<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: High Performance Gateways and Tuning in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/99327#M19349</link>
    <description>&lt;P&gt;Is the information also correct for R80.40?&lt;/P&gt;</description>
    <pubDate>Fri, 16 Oct 2020 20:24:31 GMT</pubDate>
    <dc:creator>red_tomato</dc:creator>
    <dc:date>2020-10-16T20:24:31Z</dc:date>
    <item>
      <title>High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33076#M6906</link>
      <description>&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;High Performance Gateways and Tuning&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/41625" target="_blank" rel="noopener"&gt;Timothy Hall&lt;/A&gt;&amp;nbsp; gave a very interesting presentation &lt;A href="https://community.checkpoint.com/videos/7987" target="_blank" rel="noopener"&gt;Security Gateway Performance Optimization with Tim Hall Video&lt;/A&gt;&amp;nbsp;&amp;nbsp; in the last days. Thank you for the pressentation. Now we discuss all in the forum about the possibilities of the tuning.&amp;nbsp;I would like to hear your experiences on this topic in the Checkmates forum.&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71193_pastedImage_1.png" border="0" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;More Tuning Tips&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;More interesting articles about R80.x performance tuning and architecture can be found here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-x-Architecture-and-Performance-Tuning-Link-Collection/m-p/47883#M9336" target="_blank" rel="noopener" data-objecttype="102"&gt;- R80.x Architecture and Performance Tuning - Link Collection&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://cp.ankenbrand24.de" target="_blank" rel="noopener nofollow noopener noreferrer noopener noreferrer noopener noreferrer"&gt;- Article list (Heiko Ankenbrand)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2019 11:25:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33076#M6906</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-09-30T11:25:27Z</dc:date>
    </item>
    <item>
      <title>Re: High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33077#M6907</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV class=""&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had written the following in another article this morning &lt;A href="https://community.checkpoint.com/thread/9731"&gt;Show me yours&lt;/A&gt;. This gave me the idea to start this article.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do a lot of performance tuning for customers and copied a few passages from my training material.&lt;/P&gt;&lt;P style="min-height: 8pt; padding: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) This is a typical firewall with &lt;STRONG&gt;many blades on&lt;/STRONG&gt;! Here the &lt;STRONG&gt;PXL path&lt;/STRONG&gt; is used.&lt;/P&gt;&lt;P style="min-height: 8pt; padding: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Blades: fw vpn cvpn av ips identityServer anti_bot ThreatEmulation mon &lt;BR /&gt;Cores: 16 (4xSND, 10xFWK, 2xfwd[Logging,...])&lt;BR /&gt;MultiQueue: on (4 Interface)&lt;BR /&gt;Interface: 4 x 10 GBit &lt;BR /&gt;Connections: approximately 500K, peek 700K&lt;BR /&gt;CPU: 50% over all cores&lt;/P&gt;&lt;P style="min-height: 8pt; padding: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# fwaccelstats -s&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Accelerated pkts/Total pkts&amp;nbsp;&amp;nbsp; : 1052964458/159849848978 (0%)&lt;BR /&gt;F2Fed pkts/Total pkts&amp;nbsp;&amp;nbsp; : 2764823456/159849848978 (1%)&lt;BR /&gt;PXL pkts/Total pkts&amp;nbsp;&amp;nbsp; : &lt;STRONG&gt;156032061194/159849848978 (97%)&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; padding: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;2) This is a typical firewall with &lt;STRONG&gt;many blades off&lt;/STRONG&gt;! Here the &lt;STRONG&gt;acceleration path&lt;/STRONG&gt; is used.&lt;/P&gt;&lt;P style="min-height: 8pt; padding: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Blades: fw vpn &lt;BR /&gt;Cores: 16 (8xSND, 6xFWK, 2xfwd[Logging,...])&lt;BR /&gt;MultiQueue: on (4 Interface)&lt;BR /&gt;Interface: 4 x 10 GBit &lt;BR /&gt;Connections: approximately 500K, peek 700K&lt;BR /&gt;CPU: 30% over all cores&lt;/P&gt;&lt;P style="min-height: 8pt; padding: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Accelerated pkts/Total pkts&amp;nbsp;&amp;nbsp; : &lt;STRONG&gt;191956815617/194432772885 (98%)&lt;/STRONG&gt;&lt;BR /&gt;F2Fed pkts/Total pkts&amp;nbsp;&amp;nbsp; : 3767408762/194432772885 (2%)&lt;BR /&gt;PXL pkts/Total pkts&amp;nbsp;&amp;nbsp; : 0/194432772885 (0%)&lt;/P&gt;&lt;P style="min-height: 8pt; padding: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P style="min-height: 8pt; padding: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What else are tuning parameters for me?