<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.20 MTU and SecureXL Problem in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/57891#M4337</link>
    <description>&lt;P&gt;Following remote session with checkpoint we were able to determine our issue is most likely patched in the latest GA hotfix. (see &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk147492" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk147492&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;In order to resolve this we will be scheduling the installation of the latest hotfix version (87 is GA as of yesterday).&lt;/P&gt;&lt;P&gt;Once scheduled, installed and tested, I will update this thread.&lt;/P&gt;&lt;P&gt;Matt.&lt;/P&gt;&lt;P&gt;​&lt;/P&gt;</description>
    <pubDate>Wed, 10 Jul 2019 10:49:51 GMT</pubDate>
    <dc:creator>Matt_Killeen</dc:creator>
    <dc:date>2019-07-10T10:49:51Z</dc:date>
    <item>
      <title>R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/56355#M4216</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;we have a Ethernet-Link (no VPN from Checkpoint) to a network where the MTU is 1422. If we set the mtu on the interface and disable SecureXL the Clients (with default MTU of 1500) get&amp;nbsp; the ICMP Fragmentation Packet and start to send packets with smaller MTU.&lt;/P&gt;&lt;P&gt;When we reactivate SecureXL the Clients starts to send 1500 byte packets again and do not get an ICMP Fragmentation paket from the Firewall.&lt;/P&gt;&lt;P&gt;We are using an Checkpoint 5600 Cluster with R80.20 with latest HFA.&lt;/P&gt;&lt;P&gt;Did anybody had the same problem?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jan&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2019 10:45:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/56355#M4216</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2019-06-21T10:45:02Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/56384#M4219</link>
      <description>&lt;P&gt;Yep, see this SK: &lt;A class="cp_link sc_ellipsis" style="max-width: 840px;" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98070&amp;amp;partition=Advanced&amp;amp;product=SecureXL," target="_blank"&gt;sk98070: Traffic sent over a VPN tunnel does not reach its destination because SecureXL does not start fragmenting the packets&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For additional information: &lt;A class="cp_link sc_ellipsis" style="max-width: 840px;" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98074&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank"&gt;sk98074: MTU and Fragmentation Issues in IPsec VPN&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2019 13:18:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/56384#M4219</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-06-21T13:18:03Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/56394#M4222</link>
      <description>&lt;P&gt;Thanks for your quick answer.&lt;/P&gt;&lt;P&gt;But in our case the Firewall is not using IPSEC. It is only an interface with a smaller mtu. So changing the parameter to&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;sim_ipsec_dont_fragment=1&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;should not make any difference or am I wrong?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2019 14:57:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/56394#M4222</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2019-06-21T14:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/56410#M4225</link>
      <description>&lt;P&gt;How are you disabling SecureXL in R80.20?&amp;nbsp; fwaccel off?&amp;nbsp; vpn accel off?&lt;/P&gt;
&lt;P&gt;If you disable SecureXL selectively for the involved IP addresses as specified here:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" style="max-width: 840px;" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104468&amp;amp;partition=Advanced&amp;amp;product=SecureXL%22" target="_blank"&gt;sk104468: How to &lt;STRONG&gt;disable&lt;/STRONG&gt; &lt;STRONG&gt;SecureXL&lt;/STRONG&gt; for specific IP addresses&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;but leave SecureXL active otherwise, do the ICMP Frag Needed packets still get sent?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 22 Jun 2019 01:18:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/56410#M4225</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-06-22T01:18:57Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/56512#M4238</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;I disabled it with fwaccel off. This seems to work without problems.&lt;BR /&gt;I cannot exclude specific IP addresses as this seems to be a problem with all IP Adresses behind this network Interface (Possible IPs 192.168.0.0/16).&lt;BR /&gt;At the moment I will let the acceleration disabled and open a TAC.&lt;BR /&gt;I'm surprised, that I am the only one to have this problem with R80.20.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Jan</description>
      <pubDate>Mon, 24 Jun 2019 06:12:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/56512#M4238</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2019-06-24T06:12:34Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/56719#M4260</link>
