<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.x Performance Tuning Tip - Connection Table in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/82247#M16629</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Referring to Tip 1, the automatic connection table.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We currently have a connection limit of 110000 set. It came out of a Spirent test and we found it a good cap.&lt;/P&gt;&lt;P&gt;I've recently had a look at the values on the connection tables and the fw ctl pstat output does not marry up with the fw tab -t connections -s output... see attached image.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 745px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5666i10F73255D9CB8FEC/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The reason that I am looking at this is that we have been told to expect a maximum of another 50k new connections for O365. I'm sure it wont go anywhere near this but none-the-less, preparing for the worst case.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just wanted to ask if the "automatic" is a dynamic value that adjusts as needed or if it sets once and also are the two outputs above supposed to be of the same table or answering the same question?&lt;/P&gt;&lt;P&gt;Can anyone tell me what "anticipated means?"&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Fri, 17 Apr 2020 13:49:42 GMT</pubDate>
    <dc:creator>kaj0103</dc:creator>
    <dc:date>2020-04-17T13:49:42Z</dc:date>
    <item>
      <title>R80.x Performance Tuning Tip - Connection Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/41581#M8686</link>
      <description>&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;What is a connection kernel table&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75163_pastedImage_4.png" border="0" /&gt;&lt;/P&gt;
&lt;P&gt;One of the most important tables in the Check Point firewall is the "connection kernel table". Connections kernel table contains the specific information about the current connections (source, destination, protocol, timeout, etc etc etc). The direction of the connection is set by the first packet of the connection even though the connection may be bi-directional in reality.&lt;/P&gt;
&lt;P&gt;In principle, the following keys are used:&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Direction of the connection (0 = inbound, 1 = outbound)&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Connection key&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Connection type&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Connection flags&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Rule number in SmartDashboard, to which the connection was matched&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; An index of an INSPECT handler function that is executed on every packet that belong to the connection&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Unique 128-bit connection identifier.&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti-Spoofing cache&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set of per-connection bits&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Connection modules' kernel buffers&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time to Live / Timeout&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The information in the connections table is stored in the following form:&lt;/P&gt;
&lt;P&gt;&amp;lt;direction,5-tuple-key;r_ctype,r_cflags,rule,service_id,handler,uuid1,uuid2,uuid3,uuid4,ifncin,ifncout,ifnsin,ifnsout,bits1,bits2,connection_module_kbufs@ttl/timeout&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Detailed explanation about each parameter can you find in the following SK &lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk65133&amp;amp;partition=Advanced&amp;amp;product=Security" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk65133&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank" rel="noopener"&gt;Connections Table Format&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;# fw tab -t connections -f -u&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;It is possible to manually delete an entry from the connection table with the following command.&lt;/P&gt;
&lt;P&gt;You can find more about the topic in the following SK "&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103876" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103876" target="_blank" rel="noopener"&gt;How to manually delete an entry from the Connections Table".&lt;/A&gt; &amp;nbsp;Delete the desired connection entry:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;# fw tab -t connections -x -e DIRECTION,SOURCE_IP,SOURCE_PORT,DEST_IP,DEST_PORT,PROTOCOL&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: red;"&gt;Attention!&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; All subsequent packets of the deleted connection will be dropped as Out-of-State. The connection should be re-established.&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This procedure will not remove entries from NAT translation tables.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Intressant are also the installed connection modules. Attention these are often confused with the "fw monitor chain modules". The modules have nothing to do with each other.&amp;nbsp; These connection modules can be displayed with the following command:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;# fw ctl conn -a&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Chapter&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;STRONG&gt;More interesting articles:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-x-Architecture-and-Performance-Tuning-Link-Collection/m-p/47883#M9336" target="_blank" rel="noopener" data-objecttype="102"&gt;- R80.x Architecture and Performance Tuning - Link Collection&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://cp.ankenbrand24.de" target="_blank" rel="noopener nofollow noopener noreferrer noopener noreferrer noopener noreferrer"&gt;- Article list (Heiko Ankenbrand)&lt;/A&gt;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Tuning connection table&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;The goal is always to reduce the number of connections in the connection table. The following tips will give you some examples. First of all you have to see what your connetion table looks like at the moment. Everything else can be found in tip one.&lt;/P&gt;