&lt;/P&gt;&lt;P&gt;- Interface cards 1G, 10G and 40GB &amp;gt; (MQ, Errors, interupt distribution, more or less SND's...)&lt;/P&gt;&lt;P&gt;- Blades + CoreXL &amp;gt; (more or less FW_Worker's, https inspection, deep inspection, PSL, CPAS, R77.30 VPN on FW_Worker_0 [R80.10 multicore VPN], CPU utilization,...)&lt;/P&gt;&lt;P&gt;- SecureXL &amp;gt; (NAT templates, Drop templates, Rule&amp;nbsp;optimization for access tamplates,...)&lt;/P&gt;&lt;P&gt;- Connection Tabel &amp;gt; (many connections in TCP start state&amp;nbsp; + timeout, UDP virtual session timeout&lt;/P&gt;&lt;P&gt;- ClusterXL &amp;gt; (sync or not sync from services,...)&lt;/P&gt;&lt;P&gt;- Logging &amp;gt; (optimize logging in the rules,more or less fwd cores for logging,...)&lt;/P&gt;&lt;P&gt;- IPS &amp;gt; (Signatures with high performance impact,...)&lt;/P&gt;&lt;P&gt;- VPN&amp;nbsp; &amp;gt; (3DES or AES with NI [high-speed hardware encryption],...)&lt;/P&gt;&lt;P&gt;- SecureXL &amp;gt; (SAM card or Falcon card (R80.20 and above) inside,...)&lt;/P&gt;&lt;P&gt;- and and and&lt;/P&gt;&lt;P style="min-height: 8pt; padding: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can found 100 points more that can be optimized.&lt;/P&gt;&lt;P style="min-height: 8pt; padding: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think performance tuning is a very individual process for each firewall. Here you should first talk about what you want to accomplish on the firewall. Like I said, I'd like to hear your opinion on tuning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/55229"&gt;Heiko&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2018 09:38:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33077#M6907</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-04T09:38:03Z</dc:date>
    </item>
    <item>
      <title>Re: High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33078#M6908</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Some additional articles from Check Point regarding tuning and performance:&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98348" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98348"&gt;Best Practices - Security Gateway Performance&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105119" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105119"&gt;Best Practices - VPN Performance&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106597" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106597"&gt;Best Practices - Rulebase Construction and Optimization&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&amp;amp;eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk102812" title="https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&amp;amp;eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk102812"&gt;Best Practices - Firewall Policy Management&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://downloads.checkpoint.com/dc/download.htm?ID=54765"&gt;Performance Tuning Administration Guide R80.10&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://downloads.checkpoint.com/dc/download.htm?ID=24808"&gt;Performance Tuning Administration Guide R77&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk88160" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk88160"&gt;The Check Point Performance Sizing Utility&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk120260" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk120260"&gt;MTA Debugging and Performance Troubleshooting Toolkit&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doShowtechnicalreferenceguides"&gt;Advanced Tech Reference Guides (ATRG) page&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2018 10:29:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33078#M6908</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2018-10-04T10:29:42Z</dc:date>
    </item>
    <item>
      <title>Re: High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33079#M6909</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interesting topic. I do have one firewall, VSX R77.30, one VS extra heavy used, but only Firewall and Monitoring blades are enabled. For my surprise, I have found, that much higher amount of traffic goes via PXL than I would expect.&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;PRE&gt;[Expert@FW01A:22]# fwaccel stats -s&lt;BR /&gt;Accelerated conns/Total conns : 186543/218772 (85%)&lt;BR /&gt;Accelerated pkts/Total pkts&amp;nbsp;&amp;nbsp; : 7051830336/12021550944 (58%)&lt;BR /&gt;F2Fed pkts/Total pkts&amp;nbsp;&amp;nbsp; : 620021870/12021550944 (5%)&lt;BR /&gt;&lt;STRONG&gt;PXL pkts/Total pkts&amp;nbsp;&amp;nbsp; : 4349698738/12021550944 (36%)&lt;/STRONG&gt;&lt;BR /&gt;QXL pkts/Total pkts&amp;nbsp;&amp;nbsp; : 0/12021550944 (0%)&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Rulebase is rather heavy, but nothing unusual in it (no time or dns objects), Accept templates are used until some special rules, which are on very bottom, very occasionally hit. What might cause so many traffic be handled by PXL path.