<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RX drop in one interface 21400 Appliance (SAM) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/89206#M6853</link>
    <description>&lt;P&gt;Right moving to a 6/6 split and enabling Multi-Queue should resolve that.&lt;/P&gt;</description>
    <pubDate>Fri, 19 Jun 2020 13:11:53 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2020-06-19T13:11:53Z</dc:date>
    <item>
      <title>RX drop in one interface 21400 Appliance (SAM)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/88584#M6821</link>
      <description>&lt;P&gt;Hi Checkmates,&lt;/P&gt;&lt;P&gt;Gateway Version : R77.30&lt;/P&gt;&lt;P&gt;We face massive number of RX drop in production hours.&lt;/P&gt;&lt;P&gt;We have 21400 Appliance which having SAM hardware. We only use Firewall blade.&lt;/P&gt;&lt;P&gt;Concurrent connection is nearly 200000 connection. (fw tab -t connections -s)&lt;/P&gt;&lt;P&gt;Gateways have 12 CORE, By default SND have 2 CORE and FW workers have 10 core.&lt;/P&gt;&lt;P&gt;So because of RX drop we changed the CoreXL configuration using "CPCONFIG" utility , Assigned 4 CORE to SND and 8 CORE to FW workers.&lt;/P&gt;&lt;P&gt;After chages we verify using below command.&lt;/P&gt;&lt;P&gt;FW1&lt;/P&gt;&lt;P&gt;Interface eth3-01 (irq 179): CPU 2&lt;BR /&gt;Interface eth3-04 (irq 140): CPU 1&lt;BR /&gt;Interface eth3-12 (irq 85): CPU 3&lt;BR /&gt;Kernel fw_0: CPU 11&lt;BR /&gt;Kernel fw_1: CPU 10&lt;BR /&gt;Kernel fw_2: CPU 9&lt;BR /&gt;Kernel fw_3: CPU 8&lt;BR /&gt;Kernel fw_4: CPU 7&lt;BR /&gt;Kernel fw_5: CPU 6&lt;BR /&gt;Kernel fw_6: CPU 5&lt;BR /&gt;Kernel fw_7: CPU 4&lt;BR /&gt;Daemon pepd: CPU all&lt;BR /&gt;Daemon fwd: CPU all&lt;BR /&gt;Daemon pdpd: CPU all&lt;BR /&gt;Daemon lpd: CPU all&lt;BR /&gt;Daemon rtmd: CPU all&lt;BR /&gt;Daemon mpdaemon: CPU all&lt;BR /&gt;Daemon cpd: CPU all&lt;BR /&gt;Daemon cprid: CPU all&lt;BR /&gt;Interface eth-bp1d1: has multi queue enabled&lt;BR /&gt;Interface eth-bp1d2: has multi queue enabled&lt;/P&gt;&lt;P&gt;FW2&lt;/P&gt;&lt;P&gt;Interface eth3-01 (irq 83): CPU 0&lt;BR /&gt;Interface eth1-01 (irq 123): CPU 0&lt;BR /&gt;Interface eth1-02 (irq 187): CPU 1&lt;BR /&gt;Interface eth3-04 (irq 171): CPU 2&lt;BR /&gt;Interface eth2-01 (irq 156): CPU 2&lt;BR /&gt;Interface eth2-02 (irq 196): CPU 3&lt;BR /&gt;Interface eth3-12 (irq 236): CPU 1&lt;BR /&gt;Kernel fw_0: CPU 11&lt;BR /&gt;Kernel fw_1: CPU 10&lt;BR /&gt;Kernel fw_2: CPU 9&lt;BR /&gt;Kernel fw_3: CPU 8&lt;BR /&gt;Kernel fw_4: CPU 7&lt;BR /&gt;Kernel fw_5: CPU 6&lt;BR /&gt;Kernel fw_6: CPU 5&lt;BR /&gt;Kernel fw_7: CPU 4&lt;BR /&gt;Daemon lpd: CPU all&lt;BR /&gt;Daemon pdpd: CPU all&lt;BR /&gt;Daemon fwd: CPU all&lt;BR /&gt;Daemon mpdaemon: CPU all&lt;BR /&gt;Daemon rtmd: CPU all&lt;BR /&gt;Daemon pepd: CPU all&lt;BR /&gt;Daemon cprid: CPU all&lt;BR /&gt;Daemon cpd: CPU all&lt;BR /&gt;Interface eth-bp1d1: has multi queue enabled&lt;BR /&gt;Interface eth-bp1d2: has multi queue enabled&lt;/P&gt;&lt;P&gt;Accelerated conns/Total conns : 211008/216112 (97%)&lt;BR /&gt;Accelerated pkts/Total pkts : 39971509687/40950216403 (97%)&lt;BR /&gt;F2Fed pkts/Total pkts : 545116700/40950216403 (1%)&lt;BR /&gt;PXL pkts/Total pkts : 433590016/40950216403 (1%)&lt;BR /&gt;QXL pkts/Total pkts : 0/40950216403 (0%)&lt;/P&gt;&lt;P&gt;NOTE : eth1-01 is busiest interface among all&lt;/P&gt;&lt;P&gt;I need some clarification on below point:&lt;/P&gt;&lt;P&gt;SND core configuration is mismatch so can we face any issue if failover is happened ??&lt;/P&gt;&lt;P&gt;We are using CPCONFIG for CoreXL configuration which is automatically assigned the interface to core then why its mismatch ??&lt;/P&gt;&lt;P&gt;Still We only use Firewall blade so can we increase the SND core to atleast 6 or 8 core to resolved the RX drop issue ???&lt;/P&gt;&lt;P&gt;Can we Enabled the "Multi-Queue" , assigned dedicated core to "eth1-01" which handle more traffic in our production ???&lt;/P&gt;&lt;P&gt;We also plan to upgrade to R80.30 so is this help ?&lt;/P&gt;&lt;P&gt;Also please suggested any alternative solution ??&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/25509"&gt;@Chinmaya_Naik&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 10:20:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/88584#M6821</guid>