&lt;P&gt;What I &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;don't&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;want&lt;/STRONG&gt;&lt;/SPAN&gt; to enter here are different paths through the firewall in conjunction with SecureXL. More informations see here "&lt;A href="https://community.checkpoint.com/docs/DOC-3041-r80x-security-gateway-architecture-logical-packet-flow" target="_blank" rel="noopener" data-objecttype="102"&gt;R80.x Security Gateway Architecture (Logical Packet Flow)&lt;/A&gt;"&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fast path (Accelerated Path)&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Medium path&lt;/EM&gt; (PXL)&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Slow path&lt;/EM&gt; (F2F)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN style="font-size: 22px; color: #33cccc;"&gt;Tip 1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;From my point of view all systems should be set maximum concurrent connections&amp;nbsp; to "&lt;STRONG&gt;automatically&lt;/STRONG&gt;" (see picture).&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-5 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75171_pastedImage_18.png" border="0" width="658" height="136" /&gt;&lt;/P&gt;
&lt;P&gt;Alternatively, you can toggle it to manually here.&amp;nbsp;I wouldn't advise it, though. In most cases this is also set as default by older versions. If you use this, then please use it described below.&lt;/P&gt;
&lt;P&gt;This command shows the current and maximum number of connections.&lt;/P&gt;
&lt;P&gt;# &lt;STRONG&gt;fw tab -t connections -s&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75168_pastedImage_15.png" border="0" /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This command shows the maximum number of possible connections:&lt;/P&gt;
&lt;P&gt;# &lt;STRONG&gt;fw tab -t connections | grep limit | grep -v Kernel | grep -v connections | grep -oP '(?&amp;lt;=limit ).*'&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75169_pastedImage_16.png" border="0" width="486" height="37" /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In this example there are &lt;SPAN style="color: red;"&gt;23876&lt;/SPAN&gt; peek concurrent connections and 14056 concurrent connections while the default limit is 25000. The connection table limit should be increased to ensure uninterrupted operation. However, it should be noted here that the increase also uses resources (RAM). I would carefully double the connection limit in this case to 50000. Locate the maximum concurrent connections setting for the firewall (normally found in the object’s properties) and increase the value. The increase should be done gradually and with care as it will also increase the memory usage of the firewall.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;IMG class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75170_pastedImage_17.png" border="0" width="657" height="140" /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: red;"&gt;Attention!&lt;/SPAN&gt; This changes the behavior of the firewall. Therefore please handle with caution.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 22px; color: #33cccc;"&gt;TIP 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Packets are dropped on security gateway because maximal number of symbolic links for connections was reached in connection table.&lt;/SPAN&gt; &lt;SPAN style="font-size: 11.0pt;"&gt;What is the consequence!&lt;/SPAN&gt; &lt;SPAN style="font-size: 11.0pt;"&gt;Very low traffic on the security gateway.&lt;/SPAN&gt; &lt;SPAN style="font-size: 11.0pt;"&gt;How do I analyze the problem?&lt;/SPAN&gt; &lt;SPAN style="font-size: 11.0pt;"&gt;The output of 'fw tab -t connections -s' command shows that the ratio of #SLINKS / #VALS is greater than/equal to 5. What can I do? Follow&lt;/SPAN&gt; &lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk65463&amp;amp;partition=Advanced&amp;amp;product=CoreXL%22" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk65463&amp;amp;partition=Advanced&amp;amp;product=CoreXL%22" target="_blank" rel="noopener"&gt;sk65463&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 22px; color: #33cccc;"&gt;TIP 3&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Turn on Aggressive Aging to have connections removed as quick as possible.&lt;/P&gt;
&lt;P&gt;Aggressive aging is activated in IPS profile, or new connections may be dropped for the reason that the connections table is full when a given CoreXL firewall instance has far fewer connection entries than the connections table limit, or the 80% threshold to activate aggressive aging as seen in the output of 'fw ctl multik stat' command.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;The aggressive aging timeout values must be lower than the stateful inspection default for&amp;nbsp; TCP session timeout (3600).&lt;/SPAN&gt; &lt;SPAN style="font-size: 11.0pt;"&gt;The stateful inspection default session timeout values can be&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;found in: Global Properties &amp;gt; Stateful Inspection &amp;gt; TCP session timeout&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Check Aggressive Aging status:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;:&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;# fw ctl pstat | grep Agg&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-6 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75172_pastedImage_24.png" border="0" width="551" height="36" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 22px; color: #33cccc;"&gt;TIP 4&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;When you decrease the start timeout and end timeout, the connections will removed as quick as possible if the connection is no longer used.&lt;/P&gt;
