<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ips bypass in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/133971#M20007</link>
    <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/13317"&gt;@Luis_Miguel_Mig&lt;/a&gt;I have the same problem, did you find the root cause?&lt;/P&gt;</description>
    <pubDate>Sat, 13 Nov 2021 13:05:01 GMT</pubDate>
    <dc:creator>Zolo</dc:creator>
    <dc:date>2021-11-13T13:05:01Z</dc:date>
    <item>
      <title>ips bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/111155#M15330</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I have started to get ips bypass alerts&amp;nbsp; since I upgraded to r80.40 take 91. I didn't use to get IPS bypass events in take 87.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;There is almost not traffic in my environment - 20 concurrent tcp sessions coming from one host I use for testing/browsing - and the cpu is idle most of the time. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have 6 cores - 3 workers. The average cpu is 2%, occasionally&amp;nbsp;goes to 20% but looking at cpview I have notices spikes that match the IPS bypass alerts - see below.&lt;BR /&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I am certain the issue has to something to do with take 91 but I was wondering if there is a way to get more verbose logging to see what is going on when the cpu usage goes over the threshold.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;I&amp;nbsp; am running&amp;nbsp; URL filtering, Anti bot , Antivirus and IPS enabled. I have disabled HTTPS inspection recently.&amp;nbsp;&lt;BR /&gt;I am getting about 90% of traffic through the slow path.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Spikes |&lt;BR /&gt;|--------------------------------------------------------------------------------------------------------------------------------------------------|&lt;BR /&gt;| CPU Spikes |&lt;BR /&gt;|--------------------------------------------------------------------------------------------------------------------------------------------------|&lt;BR /&gt;| Overview (last minute): |&lt;BR /&gt;| |&lt;BR /&gt;| Total Spikes: 3 |&lt;BR /&gt;| Average Spike Duration (Sec): 11 |&lt;BR /&gt;| Average Spike Usage: 95% |&lt;BR /&gt;| ------------------------------------------------------------------------------------------------------------------------------------------------ |&lt;BR /&gt;| Top Spikes (last minute): |&lt;BR /&gt;| |&lt;BR /&gt;| Start Time CPU Spike Duration (Sec) Average Usage |&lt;BR /&gt;| 18Feb2021 9:07:36 5 25 100% |&lt;BR /&gt;| 18Feb2021 9:08:41 5 5 93% |&lt;BR /&gt;| 18Feb2021 9:08:51 2 5 92% |&lt;BR /&gt;| &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 10:20:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/111155#M15330</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-02-18T10:20:37Z</dc:date>
    </item>
    <item>
      <title>Re: ips bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/111160#M15332</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;We have a number of ways to understand this change, will appreciate doing a remote session with you to understand the issue -&amp;nbsp; I will contact you directly to arrange a remote session.&lt;/P&gt;
&lt;P&gt;Please open an SR as well&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 11:49:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/111160#M15332</guid>
      <dc:creator>shais</dc:creator>
      <dc:date>2021-02-18T11:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: ips bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/111165#M15334</link>
      <description>&lt;P&gt;Thanks.&amp;nbsp;&lt;BR /&gt;I would say the securexl is okay. The traffic that goes through the slow path is expected, right?&lt;BR /&gt;&lt;BR /&gt;[Expert@fw1:0]# fwaccel stats -p&lt;BR /&gt;F2F packets:&lt;BR /&gt;--------------&lt;BR /&gt;Violation Packets Violation Packets&lt;BR /&gt;-------------------- --------------- -------------------- ---------------&lt;BR /&gt;pkt has IP options 0 ICMP miss conn 0&lt;BR /&gt;TCP-SYN miss conn 0 TCP-other miss conn 50&lt;BR /&gt;UDP miss conn 197 other miss conn 0&lt;BR /&gt;VPN returned F2F 0 uni-directional viol 0&lt;BR /&gt;possible spoof viol 0 TCP state viol 0&lt;BR /&gt;SCTP state affecting 0 out if not def/accl 0&lt;BR /&gt;bridge, src=dst 0 routing decision err 0&lt;BR /&gt;sanity checks failed 0 fwd to non-pivot 0&lt;BR /&gt;broadcast/multicast 0 cluster message 10289&lt;BR /&gt;cluster forward 0 chain forwarding 0&lt;BR /&gt;F2V conn match pkts 0 general reason 0&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 12:27:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/111165#M15334</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-02-18T12:27:34Z</dc:date>
