<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80 - Top 20 Gateway Tuning Tips in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/66437#M13616</link>
    <description>&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;Very interesting overview. &lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;Do you have informations about network issues and RX errors?&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 03 Nov 2019 08:28:04 GMT</pubDate>
    <dc:creator>Harry_Morgan</dc:creator>
    <dc:date>2019-11-03T08:28:04Z</dc:date>
    <item>
      <title>R81 - Top 25 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/66380#M13599</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip&amp;nbsp; - use this new tool&lt;BR /&gt;&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;Now I have developed a tool that automatically check the most of the points in this article.&lt;BR /&gt;Use this tool to show quickly an overview of status information of all your gateways with only one CLI command "eview".&lt;BR /&gt;It shows the most important performance relevant information of all gateways, which are briefly summarized in this article:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Easy-View-Tool-View-System-Info-for-All-Gateways-Simultaneously/td-p/81438" target="_self"&gt;Easy View Tool - View System Info for All Gateways Simultaneously&lt;/A&gt;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 1 - SecureXL&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;SecureXL is a software acceleration product installed on Security Gateways. SecureXL network acceleration techniques deliver wire-speed performance for Security Gateways. Performance Pack uses &lt;EM&gt;SecureXL&lt;/EM&gt; technology and other innovative network acceleration techniques to deliver wire-speed performance for Security Gateways. &lt;SPAN style="font-size: 15px;"&gt;The SecureXL device minimizes the connections that are processed by the INSPECT driver. SecureXL accelerates connections on two ways.&lt;/SPAN&gt; &lt;BR /&gt;&lt;BR /&gt;SecureXL is implemented either in software or in hardware:&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SAM cards on Check Point 21000 appliances&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Falcon cards (new in R80.20) on different appliances&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; From R80.20 SecureXL is always enabled and can no longer be disabled completely.&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="0" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="50%" style="width: 50%; border-style: none;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98722&amp;amp;partition=Advanced&amp;amp;product=SecureXL%22" target="_self"&gt;sk98722 - SecureXL for R80.10 and below&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98348" target="_self"&gt;sk98348 - Best Practices - Security Gateway Performance&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk32578" target="_self"&gt;sk32578 - SecureXL Mechanism&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk153832&amp;amp;partition=Advanced&amp;amp;product=SecureXL%22" target="_self"&gt;sk153832 - SecureXL for R80.20 and above&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/TD&gt;
&lt;TD width="50%" style="width: 50%; border-style: none;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3041-r80x-security-gateway-architecture-logical-packet-flow" target="_blank" rel="noopener"&gt;R80.x - Security Gateway Architecture (Logical Packet Flow)&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3190-r80x-security-gateway-architecture-acceleration-card-offloading" target="_blank" rel="noopener"&gt;R80.x - Security Gateway Architecture (Acceleration Card Offloading)&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 2 - SecureXL Connection Templates&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;Feature that accelerates the speed, at which a connection is established by matching a new connection to a set of attributes. When a new connection matches the Connection Template (old name "Accept&amp;nbsp;Template") , subsequent connections are established without performing a rule match and therefore are accelerated. Connection Templates are generated from active connections according to policy rules. &lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; Accept Templates are enabled by default.&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD height="68px" style="width: 50%; border-style: none;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk32578" target="_self"&gt;sk32578 - SecureXL Mechanism&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_PerformanceTuning_AdminGuide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_PerformanceTuning_AdminGuide/100935" target="_self"&gt;Performance Tuning R80.30 Administration Guide - Connection Templates&lt;/A&gt;&lt;/TD&gt;
&lt;TD height="68px" style="width: 50%; border-style: none;"&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3041-r80x-security-gateway-architecture-logical-packet-flow" target="_blank" rel="noopener"&gt;R80.x - Security Gateway Architecture (Logical Packet Flow)&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 3 - SecureXL NAT Templates&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;Using SecureXL Templates for NAT traffic is critical to achieve high session rate for NAT. SecureXL Templates are supported for Static NAT and Hide NAT using the existing SecureXL Templates mechanism.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; Enable NAT Templates depending on the situation.&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk71200&amp;amp;partition=General&amp;amp;product=SecureXL%22" target="_self"&gt;sk71200 - SecureXL NAT Templates&lt;/A&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_PerformanceTuning_AdminGuide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_PerformanceTuning_AdminGuide/100935" target="_self"&gt;&amp;nbsp;&lt;/A&gt;&lt;/TD&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3041-r80x-security-gateway-architecture-logical-packet-flow" target="_blank" rel="noopener"&gt;R80.x - Security Gateway Architecture (Logical Packet Flow)&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 4 - SecureXL Drop Templates&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;Optimized Drops feature in R76 and above. Heavy load of traffic that should be dropped causes an increase in the Security Gateway's resource consumption. SecureXL Drop Templates are not created, although this option was checked in SmartDashboard.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; Enable Drop Templates depending on the situation&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk90861&amp;amp;partition=Advanced&amp;amp;product=SecureXL," target="_self"&gt;sk90861 - Optimized Drops feature in R76 and above&lt;/A&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_PerformanceTuning_AdminGuide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_PerformanceTuning_AdminGuide/100935" target="_self"&gt;&amp;nbsp;&lt;BR /&gt;&lt;/A&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk66402" target="_self"&gt;sk66402 - SecureXL Drop Templates&lt;/A&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_PerformanceTuning_AdminGuide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_PerformanceTuning_AdminGuide/100935" target="_self"&gt;&amp;nbsp;&lt;/A&gt;&lt;/TD&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3041-r80x-security-gateway-architecture-logical-packet-flow" target="_blank" rel="noopener"&gt;R80.x - Security Gateway Architecture (Logical Packet Flow)&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 5 - SecureXL Fast Acceleration&lt;BR /&gt;&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;The Fast Acceleration (picture 1 green) feature lets you define trusted connections to allow bypassing deep packet inspection on &lt;STRONG&gt;R80.20 JHF103 and above&lt;/STRONG&gt; gateways. This feature significantly improves throughput for these trusted high volume connections and reduces CPU consumption.&lt;/P&gt;
