<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176149#M32216</link>
    <description>&lt;P&gt;I assume it’s because the command should be fw tab -t connections -z&lt;/P&gt;</description>
    <pubDate>Fri, 24 Mar 2023 20:33:22 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2023-03-24T20:33:22Z</dc:date>
    <item>
      <title>High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traffic.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176095#M32186</link>
      <description>&lt;P&gt;Greetings,&lt;/P&gt;
&lt;P&gt;I'm facing issues with high latency on a CPAP-SG3600 HA-cluster. I have a TAC-case on this topic, but I wanted to check if anyone has some pointers.&lt;/P&gt;
&lt;P&gt;This HA-cluster has been doing just fine until mid-February. Then we started facing periods with extreme latency through the active firewall (3000 ms+), and forcing a failover would always solve it. Then the issue would just re-occur a few hours later. Rinse and repeat.&lt;/P&gt;
&lt;P&gt;The HA-cluster has been running Gaia R81.20 GA since November without issues until mid-February. In late February, we applied R81.20 JHF Take 8, but it made no difference. Last week I did a clean install from USB on both gateways. I did also run HDT (Hardware Diagnostic Tools). But still the same behaviour.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After digging through /var/log/messages I noticed messages pointing towards issues with PrioQ. After disabling PrioQ the latency issues went away. But they keep returning, not as frequently as earlier, but it still happens often. I also stumbled upon sk180437 - Unexpected traffic latency or outage on a Security Gateway / Cluster after policy installation. Noticed we had similar messages in /var/log/messages as referenced in the SK, so I applied the solution. This didn't seem to change anything.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk180437" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk180437&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Upon reviewing my latest Health CheckPoint (HCP) report, I noticed it complaining about:&lt;/P&gt;
&lt;P&gt;F2F rate is high. Can be reduced by optimizing rule-base, changing blades or additional configurations - check 'sk98348' section (3-5). packets in the last 5 seconds: 214177, slow path packets: 212613, percentage: 99.269762859690815%&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This struck me as quite odd. We don't have anything in our firewall policy that should hamper SecureXL in such a way:&lt;/P&gt;
&lt;P&gt;[Expert@:0]# fwaccel stat&lt;BR /&gt;+---------------------------------------------------------------------------------+&lt;BR /&gt;|Id|Name |Status |Interfaces |Features |&lt;BR /&gt;+---------------------------------------------------------------------------------+&lt;BR /&gt;|0 |KPPAK |enabled |eth5,Mgmt,eth1,eth2,eth3,|Acceleration,Cryptography |&lt;BR /&gt;| | | |eth4 | |&lt;BR /&gt;| | | | |Crypto: Tunnel,UDPEncap,MD5, |&lt;BR /&gt;| | | | |SHA1,3DES,DES,AES-128,AES-256,|&lt;BR /&gt;| | | | |ESP,LinkSelection,DynamicVPN, |&lt;BR /&gt;| | | | |NatTraversal,AES-XCBC,SHA256, |&lt;BR /&gt;| | | | |SHA384,SHA512 |&lt;BR /&gt;+---------------------------------------------------------------------------------+&lt;/P&gt;
&lt;P&gt;Accept Templates : enabled&lt;BR /&gt;Drop Templates : enabled&lt;BR /&gt;NAT Templates : enabled&lt;BR /&gt;LightSpeed Accel : disabled&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But we are clearly having issues with accelerated traffic as pretty much all traffic is hitting F2F:&lt;/P&gt;
&lt;P&gt;[Expert@:0]# fwaccel stats -s&lt;BR /&gt;Accelerated conns/Total conns : 22/687 (3%)&lt;BR /&gt;LightSpeed conns/Total conns : 0/687 (0%)&lt;BR /&gt;Accelerated pkts/Total pkts : 96180156/7276233558 (1%)&lt;BR /&gt;LightSpeed pkts/Total pkts : 0/7276233558 (0%)&lt;BR /&gt;F2Fed pkts/Total pkts : 7180053402/7276233558 (98%)&lt;BR /&gt;F2V pkts/Total pkts : 3707650/7276233558 (0%)&lt;BR /&gt;CPASXL pkts/Total pkts : 188774/7276233558 (0%)&lt;BR /&gt;PSLXL pkts/Total pkts : 87362563/7276233558 (1%)&lt;BR /&gt;CPAS pipeline pkts/Total pkts : 0/7276233558 (0%)&lt;BR /&gt;PSL pipeline pkts/Total pkts : 0/7276233558 (0%)&lt;BR /&gt;QOS inbound pkts/Total pkts : 0/7276233558 (0%)&lt;BR /&gt;QOS outbound pkts/Total pkts : 0/7276233558 (0%)&lt;BR /&gt;Corrected pkts/Total pkts : 0/7276233558 (0%)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[Expert@:0]# fwaccel stats -p&lt;BR /&gt;F2F packets:&lt;BR /&gt;--------------&lt;BR /&gt;Violation Packets Violation Packets&lt;BR /&gt;-------------------- --------------- -------------------- ---------------&lt;BR /&gt;Pkt has IP options 12 ICMP miss conn 1625812&lt;BR /&gt;TCP-SYN miss conn 4770065 