&lt;P&gt;In the SmartDashboard go to „Policy-&amp;gt;Global Properties“ and in the Stateful Inspection tab reduce the the following session timer (see picture):&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TCP start timeout&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TCP end timeout&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; UDP virtual session timeout&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ICMP virtual session timeout&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SCTP start timeout&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SCTP end timeout&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; other IP protocols virtual session timeout&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Please refer to the firewall’s user manual for more information on what the session timeout is.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: red;"&gt;Attention!&lt;/SPAN&gt; This changes the behavior of the firewall. Therefore please handle with caution.&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-7 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75173_pastedImage_25.png" border="0" width="732" height="324" /&gt;&lt;/P&gt;
&lt;P&gt;With the following command you can find the number of active sessions for „TCP start timeout“ in the connections table. If you change the value in "grep" you can also show other session timeouts!&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;# fw tab -t connections -u -f | grep "Expires:" |grep "/25;" |wc -l&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;IMG class="jive-image image-8" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75174_pastedImage_27.png" border="0" width="488" height="35" /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; A high number of „TCP start timeout“ could also indicate a DDoS SYN flood attack. In the area of Distributed Denial of Service (DDoS), TCP SYN flooding was one of the first attack vectors that was encountered and it has remained significant even now. The TCP handshake process, which starts with a TCP [SYN] packet, requires that a server allocate a transmission control block (TCB) for incomplete and half-open connections. More see here "&lt;A title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112241&amp;amp;partition=Advanced&amp;amp;product=Security" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112241&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank" rel="noopener"&gt;Best Practices - DDoS attacks on Check Point Security Gateway"&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 22px; color: #33cccc;"&gt;TIP 5&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Under R80.20 there is a new command that in conjunction with the "Dynamic Dispatcher" displays connections with a high load. That's where I mention that CLI command here although it doesn't quite match the theme. This command shows the table with heavy connections (that consume the most CPU resources) in the CoreXL Dynamic Dispatcher. For more information about the CoreXL Dynamic Dispatcher, see&lt;/SPAN&gt; &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk105261" target="_blank" rel="noopener"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;sk105261&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;CoreXL suspects that a connection is "heavy" if it meets these conditions:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="margin-left: 36.0pt; text-indent: -18.0pt;"&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt; &lt;SPAN style="font-size: 11.0pt;"&gt;Security Gateway detected the suspected connection during the last 24 hours&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-left: 36.0pt; text-indent: -18.0pt;"&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt; &lt;SPAN style="font-size: 11.0pt;"&gt;The suspected connection lasts more than 10 seconds&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-left: 36.0pt; text-indent: -18.0pt;"&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt; &lt;SPAN style="font-size: 11.0pt;"&gt;CoreXL FW instance that processes this connection causes a CPU load of over 60%&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-left: 36.0pt; text-indent: -18.0pt;"&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt; &lt;SPAN style="font-size: 11.0pt;"&gt;The suspected connection utilizes more than 50% of the total work the applicable CoreXL FW instance does&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Here is an example:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;# &lt;STRONG&gt;fw ctl multik print_heavy_conn&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 22px; color: #33cccc;"&gt;&lt;IMG class="image-9 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75175_pastedImage_29.png" border="0" width="963" height="43" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 22px; color: #33cccc;"&gt;TIP 6&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;An important point in tuning is the order of the rules. Normally the "rule counter" helps here. Rules that are often used should be at the beginning of the ruleset.&lt;/P&gt;
&lt;P&gt;It can also be helpful to view certain connections in real time. For this I have published some useful commands here. The commands are for version R80.20.&lt;/P&gt;
