<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: https inspection performance issue - F2F traffic 82%.. in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/171247#M31056</link>
    <description>&lt;P&gt;An IPS ThreatCloud Protection, Core Activation, or even an Inspection Setting is calling for inspection that must occur in the Medium Path which is preventing full acceleration; it has nothing to do with HTTPS Inspection beyond making the decrypted traffic available to be scanned by the IPS blade.&amp;nbsp; Any signature with a Performance Impact of Medium/High/Critical could be causing it.&amp;nbsp; You could use fast_accel to force this traffic into the fully-accelerated path if you want&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk156672&amp;amp;partition=Advanced&amp;amp;product=SecureXL" target="_blank" rel="noopener"&gt;sk156672: SecureXL Fast Accelerator (fw fast_accel) for R80.20 and above&lt;/A&gt;.&amp;nbsp; If you have stopped IPS with the &lt;STRONG&gt;ips off&lt;/STRONG&gt; command and the traffic is still not accelerated in your debug, it is likely an Inspection Setting that is the culprit.&lt;/P&gt;</description>
    <pubDate>Thu, 23 Feb 2023 12:59:55 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2023-02-23T12:59:55Z</dc:date>
    <item>
      <title>https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170468#M31025</link>
      <description>&lt;P&gt;we have 2x open server in cluster XL r81 with a 4x cpu license&lt;/P&gt;&lt;P&gt;running &lt;A href="https://openspeedtest.com/" target="_blank"&gt;https://openspeedtest.com/&lt;/A&gt; (run on https) we notice an important drop in terms of performance,&amp;nbsp;instead of 450-500 mbps that we get from a standard speedtest liko ookla that run on port 8080 the performance drops to max 150 mbps&lt;/P&gt;&lt;P&gt;we investigate the https inspection module but we do not understand the following behaviour.&lt;/P&gt;&lt;P&gt;1) if we create a rule in first position that bypass the entire https inspection for a specific host openspeedtest run at 450 mbps but if we insert the same host in a rule in position 5 that bypass the https inspection if you're member of a group of hosts the same host run at 150 mbps.&lt;/P&gt;&lt;P&gt;To note that in both case&amp;nbsp;the url &lt;A href="https://openspeedtest.com/" target="_blank"&gt;https://openspeedtest.com/&lt;/A&gt; is bypassed due his categorization..&lt;/P&gt;&lt;P&gt;how is possible such a performance drop based on the https rule position?&lt;/P&gt;&lt;P&gt;why there's such a drop considering that this service is not even inspected?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we did some debug and we notice that lot's of traffic is goes through F2F below some usefull outputs.&lt;/P&gt;&lt;P&gt;any suggestions? tx&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@checkpoint-1:0]# fwaccel stats -s&lt;BR /&gt;Accelerated conns/Total conns : 135/1570 (8%)&lt;BR /&gt;Accelerated pkts/Total pkts : 13101094681/73808428002 (17%)&lt;BR /&gt;F2Fed pkts/Total pkts : 60707333321/73808428002 (82%)&lt;BR /&gt;F2V pkts/Total pkts : 65943865/73808428002 (0%)&lt;BR /&gt;CPASXL pkts/Total pkts : 16454023/73808428002 (0%)&lt;BR /&gt;PSLXL pkts/Total pkts : 12372846626/73808428002 (16%)&lt;BR /&gt;CPAS pipeline pkts/Total pkts : 0/73808428002 (0%)&lt;BR /&gt;PSL pipeline pkts/Total pkts : 0/73808428002 (0%)&lt;BR /&gt;CPAS inline pkts/Total pkts : 0/73808428002 (0%)&lt;BR /&gt;PSL inline pkts/Total pkts : 0/73808428002 (0%)&lt;BR /&gt;QOS inbound pkts/Total pkts : 0/73808428002 (0%)&lt;BR /&gt;QOS outbound pkts/Total pkts : 0/73808428002 (0%)&lt;BR /&gt;Corrected pkts/Total pkts : 0/73808428002 (0%)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[Expert@checkpoint-1:0]# fwaccel stat&lt;BR /&gt;+---------------------------------------------------------------------------------+&lt;BR /&gt;|Id|Name |Status |Interfaces |Features |&lt;BR /&gt;+---------------------------------------------------------------------------------+&lt;BR /&gt;|0 |SND |enabled |eth4,eth5,eth0,eth6,eth3 |Acceleration,Cryptography |&lt;BR /&gt;| | | | | |&lt;BR /&gt;| | | | |Crypto: Tunnel,UDPEncap,MD5, |&lt;BR /&gt;| | | | |SHA1,3DES,DES,AES-128,AES-256,|&lt;BR /&gt;| | | | |ESP,LinkSelection,DynamicVPN, |&lt;BR /&gt;| | | | |NatTraversal,AES-XCBC,SHA256, |&lt;BR /&gt;| | | | |SHA384,SHA512 |&lt;BR /&gt;+---------------------------------------------------------------------------------+&lt;/P&gt;&lt;P&gt;Accept Templates : enabled&lt;BR /&gt;Drop Templates : enabled&lt;BR /&gt;NAT Templates : enabled&lt;BR /&gt;[Expert@checkpoint-1:0]#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@checkpoint-1:0]# fwaccel stats&lt;BR /&gt;Name Value Name Value&lt;BR /&gt;---------------------------- ------------ ---------------------------- ------------&lt;/P&gt;&lt;P&gt;Accelerated Path&lt;BR /&gt;--------------------------------------------------------------------------------------&lt;BR /&gt;accel packets 13105476237 accel bytes 9576220636092&lt;BR /&gt;outbound packets 13306779203 outbound bytes 9868235245852&lt;BR /&gt;conns created 65305430 conns deleted 65304144&lt;BR /&gt;C total conns 1286 C TCP conns 478&lt;BR /&gt;C non TCP conns 808 nat conns 31963228&lt;BR /&gt;dropped packets 2907232 dropped bytes 629465065&lt;BR /&gt;fragments received 1831431 fragments transmit 1126&lt;BR /&gt;fragments dropped 0 fragments expired 111439&lt;BR /&gt;IP options stripped 374709 IP options restored 115724&lt;BR /&gt;IP options dropped 0 corrs created 0&lt;BR /&gt;corrs deleted 0 C corrections 0&lt;BR /&gt;corrected packets 0 corrected bytes 0&lt;/P&gt;&lt;P&gt;Accelerated VPN Path&lt;BR /&gt;--------------------------------------------------------------------------------------&lt;BR /&gt;C crypt conns 115 enc bytes 201667504&lt;BR /&gt;dec bytes 682230912 ESP enc pkts 528421&lt;BR /&gt;ESP enc err 0 ESP dec pkts 708080&lt;BR /&gt;ESP dec err 0 ESP other err 0&lt;BR /&gt;espudp enc pkts 0 espudp enc err 0&lt;BR /&gt;espudp dec pkts 0 espudp dec err 0&lt;BR /&gt;espudp other err 0&lt;/P&gt;&lt;P&gt;Medium Streaming Path&lt;BR /&gt;--------------------------------------------------------------------------------------&lt;BR /&gt;CPASXL packets 16454121 PSLXL packets 12377039895&lt;BR /&gt;CPASXL async packets 16454023 PSLXL async packets 12376375499&lt;BR /&gt;CPASXL bytes 16508578013 PSLXL bytes 8937294264245&lt;BR /&gt;C CPASXL conns 3 C PSLXL conns 1157&lt;BR /&gt;CPASXL conns created 50783 PSLXL conns created 64697868&lt;BR /&gt;PXL FF conns 0 PXL FF packets 29416&lt;BR /&gt;PXL FF bytes 23581461 PXL FF acks 12056&lt;BR /&gt;PXL no conn drops 0&lt;/P&gt;&lt;P&gt;Pipeline Streaming Path&lt;BR /&gt;--------------------------------------------------------------------------------------&lt;BR /&gt;PSL Pipeline packets 0 PSL Pipeline bytes 0&lt;BR /&gt;CPAS Pipeline packets 0 CPAS Pipeline bytes 0&lt;/P&gt;&lt;P&gt;Inline Streaming Path&lt;BR /&gt;--------------------------------------------------------------------------------------&lt;BR /&gt;PSL Inline packets 0 PSL Inline bytes 0&lt;BR /&gt;CPAS Inline packets 0 CPAS Inline bytes 0&lt;/P&gt;&lt;P&gt;Buffer Path&lt;BR /&gt;--------------------------------------------------------------------------------------&lt;BR /&gt;Buffer path buffers 0 Buffer path bytes 0&lt;/P&gt;&lt;P&gt;TLS PARSER&lt;BR /&gt;--------------------------------------------------------------------------------------&lt;BR /&gt;RECORD INFO 0&lt;/P&gt;&lt;P&gt;TLS DECRYPT&lt;BR /&gt;--------------------------------------------------------------------------------------&lt;BR /&gt;TLS INSPECTION 0 TLS HANDSHAKE 0&lt;BR /&gt;TLS RECORD LAYER 0 TLS CRYPTO 0&lt;/P&gt;&lt;P&gt;HTTP DISP&lt;BR /&gt;--------------------------------------------------------------------------------------&lt;BR /&gt;ACTIVATE WS MAIN 0 EXEC NO HTTP CMI CONTEXT 0&lt;/P&gt;&lt;P&gt;WS LITE&lt;BR /&gt;--------------------------------------------------------------------------------------&lt;BR /&gt;WS TX COMPLETED 0 WS FORWARD TO MAIN 0&lt;BR /&gt;WS NOTIFY TIMEOUT 0 WS HANDLE EVENT 0&lt;BR /&gt;WS CHUNKED ERROR 0 WS GZIP EVENT 0&lt;BR /&gt;WS ADD MAC HEADER 0 WS IS STICKY ACTIVE 0&lt;BR /&gt;WS TIER1 JOB ERROR 0 WS TIER1 HAS MATCHES 0&lt;BR /&gt;CML MATCHES 0 TOTAL UPLOADED JOBS 0&lt;BR /&gt;TOTAL JOBS 0&lt;/P&gt;&lt;P&gt;ADVP&lt;BR /&gt;--------------------------------------------------------------------------------------&lt;BR /&gt;ADVP FORW TO MAIN 0 ADVP HOLD TIMEOUT 0&lt;/P&gt;&lt;P&gt;QoS Paths&lt;BR /&gt;--------------------------------------------------------------------------------------&lt;BR /&gt;QoS General Information:&lt;BR /&gt;------------------------&lt;BR /&gt;Total QoS Conns 0 QoS Classify Conns 0&lt;BR /&gt;QoS Classify flow 0 Reclassify QoS policy 0&lt;/P&gt;&lt;P&gt;FireWall QoS Path:&lt;BR /&gt;------------------&lt;BR /&gt;Enqueued IN packets 0 Enqueued OUT packets 0&lt;BR /&gt;Dequeued IN packets 0 Dequeued OUT packets 0&lt;BR /&gt;Enqueued IN bytes 0 Enqueued OUT bytes 0&lt;BR /&gt;Dequeued IN bytes 0 Dequeued OUT bytes 0&lt;/P&gt;&lt;P&gt;Accelerated QoS Path:&lt;BR /&gt;---------------------&lt;BR /&gt;Enqueued IN packets 0 Enqueued OUT packets 0&lt;BR /&gt;Dequeued IN packets 0 Dequeued OUT packets 0&lt;BR /&gt;Enqueued IN bytes 0 Enqueued OUT bytes 0&lt;BR /&gt;Dequeued IN bytes 0 Dequeued OUT bytes 0&lt;/P&gt;&lt;P&gt;Firewall Path&lt;BR /&gt;--------------------------------------------------------------------------------------&lt;BR /&gt;F2F packets 60736129970 F2F bytes 50320444505511&lt;BR /&gt;TCP violations 16 F2V conn match pkts 703989&lt;BR /&gt;F2V packets 65971694 F2V bytes 5570164544&lt;/P&gt;&lt;P&gt;GTP&lt;BR /&gt;--------------------------------------------------------------------------------------&lt;BR /&gt;gtp tunnels created 0 gtp tunnels 0&lt;BR /&gt;gtp accel pkts 0 gtp f2f pkts 0&lt;BR /&gt;gtp spoofed pkts 0 gtp in gtp pkts 0&lt;BR /&gt;gtp signaling pkts 0 gtp tcpopt pkts 0&lt;BR /&gt;gtp apn err pkts 0&lt;/P&gt;&lt;P&gt;General&lt;BR /&gt;--------------------------------------------------------------------------------------&lt;BR /&gt;memory used 103915120 C tcp handshake conns 14&lt;BR /&gt;C tcp established conns 454 C tcp closed conns 10&lt;BR /&gt;C tcp pxl handshake conns 14 C tcp pxl established conns 351&lt;BR /&gt;C tcp pxl closed conns 10 DNS DoR stats 291&lt;/P&gt;&lt;P&gt;(*) Statistics marked with C refer to current value, others refer to total value&lt;/P&gt;&lt;P&gt;[Expert@checkpoint-1:0]#&lt;/P&gt;&lt;P&gt;ragione del non accelerazione&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[Expert@checkpoint-1:0]# fwaccel stats -p&lt;BR /&gt;F2F packets:&lt;BR /&gt;--------------&lt;BR /&gt;Violation Packets Violation Packets&lt;BR /&gt;-------------------- --------------- -------------------- ---------------&lt;BR /&gt;Pkt has IP options 374766 ICMP miss conn 249518305&lt;BR /&gt;TCP-SYN miss conn 215843802 TCP-other miss conn 29156577762&lt;BR /&gt;UDP miss conn 920603464 Other miss conn 5798272&lt;BR /&gt;VPN returned F2F 128716 Uni-directional viol 0&lt;BR /&gt;Possible spoof viol 0 TCP state viol 547&lt;BR /&gt;SCTP state affecting 0 Out if not def/accl 0&lt;BR /&gt;Bridge src=dst 0 Routing decision err 0&lt;BR /&gt;Sanity checks failed 0 Fwd to non-pivot 0&lt;BR /&gt;Broadcast/multicast 0 Cluster message 109434977&lt;BR /&gt;Cluster forward 635 Chain forwarding 0&lt;BR /&gt;F2V conn match pkts 705245 General reason 0&lt;BR /&gt;Route changes 0 VPN multicast traffic 0&lt;BR /&gt;GTP non-accelerated 0 Unresolved nexthop 38438&lt;BR /&gt;[Expert@checkpoint-1:0]# fwaccel stats -t&lt;BR /&gt;F2Fed bytes/Total bytes : 50329254032099/59906647972752 (84%)&lt;BR /&gt;F2V bytes/Total bytes : 5571144798/59906647972752 (0%)&lt;BR /&gt;Medium path bytes/Total bytes : 8954924374718/59906647972752 (14%)&lt;BR /&gt;Pipeline path bytes/Total bytes : 0/59906647972752 (0%)&lt;BR /&gt;Inline path bytes/Total bytes : 0/59906647972752 (0%)&lt;BR /&gt;Buffer path bytes/Total inline bytes: 0/0 (0%)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@checkpoint-1:0]# fwaccel stats -p&lt;BR /&gt;F2F packets:&lt;BR /&gt;--------------&lt;BR /&gt;Violation Packets Violation Packets&lt;BR /&gt;-------------------- --------------- -------------------- ---------------&lt;BR /&gt;Pkt has IP options 408329 ICMP miss conn 272317499&lt;BR /&gt;TCP-SYN miss conn 239969254 TCP-other miss conn 31278648253&lt;BR /&gt;UDP miss conn 1009197422 Other miss conn 6353935&lt;BR /&gt;VPN returned F2F 129009 Uni-directional viol 0&lt;BR /&gt;Possible spoof viol 0 TCP state viol 634&lt;BR /&gt;SCTP state affecting 0 Out if not def/accl 0&lt;BR /&gt;Bridge src=dst 0 Routing decision err 0&lt;BR /&gt;Sanity checks failed 0 Fwd to non-pivot 0&lt;BR /&gt;Broadcast/multicast 0 Cluster message 119931860&lt;BR /&gt;Cluster forward 