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To add more confusing, on that very same physical box I can see in other VS, again only Firewall and Monitoring blades are enabled, similar rulebase size:&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;PRE&gt;[Expert@FW01A:7]# fwaccel stats -s&lt;BR /&gt;Accelerated conns/Total conns : 4410/4756 (92%)&lt;BR /&gt;&lt;STRONG&gt;Accelerated pkts/Total pkts&amp;nbsp;&amp;nbsp; : 6637748854/6782160048 (97%)&lt;/STRONG&gt;&lt;BR /&gt;F2Fed pkts/Total pkts&amp;nbsp;&amp;nbsp; : 139702180/6782160048 (2%)&lt;BR /&gt;PXL pkts/Total pkts&amp;nbsp;&amp;nbsp; : 4709014/6782160048 (0%)&lt;BR /&gt;QXL pkts/Total pkts&amp;nbsp;&amp;nbsp; : 0/6782160048 (0%)&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Now I really have to look into it, why there is such big difference on presumably the same virtual systems.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2018 11:03:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33079#M6909</guid>
      <dc:creator>Martin_Oles</dc:creator>
      <dc:date>2018-10-04T11:03:24Z</dc:date>
    </item>
    <item>
      <title>Re: High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33080#M6910</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;THX, I think most of those who are involved in tuning know them.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I find the experiences more interesting. There is always a lot of discussion about topics like medium path (PXL) and fast path (acceleration path). But from my point of view that's not all. I had already touched on a few other topics. And there's a few more. What do you check when you do performance tuning on a firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also look at the following things, for example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Interface cards 1G, 10G and 40GB &amp;gt; (MQ, Layer 2 errors, interupt distribution,ring buffer, more or less SND's, Broadcom vs. Intel drivers [e1000, igb, ixebe] and other&lt;SPAN style="font-size: 11.0pt;"&gt; i40e, mlx5_core&lt;/SPAN&gt;...)&lt;/P&gt;&lt;P&gt;- Blades + CoreXL &amp;gt; (more or less FW_Worker's, https inspection, deep inspection, PSL, CPAS, R77.30 VPN on FW_Worker_0 [R80.10 multicore VPN], CPU utilization,...)&lt;/P&gt;&lt;P&gt;- SecureXL &amp;gt; (NAT templates, Drop templates, Rule&amp;nbsp;optimization for access tamplates,...)&lt;/P&gt;&lt;P&gt;- Connection Tabel &amp;gt; (many connections in TCP start state&amp;nbsp; + timeout, UDP virtual session timeout&lt;/P&gt;&lt;P&gt;- ClusterXL &amp;gt; (sync or not sync from services,...)&lt;/P&gt;&lt;P&gt;- Logging &amp;gt; (optimize logging in the rules,more or less fwd cores for logging,...)&lt;/P&gt;&lt;P&gt;- IPS &amp;gt; (Signatures with high performance impact,...)&lt;/P&gt;&lt;P&gt;- VPN&amp;nbsp; &amp;gt; (3DES vs. AES with NI [high-speed hardware encryption],...)&lt;/P&gt;&lt;P&gt;- and many more&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/55229"&gt;Heiko&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2018 11:47:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33080#M6910</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-04T11:47:19Z</dc:date>
    </item>
    <item>
      <title>Re: High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33081#M6911</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;SPAN class=""&gt;&lt;A _jive_internal="true" data-userid="54843" data-username="marti15a849d4-7fb1-43c2-be02-7301046685ab" href="https://community.checkpoint.com/people/marti15a849d4-7fb1-43c2-be02-7301046685ab"&gt;Martin,&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;which blades are used it's only fw and monitoring?&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;# &lt;SPAN style="font-size: 11.0pt;"&gt;enabled_blades&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;If you find any conspicuous PXL connections with the following command:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;# fwaccel conns |grep S&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet flow. &lt;SPAN style="font-size: 11.0pt;"&gt;Is one of the following points possible?&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;IPS (some protections) &amp;lt;&amp;lt;&amp;lt;&lt;/LI&gt;&lt;LI&gt;VPN (in some configurations) &amp;lt;&amp;lt;&amp;lt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #999999;"&gt;Application Control&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #999999;"&gt;Content Awareness&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #999999;"&gt;Anti-Virus&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #999999;"&gt;Anti-Bot&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #000000;"&gt;HTTPS Inspection &amp;lt;&amp;lt;&amp;lt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #000000;"&gt;Proxy mode &amp;lt;&amp;lt;&amp;lt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;Mobile Access &amp;lt;&amp;lt;&amp;lt;&lt;/LI&gt;&lt;LI&gt;VoIP &amp;lt;&amp;lt;&amp;lt;&lt;/LI&gt;&lt;LI&gt;Web Portals &amp;lt;&amp;lt;&amp;lt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/55229"&gt;Heiko&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2018 12:37:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33081#M6911</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-04T12:37:58Z</dc:date>