TCP-other miss conn 24372326&lt;BR /&gt;UDP miss conn 3562308642 Other miss conn 242&lt;BR /&gt;VPN returned F2F 1106 Uni-directional viol 0&lt;BR /&gt;Possible spoof viol 0 TCP state viol 109&lt;BR /&gt;SCTP state affecting 0 Out if not def/accl 0&lt;BR /&gt;Bridge src=dst 0 Routing decision err 0&lt;BR /&gt;Sanity checks failed 0 Fwd to non-pivot 0&lt;BR /&gt;Broadcast/multicast 0 Cluster message 25468811&lt;BR /&gt;Cluster forward 9483581 Chain forwarding 0&lt;BR /&gt;F2V conn match pkts 4707 General reason 0&lt;BR /&gt;Route changes 0 VPN multicast traffic 0&lt;BR /&gt;GTP non-accelerated 0 Unresolved nexthop 29&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[Expert@:0]# fwaccel stats&lt;BR /&gt;Name Value Name Value&lt;BR /&gt;---------------------------- ------------------- ---------------------------- -------------------&lt;/P&gt;
&lt;P&gt;LightSpeed Accelerated Path&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;hw accel inbound bytes 0 hw accel packets 0&lt;BR /&gt;hw accel outbound bytes 0 hw accel conns 0&lt;BR /&gt;hw accel total conns 0 hw accel tcp conns 0&lt;BR /&gt;hw accel non-tcp conns 0&lt;/P&gt;
&lt;P&gt;Accelerated Path&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;accel packets 96203817 accel bytes 65663576815&lt;BR /&gt;outbound packets 96203313 outbound bytes 65787905840&lt;BR /&gt;conns created 3423544 conns deleted 3422909&lt;BR /&gt;C total conns 635 C TCP conns 486&lt;BR /&gt;C non TCP conns 149 nat conns 2671316&lt;BR /&gt;dropped packets 7704 dropped bytes 775666&lt;BR /&gt;fragments received 592 fragments transmit 0&lt;BR /&gt;fragments dropped 0 fragments expired 592&lt;BR /&gt;IP options dropped 0 corrs created 0&lt;BR /&gt;corrs deleted 0 C corrections 0&lt;BR /&gt;corrected packets 0 corrected bytes 0&lt;/P&gt;
&lt;P&gt;Accelerated VPN Path&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;C crypt conns 2 enc bytes 780268880&lt;BR /&gt;dec bytes 50958400 ESP enc pkts 1050432&lt;BR /&gt;ESP enc err 136 ESP dec pkts 554343&lt;BR /&gt;ESP dec err 0 ESP other err 1&lt;BR /&gt;espudp enc pkts 0 espudp enc err 0&lt;BR /&gt;espudp dec pkts 0 espudp dec err 0&lt;BR /&gt;espudp other err 0&lt;/P&gt;
&lt;P&gt;Medium Streaming Path&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;CPASXL packets 188774 PSLXL packets 87384461&lt;BR /&gt;CPASXL async packets 188774 PSLXL async packets 78909801&lt;BR /&gt;CPASXL bytes 179631938 PSLXL bytes 61559666392&lt;BR /&gt;C CPASXL conns 0 C PSLXL conns 613&lt;BR /&gt;CPASXL conns created 450 PSLXL conns created 3416719&lt;BR /&gt;PXL FF conns 0 PXL FF packets 8473823&lt;BR /&gt;PXL FF bytes 6982538553 PXL FF acks 3525076&lt;BR /&gt;PXL no conn drops 0&lt;/P&gt;
&lt;P&gt;Pipeline Streaming Path&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;PSL Pipeline packets 0 PSL Pipeline bytes 0&lt;BR /&gt;CPAS Pipeline packets 0 CPAS Pipeline bytes 0&lt;/P&gt;
&lt;P&gt;QoS Paths&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;QoS General Information:&lt;BR /&gt;------------------------&lt;BR /&gt;Total QoS Conns 0 QoS Classify Conns 0&lt;BR /&gt;QoS Classify flow 0 Reclassify QoS policy 0&lt;/P&gt;
&lt;P&gt;FireWall QoS Path:&lt;BR /&gt;------------------&lt;BR /&gt;Enqueued IN packets 0 Enqueued OUT packets 0&lt;BR /&gt;Dequeued IN packets 0 Dequeued OUT packets 0&lt;BR /&gt;Enqueued IN bytes 0 Enqueued OUT bytes 0&lt;BR /&gt;Dequeued IN bytes 0 Dequeued OUT bytes 0&lt;/P&gt;
&lt;P&gt;Accelerated QoS Path:&lt;BR /&gt;---------------------&lt;BR /&gt;Enqueued IN packets 0 Enqueued OUT packets 0&lt;BR /&gt;Dequeued IN packets 0 Dequeued OUT packets 0&lt;BR /&gt;Enqueued IN bytes 0 Enqueued OUT bytes 0&lt;BR /&gt;Dequeued IN bytes 0 Dequeued OUT bytes 0&lt;/P&gt;
&lt;P&gt;Firewall Path&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;F2F packets 7182789713 F2F bytes 1378432955760&lt;BR /&gt;TCP violations 109 F2V conn match pkts 4707&lt;BR /&gt;F2V packets 3709013 F2V bytes 239565290&lt;/P&gt;
&lt;P&gt;GTP&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;gtp tunnels created 0 gtp tunnels 0&lt;BR /&gt;gtp accel pkts 0 gtp f2f pkts 0&lt;BR /&gt;gtp spoofed pkts 0 gtp in gtp pkts 0&lt;BR /&gt;gtp signaling pkts 0 gtp tcpopt pkts 0&lt;BR /&gt;gtp apn err pkts 0&lt;/P&gt;
&lt;P&gt;General&lt;BR /&gt;--------------------------------------------------------------------------------------------------------&lt;BR /&gt;memory used 40405632 C tcp handshake conns 243&lt;BR /&gt;C tcp established conns 218 C tcp closed conns 25&lt;BR /&gt;C tcp pxl handshake conns 243 C tcp pxl established conns 203&lt;BR /&gt;C tcp pxl closed conns 25 DNS DoR stats 21&lt;/P&gt;
