<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pushing policy destroys Skype calls in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Pushing-policy-destroys-Skype-calls/m-p/67918#M13885</link>
    <description>&lt;P&gt;I would involve TAC here - they at least can explain why policy install will disturb VoIP calls even if they can not resolve it...&lt;/P&gt;</description>
    <pubDate>Wed, 20 Nov 2019 15:07:20 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2019-11-20T15:07:20Z</dc:date>
    <item>
      <title>Pushing policy destroys Skype calls</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Pushing-policy-destroys-Skype-calls/m-p/67909#M13883</link>
      <description>&lt;P&gt;Does anyone else have issues where when they push policy to their internet edge gateway Skype calls are utterly destroyed for a solid 30-90 seconds?&lt;/P&gt;&lt;P&gt;We have a 3 node cluster in HA mode running on 15600 gateways with 80.10 (our 80.30 migration starts in December).&amp;nbsp; CPUs average around 30% at peak during the day.&lt;/P&gt;&lt;P&gt;Connection Persistence is configured for "Keep all connections".&lt;/P&gt;&lt;P&gt;It does not matter the time of day (or load) when policy is pushed.&amp;nbsp; We can push it at 4am and it will disrupt Skype calls.&lt;/P&gt;&lt;P&gt;What is the solution for this?&amp;nbsp; Aside from only pushing policy after hours (which will be an enormous burden to my team).&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2019 13:59:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Pushing-policy-destroys-Skype-calls/m-p/67909#M13883</guid>
      <dc:creator>Tommy_Forrest</dc:creator>
      <dc:date>2019-11-20T13:59:17Z</dc:date>
    </item>
    <item>
      <title>Re: Pushing policy destroys Skype calls</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Pushing-policy-destroys-Skype-calls/m-p/67918#M13885</link>
      <description>&lt;P&gt;I would involve TAC here - they at least can explain why policy install will disturb VoIP calls even if they can not resolve it...&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2019 15:07:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Pushing-policy-destroys-Skype-calls/m-p/67918#M13885</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-11-20T15:07:20Z</dc:date>
    </item>
    <item>
      <title>Re: Pushing policy destroys Skype calls</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Pushing-policy-destroys-Skype-calls/m-p/67930#M13887</link>
      <description>&lt;P&gt;What are the firewall and system logs showing regarding this issue? Is QoS and LLQ configured for this traffic? What is policy installation debugging showing? What is fw ctl zdebug drop showing? How is the specific service configured? What blades are inspecting this traffic? Does failover occur during policy installation? Keep in mind R80.10 is pushing the entire policy, not just the delta as R80.20 or .30&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2019 16:42:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Pushing-policy-destroys-Skype-calls/m-p/67930#M13887</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2019-11-20T16:42:37Z</dc:date>
    </item>
    <item>
      <title>Re: Pushing policy destroys Skype calls</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Pushing-policy-destroys-Skype-calls/m-p/67933#M13888</link>
      <description>&lt;P&gt;...firewall and system logs showing regarding this issue?&amp;nbsp; &lt;FONT color="#FF0000"&gt;What logs would I be looking for specifically?&amp;nbsp; Not sure I'd know what to be looking for in the logs.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;QOS is not enabled on this gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How is the specific service configured?&amp;nbsp;&amp;nbsp; &lt;FONT color="#FF0000"&gt;Which specific service and configured how?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;What blades are inspecting this traffic? &lt;FONT color="#FF0000"&gt;IPS/AV/Anti-Bot are enabled.&amp;nbsp; But don't cause issues outside of policy pushing.&amp;nbsp; No other traffic is impacted during policy push.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Does failover occur during policy installation?&amp;nbsp; &lt;FONT color="#FF0000"&gt;No, the cluster is stable.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Keep in mind R80.10 is pushing the entire policy, not just the delta as R80.20 or .30 - &lt;FONT color="#FF0000"&gt;I am aware of this.&amp;nbsp; And my understanding is that full delta pushing isn't due until 80.40.&amp;nbsp; Not sure if that has changed or not.&amp;nbsp; Our MDSen go 80.30 on 12/7.&amp;nbsp; Gateway upgrades will start in January.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2019 17:26:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Pushing-policy-destroys-Skype-calls/m-p/67933#M13888</guid>
      <dc:creator>Tommy_Forrest</dc:creator>
      <dc:date>2019-11-20T17:26:11Z</dc:date>
    </item>
    <item>