      <dc:creator>Chinmaya_Naik</dc:creator>
      <dc:date>2020-06-15T10:20:25Z</dc:date>
    </item>
    <item>
      <title>Re: RX drop in one interface 21400 Appliance (SAM)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/88648#M6823</link>
      <description>&lt;P&gt;Really need to see the "Super Seven" outputs (&lt;A href="https://community.checkpoint.com/t5/General-Topics/Super-Seven-Performance-Assessment-Commands-s7pac/m-p/40528/" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/Super-Seven-Performance-Assessment-Commands-s7pac/m-p/40528/&lt;/A&gt;) to get a full picture of your configuration, but I'll take a shot based on what you have provided so far.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;gt; I need some clarification on below point:&lt;/P&gt;
&lt;P&gt;&amp;gt; SND core configuration is mismatch so can we face any issue if failover is happened ??&lt;/P&gt;
&lt;P&gt;You have the same number of Firewall Worker/Kernel instances on both cluster members which is all that matters in a ClusterXL configuration, so you are fine there.&amp;nbsp; Generally the operation/state of SND/SecureXL is purely local and not sync'ed between cluster members in your version.&lt;/P&gt;
&lt;P&gt;&amp;gt; We are using CPCONFIG for CoreXL configuration which is automatically assigned the interface to core then why its mismatch ??&lt;/P&gt;
&lt;P&gt;Automatic interface affinity will move interface SoftIRQ processing for individual interfaces around on the SND cores based on traffic loads, which will be quite different on the active vs. standby cluster member.&amp;nbsp; This is expected behavior and not a problem.&lt;/P&gt;
&lt;P&gt;&amp;gt; Still We only use Firewall blade so can we increase the SND core to atleast 6 or 8 core to resolved the RX drop issue ???&lt;/P&gt;
&lt;P&gt;Given that 97% of your traffic is accelerated, yes I'd recommend reducing number of workers from 8 to 6 to try a 6/6 CoreXL split.&amp;nbsp; Note that you can allocate more than 6 SNDs, but in your version the locking and coordination overhead between more than 6 SND's starts to exact more of a performance toll.&amp;nbsp; Even if you have a large-looking number of RX-DRP's, if they are less than 0.1% of total traffic on the interface you are fine.&amp;nbsp; I'd guess that moving to a 6/6 split then enabling Multi-Queue on eth1-01 will reduce RX-DRPs below 0.1%, without the need for more than 6 SNDs.&lt;/P&gt;
&lt;P&gt;&amp;gt; Can we Enabled the "Multi-Queue" , assigned dedicated core to "eth1-01" which handle more traffic in our production ???&lt;/P&gt;
&lt;P&gt;Yes it looks like you currently have Multi-Queue enabled on two interfaces so adding a third is fine; the total limit in your version is five interfaces.&amp;nbsp; But I'd recommend adjusting for a 6/6 CoreXL split first before enabling Multi-Queue on this interface, as enabling Multi-Queue on more interfaces when SNDs are already overloaded can actually make overall performance worse.&lt;/P&gt;
&lt;P&gt;&amp;gt; We also plan to upgrade to R80.30 so is this help ?&lt;/P&gt;
&lt;P&gt;Definitely.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 13:21:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/88648#M6823</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-06-15T13:21:55Z</dc:date>
    </item>
    <item>