635 Chain forwarding 0&lt;BR /&gt;F2V conn match pkts 1053535 General reason 0&lt;BR /&gt;Route changes 0 VPN multicast traffic 0&lt;BR /&gt;GTP non-accelerated 0 Unresolved nexthop 62227&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@checkpoint-1:0]# fw ctl affinity -l -r&lt;BR /&gt;CPU 0:&lt;BR /&gt;CPU 1: fw_1 (active)&lt;BR /&gt;mpdaemon fwd rad lpd rtmd wsdnsd in.asessiond core_uploader cprid usrchkd vpnd in.acapd pepd pdpd cprid cpd&lt;BR /&gt;CPU 2:&lt;BR /&gt;CPU 3:&lt;BR /&gt;CPU 4:&lt;BR /&gt;CPU 5:&lt;BR /&gt;CPU 6:&lt;BR /&gt;CPU 7:&lt;BR /&gt;CPU 8:&lt;BR /&gt;CPU 9: fw_0 (active)&lt;BR /&gt;mpdaemon fwd rad lpd rtmd wsdnsd in.asessiond core_uploader cprid usrchkd vpnd in.acapd pepd pdpd cprid cpd&lt;BR /&gt;CPU 10:&lt;BR /&gt;CPU 11:&lt;BR /&gt;CPU 12:&lt;BR /&gt;CPU 13:&lt;BR /&gt;CPU 14:&lt;BR /&gt;CPU 15:&lt;BR /&gt;All:&lt;BR /&gt;The current license permits the use of CPUs 0, 1, 8, 9 only.&lt;BR /&gt;Interface eth4: has multi queue enabled&lt;BR /&gt;Interface eth5: has multi queue enabled&lt;BR /&gt;Interface eth0: has multi queue enabled&lt;BR /&gt;Interface eth6: has multi queue enabled&lt;BR /&gt;Interface eth3: has multi queue enabled&lt;BR /&gt;[Expert@checkpoint-1:0]# fw ctl multik stat&lt;BR /&gt;ID | Active | CPU | Connections | Peak&lt;BR /&gt;----------------------------------------------&lt;BR /&gt;0 | Yes | 9 | 5940 | 11921&lt;BR /&gt;1 | Yes | 1 | 6379 | 13536&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@checkpoint-1:0]# enabled_blades&lt;BR /&gt;fw vpn urlf av appi ips identityServer SSL_INSPECT anti_bot mon&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 15:29:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170468#M31025</guid>
      <dc:creator>andy_currigan</dc:creator>
      <dc:date>2023-02-06T15:29:38Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170517#M31026</link>
      <description>&lt;P&gt;You said R81, what JHF level?&lt;BR /&gt;The fact you see this issue when you put the host in Rule 5 (versus as a separate rule up top) suggests that the rules before Rule 5 are potentially problematic.&lt;BR /&gt;Please provide the precise rules used in your HTTPS Inspection policy (specifically up to and including Rule 5)..&lt;/P&gt;
&lt;P&gt;Note that, in general, bypass rules should be listed first.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 22:30:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170517#M31026</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-02-06T22:30:09Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170522#M31027</link>
      <description>&lt;P&gt;Recommend reviewing HTTPS inspection policy structure per the recommendations &lt;A href="https://community.checkpoint.com/t5/Management/HTTPS-Inspection-Setup/m-p/127750/highlight/true#M27820" target="_self"&gt;here&lt;/A&gt; &amp;amp; &lt;A href="https://community.checkpoint.com/t5/Management/HTTPS-Inspection-Policy-Rule-Order/m-p/128681#M27952" target="_self"&gt;here&lt;/A&gt; to start.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Refer also:&lt;/P&gt;
&lt;P&gt;sk98871 : HTTP-based speed test shows strong degradation in download speed when Anti-Virus is set to inspect all HTTP and HTTPS traffic&lt;/P&gt;
&lt;P&gt;sk163595 : HTTPS Inspection bypass list object&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 23:41:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170522#M31027</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-02-06T23:41:08Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170529#M31028</link>
      <description>&lt;P&gt;As Chris said you must follow the rules order precisely as specified in those two links.&amp;nbsp; The reason it is so important to have the rules in the correct order is due to the two-pass matching on the HTTPS Inspection policy.&amp;nbsp; The first pass happens with the first packet of a new connection based on just IP addresses and ports.&amp;nbsp; If a matching bypass rule can be found with this limited information (no domains/sites/categories allowed before any matching bypass rule here) active streaming is avoided and the connection can be passively streamed in the medium path or even fully accelerated by SecureXL.&lt;/P&gt;