    </item>
    <item>
      <title>Re: ips bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/111166#M15335</link>
      <description>&lt;P&gt;You mentioned that most of your traffic is the slow path - this can trigger the IPS bypass as it will cause a high load on the CPU&lt;/P&gt;
&lt;P&gt;The statistics you showed above mean you don't have any violations in SecureXL which is good but it's unrelated to the slow path.&lt;BR /&gt;You can see the slow path rate at "fwaccel stats -s"&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 12:29:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/111166#M15335</guid>
      <dc:creator>shais</dc:creator>
      <dc:date>2021-02-18T12:29:43Z</dc:date>
    </item>
    <item>
      <title>Re: ips bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/111168#M15336</link>
      <description>&lt;P&gt;When my testing vm is down and therefore there is only mgmt traffic meaning (gateways cluster messages, ntp, dns, snmp, syslog, http request to the checkpoint cloud through the proxy, etc) almost 100% of the traffic is not accelerated. Is this behavior expected? Should any of this traffic be accelerated?&lt;BR /&gt;&lt;BR /&gt;When I browse a bit with my test vm I see the accelerated packets increase. See below&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;testing vm&amp;nbsp; down&lt;/P&gt;&lt;P&gt;[Expert@fw1:0]# fwaccel stats -s&lt;BR /&gt;Accelerated conns/Total conns : 0/0 (0%)&lt;BR /&gt;Accelerated pkts/Total pkts : 0/3302 (0%)&lt;BR /&gt;F2Fed pkts/Total pkts : 3302/3302 (100%)&lt;BR /&gt;F2V pkts/Total pkts : 0/3302 (0%)&lt;BR /&gt;CPASXL pkts/Total pkts : 0/3302 (0%)&lt;BR /&gt;PSLXL pkts/Total pkts : 0/3302 (0%)&lt;BR /&gt;CPAS pipeline pkts/Total pkts : 0/3302 (0%)&lt;BR /&gt;PSL pipeline pkts/Total pkts : 0/3302 (0%)&lt;BR /&gt;CPAS inline pkts/Total pkts : 0/3302 (0%)&lt;BR /&gt;PSL inline pkts/Total pkts : 0/3302 (0%)&lt;BR /&gt;QOS inbound pkts/Total pkts : 0/3302 (0%)&lt;BR /&gt;QOS outbound pkts/Total pkts : 0/3302 (0%)&lt;BR /&gt;Corrected pkts/Total pkts : 0/3302 (0%)&lt;BR /&gt;[Expert@hqfw2b:0]# fwaccel stat&lt;BR /&gt;+---------------------------------------------------------------------------------+&lt;BR /&gt;|Id|Name |Status |Interfaces |Features |&lt;BR /&gt;+---------------------------------------------------------------------------------+&lt;BR /&gt;|0 |SND |enabled |eth0,eth2,eth3,eth5,eth6 |Acceleration,Cryptography |&lt;BR /&gt;| | | | |Crypto: Tunnel,UDPEncap,MD5, |&lt;BR /&gt;| | | | |SHA1,NULL,3DES,DES,AES-128, |&lt;BR /&gt;| | | | |AES-256,ESP,LinkSelection, |&lt;BR /&gt;| | | | |DynamicVPN,NatTraversal, |&lt;BR /&gt;| | | | |AES-XCBC,SHA256,SHA384 |&lt;BR /&gt;+---------------------------------------------------------------------------------+&lt;/P&gt;&lt;P&gt;Accept Templates : enabled&lt;BR /&gt;Drop Templates : disabled&lt;BR /&gt;NAT Templates : enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;testing vm is up&lt;/P&gt;&lt;P&gt;[Expert@hqfw2b:0]# fwaccel stats -s&lt;BR /&gt;Accelerated conns/Total conns : 0/97 (0%)&lt;BR /&gt;Accelerated pkts/Total pkts : 4215/9061 (46%)&lt;BR /&gt;F2Fed pkts/Total pkts : 4846/9061 (53%)&lt;BR /&gt;F2V pkts/Total pkts : 110/9061 (1%)&lt;BR /&gt;CPASXL pkts/Total pkts : 0/9061 (0%)&lt;BR /&gt;PSLXL pkts/Total pkts : 4215/9061 (46%)&lt;BR /&gt;CPAS pipeline pkts/Total pkts : 0/9061 (0%)&lt;BR /&gt;PSL pipeline pkts/Total pkts : 0/9061 (0%)&lt;BR /&gt;CPAS inline pkts/Total pkts : 0/9061 (0%)&lt;BR /&gt;PSL inline pkts/Total pkts : 0/9061 (0%)&lt;BR /&gt;QOS inbound pkts/Total pkts : 0/9061 (0%)&lt;BR /&gt;QOS outbound pkts/Total pkts : 0/9061 (0%)&lt;BR /&gt;Corrected pkts/Total pkts : 0/9061 (0%)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 12:50:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/111168#M15336</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-02-18T12:50:06Z</dc:date>
    </item>
    <item>
      <title>Re: ips bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/111169#M15337</link>