&lt;P&gt;(*) Statistics marked with C refer to current value, others refer to total value&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a temporary workaround, we have disabled all threat-prevention blades. These gateways aren't crazy powerful. I guess it makes sense for it to start showing performance issues when barely any traffic is getting accelerated. And I suppose the problems related PrioQ is most likely a result of other things, not a trigger for the latency issues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The question is why so much traffic is hitting F2F. I have examined the firewall policy, which consists of 116 rules. The first rule containing applications is rule 107, an in-line layer for outbound traffic for a specific subnet. All rules having applications are within in-line layers towards the bottom of the policy package. I have a really hard time understanding why so little of the traffic is being accelerated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone else have any experience with this? Any pointers to what I should look for to figure out and solve this behaviour?&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 14:26:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176095#M32186</guid>
      <dc:creator>RamGuy239</dc:creator>
      <dc:date>2023-03-24T14:26:29Z</dc:date>
    </item>
    <item>
      <title>Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176102#M32188</link>
      <description>&lt;P&gt;Do any of the following apply to your configuration / policy as these all impact SecureXL?&lt;/P&gt;
&lt;P&gt;PPPoE interfaces aren't supported by SecureXL&lt;/P&gt;
&lt;P&gt;Rules with RPC / DCOM / DCE-RPC services.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;R&lt;/SPAN&gt;&lt;SPAN&gt;ules with Client Authentication or Session Authentication.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;W&lt;/SPAN&gt;&lt;SPAN&gt;hen IPS protection "SYN Attack" ("SYNDefender") is activated in SmartDefense / IPS.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When IPS protection "Small PMTU" is activated in IPS.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When IPS protection "Network Quota" is activated in IPS (refer to&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk31630" target="_blank" rel="noopener"&gt;sk31630&lt;/A&gt;&lt;SPAN&gt;).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When IPS protection "Malicious IPs" (DShield.org Storm Center) is activated in IPS (because it uses Dynamic Objects).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Refer also: sk32578&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 15:02:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176102#M32188</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-03-24T15:02:33Z</dc:date>
    </item>
    <item>
      <title>Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176105#M32190</link>
      <description>&lt;P&gt;None of this should be relevant. The four IPS-related things might apply when running Threat Prevention as we run Autonomous Threat Prevention using the "Perimeter" profile. Not sure how we would verify that as we have so little control when using Autonomous Threat Prevention. But this statistic is with only the following blades currently enabled:&lt;/P&gt;
&lt;P&gt;[Expert@:0]# enabled_blades&lt;BR /&gt;fw vpn urlf appi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is no PPPoE. Rules disabling acceleration would be showing from the "fwaccel stat" command. Currently, we are using none of those.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 15:02:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176105#M32190</guid>
      <dc:creator>RamGuy239</dc:creator>
      <dc:date>2023-03-24T15:02:43Z</dc:date>
    </item>
    <item>
      <title>Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176108#M32193</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/43255"&gt;@RamGuy239&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think it would help us big time if you could generate below:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Scripts/S7PAC-Super-Seven-Performance-Assessment-Commands/td-p/40528" target="_blank"&gt;https://community.checkpoint.com/t5/Scripts/S7PAC-Super-Seven-Performance-Assessment-Commands/td-p/40528&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;and&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk171436" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk171436&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Btw, hcp is so easy now in R81.20, as you can access it once done via &lt;A href="https://x.x.x.x:portnumber/hcp" target="_blank"&gt;https://x.x.x.x:portnumber/hcp&lt;/A&gt;&amp;nbsp;link&lt;/P&gt;
&lt;P&gt;Cheers mate.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 15:12:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176108#M32193</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-24T15:12:22Z</dc:date>
