<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enforce SecureXL template? in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Enforce-SecureXL-template/m-p/8911#M1136</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;SecureXL has two separate but related components:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Packet/Throughput Acceleration: Ability to move packets more efficiently through the firewall via the four possible paths; they are&amp;nbsp;in decreasing order of efficiency: SXL, PXL, F2F, and F2F with a process space trip.&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Session Rate Acceleration/Templating: Ability to "cache" rulebase lookups in SecureXL and avoid lots of expensive full rulebase lookups, especially useful in environments with a high new connection rate.&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;&lt;P&gt;My book covers how to optimize SecureXL for best operation, R80.10 is strongly recommended as there were many, many enhancements to firewall efficiency which invalidated some of the recommendations stated in the first edition of my book.&amp;nbsp; Bit too complicated to explain it all in a CheckMates post, but the best place to start are these "Super Seven" commands.&amp;nbsp; Posting the output of these should provide enough detail to make a few general recommendations:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;netstat -ni&lt;/P&gt;&lt;P&gt;grep -c ^processor /proc/cpuinfo&lt;/P&gt;&lt;P&gt;fwaccel stat&lt;/P&gt;&lt;P&gt;fwaccel stats -s&lt;/P&gt;&lt;P&gt;fw ctl multik stat&lt;/P&gt;&lt;P&gt;fw ctl affinity -l -r&lt;/P&gt;&lt;P&gt;fw ctl multik get_mode (R77.30) or fw ctl multik dynamic_dispatching get_mode (R80.10+)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; now available via &lt;A href="http://maxpowerfirewalls.com" target="_blank"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 02 Nov 2017 12:25:27 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2017-11-02T12:25:27Z</dc:date>
    <item>
      <title>Enforce SecureXL template?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Enforce-SecureXL-template/m-p/8910#M1135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a way to enfocre SecureXLon TCP connections?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a way in&amp;nbsp;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;sk104468 to do it the other way around. There you can enforce that SecureXL will not be applied.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;But I am looking for a way to to it the other way around so I can make sure that additional blades are not causing me a big performance penalty on a high bandwidth connection.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Nov 2017 08:23:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Enforce-SecureXL-template/m-p/8910#M1135</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2017-11-02T08:23:43Z</dc:date>
    </item>
    <item>
      <title>Re: Enforce SecureXL template?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Enforce-SecureXL-template/m-p/8911#M1136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;SecureXL has two separate but related components:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Packet/Throughput Acceleration: Ability to move packets more efficiently through the firewall via the four possible paths; they are&amp;nbsp;in decreasing order of efficiency: SXL, PXL, F2F, and F2F with a process space trip.&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Session Rate Acceleration/Templating: Ability to "cache" rulebase lookups in SecureXL and avoid lots of expensive full rulebase lookups, especially useful in environments with a high new connection rate.&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;&lt;P&gt;My book covers how to optimize SecureXL for best operation, R80.10 is strongly recommended as there were many, many enhancements to firewall efficiency which invalidated some of the recommendations stated in the first edition of my book.&amp;nbsp; Bit too complicated to explain it all in a CheckMates post, but the best place to start are these "Super Seven" commands.&amp;nbsp; Posting the output of these should provide enough detail to make a few general recommendations:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;netstat -ni&lt;/P&gt;&lt;P&gt;grep -c ^processor /proc/cpuinfo&lt;/P&gt;&lt;P&gt;fwaccel stat&lt;/P&gt;&lt;P&gt;fwaccel stats -s&lt;/P&gt;&lt;P&gt;fw ctl multik stat&lt;/P&gt;&lt;P&gt;fw ctl affinity -l -r&lt;/P&gt;&lt;P&gt;fw ctl multik get_mode (R77.30) or fw ctl multik dynamic_dispatching get_mode (R80.10+)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; now available via &lt;A href="http://maxpowerfirewalls.com" target="_blank"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Nov 2017 12:25:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Enforce-SecureXL-template/m-p/8911#M1136</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2017-11-02T12:25:27Z</dc:date>
    </item>
    <item>
      <title>Re: Enforce SecureXL template?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Enforce-SecureXL-template/m-p/8912#M1137</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's in the works but will not be general available as I understand the current discussion. As it will have a security impact people may not understand.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Nov 2017 15:33:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Enforce-SecureXL-template/m-p/8912#M1137</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2017-11-06T15:33:40Z</dc:date>
    </item>
    <item>
      <title>Re: Enforce SecureXL template?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Enforce-SecureXL-template/m-p/8913#M1138</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is actually a way to whitelist a certain protocol &amp;amp; port number in SecureXL such that SecureXL will just handle it with passive streaming in the Accelerated path no matter what, and the Medium/Firewall paths will never even see it.&amp;nbsp; This is similar to the "application override" feature touted by a competitor's firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It involves some hand-edits to the spii.def and table.def files on the SMS.&amp;nbsp; I'd rather not post the details since doing this negates almost all protections offered by the firewall, but the whitelisted traffic certainly does pass through the firewall at&amp;nbsp; ludicrous speed. If you really need this info, just mention the term "spii_dport_white_list" to Check Point TAC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; now available via &lt;A href="http://maxpowerfirewalls.com" target="_blank"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Nov 2017 17:17:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Enforce-SecureXL-template/m-p/8913#M1138</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2017-11-06T17:17:32Z</dc:date>
    </item>
    <item>
      <title>Re: Enforce SecureXL template?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Enforce-SecureXL-template/m-p/8914#M1139</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If TAC doesn't. I might have a look to get it through other channels. But from the looks of it it seems to be casting the net too wide to be comfortable. I got 1 SK back on the keyword that seems to indicate there is in fact a bug present.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Nov 2017 08:42:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Enforce-SecureXL-template/m-p/8914#M1139</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2017-11-08T08:42:10Z</dc:date>
    </item>
    <item>
      <title>Re: Enforce SecureXL template?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Enforce-SecureXL-template/m-p/8915#M1140</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;TAC just confirmed that the&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;"spii_dport_white_list" trick does not work here. However we have a go on a more accurate fix that will have a better balance. to match the customer traffic without a big impact on security.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Nov 2017 08:59:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Enforce-SecureXL-template/m-p/8915#M1140</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2017-11-08T08:59:41Z</dc:date>
    </item>
  </channel>
</rss>

