<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best CoreXL Firewall mode in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236122#M45786</link>
    <description>&lt;P&gt;In my personal opinion, with 8 cores on the appliance, moving to USFW mode will not give you any advantages. The only reason to switch would be about TLS Inspection. You cannot do TLS 1.3 and QUIC without USFW on&lt;/P&gt;</description>
    <pubDate>Wed, 18 Dec 2024 12:16:37 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2024-12-18T12:16:37Z</dc:date>
    <item>
      <title>Best CoreXL Firewall mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236101#M45779</link>
      <description>&lt;DIV class="flex max-w-full flex-col flex-grow"&gt;
&lt;DIV class="min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words text-start [.text-message+&amp;amp;]:mt-5" dir="auto" data-message-author-role="assistant" data-message-id="dcd1d35d-7a56-430b-8d88-8f258a45b360" data-message-model-slug="gpt-4o"&gt;
&lt;DIV class="flex w-full flex-col gap-1 empty:hidden first:pt-[3px]"&gt;
&lt;DIV class="markdown prose w-full break-words dark:prose-invert dark"&gt;
&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I have a cluster of 6500 gateways and a VM management server, all running &lt;STRONG&gt;R81.20&lt;/STRONG&gt; with &lt;STRONG&gt;Take 84&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;The gateways are currently operating in &lt;STRONG&gt;kernel mode&lt;/STRONG&gt;. While I understand that user mode is the default for these gateways, I am unsure why they are configured to run in kernel mode.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="mb-2 flex gap-3 empty:hidden -ml-2"&gt;
&lt;DIV class="items-center justify-start rounded-xl p-1 flex"&gt;
&lt;DIV class="flex items-center"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;LI-CODE lang="python"&gt;fwaccel stat
+---------------------------------------------------------------------------------+
|Id|Name     |Status     |Interfaces               |Features                      |
+---------------------------------------------------------------------------------+
|0 |KPPAK    |enabled    |Sync,Mgmt,eth1-01,       |Acceleration,Cryptography     |
|  |         |           |eth1-03,eth1-04          |                              |
|  |         |           |                         |Crypto: Tunnel,UDPEncap,MD5,  |
|  |         |           |                         |SHA1,3DES,DES,AES-128,AES-256,|
|  |         |           |                         |ESP,LinkSelection,DynamicVPN, |
|  |         |           |                         |NatTraversal,AES-XCBC,SHA256, |
|  |         |           |                         |SHA384,SHA512                 |
+---------------------------------------------------------------------------------+

