<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CPU intensive connections &amp;quot;TCP:empowerid&amp;quot; in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-intensive-connections-quot-TCP-empowerid-quot/m-p/83210#M6432</link>
    <description>&lt;P&gt;Hello Timothy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot, very useful resource!&lt;/P&gt;&lt;P&gt;I'll try some of these remediation options in the next days.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;piou_piou&lt;/P&gt;</description>
    <pubDate>Sun, 26 Apr 2020 16:25:29 GMT</pubDate>
    <dc:creator>piou_piou</dc:creator>
    <dc:date>2020-04-26T16:25:29Z</dc:date>
    <item>
      <title>CPU intensive connections "TCP:empowerid"</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-intensive-connections-quot-TCP-empowerid-quot/m-p/83072#M6422</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Due to the current situation, we all know lots of users are working remotely.&lt;/P&gt;&lt;P&gt;I am having a weird problem on my R80.30 cluster (5400 appliances) :&lt;/P&gt;&lt;P&gt;The CPU is dangerously increasing during daytime (it reached 100% today). I noticed via cpview that most of the CPU is consumed by a few connections :&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Active FW - cpview CPU.jpg" style="width: 784px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5775iDCADA383A9D12EB7/image-size/large?v=v2&amp;amp;px=999" role="button" title="Active FW - cpview CPU.jpg" alt="Active FW - cpview CPU.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;These connections are always using TCP/7080 port and are displayed as "TCP:empowerid".&lt;/P&gt;&lt;P&gt;This is always from a 172.16.50.x host (which is our remote access VPN users pool) to 10.75.30.248 which is one of our Cisco Jabber server. Users and IP can be different, it seems to be happening randomly in the remote access VPN pool.&lt;/P&gt;&lt;P&gt;I managed to lower the CPU by manually disconnecting the involved users as you can see on the following graph at 14h and 16h (CPU is in yellow) :&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Active FW - CPU last day.jpg" style="width: 856px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5776iFD64551B84A5009B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Active FW - CPU last day.jpg" alt="Active FW - CPU last day.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Then as soon as someone is starting to work in the working, CPU is increasing like crazy... and eventually reaches 100%.&lt;/P&gt;&lt;P&gt;Same problem, same workaround for now, and here is the last graph I have :&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Active FW - CPU last hour.jpg" style="width: 885px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5778iB66329D8EC873495/image-size/large?v=v2&amp;amp;px=999" role="button" title="Active FW - CPU last hour.jpg" alt="Active FW - CPU last hour.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I added a rule to drop the TCP/7080 service for now it's working properly, but we may need to accept this service later in order to make Jaber calls work when working remotely (it doesn't work for now and I've no clue why but its another topic).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's my GW's version :&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cpinfo -y all.PNG" style="width: 582px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5779i8443C384B47DB526/image-size/large?v=v2&amp;amp;px=999" role="button" title="cpinfo -y all.PNG" alt="cpinfo -y all.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does someone has already seen this before?&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your help!&lt;/P&gt;&lt;P&gt;piou_piou&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2020 13:12:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-intensive-connections-quot-TCP-empowerid-quot/m-p/83072#M6422</guid>
      <dc:creator>piou_piou</dc:creator>
      <dc:date>2020-04-24T13:12:48Z</dc:date>
    </item>
    <item>
      <title>Re: CPU intensive connections "TCP:empowerid"</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-intensive-connections-quot-TCP-empowerid-quot/m-p/83093#M6423</link>
      <description>&lt;P&gt;Yes, what you are seeing is classic elephant flow behavior; Check Point calls these heavy connections.&amp;nbsp; Please see my CPX 2020 presentation titled "Big Game Hunting: Elephant Flows" based on a chapter of my book which goes through the available identification tools and possible remediation options:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/432/3/CPX_Big_Game_Hunting_FINAL2.cleaned.pdf" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/member-exclusives/432/3/CPX_Big_Game_Hunting_FINAL2.cleaned.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Edit: It is also possible these particular connections have to be processed F2F/slowpath for some reason, to see which path these connections are in run &lt;STRONG&gt;fwaccel conns&lt;/STRONG&gt; and search for the connection and port attributes.&lt;/P&gt;</description>
      <pubDate>Sun, 26 Apr 2020 17:56:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-intensive-connections-quot-TCP-empowerid-quot/m-p/83093#M6423</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-04-26T17:56:06Z</dc:date>
    </item>
    <item>
      <title>Re: CPU intensive connections "TCP:empowerid"</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-intensive-connections-quot-TCP-empowerid-quot/m-p/83210#M6432</link>
      <description>&lt;P&gt;Hello Timothy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot, very useful resource!&lt;/P&gt;&lt;P&gt;I'll try some of these remediation options in the next days.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;piou_piou&lt;/P&gt;</description>
      <pubDate>Sun, 26 Apr 2020 16:25:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CPU-intensive-connections-quot-TCP-empowerid-quot/m-p/83210#M6432</guid>
      <dc:creator>piou_piou</dc:creator>
      <dc:date>2020-04-26T16:25:29Z</dc:date>
    </item>
  </channel>
</rss>