&lt;P&gt;The CLI of the gateway can be used to create rules that allow you to bypass the SecureXL PSLXL path to route all connections through the fast path.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; Use this function to exclude IP's or networks from deep inspection.&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk156672&amp;amp;partition=Advanced&amp;amp;product=SecureXL%22" target="_self" rel="nofollow noopener noreferrer"&gt;sk156672 - SecureXL Fast Accelerator (fw fast_accel) for R80.20 and above&lt;/A&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_PerformanceTuning_AdminGuide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_PerformanceTuning_AdminGuide/100935" target="_self"&gt;&lt;BR /&gt;&lt;/A&gt;&lt;/TD&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-SecureXL-Fast-Accelerator-fw-ctl/td-p/67604" target="_blank" rel="noopener"&gt;R80.x - Performance Tuning Tip - SecureXL Fast Accelerator (fw ctl fast_accel)&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 6 - SecureXL Penalty Box&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;The SecureXL penalty box is a mechanism that performs an early drop of packets arriving from suspected sources. This mechanism is supported starting in R75.40VS.&lt;/P&gt;
&lt;P&gt;The purpose of this feature is to allow the Security Gateway to cope better under high load, possibly caused by a DoS/DDoS attack.&lt;/P&gt;
&lt;P&gt;A client that sends packets that are dropped by the firewall rulebase or performs violations of the IPS policy is reported to this mechanism. If a client is reported frequently, it would be put in a penalty box. Any packet arriving from this IP address would be dropped by the performance pack at a very early stage.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; Use the SecureXL penalty box if you have DDoS attacks&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk74520" target="_self"&gt;sk74520 - What is the SecureXL penalty box mechanism for offending IP addresses?&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3407-r80x-performance-tuning-tip-ddos-fw-sam-vs-fwaccel-dos" target="_blank" rel="noopener"&gt;R80.x - Performance Tuning Tip - DDoS „fw sam“ vs. „fwaccel dos“&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 7 - SIM Affinity&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;Association of a particular network interface with a CPU core (either 'Automatic' (default), or 'Static' / 'Manual'). Interfaces are bound to CPU cores via SMP IRQ affinity setting. SIM Affinity in Automatic mode may make poor decisions on multi-core platforms. In addition, some multi-core hardware platforms suffer from an inability to assign IRQs to use all the CPU cores efficiently.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; In special cases the SIM affinity should be set manually.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk61962" target="_self"&gt;sk61962 - SMP IRQ Affinity on Check Point Security Gateway&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk33250" target="_self"&gt;sk33250 - Automatic SIM Affinity on Multi-Core CPU Systems&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_PerformanceTuning_AdminGuide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_PerformanceTuning_AdminGuide/100935" target="_self"&gt;Performance Tuning R80.30 Administration Guide – Affinity Settings&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 8 - CoreXL&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;CoreXL is a performance-enhancing technology for Security Gateways on multi-CPU-core processing platforms. CoreXL enhances Security Gateway performance by enabling the processing CPU cores to concurrently perform multiple tasks.&lt;/P&gt;
&lt;P&gt;CoreXL provides almost linear scalability of performance, according to the number of processing CPU cores on a single machine. The increase in performance is achieved without requiring any changes to management or to network topology.&lt;/P&gt;
&lt;P&gt;On a Security Gateway with CoreXL enabled, the Firewall kernel is replicated multiple times. Each replicated copy, or FW instance, runs on one processing CPU core. These FW instances handle traffic concurrently, and each FW instance is a complete and independent FW inspection kernel. When CoreXL is enabled, all the FW kernel instances in the Security Gateway process traffic through the same interfaces and apply the same security policy.&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98737#Introduction" target="_self"&gt;sk98737 – CoreXL&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98348" target="_self"&gt;sk98348 - Best Practices - Security Gateway Performance&lt;/A&gt;&lt;/TD&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3041-r80x-security-gateway-architecture-logical-packet-flow" target="_blank" rel="noopener"&gt;R80.x - Security Gateway Architecture (Logical Packet Flow)&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3073-r80x-security-gateway-architecture-content-inspection" target="_blank" rel="noopener"&gt;R80.x - Security Gateway Architecture (Content Inspection)&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 9 - CoreXL - Dynamic split of CoreXL FW and CoreXL SND&lt;BR /&gt;&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P style="background-color: transparent; box-sizing: border-box; color: #2b2b29; font-family: &amp;amp;quot; dinotregular&amp;amp;quot;; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 22px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px 0px 15px 0px;"&gt;Dynamic split of CoreXL&amp;nbsp;changes the assignment of&amp;nbsp; CoreXL SND's and CoreXL firewall workers automatically without reboot in R80.40+.&amp;nbsp; Now, let's assume the CoreXL SNDs are overloaded, a mathematical formula is used to calculate that a further CoreXL SND is added.&amp;nbsp;In this case a CoreXL firewall worker&amp;nbsp; will not get any new Connections and the connections are distributed to another CoreXL firewall worker.&amp;nbsp;If there are no more connections running through this CoreXL firewall worker, the core will be used for a new CoreXL SND instance.&amp;nbsp;It also works the other way round.&lt;SPAN style="display: inline !important; float: none; background-color: transparent; color: #6d6e71; font-family: 'DINOTRegular'; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Adding and removing a CoreXL firewall worker&lt;/LI&gt;