      <title>Re: RX drop in one interface 21400 Appliance (SAM)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/88694#M6827</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks you very much for the update.&lt;/P&gt;&lt;P&gt;Just I need to add few point that our gateways are ruining in simple&amp;nbsp; VRRP (Master/Backup) mode.&lt;/P&gt;&lt;P&gt;As yo mention that :&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Generally the operation/state of SND/SecureXL is purely local and not sync'ed between cluster members in your version.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;In R80.x have syncs between cluster members ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;But in your version the locking and coordination overhead between more than 6 SND's starts to exact more of a performance toll&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;in R80.x&amp;nbsp; we can configured like SND &amp;gt; FW wrokers&amp;nbsp; if required ?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Also if we increase the Buffer ring size will help ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#00FF00"&gt;&lt;STRONG&gt;&lt;FONT color="#00FF00"&gt;I will also share you the output of "Super Seven"&amp;nbsp;&lt;/FONT&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/25509"&gt;@Chinmaya_Naik&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 19:31:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/88694#M6827</guid>
      <dc:creator>Chinmaya_Naik</dc:creator>
      <dc:date>2020-06-15T19:31:23Z</dc:date>
    </item>
    <item>
      <title>Re: RX drop in one interface 21400 Appliance (SAM)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/88704#M6828</link>
      <description>&lt;P&gt;&lt;EM&gt;&amp;gt;&amp;nbsp;In R80.x have syncs between cluster members ?&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;State sync works more or less the same regardless of whether you are using VRRP or ClusterXL.&amp;nbsp; Generally the state information for SecureXL/SND is not sync'ed between cluster members in R80.10 or earlier as SecureXL calculations were handled locally, but then there is this:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk121753&amp;amp;partition=Advanced&amp;amp;product=ClusterXL" target="_blank"&gt;sk121753: Both &lt;STRONG&gt;ClusterXL&lt;/STRONG&gt; High Availability members are Active&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;This may well have changed in R80.20+ with the revamp of SecureXL.&amp;nbsp; The R80.20 ClusterXL Administration Guide states as a requirement &lt;STRONG&gt;"SecureXL status - SecureXL on all members has to be either enabled, or disabled"&lt;/STRONG&gt; which would seem to imply that the state of SecureXL (and therefore its sync) between members does matter.&amp;nbsp; This would probably be a question for R&amp;amp;D, paging&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;.&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;nbsp;&lt;EM&gt;in R80.x&amp;nbsp; we can configured like SND &amp;gt; FW wrokers&amp;nbsp; if required ?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You are allowed to configure more than 6 SND cores in R80.10 and earlier, it is just that the additional performance you gain by adding additional cores beyond six starts to be offset more and more by the additional overhead of keeping them all coordinated.&amp;nbsp; So you can certainly go beyond six SNDs to increase performance, it is just that 6 SNDs in R80.10 and earlier is a bit of a "sweet spot" that you shouldn't go past without good reason.&amp;nbsp; This SND scalability issue was fully resolved in R80.20+.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;gt;&lt;EM&gt;Also if we increase the Buffer ring size will help ?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;As a last resort yes, but doing so is only addressing the symptom (RX-DRP) and not the underlying problem (ring buffers not being emptied fast enough by existing SNDs).&amp;nbsp; To combat RX-DRP of &amp;gt;0.1%, one should always add more SND cores first, then ensure Multi-Queue is enabled on the interface, and as a last resort increase ring buffer size.&amp;nbsp; If you end up having to increase it after doing all that though, your firewall is probably underpowered.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 21:46:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/88704#M6828</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-06-15T21:46:46Z</dc:date>