      <description>&lt;P&gt;I don't think you are the only one with this problem. I think we have it as well.&lt;/P&gt;&lt;P&gt;We recently upgraded from R77.30 to R80.20 on a 15600 cluster and, prior to the upgrade to R80.20, communications from a public internet source to one of our web servers on port TCP 443 (HTTPs) completed as expected.&lt;/P&gt;&lt;P&gt;Following the upgrade, HTTPs communications stall due to TLS v1.2 Server Hello messages being sent with a length of 1514 and the client then sends &lt;EM&gt;&lt;STRONG&gt;ICMP TYPE 3 CODE 4 Destination Unreachable, Fragmentation messages&lt;/STRONG&gt;&lt;/EM&gt; which we appear to ignore.&lt;/P&gt;&lt;P&gt;The initial TCP SYN and SYN-ACK also contains the &lt;EM&gt;&lt;STRONG&gt;TCP Option : Maximum Segment Size : 1460&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp; bytes so we shouldn't really be sending a 1514 byte packets back to the client.&lt;/P&gt;&lt;P&gt;I have a rolling packet capture on our public interfaces and there is evidence to confirm that the client was sending &lt;EM&gt;&lt;STRONG&gt;ICMP TYPE 3 CODE 4 Destination Unreachable, Fragmentation messages&lt;/STRONG&gt;&lt;/EM&gt; prior to the CheckPoint upgrade.&lt;/P&gt;&lt;P&gt;At the moment I’ve no idea whether r77.30 ignored the DF flag and fragmented the packets as requested or whether r77.30 forwarded the ICMP message to the server or whether it was handled differently elsewhere. So, we've escalated to vendor support.&lt;/P&gt;&lt;P&gt;Without a resolution to hand, we had to set the MTU to 1400 on the Web Server to take the firewall out of the equation and allow us to investigate further.&lt;/P&gt;&lt;P&gt;Over the next couple of days it became apparent that some private wan traffic was also affected and that &lt;EM&gt;&lt;STRONG&gt;turning off fwaccel resolved the issue&amp;nbsp; &lt;/STRONG&gt;&lt;/EM&gt;and allowed the traffic to complete.&lt;EM&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;I'll keep a close watch on this thread and update if I have any further information.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2019 13:13:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/56719#M4260</guid>
      <dc:creator>Matt_Killeen</dc:creator>
      <dc:date>2019-06-26T13:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/56827#M4273</link>
      <description>UPDATE: turning Secure XL off caused intermittent connectivty problems for at least one identified web service for multiple public clients. Followed sk104468 in order to disable SecureXL for traffic sent from/to specific IP addresses - this allowed us to address the issue for specific private WAN traffic and switch Secure XL back on for everything else whilst we continue to troubleshoot.</description>
      <pubDate>Thu, 27 Jun 2019 11:03:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/56827#M4273</guid>
      <dc:creator>Matt_Killeen</dc:creator>
      <dc:date>2019-06-27T11:03:59Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/57533#M4312</link>
      <description>&lt;P&gt;&lt;STRONG&gt;UPDATE:&lt;/STRONG&gt; I have been able to successfully recreate this issue using a lab client to the live service and compare&lt;STRONG&gt; r80.20&lt;/STRONG&gt; to &lt;STRONG&gt;r77.30&lt;/STRONG&gt; behaviour.&lt;/P&gt;&lt;P&gt;As we still have our work-a-round in place to protect our client wher the web server MTU is set at 1400, the numbers are reduced but the effect is the same.&lt;/P&gt;&lt;P&gt;The Lab is an Ubuntu client with an MTU of 1500 and a Cisco router with the LAN interface MTU set at 1360 (this is significant as it is this interface that doesn't want to transmit anything larger than 1360).&lt;/P&gt;&lt;P&gt;The Web server MTU is set at 1400 and is behind a CheckPoint r80.20 15600 Cluster.&lt;/P&gt;&lt;P&gt;During tests, the packet anaysis shows the SYN and SYN-ACK negotiate their preferred Maximum Segment Size (MSS) and that when the Cisco router receives a packets larger than it likes (due to the MTU set at 1360) , the packets are dropped and ICMP TYPE 3 CODE 4 messages are created and transmitted. CheckPoint r80.20 appears to ignore these ICMP messages and packets are re-transmitted until the HTTPs connection times out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As we also have another CheckPoint 15600 cluster still running &lt;STRONG&gt;r77.30&lt;/STRONG&gt;, the &lt;EM&gt;&lt;STRONG&gt;same lab test&lt;/STRONG&gt;&lt;/EM&gt; was run against a live web service NAT'd behind that cluster (the MTU of the live web server is 1500 here but the effect is the same).&lt;/P&gt;&lt;P&gt;In this test, the packet anaysis shows the SYN and SYN-ACK again negotiate their preferred Maximum Segment Size (MSS) and that when the Cisco router receives a packet larger than it likes (due to the MTU set at 1360) , the packet is dropped and an ICMP TYPE 3 CODE 4 message is created and transmitted. The difference being is that, from that point on, packets sent are lower than the Cisco's 1360 MTU and the HTTPs transaction completes successfully.&lt;/P&gt;&lt;P&gt;These results have being passed to CheckPoint support and we are scheduling further debug and testing with CheckPoint earl next week in an out of hours window.&lt;/P&gt;&lt;P&gt;Will keep this thread updated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Matt.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jul 2019 11:11:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/57533#M4312</guid>
