<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Excessive RX-DRP Errors with new 19200 Appliance R81.20 T76 - rx_mbuf_allocation_errors in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/226769#M43582</link>
    <description>&lt;P&gt;Yes the system have been rebooted nearly a hundred times &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 16 Sep 2024 12:40:19 GMT</pubDate>
    <dc:creator>Jan_Kleinhans</dc:creator>
    <dc:date>2024-09-16T12:40:19Z</dc:date>
    <item>
      <title>Excessive RX-DRP Errors with new 19200 Appliance R81.20 T76 - rx_mbuf_allocation_errors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/226727#M43570</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;
&lt;P&gt;Does anyone experience high RX-DRP with 19200 appliance or UPPAK mode?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are migrating from 23800 applicances to 19200 appliances. We have a bond with 2 10Gig interfaces. We try to use them in default UPPAK mode.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We experience high packet loss and see the following outputs. The value of&amp;nbsp;rx_mbuf_allocation_errors is very high.&lt;/P&gt;
&lt;P&gt;Also we see them in usim_x86.elg:&lt;/P&gt;
&lt;P&gt;Sep 16 09:54:00.743035 [uspace];[tid_20];[UPPAK];m_get: allocation failure&lt;BR /&gt;Sep 16 09:54:00.743042 [uspace];[tid_11];[UPPAK];cpfifo_port_allocate_mbufs: DPDK CPFIFO Out of mbuf&lt;BR /&gt;Sep 16 09:54:00.743053 [uspace];[tid_20];[UPPAK];cpfifo_port_allocate_mbufs: DPDK CPFIFO Out of mbuf&lt;BR /&gt;Sep 16 09:54:00.743062 [uspace];[tid_25];[UPPAK];m_get: allocation failure&lt;/P&gt;
&lt;P&gt;Has anyone experienced the same problems?&lt;/P&gt;
&lt;P&gt;fw-lan-02:0&amp;gt; show interface eth1-06&lt;BR /&gt;state on&lt;BR /&gt;mac-addr 00:1c:7f:47:d5:79&lt;BR /&gt;type ethernet&lt;BR /&gt;link-state link up&lt;BR /&gt;instance 0&lt;BR /&gt;mtu 1600&lt;BR /&gt;auto-negotiation on&lt;BR /&gt;speed 10G&lt;BR /&gt;ipv6-autoconfig Not configured&lt;BR /&gt;monitor-mode Not configured&lt;BR /&gt;duplex full&lt;BR /&gt;link-speed Not configured&lt;BR /&gt;comments&lt;BR /&gt;ipv4-address Not Configured&lt;BR /&gt;ipv6-address Not Configured&lt;BR /&gt;ipv6-local-link-address Not Configured&lt;/P&gt;
&lt;P&gt;Statistics:&lt;BR /&gt;TX bytes:1032081410052 packets:1320654876 errors:0 dropped:0 overruns:0 carrier:0&lt;BR /&gt;RX bytes:2080913191732 packets:1898913014 errors:0 dropped:469570566880 overruns:0 frame:0&lt;/P&gt;
&lt;P&gt;SD-WAN: Not Configured&lt;BR /&gt;fw-lan-02:0&amp;gt; show interface eth1-05&lt;BR /&gt;state on&lt;BR /&gt;mac-addr 00:1c:7f:47:d5:79&lt;BR /&gt;type ethernet&lt;BR /&gt;link-state link up&lt;BR /&gt;instance 0&lt;BR /&gt;mtu 1600&lt;BR /&gt;auto-negotiation on&lt;BR /&gt;speed 10G&lt;BR /&gt;ipv6-autoconfig Not configured&lt;BR /&gt;monitor-mode Not configured&lt;BR /&gt;duplex full&lt;BR /&gt;link-speed Not configured&lt;BR /&gt;comments&lt;BR /&gt;ipv4-address Not Configured&lt;BR /&gt;ipv6-address Not Configured&lt;BR /&gt;ipv6-local-link-address Not Configured&lt;/P&gt;