&lt;LI&gt;Adding and removing a CoreXL SND&lt;/LI&gt;
&lt;LI&gt;Balance between CoreXL SND and CoreXL firewall worker&lt;/LI&gt;
&lt;LI&gt;GAIA 3.10 kernel&lt;/LI&gt;
&lt;LI&gt;only Check Point appliances with 8 cores or more&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#008080"&gt;Tuning Tip:&lt;/FONT&gt;&lt;/STRONG&gt; Use this function from R80.40 on appliances with 8 cores or more.&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="border-style: none; width: 50%;"&gt;No SK is available yet.&lt;/TD&gt;
&lt;TD style="border-style: none; width: 50%;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-40-EA-Dynamic-split-of-CoreXL/td-p/66872" target="_self"&gt;R80.40 - Dynamic split of CoreXL&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P style="background-color: transparent; box-sizing: border-box; color: #2b2b29; font-family: &amp;amp;quot; dinotregular&amp;amp;quot;; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 22px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px 0px 15px 0px;"&gt;&lt;SPAN style="display: inline !important; float: none; background-color: transparent; color: #6d6e71; font-family: 'DINOTRegular'; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 10 - MultiCore IPsec VPN&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;R80.10 and above introduced MultiCore support for IPsec VPN. Starting in R80.10 Security Gateway, &lt;EM&gt;IPsec VPN MultiCore&lt;/EM&gt; feature allows CoreXL to inspect VPN traffic on all CoreXL FW instances. This feature is enabled by default, and it is not supported to disable it.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; MultiCore IPsec VPN is enabled by default on R80.x gateways.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104760" target="_self"&gt;sk104760 - VPN Core&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105119&amp;amp;partition=General&amp;amp;product=IPSec" target="_self"&gt;sk105119 - Best Practices - VPN Performance&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk118097" target="_self"&gt;sk118097 - MultiCore Support for IPsec VPN in R80.10 and above&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 11 - MultiCore Support for SSL&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;Introduced in R77.20, SSL MultiCore feature improves SSL performance of Security Gateway. SSL MultiCore feature is based on Check Point CoreXL technology, which enhances Security Gateway / VSX Gateway performance by enabling the CPU processing cores to concurrently perform multiple tasks.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; MultiCore SSL is enabled by default on R80.x gateways.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101223" target="_self"&gt;sk101223 - MultiCore Support for SSL in R77.20 and above&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 12 - AES-NI&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;Intel‘s AES New Instructions AES-NI is a encryption instruction set that improves on the Advanced Encryption Standard (AES) algorithm and accelerates the encryption of data in many processor familys. Better throughput can be achieved by selecting a faster encryption algorithm. For a comparison of encryption algorithm speeds. Relative speeds of algorithms for IPsec and SSL. AES-NI is Intel's dedicated instruction set, which significantly improves the speed of Encrypt-Decrypt actions and allows one to increase AES throughput for: Site-to-Site VPN, Remote Access VPN, Mobile Access, HTTPS Interception&lt;/P&gt;
&lt;P&gt;The general speed of the system depends on additional parameters. Check Point supports AES-NI on many appliances, only when running Gaia OS with 64-bit kernel. On these appliances AES-NI is enabled by default. AES-NI is also supported on Open Servers. Comprised of seven new instructions, AES-NI gives your environment faster, more affordable data protection and greater security.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; Enable AES-NI in the BIOS.&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk73980" target="_self"&gt;sk73980 - Relative speeds of algorithms for IPsec and SSL&lt;/A&gt;&lt;/TD&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3278-r80x-performance-tuning-tip-aes-ni" target="_blank" rel="noopener"&gt;R80.x - Performance Tuning Tip - AES-NI&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 13 - Firewall Priority Queues&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;Packets could be dropped by Firewall when CPU cores, on which Firewall runs, are fully utilized. Such packet loss might occur regardless of the connection's type (for example, local SSH or connection to Security Management Server server). The Firewall Priority Queues are &lt;EM&gt;disabled&lt;/EM&gt; by default. The Priority Queues (PrioQ) mechanism is intended to prioritize part of the traffic, when we need to drop packets because the Security Gateway is stressed (CPU is fully utilized).&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; Use it depending on the situation.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105762#Installation%20or%20Disablement%20of%20Priority%20Queues%20and%20Evaluation%20of%20Heavy%20Connections%20Mechanism" target="_self"&gt;sk105762 - Firewall Priority Queues in R77.30 / R80.10 and above&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 14 - Multi-Queue&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;By default, each network interface has one traffic queue handled by one CPU. You cannot use more CPU cores for acceleration than the number of interfaces handling traffic. Multi-Queue lets you configure more than one traffic queue for each network interface. For each interface, more than one CPU core is used for acceleration. Multi-Queue is relevant only if SecureXL is enabled. Since R80.40 and R81 Multi Queue is enabled by default on all supported interfaces.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; Enable multi-queueing on 10/40/100 Gbit/s interfaces.&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_PerformanceTuning_AdminGuide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_PerformanceTuning_AdminGuide/100935" target="_self"&gt;Performance Tuning R80.30 Administration Guide – Multi-Queue&lt;/A&gt;&lt;/TD&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3352-r80x-performance-tuning-tip-multi-queue" target="_blank" rel="noopener"&gt;R80.x - Performance Tuning Tip - Multi Queue&lt;/A&gt;&lt;BR /&gt;&lt;SPAN class="lia-message-read"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R81-Multi-Queue-what-is-new/m-p/99369#M19353" target="_self"&gt;R81.x&amp;nbsp; - Multi Queue (what is new)&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 15 - Dynamic Dispatcher&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;CoreXL is a performance-enhancing technology for Security Gateways on platforms with multiple CPU cores. CoreXL enhances Security Gateway performance by enabling the processing CPU cores to concurrently perform multiple tasks.&lt;/P&gt;