&lt;P&gt;1) Find all rules to an IP address in the connections table (&lt;SPAN style="color: red;"&gt;Change the IP&lt;/SPAN&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;# fw tab -t connections -u -f | grep &lt;SPAN style="color: red;"&gt;10.1.2.81&lt;/SPAN&gt; | grep Rule | awk '{split($0,a,";"); print a[14];}' |sort -ng |uniq&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;IMG class="jive-image image-10" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75176_pastedImage_31.png" border="0" /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;2) Find all rules to an IP address in the connections table with IP and Port informations (&lt;SPAN style="color: red;"&gt;Change the IP&lt;/SPAN&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;# &lt;STRONG&gt;fw tab -t connections -u -f | grep &lt;SPAN style="color: red;"&gt;10.1.2.81&lt;/SPAN&gt; | grep Rule | awk '{split($0,a,";"); print a[14]," ",a[10]," ",a[6]," ",a[8]," ",a[9];}' |sort -ng&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-11 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75177_pastedImage_32.png" border="0" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 22px; color: #33cccc;"&gt;TIP 7&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Another important point is the session timeout for a service. For example, the default session timeout for UDP is set to 40 seconds (TCP to 3600 seconds). This means, for example, that each DNS request is kept open for a maximum of 40 seconds after the last package. That's a bit much from my point of view! Therefore it is possible to change the virtuall session timeouts in the service. I always test here with about 20 seconds (see picture) and adjust it a little bit upwards or downwards. So the DNS requests do not remain so long in the connetion table. This can also be applied to other services.&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-12 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75178_pastedImage_33.png" border="0" width="476" height="386" /&gt;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;References&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk65133&amp;amp;partition=Advanced&amp;amp;product=Security" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk65133&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank" rel="noopener"&gt;Connections Table Format&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103876" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103876" target="_blank" rel="noopener"&gt;How to manually delete an entry from the Connections Table&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk41916&amp;amp;partition=Advanced&amp;amp;product=Security" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk41916&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank" rel="noopener"&gt;Packets are dropped on Security Gateway because maximal number of Symbolic Links for connections was reached in Connecti…&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112241&amp;amp;partition=Advanced&amp;amp;product=Security" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112241&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank" rel="noopener"&gt;Best Practices - DDoS attacks on Check Point Security Gateway&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk35990&amp;amp;partition=General&amp;amp;product=CoreXL%22" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk35990&amp;amp;partition=General&amp;amp;product=CoreXL%22" target="_blank" rel="noopener"&gt;How Connections Table limit capacity behaves in CoreXL&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_PerformanceTuning_AdminGuide/html_frameset.htm" target="_blank" rel="noopener"&gt;Performance Tuning R80.10 Administratio Guide&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_PerformanceTuning_AdminGuide/html_frameset.htm" target="_blank" rel="noopener"&gt;Performance Tuning R80.20 Administration Guide&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98348#Best%20practices%20-%20Multi-Queue" target="_blank" rel="noopener"&gt;Best Practices - Security Gateway Performance&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 17:11:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/41581#M8686</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-05-22T17:11:54Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - Connection Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/41582#M8687</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;SPAN style="font-size: 22px;"&gt;&lt;STRONG style="background-color: #ffffff; color: #33cccc;"&gt;Tip 1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I find this advice quite strange.&lt;/P&gt;&lt;P&gt;As far as I know, all fresh installations of Gaia by default have "Automatically" parameter set for maximum number of connections.&amp;nbsp;If you create a new cluster/gateway object with Gaia, it uses automatic allocation by default. But this limit of 25000 connections was set on IPSO by default and was carried out to Gaia after upgrades. Recently I replaced several clusters of appliances with IPSO&amp;nbsp;and had to manually change the limit in gateway objects.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can see the reached maximum (peak) with&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;#&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG style="color: #333333; background-color: #ffffff; border: 0px; font-weight: bold;"&gt;fw tab -t connections -s&lt;/STRONG&gt;, then this gateway is in production already. What if we have peaks only on Sundays, with some automatic services running? We put the gateway in the network, increase number of connections x2-x3, but on Sunday it will be x5 connections. I can imagine what would happen for example with gateways in some online shops during sales days.