<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 81.20 Performance/CPU issue in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214738#M41004</link>
    <description>&lt;P&gt;the test client in question has a "any any" rule in place, and therefore uses "microsoft-ds", because it seem to be the one that is the one that "matches any" by default. Rule is placed at position 1, to rule out any ruleset-related issues.&lt;/P&gt;&lt;P&gt;As described above (additional screenshot attached), the speed increased to a great level after tweaking the ringsize-buffers. But unfortunately it's back after 2 days. During that time, no changes were made to the policy or any other settings. As mentioned in the answer above, AB/AV were already disabled, with no changes to the behavior.&lt;/P&gt;&lt;P&gt;This is what it looks like in cpview during a transfer:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="4.png" style="width: 791px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25781i895DE54C4605A1CE/image-size/large?v=v2&amp;amp;px=999" role="button" title="4.png" alt="4.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 18 May 2024 06:18:41 GMT</pubDate>
    <dc:creator>xiro</dc:creator>
    <dc:date>2024-05-18T06:18:41Z</dc:date>
    <item>
      <title>81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214709#M40990</link>
      <description>&lt;P&gt;Hi Guys,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll try to post here, maybe some of you already had such an experience.&lt;/P&gt;&lt;P&gt;A customer has performance issues via VPN for quite some time now. We could identify multiple issues in the network. One of our proactive actions was also to update the FW to the current 81.20 T53.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Afterwards, during further tshoot, I realized an even more odd behavior:&amp;nbsp;&lt;BR /&gt;When transferring a file via SMB from a server behind the CPGW, The throughput starts at 30MBps, after a few seconds it drops to 2MBps and stays there for a few minutes. At the same time one CPU rises to 90%+. After these few minutes, it data rate jumps up again to ~25-30MBps, and CPU drops to approx. 70.&amp;nbsp;&lt;/P&gt;&lt;P&gt;After opening a SR and talking to TAC, the proposed changes of the ringsize buffers (RX to 1024, TX to 2048 / from 256/1024).&amp;nbsp;&lt;BR /&gt;Interfaces are 1G copper. Also they proposed tuning of CPAS (max burst, ssthresh, queue_size_factor).&lt;/P&gt;&lt;P&gt;After performing the change of the ringsize buffers 2 days ago, performance was great, constantly 85-90MBps rate and fine CPU.&lt;/P&gt;&lt;P&gt;Unfortunately, today we again see similar behavior. Not the same as before, but clearly a massive impact on packet drops, and CPU is back at ~90% during the transer.&lt;/P&gt;&lt;P&gt;Implementing the CPAS change additionally didn't help.&lt;BR /&gt;In other threads I read, that the default values should be fine for the buffers for 1G interfaces.&lt;BR /&gt;&lt;BR /&gt;Do you guys have any other idea what could be the cause?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25777iCA681905D4B1E6FC/image-size/large?v=v2&amp;amp;px=999" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25778i2BF772988B808E88/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2024 16:55:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214709#M40990</guid>
      <dc:creator>xiro</dc:creator>
      <dc:date>2024-05-17T16:55:27Z</dc:date>
    </item>
    <item>
      <title>Re: 81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214713#M40993</link>
      <description>&lt;P&gt;Depends what the customer complains about, if it is only file transfer or other stuff?&lt;/P&gt;
&lt;P&gt;Or are you 'testing' with file transfer to see what speed the customer is getting?&lt;/P&gt;
&lt;P&gt;SMB traffic will be inspected, better share what blades are enabled on this gateway.&lt;/P&gt;
&lt;P&gt;My guess is that anti-virus blade with IPS is causing slower speeds.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2024 18:15:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214713#M40993</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-05-17T18:15:15Z</dc:date>
    </item>
    <item>
      <title>Re: 81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214718#M40997</link>
      <description>&lt;P&gt;Make sure that the rules are using the predefined "smb" and not the "microsoft-ds".&amp;nbsp; Like Lesley said, it's probably an IPS check or AV scanning on SMB that could be slowing it down.&amp;nbsp; When going through the IPS checks, make sure to look for both labelled as "smb" and "cifs".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When in doubt, try fast_pathing the traffic and see how it works.&amp;nbsp; You could also try looking at hcp when testing and hope you get lucky.&amp;nbsp; Make sure to enable the test for that:&amp;nbsp;&amp;nbsp;hcp --enable-test "Protections Impact"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I ran into an issue where AV scanning for SMB was not enabled but it was running.&amp;nbsp; Even the&amp;nbsp;am_protections_override.C had everything defined correctly.&amp;nbsp; The fix was to reset all of the protection definitions.&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2024 20:15:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214718#M40997</guid>
