<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CPU Spikes Since January and VPN Disconnections in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/143161#M22202</link>
    <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/63174"&gt;@RichUK&lt;/a&gt;&amp;nbsp;...I apologize if I mention something that was already discussed before, but 2 things came to my mind when I read your post.&lt;/P&gt;
&lt;P&gt;1) I know there used to be an option to check under office mode section on gateway (cluster) properties to support multiple external interfaces, and I know this helped solve the issue with lots of customers in the past, even if they had only single external interface configured. Now, I looked in my R81.10 lab and it seems that CP took that option away, but maybe someone from CP can confirm if it was moved somewhere else.&lt;/P&gt;
&lt;P&gt;and&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) Just wondering, did you ever try running capture on port 18234 (tunnel test) when this happens with any given user? From expert mode, just run fw monitor -e "accept port(18234);" and see what you get.&lt;/P&gt;</description>
    <pubDate>Mon, 07 Mar 2022 17:55:18 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2022-03-07T17:55:18Z</dc:date>
    <item>
      <title>CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/139361#M21271</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I have a strange issue with VPN clients disconnecting around 11:00am and 3pm each day that has only started happening since the start of January. We have over 3000 users connect via VPN .&lt;/P&gt;&lt;P&gt;We have a pair of 16200's running in Active-Standby. They were rebuilt back in November by professional services but immediately had issues with the SND's not balancing (a single SND would max out) this was resolved with&amp;nbsp;sk165853 and through December we had no issues with performance.&lt;/P&gt;&lt;P&gt;From the 3rd Jan (1st day back after Christmas) at 11am, we had loads of reports that users were disconnected from VPN, at this point we failed over the firewall to the standby and it seemed to resolve the issue. The same thing happened the next day and has been happing each day since. Sometimes at 3pm too.&lt;/P&gt;&lt;P&gt;Looking through the logs, I have noticed a few things. At the time of disconnections we get CPU spikes, the spikes seem to happen every 3 hours. Some of the spikes are a couple of minutes but there are a couple that have been running for weeks. Below are a couple from today, both starting before Christmas. The week or so before Christmas a lot of staff break up, therefore this issue could have started before Jan.&amp;nbsp;Both firewalls have been rebooted in the last 10 days.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Jan 25 09:28:02 2022 fwxxxxx spike_detective: spike info: type: thread, thread id: 81691, thread name: fwk0_32, start time: 22/01/22 04:18:12, spike duration (sec): 277789, initial cpu usage: 100, average cpu usage: 97, perf taken: 0 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Jan 25 09:32:25 2022 fwxxxxx spike_detective: spike info: type: thread, thread id: 81672, thread name: fwk0_13, start time: 21/01/22 17:00:53, spike duration (sec): 318691, initial cpu usage: 100, average cpu usage: 97, perf taken: 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Another anomaly we notice around the time of the disconnections is a massive increase of 'ESP enc Errors' in CPView under VPN &amp;gt; SecureXL. Normally around the 10 - 100 mark, at the time of the CPU spike and disconnections they jump up to 5000+ for a couple of minutes.&lt;/P&gt;&lt;P&gt;Any thoughts or help?&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;P&gt;Rich&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jan 2022 10:11:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/139361#M21271</guid>
      <dc:creator>RichUK</dc:creator>
      <dc:date>2022-01-25T10:11:27Z</dc:date>
    </item>
    <item>
      <title>Re: CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/139377#M21272</link>
      <description>&lt;P&gt;what version do you run?&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jan 2022 10:22:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/139377#M21272</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-01-25T10:22:19Z</dc:date>
    </item>
    <item>
      <title>Re: CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/139382#M21273</link>
      <description>&lt;P&gt;R81.10 JF Take 22&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jan 2022 10:53:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/139382#M21273</guid>
      <dc:creator>RichUK</dc:creator>
      <dc:date>2022-01-25T10:53:02Z</dc:date>
    </item>
    <item>