&lt;P&gt;If a matching Bypass cannot be found in the first pass, active streaming must be invoked to determine domain/site/category in the next few packets of the connection which incurs significant overhead, then the second pass occurs.&lt;/P&gt;
&lt;P&gt;Are you sure you didn't run that &lt;STRONG&gt;fwaccel stats -s&lt;/STRONG&gt; command on the standby member of your cluster?&amp;nbsp; High F2F is expected there.&amp;nbsp; HTTPS Inspection alone should not cause high F2F on the active member, something else is causing that, probably IPS.&amp;nbsp; Try the &lt;STRONG&gt;fw tab -f -u -z -t connections&lt;/STRONG&gt; command to see exclusively what connections are F2F and what they have in common.&amp;nbsp; If that doesn't work try &lt;STRONG&gt;fw_streaming path slow&lt;/STRONG&gt; (not sure on syntax there, typing all this on my phone).&amp;nbsp; It looks like the main F2F violation causing the high F2F is "TCP other miss conn".&amp;nbsp; Too generic so a debug must be run to find reason for F2F.&lt;/P&gt;
&lt;P&gt;Everything I just posted is described and executed in labs (including the F2F debug) in my new live&amp;nbsp;&lt;A href="http://www.maxpowerfirewalls.com" target="_blank" rel="noopener"&gt;R81.20 Gateway Performance Optimization class.&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 02:19:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170529#M31028</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-02-07T02:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170701#M31029</link>
      <description>&lt;P&gt;r81 take 77&lt;/P&gt;&lt;P&gt;the problem seems not related to the https rules order.&amp;nbsp;the rule set is very simple with rules 1 to 5 that bypass several hosts by source, by destination ip or by url then we have an ispection rule for some dangerous categories and at the end the bypass for any as suggested in the following link&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Management/HTTPS-Inspection-Setup/m-p/127750/highlight/true#M27820" target="_blank"&gt;Solved: Re: HTTPS Inspection Setup - Check Point CheckMates&lt;/A&gt;&lt;/P&gt;&lt;P&gt;the problem cause seems related to the high percentage of traffic that pass through the slow path.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 11:47:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170701#M31029</guid>
      <dc:creator>andy_currigan</dc:creator>
      <dc:date>2023-02-08T11:47:13Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170702#M31030</link>
      <description>&lt;P&gt;the problem seems not related to the https rules order.&amp;nbsp;the rule set is very simple with rules 1 to 5 that bypass several hosts by source, by destination ip or by url then we have an ispection rule for some dangerous categories and at the end the bypass for any as suggested in the following link&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Management/HTTPS-Inspection-Setup/m-p/127750/highlight/true#M27820" target="_blank" rel="noopener"&gt;Solved: Re: HTTPS Inspection Setup - Check Point CheckMates&lt;/A&gt;&lt;/P&gt;&lt;P&gt;the problem cause seems related to the high percentage of traffic that pass through the slow path.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 11:48:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170702#M31030</guid>
      <dc:creator>andy_currigan</dc:creator>
      <dc:date>2023-02-08T11:48:29Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170705#M31031</link>
      <description>&lt;P&gt;sk32578 describes common scenarios causing F2F traffic processing e.g. PPPoE connections and the use of certain object types / IPS protections (sk105079) etc.&lt;/P&gt;
&lt;P&gt;As Tim said high F2F stats are also expected on a standby member of a cluster.&lt;/P&gt;
&lt;P&gt;SQLNET2 traffic may also be a factor per&amp;nbsp;&lt;SPAN&gt;sk179919.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 12:26:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170705#M31031</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-02-08T12:26:02Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170716#M31032</link>