    </item>
    <item>
      <title>Re: High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33082#M6912</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;- &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk31631"&gt;number of VLANs configured on each interface&lt;/A&gt; (we have limit of 250 VLAN per interface, 800 VLANs per box)&lt;/P&gt;&lt;P&gt;- number of configured DHCP relays, number of VLANs which has enabled DHCP helpers.&lt;/P&gt;&lt;P&gt;-number of free interfaces (2 in case of creating additional bond interface to offload some VLANs from overloaded interface)&lt;/P&gt;&lt;P&gt;- periodically check /var/log/messages and dmesg&lt;/P&gt;&lt;P&gt;- monitoring of CPU, memory, PSU, RAID, traffic based on SNMP&lt;/P&gt;&lt;P&gt;-&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106597" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106597"&gt;Best Practices - Rulebase Construction and Optimization&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- RX/TX drops&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Monitoring of top talkers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2018 12:39:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33082#M6912</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2018-10-04T12:39:44Z</dc:date>
    </item>
    <item>
      <title>Re: High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33083#M6913</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Heiko,&lt;/P&gt;&lt;P&gt;On on virtual systems only fw blade is enabled&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;PRE&gt;[Expert@FW01A:22]# enabled_blades&lt;BR /&gt;fw&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Due to rather high amount of connections I have tried to filter out connections with flag PXL enabled, to stay on safe side.&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;PRE&gt;[Expert@FW01A:22]# fw tab -t connections -s&lt;BR /&gt;HOST&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAME&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ID #VALS #PEAK #SLINKS&lt;BR /&gt;localhost&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; connections&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8158 124669 306821&amp;nbsp; 374170&lt;BR /&gt;[Expert@FW01A:22]# fwaccel conns -f S&lt;BR /&gt;Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SPort Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DPort PR Flags&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; C2S i/f S2C i/f Inst Identity&lt;BR /&gt;--------------- ----- --------------- ----- -- ----------- ------- ------- ---- -------&lt;BR /&gt;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX 49202&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX&amp;nbsp;&amp;nbsp; 445&amp;nbsp; 6 .......S... 36/16&amp;nbsp;&amp;nbsp; 16/36&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX 49785&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX&amp;nbsp;&amp;nbsp; 445&amp;nbsp; 6 .......S... 36/29&amp;nbsp;&amp;nbsp; 29/36&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX 12278&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX 49155&amp;nbsp; 6 F......S... 25/29&amp;nbsp;&amp;nbsp; 29/25&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX 59576&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX&amp;nbsp;&amp;nbsp; 445&amp;nbsp; 6 .......S... 36/39&amp;nbsp;&amp;nbsp; 39/36&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX 55185&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX&amp;nbsp;&amp;nbsp; 445&amp;nbsp; 6 .......S... 36/16&amp;nbsp;&amp;nbsp; 16/36&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX 54593&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX&amp;nbsp;&amp;nbsp; 445&amp;nbsp; 6 .......S... 36/16&amp;nbsp;&amp;nbsp; 16/36&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX&amp;nbsp;&amp;nbsp; 135&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX 52294&amp;nbsp; 6 F......S... 36/29&amp;nbsp;&amp;nbsp; 29/36&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX&amp;nbsp;&amp;nbsp; 445&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX 58537&amp;nbsp; 6 .......S... 36/10&amp;nbsp;&amp;nbsp; 10/36&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX&amp;nbsp;&amp;nbsp; 445&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX 60836&amp;nbsp; 6 .......S... 36/12&amp;nbsp;&amp;nbsp; 12/36&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX&amp;nbsp;&amp;nbsp; 445&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX 61173&amp;nbsp; 6 .......S... 36/16&amp;nbsp;&amp;nbsp; 16/36&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX 64636&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX&amp;nbsp;&amp;nbsp; 139&amp;nbsp; 6 .......S... 36/29&amp;nbsp;&amp;nbsp; 29/36&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX 49726&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX&amp;nbsp;&amp;nbsp; 445&amp;nbsp; 6 .......S... 36/16&amp;nbsp;&amp;nbsp; 16/36&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX 50610&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX&amp;nbsp;&amp;nbsp; 139&amp;nbsp; 6 .......S... 36/29&amp;nbsp;&amp;nbsp; 29/36&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX 50606&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XX.XX.XX.XX&amp;nbsp;&amp;nbsp; 445&amp;nbsp; 6 .......S... 36/12&amp;nbsp;&amp;nbsp; 12/36&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;...&lt;BR /&gt;Total number of connections: 28762&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Packet chain looks pretty straightforward for me:&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;PRE&gt;[Expert@FW01A:22]# fw ctl chain&lt;BR /&gt;in chain (11):&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0: -7f800000 (f5b04540) (ffffffff) IP Options Strip (in) (ipopt_strip)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1: - 1fffff8 (f5b05c30) (00000001) Stateless verifications (in) (asm)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2: - 1fffff7 (f5b484b0) (00000001) fw multik misc proto forwarding&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3: - 1000000 (f5bd8860) (00000003) SecureXL conn sync (secxl_sync)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 (f5aa4150) (00000001) fw VM inbound&amp;nbsp; (fw)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5:&amp;nbsp; 10000000 (f5be30b0) (00000003) SecureXL inbound (secxl)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6:&amp;nbsp; 7f600000 (f5af8920) (00000001) fw SCV inbound (scv)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7:&amp;nbsp; 7f730000 (f5d0b810) (00000001) passive streaming (in) (pass_str)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8:&amp;nbsp; 7f750000 (f5f1eda0) (00000001) TCP streaming (in) (cpas)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9:&amp;nbsp; 7f800000 (f5b04250) (ffffffff) IP Options Restore (in) (ipopt_res)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10:&amp;nbsp; 7fb00000 (f6309080) (00000001) HA Forwarding (ha_for)&lt;BR /&gt;out chain (8):&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0: -7f800000 (f5b04540) (ffffffff) IP Options Strip (out) (ipopt_strip)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1: - 1fffff0 (f5f1f030) (00000001) TCP streaming (out) (cpas)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2: - 1ffff50 (f5d0b810) (00000001) passive streaming (out) (pass_str)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3: - 1f00000 (f5b05c30) (00000001) Stateless verifications (out) (asm)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 (f5aa4150) (00000001) fw VM outbound (fw)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5:&amp;nbsp; 10000000 (f5be30b0) (00000003) SecureXL outbound (secxl)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6:&amp;nbsp; 7f700000 (f5f1f270) (00000001) TCP streaming post VM (cpas)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7:&amp;nbsp; 7f800000 (f5b04250) (ffffffff) IP Options Restore (out) (ipopt_res)&lt;BR /&gt;[Expert@FW01A:22]#&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking on traffic, which goes via PXL path only Microsoft AD related traffic is visible there, nothing else. Looking into rulebase (knowing now what I am looking for), one of the most hit rule is permitting workstations to AD servers. I did not found so far SK related to it, but it looks like DCE RPC traffic is accelerated by Accept template, but still handled via PXL path.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards,&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2018 13:54:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33083#M6913</guid>
      <dc:creator>Martin_Oles</dc:creator>
      <dc:date>2018-10-04T13:54:11Z</dc:date>
    </item>
    <item>
