<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Assign IPs or Network to a fw_worker in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Assign-IPs-or-Network-to-a-fw-worker/m-p/113713#M15872</link>
    <description>&lt;P&gt;The Dynamic Dispatcher can be bypassed for certain ports as described here, which was mentioned starting in the second edition of my book as an undocumented feature at that time:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108894&amp;amp;partition=Basic&amp;amp;product=HTTPS" target="_blank" rel="noopener"&gt;sk108894: Difficulties in connecting to untrusted sites when both HTTPS Inspection and CoreXL Dynamic Dispatcher are enabled&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;When the bypass is active the old hash function will allocate which firewall worker gets the new connection, you don't get to pick which firewall worker instance.&amp;nbsp; I don't see any exposed mechanism for doing what you want by IP address.&lt;/P&gt;
&lt;P&gt;What happens if you fast_accel the traffic through SecureXL?&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk156672&amp;amp;partition=Advanced&amp;amp;product=SecureXL" target="_blank" rel="noopener"&gt;sk156672: SecureXL Fast Accelerator (fw &lt;STRONG&gt;fast_accel&lt;/STRONG&gt;) for R80.20 and above&lt;/A&gt;&amp;nbsp; Even though there are multiple cores assigned to SND/IRQ functions, it is really still just one instance of the sim (SecureXL Implementation Module) driver in the kernel and might help avoid the asymmetry you are seeing.&lt;/P&gt;</description>
    <pubDate>Tue, 16 Mar 2021 18:38:22 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2021-03-16T18:38:22Z</dc:date>
    <item>
      <title>Assign IPs or Network to a fw_worker</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Assign-IPs-or-Network-to-a-fw-worker/m-p/113587#M15849</link>
      <description>&lt;P&gt;Hi Guys,&lt;BR /&gt;&lt;BR /&gt;I guess my answer is NO since i've never heard of this before.&lt;BR /&gt;&lt;BR /&gt;But i'm having a rather peculiar issue i need to workaround.&lt;/P&gt;&lt;P&gt;I'd need to assign a network or an IP to a specific worker since the normal hashing or dynamic dispatching won't work in this case.&lt;BR /&gt;&lt;BR /&gt;Is it possible?&lt;BR /&gt;&lt;BR /&gt;Many thanks!&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Mar 2021 18:34:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Assign-IPs-or-Network-to-a-fw-worker/m-p/113587#M15849</guid>
      <dc:creator>Juan_</dc:creator>
      <dc:date>2021-03-15T18:34:17Z</dc:date>
    </item>
    <item>
      <title>Re: Assign IPs or Network to a fw_worker</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Assign-IPs-or-Network-to-a-fw-worker/m-p/113590#M15850</link>
      <description>&lt;P&gt;May be first explain what you are trying to achieve ? Do you want to have dedicated fw worker that is processing only traffic from/to single network/IP and nothing else ?&lt;/P&gt;</description>
      <pubDate>Mon, 15 Mar 2021 18:58:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Assign-IPs-or-Network-to-a-fw-worker/m-p/113590#M15850</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2021-03-15T18:58:45Z</dc:date>
    </item>
    <item>
      <title>Re: Assign IPs or Network to a fw_worker</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Assign-IPs-or-Network-to-a-fw-worker/m-p/113591#M15851</link>
      <description>&lt;P&gt;Hi Hristo,&lt;BR /&gt;&lt;BR /&gt;Doesn't matter if its nothing else, but i'd like to have a rule like&lt;/P&gt;&lt;P&gt;"srcip:192.168.70.20 &amp;gt; fw_1"&lt;/P&gt;&lt;P&gt;"srcip=192.168.60.0/24 &amp;gt; fw_2"&amp;nbsp;&lt;/P&gt;&lt;P&gt;Issue am having is due to asymmetric routing. When inbound and outbound flows (different connections to the Ckp) fall in the same core it fails, but if it falls in different cores it works. That's the reason why i need this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The application/network design doesn't allow to fix the reason for the asymmetry in the first place unfortunately.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Drop beign:&amp;nbsp;dropped by fw_conn_post_inspect Reason: fwconn_key_init_links (OUTBOUND) failed;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Mar 2021 19:11:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Assign-IPs-or-Network-to-a-fw-worker/m-p/113591#M15851</guid>
      <dc:creator>Juan_</dc:creator>
      <dc:date>2021-03-15T19:11:07Z</dc:date>
    </item>
    <item>
      <title>Re: Assign IPs or Network to a fw_worker</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Assign-IPs-or-Network-to-a-fw-worker/m-p/113593#M15852</link>