      <dc:creator>John-Haynes</dc:creator>
      <dc:date>2024-05-17T20:15:08Z</dc:date>
    </item>
    <item>
      <title>Re: 81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214721#M40998</link>
      <description>&lt;P&gt;Which gateway model is this?&lt;/P&gt;
&lt;P&gt;S2S or RA VPN and w&lt;SPAN&gt;hich algorithms are used?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Is MSS clamping enabled?&lt;/P&gt;</description>
      <pubDate>Sat, 18 May 2024 00:34:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214721#M40998</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-05-18T00:34:48Z</dc:date>
    </item>
    <item>
      <title>Re: 81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214726#M41000</link>
      <description>&lt;P&gt;Chris brings up an excellent point. This usually boils down to mss clamping / mtu.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 18 May 2024 01:34:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214726#M41000</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-18T01:34:33Z</dc:date>
    </item>
    <item>
      <title>Re: 81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214735#M41003</link>
      <description>&lt;P&gt;- it's other stuff too (raised as RDP-issue)&lt;/P&gt;&lt;P&gt;- file transfer is our best way to reproduce it&lt;/P&gt;&lt;P&gt;- blades are IPS, AV, AB - client has a global exception in the TP ruleset, and the first measure was to disable the AV/AB blades (didn't help)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What seems strange to me is the massive increase in speed initially after alternating the ringsize buffers.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think the issue could be something related to it...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="3.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25779i483C75A1852A2661/image-size/large?v=v2&amp;amp;px=999" role="button" title="3.png" alt="3.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 18 May 2024 06:04:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214735#M41003</guid>
      <dc:creator>xiro</dc:creator>
      <dc:date>2024-05-18T06:04:59Z</dc:date>
    </item>
    <item>
      <title>Re: 81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214738#M41004</link>
      <description>&lt;P&gt;the test client in question has a "any any" rule in place, and therefore uses "microsoft-ds", because it seem to be the one that is the one that "matches any" by default. Rule is placed at position 1, to rule out any ruleset-related issues.&lt;/P&gt;&lt;P&gt;As described above (additional screenshot attached), the speed increased to a great level after tweaking the ringsize-buffers. But unfortunately it's back after 2 days. During that time, no changes were made to the policy or any other settings. As mentioned in the answer above, AB/AV were already disabled, with no changes to the behavior.&lt;/P&gt;&lt;P&gt;This is what it looks like in cpview during a transfer:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="4.png" style="width: 791px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25781i895DE54C4605A1CE/image-size/large?v=v2&amp;amp;px=999" role="button" title="4.png" alt="4.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 18 May 2024 06:18:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214738#M41004</guid>
      <dc:creator>xiro</dc:creator>
      <dc:date>2024-05-18T06:18:41Z</dc:date>
    </item>
    <item>
      <title>Re: 81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214739#M41005</link>
      <description>&lt;P&gt;- it's a 5900 Cluster&lt;/P&gt;&lt;P&gt;- VPN &amp;amp; all that comes with it we already analyzed, also MTU-sizes etc. - but our problem in question here is not VPN related, since this is a drill-down test from a client that is attached directly to the transfer-NW of the firewall, and accesses a server in a DMZ.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I assume that we may have drops somewhere on provider side that cause the low speeds from VPN, but since my behavior on the firewall is like it is in the screenshots above, all my E2E testing and capturing on different spots in the path is in vain, because the CP GW is causing so many drops.&lt;/P&gt;</description>
      <pubDate>Sat, 18 May 2024 06:23:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214739#M41005</guid>
      <dc:creator>xiro</dc:creator>
      <dc:date>2024-05-18T06:23:33Z</dc:date>
    </item>
    <item>
      <title>Re: 81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214743#M41006</link>