      <title>Re: CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/139430#M21288</link>
      <description>&lt;P&gt;This is going to be tough to find, what I would suggest is starting &lt;STRONG&gt;cpview&lt;/STRONG&gt; in history mode with &lt;STRONG&gt;-t&lt;/STRONG&gt;, moving the timeframe to about 30 minutes before a known problem period, then use + and - to step forward minute-by-minute into the problem period keeping an eye especially on overall throughput, new and concurrent connection rates and packets per second.&amp;nbsp; Seeing what changes during the problem period should help point you in the right direction.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I had to hazard a guess, I'd say your SND(s) are overloaded during the problem periods even with the&amp;nbsp;&lt;SPAN&gt;sk165853 fix; I don't believe the spike detective reports CPU saturation on the SNDs but I'm not sure.&amp;nbsp; If true this would result in RX-DRPs during the problem period which can be viewed with &lt;STRONG&gt;netstat -ni&lt;/STRONG&gt; and &lt;STRONG&gt;sar -n EDEV&lt;/STRONG&gt;.&amp;nbsp; Could also be some kind of elephant flow kicking up at those predetermined times (backups?) and stomping the VPNs, run &lt;STRONG&gt;fw ctl multik print_heavy_conn&lt;/STRONG&gt; and see if the reported elephant flows correspond to the known problem periods.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jan 2022 16:10:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/139430#M21288</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-01-25T16:10:47Z</dc:date>
    </item>
    <item>
      <title>Re: CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/139753#M21356</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;We had another issue today at 11:21am.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="highcpu.jpg" style="width: 467px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15139i57281977963DACC1/image-size/large?v=v2&amp;amp;px=999" role="button" title="highcpu.jpg" alt="highcpu.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="highcp_cores.jpg" style="width: 580px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15138iDF7BF812D7025D48/image-size/large?v=v2&amp;amp;px=999" role="button" title="highcp_cores.jpg" alt="highcp_cores.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Just before the disconnections the ESP errors jump from 1 - 100 to 10,000&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="highcp_enc_errors.jpg" style="width: 406px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15137i586CCC70750444F1/image-size/large?v=v2&amp;amp;px=999" role="button" title="highcp_enc_errors.jpg" alt="highcp_enc_errors.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The netstat (and our Solarwinds monitoring) are showing high discards on our internal and external bonds, one day it recorded over 150K. Netstat also shows high RX-DRPs. The core switch and external router shows no errors or drops.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="netstat.jpg" style="width: 727px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15135i4BCCEF44221F6905/image-size/large?v=v2&amp;amp;px=999" role="button" title="netstat.jpg" alt="netstat.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;sar -n EDEV&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;doesn't show any abnormal figures, &lt;STRONG&gt;fw ctl multik print_heavy_conn&amp;nbsp;&lt;/STRONG&gt;has some entries but not around the time of disconnections. There is no increase in the throughput (in and out around 700mb) and no increase in connections.&lt;/P&gt;&lt;P&gt;Thanks Rich&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jan 2022 19:43:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/139753#M21356</guid>
      <dc:creator>RichUK</dc:creator>
      <dc:date>2022-01-27T19:43:14Z</dc:date>
    </item>
    <item>
      <title>Re: CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/139773#M21358</link>
      <description>&lt;P&gt;Hmm that is strange, looks more like a dispatcher balancing issue than a resource shortage.&amp;nbsp; Almost like the saturated workers are causing a backup into the SNDs and causing the enc errors, although that doesn't make sense since enc errors would be for traffic being encrypted to leave the firewall.&amp;nbsp; Assuming it is related of course.&amp;nbsp; The RX-DRP level is way too low to matter and apparently elephant flows are not the culprit.&lt;/P&gt;
