<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issues with 19200 Appliance migration: ICMP over VPN (UPPAK) and Driver Incompatibility (KPPAK) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-19200-Appliance-migration-ICMP-over-VPN-UPPAK-and/m-p/276780#M105317</link>
    <description>&lt;P&gt;We were monitoring that node via Skyline and it was iding at 30% CPU usage with about 300Mbps traffic via VPN&lt;/P&gt;</description>
    <pubDate>Mon, 11 May 2026 12:47:38 GMT</pubDate>
    <dc:creator>Jakub_K</dc:creator>
    <dc:date>2026-05-11T12:47:38Z</dc:date>
    <item>
      <title>Issues with 19200 Appliance migration: ICMP over VPN (UPPAK) and Driver Incompatibility (KPPAK)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-19200-Appliance-migration-ICMP-over-VPN-UPPAK-and/m-p/276694#M105287</link>
      <description>&lt;P&gt;Hello Community,&lt;/P&gt;&lt;P&gt;We are currently in the middle of a hardware refresh, moving from an older cluster (16200) to a new 19200 appliance setup. However, we’ve hit a significant roadblock that has rendered the new appliance unusable in production. I’m curious if anyone else has encountered this specific issue between UPPAK and KPPAK modes on the 19000 series.&lt;/P&gt;&lt;P&gt;The Migration Path:&lt;/P&gt;&lt;P&gt;We followed the standard cluster replacement procedure (similar to &lt;A class="" href="https://community.checkpoint.com/t5/Firewall-and-Security-Management/Replace-Upgrade-Cluster/m-p/69251#M5294" target="_blank" rel="noopener"&gt;this guide&lt;/A&gt;). After swapping the first node, we immediately ran into two issues:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;ICMP over VPN Failure: With the default UPPAK mode, ICMP traffic through the VPN stopped working entirely. This mirrors the issue discussed in &lt;A class="" href="https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-ICMP-traffic-trough-VPN-after-migration/td-p/239123" target="_blank" rel="noopener"&gt;this thread&lt;/A&gt;.&lt;/LI&gt;&lt;LI&gt;High Idle CPU: The appliance was idling at roughly 20% CPU with almost no load.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;The KPPAK Attempt:&lt;/P&gt;&lt;P&gt;Because we had experienced stability issues with UPPAK on our previous hardware, we decided to switch the new 19200 to KPPAK mode.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The Good: Switching to KPPAK immediately fixed the ICMP VPN issue and the CPU stabilized. We moved the node into production for testing.&lt;/LI&gt;&lt;LI&gt;The Bad: The next morning, as user load increased, performance tanked. It turns out our 10/25/40/100G QSFP28 (Intel) NICs use the ICE driver, which is known to have major performance limitations when running in KPPAK on these appliances (as per sk183525).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Current Status:&lt;/P&gt;&lt;P&gt;We are essentially stuck&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;In UPPAK: VPN traffic (ICMP) is broken.&lt;/LI&gt;&lt;LI&gt;In KPPAK: The ICE drivers cause severe performance issues&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;We have two open TAC cases, and they are currently looking into debugs for the UPPAK ICMP issue, but we are effectively unable to use the new hardware.&lt;/P&gt;&lt;P&gt;Has anyone successfully resolved the ICMP/UPPAK issue on the 19000 series? Or, has anyone found a workaround for the ICE driver performance bottleneck in KPPAK mode?&lt;/P&gt;&lt;P&gt;Any insights or similar experiences would be greatly appreciated!&lt;/P&gt;&lt;P&gt;Best regards,&lt;BR /&gt;Kuba&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2026 09:54:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-19200-Appliance-migration-ICMP-over-VPN-UPPAK-and/m-p/276694#M105287</guid>
      <dc:creator>Jakub_K</dc:creator>
      <dc:date>2026-05-08T09:54:18Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with 19200 Appliance migration: ICMP over VPN (UPPAK) and Driver Incompatibility (KPPAK)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-19200-Appliance-migration-ICMP-over-VPN-UPPAK-and/m-p/276722#M105297</link>
      <description>&lt;P&gt;What release/JHF are you on?&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2026 20:37:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-19200-Appliance-migration-ICMP-over-VPN-UPPAK-and/m-p/276722#M105297</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-05-08T20:37:22Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with 19200 Appliance migration: ICMP over VPN (UPPAK) and Driver Incompatibility (KPPAK)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-19200-Appliance-migration-ICMP-over-VPN-UPPAK-and/m-p/276729#M105300</link>
      <description>&lt;P&gt;Are you sure you really had high cpu on uppak mode or you might get confused because of&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk180299?" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk180299?&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;You really only can see the load via cpview&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2026 20:52:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-19200-Appliance-migration-ICMP-over-VPN-UPPAK-and/m-p/276729#M105300</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2026-05-08T20:52:22Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with 19200 Appliance migration: ICMP over VPN (UPPAK) and Driver Incompatibility (KPPAK)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-19200-Appliance-migration-ICMP-over-VPN-UPPAK-and/m-p/276737#M105305</link>