      <description>&lt;P&gt;Based on the snippets I've seen I'd speculate it is IPS that is slowing you down and driving up the CPU (due to the high PM utilization), although it sounds like you may have multiple issues since it looks like you are seeing high CPU on your dispatchers too which shouldn't be caused by IPS.&amp;nbsp; I doubt changing the ring buffer sizes actually helped.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Next time you start seeing slow SMB transfers and/or high CPU utilization, run &lt;STRONG&gt;ips off -n&lt;/STRONG&gt;&amp;nbsp;on the gateway from expert mode, then start a series of *new* SMB transfers between new IP addresses.&amp;nbsp; Are they substantially improved for as long as IPS is off?&amp;nbsp; Don't forget to re-enable IPS when you are done testing with&lt;STRONG&gt; ips on&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Beyond that, please post the output of &lt;A href="https://community.checkpoint.com/t5/Scripts/S7PAC-Super-Seven-Performance-Assessment-Commands/td-p/40528" target="_blank" rel="noopener"&gt;s7pac&lt;/A&gt;, ideally run while the system is experiencing slow transfers.&amp;nbsp; Also please provide the output of the following additional commands from expert mode:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;enabled_blades&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;dynamic_balancing -p&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;mq_mng –o –v&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;connection_pipelining status&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 18 May 2024 13:00:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214743#M41006</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-05-18T13:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: 81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214744#M41007</link>
      <description>&lt;P&gt;HyperFlow support for SMB traffic will come with R82. However End of Engineering for 5900 approaches.&lt;/P&gt;</description>
      <pubDate>Sat, 18 May 2024 14:19:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214744#M41007</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-05-18T14:19:54Z</dc:date>
    </item>
    <item>
      <title>Re: 81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214747#M41008</link>
      <description>&lt;P&gt;I've seen a few of specific issues happening on them and never on the other appliances with "classical" cores running the same blades.&lt;/P&gt;
&lt;P&gt;One of the issues was solved disabling hyper threading to go to physical 8 cores. Luckily for that implementation, the reduced CPU capacity was still enough to support traffic until the issue got fixed by a hotfix somewhere in R81.10.&lt;/P&gt;</description>
      <pubDate>Thu, 08 May 2025 12:45:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214747#M41008</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2025-05-08T12:45:06Z</dc:date>
    </item>
    <item>
      <title>Re: 81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214762#M41011</link>
      <description>&lt;P&gt;Hi Timothy,&lt;/P&gt;&lt;P&gt;unfortunately deactivating IPS didn't help. (same as AV/AB)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Please find attached the outputs from the commands you stated above.&amp;nbsp;&lt;BR /&gt;During my research I also stumbled upon&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk181860" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk181860&lt;/A&gt;&amp;nbsp;- which describes a similar issue when many interfaces are configured (in our case we use all 8 eth-IFs), but I the thing with "&lt;SPAN&gt;get_dev2ifn_hash" doesn't match.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="5.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25787i9F9EC02F14BC8546/image-size/large?v=v2&amp;amp;px=999" role="button" title="5.png" alt="5.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Oh and just to mention: we are aware of an issue, that eth2 (leading to the servers) sometimes peaks up to 1G, therefore leading to drops. But this is a scenario that occurs rarely (e.g. 3x for 5 minutes on Thursday). This behavior here is currently occuring always, event when the throughput through he whole FW is &amp;lt;800M (as you see in the screenshot above).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;We are currently looking into either bonding eth2, or upgrading the FW with 10G cards (unfortunately they're EOS).&lt;/P&gt;&lt;P&gt;But that's something we'll adress in the next days - nevertheless it doesn't seem to be related to this issue, which is persistent &amp;amp; reproducable at any time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 19 May 2024 10:43:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214762#M41011</guid>
      <dc:creator>xiro</dc:creator>
      <dc:date>2024-05-19T10:43:46Z</dc:date>
    </item>
    <item>
      <title>Re: 81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214777#M41015</link>
      <description>&lt;P&gt;Core 1 which you referenced in your last screenshot along with&amp;nbsp;sk181860 is generally a Firewall Worker Instance on an SMT 16-core gateway and not an SND unless Dynamic Split had added another SND when you took that particular screenshot.&lt;/P&gt;