&lt;/P&gt;&lt;P&gt;I believe that this limit of 25000 was not related to hardware itslef. Do you recommend to&amp;nbsp;use&amp;nbsp;25000 connections as a start point&amp;nbsp;for 5000 appliances as for 23000 appliances?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/41625"&gt;Timothy Hall&lt;/A&gt;‌, could you please comment on that? You wrote in the book that it is recommended to set this setting to automatic allocation on new gateways and OS and not try to manually set it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13px;"&gt;&lt;EM&gt;Also, "Intressant" and "Reverenz" are German words.&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2018 09:59:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/41582#M8687</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-11-28T09:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - Connection Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/41583#M8688</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check Point's code on the 32-bit SecurePlatform and IPSO operating systems did not support a setting of "Automatically" for connection table size, 25k was an arbitrary limit from a very long time ago and not related to the underlying hardware type or amount of RAM.&amp;nbsp; For any new firewall object created that specifies Gaia as the OS, the setting will be "Automatically" by default.&amp;nbsp; However the point I made in my book is that if a firewall object was initially created with an OS of SecurePlatform/IPSO then changed/upgraded to Gaia later, the setting will remain at Manually and not be changed to "Automatically" just because the OS was set to Gaia on the firewall object.&amp;nbsp; So definitely a good idea to check this setting and make sure it is set to Automatically on all your firewalls using Gaia (which should hopefully be just about all of them these days).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2018 13:14:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/41583#M8688</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-11-28T13:14:37Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - Connection Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/41584#M8689</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;A href="https://community.checkpoint.com/migrated-users/45132"&gt;Aleksei Shelepov,&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thx, I totally agree with &lt;A href="https://community.checkpoint.com/migrated-users/45132"&gt;you&lt;/A&gt;.and&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/41625"&gt;Timothy.&lt;/A&gt;&lt;/P&gt;&lt;P&gt;From my point of view you should only set "automatically" alwys.&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="75171" class="image-5 jive-image" height="136" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75340_pastedImage_18.png" width="658" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as I remember this is the case with every R7X version. With old R65 versions here 25000 was set.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To your second point!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With 23K Appliancen you should set more than 25K&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;. Here it depends also on the environment. Also here I would &lt;STRONG&gt;set&lt;/STRONG&gt; always to "&lt;STRONG&gt;automatically&lt;/STRONG&gt;".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a customer makes the setting fixed, he should adjust the values carefully. I have already seen environments in which it set to 2500000. And everyone was surprised that nothing worked anymore&lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/devil.png" /&gt;. Here I could write an article "The Best Check Point Configuration Errors"&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I'll add the following:&lt;BR /&gt;From my point of view all systems should be set to "&lt;STRONG&gt;automatically&lt;/STRONG&gt;" always.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Heiko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2018 18:03:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/41584#M8689</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-11-28T18:03:58Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - Connection Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/41585#M8690</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can see that you updated your advice in Tip 1, that's good.&lt;/P&gt;&lt;P&gt;But then my next question is why you need to leave this part about manual configuration of maximum connections at all? Maybe just leave the recommendation to set it on automatic and how to check number of connections? I believe that you're talking about modern appliances, OS, and versions here. Or could you explain in what cases someone should use manual configuration then?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Dec 2018 19:25:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/41585#M8690</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-12-01T19:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - Connection Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/41586#M8691</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/45132"&gt;Aleksei,&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't see any need for it anymore. But some customers just don't want to change it. That's why I mentioned it as a precaution.