&lt;P&gt;On a Security Gateway with CoreXL enabled, the Firewall kernel is replicated multiple times. Each replicated copy, or Firewall instance, runs on one processing CPU core. These Firewall instances handle traffic concurrently, and each Firewall instance is a complete and independent Firewall inspection kernel. When CoreXL is enabled, all the Firewall kernel instances in the Security Gateway process traffic through the same interfaces and apply the same security policy.&lt;/P&gt;
&lt;P&gt;The CoreXL software architecture includes the Secure Network Distributor (SND). The SND is responsible for:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Processing incoming traffic from the network interfaces&lt;/LI&gt;
&lt;LI&gt;Securely accelerating authorized packets (if SecureXL is running)&lt;/LI&gt;
&lt;LI&gt;Distributing non-accelerated packets or Medium Path packets among CoreXL FW kernel instances - this functionality is also referred to as &lt;EM&gt;dispatcher&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Traffic received on network interface cards (NICs) is directed to a processing core running the SND.&lt;/P&gt;
&lt;P&gt;The dispatcher is executed when a packet should be forwarded to a CoreXL FW instance (in Slow path and Medium path - see &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk98737" target="_blank" rel="noopener"&gt;sk98737&lt;/A&gt; for details) and is in charge of selecting the CoreXL FW instance that will inspects the packet.&lt;/P&gt;
&lt;P&gt;In R77.20 and lower versions, traffic distribution between CoreXL FW instances is statically based on Source IP addresses, Destination IP addresses, and the IP 'Protocol' type. Therefore, there are possible scenarios where one or more CoreXL FW instances would handle more connections, or perform more processing on the packets forwarded to them, than the other CoreXL FW instances.&lt;/P&gt;
&lt;P&gt;This may lead to a situation, where the load is not balanced across the CPU cores, on which the CoreXL FW instances are running.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; Use Dynamic Dispatcher depending on the situation.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105261&amp;amp;partition=General&amp;amp;product=CoreXL%22" target="_self"&gt;sk105261 - CoreXL Dynamic Dispatcher in R77.30 / R80.10 and above&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 16 - SMT (Hyper Threading)&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;Hyper Threading Technology is a form of Simultaneous Multithreading Technology (SMT) introduced by Intel. Architecturally, a processor with Hyper-Threading technology consists of two logical processors per core, each of which has its own processor architectural state. Each logical processor can be individually halted, interrupted or directed to execute a specified thread, independently from the other logical processor sharing the same physical core.&lt;/P&gt;
&lt;P&gt;SMT (also called HyperThreading or HT) is a feature that is supported on Check Point appliances running Gaia OS. When enabled, SMT doubles the number of logical CPUs on the Security Gateway, which enhances physical processor utilization. When SMT is disabled, the number of logical CPUs equals the number of physical cores.&lt;/P&gt;
&lt;P&gt;SMT improves performance up to 30% on NGFW software blades such as IPS, Application &amp;amp; URL Filtering and Threat Prevention by increasing the number of CoreXL FW instances based on the number of logical CPUs.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; Enable SMT on appliances and disable SMT on open server.&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk93000&amp;amp;partition=General&amp;amp;product=Enterprise" target="_self"&gt;sk93000 - SMT (HyperThreading) Feature Guide&lt;/A&gt;&lt;/TD&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3321-r80x-performance-tuning-tip-smt-hyper-threading" target="_blank" rel="noopener"&gt;R80.x - Performance Tuning Tip - SMT (Hyper Threading)&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 17 - HTTPS Interception vs. SNI&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;STRONG&gt;With enabled HTTPS interception:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If the https interception is enabled, the parameter&amp;nbsp;&lt;STRONG&gt;host&lt;/STRONG&gt;&amp;nbsp;&lt;STRONG&gt;from http header&lt;/STRONG&gt;&amp;nbsp;can be used for the url because the traffic is analyzed by active streaming.&amp;nbsp;Check Point Active Streaming (CPAS) allow the changing of data, we play the role of “man in the middle”. CPAS breaks the connection into two parts using our own stack – this mean, we are responsible for all the stack work (dealing with options, retransmissions, timers etc.). An application is register to CPAS when a connection start and supply callbacks for event handler and read handler. CPAS breaks the HTTPS connection and others into two parts using our own stack – this mean, we are responsible for all the stack work (dealing with options, retransmissions, timers etc.)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Without enabled HTTPS interception (SNI is used):&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If the https interception is disabled,&amp;nbsp;&lt;STRONG&gt;SNI is used&lt;/STRONG&gt;&amp;nbsp;to recognize the virtual URL for&amp;nbsp;&lt;STRONG&gt;application control&amp;nbsp;&lt;/STRONG&gt;and&lt;STRONG&gt;&amp;nbsp;url filtering&lt;/STRONG&gt;. It is less resource intensive than HTTPS interception&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; Prefer SNI to HTTPS interception, if you only use application control and url filtering.&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108202&amp;amp;partition=General&amp;amp;product=HTTPS" target="_self"&gt;sk108202 - HTTPS Inspection&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/general-topics/10433/1/URL%20Filtering%20using%20SNI%20for%20HTTPS%20websites.pdf" target="_blank" rel="noopener"&gt;URL Filtering using SNI for HTTPS websites.pdf&lt;/A&gt;&lt;/TD&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://community.checkpoint.com/t5/Policy-Management/R80-20-SNI-vs-enabled-HTTPS-Interception/m-p/65404#M3880" target="_self"&gt;R80.20 - SNI vs. enabled HTTPS Interception&lt;/A&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-30-Swiss-Army-Knive-IPMITOOL-for-GAIA/td-p/60784" target="_self"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 18 - Network Interfaces and Server Hardware&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;Only use certified hardware for open server and network cards. Prevent network and packet&amp;nbsp; errors on the network cards.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; Use supported hardware only and avoid network card issus.&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none; height: 22px;" border="1"&gt;
&lt;TBODY&gt;
&lt;TR style="height: 22px;"&gt;