    </item>
    <item>
      <title>Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176111#M32195</link>
      <description>&lt;P&gt;Any&amp;nbsp;&lt;SPAN&gt;SQLNET2 traffic per sk179919 ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 15:22:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176111#M32195</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-03-24T15:22:45Z</dc:date>
    </item>
    <item>
      <title>Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176113#M32197</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;made a good point in his last response. In the old days of CP, R77 and before, TAC would always suggest to customers to use service with protocol "NONE", not default one, so there is no IPS inspection taking place. Is it ideal, I would say no, BUT, if it works, at least its good workaround. Though, you need to confirm 100% what service might be a "culprit"&lt;/P&gt;
&lt;P&gt;To clarify my point, this is ONLY advisable if you know what service is causing the problem, no need to fiddle with it otherwise.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have TAC case open for this or not yet?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 15:37:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176113#M32197</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-24T15:37:03Z</dc:date>
    </item>
    <item>
      <title>Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176136#M32207</link>
      <description>&lt;P&gt;Hmm, sk179919 has me somewhat confused. When I try the command "fw tab t connections -z" I'm just getting this:&lt;BR /&gt;&lt;BR /&gt;[Expert@:0]# fw tab t connections -z&lt;BR /&gt;-z option must be used with connections table&lt;/P&gt;
&lt;P&gt;I don't expect this to be relevant. Shouldn't be a lot of SQL traffic in this environment at all.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 19:44:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176136#M32207</guid>
      <dc:creator>RamGuy239</dc:creator>
      <dc:date>2023-03-24T19:44:19Z</dc:date>
    </item>
    <item>
      <title>Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176138#M32208</link>
      <description>&lt;P&gt;HCP is great, HCP was the test that pointed my towards the F2F issue to begin with.&lt;/P&gt;
&lt;P&gt;I have never heard about S7PAC, looks liks a nice tool:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[Expert@:0]# ./s7pac&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Super Seven Performance Assessment Commands v0.5 (Thanks to Timothy Hall) |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Inspecting your environment: OK |&lt;BR /&gt;| This is a firewall....(continuing) |&lt;BR /&gt;| |&lt;BR /&gt;| Referred pagenumbers are to be found in the following book: |&lt;BR /&gt;| Max Power: Check Point Firewall Performance Optimization - Second Edition |&lt;BR /&gt;| |&lt;BR /&gt;| Available at &lt;A href="http://www.maxpowerfirewalls.com/" target="_blank"&gt;http://www.maxpowerfirewalls.com/&lt;/A&gt; |&lt;BR /&gt;| |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Command #1: fwaccel stat |&lt;BR /&gt;| |&lt;BR /&gt;| Check for : Accelerator Status must be enabled (R77.xx/R80.10 versions) |&lt;BR /&gt;| Status must be enabled (R80.20 and higher) |&lt;BR /&gt;| Accept Templates must be enabled |&lt;BR /&gt;| Message "disabled" from (low rule number) = bad |&lt;BR /&gt;| |&lt;BR /&gt;| Chapter 9: SecureXL throughput acceleration |&lt;BR /&gt;| Page 278 |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Output: |&lt;BR /&gt;+---------------------------------------------------------------------------------+&lt;BR /&gt;|Id|Name |Status |Interfaces |Features |&lt;BR /&gt;+---------------------------------------------------------------------------------+&lt;BR /&gt;|0 |KPPAK |enabled |eth5,Mgmt,eth1,eth2,eth3,|Acceleration,Cryptography |&lt;BR /&gt;| | | |eth4 | |&lt;BR /&gt;| | | | |Crypto: Tunnel,UDPEncap,MD5, |&lt;BR /&gt;| | | | |SHA1,3DES,DES,AES-128,AES-256,|&lt;BR /&gt;| | | | |ESP,LinkSelection,DynamicVPN, |&lt;BR /&gt;| | | | |NatTraversal,AES-XCBC,SHA256, |&lt;BR /&gt;| | | | |SHA384,SHA512 |&lt;BR /&gt;+---------------------------------------------------------------------------------+&lt;/P&gt;