      <title>Re: High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33084#M6914</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't quite understand that either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sk32578 SecureXL Mechanism describes the following:&lt;/P&gt;&lt;H3&gt;&lt;/H3&gt;&lt;P&gt;When SecureXL is enabled, all packets should be accelerated, &lt;SPAN style="text-decoration: underline;"&gt;&lt;EM&gt;&lt;STRONG&gt;except&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt; packets that match the following conditions:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Packets that are:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;CIFS&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Hmmmm!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The service shows that the CIFS protocol is active here by default:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="71213" class="image-1 jive-image" height="252" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71213_pastedImage_1.png" width="635" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's just an idea! I don't know if I think right here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe duplicate the service and deactivate the protocol type.&amp;nbsp;Then build a test rule and see if it still goes into the PXL path or not.&lt;/P&gt;&lt;P&gt;I'd limit the rule to two test systems. This of course also has effects on the firewall behavior.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Heiko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2018 14:27:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33084#M6914</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-04T14:27:51Z</dc:date>
    </item>
    <item>
      <title>Re: High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33085#M6915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Or the better solution would be to move this particular rule to the last rule in rulebase (before clean-up of course).&lt;/P&gt;&lt;P&gt;What output of&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;fwaccel stat&lt;/STRONG&gt; says ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"microsoft-ds" service (tcp/445) &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk32578"&gt;will stop creating&amp;nbsp;Connection&amp;nbsp;Templates&lt;/A&gt;, because this condition is met:&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;UL&gt;&lt;LI&gt;Rule with a service that has a 'handler' (where a specific protocol is chosen in 'Protocol Type' field - instead of 'None' ; go to service object - right-click - click on "Edit..." - click on "Advanced..." button - refer to "Protocol Type:" field).&lt;/LI&gt;&lt;/UL&gt;&lt;/BLOCKQUOTE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2018 18:24:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33085#M6915</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2018-10-04T18:24:04Z</dc:date>
    </item>
    <item>
      <title>Re: High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33086#M6916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;A _jive_internal="true" data-userid="42431" data-username="l3p1de93ff35c-8346-483f-93fe-3ba21bfe3c94" href="https://community.checkpoint.com/people/l3p1de93ff35c-8346-483f-93fe-3ba21bfe3c94"&gt;Jozko Mrkvicka&lt;/A&gt;&lt;/SPAN&gt; I don't think that's the problem. The question is, why does "microsoft-ds" service (tcp/445)&amp;nbsp; use the PXL path (medium path) and not the acceleration path (fast path)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hence the idea to set the protocol type to "none".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to sk32578 CIFS should even use the F2F path.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I agree with &lt;SPAN class=""&gt;&lt;A _jive_internal="true" data-userid="54843" data-username="marti15a849d4-7fb1-43c2-be02-7301046685ab" href="https://community.checkpoint.com/people/marti15a849d4-7fb1-43c2-be02-7301046685ab"&gt;Martin Oles&lt;/A&gt;&lt;/SPAN&gt;, it's very strange.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hmmm!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2018 20:27:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33086#M6916</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-04T20:27:43Z</dc:date>
    </item>
    <item>
      <title>Re: High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33087#M6917</link>
      <description>&lt;P&gt;Heiko you are correct about port 445 (microsoft-ds) not being handled in the Accelerated Path as I have seen it before, where customers have only the most basic blades enabled but they have a high amount of CIFS/SMB traffic traversing the firewall, and that causes high PXL numbers.&amp;nbsp; I'm not exactly sure why this happens, but I suspect CIFS/SMB traffic requires some kind of streaming inspection that SecureXL can't perform. &amp;nbsp; There is actually a way to force this traffic through SecureXL (SXL path) by whitelisting it via the spii_dport_white_list directive, and you can see me referencing it in this thread:&lt;/P&gt;