&lt;P&gt;Next time it happens run &lt;STRONG&gt;fw ctl multik stat&lt;/STRONG&gt; which will give you a connection count for each worker; would be interesting to see if the connections are properly balanced among all the workers, or those two busy ones were assigned more connections then they should have been.&amp;nbsp; Next run &lt;STRONG&gt;fw ctl multik gconn &amp;gt; filename&lt;/STRONG&gt; which will show the attributes of each connection and worker assignment according to the dispatcher, if you massage the filename output you should be able to isolate all connections running on the saturated core(s) via the "Inst" column value.&amp;nbsp; Do they have anything in common?&amp;nbsp; Are certain types of connections inappropriately congregating on the saturated workers? How do those connections differ from connections carried on non-saturated workers?&lt;/P&gt;
&lt;P&gt;You could override the dispatcher's CPU load-based algorithm and have it go straight round robin if that algorithm is causing your issue, but I would not advise going down that road unless it is a verified dispatcher problem.&amp;nbsp; The variables to make this change are:&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;fwmultik_enable_round_robin=1&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;fwmultik_enable_increment_first=1&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Dynamic-dispatcher-issue-with-R80-30-Part-2/td-p/91943" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Security-Gateways/Dynamic-dispatcher-issue-with-R80-30-Part-2/td-p/91943&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;After that we are definitely into TAC case territory.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jan 2022 22:26:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/139773#M21358</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-01-27T22:26:29Z</dc:date>
    </item>
    <item>
      <title>Re: CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/140072#M21449</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I managed to run&amp;nbsp;&lt;STRONG&gt;fw ctl multik stat &lt;/STRONG&gt;when it happened last week.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="28_Jan.jpg" style="width: 796px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15186i9E73817E92B16619/image-size/large?v=v2&amp;amp;px=999" role="button" title="28_Jan.jpg" alt="28_Jan.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The vpn tu mstats also shows a balanced split of vpn connections&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mstats.jpg" style="width: 378px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15187i7E9F7A18A87D89AA/image-size/large?v=v2&amp;amp;px=999" role="button" title="mstats.jpg" alt="mstats.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Having a look around cpview, I don't know if this is correct or a bug, but under Advanced, SecureXL and Network-per-CPU is only lists one CPU. This is the same on both gateways.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cpview_net_per_cpu.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15188i7040F7B9D027EB19/image-size/large?v=v2&amp;amp;px=999" role="button" title="cpview_net_per_cpu.jpg" alt="cpview_net_per_cpu.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Again, I don't know if this is Solarwards not reporting correctly, but these are the discards for today. They show for our internal and external bonds and the relevant NIC's. I don't know if this has any relevance to the issues we are experiencing.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="discards.jpg" style="width: 439px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15189i7A95ED6AA9261B94/image-size/large?v=v2&amp;amp;px=999" role="button" title="discards.jpg" alt="discards.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Feb 2022 10:16:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/140072#M21449</guid>
      <dc:creator>RichUK</dc:creator>
      <dc:date>2022-02-01T10:16:53Z</dc:date>
    </item>
    <item>
      <title>Re: CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/140088#M21453</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;BR /&gt;yes we had also the same issue in the past with R81 Take 44 on a 15600 appliance.&lt;BR /&gt;I would say tiny Mickey Mouse traffic rendered the appliance useless, VPN dropped on a daily basis ...&lt;BR /&gt;VPN becomes really unstable ...&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;as you we saw elephant flows filling up the machine and creating spikes.&lt;BR /&gt;also we saw "&lt;EM&gt;&lt;STRONG&gt;fwaccel stats -s"&lt;/STRONG&gt;&lt;/EM&gt; showed us gruesome results, almost all traffic went F2F.&lt;/P&gt;&lt;P&gt;we searched for the connections in spike detector logs and saw it all goes F2F, alot of the traffic was CIFS ...&lt;BR /&gt;SecureXL has some limtiations with CIFS.&lt;/P&gt;&lt;P&gt;TAC told gave to use this kernel parameter "&lt;EM&gt;&lt;STRONG&gt;skip_offload_for_active_spii=0&lt;/STRONG&gt;&lt;/EM&gt;", somehow it forces CIFS Traffic to go to Medium Path, in combination with VPN&lt;BR /&gt;then&amp;nbsp; we checked if all CIFS Traffic went to Medium Path via &lt;STRONG&gt;"&lt;EM&gt;fw_mux all -&amp;gt; output.txt&lt;/EM&gt;"&lt;/STRONG&gt;&lt;BR /&gt;Check the output for: CIFS Connection and all other heavy connections!