&lt;P&gt;Statistics:&lt;BR /&gt;TX bytes:867994980572 packets:1246089903 errors:0 dropped:0 overruns:0 carrier:0&lt;BR /&gt;RX bytes:3210507271634 packets:2929561186 errors:0 dropped:325614418688 overruns:0 frame:0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;fw-lan-02:0&amp;gt; show interface eth1-05 stats&lt;BR /&gt;NIC statistics:&lt;BR /&gt;ifs_ibytes_hi: 747&lt;BR /&gt;ifs_ibytes_lo: 2154174803&lt;BR /&gt;ifs_obytes_hi: 202&lt;BR /&gt;ifs_obytes_lo: 411585168&lt;BR /&gt;ifs_ipackets: 2929551259&lt;BR /&gt;ifs_opackets: 1246089890&lt;BR /&gt;ifs_imcasts: 0&lt;BR /&gt;ifs_omcasts: 0&lt;BR /&gt;ifs_noproto: 0&lt;BR /&gt;ifs_ibcasts: 0&lt;BR /&gt;ifs_obcasts: 0&lt;BR /&gt;ifs_linkchanges: 0&lt;BR /&gt;ife_ierrors: 0&lt;BR /&gt;ife_oerrors: 0&lt;BR /&gt;ife_iqdrops: 1351030752&lt;BR /&gt;ife_oqdrops: 0&lt;BR /&gt;iee_rx_missed: 0&lt;BR /&gt;rx_q0_packets: 251382073&lt;BR /&gt;rx_q1_packets: 135112608&lt;BR /&gt;rx_q2_packets: 108793630&lt;BR /&gt;rx_q3_packets: 99839085&lt;BR /&gt;rx_q4_packets: 401336685&lt;BR /&gt;rx_q5_packets: 170071613&lt;BR /&gt;rx_q6_packets: 99197122&lt;BR /&gt;rx_q7_packets: 85330872&lt;BR /&gt;rx_q8_packets: 247012275&lt;BR /&gt;rx_q9_packets: 184947473&lt;BR /&gt;rx_q10_packets: 58575962&lt;BR /&gt;rx_q11_packets: 128533076&lt;BR /&gt;rx_q12_packets: 188794790&lt;BR /&gt;rx_q13_packets: 88227332&lt;BR /&gt;rx_q14_packets: 15420806&lt;BR /&gt;rx_q15_packets: 11744531&lt;BR /&gt;rx_q16_packets: 86018139&lt;BR /&gt;rx_q17_packets: 181415839&lt;BR /&gt;rx_q18_packets: 11060951&lt;BR /&gt;rx_q19_packets: 13179181&lt;BR /&gt;rx_q20_packets: 103675380&lt;BR /&gt;rx_q21_packets: 152395019&lt;BR /&gt;rx_q22_packets: 6270141&lt;BR /&gt;rx_q23_packets: 9941505&lt;BR /&gt;rx_q24_packets: 31248572&lt;BR /&gt;rx_q25_packets: 28490326&lt;BR /&gt;rx_q26_packets: 6173843&lt;BR /&gt;rx_q27_packets: 4686960&lt;BR /&gt;rx_q28_packets: 9899463&lt;BR /&gt;rx_q29_packets: 9211374&lt;BR /&gt;rx_q30_packets: 1046387&lt;BR /&gt;rx_q31_packets: 518246&lt;BR /&gt;tx_q0_packets: 58670930&lt;BR /&gt;tx_q1_packets: 41331343&lt;BR /&gt;tx_q2_packets: 81738879&lt;BR /&gt;tx_q3_packets: 71306968&lt;BR /&gt;tx_q4_packets: 59565053&lt;BR /&gt;tx_q5_packets: 54689758&lt;BR /&gt;tx_q6_packets: 19504612&lt;BR /&gt;tx_q7_packets: 9201719&lt;BR /&gt;tx_q8_packets: 71205088&lt;BR /&gt;tx_q9_packets: 49443406&lt;BR /&gt;tx_q10_packets: 52837430&lt;BR /&gt;tx_q11_packets: 17829913&lt;BR /&gt;tx_q12_packets: 14668334&lt;BR /&gt;tx_q13_packets: 7148854&lt;BR /&gt;tx_q14_packets: 5049054&lt;BR /&gt;tx_q15_packets: 718883&lt;BR /&gt;tx_q16_packets: 47929073&lt;BR /&gt;tx_q17_packets: 38964650&lt;BR /&gt;tx_q18_packets: 102327176&lt;BR /&gt;tx_q19_packets: 64025125&lt;BR /&gt;tx_q20_packets: 63781423&lt;BR /&gt;tx_q21_packets: 113685215&lt;BR /&gt;tx_q22_packets: 23009375&lt;BR /&gt;tx_q23_packets: 6892868&lt;BR /&gt;tx_q24_packets: 39008854&lt;BR /&gt;tx_q25_packets: 51092222&lt;BR /&gt;tx_q26_packets: 32561960&lt;BR /&gt;tx_q27_packets: 17300861&lt;BR /&gt;tx_q28_packets: 14007626&lt;BR /&gt;tx_q29_packets: 11318509&lt;BR /&gt;tx_q30_packets: 4923407&lt;BR /&gt;tx_q31_packets: 351322&lt;BR /&gt;tx_q32_packets: 0&lt;BR /&gt;rx_good_packets: 2929551259&lt;BR /&gt;tx_good_packets: 1246089890&lt;BR /&gt;rx_good_bytes: 2154174803&lt;BR /&gt;tx_good_bytes: 411585168&lt;BR /&gt;rx_missed_errors: 349439&lt;BR /&gt;rx_errors: 0&lt;BR /&gt;tx_errors: 0&lt;BR /&gt;rx_mbuf_allocation_errors: 1351030752&lt;BR /&gt;rx_unicast_packets: 2928407049&lt;BR /&gt;rx_multicast_packets: 227793&lt;BR /&gt;rx_broadcast_packets: 1265876&lt;BR /&gt;rx_dropped_packets: 0&lt;BR /&gt;rx_unknown_protocol_packets: 20&lt;BR /&gt;tx_unicast_packets: 1246085440&lt;BR /&gt;tx_multicast_packets: 2114&lt;BR /&gt;tx_broadcast_packets: 2336&lt;BR /&gt;tx_dropped_packets: 0&lt;BR /&gt;tx_link_down_dropped: 0&lt;BR /&gt;rx_crc_errors: 0&lt;BR /&gt;rx_illegal_byte_errors: 0&lt;BR /&gt;rx_error_bytes: 0&lt;BR /&gt;mac_local_errors: 1&lt;BR /&gt;mac_remote_errors: 4&lt;BR /&gt;rx_len_errors: 0&lt;BR /&gt;tx_xon_packets: 0&lt;BR /&gt;rx_xon_packets: 0&lt;BR /&gt;tx_xoff_packets: 0&lt;BR /&gt;rx_xoff_packets: 0&lt;BR /&gt;rx_size_64_packets: 16848&lt;BR /&gt;rx_size_65_to_127_packets: 472689146&lt;BR /&gt;rx_size_128_to_255_packets: 114756770&lt;BR /&gt;rx_size_256_to_511_packets: 281422015&lt;BR /&gt;rx_size_512_to_1023_packets: 56548075&lt;BR /&gt;rx_size_1024_to_1522_packets: 2004467864&lt;BR /&gt;rx_size_1523_to_max_packets: 0&lt;BR /&gt;rx_undersized_errors: 0&lt;BR /&gt;rx_oversize_errors: 0&lt;BR /&gt;rx_mac_short_pkt_dropped: 0&lt;BR /&gt;rx_fragmented_errors: 0&lt;BR /&gt;rx_jabber_errors: 0&lt;BR /&gt;tx_size_64_packets: 18695856&lt;BR /&gt;tx_size_65_to_127_packets: 513383307&lt;BR /&gt;tx_size_128_to_255_packets: 81585332&lt;BR /&gt;tx_size_256_to_511_packets: 67269203&lt;BR /&gt;tx_size_512_to_1023_packets: 56242348&lt;BR /&gt;tx_size_1024_to_1522_packets: 508913844&lt;BR /&gt;tx_size_1523_to_max_packets: 0&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;fw-lan-02:0&amp;gt; show interface eth1-06 stats&lt;BR /&gt;NIC statistics:&lt;BR /&gt;ifs_ibytes_hi: 484&lt;BR /&gt;ifs_ibytes_lo: 2149301588&lt;BR /&gt;ifs_obytes_hi: 240&lt;BR /&gt;ifs_obytes_lo: 1289292410&lt;BR /&gt;ifs_ipackets: 1898913842&lt;BR /&gt;ifs_opackets: 1320655157&lt;BR /&gt;ifs_imcasts: 0&lt;BR /&gt;ifs_omcasts: 0&lt;BR /&gt;ifs_noproto: 0&lt;BR /&gt;ifs_ibcasts: 0&lt;BR /&gt;ifs_obcasts: 0&lt;BR /&gt;ifs_linkchanges: 0&lt;BR /&gt;ife_ierrors: 0&lt;BR /&gt;ife_oerrors: 0&lt;BR /&gt;ife_iqdrops: 1504863936&lt;BR /&gt;ife_oqdrops: 0&lt;BR /&gt;iee_rx_missed: 0&lt;BR /&gt;rx_q0_packets: 172579582&lt;BR /&gt;rx_q1_packets: 76303749&lt;BR /&gt;rx_q2_packets: 329678703&lt;BR /&gt;rx_q3_packets: 44063171&lt;BR /&gt;rx_q4_packets: 62528432&lt;BR /&gt;rx_q5_packets: 32901907&lt;BR /&gt;rx_q6_packets: 32105782&lt;BR /&gt;rx_q7_packets: 44094617&lt;BR /&gt;rx_q8_packets: 138524010&lt;BR /&gt;rx_q9_packets: 246588835&lt;BR /&gt;rx_q10_packets: 64388588&lt;BR /&gt;rx_q11_packets: 17778245&lt;BR /&gt;rx_q12_packets: 52839104&lt;BR /&gt;rx_q13_packets: 70066735&lt;BR /&gt;rx_q14_packets: 12962051&lt;BR /&gt;rx_q15_packets: 12331671&lt;BR /&gt;rx_q16_packets: 75711877&lt;BR /&gt;rx_q17_packets: 87279153&lt;BR /&gt;rx_q18_packets: 11239686&lt;BR /&gt;rx_q19_packets: 9997181&lt;BR /&gt;rx_q20_packets: 74352148&lt;BR /&gt;rx_q21_packets: 154468121&lt;BR /&gt;rx_q22_packets: 5606187&lt;BR /&gt;rx_q23_packets: 6953227&lt;BR /&gt;rx_q24_packets: 16999890&lt;BR /&gt;rx_q25_packets: 26051349&lt;BR /&gt;rx_q26_packets: 2846872&lt;BR /&gt;rx_q27_packets: 4501816&lt;BR /&gt;rx_q28_packets: 5036195&lt;BR /&gt;rx_q29_packets: 7462420&lt;BR /&gt;rx_q30_packets: 256202&lt;BR /&gt;rx_q31_packets: 416336&lt;BR /&gt;tx_q0_packets: 68053990&lt;BR /&gt;tx_q1_packets: 88242912&lt;BR /&gt;tx_q2_packets: 87581773&lt;BR /&gt;tx_q3_packets: 67629520&lt;BR /&gt;tx_q4_packets: 50364509&lt;BR /&gt;tx_q5_packets: 63239317&lt;BR /&gt;tx_q6_packets: 23207971&lt;BR /&gt;tx_q7_packets: 7366685&lt;BR /&gt;tx_q8_packets: 55568456&lt;BR /&gt;tx_q9_packets: 75073851&lt;BR /&gt;tx_q10_packets: 30182053&lt;BR /&gt;tx_q11_packets: 15754733&lt;BR /&gt;tx_q12_packets: 12537409&lt;BR /&gt;tx_q13_packets: 7374943&lt;BR /&gt;tx_q14_packets: 4010786&lt;BR /&gt;tx_q15_packets: 255981&lt;BR /&gt;tx_q16_packets: 71826289&lt;BR /&gt;tx_q17_packets: 53816038&lt;BR /&gt;tx_q18_packets: 92783569&lt;BR /&gt;tx_q19_packets: 51707007&lt;BR /&gt;tx_q20_packets: 54660427&lt;BR /&gt;tx_q21_packets: 64710197&lt;BR /&gt;tx_q22_packets: 25497062&lt;BR /&gt;tx_q23_packets: 10116747&lt;BR /&gt;tx_q24_packets: 102414788&lt;BR /&gt;tx_q25_packets: 62240084&lt;BR /&gt;tx_q26_packets: 30935190&lt;BR /&gt;tx_q27_packets: 14182433&lt;BR /&gt;tx_q28_packets: 14365301&lt;BR /&gt;tx_q29_packets: 9477528&lt;BR /&gt;tx_q30_packets: 4865081&lt;BR /&gt;tx_q31_packets: 612424&lt;BR /&gt;tx_q32_packets: 103&lt;BR /&gt;rx_good_packets: 1898913842&lt;BR /&gt;tx_good_packets: 1320655157&lt;BR /&gt;rx_good_bytes: 2149301588&lt;BR /&gt;tx_good_bytes: 1289292410&lt;BR /&gt;rx_missed_errors: 525223&lt;BR /&gt;rx_errors: 0&lt;BR /&gt;tx_errors: 0&lt;BR /&gt;rx_mbuf_allocation_errors: 1504864864&lt;BR /&gt;rx_unicast_packets: 1898601553&lt;BR /&gt;rx_multicast_packets: 141607&lt;BR /&gt;rx_broadcast_packets: 695905&lt;BR /&gt;rx_dropped_packets: 0&lt;BR /&gt;rx_unknown_protocol_packets: 0&lt;BR /&gt;tx_unicast_packets: 1320345103&lt;BR /&gt;tx_multicast_packets: 2129&lt;BR /&gt;tx_broadcast_packets: 307925&lt;BR /&gt;tx_dropped_packets: 0&lt;BR /&gt;tx_link_down_dropped: 0&lt;BR /&gt;rx_crc_errors: 0&lt;BR /&gt;rx_illegal_byte_errors: 0&lt;BR /&gt;rx_error_bytes: 0&lt;BR /&gt;mac_local_errors: 1&lt;BR /&gt;mac_remote_errors: 2&lt;BR /&gt;rx_len_errors: 0&lt;BR /&gt;tx_xon_packets: 0&lt;BR /&gt;rx_xon_packets: 0&lt;BR /&gt;tx_xoff_packets: 0&lt;BR /&gt;rx_xoff_packets: 0&lt;BR /&gt;rx_size_64_packets: 14981&lt;BR /&gt;rx_size_65_to_127_packets: 298458118&lt;BR /&gt;rx_size_128_to_255_packets: 112141659&lt;BR /&gt;rx_size_256_to_511_packets: 148274253&lt;BR /&gt;rx_size_512_to_1023_packets: 56594827&lt;BR /&gt;rx_size_1024_to_1522_packets: 1283955227&lt;BR /&gt;rx_size_1523_to_max_packets: 0&lt;BR /&gt;rx_undersized_errors: 0&lt;BR /&gt;rx_oversize_errors: 0&lt;BR /&gt;rx_mac_short_pkt_dropped: 0&lt;BR /&gt;rx_fragmented_errors: 0&lt;BR /&gt;rx_jabber_errors: 0&lt;BR /&gt;tx_size_64_packets: 32307730&lt;BR /&gt;tx_size_65_to_127_packets: 453244290&lt;BR /&gt;tx_size_128_to_255_packets: 87493234&lt;BR /&gt;tx_size_256_to_511_packets: 72191408&lt;BR /&gt;tx_size_512_to_1023_packets: 56382076&lt;BR /&gt;tx_size_1024_to_1522_packets: 619036419&lt;BR /&gt;tx_size_1523_to_max_packets: 0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 10:59:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/226727#M43570</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2024-09-16T10:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: Excessive RX-DRP Errors with new 19200 Appliance R81.20 T76 - rx_mbuf_allocation_errors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/226735#M43573</link>
      <description>&lt;P&gt;This will likely require a TAC case for investigation and debugging.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 11:25:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/226735#M43573</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-09-16T11:25:57Z</dc:date>
    </item>
    <item>
