<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traffic not accelerated by Secure XL in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69485#M5331</link>
    <description>&lt;BR /&gt;fw vpn urlf av appi ips identityServer SSL_INSPECT anti_bot ThreatEmulation mon vpn</description>
    <pubDate>Thu, 05 Dec 2019 20:53:54 GMT</pubDate>
    <dc:creator>emreturkmenler</dc:creator>
    <dc:date>2019-12-05T20:53:54Z</dc:date>
    <item>
      <title>Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69447#M5327</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have been dealing with the secure XL for a while and cannot have the traffic accelerated as you can see the output below.The problem is the cpus are going over %95 during day time and i think the reason is the secure XL not handling traffic as expected as everything is going through the slow path.&lt;/P&gt;&lt;P&gt;I have been through many topics here and I will put the outputs you may ask.&lt;/P&gt;&lt;P&gt;Just a brief information of the firewall, working with ClusterXL, 8 cpu (2 SND, 6 workers) , OPEN SERVER ( I'm not sure if this could be any issue) ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is an external firewall, having DMZ, vpn and internet traffic of users and servers and more as you can think.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;#fwaccel stats -s&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Accelerated conns/Total conns : 14/79668 (0%)&lt;/P&gt;&lt;P&gt;Accelerated pkts/Total pkts&amp;nbsp;&amp;nbsp; : 370720/214400236 (0%)&lt;/P&gt;&lt;P&gt;F2Fed pkts/Total pkts&amp;nbsp;&amp;nbsp; : 211158051/214400236 (98%)&lt;/P&gt;&lt;P&gt;PXL pkts/Total pkts&amp;nbsp;&amp;nbsp; : 2871465/214400236 (1%)&lt;/P&gt;&lt;P&gt;QXL pkts/Total pkts&amp;nbsp;&amp;nbsp; : 0/214400236 (0%)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;# fwaccel conns -s&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;There are 211889 connections in SecureXL connections table&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The template number is so low.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;# fwaccel templates -s&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;There are 48 templates in SecureXL templates table&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# &lt;STRONG&gt;fwaccel stat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Accelerator Status : on&lt;/P&gt;&lt;P&gt;Accept Templates&amp;nbsp;&amp;nbsp; : disabled by Firewall&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Layer CL-EXT Security disables template offloads from rule #xxx ( just above the last rule)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Throughput acceleration still enabled.&lt;/P&gt;&lt;P&gt;Drop Templates&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : enabled&lt;/P&gt;&lt;P&gt;NAT Templates&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : disabled by Firewall&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Layer CL-EXT Security disables template offloads from rule xxx ( just above the last rule)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Throughput acceleration still enabled.&lt;/P&gt;&lt;P&gt;NMR Templates&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : enabled&lt;/P&gt;&lt;P&gt;NMT Templates&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I downloaded the fwaccel conns table and when investigated we see that most of traffic is about these 4 sources with 1 destination address (exchange related F5 traffic) as nearly 1/3 of the whole table is this connection.&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Source&lt;/TD&gt;&lt;TD&gt;Destination&lt;/TD&gt;&lt;TD&gt;DPort&lt;/TD&gt;&lt;TD&gt;PR&lt;/TD&gt;&lt;TD&gt;Flags&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; C2S&lt;/TD&gt;&lt;TD&gt;i/f S2C&lt;/TD&gt;&lt;TD&gt;i/f Inst&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;A&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;B&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;B&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;C&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;A&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;D&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;C&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;D&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;C&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;B&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;B&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;D&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;A&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