&amp;nbsp;&lt;BR /&gt;It should then follow Medium Path!&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen1.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15190iD96001E3652799AF/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen1.PNG" alt="Screen1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;When the connection is in Medium Path, you can consider using Fast Acceleration to give it some extra boost!&amp;nbsp;sk156672&lt;BR /&gt;Since its bypassing some Security Blades, please consider its security impact!&lt;BR /&gt;But this has really worked for backup traffic.&lt;/P&gt;&lt;P&gt;but this was still not sufficient ... this 15600 was still a lame duck ...&lt;BR /&gt;finally we run the &lt;STRONG&gt;IPS Analyzer,&lt;/STRONG&gt; TAC found some very CPU Intensive IPS protections.&amp;nbsp;sk110737&lt;BR /&gt;After disabling them it works the lost performance came back!&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;And still we had some issues left.&lt;/STRONG&gt;&lt;BR /&gt;when installing a Policy we lost some pings over every VPN S2S connection.&lt;BR /&gt;Some would argue you can ignore that, but some costumers dont.&lt;BR /&gt;when searching for connections "&lt;EM&gt;&lt;STRONG&gt;action:key install"&lt;/STRONG&gt;&lt;/EM&gt; in Smartlog&amp;nbsp; between the firewalls we saw huge gaps, with "Link to X.X.X.X is not responding/ Link to Y.Y.Y.Y is respondig", mostly during policy install ... at most cases the VPN stuck during this time ...&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;we saw our Link Selection timers where much too short, so we set it back to default.&lt;BR /&gt;in the Global Properties,&amp;nbsp; -&amp;gt; Advanced Settings -&amp;gt; Firewall 1 -&amp;gt; Resolver&lt;BR /&gt;also we added the Link Selection Probing Port :259 to the PrioQ:&amp;nbsp;SK105762.&amp;nbsp;&lt;BR /&gt;in $FWDIR/conf/prioq.conf&lt;BR /&gt;add&lt;BR /&gt;#RDP259&lt;BR /&gt;{ROUTE,any,any,0,259,17}&lt;BR /&gt;&lt;BR /&gt;so finally we made out of a lame duck 15600 with average load of 60% are super relaxed gateway with 10% average load!&lt;BR /&gt;for us this was mission solved!&lt;/P&gt;</description>
      <pubDate>Tue, 01 Feb 2022 14:12:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/140088#M21453</guid>
      <dc:creator>Thomas_Eichelbu</dc:creator>
      <dc:date>2022-02-01T14:12:56Z</dc:date>
    </item>
    <item>
      <title>Re: CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/141761#M21917</link>
      <description>&lt;P&gt;Hello Again,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;soon after that improvement we encountered another nasty thing ... the NIC driver for the 1GB copper module restarted all the time. Sometimes it caused sporadic VPN outages.&lt;/P&gt;
&lt;P&gt;in /var/log/messages*&lt;BR /&gt;Feb 3 10:47:47 2022 XXXXXXXX kernel: &lt;STRONG&gt;igb 0000:8b:00.1: Detected Tx Unit Hang&lt;/STRONG&gt;&lt;BR /&gt;Feb 3 10:47:48 2022 XXXXXXXX kernel: Tx Queue &amp;lt;3&amp;gt;&lt;BR /&gt;Feb 3 10:47:48 2022 XXXXXXXX kernel: TDH &amp;lt;1f2&amp;gt;&lt;BR /&gt;Feb 3 10:47:48 2022 XXXXXXXX kernel: TDT &amp;lt;1f2&amp;gt;&lt;BR /&gt;Feb 3 10:47:48 2022 XXXXXXXX kernel: next_to_use &amp;lt;1f2&amp;gt;&lt;BR /&gt;Feb 3 10:47:48 2022 XXXXXXXX kernel: next_to_clean &amp;lt;84&amp;gt;&lt;BR /&gt;Feb 3 10:47:48 2022 XXXXXXXX kernel: buffer_info[next_to_clean]&lt;BR /&gt;Feb 3 10:47:48 2022 XXXXXXXX kernel: time_stamp &amp;lt;1aea56589&amp;gt;&lt;BR /&gt;Feb 3 10:47:48 2022 XXXXXXXX kernel: next_to_watch &amp;lt;ffff88071d990850&amp;gt;&lt;BR /&gt;Feb 3 10:47:48 2022 XXXXXXXX kernel: jiffies &amp;lt;1aea569c6&amp;gt;&lt;BR /&gt;Feb 3 10:47:48 2022 XXXXXXXX kernel: desc.status &amp;lt;1748001&amp;gt;&lt;BR /&gt;&lt;BR /&gt;this little guy is:&lt;BR /&gt;ethtool -i eth2-02&lt;BR /&gt;driver: igb&lt;BR /&gt;version: 5.3.5.20&lt;BR /&gt;firmware-version: 1.63, 0x800009fb&lt;BR /&gt;expansion-rom-version:&lt;BR /&gt;bus-info: 0000:8b:00.1&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Line card 2 model: CPAC-8-1C-B&lt;BR /&gt;&lt;BR /&gt;after increasing the RX Ringbuffers, even if it says TX the issue was gone ...&lt;/P&gt;
&lt;P&gt;ethtool -g eth2-02&lt;BR /&gt;Ring parameters for eth2-02:&lt;BR /&gt;Pre-set maximums:&lt;BR /&gt;RX: 4096&lt;BR /&gt;RX Mini: 0&lt;BR /&gt;RX Jumbo: 0&lt;BR /&gt;TX: 4096&lt;BR /&gt;Current hardware settings:&lt;BR /&gt;&lt;STRONG&gt;RX: 2048&lt;/STRONG&gt;&lt;BR /&gt;RX Mini: 0&lt;BR /&gt;RX Jumbo: 0&lt;BR /&gt;TX: 1024&lt;/P&gt;