      <title>Re: Excessive RX-DRP Errors with new 19200 Appliance R81.20 T76 - rx_mbuf_allocation_errors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/226765#M43580</link>
      <description>&lt;P&gt;Out of interest has the machine been rebooted since the MTU value was configured higher than 1500 bytes?&lt;/P&gt;
&lt;P&gt;For context see: PRJ-53892,&amp;nbsp;&lt;SPAN&gt;PMTR-101528&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 12:47:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/226765#M43580</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-09-16T12:47:20Z</dc:date>
    </item>
    <item>
      <title>Re: Excessive RX-DRP Errors with new 19200 Appliance R81.20 T76 - rx_mbuf_allocation_errors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/226768#M43581</link>
      <description>&lt;P&gt;Starting in Gaia 3.10, the RX-DRP counter does not always mean what you think it means, as not all RX-DRP's are "legit".&amp;nbsp; "Legit" would be the loss of an incoming frame due to insufficient ring buffer free space that the firewall wanted and needed to process.&amp;nbsp; Traffic bearing a non-IPv4 EtherType (or unconfigured VLAN tag) will be discarded by the NIC and RX-DRP incremented, but that is traffic that the firewall was not able to process anyway and "not legit".&amp;nbsp;&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk166424" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;sk166424: Number of RX packet drops on interfaces increases on a Security Gateway R80.30 and higher with Gaia kernel 3.10&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Looking at your output there is no way all RX-DRPs reported are legit for eth1-05, as the frame loss rate is beyond 100%.&amp;nbsp; Looking at the stats for eth1-05, only these two counters are actually "legit" buffering drops/misses:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;ife_iqdrops: 1351030752&lt;BR /&gt;rx_missed_errors: 349439&lt;/P&gt;
&lt;P&gt;But even just considering these, the frame loss rate is still impossibly high.&amp;nbsp; This is either some kind of bug (possibly involving UPPAK which has its tendrils deep into the NIC driver) or someone has tampered with the default Multi-Queue settings, it should be set for Dynamic/Auto for all interfaces.&amp;nbsp; You can check this with &lt;STRONG&gt;mq_mng --show&lt;/STRONG&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If RX-DRP is constantly incrementing because you suspect it is constantly being splattered with some kind of "not legit" traffic, this can be verified very easily.&amp;nbsp; Simply run a &lt;STRONG&gt;tcpdump&lt;/STRONG&gt; on the interface in question (filter doesn't matter), do the RX-DRPs stop incrementing?&amp;nbsp; Do they resume when the &lt;STRONG&gt;tcpdump &lt;/STRONG&gt;is stopped?&amp;nbsp; If so the interface is indeed being hit with "not legit" traffic causing RX-DRP to go up.&lt;/P&gt;
&lt;P&gt;Beyond that the TAC will need to get involved.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 12:38:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/226768#M43581</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-09-16T12:38:02Z</dc:date>
    </item>
    <item>
      <title>Re: Excessive RX-DRP Errors with new 19200 Appliance R81.20 T76 - rx_mbuf_allocation_errors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/226769#M43582</link>
