<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ethernet-Over-IP = bane of my life in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Ethernet-Over-IP-bane-of-my-life/m-p/141158#M21778</link>
    <description>&lt;P&gt;Looks like these are the ports/protocols involved with Cisco Mobility Groups:&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI id="ID115__li_29E633F6FCD14EE19D93471269B3F1A2" class="li"&gt;
&lt;P class="p Bu1_Bullet1-CC106A77"&gt;UDP 16666 for tunnel control traffic&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="ID115__li_B9701FC3FB354B83BF7D15A984D3CB8E" class="li"&gt;
&lt;P class="p Bu1_Bullet1-CC106A77"&gt;IP protocol 97 for user data traffic&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="ID115__li_056EAB9212154D2D8846BB497842FE51" class="li"&gt;
&lt;P class="p Bu1_Bullet1-CC106A77"&gt;UDP 161 and 162 for SNMP&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I just tried to add these first two to the fast_accel table on R80.40, and it allowed me to do so.&amp;nbsp; Whether it will actually work is another matter so you'll just have to try it and see what happens, you can use &lt;STRONG&gt;fwaccel conns&lt;/STRONG&gt; to see if these Mobility connections are fully accelerated.&amp;nbsp; Very curious to see if the IP Protocol 97 one works as my understanding is that SecureXL can only handle TCP and UDP in the accelerated path, but perhaps fast_accel rules are an exception to that:&lt;/P&gt;
&lt;P&gt;[Expert@R8040GW:0]# fw ctl fast_accel show_table&lt;/P&gt;
&lt;P&gt;------------------------------------ FIREWALL FAST ACCEL TABLE ------------------------------------&lt;BR /&gt;# Source IP Destination IP D-Port Protocol Hit count&lt;BR /&gt;---- ------------------ ------------------ ------ -------- -----------&lt;BR /&gt;1) 1.1.1.1/32 2.2.2.0/24 16666 17 0&lt;BR /&gt;2) 1.1.1.1/32 2.2.2.0/24 any 97 0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 10 Feb 2022 13:01:41 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2022-02-10T13:01:41Z</dc:date>
    <item>
      <title>Ethernet-Over-IP = bane of my life</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Ethernet-Over-IP-bane-of-my-life/m-p/140988#M21678</link>
      <description>&lt;P&gt;Anyone been involved with handling ethernet-over-ip through a firewall? Currently we have two two CPU cores handling this traffic as it is a bidirectional tunnel and this isn't hogging CPU performance but adding unnecessary load to CPU cores. Anyone seen this before or worked on it?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It needs to traverse an inside interface through the routing engine to an DMZ interface and doesn't appear to be being handled well at all by SecureXL if not at all.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 09:59:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Ethernet-Over-IP-bane-of-my-life/m-p/140988#M21678</guid>
      <dc:creator>Tom_Cripps</dc:creator>
      <dc:date>2022-02-09T09:59:10Z</dc:date>
    </item>
    <item>
      <title>Re: Ethernet-Over-IP = bane of my life</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Ethernet-Over-IP-bane-of-my-life/m-p/140990#M21680</link>
      <description>&lt;P&gt;Depending on security requirements perhaps look at if fast accel might be an effective solution per&amp;nbsp;&lt;SPAN&gt;sk156672.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Mind you this is a sledge hammer approach and should be diagnosed further prior with TAC.&lt;/P&gt;
&lt;P&gt;In future releases we are introducing new features to contend with large flows per:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Quantum-HyperFlow-Now-in-EA/td-p/138544" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/Quantum-HyperFlow-Now-in-EA/td-p/138544&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 10:18:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Ethernet-Over-IP-bane-of-my-life/m-p/140990#M21680</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-02-09T10:18:19Z</dc:date>
    </item>
    <item>
      <title>Re: Ethernet-Over-IP = bane of my life</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Ethernet-Over-IP-bane-of-my-life/m-p/140998#M21684</link>
