<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic First impressions R80.30 on gateway - one step forward one (or two back) in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72593#M14710</link>
    <description>&lt;P&gt;Ok, we were finally "forced" to go ahead and upgrade our gateways from R80.10 to R80.30 for fairly small things - we wanted to be ale to use O365 Updatable Object (instead of home grown scripts) and improve Domain (FQDN) object performance issues when all FWK cores were making DNS queries causing a lot of alerts (see&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Domain-objects-in-R80-10-spamming-DNS/m-p/19786" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/Domain-objects-in-R80-10-spamming-DNS/m-p/19786&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;Positive things - upgrades were smooth and painless - both on regular gateways and VSX.&lt;/P&gt;
&lt;P&gt;All regular gateways seems to be performing as before, but I have to be honest that they are "over-dimensioned" and having rather powerfull HW for the job - 5900 with 16 cores.&lt;/P&gt;
&lt;P&gt;VSX though threw couple of surprises.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;SXL medium path usage.&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;CPU jumped from &amp;lt;30% to above 50%&lt;/STRONG&gt; on the busiest VS that only has FW and IA blades enabled. Ok, there is also VPN but only one connection:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="image.png" style="width: 402px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4021iCBA4D2722225B314/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I haven't spent enough time digging into it but for some reason 1/3 of all connections took medium path whereas before in R80.10 it was nearly all fully accelerated. And most of it was HTTPS (95%) with next most used LDAP-SSL (2%)&lt;/P&gt;
&lt;P&gt;I used the SXL fast accelerator feature (thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21670"&gt;@HeikoAnkenbrand&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-SecureXL-Fast-Accelerator-fw-ctl/td-p/67604" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-SecureXL-Fast-Accelerator-fw-ctl/td-p/67604&lt;/A&gt;) to exclude our proxies and some other nets and you can see that on friday CPU load was reduced by 10% but nowhere near what it used to be.&lt;/P&gt;
&lt;P&gt;I just find it impossible to explain why would gateway with only FW blade enabled start to to throw all (by the looks of it) traffic via PXL. And statistics are a bit funny too:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 521px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4025i86A0FA3A222D0637/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;FQDN alerts in logs&lt;/STRONG&gt;. I can definitely confirm that only one core now is doing DNS lookups (against all DNS server you have defined, in our case 2). But we are still getting a lot of alerts like these:&amp;nbsp;F&lt;EM&gt;irewall - Domain resolving error. Check DNS configuration on the gateway (0)&lt;/EM&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorKaspars_Zibarts_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="image.png" style="width: 357px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4022i7DF3E2A10036CE1B/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Especially after I enabled updatable object for O365 in the rulebase.&lt;/P&gt;
&lt;P&gt;As said before - I have not spent too much time on this as we had other "fun" stuff to deal with on our chassis, so it's fairly "raw". I will report more once I had some answers&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 18 Jan 2020 11:12:09 GMT</pubDate>
    <dc:creator>Kaspars_Zibarts</dc:creator>
    <dc:date>2020-01-18T11:12:09Z</dc:date>
    <item>
      <title>First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72593#M14710</link>
      <description>&lt;P&gt;Ok, we were finally "forced" to go ahead and upgrade our gateways from R80.10 to R80.30 for fairly small things - we wanted to be ale to use O365 Updatable Object (instead of home grown scripts) and improve Domain (FQDN) object performance issues when all FWK cores were making DNS queries causing a lot of alerts (see&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Domain-objects-in-R80-10-spamming-DNS/m-p/19786" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/Domain-objects-in-R80-10-spamming-DNS/m-p/19786&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;Positive things - upgrades were smooth and painless - both on regular gateways and VSX.&lt;/P&gt;
&lt;P&gt;All regular gateways seems to be performing as before, but I have to be honest that they are "over-dimensioned" and having rather powerfull HW for the job - 5900 with 16 cores.&lt;/P&gt;
&lt;P&gt;VSX though threw couple of surprises.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;SXL medium path usage.&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;CPU jumped from &amp;lt;30% to above 50%&lt;/STRONG&gt; on the busiest VS that only has FW and IA blades enabled. Ok, there is also VPN but only one connection:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="image.png" style="width: 402px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4021iCBA4D2722225B314/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I haven't spent enough time digging into it but for some reason 1/3 of all connections took medium path whereas before in R80.10 it was nearly all fully accelerated. And most of it was HTTPS (95%) with next most used LDAP-SSL (2%)&lt;/P&gt;