      <title>Re: Pushing policy destroys Skype calls</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Pushing-policy-destroys-Skype-calls/m-p/67943#M13891</link>
      <description>&lt;P&gt;Hi Tommy,&lt;/P&gt;&lt;P&gt;Considering that the policy installation is known to consume CPU resources, I would start by checking that the firewall's resources are at normal levels to rule out the likelihood of the firewall finding itself under a high strain during policy push. Some of the typical commands would be the following:&lt;/P&gt;&lt;P&gt;- top&lt;BR /&gt;- free -m&lt;BR /&gt;- vmstat&lt;/P&gt;&lt;P&gt;Then, a few questions for you if you don't mind:&lt;/P&gt;&lt;P&gt;- How is the policy installed? Is it just access control or threat prevention as well? Also, is it pushed to all selected gateways or to each member individually?&lt;/P&gt;&lt;P&gt;- What about installing different policy packages? Does the problem appear again?&lt;/P&gt;&lt;P&gt;- Which ports have been configured on the firewall to allow skype?&lt;/P&gt;&lt;P&gt;- Have you tried to install policy from the firewall with &lt;EM&gt;fw fetch&lt;/EM&gt;? If so, what was the result?&lt;/P&gt;&lt;P&gt;- Does the issue in question occur independently of which cluster member is in active state? In other words, if you carry out a fail over and push policy would the result be the same?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2019 21:27:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Pushing-policy-destroys-Skype-calls/m-p/67943#M13891</guid>
      <dc:creator>Nick_Doropoulos</dc:creator>
      <dc:date>2019-11-20T21:27:59Z</dc:date>
    </item>
    <item>
      <title>Re: Pushing policy destroys Skype calls</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Pushing-policy-destroys-Skype-calls/m-p/68320#M13951</link>
      <description>One thing that happens during policy installation is everything goes F2F while SecureXL reloads after a policy installation.&lt;BR /&gt;This process is much more efficient in R80.20+.&lt;BR /&gt;It may be what's responsible for the issue you're seeing.</description>
      <pubDate>Mon, 25 Nov 2019 02:41:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Pushing-policy-destroys-Skype-calls/m-p/68320#M13951</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-11-25T02:41:03Z</dc:date>
    </item>
    <item>
      <title>Re: Pushing policy destroys Skype calls</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Pushing-policy-destroys-Skype-calls/m-p/68350#M13954</link>
      <description>as far as I'm aware Skype uses UDP ports so I guess policy push temporarily destroy those sessions therefore it's "reconnect" seem required and normal, not sure I understand correctly but have you tried fw monitor that traffic noticing any drops when "fetch" over the sic happens? I guess it isn't related to 80.10 or 80.30 but Skype especially skype-for-business or nowadays Teams uses udp/5060 (sip) or soft-sip for the calls (voice calls) so I presume this interruption is either caused by wrong secureXL (as Dameon mentioned F2F) associations or simply not tuned well by the fw accell . wonder what really is happening on the logs as well when the policy is pushed (what is happening with the calls and its packages)/.</description>
      <pubDate>Mon, 25 Nov 2019 10:13:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Pushing-policy-destroys-Skype-calls/m-p/68350#M13954</guid>
      <dc:creator>Jerry</dc:creator>
      <dc:date>2019-11-25T10:13:48Z</dc:date>
    </item>
    <item>
      <title>Re: Pushing policy destroys Skype calls</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Pushing-policy-destroys-Skype-calls/m-p/68393#M13955</link>
      <description>&lt;P&gt;As Dameon said, on R80.10 and earlier SecureXL is completely restarted every time policy is pushed to it can re-sync it own connections table with the rematched one in the Firewall Workers.&amp;nbsp; This can most definitely cause latency, and in some cases packet loss if the firewall is overloaded.&lt;/P&gt;
&lt;P&gt;In R80.20 and later SecureXL continues running during a policy push and rematches its own connections table with the Firewall Workers via the F2V path.&lt;/P&gt;
&lt;P&gt;This may sound a bit counter-intuitive, but pick some IP addresses doing Skype calls and force them F2F permanently as detailed here: &lt;A class="cp_link sc_ellipsis" style="max-width: 840px;" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104468&amp;amp;partition=Advanced&amp;amp;product=SecureXL%22" target="_blank"&gt;sk104468: How to &lt;STRONG&gt;disable&lt;/STRONG&gt; &lt;STRONG&gt;SecureXL&lt;/STRONG&gt; for specific IP addresses&lt;/A&gt;.&amp;nbsp; See if doing so helps for those particular IPs when policy pushes are performed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Nov 2019 13:56:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Pushing-policy-destroys-Skype-calls/m-p/68393#M13955</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-11-25T13:56:44Z</dc:date>
    </item>
  </channel>
</rss>