Accept Templates : enabled
Drop Templates   : enabled
NAT Templates    : enabled
LightSpeed Accel : disabled&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;fwaccel stats -s&lt;/STRONG&gt; command shows:&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="ruby"&gt;fwaccel stats -s
Accelerated conns/Total conns    : 228/71177 (0%)
LightSpeed conns/Total conns     : 0/71177 (0%)
Accelerated pkts/Total pkts      : 48951535737/54082458012 (90%)
LightSpeed pkts/Total pkts       : 0/54082458012 (0%)
F2Fed pkts/Total pkts            : 5130922275/54082458012 (9%)
F2V pkts/Total pkts              : 255589979/54082458012 (0%)
CPASXL pkts/Total pkts           : 1919756022/54082458012 (3%)
PSLXL pkts/Total pkts            : 46235738870/54082458012 (85%)
CPAS pipeline pkts/Total pkts    : 0/54082458012 (0%)
PSL pipeline pkts/Total pkts     : 0/54082458012 (0%)
QOS inbound pkts/Total pkts      : 0/54082458012 (0%)
QOS outbound pkts/Total pkts     : 0/54082458012 (0%)
Corrected pkts/Total pkts        : 0/54082458012 (0%)&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;from&amp;nbsp;&lt;SPAN&gt;&lt;STRONG&gt;sk167052&lt;/STRONG&gt; i can see that if&amp;nbsp; &lt;STRONG&gt;30% or more of the traffic undergoes the PXL / Medium path,&lt;/STRONG&gt; then Usermode is recommended!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As you can see &lt;STRONG&gt;85%&lt;/STRONG&gt; of traffic undergoes PXL.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The question:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Moving from Kernel mode to Usermode, do we need a service windows to do that?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;What potential issues could arise during this transition?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 10:22:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236101#M45779</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-12-18T10:22:17Z</dc:date>
    </item>
    <item>
      <title>Re: Best CoreXL Firewall mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236109#M45781</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/65882"&gt;@Moudar&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I suggest you that, always do changes in maintenance window,&amp;nbsp;for safety's sake.&lt;/P&gt;
&lt;P&gt;Ok, do you want to enable USFW mode. Except this statement, do you experience performance degradation? High load on CPU etc?&lt;/P&gt;
&lt;P&gt;Does dynamic balancing enabled?&lt;/P&gt;
&lt;P&gt;Because of this:&lt;/P&gt;
&lt;TABLE class="footnote" border="1" cellspacing="2" cellpadding="4"&gt;
&lt;TBODY&gt;
&lt;TR class="SubTitle" bgcolor="#d6dff0"&gt;
&lt;TD align="center"&gt;Procedure&lt;/TD&gt;
&lt;TD align="center"&gt;Instructions&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Recommended&lt;/TD&gt;
&lt;TD&gt;
&lt;OL&gt;
&lt;LI&gt;Connect to the command line on the Security Gateway / each Cluster Member.&lt;/LI&gt;
&lt;LI&gt;Run:&lt;BR /&gt;&lt;CODE&gt;cpconfig&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Enter the number of the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Check Point CoreXL&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;option.&lt;/LI&gt;
&lt;LI&gt;Enter&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;3&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Change firewall mode&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Follow the instructions on the screen.&lt;/LI&gt;
&lt;LI&gt;Exit from the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;cpconfig&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;menu.&lt;/LI&gt;
&lt;LI&gt;Reboot.&lt;BR /&gt;In a cluster, this can cause a failover.&lt;/LI&gt;
&lt;/OL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So always do it in maintanace window &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Akos&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 12:00:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236109#M45781</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2024-12-18T12:00:38Z</dc:date>
    </item>
    <item>
      <title>Re: Best CoreXL Firewall mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236111#M45782</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kort.JPG" style="width: 547px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28871iC3A75F14BAAB0680/image-size/large?v=v2&amp;amp;px=999" role="button" title="kort.JPG" alt="kort.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I don’t want to enable User mode just for the sake of it. My intention is to follow the recommendation, especially since the CPU occasionally reaches 100%.&lt;/P&gt;
&lt;P&gt;Currently, the connection stats show: &lt;STRONG&gt;Accelerated conns/Total conns: 226/59,929 (0%)&lt;/STRONG&gt;. I’m not sure if enabling User mode would improve this!&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 11:39:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236111#M45782</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-12-18T11:39:13Z</dc:date>