&lt;P&gt;Accept Templates : enabled&lt;BR /&gt;Drop Templates : enabled&lt;BR /&gt;NAT Templates : enabled&lt;BR /&gt;LightSpeed Accel : disabled&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Command #2: fwaccel stats -s |&lt;BR /&gt;| |&lt;BR /&gt;| Check for : Accelerated conns/Totals conns: &amp;gt;25% good, &amp;gt;50% great |&lt;BR /&gt;| Accelerated pkts/Total pkts : &amp;gt;50% great |&lt;BR /&gt;| PXL pkts/Total pkts : &amp;gt;50% OK |&lt;BR /&gt;| F2Fed pkts/Total pkts : &amp;lt;30% good, &amp;lt;10% great |&lt;BR /&gt;| |&lt;BR /&gt;| Chapter 9: SecureXL throughput acceleration |&lt;BR /&gt;| Page 287, Packet/Throughput Acceleration: The Three Kernel Paths |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Output: |&lt;BR /&gt;Accelerated conns/Total conns : 21/643 (3%)&lt;BR /&gt;LightSpeed conns/Total conns : 0/643 (0%)&lt;BR /&gt;Accelerated pkts/Total pkts : 114950023/8029316457 (1%)&lt;BR /&gt;LightSpeed pkts/Total pkts : 0/8029316457 (0%)&lt;BR /&gt;F2Fed pkts/Total pkts : 7914366434/8029316457 (98%)&lt;BR /&gt;F2V pkts/Total pkts : 4081912/8029316457 (0%)&lt;BR /&gt;CPASXL pkts/Total pkts : 188774/8029316457 (0%)&lt;BR /&gt;PSLXL pkts/Total pkts : 95956257/8029316457 (1%)&lt;BR /&gt;CPAS pipeline pkts/Total pkts : 0/8029316457 (0%)&lt;BR /&gt;PSL pipeline pkts/Total pkts : 0/8029316457 (0%)&lt;BR /&gt;QOS inbound pkts/Total pkts : 0/8029316457 (0%)&lt;BR /&gt;QOS outbound pkts/Total pkts : 0/8029316457 (0%)&lt;BR /&gt;Corrected pkts/Total pkts : 0/8029316457 (0%)&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Command #3: grep -c ^processor /proc/cpuinfo &amp;amp;&amp;amp; /sbin/cpuinfo |&lt;BR /&gt;| |&lt;BR /&gt;| Check for : If number of cores is roughly double what you are excpecting, |&lt;BR /&gt;| hyperthreading may be enabled |&lt;BR /&gt;| |&lt;BR /&gt;| Chapter 7: CoreXL Tuning |&lt;BR /&gt;| Page 239 |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Output: |&lt;BR /&gt;4&lt;BR /&gt;HyperThreading=disabled&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Command #4: fw ctl affinity -l -r |&lt;BR /&gt;| |&lt;BR /&gt;| Check for : SND/IRQ/Dispatcher Cores, # of CPU's allocated to interface(s) |&lt;BR /&gt;| Firewall Workers/INSPECT Cores, # of CPU's allocated to fw_x |&lt;BR /&gt;| R77.30: Support processes executed on ALL CPU's |&lt;BR /&gt;| R80.xx: Support processes only executed on Firewall Worker Cores|&lt;BR /&gt;| |&lt;BR /&gt;| Chapter 7: CoreXL Tuning |&lt;BR /&gt;| Page 221 |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Output: |&lt;BR /&gt;CPU 0:&lt;BR /&gt;CPU 1: fw_2 (active)&lt;BR /&gt;cprid lpd mpdaemon fwd core_uploader wsdnsd fwucd rad in.acapd in.asessiond topod vpnd scrub_cp_file_convertd watermark_cp_file_convertd cprid cpd&lt;BR /&gt;CPU 2: fw_1 (active)&lt;BR /&gt;cprid lpd mpdaemon fwd core_uploader wsdnsd fwucd rad in.acapd in.asessiond topod vpnd scrub_cp_file_convertd watermark_cp_file_convertd cprid cpd&lt;BR /&gt;CPU 3: fw_0 (active)&lt;BR /&gt;cprid lpd mpdaemon fwd core_uploader wsdnsd fwucd rad in.acapd in.asessiond topod vpnd scrub_cp_file_convertd watermark_cp_file_convertd cprid cpd&lt;BR /&gt;All:&lt;BR /&gt;Interface eth5: has multi queue enabled&lt;BR /&gt;Interface Mgmt: has multi queue enabled&lt;BR /&gt;Interface eth1: has multi queue enabled&lt;BR /&gt;Interface eth2: has multi queue enabled&lt;BR /&gt;Interface eth3: has multi queue enabled&lt;BR /&gt;Interface eth4: has multi queue enabled&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Command #5: netstat -ni |&lt;BR /&gt;| |&lt;BR /&gt;| Check for : RX/TX errors |&lt;BR /&gt;| RX-DRP % should be &amp;lt;0.1% calculated by (RX-DRP/RX-OK)*100 |&lt;BR /&gt;| TX-ERR might indicate Fast Ethernet/100Mbps Duplex Mismatch |&lt;BR /&gt;| |&lt;BR /&gt;| Chapter 2: Layers 1&amp;amp;2 Performance Optimization |&lt;BR /&gt;| Page 28-35 |&lt;BR /&gt;| |&lt;BR /&gt;| Chapter 7: CoreXL Tuning |&lt;BR /&gt;| Page 204 |&lt;BR /&gt;| Page 206 (Network Buffering Misses) |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Output: |&lt;BR /&gt;Kernel Interface table&lt;BR /&gt;Iface MTU Met RX-OK RX-ERR RX-DRP RX-OVR TX-OK TX-ERR TX-DRP TX-OVR Flg&lt;BR /&gt;Mgmt 1500 0 0 0 0 0 0 0 0 0 BMU&lt;BR /&gt;bond0 1500 0 111712603 0 0 0 109914171 0 0 0 BMmRU&lt;BR /&gt;bond0.100 1500 0 21204368 0 0 0 18533468 0 0 0 BMRU&lt;BR /&gt;bond0.200 1500 0 89 0 0 0 5219 0 0 0 BMRU&lt;BR /&gt;bond0.208 1500 0 2341439 0 0 0 3421902 0 0 0 BMRU&lt;BR /&gt;bond0.224 1500 0 1855780 0 0 0 1972088 0 0 0 BMRU&lt;BR /&gt;bond0.302 1500 0 56764963 0 0 0 78537570 0 0 0 BMRU&lt;BR /&gt;bond0.304 1500 0 269 0 0 0 11378 0 0 0 BMRU&lt;BR /&gt;bond0.305 1500 0 599 0 0 0 43714 0 0 0 BMRU&lt;BR /&gt;bond0.306 1500 0 1038214 0 0 0 1283056 0 0 0 BMRU&lt;BR /&gt;bond0.666 1500 0 28071813 0 0 0 6091292 0 0 0 BMRU&lt;BR /&gt;bond1 1500 0 87779393 0 0 1756 94961630 0 0 0 BMmRU&lt;BR /&gt;eth1 1500 0 3939682497 0 0 0 3932095607 0 0 0 BMRU&lt;BR /&gt;eth2 1500 0 95412972 0 0 0 56903145 0 0 0 BMsRU&lt;BR /&gt;eth3 1500 0 16266273 0 0 0 53004939 0 0 0 BMsRU&lt;BR /&gt;eth4 1500 0 51309094 0 0 0 55634926 0 0 0 BMsRU&lt;BR /&gt;eth5 1500 0 36414301 0 0 1756 39274963 0 0 0 BMsRU&lt;BR /&gt;lo 65536 0 2094776 0 0 0 2094776 0 0 0 LNRU&lt;/P&gt;
