<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.20 CoreXL &amp;amp; Vsx best practices in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77406#M9451</link>
    <description>&lt;P&gt;Actually it's very difficult to prescribe "best" model for VSX when it comes to CoreXL. Everyone is using it in different ways so solution at the end will be quite different. But I understand your frustration - it's not easy and it takes years to get some good understanding. And then when you think you know it all bam! New version and new tricks &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;First things first - all I know from "inside" is that you should not be running R80.20 on gateways, upgrade to R80.30 latest jumbo. I just heard that feedback and case numbers on R80.20 gateways (not mgmt!) was not great. We have been running VSX on R80.30 since january and it's been great. You might want to read this too if you decide to upgrade&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72638" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72638&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Secondly, I'm not really good on VSX running on open servers - they seem to behave somewhat different, looks like open servers are more efficient and you can just run all VSes sharing the same FWK cores. At least that's what I've heard from "big" customers. We run appliances, mix of 23800, 26000 and 41000 chassis and they all needed tweaking to get best results.&lt;/P&gt;
&lt;P&gt;Your next decision will be based on blades you use - is it just FW or also advanced blades. Basically VSX runs better without hyperthreading or SMT enabled if you only use FW and most traffic is accelerated. If you see a lot of PXL and you use advanced blades, you definitely will benefit from extra cores.&lt;/P&gt;
&lt;P&gt;One special high CPU case for us for example was Identity Awareness (pdpd and pepd) - therefore we run those on dedicated cores so that they do not affect real firewalling.&lt;/P&gt;
&lt;P&gt;To give you short answer - I prefer dedicated cores for each VS and even processes as it really helps troubleshooting, especially high CPU cases. Plus you are protecting your other VSes from being impacted.&lt;/P&gt;
&lt;P&gt;It's a lot of careful work to plan your CoreXL split manually, especially if you use hyperthreading - you must consider CPU core sibblings! That's very important.&lt;/P&gt;
&lt;P&gt;But it would be very difficult to give you exact answer without knowing exact circumstances.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 06 Mar 2020 07:41:09 GMT</pubDate>
    <dc:creator>Kaspars_Zibarts</dc:creator>
    <dc:date>2020-03-06T07:41:09Z</dc:date>
    <item>
      <title>R80.20 CoreXL &amp; Vsx best practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/76363#M9447</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;During last months i've heard mutilple version from CP TAC regarding the best pratices in core affinity for FWK in vsx R80.20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Put all available core (minus SND) to all VSs, add FWK instances (each time we have performance issues) with dynamic dyspatcher (current setup with 28 cores to all VSs, some cpu core are maxed ou some are doing nothing)&lt;/P&gt;&lt;P&gt;- Put specific cores to Specific VSs and their FWKs (eg vs 1 -&amp;gt; cpu 4-12, VS2-&amp;gt; cpu 13-20)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where is the truth ? &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kr,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Khalid&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 14:55:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/76363#M9447</guid>
      <dc:creator>Khalid_Aftas</dc:creator>
      <dc:date>2020-02-25T14:55:19Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 CoreXL &amp; Vsx best practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/76367#M9448</link>
      <description>&lt;P&gt;Where is the documentation of these&amp;nbsp;best practices available ? I only have&amp;nbsp;Check Point VSX Administration Guide R80.20 that explains CoreXL config starting p.87.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 15:40:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/76367#M9448</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-02-25T15:40:08Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 CoreXL &amp; Vsx best practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77397#M9449</link>
      <description>&lt;P&gt;That's the what i asked the TAC when he suggested what was the best practices.&lt;BR /&gt;&lt;BR /&gt;That's why i'm asking the community..&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 06:32:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77397#M9449</guid>