&lt;P&gt;&lt;A class="link-titled" title="https://community.checkpoint.com/message/10308-re-enforce-securexl-template?commentID=10308#comment-10308" href="https://community.checkpoint.com/thread/6062-enforce-securexl-template?commentID=10308#comment" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/message/10308-re-enforce-securexl-template?commentID=10308#comment-10308&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Basically this is a way to tell SecureXL: "When you see this port number, just forward it yourself and don't inspect it any further".&amp;nbsp; It involves some SMS *.def file changes and can open up some gigantic security holes if used improperly, so please contact Check Point TAC if you need it.&lt;STRONG&gt; Edit: The ability to whitelist traffic is now available in SecureXL, see this: &lt;A class="cp_link sc_ellipsis" style="max-width: 840px;" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk139772&amp;amp;partition=Advanced&amp;amp;product=SecureXL%22" target="_blank" rel="noopener"&gt;sk139772: SecureXL Fast Accelerator (sim fastaccel) for Non Scalable Platforms&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Interestingly if you search for "spii_dport_white_list" in SecureKnowledge it matches on this SK:&lt;/P&gt;
&lt;P&gt;&lt;A style="max-width: 840px;" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106062&amp;amp;partition=Advanced&amp;amp;product=Anti-Bot," target="_blank" rel="noopener"&gt;sk106062: CPU load and traffic latency after activating Anti-Bot and/or Anti-Virus blade on Security Gateway&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;although "spii_dport_white_list" doesn't actually appear anywhere in the text of the SK, at least that I can see with my partner-level access.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp; The SK does say that this is "fixed" in R80.10 but I'm not sure if it applies in this context.&amp;nbsp; &lt;STRONG&gt;Edit: While in Israel this week I found out that when an SK matches a search term that does not actually seem to appear in the visible text of the SK itself, that there are extra hidden notes attached to the SK causing the match that are only visible to Check Point employees internally.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;--&lt;BR /&gt;Second Edition of my "Max Power" Firewall Book&lt;BR /&gt;Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank" rel="noopener"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2019 02:57:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33087#M6917</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-04-23T02:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33088#M6918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/42431"&gt;Jozko Mrkvicka&lt;/A&gt;‌, moving rules around the rulebase has absolutely no impact on which path (SXL, PXL, F2F) the traffic takes, it only affects the formation of SecureXL Accept templates.&amp;nbsp; The different paths of SecureXL/CoreXL are referred to as Throughput Acceleration, and the templating function of SecureXL is called "session rate acceleration" or "connection rate acceleration" or "rulebase lookup caching".&amp;nbsp; Both functions are most definitely part of SecureXL but get confused with each other all the time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2018 20:41:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33088#M6918</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-10-04T20:41:32Z</dc:date>
    </item>
    <item>
      <title>Re: High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33089#M6919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm agree with you &lt;SPAN class=""&gt;&lt;A _jive_internal="true" data-userid="41625" data-username="thalld401179d-0d5b-369d-a0f2-387c3ef54533" href="https://community.checkpoint.com/people/thalld401179d-0d5b-369d-a0f2-387c3ef54533"&gt;Timothy.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I noticed if you activate the "protocol type" in services that would lead to it, the PXL path or acceleration path is used. Depending on whether it is set to "none" or a protocol type. I've been able to simulate this in the lab.&amp;nbsp;These were all protocols like CIFS and others. I think these services are detected and processed via the psl (protocol detection) and so they use the pxl path.&amp;nbsp; I'm not sure about this either! According to sk32578 CIFS should even use the F2F path.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hmmmm!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2018 07:47:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33089#M6919</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-05T07:47:41Z</dc:date>
    </item>
    <item>
      <title>Re: High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33090#M6920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is a good article about IPS performance analysis from &lt;A href="https://community.checkpoint.com/migrated-users/46335"&gt;Omer Shliva&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3176"&gt;IPS Analyzer Tool - How to analyze IPS performance efficiently&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/55229"&gt;Heiko&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2018 10:05:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33090#M6920</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-05T10:05:18Z</dc:date>