&lt;P&gt;This stopped the driver malfunctions ...&amp;nbsp;&lt;BR /&gt;Also the VPN outtages which were related to this erros stopped.&lt;BR /&gt;And the port errors on the NICs dropped to 0 after that ...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Feb 2022 11:56:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/141761#M21917</guid>
      <dc:creator>Thomas_Eichelbu</dc:creator>
      <dc:date>2022-02-17T11:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/142674#M22098</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/24246"&gt;@Thomas_Eichelbu&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the detailed responses. I expect our disconnections are related to IPS and acceleration. I'm waiting back from TAC to see what they find but this has been going on since the start of Jan and we still have to reboot the firewalls twice a week.&lt;/P&gt;&lt;P&gt;Another thing I can't understand is why we only have only 3% accelerated conns and 96% accelerated pkts.&lt;/P&gt;&lt;P&gt;Accelerated conns/Total conns : 3890/103885 (3%)&lt;BR /&gt;Accelerated pkts/Total pkts : 2134734958/2202831265 (96%)&lt;BR /&gt;F2Fed pkts/Total pkts : 68096307/2202831265 (3%)&lt;BR /&gt;F2V pkts/Total pkts : 22080435/2202831265 (1%)&lt;BR /&gt;CPASXL pkts/Total pkts : 375365502/2202831265 (17%)&lt;BR /&gt;PSLXL pkts/Total pkts : 1627408500/2202831265 (73%)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2022 11:41:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/142674#M22098</guid>
      <dc:creator>RichUK</dc:creator>
      <dc:date>2022-03-01T11:41:44Z</dc:date>
    </item>
    <item>
      <title>Re: CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/142685#M22107</link>
      <description>&lt;P&gt;As far as your low accelerated conns percentage, please provide the output of &lt;STRONG&gt;enabled_blades&lt;/STRONG&gt; and &lt;STRONG&gt;fwaccel stat&lt;/STRONG&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2022 12:49:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/142685#M22107</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-03-01T12:49:49Z</dc:date>
    </item>
    <item>
      <title>Re: CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/142686#M22108</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;fw vpn cvpn urlf av appi ips identityServer SSL_INSPECT anti_bot content_awareness mon&lt;/P&gt;&lt;P&gt;+---------------------------------------------------------------------------------+&lt;BR /&gt;|Id|Name |Status |Interfaces |Features |&lt;BR /&gt;+---------------------------------------------------------------------------------+&lt;BR /&gt;|0 |SND |enabled |eth3-01,Mgmt,Sync, |Acceleration,Cryptography |&lt;BR /&gt;| | | |eth1-01,eth3-04,eth2-01, | |&lt;BR /&gt;| | | |eth2-04 |Crypto: Tunnel,UDPEncap,MD5, |&lt;BR /&gt;| | | | |SHA1,3DES,DES,AES-128,AES-256,|&lt;BR /&gt;| | | | |ESP,LinkSelection,DynamicVPN, |&lt;BR /&gt;| | | | |NatTraversal,AES-XCBC,SHA256, |&lt;BR /&gt;| | | | |SHA384,SHA512 |&lt;BR /&gt;+---------------------------------------------------------------------------------+&lt;/P&gt;&lt;P&gt;Accept Templates : disabled by Firewall&lt;BR /&gt;Layer Policy_Corporate_2020 Security disables template offloads from rule #364&lt;BR /&gt;Throughput acceleration still enabled.&lt;BR /&gt;Drop Templates : enabled&lt;BR /&gt;NAT Templates : disabled by Firewall&lt;BR /&gt;Layer Policy_Corporate_2020 Security disables template offloads from rule #364&lt;BR /&gt;Throughput acceleration still enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2022 12:57:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/142686#M22108</guid>
      <dc:creator>RichUK</dc:creator>
      <dc:date>2022-03-01T12:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/142698#M22115</link>
      <description>&lt;P&gt;Check how your Threat Prevention policy is configured for the Anti-bot blade; it should only be scanning traffic to and from the Internet otherwise its reputational checks (which can't be performed by SecureXL) will keep your conns/sec (Accept templates) value very low or even zero.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You probably have a DCE-based service in rule 364 that is halting templating, try to move that service/rule as far down in your rulebase as possible which should improve the templating rate.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2022 14:43:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/142698#M22115</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-03-01T14:43:21Z</dc:date>
    </item>
    <item>