      <description>&lt;P&gt;Just reading at&amp;nbsp;sk32578&lt;BR /&gt;&lt;SPAN&gt;When SecureXL is enabled, all packets should be accelerated,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;except&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;packets that match the following conditions:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;All packets that match a rule, whose source or destination is the Security Gateway itself.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;So I guess in my environment with only one user establishing connections, the percentage of&amp;nbsp; accelerated traffic is expected to be low.&lt;BR /&gt;And if this user is down, then pretty much 100% of the packets should be non accelerated.&lt;BR /&gt;I guess it would still be interesting to double check it if it is possible.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 13:02:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/111169#M15337</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-02-18T13:02:51Z</dc:date>
    </item>
    <item>
      <title>Re: ips bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/111171#M15338</link>
      <description>&lt;P&gt;When your testing VM is down, the traffic you have is only local connections - this is a slow path (by design)&lt;/P&gt;
&lt;P&gt;So it looks like you don't have any issue here related to SecureXL but indeed something triggers a high load which cause IPS to enter bypass - we will continue offline to analyze it&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 13:14:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/111171#M15338</guid>
      <dc:creator>shais</dc:creator>
      <dc:date>2021-02-18T13:14:08Z</dc:date>
    </item>
    <item>
      <title>Re: ips bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/111173#M15340</link>
      <description>&lt;P&gt;Generally enabling the IPS bypass feature is not a good idea.&amp;nbsp; When monitoring the CPUs if even one of them hits the CPU % threshold, IPS functions on ALL CPUs are bypassed.&amp;nbsp; &amp;nbsp;This was fine when firewalls only had a few cores, but not really appropriate with many cores. Really the IPS Bypass feature should average the CPU utilization of all the workers when making the decision of whether to bypass.&amp;nbsp; See here:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk107334&amp;amp;partition=Advanced&amp;amp;product=IPS" target="_blank" rel="noopener"&gt;sk107334: &lt;STRONG&gt;IPS&lt;/STRONG&gt; &lt;STRONG&gt;Bypass&lt;/STRONG&gt; is triggered even when CPU utilization is not over the defined threshold&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/44392"&gt;@shais&lt;/a&gt;&amp;nbsp;said it looks like something in T91 is causing occasional high CPU and triggering the IPS bypass; so the IPS bypass activating is just a symptom of your problem but not the cause.&amp;nbsp; Normally the next step is to figure out in what mode the CPU spikes are (kernel vs. process space - us/sy/si/hi in top); you can use &lt;STRONG&gt;sar&lt;/STRONG&gt; for that but it looks like the spikes are too short for &lt;STRONG&gt;sar&lt;/STRONG&gt; to reliably pick up.&amp;nbsp; You'll have to catch whatever it is "in the act" with &lt;STRONG&gt;top&lt;/STRONG&gt;, or look in the spike detective logs here:&amp;nbsp;&lt;CODE&gt;/var/log/spike_detective/spike_detective.log&lt;/CODE&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 13:40:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/111173#M15340</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-02-18T13:40:31Z</dc:date>
    </item>
    <item>
      <title>Re: ips bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/111186#M15341</link>
      <description>&lt;P&gt;Yeah absolutely.&lt;BR /&gt;&lt;SPAN&gt;/var/log/spike_detective/spike_detective.log doesn't say too much though. Just the duration of the spike and the core id.&lt;BR /&gt;Sar seems to capture stats only every 10 mins and the spikes last between 10 and 20 secs.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 14:46:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/111186#M15341</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-02-18T14:46:30Z</dc:date>
    </item>
    <item>
      <title>Re: ips bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/133971#M20007</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/13317"&gt;@Luis_Miguel_Mig&lt;/a&gt;I have the same problem, did you find the root cause?&lt;/P&gt;</description>
      <pubDate>Sat, 13 Nov 2021 13:05:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/133971#M20007</guid>
      <dc:creator>Zolo</dc:creator>
      <dc:date>2021-11-13T13:05:01Z</dc:date>
    </item>
    <item>
      <title>Re: ips bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/134058#M20032</link>
      <description>&lt;P&gt;It happens when the gateway loads the antibot/antivirus signatures&amp;nbsp; at the times where it is scheduled in the smartconsole configuration. You can reproduce it with fw load_sigs.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Nov 2021 10:42:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/134058#M20032</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-11-15T10:42:25Z</dc:date>