;C&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;D&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;C&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;B&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;C&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;A&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;B&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;A&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;B&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;B&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;A&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;D&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;D&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;A&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;B&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;D&lt;/TD&gt;&lt;TD&gt;X&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;F..A...S......&lt;/TD&gt;&lt;TD&gt;40/32&lt;/TD&gt;&lt;TD&gt;32/40&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question is, how come this traffic isn't accelerated?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Dec 2019 14:48:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69447#M5327</guid>
      <dc:creator>emreturkmenler</dc:creator>
      <dc:date>2019-12-05T14:48:19Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69481#M5328</link>
      <description>&lt;P&gt;How many rules do you have ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is it the version of the MGMT and FW ?&lt;/P&gt;&lt;P&gt;In what rule the traffic stops being accelerated ?&lt;/P&gt;&lt;P&gt;In this rule, what are the services used ?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Dec 2019 20:43:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69481#M5328</guid>
      <dc:creator>Lucas_Costa</dc:creator>
      <dc:date>2019-12-05T20:43:15Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69483#M5329</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;How many rules do you have ?&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;327&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;What is it the version of the MGMT and FW ?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;mgmt -&amp;nbsp;R80.30 - Build 484&lt;/P&gt;&lt;P&gt;fw -&amp;nbsp;R80.10 - Build 161&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;In what rule the traffic stops being accelerated ?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;325&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;In this rule, what are the services used ?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;DCE rpc traffic, it is moved in the end not to cause problems for sexure xl.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Dec 2019 20:50:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69483#M5329</guid>
      <dc:creator>emreturkmenler</dc:creator>
      <dc:date>2019-12-05T20:50:25Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69484#M5330</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ok, what blades do you have ? Can you run "enabled_blades" ?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Dec 2019 20:52:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69484#M5330</guid>
      <dc:creator>Lucas_Costa</dc:creator>
      <dc:date>2019-12-05T20:52:38Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69485#M5331</link>
      <description>&lt;BR /&gt;fw vpn urlf av appi ips identityServer SSL_INSPECT anti_bot ThreatEmulation mon vpn</description>
      <pubDate>Thu, 05 Dec 2019 20:53:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69485#M5331</guid>
      <dc:creator>emreturkmenler</dc:creator>
      <dc:date>2019-12-05T20:53:54Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69487#M5332</link>
      <description>&lt;P&gt;I believe you have just a few templates because of the many blades that you have. Most of the traffic will pass in more than one blade and it is just accelerated in&amp;nbsp;F2Fed and not in "total connections":&lt;/P&gt;&lt;P&gt;F2Fed pkts/Total pkts : 211158051/214400236 (98%)&lt;/P&gt;</description>
      <pubDate>Thu, 05 Dec 2019 21:20:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69487#M5332</guid>
      <dc:creator>Lucas_Costa</dc:creator>
      <dc:date>2019-12-05T21:20:36Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69489#M5333</link>