      <description>&lt;P&gt;As I mentioned earlier HTTPS Inspection by itself does not typically cause high F2F.&amp;nbsp; It is almost certainly due to the configuration of your IPS blade.&amp;nbsp; Try the following technique which is mentioned in my &lt;A href="http://www.maxpowerfirewalls.com" target="_blank" rel="noopener"&gt;Gateway Performance Optimization Course&lt;/A&gt; during your firewall's busiest period if possible, keeping in mind doing so may expose your organization to attacks, use at your own risk!&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;fwaccel stats -s&lt;/STRONG&gt; (note F2F percentage)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ips off -n&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;fwaccel stats -r&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;(wait 120 seconds)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;fwaccel stats -s&lt;/STRONG&gt; (has F2F dropped substantially?&amp;nbsp; If so IPS is to blame)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ips on&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 12:57:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170716#M31032</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-02-08T12:57:40Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170757#M31033</link>
      <description>&lt;P&gt;Not trying to hijack your post but to add that I am having a similar issue and might be related.&lt;/P&gt;&lt;P&gt;Env:&lt;BR /&gt;Maestro R81.10 JHF 78&lt;/P&gt;&lt;P&gt;Mostly all blades enabled AND HTTPSi&lt;/P&gt;&lt;P&gt;Issue:&lt;/P&gt;&lt;P&gt;Usually F2F 95%&lt;/P&gt;&lt;P&gt;Have unloaded amw policy and checked stats and it certainly decreases, but F2F still around 65%, too much.&lt;/P&gt;&lt;P&gt;Main violation is TCP-other miss conn&lt;/P&gt;&lt;P&gt;In cpview, offload decision says SPII Active&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Run debug:&lt;/P&gt;&lt;P&gt;fwaccel dbg + offload&lt;/P&gt;&lt;P&gt;fwaccel dbg + pkt + f2f&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And I see:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;;cphwd_chain_to_vm_connkey: obtained vm_connkey &amp;lt;dir 1, x:58180 -&amp;gt; x:443 IPP 6&amp;gt;;&lt;BR /&gt;@;235926526; 8Feb2023 15:47:37.404890;[vs_0];[tid_2];[fw4_2];cphwd_chain_to_vm_connkey: obtained vm_connkey &amp;lt;dir 1, x:58180 -&amp;gt; 52.97.211.226:443 IPP 6&amp;gt;;&lt;BR /&gt;@;235926526; 8Feb2023 15:47:37.404895;[vs_0];[tid_2];[fw4_2];cpxl_chain_handler: entered (conn &amp;lt;dir 0, 10.x7:58180 -&amp;gt; 52.x6:443 IPP 6&amp;gt;);&lt;BR /&gt;@;235926526; 8Feb2023 15:47:37.404897;[vs_0];[tid_2];[fw4_2];cphwd_is_conn_already_offloaded: conn_already_offloaded=0, reoffload_conn=0, created_from_template=0, policy_id=354827077, up_policy_id=1675859405;&lt;BR /&gt;@;235926526; 8Feb2023 15:47:37.404898;[vs_0];[tid_2];[fw4_2];cphwd_chain_to_vm_connkey: obtained vm_connkey &amp;lt;dir 1, 1x:58180 -&amp;gt; 52.x:443 IPP 6&amp;gt;;&lt;BR /&gt;@;235926526; 8Feb2023 15:47:37.404900;[vs_0];[tid_2];[fw4_2];cphwd_is_non_accelerated_conn: entered...orig_conn=&amp;lt;dir 0, 1x:58180 -&amp;gt; 52.x:443 IPP 6&amp;gt;, vm_conn=&amp;lt;dir 1, 10.x7:58180 -&amp;gt; 52.9x:443 IPP 6&amp;gt;;&lt;BR /&gt;@;235926526; 8Feb2023 15:47:37.404903;[vs_0];[tid_2];[fw4_2];&lt;STRONG&gt;cphwd_conn_should_accelerate_by_features: spii is active -&amp;gt; not offloading;&lt;/STRONG&gt;&lt;BR /&gt;@;235926526; 8Feb2023 15:47:37.404904;[vs_0];[tid_2];[fw4_2];cphwd_handle_conn_acceleration: cphwd_conn_should_accelerate_by_features - not accelerating;&lt;BR /&gt;@;235926526; 8Feb2023 15:47:37.404912;[vs_0];[tid_2];[fw4_2];cpxl_chain_handler: connection &amp;lt;dir 0, x58180 -&amp;gt; 5x6:443 IPP 6&amp;gt; will not be accelerated;&lt;BR /&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;and then for return traffic:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;;pkt_handle_no_match: connection &amp;lt;52.x,443,10.x,55119,6&amp;gt; not found -&amp;gt; forwarding to firewall;&lt;BR /&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Flags for slow connections if it means anything to somebody&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;Path: Slow, InZone: INTERNAL_ZONE, OutZone: EXTERNAL_ZONE, Flags: 0x4b01&lt;BR /&gt;C2S side:&lt;BR /&gt;TCP State: PSL_TCP_ESTABLISHED, Number of segments: 0, Hold: 0, Side flags: 0x2c4&lt;BR /&gt;S2C side:&lt;BR /&gt;TCP State: PSL_TCP_ESTABLISHED, Number of segments: 0, Hold: 0, Side flags: 0x2c4&lt;BR /&gt;Application info:&lt;BR /&gt;MUX_PASSIVE, Flags: 0x13&lt;BR /&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;BR /&gt;Connection matches an HTTPSi bypass rule as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently with TAC but still early stages.. they are still beating around the bush&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 16:35:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170757#M31033</guid>