    </item>
    <item>
      <title>Re: High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33091#M6921</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A while ago we had the same "problem" with file share protocol and PXL in firewall with only fw blade so we got a procedure from support how to remove PXL usage but they strongly advised not to do it so at the end we just accepted the fact that microsoft-ds will use PXL. I have to check with support of its ok to share the SK here&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Oct 2018 17:29:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33091#M6921</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-10-12T17:29:30Z</dc:date>
    </item>
    <item>
      <title>Re: High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33092#M6922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately procedure is classified "internal" so I cannot re-post it here but ask support for procedure to disable CIFS traffic inspection if you wish to do so. Just remember, seeing some percentage of PXL is not the worst case scenario as long as you can explain it and it's not consuming too much of your CPU time. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Oct 2018 18:01:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33092#M6922</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-10-13T18:01:17Z</dc:date>
    </item>
    <item>
      <title>Re: High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33093#M6923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;just only info for previous discussion. I have created new service TCP 445 without protocol type and used it in policy instead of default microsoft-ds (and protocol type CIFS). During policy installation I have seen massive sessions cut, such was expected as re-matching correctly identified different protocol. And now surprise, even when traffic is matching service without protocol type, where I would assume, that inspection does not take place, still I can see, that such traffic is not being accelerated and is still using PXL path.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new, courier, monospace;"&gt;[Expert@FW01A:22]# fwaccel stats -s&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: courier new, courier, monospace;"&gt;Accelerated conns/Total conns : 96391/113772 (84%)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new, courier, monospace;"&gt;Accelerated pkts/Total pkts&amp;nbsp;&amp;nbsp; : 76129847/126861392 (60%)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new, courier, monospace;"&gt;F2Fed pkts/Total pkts&amp;nbsp;&amp;nbsp; : 15605402/126861392 (12%)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new, courier, monospace;"&gt;PXL pkts/Total pkts&amp;nbsp;&amp;nbsp; : 35126143/126861392 (27%)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new, courier, monospace;"&gt;QXL pkts/Total pkts&amp;nbsp;&amp;nbsp; : 0/126861392 (0%)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new, courier, monospace;"&gt;[Expert@FW01A:22]#&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result from &lt;SPAN style="font-family: courier new, courier, monospace;"&gt;fwaccel conns -f S&lt;/SPAN&gt; is also showing, that CIFS connections are not accelerated and are handled by PXL.&lt;/P&gt;&lt;P&gt;Rather surprising. So, node's CPU is still participating heavily on global warming &lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/confused.png" /&gt; .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Dec 2018 14:38:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33093#M6923</guid>
      <dc:creator>Martin_Oles</dc:creator>
      <dc:date>2018-12-10T14:38:34Z</dc:date>
    </item>
    <item>
      <title>Re: High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33094#M6924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yap, that's what I tried to say earlier but i guess i was little short in my comments &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;tried and failed too&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Dec 2018 14:50:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33094#M6924</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-12-10T14:50:30Z</dc:date>
    </item>
    <item>
      <title>Re: High Performance Gateways and Tuning</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33095#M6925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yep, I guess!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2019 09:58:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/m-p/33095#M6925</guid>
      <dc:creator>Isabel_Brenner</dc:creator>
      <dc:date>2019-02-07T09:58:42Z</dc:date>
    </item>
  </channel>
</rss>