      <description>&lt;P&gt;My guess is you are improperly using the object Any in the Destination or Service of your HTTPS Inspection policy and it is pulling all traffic into F2F for active streaming.&amp;nbsp; Use object Internet for the Destination (you will also need to make sure your firewall topology is completely and correctly defined to ensure this object is being calculated correctly) and only use explicit services like https in your HTTPS Inspection policy.&amp;nbsp; You might have an "Any Any Any" cleanup rule at the end of your HTTPS Inspection policy, big no-no.&lt;/P&gt;
&lt;P&gt;Another possibility is that all traffic is fragmented due to an incorrect MTU somewhere.&amp;nbsp; Please provide the output of &lt;STRONG&gt;fw ctl pstat&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Last possibility is that you are using ISP Redundancy in Load Sharing Mode, Cluster Load Sharing with Sticky Decision Function enabled, or are using your firewall as an explicit HTTP/HTTPS web proxy, pretty much everything will go F2F as a result in any of those cases.&lt;/P&gt;
&lt;P&gt;If practically all the traffic passing through this firewall is outbound user traffic to the Internet and subject to HTTPS Inspection, the 98% F2F might be legit.&lt;/P&gt;
&lt;P&gt;Don't worry about templating rates, totally separate issue that is not the problem.&lt;/P&gt;
&lt;P&gt;Could also be something in your TP policy causing the high F2F, we'll deal with that once you check your HTTPS Inspection Policy, fragmentation, and the three features I mentioned.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Dec 2019 00:26:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69489#M5333</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-12-06T00:26:12Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69536#M5337</link>
      <description>https inspection rules are set with the internet object and https service. There isn't any any rule in the end.&lt;BR /&gt;&lt;BR /&gt;I was curious about the any objects as the traffic i mentioned is passing through a firewall rule with any dest and service rule. I will add a specific rule for the traffic.&lt;BR /&gt;Could firewall policy with any objects be the problem?&lt;BR /&gt;&lt;BR /&gt;We don't have a load sharing cluster, there is user traffic but not all of the traffic is for user internet access, there might be fragmentation as i have put the output but the first possibility might be the cause.&lt;BR /&gt;&lt;BR /&gt;# fw ctl pstat&lt;BR /&gt;&lt;BR /&gt;System Capacity Summary:&lt;BR /&gt;Memory used: 9% (8765 MB out of 96499 MB) - below watermark&lt;BR /&gt;Concurrent Connections: 110365 (Unlimited)&lt;BR /&gt;Aggressive Aging is enabled, not active&lt;BR /&gt;&lt;BR /&gt;Hash kernel memory (hmem) statistics:&lt;BR /&gt;Total memory allocated: 10116661248 bytes in 2469888 (4096 bytes) blocks using 1 pool&lt;BR /&gt;Total memory bytes used: 0 unused: 10116661248 (100.00%) peak: 4717843200&lt;BR /&gt;Total memory blocks used: 0 unused: 2469888 (100%) peak: 1248346&lt;BR /&gt;Allocations: 566230308 alloc, 0 failed alloc, 538487847 free&lt;BR /&gt;&lt;BR /&gt;System kernel memory (smem) statistics:&lt;BR /&gt;Total memory bytes used: 14461308200 peak: 15218299528&lt;BR /&gt;Total memory bytes wasted: 43889265&lt;BR /&gt;Blocking memory bytes used: 58531832 peak: 221029776&lt;BR /&gt;Non-Blocking memory bytes used: 14402776368 peak: 14997269752&lt;BR /&gt;Allocations: 2125678292 alloc, 0 failed alloc, 2125658331 free, 0 failed free&lt;BR /&gt;vmalloc bytes used: 14378068460 expensive: no&lt;BR /&gt;&lt;BR /&gt;Kernel memory (kmem) statistics:&lt;BR /&gt;Total memory bytes used: 6862722468 peak: 8889698628&lt;BR /&gt;Allocations: 2691710826 alloc, 0 failed alloc&lt;BR /&gt;2663951514 free, 0 failed free&lt;BR /&gt;External Allocations: 24728832 for packets, 244282717 for SXL&lt;BR /&gt;&lt;BR /&gt;Cookies:&lt;BR /&gt;3591315592 total, 2750222193 alloc, 2750204668 free,&lt;BR /&gt;2808169679 dup, 2969475638 get, 3163934437 put,&lt;BR /&gt;762173033 len, 660318754 cached len, 0 chain alloc,&lt;BR /&gt;0 chain free&lt;BR /&gt;&lt;BR /&gt;Connections:&lt;BR /&gt;558916069 total, 404068565 TCP, 134111376 UDP, 20105413 ICMP,&lt;BR /&gt;630715 other, 8052 anticipated, 0 recovered, 110365 concurrent,&lt;BR /&gt;208312 peak concurrent&lt;BR /&gt;&lt;BR /&gt;Fragments:&lt;BR /&gt;614867937 fragments, 306839276 packets, 52179 expired, 0 short,&lt;BR /&gt;7 large, 2022 duplicates, 1572 failures&lt;BR /&gt;&lt;BR /&gt;NAT:&lt;BR /&gt;1829598225/0 forw, -1728821971/0 bckw, 67790129 tcpudp,&lt;BR /&gt;32972912 icmp, 433995668-632048567 alloc&lt;BR /&gt;&lt;BR /&gt;Sync:&lt;BR /&gt;Version: new&lt;BR /&gt;Status: Able to Send/Receive sync packets&lt;BR /&gt;Sync packets sent:&lt;BR /&gt;total : 893794328, retransmitted : 1740, retrans reqs : 1371, acks : 1780599&lt;BR /&gt;Sync packets received:&lt;BR /&gt;total : 279528838, were queued : 2908698, dropped by net : 3761&lt;BR /&gt;retrans reqs : 748, received 7220298 acks&lt;BR /&gt;retrans reqs for illegal seq : 0&lt;BR /&gt;dropped updates as a result of sync overload: 0&lt;BR /&gt;Callback statistics: handled 7139038 cb, average delay : 1, max delay : 4098</description>
