<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Checkpoint policy drops traffic while installing the policy. in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-policy-drops-traffic-while-installing-the-policy/m-p/83482#M16883</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Please help me with this. While installing the checkpoint policy , i can see some traffic is dropped, due to high cpu utilization. Suggest me with all possible solution.&lt;/P&gt;&lt;P&gt;Logs for your reference:&lt;/P&gt;&lt;P&gt;[Expert@US063FW-17]# fw ver&lt;BR /&gt;This is Check Point VPN-1(TM) &amp;amp; FireWall-1(R) R75.47 - Build 171&lt;BR /&gt;[Expert@US063FW-17]# enabled_blades&lt;BR /&gt;fw&lt;BR /&gt;[Expert@US063FW-17]# cphaprob stat&lt;/P&gt;&lt;P&gt;Cluster Mode: Sync only (OPSEC) with IGMP Membership&lt;/P&gt;&lt;P&gt;Number Unique Address Firewall State (*)&lt;/P&gt;&lt;P&gt;1 (local) 192.168.2.1 Active&lt;BR /&gt;2 192.168.2.2 Active&lt;/P&gt;&lt;P&gt;(*) FW-1 monitors only the sync operation and the security policy&lt;BR /&gt;Use OPSEC's monitoring tool to get the cluster status&lt;/P&gt;&lt;P&gt;[Expert@US063FW-17]#&lt;BR /&gt;[Expert@US063FW-17]# fwaccel stat&lt;BR /&gt;Accelerator Status : on&lt;BR /&gt;Accept Templates : disabled by Firewall&lt;BR /&gt;disabled from rule #194&lt;BR /&gt;Drop Templates : disabled&lt;BR /&gt;NAT Templates : disabled by user&lt;BR /&gt;Accelerator Features : Accounting, NAT, Cryptography, Routing,&lt;BR /&gt;HasClock, Templates, Synchronous, IdleDetection,&lt;BR /&gt;Sequencing, TcpStateDetect, AutoExpire,&lt;BR /&gt;DelayedNotif, TcpStateDetectV2, CPLS, WireMode,&lt;BR /&gt;DropTemplates, NatTemplates, Streaming,&lt;BR /&gt;MultiFW, AntiSpoofing, DoS Defender, ViolationStats,&lt;BR /&gt;Nac, AsychronicNotif, ERDOS&lt;BR /&gt;Cryptography Features : Tunnel, UDPEncapsulation, MD5, SHA1, NULL,&lt;BR /&gt;3DES, DES, CAST, CAST-40, AES-128, AES-256,&lt;BR /&gt;ESP, LinkSelection, DynamicVPN, NatTraversal,&lt;BR /&gt;EncRouting, AES-XCBC, SHA256&lt;BR /&gt;&lt;BR /&gt;[Expert@US063FW-17]# fw ctl affinity -l -r&lt;BR /&gt;CPU 0: Mgmt eth3-02 eth3-03&lt;BR /&gt;CPU 1: Sync eth3-04&lt;BR /&gt;CPU 2: fw_9&lt;BR /&gt;CPU 3: fw_8&lt;BR /&gt;CPU 4: fw_7&lt;BR /&gt;CPU 5: fw_6&lt;BR /&gt;CPU 6: fw_5&lt;BR /&gt;CPU 7: fw_4&lt;BR /&gt;CPU 8: fw_3&lt;BR /&gt;CPU 9: fw_2&lt;BR /&gt;CPU 10: fw_1&lt;BR /&gt;CPU 11: fw_0&lt;BR /&gt;All: eth3-01&lt;BR /&gt;rtmd mpdaemon in.geod in.asessiond in.atelnetd fwd cpd cprid&lt;BR /&gt;[Expert@US063FW-17]# sim affinity -l&lt;BR /&gt;Sync : 1&lt;BR /&gt;eth3-04 : 1&lt;BR /&gt;eth3-01 : 1&lt;BR /&gt;eth3-02 : 0&lt;BR /&gt;eth3-03 : 0&lt;BR /&gt;Mgmt : 0&lt;BR /&gt;[Expert@US063FW-17]# netstat -ni&lt;BR /&gt;Kernel Interface table&lt;BR /&gt;Iface MTU Met RX-OK RX-ERR RX-DRP RX-OVR TX-OK TX-ERR TX-DRP TX-OVR Flg&lt;BR /&gt;Mgmt 1500 0 571201 0 0 0 4457209 0 0 0 BMRU&lt;BR /&gt;Mgmt:1 1500 0 - no statistics available - BMRU&lt;BR /&gt;Sync 1500 0 7135512270 0 635978368 0 36840380808 0 0 0 BMRU&lt;BR /&gt;eth3-01 1500 0 2741822495663 0 25756871 0 824242839551 0 0 0 BMRU&lt;BR /&gt;eth3-02 1500 0 892711572797 0 15075500 0 2825803749984 0 0 0 BMRU&lt;BR /&gt;eth3-03 1500 0 126627899400 0 2561531 0 99619763573 0 0 0 BMRU&lt;BR /&gt;eth3-04 1500 0 41407655257 0 2155 0 