    </item>
    <item>
      <title>Re: RX drop in one interface 21400 Appliance (SAM)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/88713#M6829</link>
      <description>The state of SecureXL on both members definitely matters, as  mentioned in the linked SK.&lt;BR /&gt;Also, in this particular case, since SAM cards are involved, you definitely have to be using SecureXL.&lt;BR /&gt;The state of SecureXL will definitely impact how the cores are used, which I presume would also manifest itself in the sync process.</description>
      <pubDate>Tue, 16 Jun 2020 03:19:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/88713#M6829</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-06-16T03:19:11Z</dc:date>
    </item>
    <item>
      <title>Re: RX drop in one interface 21400 Appliance (SAM)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/88776#M6831</link>
      <description>&lt;P&gt;Please also review the limitations regarding SAM cards in R80.20 or above.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2020 11:57:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/88776#M6831</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2020-06-16T11:57:25Z</dc:date>
    </item>
    <item>
      <title>Re: RX drop in one interface 21400 Appliance (SAM)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/88999#M6844</link>
      <description>&lt;P&gt;hI&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the update.&lt;/P&gt;&lt;P&gt;Yes that the reason so we we still running R80.10.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/25509"&gt;@Chinmaya_Naik&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2020 11:20:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/88999#M6844</guid>
      <dc:creator>Chinmaya_Naik</dc:creator>
      <dc:date>2020-06-18T11:20:00Z</dc:date>
    </item>
    <item>
      <title>Re: RX drop in one interface 21400 Appliance (SAM)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/89001#M6845</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the update.&lt;/P&gt;&lt;P&gt;Just a few query :&lt;/P&gt;&lt;P&gt;As you mention Rx drop &amp;gt; 0.1% then we need to think about it but In our environment we see some huge amount of Rx drop in only Night time like from 8 to 10 o'clock more than 100000 drop.&lt;/P&gt;&lt;P&gt;So if we calculate overall value then its showing link 0.01% but I think its not ok because we see Rx drop in some particular time only and during that time we see nearly 200000 connection.&lt;/P&gt;&lt;P&gt;Thanks and Regards&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/25509"&gt;@Chinmaya_Naik&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2020 11:32:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/89001#M6845</guid>
      <dc:creator>Chinmaya_Naik</dc:creator>
      <dc:date>2020-06-18T11:32:16Z</dc:date>
    </item>
    <item>
      <title>Re: RX drop in one interface 21400 Appliance (SAM)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/89206#M6853</link>
      <description>&lt;P&gt;Right moving to a 6/6 split and enabling Multi-Queue should resolve that.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jun 2020 13:11:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/89206#M6853</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-06-19T13:11:53Z</dc:date>
    </item>
    <item>
      <title>Re: RX drop in one interface 21400 Appliance (SAM)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/89275#M6858</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the update.&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/25509"&gt;@Chinmaya_Naik&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jun 2020 07:28:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RX-drop-in-one-interface-21400-Appliance-SAM/m-p/89275#M6858</guid>
      <dc:creator>Chinmaya_Naik</dc:creator>
      <dc:date>2020-06-20T07:28:24Z</dc:date>
    </item>
  </channel>
</rss>