      <pubDate>Fri, 06 Dec 2019 13:21:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69536#M5337</guid>
      <dc:creator>emreturkmenler</dc:creator>
      <dc:date>2019-12-06T13:21:44Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69544#M5338</link>
      <description>&lt;P&gt;Your firewall policy config is unlikely to be the problem causing high F2F, the policy config is related to templating and totally separate.&lt;/P&gt;
&lt;P&gt;&amp;gt; Fragments:&lt;BR /&gt;&amp;gt; 614867937 fragments, 306839276 packets, 52179 expired, 0 short,&lt;BR /&gt;&amp;gt; 7 large, 2022 duplicates, 1572 failures&lt;/P&gt;
&lt;P&gt;That looks a bit excessive, try running these commands to see where the fragments are coming from and how many are coming through the firewall live:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;tcpdump -eni any '((ip[6:2] &amp;gt; 0) and (not ip[6] = 64))'&lt;/STRONG&gt; &lt;BR /&gt;or&lt;BR /&gt;&lt;STRONG&gt;tcpdump -eni any "ip[6:2] &amp;amp; 0x1fff!=0"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The good news is that fragmented traffic no longer requires F2F in R80.20+, so an upgrade to R80.30 might be in order here.&lt;/P&gt;
&lt;P&gt;If you don't see a lot of constant frags with tcpdump it could be Threat Prevention causing the high F2F, to test try this:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;fwaccel stats -s &lt;/STRONG&gt;(note F2F percentage)&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;fwaccel stats -r&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;ips off&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;fw amw unload&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;(wait 60 seconds)&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;fwaccel stats -s &lt;/STRONG&gt;(note F2F percentage changes)&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;ips on &lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;fw amw fetch local&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Dec 2019 13:46:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69544#M5338</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-12-06T13:46:08Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69926#M5377</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Wont the tcpdump increase the cpu usage with a string you have given? As we are already facing high cpu, i shouldn't try to burst it more,it might cause a problem for us if so.&lt;BR /&gt;&lt;BR /&gt;We were planning to upgrade to R80.30 but we heard some issues and decided to wait for them to resolve.&lt;BR /&gt;&lt;BR /&gt;IPS might be a cause in my opinion as it is used with many protections on.</description>
      <pubDate>Tue, 10 Dec 2019 18:16:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69926#M5377</guid>
      <dc:creator>emreturkmenler</dc:creator>
      <dc:date>2019-12-10T18:16:12Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69927#M5378</link>
      <description>I also checked another cluster and the fwaccel view is slightly different,corexl is handling a portion of traffic but secureXL is not.&lt;BR /&gt;&lt;BR /&gt;# fwaccel stats -s&lt;BR /&gt;Accelerated conns/Total conns : 0/11528 (0%)&lt;BR /&gt;Accelerated pkts/Total pkts : 0/153816765 (0%)&lt;BR /&gt;F2Fed pkts/Total pkts : 99482451/153816765 (64%)&lt;BR /&gt;PXL pkts/Total pkts : 54334314/153816765 (35%)&lt;BR /&gt;QXL pkts/Total pkts : 0/153816765 (0%)&lt;BR /&gt;&lt;BR /&gt;on the fw i checked the&lt;BR /&gt;fw ctl pstat&lt;BR /&gt;and the fragmentation is not increasing at all for the live connections.&lt;BR /&gt;&lt;BR /&gt;securexl is on' enabled.&lt;BR /&gt;approximately 300 rules and securexl is disabled just before the end of the rule base so similar stuff going on.&lt;BR /&gt;version is same with other firewall.&lt;BR /&gt;&lt;BR /&gt;with the enabled blades:&lt;BR /&gt;#enabled_blades&lt;BR /&gt;fw vpn urlf av appi ips identityServer anti_bot ThreatEmulation mon vpn&lt;BR /&gt;&lt;BR /&gt;it is a 4cpu open server and cpu usage is around %50 for this one.</description>
      <pubDate>Tue, 10 Dec 2019 19:02:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69927#M5378</guid>
      <dc:creator>emreturkmenler</dc:creator>