    </item>
    <item>
      <title>Re: Best CoreXL Firewall mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236114#M45783</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/65882"&gt;@Moudar&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yo are facing with performance issues. all CPUs reach the 100%? Or sometimes. What does the spike detector in cpview say?&lt;/P&gt;
&lt;P&gt;You need to call the&amp;nbsp;“Super Seven” Commands for help.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;#fwaccel stat&lt;/STRONG&gt;&lt;BR /&gt;#fwaccel stats -s&lt;BR /&gt;#grep -c ^processor /proc/cpuinfo&lt;BR /&gt;#fw ctl affinity -l -r&lt;BR /&gt;#netstat -ni&lt;BR /&gt;#fw ctl multik stat&lt;BR /&gt;#cpstat os -f multi_cpu -o 1&lt;/P&gt;
&lt;P&gt;Esepecially the first one. My idea is that the acceleration is not working properly.&lt;/P&gt;
&lt;P&gt;What do you see under Accept Templates - &amp;gt;&amp;nbsp;&lt;STRONG&gt;Security disables template offloads from rule #XX&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Akos&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 11:48:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236114#M45783</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2024-12-18T11:48:15Z</dc:date>
    </item>
    <item>
      <title>Re: Best CoreXL Firewall mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236116#M45784</link>
      <description>&lt;P&gt;Note USFW and UPPAK are not the same things, the later is SecureXL terminology not CoreXL and applies to Quantum Force appliances.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 11:58:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236116#M45784</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-12-18T11:58:35Z</dc:date>
    </item>
    <item>
      <title>Re: Best CoreXL Firewall mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236117#M45785</link>
      <description>&lt;P&gt;THX, I changed the UPPAK to USFW.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 12:01:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236117#M45785</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2024-12-18T12:01:35Z</dc:date>
    </item>
    <item>
      <title>Re: Best CoreXL Firewall mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236122#M45786</link>
      <description>&lt;P&gt;In my personal opinion, with 8 cores on the appliance, moving to USFW mode will not give you any advantages. The only reason to switch would be about TLS Inspection. You cannot do TLS 1.3 and QUIC without USFW on&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 12:16:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236122#M45786</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-12-18T12:16:37Z</dc:date>
    </item>
    <item>
      <title>Re: Best CoreXL Firewall mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236137#M45789</link>
      <description>&lt;P&gt;The other recommendation in the SK is that if fastpath traffic is in excess of 80% KMFW is preferred; your firewall is at 90% which is why it may have been changed.&amp;nbsp; The SK may also recommend that if "30% or more of the traffic undergoes the PXL / Medium path,&lt;SPAN&gt;&amp;nbsp;then Usermode/USFW is recommended", but USFW is less efficient than KMFW for Medium Path and Slowpath due to having to cross the kernel/userspace boundary; the penalty is 20-30%.&amp;nbsp; &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;However the default for the 6000 series is USFW which you should probably use to get the latest features like TLS/QUIC/connview/Hyperflow, as these will not work with KMFW.&amp;nbsp; The extra 20-30% speed in KMFW is not worth the functionality tradeoff in my opinion.&amp;nbsp; Also the QA testing of the code for the 6000 boxes was conducted in USFW mode.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Changing from KMFW to USFW will not improve "&amp;nbsp;&lt;STRONG&gt;Accelerated conns/Total conns: 226/59,929 (0%)&lt;/STRONG&gt;" as that is a templating issue, run &lt;STRONG&gt;fwaccel templates -R&lt;/STRONG&gt; to diagnose; you almost certainly have rulebase construction issues causing the 0%.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 14:51:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236137#M45789</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-12-18T14:51:36Z</dc:date>
    </item>
    <item>
      <title>Re: Best CoreXL Firewall mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236152#M45792</link>
      <description>&lt;P&gt;When I run the command f&lt;STRONG&gt;waccel templates -R&lt;/STRONG&gt; i get this:&lt;/P&gt;
&lt;LI-CODE lang="ruby"&gt;fwaccel templates -R