      <description>&lt;P&gt;Will take a look more into that SK, seems some what feasible&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 10:57:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Ethernet-Over-IP-bane-of-my-life/m-p/140998#M21684</guid>
      <dc:creator>Tom_Cripps</dc:creator>
      <dc:date>2022-02-09T10:57:34Z</dc:date>
    </item>
    <item>
      <title>Re: Ethernet-Over-IP = bane of my life</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Ethernet-Over-IP-bane-of-my-life/m-p/141049#M21717</link>
      <description>&lt;P&gt;Only TCP and UDP-based sessions can be accelerated by SecureXL.&amp;nbsp; If your Ethernet-over-IP implementation is using GRE for the transport, it cannot be accelerated at all and must go F2F.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 15:55:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Ethernet-Over-IP-bane-of-my-life/m-p/141049#M21717</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-02-09T15:55:09Z</dc:date>
    </item>
    <item>
      <title>Re: Ethernet-Over-IP = bane of my life</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Ethernet-Over-IP-bane-of-my-life/m-p/141155#M21776</link>
      <description>&lt;P&gt;I don't believe it is. The traffic is a Cisco Mobility Anchor configuration if you are familiar with that concept.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 12:46:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Ethernet-Over-IP-bane-of-my-life/m-p/141155#M21776</guid>
      <dc:creator>Tom_Cripps</dc:creator>
      <dc:date>2022-02-10T12:46:16Z</dc:date>
    </item>
    <item>
      <title>Re: Ethernet-Over-IP = bane of my life</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Ethernet-Over-IP-bane-of-my-life/m-p/141157#M21777</link>
      <description>&lt;P&gt;CAPWAP used to be UDP iirc but that's different to EoIP unless I'm missing something...&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 12:55:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Ethernet-Over-IP-bane-of-my-life/m-p/141157#M21777</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-02-10T12:55:36Z</dc:date>
    </item>
    <item>
      <title>Re: Ethernet-Over-IP = bane of my life</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Ethernet-Over-IP-bane-of-my-life/m-p/141158#M21778</link>
      <description>&lt;P&gt;Looks like these are the ports/protocols involved with Cisco Mobility Groups:&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI id="ID115__li_29E633F6FCD14EE19D93471269B3F1A2" class="li"&gt;
&lt;P class="p Bu1_Bullet1-CC106A77"&gt;UDP 16666 for tunnel control traffic&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="ID115__li_B9701FC3FB354B83BF7D15A984D3CB8E" class="li"&gt;
&lt;P class="p Bu1_Bullet1-CC106A77"&gt;IP protocol 97 for user data traffic&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="ID115__li_056EAB9212154D2D8846BB497842FE51" class="li"&gt;
&lt;P class="p Bu1_Bullet1-CC106A77"&gt;UDP 161 and 162 for SNMP&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I just tried to add these first two to the fast_accel table on R80.40, and it allowed me to do so.&amp;nbsp; Whether it will actually work is another matter so you'll just have to try it and see what happens, you can use &lt;STRONG&gt;fwaccel conns&lt;/STRONG&gt; to see if these Mobility connections are fully accelerated.&amp;nbsp; Very curious to see if the IP Protocol 97 one works as my understanding is that SecureXL can only handle TCP and UDP in the accelerated path, but perhaps fast_accel rules are an exception to that:&lt;/P&gt;
&lt;P&gt;[Expert@R8040GW:0]# fw ctl fast_accel show_table&lt;/P&gt;
&lt;P&gt;------------------------------------ FIREWALL FAST ACCEL TABLE ------------------------------------&lt;BR /&gt;# Source IP Destination IP D-Port Protocol Hit count&lt;BR /&gt;---- ------------------ ------------------ ------ -------- -----------&lt;BR /&gt;1) 1.1.1.1/32 2.2.2.0/24 16666 17 0&lt;BR /&gt;2) 1.1.1.1/32 2.2.2.0/24 any 97 0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 13:01:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Ethernet-Over-IP-bane-of-my-life/m-p/141158#M21778</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-02-10T13:01:41Z</dc:date>
    </item>
  </channel>
</rss>