      <dc:date>2019-12-10T19:02:12Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69969#M5379</link>
      <description>&lt;P&gt;Please run the IPS/Threat Prevention tests in my prior post.&amp;nbsp; At worst the APCL/URLF blades will drive traffic into the PXL/PSLXL paths, not F2F.&amp;nbsp; My guess would by IPS for the high F2F but the tests will tell you for sure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 01:56:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/69969#M5379</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-12-11T01:56:23Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/70112#M5389</link>
      <description>I will test it during a suitable time.&lt;BR /&gt;But what if it is the ips causing the problem, we wont be able to shut it down, we have inactivated to suggested signatures on the recommended guides using high cpu, i don't know how we will manage with all the other signatures.&lt;BR /&gt;Do you have any suggestions as if the problem might be the ips?</description>
      <pubDate>Wed, 11 Dec 2019 13:53:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/70112#M5389</guid>
      <dc:creator>emreturkmenler</dc:creator>
      <dc:date>2019-12-11T13:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/70173#M5393</link>
      <description>&lt;P&gt;Need the results of the test first before we start speculating on what needs to be adjusted in IPS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 20:31:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/70173#M5393</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-12-11T20:31:11Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/74810#M5766</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;We have upgraded one of our firewalls and the results are much more better as this is another cluster from then the one which I wrote before.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Before with R80.10&lt;BR /&gt;[Expert@cctor-fw1:0]# fwaccel stats -s&lt;BR /&gt;Accelerated conns/Total conns : 0/10382 (0%)&lt;BR /&gt;Accelerated pkts/Total pkts : 0/60391836 (0%)&lt;BR /&gt;F2Fed pkts/Total pkts : 30871026/60391836 (51%)&lt;BR /&gt;PXL pkts/Total pkts : 29520810/60391836 (48%)&lt;BR /&gt;QXL pkts/Total pkts : 0/60391836 (0%)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After with R80.30&lt;BR /&gt;cctor-fw1&amp;gt; fwaccel stats -s&lt;BR /&gt;Accelerated conns/Total conns : 97/2835 (3%)&lt;BR /&gt;Accelerated pkts/Total pkts : 668757495/1146490033 (58%)&lt;BR /&gt;F2Fed pkts/Total pkts : 120998512/1146490033 (10%)&lt;BR /&gt;F2V pkts/Total pkts : 177470213/1146490033 (15%)&lt;BR /&gt;CPASXL pkts/Total pkts : 0/1146490033 (0%)&lt;BR /&gt;PSLXL pkts/Total pkts : 356734026/1146490033 (31%)&lt;BR /&gt;QOS inbound pkts/Total pkts : 0/1146490033 (0%)&lt;BR /&gt;QOS outbound pkts/Total pkts : 0/1146490033 (0%)&lt;BR /&gt;Corrected pkts/Total pkts : 0/1146490033 (0%)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The thing is we didn't have any drops seen on netstat output but now i see RX-Drops on some interfaces.The percentage is around 0.005% but there wasn't any drops before so why now, that is bugging me.&lt;/P&gt;&lt;P&gt;Has something changed with the latest version or any change related to SecureXL handling traffic is now effecting the SND i am not sure.&lt;/P&gt;&lt;P&gt;This is an openserver with 4 CPU license ,&amp;nbsp; 1 SND + 3 FW_workers which i don't see utilization at the drops happening from my graphs.&lt;/P&gt;&lt;P&gt;Do we need to play with some buffers for nic cards on R80.30?&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2020 14:34:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/74810#M5766</guid>
      <dc:creator>emreturkmenler</dc:creator>
      <dc:date>2020-02-11T14:34:11Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/74813#M5767</link>
      <description>&lt;P&gt;Your stats look pretty good and a drop rate of 0.005% is negligible, as mentioned in my book anything less than 0.1% is fine.&amp;nbsp;&amp;nbsp; I don't recommend increasing ring buffer sizes beyond the default except as a last resort.&amp;nbsp; It is possible that the drops are due to something other than a ring buffer miss, please post the output of &lt;STRONG&gt;ethtool -S (interface)&lt;/STRONG&gt; where you are seeing RX-DRPs for further analysis.&lt;/P&gt;
&lt;P&gt;One other tip, run &lt;STRONG&gt;fwaccel stat&lt;/STRONG&gt; and see if you can move rules around to improve your accept templating rate (Accelerated conns/Total conns).&amp;nbsp; Probably some DCE-RPC services being referenced in your rulebase that need to be moved down.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2020 14:50:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/74813#M5767</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-02-11T14:50:55Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/74822#M5770</link>