      <dc:creator>Machine_Head</dc:creator>
      <dc:date>2023-02-08T16:35:33Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170758#M31034</link>
      <description>&lt;P&gt;SPII = IPS.&lt;/P&gt;
&lt;P&gt;Amw unload does not stop IPS.&amp;nbsp; After ips off -n and stats reset you may need to wait longer if you have long running connections as they will continue F2F until they end.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 16:35:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170758#M31034</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-02-08T16:35:34Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170761#M31035</link>
      <description>&lt;P&gt;Any debug or way to find out the protection causing it?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 16:45:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170761#M31035</guid>
      <dc:creator>Machine_Head</dc:creator>
      <dc:date>2023-02-08T16:45:25Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170763#M31036</link>
      <description>&lt;P&gt;Hello Tim,&lt;/P&gt;
&lt;P&gt;i've got list of F2F connections by executing&amp;nbsp;f&lt;STRONG&gt;w tab -t connections -z&lt;/STRONG&gt; (altough seems to display not only F2F because of no value under Not Offloaded Reason); how can i easily identify most impacting connections?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS:&amp;nbsp;&lt;STRONG&gt;fw_streaming path slow&lt;/STRONG&gt; seems to be very fantasious, no way to guess correct syntax &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;and&amp;nbsp;&lt;/P&gt;
&lt;P&gt;fw tab -f -u -z -t connections&lt;BR /&gt;Using cptfmt&lt;BR /&gt;Formatting table's data - this might take a while...&lt;/P&gt;
&lt;P&gt;-z option must be used with connections table&lt;/P&gt;
&lt;DIV id="gtx-trans" style="position: absolute; left: 680px; top: 65px;"&gt;
&lt;DIV class="gtx-trans-icon"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 08 Feb 2023 17:01:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170763#M31036</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2023-02-08T17:01:00Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170765#M31037</link>
      <description>&lt;P&gt;Yes, run hcp's "secret" Threat Prevention reports:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;hcp --enable-product "Threat Prevention"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;hcp -r "Threat Prevention"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;You may need to update to the latest version of hcp and/or these reports may not be supported on R81.10.&amp;nbsp; I am currently attending CPX Denver for Partners in person and will post the relevant pages from my &lt;A href="http://www.maxpowerfirewalls.com" target="_blank" rel="noopener"&gt;Gateway Performance Optimization course&lt;/A&gt; later today.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 16:57:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170765#M31037</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-02-08T16:57:33Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170769#M31038</link>
      <description>&lt;P&gt;I read all the comments and responses given and here is all I can say. I know lots of people advise when it comes to https inspection to use rule any any bypass at the bottom, but I personally never recommend that to anyone. I have customers set up rules to bypass whatever they need to bypass and then any any inspect at the bottom (which is default anyway). I find when you have it that way, I never see any traffic or acceleration issues at all.&lt;/P&gt;
&lt;P&gt;Just my 2 cents.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 17:14:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170769#M31038</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-02-08T17:14:48Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170773#M31039</link>