&lt;P&gt;interface eth1: There were no RX drops in the past 0.5 seconds&lt;BR /&gt;interface eth1 rx_missed_errors : 0&lt;BR /&gt;interface eth1 rx_fifo_errors : 0&lt;BR /&gt;interface eth1 rx_no_buffer_count: 0&lt;/P&gt;
&lt;P&gt;interface eth2: There were no RX drops in the past 0.5 seconds&lt;BR /&gt;interface eth2 rx_missed_errors : 0&lt;BR /&gt;interface eth2 rx_fifo_errors : 0&lt;BR /&gt;interface eth2 rx_no_buffer_count: 0&lt;/P&gt;
&lt;P&gt;interface eth3: There were no RX drops in the past 0.5 seconds&lt;BR /&gt;interface eth3 rx_missed_errors : 0&lt;BR /&gt;interface eth3 rx_fifo_errors : 0&lt;BR /&gt;interface eth3 rx_no_buffer_count: 0&lt;/P&gt;
&lt;P&gt;interface eth4: There were no RX drops in the past 0.5 seconds&lt;BR /&gt;interface eth4 rx_missed_errors : 0&lt;BR /&gt;interface eth4 rx_fifo_errors : 0&lt;BR /&gt;interface eth4 rx_no_buffer_count: 0&lt;/P&gt;
&lt;P&gt;interface eth5: There were no RX drops in the past 0.5 seconds&lt;BR /&gt;interface eth5 rx_missed_errors : 0&lt;BR /&gt;interface eth5 rx_fifo_errors : 1756&lt;BR /&gt;interface eth5 rx_no_buffer_count: 0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Command #6: fw ctl multik stat |&lt;BR /&gt;| |&lt;BR /&gt;| Check for : Large # of conns on Worker 0 - IPSec VPN/VoIP? |&lt;BR /&gt;| Large imbalance of connections on a single or multiple Workers |&lt;BR /&gt;| |&lt;BR /&gt;| Chapter 7: CoreXL Tuning |&lt;BR /&gt;| Page 241 |&lt;BR /&gt;| |&lt;BR /&gt;| Chapter 8: CoreXL VPN Optimization |&lt;BR /&gt;| Page 256 |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Output: |&lt;BR /&gt;ID | Active | CPU | Connections | Peak&lt;BR /&gt;----------------------------------------------&lt;BR /&gt;0 | Yes | 3 | 352 | 3492&lt;BR /&gt;1 | Yes | 2 | 367 | 1346&lt;BR /&gt;2 | Yes | 1 | 389 | 1288&lt;/P&gt;
&lt;P&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Command #7: cpstat os -f multi_cpu -o 1 -c 5 |&lt;BR /&gt;| |&lt;BR /&gt;| Check for : High SND/IRQ Core Utilization |&lt;BR /&gt;| High Firewall Worker Core Utilization |&lt;BR /&gt;| |&lt;BR /&gt;| Chapter 6: CoreXL &amp;amp; Multi-Queue |&lt;BR /&gt;| Page 173 |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Output: |&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Processors load&lt;BR /&gt;---------------------------------------------------------------------------------&lt;BR /&gt;|CPU#|User Time(%)|System Time(%)|Idle Time(%)|Usage(%)|Run queue|Interrupts/sec|&lt;BR /&gt;---------------------------------------------------------------------------------&lt;BR /&gt;| 1| 0| 22| 78| 22| ?| 36976|&lt;BR /&gt;| 2| 40| 45| 15| 85| ?| 36977|&lt;BR /&gt;| 3| 40| 44| 16| 84| ?| 36977|&lt;BR /&gt;| 4| 35| 49| 15| 85| ?| 36977|&lt;BR /&gt;---------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Processors load&lt;BR /&gt;---------------------------------------------------------------------------------&lt;BR /&gt;|CPU#|User Time(%)|System Time(%)|Idle Time(%)|Usage(%)|Run queue|Interrupts/sec|&lt;BR /&gt;---------------------------------------------------------------------------------&lt;BR /&gt;| 1| 0| 22| 78| 22| ?| 36976|&lt;BR /&gt;| 2| 40| 45| 15| 85| ?| 36977|&lt;BR /&gt;| 3| 40| 44| 16| 84| ?| 36977|&lt;BR /&gt;| 4| 35| 49| 15| 85| ?| 36977|&lt;BR /&gt;---------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Processors load&lt;BR /&gt;---------------------------------------------------------------------------------&lt;BR /&gt;|CPU#|User Time(%)|System Time(%)|Idle Time(%)|Usage(%)|Run queue|Interrupts/sec|&lt;BR /&gt;---------------------------------------------------------------------------------&lt;BR /&gt;| 1| 0| 21| 79| 21| ?| 68428|&lt;BR /&gt;| 2| 37| 38| 26| 74| ?| 34211|&lt;BR /&gt;| 3| 37| 35| 28| 72| ?| 68420|&lt;BR /&gt;| 4| 31| 39| 30| 70| ?| 68424|&lt;BR /&gt;---------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Processors load&lt;BR /&gt;---------------------------------------------------------------------------------&lt;BR /&gt;|CPU#|User Time(%)|System Time(%)|Idle Time(%)|Usage(%)|Run queue|Interrupts/sec|&lt;BR /&gt;---------------------------------------------------------------------------------&lt;BR /&gt;| 1| 0| 21| 79| 21| ?| 68428|&lt;BR /&gt;| 2| 37| 38| 26| 74| ?| 34211|&lt;BR /&gt;| 3| 37| 35| 28| 72| ?| 68420|&lt;BR /&gt;| 4| 31| 39| 30| 70| ?| 68424|&lt;BR /&gt;---------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Processors load&lt;BR /&gt;---------------------------------------------------------------------------------&lt;BR /&gt;|CPU#|User Time(%)|System Time(%)|Idle Time(%)|Usage(%)|Run queue|Interrupts/sec|&lt;BR /&gt;---------------------------------------------------------------------------------&lt;BR /&gt;| 1| 0| 23| 77| 23| ?| 72900|&lt;BR /&gt;| 2| 39| 41| 20| 80| ?| 36454|&lt;BR /&gt;| 3| 39| 38| 22| 78| ?| 72921|&lt;BR /&gt;| 4| 37| 42| 22| 78| ?| 36459|&lt;BR /&gt;---------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;BR /&gt;| Thanks for using s7pac |&lt;BR /&gt;+-----------------------------------------------------------------------------+&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HCP as already been utilized as i mentioned in my original post. It was HCP that was pointing me to there being a terrible SecureXL utilization.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 19:51:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176138#M32208</guid>