    </item>
    <item>
      <title>Re: ips bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/134069#M20035</link>
      <description>&lt;P&gt;This is expected behavior but it only spikes a single core, so the chances of affecting traffic handling are pretty low:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk174347&amp;amp;partition=Advanced&amp;amp;product=Anti-Bot," target="_blank"&gt;sk174347: Software blade updates may cause single CPU spikes&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Nov 2021 12:56:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/134069#M20035</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-11-15T12:56:58Z</dc:date>
    </item>
    <item>
      <title>Re: ips bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/134139#M20066</link>
      <description>&lt;P&gt;Yeah, it is a known issue now and it can affect only the traffic going through the firewall instance/cpu core were the signature loading process is running.&amp;nbsp;&lt;BR /&gt;So if you have 4 example 4 cores/fw instances, 25% of the traffic can be affected.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Nov 2021 10:37:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/134139#M20066</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-11-16T10:37:28Z</dc:date>
    </item>
    <item>
      <title>Re: ips bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/134211#M20085</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/13317"&gt;@Luis_Miguel_Mig&lt;/a&gt;: Thank you !!! That was my guess, but I did not find how to reproduce by hand. Thanks again &lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Nov 2021 06:31:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/134211#M20085</guid>
      <dc:creator>Zolo</dc:creator>
      <dc:date>2021-11-17T06:31:52Z</dc:date>
    </item>
    <item>
      <title>Re: ips bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/134212#M20086</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;: Thank you for the SK. But the customer's problem is that the IPS is going to Bypass and the traffic is not inspected by IPS for 1 minute because of a litle signature update on 72 core appliance with low network traffic. BTW the Anti-Bot/Anti-Virus Blades are off, only the IPS blade is on (and FW of course).&lt;/P&gt;&lt;P&gt;Is this an expected behavior and we can't change it, or maybe I can turn off signature updates somehow?&lt;/P&gt;</description>
      <pubDate>Wed, 17 Nov 2021 06:41:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/134212#M20086</guid>
      <dc:creator>Zolo</dc:creator>
      <dc:date>2021-11-17T06:41:36Z</dc:date>
    </item>
    <item>
      <title>Re: ips bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/134677#M20218</link>
      <description>&lt;P&gt;I was wondering if we could use&amp;nbsp; &amp;nbsp;affinity settings to make this process run in a specific cpu core.&amp;nbsp; I have more cpu cores than fw workers&lt;/P&gt;</description>
      <pubDate>Mon, 22 Nov 2021 17:00:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/134677#M20218</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-11-22T17:00:37Z</dc:date>
    </item>
    <item>
      <title>Re: ips bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/134679#M20219</link>
      <description>&lt;P&gt;You could cause affinity to do that, but it won't matter to the IPS Bypass feature as all it takes is one saturated core (regardless of type) for IPS to get disabled.&amp;nbsp; The IPS Bypass feature was a good idea in the days when firewalls only had 1-2 cores, not so much in today's world.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Nov 2021 17:07:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/134679#M20219</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-11-22T17:07:36Z</dc:date>
    </item>
    <item>
      <title>Re: ips bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/134680#M20220</link>
      <description>&lt;P&gt;That would be okay with me. I don't mind to get a IPS bypass. I may disable the IPS bypass feature altogether.&lt;BR /&gt;But how could set the affinity of the fw process to a specific core so fw load_sigs run on a core free of fw_workers?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Dec 2021 10:28:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ips-bypass/m-p/134680#M20220</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-12-03T10:28:41Z</dc:date>
    </item>
  </channel>
</rss>