      <description>&lt;P&gt;One more to be aware…. Don‘t set the log level of your last bypass rule to „detailed“ or „extended log“. This will mitigate the acceleration.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 17:50:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170773#M31039</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2023-02-08T17:50:07Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170774#M31040</link>
      <description>&lt;P&gt;To find the most impacting connections run the secret hcp Threat Prevention reports I mentioned elsewhere in this thread, as it identifies top elephant flows subject to TP inspection.&lt;/P&gt;
&lt;P&gt;As far as &lt;STRONG&gt;fw_streaming&lt;/STRONG&gt; it looks like the "path slow" argument only works in R81.20+.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 18:16:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170774#M31040</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-02-08T18:16:35Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170797#M31041</link>
      <description>&lt;P&gt;Here are the pages from my &lt;A href="http://www.maxpowerfirewalls.com" target="_blank" rel="noopener"&gt;Gateway Performance Optimization course&lt;/A&gt; covering the secret hcp TP reports with screenshots, as you can see there is a vast wealth of useful information.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="hcp_tp1.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19515i4C66C70A0430BB29/image-size/large?v=v2&amp;amp;px=999" role="button" title="hcp_tp1.png" alt="hcp_tp1.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="hcp_tp2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19516i55CB5A439E2EE118/image-size/large?v=v2&amp;amp;px=999" role="button" title="hcp_tp2.png" alt="hcp_tp2.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="hcp_tp4.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19518i8408AFE7B3110657/image-size/large?v=v2&amp;amp;px=999" role="button" title="hcp_tp4.png" alt="hcp_tp4.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Feb 2023 01:36:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170797#M31041</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-02-09T01:36:26Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170798#M31042</link>
      <description>&lt;P&gt;correct&lt;/P&gt;</description>
      <pubDate>Thu, 09 Feb 2023 01:41:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170798#M31042</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-02-09T01:41:19Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170800#M31043</link>
      <description>&lt;P&gt;Can you please clarify your statement &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1447"&gt;@Wolfgang&lt;/a&gt;?&amp;nbsp; It doesn't seem to be possible to set a Track log value of Detailed or Extended in the HTTPS Inspection Policy.&amp;nbsp; Were you referring to one of the other Access Control layers?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Feb 2023 01:59:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170800#M31043</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-02-09T01:59:37Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection performance issue - F2F traffic 82%..</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170814#M31044</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp; yes, you're right my mistake not to explain further. I'm referring to the access control layer, especially the URLF/APPCL layer. With a lot of HTTPS inspected or bypassed traffic and a match of these traffic in an URLF/APPCL layer the log setting will be significant for the performance. I think you mentioned this in your book.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/24308"&gt;@andy_currigan&lt;/a&gt;&amp;nbsp;started here with HTTPS inspection performance questions regarding the rule order but I think you have to observe the other performance indicators too.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Feb 2023 07:33:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-performance-issue-F2F-traffic-82/m-p/170814#M31044</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2023-02-09T07:33:30Z</dc:date>
    </item>
  </channel>
</rss>