      <dc:creator>RamGuy239</dc:creator>
      <dc:date>2023-03-24T19:51:13Z</dc:date>
    </item>
    <item>
      <title>Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176140#M32210</link>
      <description>&lt;P&gt;Will review it in a bit.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 19:53:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176140#M32210</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-24T19:53:14Z</dc:date>
    </item>
    <item>
      <title>Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176141#M32211</link>
      <description>&lt;P&gt;I have a ticket with TAC going. But it's moving slowly and the latest recommendation was to add traffic to fast acceleration, which seems like a strange thing to bring up in my opinion. Fast accel is a great tool to have specific traffic bypass inspection. But this is a scenario where SecureXL doesn't seem to really engage at all. Looking into fast acceleration seems more like a desperate attempt at tossing enough traffic into the accelerated path in order to have the issue go away. It doesn't really make much sense in terms of figuring out why barely anything is being accelerated in the first place.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 19:56:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176141#M32211</guid>
      <dc:creator>RamGuy239</dc:creator>
      <dc:date>2023-03-24T19:56:17Z</dc:date>
    </item>
    <item>
      <title>Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176142#M32212</link>
      <description>&lt;P&gt;Here is the latest HCP report as well. From the current active member.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 19:59:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176142#M32212</guid>
      <dc:creator>RamGuy239</dc:creator>
      <dc:date>2023-03-24T19:59:38Z</dc:date>
    </item>
    <item>
      <title>Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176149#M32216</link>
      <description>&lt;P&gt;I assume it’s because the command should be fw tab -t connections -z&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 20:33:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176149#M32216</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-24T20:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176151#M32217</link>
      <description>&lt;P&gt;Funny how the SK shows the wrong command. When running "fw tab -t connections -z" I get a rather extensive output. Nothing showing anything SQLNET2 though.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 20:38:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176151#M32217</guid>
      <dc:creator>RamGuy239</dc:creator>
      <dc:date>2023-03-24T20:38:45Z</dc:date>
    </item>
    <item>
      <title>Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176159#M32222</link>
      <description>&lt;P&gt;I agree, you got 98% F2F packets, that may explain some of your issues, for sure. Can you run cpview and just tab between fields and look for heavy connections/services. Also, can you run&amp;nbsp; -&amp;gt;&amp;nbsp;fw ctl multik print_heavy_conn&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 22:06:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176159#M32222</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-24T22:06:41Z</dc:date>
    </item>
    <item>
      <title>Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176192#M32230</link>
      <description>&lt;P&gt;It is unlikely your rulebase configuration is causing the high F2F, output of &lt;STRONG&gt;fwaccel stat&lt;/STRONG&gt; says accept templates are fully enabled which have nothing to do with forcing traffic F2F anyway.&amp;nbsp; All disabling priority queueing did was reduce the extra CPU load caused by re-prioritization of traffic when a worker core hits 100% (which is happening often), but the underlying cause of the high CPU load for the workers in the first place is excessive F2F.&lt;/P&gt;
&lt;P&gt;This may seem a rather silly question, but are you sure these reports and commands were run on the active cluster member?&amp;nbsp; It is expected behavior to see near 100% F2F on the standby member in ClusterXL HA.&lt;/P&gt;
