<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: High CPU use on SND cores and Aggressive Aging in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-CPU-use-on-SND-cores-and-Aggressive-Aging/m-p/88812#M11043</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sk35990:&lt;/P&gt;
&lt;P&gt;Aggressive Aging is activated in IPS profile, or new connections may be dropped for the reason that the Connections Table is full when a given CoreXL Firewall instance has far fewer connection entries than the Connections Table limit, or the 80% threshold to activate Aggressive Aging as seen in the output of 'fw ctl multik stat' command. It is enabled by default in R80.10 and above.&lt;/P&gt;
&lt;P&gt;sk167358:&lt;/P&gt;
&lt;P&gt;High (90% to 100%) CPU use on SND cores after a Security Gateway upgrade from R77.x to R80.x (with the same load and same configurations). The protection impacts SecureXL performance because it works in FW and requires SecureXL to calculate timeouts per packet and to update the FW instance every few packets. This may result in an added load on the system.&lt;/P&gt;
&lt;P&gt;We can choose between CPU and connection tabel dead&lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;.&lt;/P&gt;
&lt;P&gt;I had some problems with AA in the past. I also observed that with heavy AA usage the CPU loaded is approximately 10% higher.&amp;nbsp; I this cases I usually turn it off.&lt;/P&gt;
&lt;P&gt;It would be nice if there would be a SK that describes which mode (AA on/off) would be better in which situation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 16 Jun 2020 18:37:34 GMT</pubDate>
    <dc:creator>HeikoAnkenbrand</dc:creator>
    <dc:date>2020-06-16T18:37:34Z</dc:date>
    <item>
      <title>High CPU use on SND cores and Aggressive Aging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-CPU-use-on-SND-cores-and-Aggressive-Aging/m-p/88761#M11041</link>
      <description>&lt;P&gt;How do you understand&amp;nbsp;&lt;SPAN&gt;sk167358 ? Does it say that one SGs with majority of traffic accelerated through SecureXL, Aggressive&amp;nbsp;Aging may actually impact performance in negative way because of constant timeout calculations ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2020 10:54:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-CPU-use-on-SND-cores-and-Aggressive-Aging/m-p/88761#M11041</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-06-16T10:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU use on SND cores and Aggressive Aging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-CPU-use-on-SND-cores-and-Aggressive-Aging/m-p/88805#M11042</link>
      <description>&lt;P&gt;I'm not able to comment on SK but in real life we saw some really odd problems whilst AA was on. For example we had some RDP running over HTTPS and that simply stopped working and as soon as AA was resolved, it started working again&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2020 17:46:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-CPU-use-on-SND-cores-and-Aggressive-Aging/m-p/88805#M11042</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-06-16T17:46:36Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU use on SND cores and Aggressive Aging</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-CPU-use-on-SND-cores-and-Aggressive-Aging/m-p/88812#M11043</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sk35990:&lt;/P&gt;
&lt;P&gt;Aggressive Aging is activated in IPS profile, or new connections may be dropped for the reason that the Connections Table is full when a given CoreXL Firewall instance has far fewer connection entries than the Connections Table limit, or the 80% threshold to activate Aggressive Aging as seen in the output of 'fw ctl multik stat' command. It is enabled by default in R80.10 and above.&lt;/P&gt;
&lt;P&gt;sk167358:&lt;/P&gt;
&lt;P&gt;High (90% to 100%) CPU use on SND cores after a Security Gateway upgrade from R77.x to R80.x (with the same load and same configurations). The protection impacts SecureXL performance because it works in FW and requires SecureXL to calculate timeouts per packet and to update the FW instance every few packets. This may result in an added load on the system.&lt;/P&gt;
&lt;P&gt;We can choose between CPU and connection tabel dead&lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;.&lt;/P&gt;
&lt;P&gt;I had some problems with AA in the past. I also observed that with heavy AA usage the CPU loaded is approximately 10% higher.&amp;nbsp; I this cases I usually turn it off.&lt;/P&gt;
&lt;P&gt;It would be nice if there would be a SK that describes which mode (AA on/off) would be better in which situation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2020 18:37:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-CPU-use-on-SND-cores-and-Aggressive-Aging/m-p/88812#M11043</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-06-16T18:37:34Z</dc:date>
    </item>
  </channel>
</rss>