&lt;P&gt;So in looking through everything here is what I see:&lt;/P&gt;
&lt;P&gt;1) The act of changing the ring buffer size does reinitialize the interface very briefly and I suspect that is what influenced the speed to increase, not the buffer size increase itself.&amp;nbsp; From expert mode try &lt;STRONG&gt;ifdown ethX;ifup ethX&lt;/STRONG&gt; when you are seeing the slow performance, does that suddenly speed it up for awhile?&amp;nbsp; If it does that could suggest some kind of issue with the SND code, as Multi-Queue seems to be doing a very good job of spreading traffic around the SND cores as much as possible, but the interface reset will be causing MQ to reinitialize there too so it can't be ruled out.&amp;nbsp; igb (which is implementing MQ here) is a rather old driver (5.3.5.20), and will tentatively be updating to&amp;nbsp;5.12.3 for R82.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) Hyperflow/pipelining is working well on your system, but SMB is not eligible for it until (hopefully) R82.&amp;nbsp; So an SMB elephant flow will be stuck on one core and top out as far as performance, and there is not much you can do about it.&lt;/P&gt;
&lt;P&gt;3) Make sure the Anti-Virus blade is NOT scanning SMB traffic in the relevant TP profile for the SMB traffic.&amp;nbsp; This was mentioned earlier in the thread.&amp;nbsp; &lt;STRONG&gt;fw stat -b AMW&lt;/STRONG&gt;&amp;nbsp;on its "files:" line can be used to check this.&lt;/P&gt;
&lt;P&gt;4)&amp;nbsp;There has also been a longstanding problem with SMB/CIFS traffic ending up in the Medium Path although it should be in the fastpath.&amp;nbsp; This was supposed to be fixed in R81.20&amp;nbsp;Jumbo HFA Take 43+ which you have.&amp;nbsp; You may need to adjust your policy to ensure that APCL/Threat Prevention is not trying to deep inspect SMB traffic, failing that try fast_accel'ing the SMB traffic into the fastpath.&amp;nbsp; &lt;A href="https://support.checkpoint.com/results/sk/sk156672" target="_blank" rel="noopener"&gt;sk156672: SecureXL Fast Accelerator (fw&amp;nbsp;fast_accel) for R80.20 and above&lt;/A&gt;&amp;nbsp;The command &lt;STRONG&gt;fw ctl multik print_heavy_conn&lt;/STRONG&gt; can help you find the attributes of SMB elephant flows needed to set up a fast_accel rule.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;5) You have a very high percentage of fully-accelerated traffic (Accelerated pkts) yet really only one physical core acting as an SND with SMT enabled on core 0 and its sibling 8.&amp;nbsp; Dynamic Split can add more SNDs if the Firewall Worker Instances aren't very busy, but given the features you have enabled I'd say they are probably busy quite a bit of the time.&amp;nbsp; &amp;nbsp;In my experience once SND utilization goes north of 75% with SMT enabled, performance starts to degrade quite markedly as the two SND instances "bang into" each other trying to reach the physical core; Firewall Worker instances do benefit about 30% from SMT, but SNDs under heavy load most definitely do not.&amp;nbsp; This may be one of those cases where turning off SMT and going back to 8 full cores and its initial 2/6 split (subject to change by Dynamic Split of course) would probably be a good idea.&amp;nbsp; This was also mentioned earlier in the thread and is your final option if the four ones above don't solve the issue.&lt;/P&gt;
&lt;P&gt;6) There are some network errors including rather rare TX errors, but there are so few compared against the total amount of frames it is not worth worrying about at this point.&lt;/P&gt;</description>
      <pubDate>Sun, 19 May 2024 19:09:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214777#M41015</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-05-19T19:09:48Z</dc:date>
    </item>
    <item>
      <title>Re: 81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214778#M41016</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Try fastaccel:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk156672" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk156672&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If traffic does not hit the fastaccel rule it means it still touched by blades.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Meaning the exception you have made are not working.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What version and take are you running?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 19 May 2024 19:14:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214778#M41016</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-05-19T19:14:13Z</dc:date>
    </item>
    <item>
      <title>Re: 81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214779#M41017</link>
      <description>&lt;P&gt;Good call.&lt;/P&gt;</description>
      <pubDate>Sun, 19 May 2024 19:43:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214779#M41017</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-19T19:43:47Z</dc:date>
    </item>
    <item>
      <title>Re: 81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214780#M41018</link>