&lt;P&gt;I used the SXL fast accelerator feature (thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21670"&gt;@HeikoAnkenbrand&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-SecureXL-Fast-Accelerator-fw-ctl/td-p/67604" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-SecureXL-Fast-Accelerator-fw-ctl/td-p/67604&lt;/A&gt;) to exclude our proxies and some other nets and you can see that on friday CPU load was reduced by 10% but nowhere near what it used to be.&lt;/P&gt;
&lt;P&gt;I just find it impossible to explain why would gateway with only FW blade enabled start to to throw all (by the looks of it) traffic via PXL. And statistics are a bit funny too:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 521px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4025i86A0FA3A222D0637/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;FQDN alerts in logs&lt;/STRONG&gt;. I can definitely confirm that only one core now is doing DNS lookups (against all DNS server you have defined, in our case 2). But we are still getting a lot of alerts like these:&amp;nbsp;F&lt;EM&gt;irewall - Domain resolving error. Check DNS configuration on the gateway (0)&lt;/EM&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorKaspars_Zibarts_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="image.png" style="width: 357px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4022i7DF3E2A10036CE1B/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Especially after I enabled updatable object for O365 in the rulebase.&lt;/P&gt;
&lt;P&gt;As said before - I have not spent too much time on this as we had other "fun" stuff to deal with on our chassis, so it's fairly "raw". I will report more once I had some answers&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jan 2020 11:12:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72593#M14710</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-01-18T11:12:09Z</dc:date>
    </item>
    <item>
      <title>Re: First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72600#M14712</link>
      <description>&lt;P&gt;Just had a closer look at the IPs that are being sent to medium path and all points to O365 / MS.&lt;/P&gt;
&lt;P&gt;Strange as O365 object is fully removed now from rules and DB.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jan 2020 12:10:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72600#M14712</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-01-18T12:10:54Z</dc:date>
    </item>
    <item>
      <title>Re: First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72604#M14713</link>
      <description>&lt;P&gt;Ouch! Penny just dropped, not even sure how I overlooked the fact that CPUSE upgrade changed our hyper-threading from OFF to ON but (!) kept original manual affinity settings. So not surprising that CPU usage was screwed.&amp;nbsp; I.e. our multiqueue was running on 6 "half" cores instead of 6 "full"! etc etc&lt;/P&gt;
&lt;P&gt;Something to watch out for if you are using manual affinities on VSX!&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jan 2020 15:21:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72604#M14713</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-01-18T15:21:35Z</dc:date>
    </item>
    <item>
      <title>Re: First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72607#M14714</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/11456"&gt;@Kaspars_Zibarts&lt;/a&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The Fast Acceleration (picture 1 green) feature lets you define trusted connections to allow bypassing deep packet inspection on R80.20 JHF103 and above gateways. This feature significantly improves throughput for these trusted high volume connections and reduces CPU consumption.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;During my tests, I could reduce CPU (Core) usage about 10%-30%.&amp;nbsp;It is also logically, no more content inspection is executed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I like that you showed that graphically.&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fast_accel_3 (1).PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4027i5DCE328004331BBD/image-size/large?v=v2&amp;amp;px=999" role="button" title="fast_accel_3 (1).PNG" alt="fast_accel_3 (1).PNG" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jan 2020 16:29:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72607#M14714</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-01-18T16:29:22Z</dc:date>
    </item>
    <item>
      <title>Re: First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72609#M14716</link>
      <description>&lt;P&gt;Hi Kaspars,&lt;/P&gt;
&lt;P&gt;Thanks for your report, a few comments:&lt;/P&gt;
&lt;P&gt;1) What do you have set in the Track field of your rules?&amp;nbsp; If using Detailed or Extended logging this can pull traffic into PSLXL to provide the extra detail being requested.&amp;nbsp; Found out about this one while writing the third edition of my book.&lt;/P&gt;
&lt;P&gt;2) Do you have any services with Protocol Signature enabled in the Network/Firewall policy if using ordered layers, or in the top level of rules if using inline?&amp;nbsp; This can also cause some of what you are seeing and you should try to stick to simple services (just a port number) in those layers if possible, then call for Protocol Signatures and applications/URLs/content in subsequent layers.&lt;/P&gt;
&lt;P&gt;3) As far as that wacky Accelerated Conns percentage, you must have very large amount of stateless traffic, see &lt;A class="cp_link sc_ellipsis" style="max-width: 840px;" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk109467&amp;amp;partition=Advanced&amp;amp;product=SecureXL%22" target="_blank"&gt;sk109467: 'Accelerated conns' value is higher than 'Accelerated pkts' in the output of 'fwaccel stats -s'&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;4) As you noticed the gateway is much more dependent on speedy DNS starting in R80.20 due to Updatable objects, rad, wsdnsd and a lot of other daemons.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jan 2020 17:06:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72609#M14716</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-01-18T17:06:44Z</dc:date>