&lt;TD style="width: 50%; border-style: none; height: 22px;"&gt;&lt;A href="http://www.checkpoint.com/services/techsupport/hcl/#nic" target="_blank" rel="noopener"&gt;HCL&lt;/A&gt;&lt;/TD&gt;
&lt;TD style="width: 50%; border-style: none; height: 22px;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Management-Topics/New-R80-x-Performance-Tuning-Intel-Hardware/m-p/48697/highlight/true#M8306" target="_self"&gt;R80.x - Performance Tuning Tip - Intel Hardware&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 19 - Interface Interface&lt;BR /&gt;&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;RX-ERR:&lt;/STRONG&gt; Should be zero.&amp;nbsp; Caused by cabling problem, electrical interference, or a bad port.&amp;nbsp; Examples: framing errors, short frames/runts, late collisions caused by duplex mismatch.&lt;BR /&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt;&amp;nbsp; First and easy check duplex mismatch&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;RX-OVR:&lt;/STRONG&gt; Should be zero.&amp;nbsp; Overrun in NIC hardware buffering.&amp;nbsp; Solved by using a higher-speed NIC, bonding multiple interfaces, or enabling Ethernet Flow Control (controversial).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt;&amp;nbsp; Use higher speed NIC's or bond interfaces&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;RX-DRP:&lt;/STRONG&gt; Should be less than 0.1% of RX-OK.&amp;nbsp; Caused by a network ring buffer overflow in the Gaia kernel due to the inability of SoftIRQ to empty the ring buffer fast enough.&amp;nbsp; Solved by allocating more SND/IRQ cores in CoreXL (always the first step), enabling Multi-Queue, or as a last resort increasing the ring buffer size.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt;&amp;nbsp; Use more&amp;nbsp;SND/IRQ cores in CoreXL&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk61962" target="_self"&gt;sk61962 - SMP IRQ Affinity on Check Point Security Gateway&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk33250" target="_self"&gt;sk33250 - Automatic SIM Affinity on Multi-Core CPU Systems&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_PerformanceTuning_AdminGuide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_PerformanceTuning_AdminGuide/100935" target="_self"&gt;Performance Tuning R80.30 Administration Guide – Multi-Queue&lt;/A&gt;&lt;/TD&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3352-r80x-performance-tuning-tip-multi-queue" target="_blank" rel="noopener"&gt;R80.x - Performance Tuning Tip - Multi Queue&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 20 - Interface (Heavy Connections)&lt;BR /&gt;&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;n computer networking, an elephant flow (heavy connection) is an extremely large in total bytes continuous flow set up by a TCP or other protocol flow measured over a network link. Elephant flows, though not numerous, can occupy a disproportionate share of the total bandwidth over a period of time.&amp;nbsp; When the observations were made that a small number of flows carry the majority of Internet traffic and the remainder consists of a large number of flows that carry very little Internet traffic (mice flows).&lt;/P&gt;
&lt;P&gt;All packets associated with that elephant flow must be handled by the same firewall worker core (CoreXL instance). Packets could be dropped by Firewall when CPU cores, on which Firewall runs, are fully utilized. Such packet loss might occur regardless of the connection's type. &lt;BR /&gt;&lt;BR /&gt;What typically produces heavy connections:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;System backups&lt;/LI&gt;
&lt;LI&gt;Database backups&lt;/LI&gt;
&lt;LI&gt;VMWare sync.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Evaluation of heavy connections (epehant flows)&lt;BR /&gt;&lt;BR /&gt;A first indication is a high CPU load on a core if all other cores have a normal CPU load. This can be displayed very nicely with "top". Ok, now a core has 100% CPU usage. What can we do now? For this there is a &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105762&amp;amp;partition=General&amp;amp;product=Security" target="_self" rel="nofollow noopener noreferrer"&gt;SK105762&lt;/A&gt; to activate "Firewall Priority Queues".&amp;nbsp; This feature allows the administrator to monitor the heavy connections that consume the most CPU resources without interrupting the normal operation of the Firewall. After enabling this feature, the relevant information is available in CPView Utility. The system saves heavy connection data for the last 24 hours and CPDiag has a matching collector which uploads this data for diagnosis purposes.&lt;/P&gt;
&lt;P&gt;Heavy connection flow system definition on Check Point gateways:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Specific instance CPU is over 60%&lt;/LI&gt;
&lt;LI&gt;Suspected connection lasts more than 10s&lt;/LI&gt;
&lt;LI&gt;Suspected connection utilizes more than 50% of the total work the instance does. In other words, connection CPU utilization must be &amp;gt; 30% &amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; Check for heavy connections on the situation&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105762&amp;amp;partition=General&amp;amp;product=Security" target="_self" rel="nofollow noopener noreferrer"&gt;sk105762 - Firewall Priority Queues in R77.30 / R80.10 and above&lt;/A&gt;&lt;/TD&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Elephant-Flows-Heavy-Connections/m-p/69105/highlight/true#M14059" target="_self"&gt;R80.x - Performance Tuning Tip - Elephant Flows (Heavy Connections)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 21 - KMFW vs. UMFW&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;DIV class="lia-quilt-row lia-quilt-row-message-body"&gt;
&lt;DIV class="lia-quilt-column lia-quilt-column-24 lia-quilt-column-single lia-quilt-column-message-body-content"&gt;
&lt;DIV class="lia-quilt-column-alley lia-quilt-column-alley-single"&gt;
&lt;DIV id="bodyDisplay_5301e6e623ebad" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;In “Kernel Mode Firewall” KMFW, the maximum number of running cores is limited to 40 because of the Linux/Intel limitation of 2GB kernel memory, and because CoreXL architecture needs to load a large driver (~42MB) dozens of times (according to the CPU number, and up to 40 times). Newer platforms that contain more than 40 cores e.g., 23900 or open server are not fully utilized.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;The solution of the problem is a firewall in the user mode of the Linux operating system.&lt;/P&gt;
&lt;P&gt;USFW “User Space Firewall” or UMFW stands for “User Mode Firewall”, and it is based on proven VSX code. This mode was introduced in R80.10.&lt;/P&gt;
&lt;P&gt;From a performance point of view I could not see any differences between UMFW and KMFW. I noticed that the process fwk0_dev_0 generates a very high CPU load in the UMFW. My guess as to the purpose of the fwk0_dev_0 is that it acts as the liaison between the multiple fwk firewall worker processes (fw instance&amp;nbsp;thread that takes care for the packet processing) and the single fwmod kernel driver instance&amp;nbsp;and the process for&amp;nbsp;high priority cluster thread.&lt;/P&gt;