      <description>&lt;P&gt;ad 1) you are right. I did not try resetting the IF, but failing over to the standby member (which has no changes to ringsize buffers) - and voila: Speed for the test is constantly ~90-110 MBps. It took a few minutes and went back down again.&amp;nbsp;&lt;/P&gt;&lt;P&gt;After failing over back and forth, I couldn't reproduce it any more (for at least ~20 minutes) I need to try later again. Not sure when it will hit again. (I think after changing the RS buffers initially, it took also raound 2 hours to re-occur)&lt;/P&gt;&lt;P&gt;Strange thing is - this worked for years and suddenly came up a few weeks ago. (Initially experienced as slow VPN performance, but the reason for it seem to be drops on the CP.)&amp;nbsp;&lt;/P&gt;&lt;P&gt;Updating from 81.10 to 81.20 T53 a few days ago didn't resolve the issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ad 2) that is strange, because as mentioned above the issue started out of the blue. Traffic was transferred over the FW for years, not sure why it now suddenly shouldn't be able to handle it. That's not an amount or traffic that should be worrying at all in my opinion.&lt;BR /&gt;&lt;BR /&gt;Also: A 100k-FW-Cluster that can' put through more than ~3MB/s for a File Transfer of 4GB - I mean... the first thing the customer will ask me is: "How can we replace this thing with a Forti?" - and I'd absolutely understand him.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ad 3) as mentioned, AB/AV and IPS were already disabled, without any effect. Also, this is traffic leading from DMZ to DMZ from GW-Perspective, therefore AB or HTTPSI shouldn't even apply at all.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;ad 4) The problem is, that it is general performance, not only SMB. As mentioned above, initially the problem was reported as "VPN users can't use RDP". SMB was then our easiest test-method, since it was also affected. Now we nailed down, that independent of the internet connection &amp;amp; VPN-Gateway, a client directly in front of the CPGW has the same problem. So it is our best &amp;amp; easiest way to reproduce it. Therefore fast_accellerating specific connections unfortunately isn't a solution for all of our problems. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ad 5) Not sure if I should tune around with HT, since I'm still on this issue with TAC.&amp;nbsp;&lt;/P&gt;&lt;P&gt;But do I understand this correctly: My SNDs are 0 &amp;amp; 8, but the cores that are peaking are random: 1, 13, 4, etc.&lt;/P&gt;&lt;P&gt;Do you think that disabling SMT would really help? If so, I'd try to arrange a MW.&lt;/P&gt;&lt;P&gt;Anything special to take care of?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for all your efforts!&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2024 05:56:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214780#M41018</guid>
      <dc:creator>xiro</dc:creator>
      <dc:date>2024-05-21T05:56:30Z</dc:date>
    </item>
    <item>
      <title>Re: 81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214781#M41019</link>
      <description>&lt;P&gt;Pulling traffic via fastaccel in this case might not be a solution but an indication what the problem could be.&lt;/P&gt;
&lt;P&gt;You posted that you excluded this traffic from AB,AV and IPS. Actually this is not true(maybe not for IPS, with ips off). I would recommend to temp disable the blade in total. So disable it under firewall gateway object and push policy. Do this &lt;STRONG&gt;only&lt;/STRONG&gt; if you are not able to get the traffic in the fastaccel. If the counter does not increase for the fastaccel rule it means traffic is not going via it and will be inspected. I can explain how to make a proper exception via rulebase but it is a bit complex so maybe better to turn off blade for a short period to see result.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Second remark, that you are now testing with windows share. In this case the problems are VPN related so maybe you are now solving 2 different issues. Why not test SMB via the VPN tunnel? To solve issues with VPN clients is a different approach then getting more speed in windows share copies. For example encryption alg could be a huge impact on VPN clients.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would not be surprised if 3DES is maybe used for the VPN clients. This has serious performance impact as stated in:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk73980" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk73980&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If a user logins you can see what it uses in the SmartConsole logs. Or check here: Smart Console -&amp;gt; Global properties -&amp;gt; Remote Access -&amp;gt; VPN auth -&amp;gt; edit. Post what you have for p1 and p2.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here another SK for general VPN performance guide:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk105119" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk105119&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 19 May 2024 21:00:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214781#M41019</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-05-19T21:00:04Z</dc:date>