      <dc:creator>Khalid_Aftas</dc:creator>
      <dc:date>2020-03-06T06:32:36Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 CoreXL &amp; Vsx best practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77400#M9450</link>
      <description>&lt;P&gt;More informations:&lt;/P&gt;
&lt;P&gt;-&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_VSX_AdminGuide/html_frameset.htm" target="_blank" rel="noopener"&gt;R80.30 VSX Administration Guide&lt;/A&gt;&lt;BR /&gt;-&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_VSX_AdminGuide/html_frameset.htm" target="_blank" rel="noopener"&gt;R80.30 VSX Administration Guide&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/11456"&gt;@Kaspars_Zibarts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;will share best practices on leveraging VSX technology to provide scalable and optimized security while keeping maximum performance.&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;-&amp;nbsp;&lt;A href="https://community.checkpoint.com/docs/DOC-3730" target="_blank" rel="noopener"&gt;Presentation&lt;/A&gt;&amp;nbsp;- nice presentation 100 points from me&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;And more Tuning tips from me:&lt;/P&gt;
&lt;P&gt;-&amp;nbsp;&lt;A class="page-link lia-link-navigation lia-custom-event" href="https://community.checkpoint.com/t5/General-Topics/R80-x-Architecture-and-Performance-Tuning-Link-Collection/td-p/47883/jump-to/first-unread-message" target="_blank" rel="noopener"&gt;R80.x Architecture and Performance Tuning - Link Collection&lt;/A&gt;&lt;BR /&gt;-&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-Top-20-Gateway-Tuning-Tips/td-p/66380" target="_self"&gt;R80.x - Top 20 Gateway Tuning Tips&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS:&lt;BR /&gt;In your overview you should consider whether SMT (&lt;A href="https://community.checkpoint.com/docs/DOC-3321-r80x-performance-tuning-tip-smt-hyper-threading" target="_blank" rel="noopener"&gt;R80.x - Performance Tuning Tip - SMT (Hyper Threading)&lt;/A&gt;) is on or off. Here there can be massive performance differences with CoreXL, if the cores are not assigned correctly.&amp;nbsp;The correct use of MQ (&lt;A href="https://community.checkpoint.com/docs/DOC-3352-r80x-performance-tuning-tip-multi-queue" target="_blank" rel="noopener"&gt;R80.x - Performance Tuning Tip - Multi Queue&lt;/A&gt;) should also be observed.&amp;nbsp;The dynamic dispatcher (&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105261&amp;amp;partition=Basic&amp;amp;product=CoreXL%22" target="_blank"&gt;sk105261: CoreXL&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Dynamic&amp;nbsp;Dispatcher&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;in R80.10 and above&lt;/A&gt;) only brings a better distribution of connections in some situations, so I would only use it in specific cases.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 07:48:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77400#M9450</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-03-06T07:48:20Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 CoreXL &amp; Vsx best practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77406#M9451</link>
      <description>&lt;P&gt;Actually it's very difficult to prescribe "best" model for VSX when it comes to CoreXL. Everyone is using it in different ways so solution at the end will be quite different. But I understand your frustration - it's not easy and it takes years to get some good understanding. And then when you think you know it all bam! New version and new tricks &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;First things first - all I know from "inside" is that you should not be running R80.20 on gateways, upgrade to R80.30 latest jumbo. I just heard that feedback and case numbers on R80.20 gateways (not mgmt!) was not great. We have been running VSX on R80.30 since january and it's been great. You might want to read this too if you decide to upgrade&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72638" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72638&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Secondly, I'm not really good on VSX running on open servers - they seem to behave somewhat different, looks like open servers are more efficient and you can just run all VSes sharing the same FWK cores. At least that's what I've heard from "big" customers. We run appliances, mix of 23800, 26000 and 41000 chassis and they all needed tweaking to get best results.&lt;/P&gt;
&lt;P&gt;Your next decision will be based on blades you use - is it just FW or also advanced blades. Basically VSX runs better without hyperthreading or SMT enabled if you only use FW and most traffic is accelerated. If you see a lot of PXL and you use advanced blades, you definitely will benefit from extra cores.&lt;/P&gt;