      <dc:creator>Matt_Killeen</dc:creator>
      <dc:date>2019-07-05T11:11:57Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/57575#M4314</link>
      <description>&lt;P&gt;SecureXL has been significantly revised in R80.20.&lt;/P&gt;
&lt;P&gt;There are new fw monitor chain (SecureXL) objects that do not run in the virtual machine.&lt;/P&gt;
&lt;P&gt;SecureXL offloading chain modules&lt;/P&gt;
&lt;P&gt;# fw ctl chain&lt;/P&gt;
&lt;P&gt;The new fw monitor chain modules (SecureXL) do not run in the virtual machine (vm).&lt;/P&gt;
&lt;P&gt;SecureXL inbound (sxl_in) &amp;gt; Packet received in SecureXL from network&lt;BR /&gt;SecureXL inbound CT (sxl_ct) &amp;gt; Accelerated packets moved from inbound to outbound processing (post routing)&lt;BR /&gt;SecureXL outbound (sxl_out) &amp;gt; Accelerated packet starts outbound processing&lt;BR /&gt;SecureXL deliver (sxl_deliver) &amp;gt; SecureXL transmits accelerated packet&lt;BR /&gt;&lt;BR /&gt;More see here: &lt;BR /&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-x-Security-Gateway-Architecture-Logical-Packet-Flow/td-p/41747" target="_self"&gt;- R80.x Security Gateway Architecture (Logical Packet Flow)&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/t5/Enterprise-Appliances-and-Gaia/R80-20-New-FW-Monitor-inspection-points/td-p/17526" target="_self"&gt;- R80.20 - New FW Monitor inspection points&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;If there are problems with the MTU size, you should open a TAC ticket.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt; &lt;/P&gt;
&lt;P&gt;CUT&amp;gt;&amp;gt;&amp;gt;&lt;BR /&gt;If you disable SecureXL selectively for the involved IP addresses as specified here:&lt;/P&gt;
&lt;P&gt;sk104468: How to disable SecureXL for specific IP addresses&lt;BR /&gt;&amp;lt;&amp;lt;&amp;lt;CUT&lt;/P&gt;
&lt;P&gt;This solution does not resolve MTU Size problems. The MTU Size always affects the interface and does not affect single IP addresses in sk104468&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jul 2019 18:40:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/57575#M4314</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-07-05T18:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/57891#M4337</link>
      <description>&lt;P&gt;Following remote session with checkpoint we were able to determine our issue is most likely patched in the latest GA hotfix. (see &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk147492" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk147492&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;In order to resolve this we will be scheduling the installation of the latest hotfix version (87 is GA as of yesterday).&lt;/P&gt;&lt;P&gt;Once scheduled, installed and tested, I will update this thread.&lt;/P&gt;&lt;P&gt;Matt.&lt;/P&gt;&lt;P&gt;​&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2019 10:49:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/57891#M4337</guid>
      <dc:creator>Matt_Killeen</dc:creator>
      <dc:date>2019-07-10T10:49:51Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/58347#M4409</link>
      <description>&lt;P&gt;Update:&lt;/P&gt;&lt;P&gt;We have already installed the HFA Take 87. It does not help with our problem.&lt;/P&gt;&lt;P&gt;Also we got a Hotfix from Checkpoint for Take 87 that does not work at the moment.&lt;/P&gt;&lt;P&gt;Checkpoint is working on a solution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2019 12:57:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/58347#M4409</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2019-07-16T12:57:21Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/58360#M4410</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;, can we get someone from Check point to weigh-in on this issue?&lt;/P&gt;
&lt;P&gt;Additionally, I'd like to know if those running R80.30 GA are experiencing the same.&lt;/P&gt;
&lt;P&gt;I suspect that at least one of my larger clients was battling the issues caused by this behavior for months without resolution after the upgrade to R80.20.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2019 15:53:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/58360#M4410</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-07-16T15:53:03Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/58363#M4411</link>
      <description>It would help for those who have the issue to send me the SR number in a PM or via email to my username AT checkpoint DOT com.&lt;BR /&gt;</description>
      <pubDate>Tue, 16 Jul 2019 17:15:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/58363#M4411</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-07-16T17:15:17Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/58392#M4416</link>