      <description>&lt;P&gt;Yes the system have been rebooted nearly a hundred times &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 12:40:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/226769#M43582</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2024-09-16T12:40:19Z</dc:date>
    </item>
    <item>
      <title>Re: Excessive RX-DRP Errors with new 19200 Appliance R81.20 T76 - rx_mbuf_allocation_errors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/226774#M43584</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;thanks for your knowledge. Multiqueue is configured Dynamic/Auto. At the moment the appliance is only standby, so no traffic on these interfaces. As we are experiencing problems when getting the machine active I can try your tcpdump test only in a maintenance window.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;TAC case is already opened since yesterday morning. But there is no progress. The only "suggestion" is to increase ringbuffer size. This seems not to be possible with UPPAK. If I do so nothing happens.&lt;/P&gt;
&lt;P&gt;Have you seen&amp;nbsp;&lt;SPAN&gt;rx_mbuf_allocation_errors before?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Jan&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 12:47:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/226774#M43584</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2024-09-16T12:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: Excessive RX-DRP Errors with new 19200 Appliance R81.20 T76 - rx_mbuf_allocation_errors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/226784#M43587</link>
      <description>&lt;P&gt;My understanding is that mbufs are used to store frame data, which is then referred to by a descriptor stored in the ring buffer.&lt;/P&gt;
&lt;P&gt;Depending on the size of the frame, multiple mbufs may be needed to store it.&amp;nbsp; I'm wondering if your non-standard 1600 MTU is causing an extra mbuf to be allocated for max-size frames beyond what would normally be needed for a standard 1500 MTU, and UPPAK is having a problem with this, maybe not properly or promptly free'ing that extra mbuf and then they run out?&amp;nbsp; However supposedly UPPAK supports an MTU up to 2002:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk181250" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;sk181250: HCP report shows "Jumbo Frame Error" when SecureXL works in the User Space (UPPAK) mode&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp; Might be interesting to see what the HCP Jumbo Frame test is saying on your gateway, or if any of the other HCP tests are complaining about anything.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Would be curious to see what happens if you set the MTU back to the standard 1500 as I suspect that will fix your problem.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 13:08:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/226784#M43587</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-09-16T13:08:17Z</dc:date>
    </item>
    <item>
      <title>Re: Excessive RX-DRP Errors with new 19200 Appliance R81.20 T76 - rx_mbuf_allocation_errors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/227190#M43687</link>