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Please start a vote if we need the manual setting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Heiko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2018 21:05:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/41586#M8691</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-12-03T21:05:33Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - Connection Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/41587#M8692</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px; color: #00ccff;"&gt;&lt;STRONG&gt;TIP 1&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I must disagree with your point of view here, as you don't take into consideration VSX environment. Quote from &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk39555#Capacity%20Optimization%20in%20VSX"&gt;sk39555&lt;/A&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;EM style="background-color: #ffffff; : ; color: #000000; font-size: 14px; font-family: arial, helvetica, sans-serif;"&gt;On Virtual Systems the value should be increased only if you know that a specific VS should handle a large load of concurrent connections.&lt;/EM&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;EM style="background-color: #ffffff; color: #000000; font-size: 14px;"&gt;It is not recommended to change this setting to a high value for VSs that are not planned to process a large amount of connections in the near future, because a high value of "Maximum concurrent connections" consumes memory, even if no entries are recorded in the connections table.&lt;/EM&gt;&lt;/BLOCKQUOTE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Second point is that if you have R77.30 Management, before setting up &lt;EM&gt;Automatic&lt;/EM&gt; calculation of connections, it is advisable to ensure that you have IPS profile assigned to the device, so Aggressive aging would work in case of low free memory - &lt;A _jive_internal="true" href="https://community.checkpoint.com/thread/6754-connections-peaklimit#comment-32306"&gt;link&lt;/A&gt;. I do understand that this is not relevant to your topic, since you are talking about R80.x, however I'll just leave it here.&amp;nbsp;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;STRONG style="color: #00ccff;"&gt;TIP 6&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;We need to mention that fw tab -t connections -u -f takes time and a bit CPU intensive. Use with caution.&lt;/P&gt;&lt;P&gt;I'd mention &lt;STRONG&gt;cpstat_blades&lt;/STRONG&gt; command, which&amp;nbsp;provides you top 5 rules based on hits.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;P.S. Reverenz? Are you sure?&amp;nbsp;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2018 21:49:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/41587#M8692</guid>
      <dc:creator>Maria_Pologova</dc:creator>
      <dc:date>2018-12-03T21:49:04Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - Connection Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/41588#M8693</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I did not describe VSX here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Therefore good note!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THX&lt;/P&gt;&lt;P&gt;Heiko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2018 22:15:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/41588#M8693</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-12-03T22:15:25Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - Connection Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/41589#M8694</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice info.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Feb 2019 12:30:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/41589#M8694</guid>
      <dc:creator>Martin_Arms</dc:creator>
      <dc:date>2019-02-06T12:30:21Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - Connection Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/49201#M9644</link>
      <description>Would you recommend making any changes to the default timeout, particularly for the TCP start timeout?&lt;BR /&gt;&lt;BR /&gt;Since we've moved more of our clients to wireless we seem to be seeing instances where this may be getting triggered. The jury's still out as to whether this is causing an issue as the client should just try and reconnect.</description>
      <pubDate>Fri, 29 Mar 2019 16:17:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/49201#M9644</guid>
      <dc:creator>Jason_Carrillo</dc:creator>
      <dc:date>2019-03-29T16:17:43Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - Connection Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/82247#M16629</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Referring to Tip 1, the automatic connection table.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We currently have a connection limit of 110000 set. It came out of a Spirent test and we found it a good cap.&lt;/P&gt;&lt;P&gt;I've recently had a look at the values on the connection tables and the fw ctl pstat output does not marry up with the fw tab -t connections -s output... see attached image.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 745px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5666i10F73255D9CB8FEC/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The reason that I am looking at this is that we have been told to expect a maximum of another 50k new connections for O365. I'm sure it wont go anywhere near this but none-the-less, preparing for the worst case.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just wanted to ask if the "automatic" is a dynamic value that adjusts as needed or if it sets once and also are the two outputs above supposed to be of the same table or answering the same question?&lt;/P&gt;&lt;P&gt;Can anyone tell me what "anticipated means?"&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 17 Apr 2020 13:49:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-Connection-Table/m-p/82247#M16629</guid>
      <dc:creator>kaj0103</dc:creator>
      <dc:date>2020-04-17T13:49:42Z</dc:date>
    </item>
  </channel>
</rss>