&lt;P&gt;If you want to change the mode from UMFW to KMFW this can be done by changing the registry parameter&amp;nbsp;&lt;SPAN&gt;FwIsUsermode by&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;cpprod_util command.&amp;nbsp;&lt;/SPAN&gt;In UMFW the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;fw instances are threads of the&lt;/STRONG&gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN class="lia-message-read"&gt;fwk0_dev_0&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;so by default the top shows all the threads cpu utilization under the main thread.&amp;nbsp;Top has the option to present the utilization per thread as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt; R80.10 to R80.30: With less then 35 cores use KMFW and with more then 35 cores use UMFW.&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&amp;amp;eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk149973" target="_self" rel="nofollow noreferrer"&gt;sk149973 - How to enable USFW (User-Space Firewall) on a 23900 appliance&lt;/A&gt;&lt;/TD&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-User-Mode-Firewall-vs-Kernel-Mode/m-p/70759/highlight/true#M14330" target="_self"&gt;R80.x - Performance Tuning Tip – User Mode Firewall vs. Kernel Mode Firewall&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 22 - BIOS&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;An interesting point, in performance tuning are BIOS settings. Here we have to distinguish whether we are talking about open servers or applications.&lt;/P&gt;
&lt;P&gt;With Check Point appliances the BIOS settings are set correctly and we don't have to do anything. This article (&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk120915&amp;amp;partition=Advanced&amp;amp;product=Branch" target="_self" rel="noopener noreferrer"&gt;sk120915&lt;/A&gt;)&amp;nbsp; provides the list of Check Point appliances and the available BIOS versions. If there are problems, the TAC can make settings on the appliance.&lt;/P&gt;
&lt;P&gt;The situation is different with Open Server. Here the BIOS settings are described in the HCL's if necessary.&lt;/P&gt;
&lt;P&gt;In principle, various BIOS settings can be performed on Open Server for the following points. The names of the settings may be different depending on the hardware and processor generation.&lt;/P&gt;
&lt;P&gt;Here is an overview of the most important BIOS points:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Intel Turbo Boost Technology (old name Turbo Mode)&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Intel SpeedStep settings&lt;/LI&gt;
&lt;LI&gt;Energy/Performance Bias:
&lt;UL&gt;
&lt;LI&gt;Memory Speed&lt;/LI&gt;
&lt;LI&gt;CPU Speed&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Energiy saving settings
&lt;UL&gt;
&lt;LI&gt;Minimum Processor Idle Power C-States&lt;/LI&gt;
&lt;LI&gt;Minimum Processor Idle Power Package C-States&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Hyperthreading (SMT) settings (It is only supported from R80.40 on open servers)&lt;/LI&gt;
&lt;LI&gt;X2APIC Support&lt;/LI&gt;
&lt;LI&gt;AES-NI Support&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; Enable the correct BIOS settings&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="50%" height="39px" style="width: 50%; border-style: none;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="50%" height="39px" style="width: 50%; border-style: none;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-BIOS/td-p/95897" target="_self"&gt;R80.x - Performance Tuning Tip - BIOS&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="0" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="50%" style="width: 50%; border-style: none;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 23 - Management Data Plane Separation&lt;BR /&gt;&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;Management Data Plane Separation allows a security gateway to have isolated management and data networks. The network system of each domain (plane) is independent and includes interfaces, routes, sockets, and processes. This has the performance advantage that some processes run separately from the firewall core daemon. Thus it reduces the load on the firewall processes, e.g. during the policy installation.&lt;/P&gt;
&lt;P&gt;The management plane is a domain whose purpose is to access, provision, and monitor the gateway. This includes:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - &lt;STRONG&gt;Routing separation&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Resource Separation&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Access:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSH, FTP, and more&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Provisioning:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Policy installation, GAIA Portal, RestAPI's, and more&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Monitoring:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Logs, SNMP, and more&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;When resource separation is enabled, the security gateway will separat the management instance. Here is an example:&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="12.5%" class="lia-align-center" style="background-color: #ff6699; width: 12.5%;"&gt;
&lt;P&gt;Mgmt &lt;BR /&gt;instance&lt;BR /&gt;&lt;BR /&gt;CPU core 0&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="12.5%" style="background-color: #ffccff; width: 12.5%;"&gt;
&lt;P class="lia-align-center"&gt;SND&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;CPU core 1&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="12.5%" class="lia-align-center" style="background-color: #ffccff; width: 12.5%;"&gt;
&lt;P&gt;SND&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;CPU core 2&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="12.5%" class="lia-align-center" style="background-color: #99ccff;"&gt;
&lt;P&gt;CoreXL &lt;BR /&gt;instance&lt;BR /&gt;&lt;BR /&gt;CPU core 3&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="12.5%" class="lia-align-center" style="background-color: #99ccff;"&gt;
&lt;P&gt;CoreXL &lt;BR /&gt;instance&lt;BR /&gt;&lt;BR /&gt;CPU core 4&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="12.5%" class="lia-align-center" style="background-color: #99ccff;"&gt;
&lt;P&gt;CoreXL &lt;BR /&gt;instance&lt;BR /&gt;&lt;BR /&gt;CPU core 5&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="12.5%" class="lia-align-center" style="background-color: #99ccff;"&gt;
&lt;P&gt;CoreXL &lt;BR /&gt;instance&lt;BR /&gt;&lt;BR /&gt;CPU core 6&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="12.5%" class="lia-align-center" style="background-color: #99ccff;"&gt;
&lt;P&gt;CoreXL &lt;BR /&gt;instance&lt;BR /&gt;&lt;BR /&gt;CPU core 7&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;BR /&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; Enable MDPS if possible.&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD height="18px" style="width: 50%; border-style: none;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk138672&amp;amp;partition=Basic&amp;amp;product=Security" target="_self" rel="noopener noreferrer"&gt;SK138672-&amp;nbsp;Management Data Plane Separation &lt;/A&gt;&lt;/TD&gt;