      <title>Re: CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/142707#M22118</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The IPS policy's were configured by the previous admin and I'll be honest I don't quite understand how it has been done. Below is both the AV &amp;amp; AntiBot and the IPS only&lt;/P&gt;&lt;P&gt;Yeah we have 3x DCE-based rules at the end of the ruleset before the final drop rule.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AntiBot.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15543i02C487DA01A1B935/image-size/large?v=v2&amp;amp;px=999" role="button" title="AntiBot.jpg" alt="AntiBot.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IPS.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15544iD2D4360F4DD5CED6/image-size/large?v=v2&amp;amp;px=999" role="button" title="IPS.jpg" alt="IPS.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2022 15:53:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/142707#M22118</guid>
      <dc:creator>RichUK</dc:creator>
      <dc:date>2022-03-01T15:53:07Z</dc:date>
    </item>
    <item>
      <title>Re: CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/142832#M22137</link>
      <description>&lt;P&gt;Yeah that AV &amp;amp; ABOT layer is tanking your conns/sec templating rate, especially the last rule.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Make sure that zone "ExternalZone" is associated with your firewall's external interface (it should be by default but double-check it),&amp;nbsp; then I'd recommend disabling all rules in that AV &amp;amp; ABOT layer and adding a new rule like this:&lt;/P&gt;
&lt;P&gt;Protected Scope: ExternalZone&lt;/P&gt;
&lt;P&gt;Action: _AV_ABOT&lt;/P&gt;
&lt;P&gt;Track: All Options&lt;/P&gt;
&lt;P&gt;Install On: Policy Targets&lt;/P&gt;
&lt;P&gt;Keep in mind that your _AV_ABOT profile will have additional settings for AV that control whether it happens inbound or outbound or both, may want to verify those to ensure they meet your requirements.&amp;nbsp; Once implemented and installed immediately visit &lt;A href="http://cpcheckme.com" target="_blank" rel="noopener"&gt;http://cpcheckme.com&lt;/A&gt;&amp;nbsp;through the firewall and run all tests to verify that AB and AV are still working the way you expect.&lt;/P&gt;
&lt;P&gt;Next run &lt;STRONG&gt;fwaccel stats -r&lt;/STRONG&gt; to clear acceleration statistics, wait an hour or two then check again with &lt;STRONG&gt;fwaccel stats -s&lt;/STRONG&gt;.&amp;nbsp; Conns/sec templating rate should be much better assuming there is not something else present that is killing templating.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 18:39:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/142832#M22137</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-03-02T18:39:08Z</dc:date>
    </item>
    <item>
      <title>Re: CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/143159#M22200</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your reply. I have added the rule and disabled the existing rules and it is still the same after resetting the counters and waiting 5 hours. I double checked the ExternalZone and it is set correctly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Accelerated conns/Total conns : 1193/80419 (1%)&lt;BR /&gt;Accelerated pkts/Total pkts : 2186324413/2246496761 (97%)&lt;BR /&gt;F2Fed pkts/Total pkts : 60172348/2246496761 (2%)&lt;BR /&gt;F2V pkts/Total pkts : 17591725/2246496761 (0%)&lt;BR /&gt;CPASXL pkts/Total pkts : 217954332/2246496761 (9%)&lt;BR /&gt;PSLXL pkts/Total pkts : 1808730847/2246496761 (80%)&lt;BR /&gt;CPAS pipeline pkts/Total pkts : 0/2246496761 (0%)&lt;BR /&gt;PSL pipeline pkts/Total pkts : 0/2246496761 (0%)&lt;BR /&gt;CPAS inline pkts/Total pkts : 0/2246496761 (0%)&lt;BR /&gt;PSL inline pkts/Total pkts : 0/2246496761 (0%)&lt;BR /&gt;QOS inbound pkts/Total pkts : 0/2246496761 (0%)&lt;BR /&gt;QOS outbound pkts/Total pkts : 0/2246496761 (0%)&lt;BR /&gt;Corrected pkts/Total pkts : 0/2246496761 (0%)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="antibot.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15621iAF0304693856C156/image-size/large?v=v2&amp;amp;px=999" role="button" title="antibot.jpg" alt="antibot.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 16:14:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/143159#M22200</guid>
      <dc:creator>RichUK</dc:creator>
      <dc:date>2022-03-07T16:14:11Z</dc:date>
    </item>
    <item>
      <title>Re: CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/143161#M22202</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/63174"&gt;@RichUK&lt;/a&gt;&amp;nbsp;...I apologize if I mention something that was already discussed before, but 2 things came to my mind when I read your post.&lt;/P&gt;
&lt;P&gt;1) I know there used to be an option to check under office mode section on gateway (cluster) properties to support multiple external interfaces, and I know this helped solve the issue with lots of customers in the past, even if they had only single external interface configured. Now, I looked in my R81.10 lab and it seems that CP took that option away, but maybe someone from CP can confirm if it was moved somewhere else.&lt;/P&gt;