      <description>&lt;P&gt;Thank you Timothy,&lt;/P&gt;&lt;P&gt;Outputs are below.&lt;/P&gt;&lt;P&gt;I organized the policy rule as the DCE rules are at the bottom as SecureXL seems ok with the rule policy.&lt;/P&gt;&lt;P&gt;[Expert@cctor-fw1:0]# ethtool -S eth7&lt;BR /&gt;NIC statistics:&lt;BR /&gt;rx_packets: 405342352&lt;BR /&gt;tx_packets: 362595719&lt;BR /&gt;rx_bytes: 212595203218&lt;BR /&gt;tx_bytes: 216157859542&lt;BR /&gt;rx_broadcast: 59164&lt;BR /&gt;tx_broadcast: 303201&lt;BR /&gt;rx_multicast: 8225&lt;BR /&gt;tx_multicast: 8154&lt;BR /&gt;multicast: 8225&lt;BR /&gt;collisions: 0&lt;BR /&gt;rx_crc_errors: 0&lt;BR /&gt;rx_no_buffer_count: 2314&lt;BR /&gt;rx_missed_errors: 10029&lt;BR /&gt;tx_aborted_errors: 0&lt;BR /&gt;tx_carrier_errors: 0&lt;BR /&gt;tx_window_errors: 0&lt;BR /&gt;tx_abort_late_coll: 0&lt;BR /&gt;tx_deferred_ok: 0&lt;BR /&gt;tx_single_coll_ok: 0&lt;BR /&gt;tx_multi_coll_ok: 0&lt;BR /&gt;tx_timeout_count: 0&lt;BR /&gt;rx_long_length_errors: 0&lt;BR /&gt;rx_short_length_errors: 0&lt;BR /&gt;rx_align_errors: 0&lt;BR /&gt;tx_tcp_seg_good: 0&lt;BR /&gt;tx_tcp_seg_failed: 0&lt;BR /&gt;rx_flow_control_xon: 0&lt;BR /&gt;rx_flow_control_xoff: 0&lt;BR /&gt;tx_flow_control_xon: 0&lt;BR /&gt;tx_flow_control_xoff: 0&lt;BR /&gt;rx_long_byte_count: 212595203218&lt;BR /&gt;tx_dma_out_of_sync: 0&lt;BR /&gt;lro_aggregated: 0&lt;BR /&gt;lro_flushed: 0&lt;BR /&gt;lro_recycled: 0&lt;BR /&gt;tx_smbus: 0&lt;BR /&gt;rx_smbus: 0&lt;BR /&gt;dropped_smbus: 0&lt;BR /&gt;os2bmc_rx_by_bmc: 0&lt;BR /&gt;os2bmc_tx_by_bmc: 0&lt;BR /&gt;os2bmc_tx_by_host: 0&lt;BR /&gt;os2bmc_rx_by_host: 0&lt;BR /&gt;rx_errors: 0&lt;BR /&gt;tx_errors: 0&lt;BR /&gt;tx_dropped: 0&lt;BR /&gt;rx_length_errors: 0&lt;BR /&gt;rx_over_errors: 0&lt;BR /&gt;rx_frame_errors: 0&lt;BR /&gt;rx_fifo_errors: 10029&lt;BR /&gt;tx_fifo_errors: 0&lt;BR /&gt;tx_heartbeat_errors: 0&lt;BR /&gt;tx_queue_0_packets: 362595719&lt;BR /&gt;tx_queue_0_bytes: 213152806139&lt;BR /&gt;tx_queue_0_restart: 0&lt;BR /&gt;rx_queue_0_packets: 405342352&lt;BR /&gt;rx_queue_0_bytes: 209352464402&lt;BR /&gt;rx_queue_0_drops: 0&lt;BR /&gt;rx_queue_0_csum_err: 0&lt;BR /&gt;rx_queue_0_alloc_failed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[Expert@cctor-fw1:0]# ethtool -S eth8&lt;BR /&gt;NIC statistics:&lt;BR /&gt;rx_octets: 233189541024&lt;BR /&gt;rx_fragments: 0&lt;BR /&gt;rx_ucast_packets: 318704358&lt;BR /&gt;rx_mcast_packets: 4686202&lt;BR /&gt;rx_bcast_packets: 17592&lt;BR /&gt;rx_fcs_errors: 0&lt;BR /&gt;rx_align_errors: 0&lt;BR /&gt;rx_xon_pause_rcvd: 0&lt;BR /&gt;rx_xoff_pause_rcvd: 0&lt;BR /&gt;rx_mac_ctrl_rcvd: 0&lt;BR /&gt;rx_xoff_entered: 0&lt;BR /&gt;rx_frame_too_long_errors: 0&lt;BR /&gt;rx_jabbers: 0&lt;BR /&gt;rx_undersize_packets: 0&lt;BR /&gt;rx_in_length_errors: 0&lt;BR /&gt;rx_out_length_errors: 0&lt;BR /&gt;rx_64_or_less_octet_packets: 0&lt;BR /&gt;rx_65_to_127_octet_packets: 0&lt;BR /&gt;rx_128_to_255_octet_packets: 0&lt;BR /&gt;rx_256_to_511_octet_packets: 0&lt;BR /&gt;rx_512_to_1023_octet_packets: 0&lt;BR /&gt;rx_1024_to_1522_octet_packets: 0&lt;BR /&gt;rx_1523_to_2047_octet_packets: 0&lt;BR /&gt;rx_2048_to_4095_octet_packets: 0&lt;BR /&gt;rx_4096_to_8191_octet_packets: 0&lt;BR /&gt;rx_8192_to_9022_octet_packets: 0&lt;BR /&gt;tx_octets: 130331680198&lt;BR /&gt;tx_collisions: 0&lt;BR /&gt;tx_xon_sent: 0&lt;BR /&gt;tx_xoff_sent: 0&lt;BR /&gt;tx_flow_control: 0&lt;BR /&gt;tx_mac_errors: 0&lt;BR /&gt;tx_single_collisions: 0&lt;BR /&gt;tx_mult_collisions: 0&lt;BR /&gt;tx_deferred: 0&lt;BR /&gt;tx_excessive_collisions: 0&lt;BR /&gt;tx_late_collisions: 0&lt;BR /&gt;tx_collide_2times: 0&lt;BR /&gt;tx_collide_3times: 0&lt;BR /&gt;tx_collide_4times: 0&lt;BR /&gt;tx_collide_5times: 0&lt;BR /&gt;tx_collide_6times: 0&lt;BR /&gt;tx_collide_7times: 0&lt;BR /&gt;tx_collide_8times: 0&lt;BR /&gt;tx_collide_9times: 0&lt;BR /&gt;tx_collide_10times: 0&lt;BR /&gt;tx_collide_11times: 0&lt;BR /&gt;tx_collide_12times: 0&lt;BR /&gt;tx_collide_13times: 0&lt;BR /&gt;tx_collide_14times: 0&lt;BR /&gt;tx_collide_15times: 0&lt;BR /&gt;tx_ucast_packets: 313497944&lt;BR /&gt;tx_mcast_packets: 4077&lt;BR /&gt;tx_bcast_packets: 4087&lt;BR /&gt;tx_carrier_sense_errors: 0&lt;BR /&gt;tx_discards: 0&lt;BR /&gt;tx_errors: 0&lt;BR /&gt;dma_writeq_full: 0&lt;BR /&gt;dma_write_prioq_full: 0&lt;BR /&gt;rxbds_empty: 1014&lt;BR /&gt;rx_discards: 17164&lt;BR /&gt;rx_errors: 