36830188659 0 0 0 BMRU&lt;BR /&gt;eth3-04.420 1500 0 19108740474 0 0 0 17185259684 0 0 0 BMRU&lt;BR /&gt;eth3-04.421 1500 0 127223682 0 0 0 154860694 0 0 0 BMRU&lt;BR /&gt;eth3-04.422 1500 0 22114010854 0 0 0 19425860838 0 0 0 BMRU&lt;BR /&gt;eth3-04.423 1500 0 40243731 0 0 0 64171757 0 0 0 BMRU&lt;BR /&gt;lo 16436 0 21963018 0 0 0 21963018 0 0 0 LRU&lt;BR /&gt;[Expert@US063FW-17]# fw ctl multik stat&lt;BR /&gt;ID | Active | CPU | Connections | Peak&lt;BR /&gt;-------------------------------------------&lt;BR /&gt;0 | Yes | 11 | 3451 | 36359&lt;BR /&gt;1 | Yes | 10 | 8451 | 28885&lt;BR /&gt;2 | Yes | 9 | 2721 | 30418&lt;BR /&gt;3 | Yes | 8 | 2772 | 31418&lt;BR /&gt;4 | Yes | 7 | 7274 | 29085&lt;BR /&gt;5 | Yes | 6 | 2656 | 33469&lt;BR /&gt;6 | Yes | 5 | 2611 | 33813&lt;BR /&gt;7 | Yes | 4 | 6460 | 31557&lt;BR /&gt;8 | Yes | 3 | 3360 | 28837&lt;BR /&gt;9 | Yes | 2 | 2776 | 44874&lt;BR /&gt;[Expert@US063FW-17]# free -m&lt;BR /&gt;total used free shared buffers cached&lt;BR /&gt;Mem: 11998 11671 326 0 670 7544&lt;BR /&gt;-/+ buffers/cache: 3456 8541&lt;BR /&gt;Swap: 26654 0 26654&lt;/P&gt;</description>
    <pubDate>Tue, 28 Apr 2020 12:43:08 GMT</pubDate>
    <dc:creator>Venky_21</dc:creator>
    <dc:date>2020-04-28T12:43:08Z</dc:date>
    <item>
      <title>Checkpoint policy drops traffic while installing the policy.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-policy-drops-traffic-while-installing-the-policy/m-p/83482#M16883</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Please help me with this. While installing the checkpoint policy , i can see some traffic is dropped, due to high cpu utilization. Suggest me with all possible solution.&lt;/P&gt;&lt;P&gt;Logs for your reference:&lt;/P&gt;&lt;P&gt;[Expert@US063FW-17]# fw ver&lt;BR /&gt;This is Check Point VPN-1(TM) &amp;amp; FireWall-1(R) R75.47 - Build 171&lt;BR /&gt;[Expert@US063FW-17]# enabled_blades&lt;BR /&gt;fw&lt;BR /&gt;[Expert@US063FW-17]# cphaprob stat&lt;/P&gt;&lt;P&gt;Cluster Mode: Sync only (OPSEC) with IGMP Membership&lt;/P&gt;&lt;P&gt;Number Unique Address Firewall State (*)&lt;/P&gt;&lt;P&gt;1 (local) 192.168.2.1 Active&lt;BR /&gt;2 192.168.2.2 Active&lt;/P&gt;&lt;P&gt;(*) FW-1 monitors only the sync operation and the security policy&lt;BR /&gt;Use OPSEC's monitoring tool to get the cluster status&lt;/P&gt;&lt;P&gt;[Expert@US063FW-17]#&lt;BR /&gt;[Expert@US063FW-17]# fwaccel stat&lt;BR /&gt;Accelerator Status : on&lt;BR /&gt;Accept Templates : disabled by Firewall&lt;BR /&gt;disabled from rule #194&lt;BR /&gt;Drop Templates : disabled&lt;BR /&gt;NAT Templates : disabled by user&lt;BR /&gt;Accelerator Features : Accounting, NAT, Cryptography, Routing,&lt;BR /&gt;HasClock, Templates, Synchronous, IdleDetection,&lt;BR /&gt;Sequencing, TcpStateDetect, AutoExpire,&lt;BR /&gt;DelayedNotif, TcpStateDetectV2, CPLS, WireMode,&lt;BR /&gt;DropTemplates, NatTemplates, Streaming,&lt;BR /&gt;MultiFW, AntiSpoofing, DoS Defender, ViolationStats,&lt;BR /&gt;Nac, AsychronicNotif, ERDOS&lt;BR /&gt;Cryptography Features : Tunnel, UDPEncapsulation, MD5, SHA1, NULL,&lt;BR /&gt;3DES, DES, CAST, CAST-40, AES-128, AES-256,&lt;BR /&gt;ESP, LinkSelection, DynamicVPN, NatTraversal,&lt;BR /&gt;EncRouting, AES-XCBC, SHA256&lt;BR /&gt;&lt;BR /&gt;[Expert@US063FW-17]# fw ctl