    </item>
    <item>
      <title>Re: First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72638#M14722</link>
      <description>&lt;P&gt;I got a "tip off" from inside CP! Verifying if I'm allowed to publish it here but seems like my PXL issue is resolved! Yeehaa! Power of community! Thanks to&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/14307"&gt;@Ilya_Yusupov&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And the "secret stuff" here:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Regarding medium path – you see most traffic in medium path due to a known bug we have since R80.20, TLS parser is enabled when the following combinations of blades are enabled&lt;/LI&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;FW + IDA or/and Monitoring or/and VPN&lt;/STRONG&gt; (exactly our case!)&lt;/LI&gt;
&lt;/OL&gt;
&lt;LI&gt;You can validate me by running the following command - “fw ctl get int tls_parser_enable” it will bring 1&lt;/LI&gt;
&lt;LI&gt;As WA you can disable it by running the following on the fly - “fw ctl set int tls_parser_enable 0” è for permanent disabled put it under $FWDIR/boot/modules/fwkern.conf &amp;nbsp;tls_parser_enable=0 and reboot.&lt;/LI&gt;
&lt;LI&gt;The above will bring the traffic to be fully accelerated as in previous version.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Sun, 19 Jan 2020 17:12:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72638#M14722</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-01-19T17:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72639#M14723</link>
      <description>&lt;P&gt;Wow nice one Kaspars, don't think I would have ever figured that one out.&amp;nbsp; Will disabling the TLS parser as shown cause issues with other blades should they get enabled later?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jan 2020 17:51:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72639#M14723</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-01-19T17:51:30Z</dc:date>
    </item>
    <item>
      <title>Re: First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72643#M14725</link>
      <description>&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jan 2020 19:56:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72643#M14725</guid>
      <dc:creator>rob123</dc:creator>
      <dc:date>2020-01-19T19:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72688#M14730</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;as far as I understood R&amp;amp;D are working on proper long term solution to fix it.&lt;/P&gt;
&lt;P&gt;As for FQDN alerts, now I can confirm that O365 updatable object is definitely causing it but only on our busy VSX. I haven't seen the same issue on regular gateways.&lt;/P&gt;
&lt;P&gt;According to CP, alert is issued when resolver cannot get response to checkpoint.com query. I took a tcpdump and confirmed that DNS is actually responding but it does generate wsdnsd log, here's example of packet capture and matching wsdnsd.elg entry:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4039iA0FF1370BB3F6491/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;[wsdnsd 32546]@vsx1-ext[20 Jan 9:10:33] Warning:cp_timed_blocker_handler: A handler [0xf6f213d0] blocked for 44 seconds.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;[wsdnsd 32546]@vsx1-ext[20 Jan 9:10:33] Warning:cp_timed_blocker_handler: Handler info: Library [/opt/CPshrd-R80.30/lib/libResolver.so], Function offset [0x2b3d0].&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;[wsdnsd 32546]@vsx&lt;SPAN style="font-family: inherit;"&gt;1-ext[20 Jan 9:10:33] Warning:cp_timed_blocker_handler: Handler info: Nearest symbol name [_Z10Sock_InputiPv], offset [0x2b3d0].&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Still digging through my packet capture to see if i can find any strange names / responses etc&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jan 2020 08:49:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72688#M14730</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-01-20T08:49:11Z</dc:date>
    </item>
    <item>
      <title>Re: First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72721#M14738</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp; - Indeed when you will enabled blades that will require tls parser you will need to remove the WA i suggested.&lt;/P&gt;
&lt;P&gt;The WA is currently only for the combinations i sent.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jan 2020 13:27:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72721#M14738</guid>
      <dc:creator>Ilya_Yusupov</dc:creator>
      <dc:date>2020-01-20T13:27:46Z</dc:date>
    </item>
    <item>
      <title>Re: First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72729#M14740</link>
      <description>&lt;P&gt;That makes sense, thanks.&amp;nbsp; Will add this workaround to the upcoming R80.40 addendum but be careful to add caveats for which blades are enabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jan 2020 20:03:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72729#M14740</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-01-20T20:03:04Z</dc:date>
    </item>
    <item>
      <title>Re: First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72971#M14811</link>