0&lt;BR /&gt;rx_threshold_hit: 0&lt;BR /&gt;dma_readq_full: 0&lt;BR /&gt;dma_read_prioq_full: 0&lt;BR /&gt;tx_comp_queue_full: 0&lt;BR /&gt;ring_set_send_prod_index: 0&lt;BR /&gt;ring_status_update: 0&lt;BR /&gt;nic_irqs: 0&lt;BR /&gt;nic_avoided_irqs: 0&lt;BR /&gt;nic_tx_threshold_hit: 0&lt;BR /&gt;mbuf_lwm_thresh_hit: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[Expert@cctor-fw1:0]# netstat -ani&lt;BR /&gt;Kernel Interface table&lt;BR /&gt;Iface MTU Met RX-OK RX-ERR RX-DRP RX-OVR TX-OK TX-ERR TX-DRP TX-OVR Flg&lt;BR /&gt;eth7 1500 0 405554017 0 10029 10029 362760290 0 0 0 BMRU&lt;BR /&gt;eth7.124 1500 0 661348 0 0 0 661383 0 0 0 BMRU&lt;BR /&gt;eth7.224 1500 0 303443 0 0 0 272134 0 0 0 BMRU&lt;BR /&gt;eth7.225 1500 0 14389328 0 0 0 18132537 0 0 0 BMRU&lt;BR /&gt;eth7.226 1500 0 389534190 0 0 0 342920865 0 0 0 BMRU&lt;BR /&gt;eth7.227 1500 0 943 0 0 0 111929 0 0 0 BMRU&lt;BR /&gt;eth7.231 1500 0 664801 0 0 0 661472 0 0 0 BMRU&lt;BR /&gt;eth8 1500 0 323631418 0 17164 0 313774069 0 0 0 BMRU&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2020 15:05:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/74822#M5770</guid>
      <dc:creator>emreturkmenler</dc:creator>
      <dc:date>2020-02-11T15:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/74854#M5775</link>
      <description>&lt;P&gt;Your eth7 Intel-based interface just has some full ring buffer drops of packets, but once again the drop rate is so low I wouldn't worry about it.&amp;nbsp; You can use command&amp;nbsp;&lt;STRONG&gt;sar -n EDEV&lt;/STRONG&gt;&amp;nbsp;to see precisely when the RX-DRP counter was incremented, my guess is that the drops occurred under some transient high load such as during a policy install.&amp;nbsp; As long as they are not racking up continuously, there is nothing to worry about.&lt;/P&gt;
&lt;P&gt;eth8 on the other hand seems to have some ring buffer misses (1014) but is also reporting&amp;nbsp;&lt;SPAN&gt;17164 rx-discards.&amp;nbsp; Typically discards are the receipt of unknown protocols from the network that the Ethernet driver is not configured to interact with (IPv6, IPX, Appletalk, etc); my book has a section titled "RX-DRP Revisited: Still Racking Them Up?" which covers how to track down these rogue protocols with &lt;STRONG&gt;tcpdump&lt;/STRONG&gt;.&amp;nbsp; The rate is so low though I wouldn't worry about it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Unfortunately for you, the eth8 counters are associated with a Broadcom NIC and as such need to be taken with a grain of salt.&amp;nbsp; Broadcom and Emulex were singled out for especially harsh criticism in my book, and I don't trust those vendors' NIC products whatsoever.&amp;nbsp; If you can move that interface's traffic to an Intel-based NIC, you will save yourself a lot of problems.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2020 19:26:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/74854#M5775</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-02-11T19:26:43Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/75793#M5859</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp; I know this is an older post, but I was looking into this for optimizing our accelerated packets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You're saying that an "any any any" cleanup rule in https inspection is a big no no.&lt;/P&gt;&lt;P&gt;The December 18th tech talk for ssl inspection had said that it is best practice to do an "any any any" bypass rule for cleanup.&lt;/P&gt;&lt;P&gt;As your one of the big experts on optimization, I'm a little lost as to what is the correct answer. I want to make sure I'm using the best method. Can you help clarify?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;referenced tech talk:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Access-Control-Products/HTTPS-Inspection-Best-Practices-TechTalk-Video-Slides-and-Q-amp/m-p/70842" target="_blank"&gt;https://community.checkpoint.com/t5/Access-Control-Products/HTTPS-Inspection-Best-Practices-TechTalk-Video-Slides-and-Q-amp/m-p/70842&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Feb 2020 19:23:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/75793#M5859</guid>
      <dc:creator>NorthernNetGuy</dc:creator>
      <dc:date>2020-02-19T19:23:44Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not accelerated by Secure XL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/75899#M5863</link>