      <description>&lt;P&gt;Changing the MTU to default 1500 did help. We use temporarily another gateway, so&amp;nbsp; it doesn't harm us at the moment but I hope that TAC will have a solution for the problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2024 11:08:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/227190#M43687</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2024-09-19T11:08:15Z</dc:date>
    </item>
    <item>
      <title>Re: Excessive RX-DRP Errors with new 19200 Appliance R81.20 T76 - rx_mbuf_allocation_errors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/227214#M43691</link>
      <description>&lt;P&gt;Thanks for the follow-up and that seems to have to confirmed my suspicions.&amp;nbsp; User Space SecureXL (UPPAK) is a pretty radical change in the implementation of SecureXL on-par with the major changes made to SecureXL in R80.20.&amp;nbsp; There were definitely some growing pains when that happened in R80.20, and it seems the same is happening with UPPAK which I suspect is related to your problem.&lt;/P&gt;
&lt;P&gt;One other option is to ask TAC if if SecureXL can be set back to the traditional KPPAK mode on your system and see if that helps, but this may not be possible or supported for 9000/19000/29000/Lightspeed appliances.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2024 11:57:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/227214#M43691</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-09-19T11:57:25Z</dc:date>
    </item>
    <item>
      <title>Re: Excessive RX-DRP Errors with new 19200 Appliance R81.20 T76 - rx_mbuf_allocation_errors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/227307#M43711</link>
      <description>&lt;P&gt;It's supported, you can change the mode in the cpconfig menu.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk153832#TOC05" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk153832#TOC05&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2024 02:10:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/227307#M43711</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-09-20T02:10:46Z</dc:date>
    </item>
    <item>
      <title>Re: Excessive RX-DRP Errors with new 19200 Appliance R81.20 T76 - rx_mbuf_allocation_errors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/227513#M43768</link>
      <description>&lt;P&gt;Yes it would be possible. But then the acceleration feature of our 100GE Ports wouldn't work. At the moment they are not in use, but they will be in the near future.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 07:45:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/227513#M43768</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2024-09-23T07:45:15Z</dc:date>
    </item>
    <item>
      <title>Re: Excessive RX-DRP Errors with new 19200 Appliance R81.20 T76 - rx_mbuf_allocation_errors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/227651#M43789</link>
      <description>&lt;P&gt;Traffic will still be accelerated in the 'traditional' SecureXL method, but yes it won't be using the new hardware capabilities. Ideally we need to resolve this, which will require investigation and remediation via TAC. Please let us know how you go with your TAC case.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 01:26:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-RX-DRP-Errors-with-new-19200-Appliance-R81-20-T76-rx/m-p/227651#M43789</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-09-24T01:26:19Z</dc:date>
    </item>
  </channel>
</rss>