      <description>&lt;P&gt;For context is their anything unique about the ICMP traffic (is it standard ping - what was seen in debugs?) and how are your global properties configured relative to sk172546 / sk41093?&lt;/P&gt;</description>
      <pubDate>Sat, 09 May 2026 02:31:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-19200-Appliance-migration-ICMP-over-VPN-UPPAK-and/m-p/276737#M105305</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2026-05-09T02:31:28Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with 19200 Appliance migration: ICMP over VPN (UPPAK) and Driver Incompatibility (KPPAK)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-19200-Appliance-migration-ICMP-over-VPN-UPPAK-and/m-p/276751#M105308</link>
      <description>&lt;P&gt;The high idle CPU is expected with UPPAK mode.&lt;/P&gt;
&lt;P&gt;Need code/Jumbo HFA version.&lt;/P&gt;
&lt;P&gt;We will need to see the results of a &lt;STRONG&gt;fw ctl zdebug + drop&lt;/STRONG&gt; being run while the ping traffic is attempted in the RA VPN.&amp;nbsp; The drop reason should provide a clue.&lt;/P&gt;
&lt;P&gt;When I've encountered ping issues in a VPN with UPPAK, it seems to be one of these things:&lt;/P&gt;
&lt;P&gt;1) The IPSec/ESP traffic is dropped and not recognized as part of the tunnel&lt;/P&gt;
&lt;P&gt;2) UPPAK attempts to handle the ICMP outside of the slowpath, which it shouldn't do, &lt;STRONG&gt;vpn accel off (VPN Peer IP)&lt;/STRONG&gt;&amp;nbsp;for the remote peer IP might be worth a try to ensure it stays slowpath where it should be.&lt;/P&gt;
&lt;P&gt;3) Been running into this more often:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk184455" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;sk184455: Traffic is randomly dropped due to loop prevention&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 May 2026 13:24:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-19200-Appliance-migration-ICMP-over-VPN-UPPAK-and/m-p/276751#M105308</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2026-05-10T13:24:37Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with 19200 Appliance migration: ICMP over VPN (UPPAK) and Driver Incompatibility (KPPAK)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-19200-Appliance-migration-ICMP-over-VPN-UPPAK-and/m-p/276779#M105316</link>
      <description>&lt;P&gt;It's R81.20 JHF 120&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2026 12:46:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-19200-Appliance-migration-ICMP-over-VPN-UPPAK-and/m-p/276779#M105316</guid>
      <dc:creator>Jakub_K</dc:creator>
      <dc:date>2026-05-11T12:46:21Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with 19200 Appliance migration: ICMP over VPN (UPPAK) and Driver Incompatibility (KPPAK)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-19200-Appliance-migration-ICMP-over-VPN-UPPAK-and/m-p/276780#M105317</link>
      <description>&lt;P&gt;We were monitoring that node via Skyline and it was iding at 30% CPU usage with about 300Mbps traffic via VPN&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2026 12:47:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-19200-Appliance-migration-ICMP-over-VPN-UPPAK-and/m-p/276780#M105317</guid>
      <dc:creator>Jakub_K</dc:creator>
      <dc:date>2026-05-11T12:47:38Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with 19200 Appliance migration: ICMP over VPN (UPPAK) and Driver Incompatibility (KPPAK)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-19200-Appliance-migration-ICMP-over-VPN-UPPAK-and/m-p/276781#M105318</link>
      <description>&lt;P&gt;It's R81.20 JHF 120&lt;/P&gt;&lt;P&gt;Currently we can't check "&lt;STRONG&gt;fw ctl zdebug + drop"&lt;/STRONG&gt; as it's all in production and we have old 16200 apliance actvie. We would have to create a maintenance window to test that.&lt;/P&gt;&lt;P&gt;As for those three possibilities:&lt;BR /&gt;1. We could see that traffic being accepted and logged on smart console&lt;BR /&gt;2. For test we did turn off vpn accel but it didn't solve this issue&lt;BR /&gt;3. This one we would have to testduring that maintenance window&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2026 12:54:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-19200-Appliance-migration-ICMP-over-VPN-UPPAK-and/m-p/276781#M105318</guid>
      <dc:creator>Jakub_K</dc:creator>
      <dc:date>2026-05-11T12:54:43Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with 19200 Appliance migration: ICMP over VPN (UPPAK) and Driver Incompatibility (KPPAK)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-19200-Appliance-migration-ICMP-over-VPN-UPPAK-and/m-p/276782#M105319</link>
      <description>&lt;P&gt;This was just a simple ping, and we have a dedicated rule to allow icmp traffic&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2026 12:57:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-19200-Appliance-migration-ICMP-over-VPN-UPPAK-and/m-p/276782#M105319</guid>
      <dc:creator>Jakub_K</dc:creator>
      <dc:date>2026-05-11T12:57:44Z</dc:date>
    </item>
  </channel>
</rss>