affinity -l -r&lt;BR /&gt;CPU 0: Mgmt eth3-02 eth3-03&lt;BR /&gt;CPU 1: Sync eth3-04&lt;BR /&gt;CPU 2: fw_9&lt;BR /&gt;CPU 3: fw_8&lt;BR /&gt;CPU 4: fw_7&lt;BR /&gt;CPU 5: fw_6&lt;BR /&gt;CPU 6: fw_5&lt;BR /&gt;CPU 7: fw_4&lt;BR /&gt;CPU 8: fw_3&lt;BR /&gt;CPU 9: fw_2&lt;BR /&gt;CPU 10: fw_1&lt;BR /&gt;CPU 11: fw_0&lt;BR /&gt;All: eth3-01&lt;BR /&gt;rtmd mpdaemon in.geod in.asessiond in.atelnetd fwd cpd cprid&lt;BR /&gt;[Expert@US063FW-17]# sim affinity -l&lt;BR /&gt;Sync : 1&lt;BR /&gt;eth3-04 : 1&lt;BR /&gt;eth3-01 : 1&lt;BR /&gt;eth3-02 : 0&lt;BR /&gt;eth3-03 : 0&lt;BR /&gt;Mgmt : 0&lt;BR /&gt;[Expert@US063FW-17]# netstat -ni&lt;BR /&gt;Kernel Interface table&lt;BR /&gt;Iface MTU Met RX-OK RX-ERR RX-DRP RX-OVR TX-OK TX-ERR TX-DRP TX-OVR Flg&lt;BR /&gt;Mgmt 1500 0 571201 0 0 0 4457209 0 0 0 BMRU&lt;BR /&gt;Mgmt:1 1500 0 - no statistics available - BMRU&lt;BR /&gt;Sync 1500 0 7135512270 0 635978368 0 36840380808 0 0 0 BMRU&lt;BR /&gt;eth3-01 1500 0 2741822495663 0 25756871 0 824242839551 0 0 0 BMRU&lt;BR /&gt;eth3-02 1500 0 892711572797 0 15075500 0 2825803749984 0 0 0 BMRU&lt;BR /&gt;eth3-03 1500 0 126627899400 0 2561531 0 99619763573 0 0 0 BMRU&lt;BR /&gt;eth3-04 1500 0 41407655257 0 2155 0 36830188659 0 0 0 BMRU&lt;BR /&gt;eth3-04.420 1500 0 19108740474 0 0 0 17185259684 0 0 0 BMRU&lt;BR /&gt;eth3-04.421 1500 0 127223682 0 0 0 154860694 0 0 0 BMRU&lt;BR /&gt;eth3-04.422 1500 0 22114010854 0 0 0 19425860838 0 0 0 BMRU&lt;BR /&gt;eth3-04.423 1500 0 40243731 0 0 0 64171757 0 0 0 BMRU&lt;BR /&gt;lo 16436 0 21963018 0 0 0 21963018 0 0 0 LRU&lt;BR /&gt;[Expert@US063FW-17]# fw ctl multik stat&lt;BR /&gt;ID | Active | CPU | Connections | Peak&lt;BR /&gt;-------------------------------------------&lt;BR /&gt;0 | Yes | 11 | 3451 | 36359&lt;BR /&gt;1 | Yes | 10 | 8451 | 28885&lt;BR /&gt;2 | Yes | 9 | 2721 | 30418&lt;BR /&gt;3 | Yes | 8 | 2772 | 31418&lt;BR /&gt;4 | Yes | 7 | 7274 | 29085&lt;BR /&gt;5 | Yes | 6 | 2656 | 33469&lt;BR /&gt;6 | Yes | 5 | 2611 | 33813&lt;BR /&gt;7 | Yes | 4 | 6460 | 31557&lt;BR /&gt;8 | Yes | 3 | 3360 | 28837&lt;BR /&gt;9 | Yes | 2 | 2776 | 44874&lt;BR /&gt;[Expert@US063FW-17]# free -m&lt;BR /&gt;total used free shared buffers cached&lt;BR /&gt;Mem: 11998 11671 326 0 670 7544&lt;BR /&gt;-/+ buffers/cache: 3456 8541&lt;BR /&gt;Swap: 26654 0 26654&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2020 12:43:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-policy-drops-traffic-while-installing-the-policy/m-p/83482#M16883</guid>
      <dc:creator>Venky_21</dc:creator>
      <dc:date>2020-04-28T12:43:08Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint policy drops traffic while installing the policy.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-policy-drops-traffic-while-installing-the-policy/m-p/83488#M16885</link>
      <description>&lt;P&gt;A few notes:&lt;/P&gt;
&lt;P&gt;1) Your code level R75.47 has not been supported for a very long time.&lt;/P&gt;