&lt;P&gt;and&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) Just wondering, did you ever try running capture on port 18234 (tunnel test) when this happens with any given user? From expert mode, just run fw monitor -e "accept port(18234);" and see what you get.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 17:55:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/143161#M22202</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-03-07T17:55:18Z</dc:date>
    </item>
    <item>
      <title>Re: CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/143268#M22242</link>
      <description>&lt;P&gt;It is probably something in your Threat Prevention config that is tanking the templating, to verify this try the following (note that doing this will subject your organization to attacks during the test period - use at your own risk!):&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;fw amw unload&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;fwaccel stats -r&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;(wait 5 minutes)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;fwaccel stats -s&lt;/STRONG&gt; (is templating [conns/sec] rate much better?)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;fw amw fetch local&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If the templating rate gets much better during the test period it is definitely something in your TP configuration.&amp;nbsp; If it doesn't improve the issue lies elsewhere and will probably require a TAC case to figure out where it is.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 16:06:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/143268#M22242</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-03-08T16:06:05Z</dc:date>
    </item>
    <item>
      <title>Re: CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/168192#M30419</link>
      <description>&lt;P&gt;Hi, I hate when people post forum problems and then never reply when it is resolved, I just realised I did this.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The short answer is that it was IPS enabled with a protected scope of Any, and Content Awareness.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The long answer involves a fluke. We were having real issues with dropouts, and we just couldn't figure it out. One day, monitoring the CPU processes, we noticed a spike with users saying they are losing connectivity. Apologies, but I can’t remember the exact details, but the process pointed to IPS inspection using the IP of an interface that is connected to our community network, but it still goes through the corporate firewall. I asked the Desktop team if they were doing any work at the libraries, and they were imaging computers, and the image server was connected to another network on the firewall. This was the lightbulb moment. Looking at the IPS ruleset (configured by ex-employee) the IPS protected scope was set to Any. I changed the scope to our external IP range and instantly the CPU % dropped.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Everything was fine for a couple of days, but then suddenly the CPU spiked again and many of our user’s lost connectivity. Again, monitor the IP address causing the spike, it was still coming from the community network. This time the process was associated with Content Awareness. We removed CA from the ruleset, and we have not had a problem since. 10 months now. The firewalls spiked inspecting PDF’s downloading off the internet. Check Point supported wanted to enable CA again to try to understand the issue, but after months of disconnections, we decided to not enable it.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2023 12:19:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/168192#M30419</guid>
      <dc:creator>RichUK</dc:creator>
      <dc:date>2023-01-18T12:19:50Z</dc:date>
    </item>
    <item>
      <title>Re: CPU Spikes Since January and VPN Disconnections</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/168203#M30424</link>
      <description>&lt;P&gt;Thanks a lot mate for letting us know. So interesting you mentioned CA blade, as I worked with customer that had soooo many issues with it. We were able to finally fix all of them after working with escalations for 2 months or so. Glad its all working for you know.&lt;/P&gt;
&lt;P&gt;Cheers.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2023 13:34:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-Spikes-Since-January-and-VPN-Disconnections/m-p/168203#M30424</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-01-18T13:34:08Z</dc:date>
    </item>
  </channel>
</rss>