&lt;P&gt;One special high CPU case for us for example was Identity Awareness (pdpd and pepd) - therefore we run those on dedicated cores so that they do not affect real firewalling.&lt;/P&gt;
&lt;P&gt;To give you short answer - I prefer dedicated cores for each VS and even processes as it really helps troubleshooting, especially high CPU cases. Plus you are protecting your other VSes from being impacted.&lt;/P&gt;
&lt;P&gt;It's a lot of careful work to plan your CoreXL split manually, especially if you use hyperthreading - you must consider CPU core sibblings! That's very important.&lt;/P&gt;
&lt;P&gt;But it would be very difficult to give you exact answer without knowing exact circumstances.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 07:41:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77406#M9451</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-03-06T07:41:09Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 CoreXL &amp; Vsx best practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77410#M9452</link>
      <description>Thx for your insight.&lt;BR /&gt;&lt;BR /&gt;We are running on CP hardware 14000 series cluster, with 32 cores.&lt;BR /&gt;&lt;BR /&gt;Currently we have 2 VSs running FW/IPS/urlfiltering blade (no https inspec), you can below the cpu affinity, only 2 cores are almost always maxed, the rest is doing nothing (dynamic dispatcher is on)&lt;BR /&gt;&lt;BR /&gt;Plan is to segment further the traffic to new VSs and also upgrade to 80.30&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;[Expert@EU933055-OSS:0]# fw ctl affinity -l&lt;BR /&gt;Mgmt: CPU 0&lt;BR /&gt;eth2-01: CPU 1&lt;BR /&gt;eth2-02: CPU 1&lt;BR /&gt;eth2-03: CPU 1&lt;BR /&gt;eth2-04: CPU 1&lt;BR /&gt;eth2-05: CPU 2&lt;BR /&gt;eth2-06: CPU 2&lt;BR /&gt;eth2-07: CPU 2&lt;BR /&gt;eth2-08: CPU 2&lt;BR /&gt;VS_0: CPU 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31&lt;BR /&gt;VS_0 fwk: CPU 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31&lt;BR /&gt;VS_0 smt_status: CPU 1 2 3&lt;BR /&gt;VS_1: CPU 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31&lt;BR /&gt;VS_1 fwk: CPU 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31&lt;BR /&gt;VS_2: CPU 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31&lt;BR /&gt;VS_2 fwk: CPU 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31&lt;BR /&gt;VS_3: CPU 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31&lt;BR /&gt;VS_3 fwk: CPU 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 06 Mar 2020 07:55:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77410#M9452</guid>
      <dc:creator>Khalid_Aftas</dc:creator>
      <dc:date>2020-03-06T07:55:37Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 CoreXL &amp; Vsx best practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77412#M9453</link>
      <description>Is hyperthreading enabled? You can run this command to check&lt;BR /&gt;if [ `grep ^"cpu cores" /proc/cpuinfo | head -1 | awk '{print $4}'` -ne `grep ^"siblings" /proc/cpuinfo | head -1 | awk '{print $3}'` ]; then echo HT; else echo no-HT; fi</description>
      <pubDate>Fri, 06 Mar 2020 08:07:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77412#M9453</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-03-06T08:07:10Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 CoreXL &amp; Vsx best practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77413#M9454</link>
      <description>&lt;P&gt;HT is on &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 08:15:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77413#M9454</guid>
      <dc:creator>Khalid_Aftas</dc:creator>
      <dc:date>2020-03-06T08:15:07Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 CoreXL &amp; Vsx best practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77416#M9455</link>
      <description>Yeah, the HT sibling allocation is wrong I'm afraid. How many cores are set per each VS? You can do this:&lt;BR /&gt;&lt;BR /&gt;cat $FWDIR/state/local/VSX/local.vsall | grep "vs create vs" | awk '{print "VS-"$4" instances: "$12}'</description>
      <pubDate>Fri, 06 Mar 2020 08:29:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77416#M9455</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-03-06T08:29:17Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 CoreXL &amp; Vsx best practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77418#M9456</link>
      <description>&lt;P&gt;Here you go&lt;BR /&gt;&lt;BR /&gt;[Expert@Exxxxxxxx:0]# cat $FWDIR/state/local/VSX/local.vsall | grep "vs create vs" | awk '{print "VS-"$4" instances: "$12}'&lt;BR /&gt;VS-1 instances: 1&lt;BR /&gt;VS-1 instances: 1&lt;BR /&gt;VS-3 instances: 12&lt;BR /&gt;VS-3 instances: 12&lt;BR /&gt;VS-2 instances: 12&lt;BR /&gt;VS-2 instances: 12&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 08:35:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77418#M9456</guid>