      <description>&lt;P&gt;Just a quick update on &lt;STRONG&gt;FQDN object alerts&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;All was caused by missing rule that would permit DNS requests using TCP from gateway. I have added full details at the corresponding thread about FQDN here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Management-Topics/Domain-Objects-FQDN-An-Unofficial-ATRG/m-p/72958#M10845" target="_blank"&gt;https://community.checkpoint.com/t5/General-Management-Topics/Domain-Objects-FQDN-An-Unofficial-ATRG/m-p/72958#M10845&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2020 10:57:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/72971#M14811</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-01-22T10:57:47Z</dc:date>
    </item>
    <item>
      <title>Re: First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/88510#M17781</link>
      <description>&lt;P&gt;we upgraded to 80.30 with latest HF, and even with disabling the parser (we dont use other blade) 49% of trafic is going trough medium path, how can we check further ?&lt;/P&gt;&lt;P&gt;Case atm.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jun 2020 14:01:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/88510#M17781</guid>
      <dc:creator>Khalid_Aftas</dc:creator>
      <dc:date>2020-06-14T14:01:56Z</dc:date>
    </item>
    <item>
      <title>Re: First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/88512#M17782</link>
      <description>&lt;P&gt;Output of &lt;STRONG&gt;enabled_blades&lt;/STRONG&gt; please.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jun 2020 14:28:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/88512#M17782</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-06-14T14:28:40Z</dc:date>
    </item>
    <item>
      <title>Re: First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/88517#M17785</link>
      <description>&lt;P&gt;FW,Identity Awerness, IPS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Got info from TAC (canada) that tcp/445 and https will use medium path on 80.30 regardless of PSL parser disabled or not.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jun 2020 16:33:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/88517#M17785</guid>
      <dc:creator>Khalid_Aftas</dc:creator>
      <dc:date>2020-06-14T16:33:53Z</dc:date>
    </item>
    <item>
      <title>Re: First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/88575#M17799</link>
      <description>&lt;P&gt;That's correct - file shares (445) is forced via PXL. There's a procedure available to exclude it but it's fairly complex from memory&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 08:20:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/88575#M17799</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-06-15T08:20:39Z</dc:date>
    </item>
    <item>
      <title>Re: First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/88577#M17801</link>
      <description>&lt;P&gt;well we used fast_accel to bypass the big flows we had and PXL % droped to 20% now.&lt;/P&gt;&lt;P&gt;That traffic is now overloading SND core .... and fwk are still quiet high....&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 08:32:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/88577#M17801</guid>
      <dc:creator>Khalid_Aftas</dc:creator>
      <dc:date>2020-06-15T08:32:31Z</dc:date>
    </item>
    <item>
      <title>Re: First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/95283#M18783</link>
      <description>&lt;P&gt;Note that the long-term fix for the TLS parser being inappropriately invoked with certain blade combinations has been fixed in R80.40 Jumbo HFA Take 78+.&amp;nbsp; This fix is also going to be backported into R80.20 and R80.30 Jumbo HFAs as well as mentioned in my&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Enterprise-Appliances-and-Gaia/R80-40-Addendum-for-quot-Max-Power-2020-quot-Now-Available/m-p/95073?search-action-id=17162001377&amp;amp;search-result-uid=95073" target="_self"&gt;R80.40 addendum for Max Power 2020&lt;/A&gt;.&amp;nbsp; It is always preferable to have this fix present if possible rather than manually tampering with the TLS parser, as doing so can cause further problems.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2020 15:04:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/95283#M18783</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-08-26T15:04:51Z</dc:date>
    </item>
    <item>
      <title>Re: First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/99071#M19299</link>
      <description>&lt;P&gt;More than 4 months laters, multiple sessions with TAC, and still no solutions yet (one special hotfix that did not help), this seems to be a known issue and TAC is not able to sync with r&amp;amp;d to get a fix ? wondering if someone in the community was able to get a fix at the end.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 09:28:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/99071#M19299</guid>
      <dc:creator>Khalid_Aftas</dc:creator>
      <dc:date>2020-10-14T09:28:29Z</dc:date>
    </item>
    <item>
      <title>Re: First impressions R80.30 on gateway - one step forward one (or two back)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/99072#M19300</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/4808"&gt;@Khalid_Aftas&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the fix exist in R80.30 JHF take 219 and in R80.20 JHF 141.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ilya&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 09:32:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/First-impressions-R80-30-on-gateway-one-step-forward-one-or-two/m-p/99072#M19300</guid>
      <dc:creator>Ilya_Yusupov</dc:creator>
      <dc:date>2020-10-14T09:32:23Z</dc:date>
    </item>
  </channel>
</rss>

