcap for traffic to/from that interface.&lt;/P&gt;&lt;P&gt;Regarding your other question, this is the sar output I got the other day. It corresponds to the daily traffic pattern. So could it a bug that I am not seeing RX-OVR despite it being a ring buffer miss? From my understanding, for ring buffer drops we usually see high RX-OVR counts.&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@tkdextf1:0]# sar -n EDEV | grep eth1-01&lt;BR /&gt;00:10:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;00:20:02 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;00:30:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;00:40:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;00:50:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;01:00:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;01:10:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;01:20:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;01:30:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;01:40:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;01:50:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;02:00:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;02:10:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;02:20:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;02:30:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;02:40:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;02:50:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;03:00:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;03:10:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;03:20:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;03:30:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;03:40:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;03:50:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;04:00:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;04:10:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;04:20:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;04:30:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;04:40:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;04:50:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;05:00:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;05:10:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;05:20:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;05:30:02 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;05:40:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;05:50:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;06:00:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;06:10:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;06:20:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;06:30:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;06:40:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;06:50:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;07:00:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;07:10:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;07:20:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;07:30:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;07:40:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;07:50:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;08:00:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;08:10:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;08:20:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;08:30:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;08:40:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;08:50:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;09:00:01 eth1-01 0.00 0.00 0.00 1.44 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;09:10:01 eth1-01 0.00 0.00 0.00 14.42 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;09:20:02 eth1-01 0.00 0.00 0.00 10.71 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;09:30:01 eth1-01 0.00 0.00 0.00 11.42 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;09:40:01 eth1-01 0.00 0.00 0.00 10.73 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;09:50:01 eth1-01 0.00 0.00 0.00 9.88 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;10:00:01 eth1-01 0.00 0.00 0.00 6.45 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;10:10:01 eth1-01 0.00 0.00 0.00 7.28 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;10:20:01 eth1-01 0.00 0.00 0.00 6.33 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;10:30:01 eth1-01 0.00 0.00 0.00 9.49 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;10:40:01 eth1-01 0.00 0.00 0.00 20.69 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;10:50:02 eth1-01 0.00 0.00 0.00 8.62 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;11:00:01 eth1-01 0.00 0.00 0.00 5.34 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;11:10:01 eth1-01 0.00 0.00 0.00 1.38 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;11:20:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;11:30:01 eth1-01 0.00 0.00 0.00 0.10 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;11:40:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;11:50:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;12:00:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;12:10:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;12:20:01 eth1-01 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;12:30:01 eth1-01 0.00 0.00 0.00 0.05 0.00 0.00 0.00 0.00 0.00&lt;BR /&gt;Average: eth1-01 0.00 0.00 0.00 1.66 0.00 0.00 0.00 0.00 0.00&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 16:44:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274672#M104627</guid>
      <dc:creator>kkiat98</dc:creator>
      <dc:date>2026-04-01T16:44:55Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to find reason for RX_DRP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274742#M104674</link>
      <description>&lt;P&gt;Hi, it is an external tool that was used for the pcap.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding the drop patterns, it corresponds to the daily traffic pattern we have. Attached today's sar output for reference.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Aren't ring buffer misses accompanied by increments in RX-OVR? Is that not always the case? One of the solutions from Checkpoint is to try bonding up two interfaces. We will schedule a change for that.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2026 09:54:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274742#M104674</guid>
      <dc:creator>kkiat98</dc:creator>
      <dc:date>2026-04-02T09:54:11Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to find reason for RX_DRP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274766#M104682</link>
      <description>&lt;P&gt;Based on that RX-DRP pattern in the &lt;STRONG&gt;sar&lt;/STRONG&gt; output, it does indeed appear to be load-based RX-DRPs and not just constant garbage traffic.&lt;/P&gt;
&lt;P&gt;Whether RX-OVR and RX-DRP increment in "lockstep" depends on the driver and NIC hardware.&amp;nbsp; When the NIC attempts to DMA a frame from its hardware buffer into the Gaia ring buffer in RAM, for some NICs&amp;nbsp;if the ring buffer is full, the frame is simply lost as what I call a "buffering miss," and only RX-DRP is incremented.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However when more advanced NICs encounter this situation, they pull the frame back without losing it and try again later.&amp;nbsp; But if the ring buffer is constantly full, eventually frames start piling up in the hardware buffer on the NIC itself.&amp;nbsp; If it eventually overflows at the NIC hardware level, both RX-OVR and RX-DRP are incremented in lockstep to indicate that the overflow was indirectly caused by a full ring buffer, not by the NIC itself being unable to keep up with the incoming frame rate which is the classic cause of an RX-OVR.&lt;/P&gt;
&lt;P&gt;A bond may help by adding another interface and ring buffer, but Dynamic Split should take care of this unless you are bumping against queue limitations for some NIC driver hardware, or there is not enough overall spare computing capacity to add more SND cores.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have Dynamic Split enabled?&amp;nbsp; (&lt;STRONG&gt;show dynamic-balancing state&lt;/STRONG&gt; or the expert mode command &lt;STRONG&gt;dynamic_balancing -p&lt;/STRONG&gt;).&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Next step is to ensure Multi-Queue has not been messed with for that interface, post output of&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;mq_mng –o –v&lt;/STRONG&gt;.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another thing to check is how well Multi-Queue is balancing the traffic across the SNDs by paying a visit to the Advanced...SecureXL...Network-per-CPU screen in &lt;STRONG&gt;cpview&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Any chance you have a lot of incoming VPN traffic on this interface?&amp;nbsp; There is a known problem with some NIC drivers that causes severe SND imbalances that is solved by UPPAK:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk183525" target="_self"&gt;sk183525: High CPU usage on one SND core&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2026 16:26:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/274766#M104682</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2026-04-02T16:26:31Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to find reason for RX_DRP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/275241#M104846</link>
      <description>&lt;P&gt;No, we do not have VPN across this interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; dynamic-balancing is not enabled. But we don't have the luxury to allocate more cores for SND to avoid further unexpected impacts. Hence, I have skipped that suggestion from Checkpoint. And since the interface eth1-01 is already using all the available queues and cpview network-per-cpu seems to be quite balanced, I think it's just that our firewall is too weak for our current use case.&lt;/P&gt;&lt;P&gt;Thank you all for your assistance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Apr 2026 06:48:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-find-reason-for-RX-DRP/m-p/275241#M104846</guid>
      <dc:creator>kkiat98</dc:creator>
      <dc:date>2026-04-10T06:48:16Z</dc:date>
    </item>
  </channel>
</rss>