      <dc:creator>Khalid_Aftas</dc:creator>
      <dc:date>2020-03-06T08:35:10Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 CoreXL &amp; Vsx best practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77423#M9457</link>
      <description>&lt;P&gt;I would start with something like this. It's not ideal as VS-2 is stretched over 2 physical CPUs but it might help to fix overloaded CPUs&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="image.png" style="width: 574px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4731i83086F6A733661DA/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note that cores 16-18 must not be used for FWKs at all! They are HT sibblings for cores 0-2 that are used for SND.&lt;/P&gt;
&lt;P&gt;Which two cores are maxing out BTW?&lt;/P&gt;
&lt;P&gt;What are throughput, connections per second and concurrent connections on each VS? You can check that with cpview on corresponding vsenv&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 09:01:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77423#M9457</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-03-06T09:01:29Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 CoreXL &amp; Vsx best practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77424#M9458</link>
      <description>&lt;P&gt;Actual commands to achieve this&lt;BR /&gt;fw ctl affinity -s -d -vsid 0 1 -cpu 3 19&lt;BR /&gt;fw ctl affinity -s -d -vsid 2 -cpu 4-9 20-25&lt;BR /&gt;fw ctl affinity -s -d -vsid 3 -cpu 10-15 26-31&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 09:39:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77424#M9458</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-03-06T09:39:50Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 CoreXL &amp; Vsx best practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77425#M9459</link>
      <description>CPU 16 and 17 are always in RED &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 06 Mar 2020 09:28:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77425#M9459</guid>
      <dc:creator>Khalid_Aftas</dc:creator>
      <dc:date>2020-03-06T09:28:50Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 CoreXL &amp; Vsx best practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77427#M9460</link>
      <description>you must exclude cores 16-18 from FWK pool. As said before - they are HT siblings of 0-2 and must not be used for FWKs.&lt;BR /&gt;simple test would be (all VSes sharing the same resources):&lt;BR /&gt;fw ctl affinity -s -d -vsid 0-3 -cpu 3-15 19-31&lt;BR /&gt;</description>
      <pubDate>Fri, 06 Mar 2020 09:39:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77427#M9460</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-03-06T09:39:34Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 CoreXL &amp; Vsx best practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77428#M9461</link>
      <description>&lt;P&gt;Such a change has any impact on live prod traffic i guess ?&lt;/P&gt;&lt;P&gt;Will plan this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Correct me if i'm wrong your recommendation is still to dedicate specific cores per VS ?&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 09:51:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77428#M9461</guid>
      <dc:creator>Khalid_Aftas</dc:creator>
      <dc:date>2020-03-06T09:51:38Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 CoreXL &amp; Vsx best practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77436#M9462</link>
      <description>Correct, I would stick with dedicated cores for VS as it allows easier troubleshooting and better resource protection.&lt;BR /&gt;I have done it during daytime without any impact on our VSX, but choice is yours of course. I'm not CP and cannot promise anything &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;</description>
      <pubDate>Fri, 06 Mar 2020 11:26:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77436#M9462</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-03-06T11:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 CoreXL &amp; Vsx best practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77437#M9463</link>
      <description>Plus you can always do these changes on standby node first, fail over and see what happens , then do the other one</description>
      <pubDate>Fri, 06 Mar 2020 11:36:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-CoreXL-amp-Vsx-best-practices/m-p/77437#M9463</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-03-06T11:36:02Z</dc:date>
    </item>
  </channel>
</rss>