      <description>&lt;P&gt;&lt;SPAN&gt;did you get any proper solution?, I am also facing the same issue.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2019 09:26:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/58392#M4416</guid>
      <dc:creator>Hellen5394</dc:creator>
      <dc:date>2019-07-17T09:26:25Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/58488#M4422</link>
      <description>&lt;P&gt;Hi All, this may be slightly off topic, however we are also seeing something similar on latest versions of embedded Gaia (R77.20.70+), havent seen it before that version but dont know exactly when it came in. Turning off SecureXL works , or lowering external interface MTU&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2019 14:12:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/58488#M4422</guid>
      <dc:creator>Peter_Lyndley</dc:creator>
      <dc:date>2019-07-18T14:12:33Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/59323#M4498</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We encountered the same issue after upgrading to R80.20.&lt;/P&gt;&lt;P&gt;CAPWAP tunnel traffic between a WLC and the Anchor is impacted, the FW drops packet because fragmentation table is full.&lt;/P&gt;&lt;P&gt;CP suggested to SK65074 to increase IP Fragment table size from 200 to 2000.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fixed the issue only for some few hours, next day we escalated the SR and they told us to pute 4000, fixed the issue atm, but i think it will happen again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Something has changed in R80.20 that's for sure, Support could not provide more info as they need to check with r&amp;amp;d.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any news from your side ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 09:16:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/59323#M4498</guid>
      <dc:creator>Khalid_Aftas</dc:creator>
      <dc:date>2019-07-31T09:16:21Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/59405#M4503</link>
      <description>&lt;P&gt;What changed in R80.20 is the ability of the SecureXL driver to perform virtual defragmentation of packets.&amp;nbsp; In R80.10 and earlier, any fragmented packets received by SecureXL would be instantly sent to the F2F path on a Firewall Worker core for handling.&amp;nbsp; It is possible that the new SecureXL virtual defragmention code is somehow leaking table entries and not freeing them back up in a timely fashion (or ever) once the virtual defrag timer has expired.&amp;nbsp; If that is indeed the case, increasing the size as specified in sk65074 will only delay the inevitable.&amp;nbsp; This assumes of course that changing that value from the IPS signature actually applies to the SecureXL virtual defragmentation code, and not just the F2F virtual defragmention code which is what that setting was originally created to modify.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2019 03:04:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/59405#M4503</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-08-01T03:04:23Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/59418#M4504</link>
      <description>&lt;P&gt;Thank you Timothy for your valuable explanation.&lt;/P&gt;&lt;P&gt;Applying a new value, instantly freed up the drops from some time, i indeed was thinking the same that it will only delay the problem, and suspect something with the table being stuck or something.&lt;/P&gt;&lt;P&gt;That's a bummer for us, we need to see what solution CP will provide, at the mean time r&amp;amp;d is not even involved.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there anyway to bypass this by disableing Secure XL for specific IPs ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2019 07:20:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/59418#M4504</guid>
      <dc:creator>Khalid_Aftas</dc:creator>
      <dc:date>2019-08-01T07:20:21Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/59431#M4507</link>
      <description>Follow sk104468 in order to disable SecureXL for traffic sent from/to specific IP addresses</description>
      <pubDate>Thu, 01 Aug 2019 10:15:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/59431#M4507</guid>
      <dc:creator>Matt_Killeen</dc:creator>
      <dc:date>2019-08-01T10:15:22Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 MTU and SecureXL Problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/59438#M4510</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;we found the issue and we have a fix that will be included on next JHF.&lt;/P&gt;
&lt;P&gt;if someone want the fix immediately please open case in TAC and we will provide the fix.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Ilya&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2019 13:55:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-MTU-and-SecureXL-Problem/m-p/59438#M4510</guid>
      <dc:creator>Ilya_Yusupov</dc:creator>
      <dc:date>2019-08-01T13:55:36Z</dc:date>
    </item>
  </channel>
</rss>