&lt;TD height="18px" style="width: 50%; border-style: none;"&gt;&lt;A class="page-link lia-link-navigation lia-custom-event" href="https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Management-Data-Plane-Separation/td-p/99405/jump-to/first-unread-message" target="_blank" rel="noopener"&gt;R80.x - Performance Tuning Tip - Management Data Plane Separation&amp;nbsp; (R80.30 kernel 3.10 and JHF 136+)&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tip 24 - CPU Spike Detective&lt;BR /&gt;&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;The CPU Spike Detective is a tool running only on Gaia OS 3.10 that monitors the system CPU usage and checks for CPU utilization spikes. This tool is introduced starting from R80.40 JHF 69.&lt;/P&gt;
&lt;P&gt;How does the spike detective work:&lt;/P&gt;
&lt;P&gt;A spike in a CPU core utilization is considered when these conditions are met:&lt;/P&gt;
&lt;P&gt;- CPU utilization is over 80% (this threshold is configurable)&lt;BR /&gt;- CPU utilization of the specific CPU core is at least 1.5 times higher than the entire system average usage (this threshold is configurable).&lt;/P&gt;
&lt;P&gt;This ensures that a highly utilized system (for example, during a performance testing) will not detect all CPU cores as "spiked".&lt;/P&gt;
&lt;P&gt;A thread/process is considered as "spiked" if it meets the below conditions:&lt;BR /&gt;- Running on a "spiked" CPU core&lt;BR /&gt;- Utilization is over 70% (this threshold is configurable)&lt;BR /&gt;- Utilization is at least 1.5 times higher than the system average (this threshold is configurable)&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;STRONG&gt;Tuning Tip:&lt;/STRONG&gt;&lt;/FONT&gt; Use CPU Spike Detective to&amp;nbsp;monitors the system CPU usage.&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD height="18px" style="width: 50%; border-style: none;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk166454&amp;amp;partition=Basic&amp;amp;product=Security#How" target="_self" rel="noopener noreferrer"&gt;SK166454 -&amp;nbsp;CPU Spike Detective &lt;BR /&gt;&lt;/A&gt;&lt;/TD&gt;
&lt;TD height="18px" style="width: 50%; border-style: none;"&gt;&lt;A class="page-link lia-link-navigation lia-custom-event" href="https://community.checkpoint.com/t5/General-Topics/R80-40-Performance-Tuning-Tip-CPU-Spike-Detective/td-p/99370/jump-to/first-unread-message" target="_blank" rel="noopener"&gt;R80.x - Performance Tuning Tip - CPU Spike Detective&amp;nbsp; (R80.40 JHF69+) &lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 07:06:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/66380#M13599</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2021-02-17T07:06:47Z</dc:date>
    </item>
    <item>
      <title>Re: R80 - Top 20 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/66437#M13616</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;Very interesting overview. &lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;Do you have informations about network issues and RX errors?&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 03 Nov 2019 08:28:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/66437#M13616</guid>
      <dc:creator>Harry_Morgan</dc:creator>
      <dc:date>2019-11-03T08:28:04Z</dc:date>
    </item>
    <item>
      <title>Re: R80 - Top 20 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/66444#M13620</link>
      <description>&lt;P&gt;I call the three RX error counters the "Dark Triad" in my Max Power book, more detailed error counters per interface can be accessed by running &lt;STRONG&gt;ethtool -S (interface)&lt;/STRONG&gt; from expert mode.&amp;nbsp; To quickly summarize:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;RX-ERR: Should be zero.&amp;nbsp; Caused by cabling problem, electrical interference, or a bad port.&amp;nbsp; Examples: framing errors, short frames/runts, late collisions caused by duplex mismatch.&lt;/LI&gt;
&lt;LI&gt;RX-OVR: Should be zero.&amp;nbsp; Overrun in NIC hardware buffering.&amp;nbsp; Solved by using a higher-speed NIC, bonding multiple interfaces, or enabling Ethernet Flow Control (controversial).&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;RX-DRP: Should be less than 0.1% of RX-OK.&amp;nbsp; Caused by a network ring buffer overflow in the Gaia kernel due to the inability of SoftIRQ to empty the ring buffer fast enough.&amp;nbsp; Solved by allocating more SND/IRQ cores in CoreXL (always the first step), enabling Multi-Queue, or as a last resort increasing the ring buffer size.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2020 20:19:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/66444#M13620</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-10-16T20:19:04Z</dc:date>
    </item>
    <item>
      <title>Re: R80 - Top 20 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/66445#M13621</link>
      <description>&lt;P&gt;It‘s noteworthy that Check Point introduces some auto-tuning in &lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-40-Early-Availability-Program-Check-Point-Update/m-p/61754" target="_self"&gt;R80.40&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 03 Nov 2019 10:56:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/66445#M13621</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2019-11-03T10:56:48Z</dc:date>
    </item>
    <item>
      <title>Re: R80 - Top 20 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/66449#M13626</link>
      <description>&lt;P&gt;Yep I've referred to this new R80.40 feature unofficially as "Dynamic Core Split Adjustment", but it is also worth noting R80.30 with Gaia kernel 3.10 has Multi-Queue automatically enabled on all interfaces that support it except for the management interface.&amp;nbsp; This will definitely help keep individual SND/IRQ cores from getting overloaded.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 03 Nov 2019 11:30:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/66449#M13626</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-11-03T11:30:04Z</dc:date>
    </item>
    <item>
      <title>Re: R80 - Top 20 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/66456#M13629</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;I'm adding this to the article.&lt;/P&gt;</description>
      <pubDate>Sun, 03 Nov 2019 21:54:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/66456#M13629</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-11-03T21:54:03Z</dc:date>
    </item>
    <item>
      <title>Re: R80 - Top 20 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/66496#M13641</link>
      <description>&lt;P&gt;As long as RX-DRP is growing you have a performance issue you need to tackle.&lt;/P&gt;
&lt;P&gt;It can be as simple as upping the RX-Ringbuffers to 1024 on machine you have upgrade over and over again. Those defaults used to be rather small in the past. An in-place upgrade will not change them.&lt;/P&gt;