Matched connections not allowed to use templates:
% Prevention : 0.482%

Reason                                  Count      Reason Prevented From Matched %

Non-Syn/Empty First Packet              |478496    |0.374     %
Src/dst IP Blacklisted                  |137822    |0.108     %
--------------------

Connections failed to create templates:
% Fail to Create : 39.533%

Reason                                  Count      Reason Fail To Create %

Multicast Conn                          |558836    |0.246     %
NON TCP/UDP PROTO                       |3701462   |1.628     %
Conn Not Accelerated                    |7439049   |3.271     %
NAT Disallowed Conn                     |77340198  |34.010    %
DHCP Check Feature Isn't Supported Or Disabled|36        |0.000     %
General Error                           |545518    |0.240     %
Malicious Destination IP Detected       |66431     |0.029     %
Prevented By Policy Rules               |249288    |0.110     %&lt;/LI-CODE&gt;
&lt;P&gt;What could be causing NAT to block or disallow connections?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 14:12:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236152#M45792</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-12-18T14:12:04Z</dc:date>
    </item>
    <item>
      <title>Re: Best CoreXL Firewall mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236154#M45793</link>
      <description>&lt;P&gt;What does&amp;nbsp;&lt;STRONG&gt;#fwaccel stat say?&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 14:13:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236154#M45793</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2024-12-18T14:13:42Z</dc:date>
    </item>
    <item>
      <title>Re: Best CoreXL Firewall mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236163#M45794</link>
      <description>&lt;P&gt;that information is covered at the beginning of the post. Please take a look there!&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 14:33:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236163#M45794</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-12-18T14:33:52Z</dc:date>
    </item>
    <item>
      <title>Re: Best CoreXL Firewall mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236170#M45796</link>
      <description>&lt;P&gt;Indeed, sorry.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 14:42:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236170#M45796</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2024-12-18T14:42:17Z</dc:date>
    </item>
    <item>
      <title>Re: Best CoreXL Firewall mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236171#M45797</link>
      <description>&lt;P&gt;As I see you opened a thread with almost the same topic.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/nat-disallows/m-p/228235#M43999" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/nat-disallows/m-p/228235#M43999&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Before you tried to understand it. Some housekeeping steps may could help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;if you do a failover the issue persists?
&lt;UL&gt;
&lt;LI&gt;I know the policy is the same but have a try&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;how much is the uptime?&amp;nbsp;&lt;BR /&gt;
&lt;UL&gt;
&lt;LI&gt;it should be 60-90 days&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;this behaviour was earlier too? Before take 84?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;However what about the TAC?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;akos&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 14:54:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236171#M45797</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2024-12-18T14:54:51Z</dc:date>
    </item>
    <item>
      <title>Re: Best CoreXL Firewall mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236172#M45798</link>
      <description>&lt;P&gt;Did you run that command on the standby member of a cluster or the active?&amp;nbsp; That looks like the standby.&amp;nbsp; If not I would assume that means that NAT templates are not forming for some reason and forcing a full NAT rulebase lookup in the slowpath, even though it looks like NAT templates are fully enabled.&amp;nbsp; R&amp;amp;D will probably have to comment (&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;), also see here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/nat-disallows/m-p/228235#M43999" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;(nat disallows)&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 14:58:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236172#M45798</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-12-18T14:58:11Z</dc:date>
    </item>
    <item>
      <title>Re: Best CoreXL Firewall mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236175#M45799</link>
      <description>&lt;P&gt;I’m aware of my old posts&lt;span class="lia-unicode-emoji" title=":grinning_face_with_big_eyes:"&gt;😃&lt;/span&gt;, but the question here is specifically about User mode versus Kernel mode. I have a feeling that transitioning from Kernel mode to User mode might be a potential solution. but maybe not&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 15:10:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236175#M45799</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-12-18T15:10:05Z</dc:date>
    </item>
    <item>
      <title>Re: Best CoreXL Firewall mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236176#M45800</link>
      <description>&lt;P&gt;This is from the active gateway, which has been active for 16 days.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 15:11:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236176#M45800</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-12-18T15:11:13Z</dc:date>
    </item>
    <item>
      <title>Re: Best CoreXL Firewall mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236177#M45801</link>
      <description>&lt;P&gt;As _Val_ told that, this would not be the solution, but up to you. If the performance getting worse you could revert.&lt;/P&gt;
&lt;P&gt;And how much is the trougput overall on the GW member?&lt;/P&gt;
&lt;P&gt;Akos&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 15:15:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236177#M45801</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2024-12-18T15:15:18Z</dc:date>
    </item>
    <item>
      <title>Re: Best CoreXL Firewall mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236215#M45810</link>
      <description>&lt;P&gt;According to&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/41528"&gt;@CheckMatesAI&lt;/a&gt;,&amp;nbsp;the reasons won't NAT Template include the following:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;NAT Templates are Disabled&lt;/STRONG&gt;: If NAT templates are not enabled, NATed traffic cannot be templated. Refer to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk71200" target="_blank" rel="noopener"&gt;sk71200&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for more details.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;VPN Traffic&lt;/STRONG&gt;: VPN traffic cannot be templated.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Complex Connections&lt;/STRONG&gt;: Connections involving complex protocols such as FTP, H323, SQL, etc., cannot be templated.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Non-TCP/Non-UDP/ICMP Traffic&lt;/STRONG&gt;: Traffic that is not TCP, UDP, or ICMP cannot be templated.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Specific Rules in the Rule Base&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Rules with service 'Any' (resolved from R75.40).&lt;/LI&gt;
&lt;LI&gt;Rules with a service that has a 'handler'. When the chosen service has a protocol type defined, instead of 'None', it might have a handler configured on it. This setting can be changed only in SmartDashboard R7X and lower. For R80.XX, changes can only be done by cloning the service.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Network Quota&lt;/STRONG&gt;: When the SmartDefense/IPS protection "Network Quota" is enabled, SecureXL Accept Templates/NAT Templates/Drop Templates are automatically disabled. Refer to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk31630" target="_blank" rel="noopener"&gt;sk31630&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for more details.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Overlapping NAT&lt;/STRONG&gt;: Overlapping NAT does not support any form of acceleration on any platform, including SecureXL or IPSO Flows. Refer to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk44091" target="_blank" rel="noopener"&gt;sk44091&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for more details.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Point-to-Point Interfaces&lt;/STRONG&gt;: SecureXL does not support Point-to-Point interfaces (PPP, PPTP, PPPoE). If a PPP-interface is detected, SecureXL disables itself on that interface. Refer to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk79880" target="_blank" rel="noopener"&gt;sk79880&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for more details.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Global DHCP Services&lt;/STRONG&gt;: Using global DHCP services in the policy disables SecureXL Accept Templates. Use local 'dhcp' related services in the domain's rulebase to avoid this behavior. Refer to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk162544" target="_blank" rel="noopener"&gt;sk162544&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for more details.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;That said, we probably already covered all that, so&amp;nbsp;I also asked &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/41528"&gt;@CheckMatesAI&lt;/a&gt;&amp;nbsp;&amp;nbsp;how to debug NAT templates.&lt;BR /&gt;It suggested the following commands:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;fwaccel dbg resetall&lt;BR /&gt;fwaccel dbg -m general + nat&lt;BR /&gt;fw ctl debug 0&lt;BR /&gt;fw ctl debug -buf 32000&lt;BR /&gt;fw ctl debug -m fw + conn packet nat xlate xltrc&lt;BR /&gt;fw ctl kdebug -T -f &amp;gt; /var/log/kernel_debug.txt&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;To turn off:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;fw ctl debug 0&lt;BR /&gt;fwaccel dbg resetall&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Hopefully that will help track it down.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 18:56:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Best-CoreXL-Firewall-mode/m-p/236215#M45810</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-12-18T18:56:07Z</dc:date>
    </item>
  </channel>
</rss>