      <description>&lt;P&gt;And by "fails" you mean packets are dropped because of stateful inspection ?&lt;/P&gt;</description>
      <pubDate>Mon, 15 Mar 2021 19:15:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Assign-IPs-or-Network-to-a-fw-worker/m-p/113593#M15852</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2021-03-15T19:15:04Z</dc:date>
    </item>
    <item>
      <title>Re: Assign IPs or Network to a fw_worker</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Assign-IPs-or-Network-to-a-fw-worker/m-p/113594#M15853</link>
      <description>&lt;P&gt;No, it sees it as a new connection since the IPs change (there is NAT involved), it's also UDP traffic.&lt;/P&gt;&lt;P&gt;But when it tries to rearm the NAT outbound back it sees the inbound connection and it fails to create the link, when inbound and outbound fall in the same core.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Mar 2021 19:20:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Assign-IPs-or-Network-to-a-fw-worker/m-p/113594#M15853</guid>
      <dc:creator>Juan_</dc:creator>
      <dc:date>2021-03-15T19:20:46Z</dc:date>
    </item>
    <item>
      <title>Re: Assign IPs or Network to a fw_worker</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Assign-IPs-or-Network-to-a-fw-worker/m-p/113609#M15854</link>
      <description>&lt;P&gt;Have you opened a TAC case on this?&lt;BR /&gt;As far as I know, there's no way to manually influence the CoreXL hashing algorithm.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 01:03:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Assign-IPs-or-Network-to-a-fw-worker/m-p/113609#M15854</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-03-16T01:03:37Z</dc:date>
    </item>
    <item>
      <title>Re: Assign IPs or Network to a fw_worker</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Assign-IPs-or-Network-to-a-fw-worker/m-p/113630#M15856</link>
      <description>&lt;P&gt;Yes, case opened some time ago.. i've been labbing the issue heavily and it appears this is the culprit. Waiting on TAC to see if there is any possible workaround.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 09:16:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Assign-IPs-or-Network-to-a-fw-worker/m-p/113630#M15856</guid>
      <dc:creator>Juan_</dc:creator>
      <dc:date>2021-03-16T09:16:24Z</dc:date>
    </item>
    <item>
      <title>Re: Assign IPs or Network to a fw_worker</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Assign-IPs-or-Network-to-a-fw-worker/m-p/113700#M15870</link>
      <description>&lt;P&gt;Just to caution you: this could be a "workaround' for the true issue.&lt;BR /&gt;Which is probably why R&amp;amp;D needs to have a closer look at this.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 16:46:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Assign-IPs-or-Network-to-a-fw-worker/m-p/113700#M15870</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-03-16T16:46:15Z</dc:date>
    </item>
    <item>
      <title>Re: Assign IPs or Network to a fw_worker</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Assign-IPs-or-Network-to-a-fw-worker/m-p/113713#M15872</link>
      <description>&lt;P&gt;The Dynamic Dispatcher can be bypassed for certain ports as described here, which was mentioned starting in the second edition of my book as an undocumented feature at that time:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108894&amp;amp;partition=Basic&amp;amp;product=HTTPS" target="_blank" rel="noopener"&gt;sk108894: Difficulties in connecting to untrusted sites when both HTTPS Inspection and CoreXL Dynamic Dispatcher are enabled&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;When the bypass is active the old hash function will allocate which firewall worker gets the new connection, you don't get to pick which firewall worker instance.&amp;nbsp; I don't see any exposed mechanism for doing what you want by IP address.&lt;/P&gt;
&lt;P&gt;What happens if you fast_accel the traffic through SecureXL?&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk156672&amp;amp;partition=Advanced&amp;amp;product=SecureXL" target="_blank" rel="noopener"&gt;sk156672: SecureXL Fast Accelerator (fw &lt;STRONG&gt;fast_accel&lt;/STRONG&gt;) for R80.20 and above&lt;/A&gt;&amp;nbsp; Even though there are multiple cores assigned to SND/IRQ functions, it is really still just one instance of the sim (SecureXL Implementation Module) driver in the kernel and might help avoid the asymmetry you are seeing.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 18:38:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Assign-IPs-or-Network-to-a-fw-worker/m-p/113713#M15872</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-03-16T18:38:22Z</dc:date>
    </item>
  </channel>
</rss>