&lt;P&gt;Other steps might be more complicated and requie a good understanding of the network and the traffic through the firewall.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2019 11:41:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/66496#M13641</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2019-11-04T11:41:51Z</dc:date>
    </item>
    <item>
      <title>Re: R80 - Top 20 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/66984#M13749</link>
      <description>&lt;P&gt;Maybe, as long as RX-DRP is less than 0.1% of RX-OK generally you don't need to do any tuning.&amp;nbsp; If piling up &amp;gt;0.1% RX-DRP the general steps to follow are:&lt;/P&gt;
&lt;P&gt;1) Allocate more SND/IRQ cores&lt;/P&gt;
&lt;P&gt;2) Enable Multi-Queue&lt;/P&gt;
&lt;P&gt;3) Increasing ring buffer size is usually a last resort, and probably indicates an under-powered firewall&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Nov 2019 19:32:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/66984#M13749</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-11-09T19:32:59Z</dc:date>
    </item>
    <item>
      <title>Re: R80 - Top 20 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/67005#M13755</link>
      <description>&lt;P&gt;More read here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-40-EA-Dynamic-split-of-CoreXL/td-p/66872" target="_self"&gt;R80.40 - Dynamic split of CoreXL&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Nov 2019 14:02:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/67005#M13755</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-11-10T14:02:19Z</dc:date>
    </item>
    <item>
      <title>Re: R80 - Top 20 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/67183#M13776</link>
      <description>&lt;P&gt;Can you tell me exactly how the Dynamic Dispatcher works?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Nov 2019 13:39:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/67183#M13776</guid>
      <dc:creator>Tsvika_Gilman</dc:creator>
      <dc:date>2019-11-12T13:39:31Z</dc:date>
    </item>
    <item>
      <title>Re: R80 - Top 20 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/67185#M13778</link>
      <description>&lt;P&gt;It helps balance the load on the Firewall Worker cores (kernel instances) by directing new connections to the least loaded worker, and replaces a simple hash function that was the default in R77.30 and earlier.&amp;nbsp; Dynamic Dispatcher is enabled by default in R80.10+ and you definitely want to leave it on, although it is somewhat limited in its ability to deal with elephant flows/heavy connections.&amp;nbsp; More info:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" style="max-width: 840px;" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105261&amp;amp;partition=General&amp;amp;product=CoreXL%22" target="_blank" rel="noopener"&gt;sk105261: CoreXL &lt;STRONG&gt;Dynamic&lt;/STRONG&gt; &lt;STRONG&gt;Dispatcher&lt;/STRONG&gt; in R77.30 / R80.10 and above&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Nov 2019 13:43:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/67185#M13778</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-11-12T13:43:28Z</dc:date>
    </item>
    <item>
      <title>Re: R80 - Top 20 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/67257#M13784</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Will „Dynamic split of CoreXL“ already be available with a JHF below R80.30?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Nov 2019 08:51:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/67257#M13784</guid>
      <dc:creator>rolf</dc:creator>
      <dc:date>2019-11-13T08:51:33Z</dc:date>
    </item>
    <item>
      <title>Re: R80 - Top 20 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/69111#M14060</link>
      <description>&lt;P&gt;Add elephant flow (heavy connection!&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2019 07:22:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/69111#M14060</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-12-03T07:22:37Z</dc:date>
    </item>
    <item>
      <title>Re: R80 - Top 20 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/69122#M14062</link>
      <description>&lt;P&gt;Don't expect a Jumbo Hotfix to change architecture.&lt;/P&gt;
&lt;P&gt;Which means: No&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2019 09:57:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/69122#M14062</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2019-12-03T09:57:36Z</dc:date>
    </item>
    <item>
      <title>Re: R80 - Top 20 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/69202#M14078</link>
      <description>&lt;P&gt;Great job &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21670"&gt;@HeikoAnkenbrand&lt;/a&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2019 16:21:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/69202#M14078</guid>
      <dc:creator>Holm_Klein</dc:creator>
      <dc:date>2019-12-03T16:21:03Z</dc:date>
    </item>
    <item>
      <title>Re: R80 - Top 20 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/69333#M14100</link>
      <description>&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2019 15:21:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/69333#M14100</guid>
      <dc:creator>Niroyec_Yerusha</dc:creator>
      <dc:date>2019-12-04T15:21:47Z</dc:date>
    </item>
    <item>
      <title>Re: R80 - Top 20 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/71370#M14463</link>
      <description>&lt;P&gt;Added&amp;nbsp;&lt;SPAN&gt;KMFW vs. UMFW&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Dec 2019 20:52:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/71370#M14463</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-12-30T20:52:38Z</dc:date>
    </item>
    <item>
      <title>Re: R80 - Top 20 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/71371#M14464</link>
      <description>&lt;P&gt;Great work!&lt;/P&gt;</description>
      <pubDate>Mon, 30 Dec 2019 20:56:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/71371#M14464</guid>
      <dc:creator>Ilan_Missalla</dc:creator>
      <dc:date>2019-12-30T20:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: R80 - Top 20 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/72001#M14598</link>
      <description>&lt;P&gt;UMFW/ USFW update&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2020 06:15:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/72001#M14598</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-01-10T06:15:41Z</dc:date>
    </item>
    <item>
      <title>Re: R80 - Top 20 Gateway Tuning Tips</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/72166#M14636</link>
      <description>&lt;P&gt;Do you have information here?&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 21:02:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-Top-25-Gateway-Tuning-Tips/m-p/72166#M14636</guid>
      <dc:creator>James_T_Kirk</dc:creator>
      <dc:date>2020-01-13T21:02:13Z</dc:date>
    </item>
  </channel>
</rss>