&lt;P&gt;At this point the only way to conclusively determine why so much traffic is going F2F is to run a kernel debug which will show you the reason; I'm a bit surprised TAC hasn't suggested this yet.&amp;nbsp; This topic is covered in my &lt;A href="http://www.maxpowerfirewalls.com" target="_self"&gt;Gateway Performance Optimization class&lt;/A&gt;, here are the relevant pages from the class for all current situations I know of that can cause heavy F2F (feedback on any missing ones from anyone reading is always welcome!), as well as the debug procedure itself.&amp;nbsp; One you have the needed debug output in f2f.log run the command:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;grep "accelerated, reason" /var/log/f2f.log&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;(note there is a single space between the ","and "reason"):&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="securexl.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/20245iCD80A8DB3F5E0E3F/image-size/large?v=v2&amp;amp;px=999" role="button" title="securexl.png" alt="securexl.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="f2fdebug.png" style="width: 938px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/20244i95BD6CC5EFD0BBE5/image-size/large?v=v2&amp;amp;px=999" role="button" title="f2fdebug.png" alt="f2fdebug.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Mar 2023 22:08:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176192#M32230</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-03-25T22:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176195#M32231</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/43255"&gt;@RamGuy239&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;few questions in order to understand the case better.&lt;BR /&gt;&lt;BR /&gt;1. when you had R81.20 GA was the traffic also goes to F2F?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. Any chance your GW is configured as a proxy?&lt;/P&gt;
&lt;P&gt;3. any chance you are using IPS Redundancy in Load Sharing mode?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Ilya&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 26 Mar 2023 06:17:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176195#M32231</guid>
      <dc:creator>Ilya_Yusupov</dc:creator>
      <dc:date>2023-03-26T06:17:08Z</dc:date>
    </item>
    <item>
      <title>Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176196#M32232</link>
      <description>&lt;P&gt;Indeed good suggestion regarding proxy, refer:&lt;/P&gt;
&lt;P&gt;sk92482: Performance impact from enabling HTTP/HTTPS Proxy functionality&lt;/P&gt;
&lt;P&gt;(Irrespective of relevance here, have asked for the SecureXL mechanism SK to be updated to reference the above as a factor impacting performance.)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 26 Mar 2023 11:52:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176196#M32232</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-03-26T11:52:50Z</dc:date>
    </item>
    <item>
      <title>Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176230#M32235</link>
      <description>&lt;P&gt;1. Difficult to say. I don't have any statistics as I did a clean install from USB.&lt;/P&gt;
&lt;P&gt;2. No proxy enabled.&lt;/P&gt;
&lt;P&gt;3. No ISP Redundancy or Load Sharing.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 06:26:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176230#M32235</guid>
      <dc:creator>RamGuy239</dc:creator>
      <dc:date>2023-03-27T06:26:39Z</dc:date>
    </item>
    <item>
      <title>Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176231#M32236</link>
      <description>&lt;P&gt;There is no proxy functionality enabled.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 06:27:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176231#M32236</guid>
      <dc:creator>RamGuy239</dc:creator>
      <dc:date>2023-03-27T06:27:10Z</dc:date>
    </item>
    <item>
      <title>Re: High latency on CPAP-SG3600 HA-cluster running Gaia R81.20. HCP complains about 99.26% F2F traff</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176232#M32237</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/43255"&gt;@RamGuy239&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can you share the support case you opened i would like to review it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Ilya&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 06:31:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/High-latency-on-CPAP-SG3600-HA-cluster-running-Gaia-R81-20-HCP/m-p/176232#M32237</guid>
      <dc:creator>Ilya_Yusupov</dc:creator>
      <dc:date>2023-03-27T06:31:25Z</dc:date>
    </item>
  </channel>
</rss>