&lt;P&gt;2) The Sync interface which is handling state table synchronization is thoroughly overloaded with an RX-DRP rate approaching 9%.&amp;nbsp; If you run &lt;STRONG&gt;fw ctl pstat&lt;/STRONG&gt; and look at the sync statistics at the end of the output you will see massive loss and retransmissions, which will cause persistently high CPU on all worker cores (fw_X).&amp;nbsp; If your Sync interface is 100Mbps it needs to be upgraded to 1Gbit if possible, or if that is not possible you need to turn off sync for services DNS, HTTP, and HTTPS.&amp;nbsp; You need to get the health of that Sync network fixed ASAP as that is going to directly impact CPU load during your policy installs.&lt;/P&gt;
&lt;P&gt;3) How many rules are in your policy?&amp;nbsp; Templating getting disabled by rule #194 is not a big deal if there are only 200 rules in your rulebase, but if you have many more rules than that the overhead of rule base lookups will cause high CPU on your workers.&lt;/P&gt;
&lt;P&gt;4) Once the Sync network is fixed if policy installs still cause a traffic disruption, consider setting Connection Persistence from "rematch connections" to "keep all connections" on your cluster object.&amp;nbsp; This will substantially reduce CPU load during policy installs, but existing connections that are not allowed by the newly-installed policy will still be allowed through until the connection ends.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2020 13:52:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-policy-drops-traffic-while-installing-the-policy/m-p/83488#M16885</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-04-28T13:52:50Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint policy drops traffic while installing the policy.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-policy-drops-traffic-while-installing-the-policy/m-p/83490#M16886</link>
      <description>&lt;P&gt;&lt;SPAN&gt;R75.47 is a long time out of support.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Check CUL/Freeze state in /var/log/messages:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;# cat&amp;nbsp;/var/log/messages | grep freeze&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;#&amp;nbsp;cat&amp;nbsp;/var/log/messages | grep CUL&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2020 14:33:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-policy-drops-traffic-while-installing-the-policy/m-p/83490#M16886</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-04-28T14:33:27Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint policy drops traffic while installing the policy.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-policy-drops-traffic-while-installing-the-policy/m-p/83497#M16887</link>
      <description>The long and the short here... R75.47 was god awful. It's also 32bit, and CoreXL was very much in it's infancy.&lt;BR /&gt;&lt;BR /&gt;Is this an open platform or appliance? If it's an appliance see if it can goto R80. Based off of the core and memory it should be ok... if the processor allows it. If it's an open platform... see if the CPU is supported in the HCL. It won't fix everything but 64bit processing and actually being able to use all of that RAM... and multithreaded processes does wonders.&lt;BR /&gt;&lt;BR /&gt;With that rule set... I'm going to suspect that your rule base is massive. You are going to need to do some rule base clean up.&lt;BR /&gt;&lt;BR /&gt;I also suspect that this isn't a "Hey there is only one thing causing issues here." It's going to be a lot of issues that need to be tackled in a logical fashion.</description>