      <description>&lt;P&gt;The component of the HTTPS Inspection cleanup rule that I was indirectly calling out in my prior post was a service of "Any" which is actually the big no-no.&amp;nbsp; A Source and Destination of Any on a cleanup rule with a Bypass action is OK and desirable.&amp;nbsp; The recommendation for a Bypass cleanup rule in the TLS Inspection TechTalk appears to have been spawned by the SecureXL changes in R80.20, where CPAS was pulled out of the F2F path and put into its own path CPASXL, and the enhanced TLS parser introduced in R80.30.&amp;nbsp; Here is some of the TLS Inspection Policy Tuning content from the third edition of my book that should hopefully clarify:&lt;/P&gt;
&lt;H3 class="western"&gt;&amp;nbsp;&lt;/H3&gt;
&lt;LI-SPOILER&gt;
&lt;H3 class="western"&gt;HTTPS Inspection Policy Tuning&lt;/H3&gt;
&lt;P class="western" style="margin-bottom: 0in;"&gt;The HTTPS Inspection policy specifies exactly what types of TLS traffic the firewall should inspect via active streaming with the associated process space trips. Properly configuring this policy is critical to ensure reasonable firewall performance when HTTPS Inspection is enabled. Some recommendations:&lt;/P&gt;
&lt;P class="western" style="margin-bottom: 0in;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="western" style="margin-bottom: 0in;"&gt;&lt;STRONG&gt;Make sure that your HTTPS Inspection policy has an explicit cleanup rule with Source and Destination of “Any”, and an action of “Bypass” as shown here:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="western" style="margin-bottom: 0in;"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P class="western" style="margin-bottom: 0in;"&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="https_cleanup.png" style="width: 681px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4534i3351337DF585219C/image-size/large?v=v2&amp;amp;px=999" role="button" title="https_cleanup.png" alt="https_cleanup.png" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="western" style="margin-bottom: 0in;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="western" style="margin-bottom: 0in;"&gt;Use of this explicit cleanup rule will ensure that only traffic requiring active streaming will be pulled into the CPASXL path. Failure to configure an explicit cleanup rule of this nature will cause much more active streaming to occur on the firewall than necessary, and has been reported to cause at least a 40% performance hit on firewalls performing HTTPS Inspection.&lt;/P&gt;
&lt;P class="western" style="margin-bottom: 0in;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="western" style="margin-bottom: 0in;"&gt;&lt;STRONG&gt;Avoid the use of “Any” in the Source &lt;/STRONG&gt;&lt;STRONG&gt;&amp;amp;&lt;/STRONG&gt;&lt;STRONG&gt; Destinatio&lt;/STRONG&gt;&lt;STRONG&gt;n columns&lt;/STRONG&gt;&lt;STRONG&gt; of the HTTPS Inspection policy&lt;/STRONG&gt; (except for the explicit cleanup rule mentioned above). Similarly to the Access Control and Threat Prevention policies covered earlier in this book, failure to heed this recommendation can result in massive amounts of LAN-speed traffic suddenly becoming subject to active streaming inadvertently, which can potentially crater the performance of even the largest firewalls. Proper use of object “Internet”, and negations of host/network objects and groups in the Source and Destination fields of the HTTPS Inspection policy can help keep this highly unpleasant situation from occurring.&lt;/P&gt;
&lt;P class="western" style="margin-bottom: 0in;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="western" style="margin-bottom: 0in;"&gt;&lt;STRONG&gt;Never set the Service&lt;/STRONG&gt;&lt;STRONG&gt;s&lt;/STRONG&gt;&lt;STRONG&gt; column of the HTTPS Inspection Policy to “Any”&lt;/STRONG&gt;&lt;SPAN style="font-weight: normal;"&gt;.&lt;/SPAN&gt; Be especially careful about accidentally setting the Services field of an HTTPS Inspection policy rule with an action of “Inspect” to “Any”, for the reasons described here: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101486" target="_blank" rel="noopener"&gt;sk101486: Non-HTTPS traffic (FTP/S, SMTP/S and more) are matched to HTTPS Inspection Policy and performs CPAS&lt;/A&gt;.&lt;/P&gt;
&lt;P class="western" style="margin-bottom: 0in;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="western" style="margin-bottom: 0in;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI-SPOILER&gt;
&lt;P class="western" style="margin-bottom: 0in;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2020 14:36:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-not-accelerated-by-Secure-XL/m-p/75899#M5863</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-02-20T14:36:18Z</dc:date>
    </item>
  </channel>
</rss>