    </item>
    <item>
      <title>Re: 81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214784#M41020</link>
      <description>&lt;P&gt;In response to your numbered list:&lt;/P&gt;
&lt;P&gt;1) A sudden increase in throughput caused by a failover is highly suspicious and tells me you don't have IPS turned off like you think you do.&amp;nbsp; Unless you have correctly defined a blade-based exception or null profile, IPS enforcement via passive streaming will continue.&amp;nbsp; Streaming inspection is not synced between cluster members, so upon failover any connections being passively streamed by default will be allowed to continue and go fastpath, thus suddenly speeding up.&amp;nbsp; Connections subject to active streaming (such as HTTPS Inspectied connections) will not survive a failover.&amp;nbsp; Here is a screenshot from a lab exercise in my Gateway Performance Optimization Course discussing this:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ipsfail.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25795i15BD2351D98869EF/image-size/large?v=v2&amp;amp;px=999" role="button" title="ipsfail.jpg" alt="ipsfail.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;2) You've got something wrong in your policy and internal traffic is being much more heavily inspected than it should.&amp;nbsp; Start by unchecking all TP blades, and in any APCL/URLF policy layer make sure you are using object "Internet" (not All_Internet) in the destination of EVERY SINGLE rule involving APCL/URLF.&amp;nbsp; Do you have any policy install warnings about this?&amp;nbsp; Also if you are using Custom Application/Site objects in your APCL/URLF policy and the "*" wildcard is in use, the Pattern Matcher (PM) code will drive up the CPU which you showed in one of your screenshots.&amp;nbsp; IPS also uses the PM extensively.&lt;/P&gt;
&lt;P&gt;Also make sure your cluster object's topology is completely and correctly defined and the External interface is properly set so that object "Internet" is properly matched.&amp;nbsp; Do you have checkbox "interface leads to DMZ" set on any interfaces?&amp;nbsp; That will make them treated as External and their traffic more heavily inspected.&amp;nbsp; These are the main tips covered in my course for Access Control but there many more.&lt;/P&gt;
&lt;P&gt;3) If IPS/AV/ABOT appear in the output of &lt;STRONG&gt;enabled_blades&lt;/STRONG&gt; they are NOT off.&amp;nbsp; Completely uncheck them on the cluster object.&lt;/P&gt;
&lt;P&gt;4) Yes, overall general performance will be heavily impacted by #2.&lt;/P&gt;
&lt;P&gt;5) I'd try to adjust your policy first before considering disabling SMT.&amp;nbsp; However the more you describe your problem the more it sounds like you are running into bottlenecks caused by all traffic the of a single connection (SMB, VPN) only being able to be processed by one core (Hyperflow notwithstanding for certain operations).&amp;nbsp; SMT hurts you in this scenario.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 05:30:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214784#M41020</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2025-01-23T05:30:53Z</dc:date>
    </item>
    <item>
      <title>Re: 81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214827#M41033</link>
      <description>&lt;P&gt;Thanks, I'l try this - but (un)fortunately, since my failovers yesterday, the problem currently isn't reproducable. I will check again later and try to implement your suggestions.&lt;/P&gt;&lt;P&gt;Regarding VPN: as mentioned I'd exclude it as a source of the problem. VPN is not terminating on CP, it is on a separate Cisco FW, which is then connected to CP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;When CP doesn't show this issue with SMB/CPU like now, then also the E2E performance through VPN is fine. (10MB instead of 700KB).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2024 10:14:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214827#M41033</guid>
      <dc:creator>xiro</dc:creator>
      <dc:date>2024-05-20T10:14:30Z</dc:date>
    </item>
    <item>
      <title>Re: 81.20 Performance/CPU issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214830#M41035</link>
      <description>&lt;P&gt;Hmm that changes the story. If the VPN is not terminated on the Check Point it cannot do a lot of the inspection. Traffic will be encrypted and most IPS cannot be done on it. You could still try it to put it via fastaccel since you have a source scope network.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For CIFS performance, (not related to the VPN issue) it can really help to use fastaccel.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2024 11:54:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/81-20-Performance-CPU-issue/m-p/214830#M41035</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-05-20T11:54:20Z</dc:date>
    </item>
  </channel>
</rss>