      <pubDate>Tue, 28 Apr 2020 15:16:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-policy-drops-traffic-while-installing-the-policy/m-p/83497#M16887</guid>
      <dc:creator>Lloyd_Crosby</dc:creator>
      <dc:date>2020-04-28T15:16:27Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint policy drops traffic while installing the policy.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-policy-drops-traffic-while-installing-the-policy/m-p/83531#M16894</link>
      <description>SecureXL is disabled temporarily during a policy install, which can cause a significant CPU increase if the gateway is loaded.&lt;BR /&gt;This is something we've minimized greatly in the most recent R80.x versions (R80.20+).&lt;BR /&gt;In any case, you're on a version of code that's been End of Support for 4 years now and it's best to upgrade to a supported release.</description>
      <pubDate>Tue, 28 Apr 2020 19:08:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-policy-drops-traffic-while-installing-the-policy/m-p/83531#M16894</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-04-28T19:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint policy drops traffic while installing the policy.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-policy-drops-traffic-while-installing-the-policy/m-p/83559#M16906</link>
      <description>Thanks for taking your time to reply.&lt;BR /&gt;I have 2659 rules in total.&lt;BR /&gt;Settings for Sync: Speed: 1000Mb/s Duplex: Full driver: e1000e&lt;BR /&gt;How to turn off sync for services DNS, HTTP, and HTTPS?&lt;BR /&gt;</description>
      <pubDate>Wed, 29 Apr 2020 00:37:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-policy-drops-traffic-while-installing-the-policy/m-p/83559#M16906</guid>
      <dc:creator>Venky_21</dc:creator>
      <dc:date>2020-04-29T00:37:37Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint policy drops traffic while installing the policy.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Checkpoint-policy-drops-traffic-while-installing-the-policy/m-p/83608#M16924</link>
      <description>&lt;P&gt;It would be great to get that templating as shown by &lt;STRONG&gt;fwaccel stat&lt;/STRONG&gt; much further down into in your big rulebase, but in that version many many things will stop templating such as DHCP/traceroute/domain/time/RPC/DCE objects among many others.&lt;/P&gt;
&lt;P&gt;With a rulebase that size the rematch is going to slam the CPU during a policy load, would strongly recommend setting "keep all connections" as mentioned in an earlier post if you are OK with the security ramifications.&lt;/P&gt;
&lt;P&gt;For those three services uncheck this box on the Advanced screen like this to disable sync for them:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dns.jpg" style="width: 594px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5861iD9717478CB0DF776/image-size/large?v=v2&amp;amp;px=999" role="button" title="dns.jpg" alt="dns.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 11:39:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Checkpoint-policy-drops-traffic-while-installing-the-policy/m-p/83608#M16924</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-04-29T11:39:44Z</dc:date>
    </item>
  </channel>
</rss>

