<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Secure XL in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Secure-XL/m-p/3336#M199</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here an old datasheet that might be helpful:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Verdana; background-color: #f6f6f6;"&gt;&lt;A href="https://www.checkpoint.com/downloads/campaigns/whitepapers/performance-innovations-with-software-blade-architecture-wp.pdf"&gt;https://www.checkpoint.com/downloads/campaigns/whitepapers/performance-innovations-with-software-blade-architecture-wp.pdf&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, from the admin guide:&lt;/P&gt;&lt;H2 class="heading2" style="margin: 0.5em 0px; padding: 0px 0px 1px; text-align: left; color: #7192e5; text-indent: 0px; font-family: Arial, verdana, arial, helvetica, sans-serif; font-size: 20px; font-style: normal; font-weight: bold;"&gt;Using SecureXL&lt;/H2&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class="tpbodytext" style="margin: 6pt 0px; text-align: left; color: #000000; text-indent: 0px; font-family: Verdana, verdana, arial, helvetica, sans-serif; font-size: 12px; font-style: normal; font-weight: normal;"&gt;SecureXL is an acceleration solution that maximizes performance of the Firewall and does not compromise security. When SecureXL is enabled on a Security Gateway, some CPU intensive operations are processed by virtualized software instead of the Firewall kernel. The Firewall can inspect and process connections more efficiently and accelerate throughput and connection rates. These are the SecureXL traffic flows:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG class="menuoptions" style="color: inherit; background-color: inherit;"&gt;Slow path&lt;/STRONG&gt;&lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;- Packets and connections that are inspected by the Firewall and are not processed by SecureXL.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG class="menuoptions" style="color: inherit; background-color: inherit;"&gt;Accelerated path&lt;/STRONG&gt;&lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;- Packets and connections that are offloaded to SecureXL and are not processed by the Firewall.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG class="menuoptions" style="color: inherit; background-color: inherit;"&gt;Medium path&lt;/STRONG&gt;&lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;- Packets that require deeper inspection cannot use the accelerated path. It is not necessary for the Firewall to inspect these packets, they can be offloaded and do not use the slow path. For example, packets that are inspected by IPS cannot use the accelerated path and can be offloaded to the IPS PSL (Passive Streaming Library). SecureXL processes these packets more quickly than packets on the slow path.&lt;/LI&gt;&lt;/UL&gt;&lt;P class="tpbodytext" style="margin: 6pt 0px; text-align: left; color: #000000; text-indent: 0px; font-family: Verdana, verdana, arial, helvetica, sans-serif; font-size: 12px; font-style: normal; font-weight: normal;"&gt;The goal of a SecureXL configuration is to minimize the connections that are processed on the slow path.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 22 May 2017 03:01:47 GMT</pubDate>
    <dc:creator>Brian_Deutmeyer</dc:creator>
    <dc:date>2017-05-22T03:01:47Z</dc:date>
    <item>
      <title>Secure XL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Secure-XL/m-p/3335#M198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Secure XL considers Partial connection as an accelerated path, but by definition partial connection means "connection that exists in the Firewall Connections Table, but not in the SecureXL Connections Table"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my confusion is what connection is considered as a partial connection ?&lt;/P&gt;&lt;P&gt;How does the SecureXL know that a particular connection is a partial connection ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 May 2017 15:31:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Secure-XL/m-p/3335#M198</guid>
      <dc:creator>Atul_Sharma</dc:creator>
      <dc:date>2017-05-15T15:31:27Z</dc:date>
    </item>
    <item>
      <title>Re: Secure XL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Secure-XL/m-p/3336#M199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here an old datasheet that might be helpful:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Verdana; background-color: #f6f6f6;"&gt;&lt;A href="https://www.checkpoint.com/downloads/campaigns/whitepapers/performance-innovations-with-software-blade-architecture-wp.pdf"&gt;https://www.checkpoint.com/downloads/campaigns/whitepapers/performance-innovations-with-software-blade-architecture-wp.pdf&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, from the admin guide:&lt;/P&gt;&lt;H2 class="heading2" style="margin: 0.5em 0px; padding: 0px 0px 1px; text-align: left; color: #7192e5; text-indent: 0px; font-family: Arial, verdana, arial, helvetica, sans-serif; font-size: 20px; font-style: normal; font-weight: bold;"&gt;Using SecureXL&lt;/H2&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class="tpbodytext" style="margin: 6pt 0px; text-align: left; color: #000000; text-indent: 0px; font-family: Verdana, verdana, arial, helvetica, sans-serif; font-size: 12px; font-style: normal; font-weight: normal;"&gt;SecureXL is an acceleration solution that maximizes performance of the Firewall and does not compromise security. When SecureXL is enabled on a Security Gateway, some CPU intensive operations are processed by virtualized software instead of the Firewall kernel. The Firewall can inspect and process connections more efficiently and accelerate throughput and connection rates. These are the SecureXL traffic flows:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG class="menuoptions" style="color: inherit; background-color: inherit;"&gt;Slow path&lt;/STRONG&gt;&lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;- Packets and connections that are inspected by the Firewall and are not processed by SecureXL.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG class="menuoptions" style="color: inherit; background-color: inherit;"&gt;Accelerated path&lt;/STRONG&gt;&lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;- Packets and connections that are offloaded to SecureXL and are not processed by the Firewall.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG class="menuoptions" style="color: inherit; background-color: inherit;"&gt;Medium path&lt;/STRONG&gt;&lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;- Packets that require deeper inspection cannot use the accelerated path. It is not necessary for the Firewall to inspect these packets, they can be offloaded and do not use the slow path. For example, packets that are inspected by IPS cannot use the accelerated path and can be offloaded to the IPS PSL (Passive Streaming Library). SecureXL processes these packets more quickly than packets on the slow path.&lt;/LI&gt;&lt;/UL&gt;&lt;P class="tpbodytext" style="margin: 6pt 0px; text-align: left; color: #000000; text-indent: 0px; font-family: Verdana, verdana, arial, helvetica, sans-serif; font-size: 12px; font-style: normal; font-weight: normal;"&gt;The goal of a SecureXL configuration is to minimize the connections that are processed on the slow path.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 May 2017 03:01:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Secure-XL/m-p/3336#M199</guid>
      <dc:creator>Brian_Deutmeyer</dc:creator>
      <dc:date>2017-05-22T03:01:47Z</dc:date>
    </item>
    <item>
      <title>Re: Secure XL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Secure-XL/m-p/3337#M200</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Partial connections are used when specific features such as NAT templates and drop templates are used. The idea is to make sure the Performance Pack knows that a connection exists and will not drop an S2C packet of an existing connection on a drop template or re-use a NAT port when opening a new connection if the port is already in use. When SecureXL is being turned on (e.g. after running `fwaccel off` and `fwaccel on`), SecureXL will iterate over the connections tables and will offload partials connections if needed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 May 2017 10:31:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Secure-XL/m-p/3337#M200</guid>
      <dc:creator>Gal_Katz</dc:creator>
      <dc:date>2017-05-22T10:31:28Z</dc:date>
    </item>
    <item>
      <title>Re: Secure XL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Secure-XL/m-p/3338#M201</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Brian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the response.&lt;BR /&gt;I'm still confused about the below query.&lt;/P&gt;&lt;P&gt;when we see the secureXL connection table, we see tags such as p/P which means partial/not partial.&lt;BR /&gt;how secureXL knows that a particular connection is partial or not.&lt;/P&gt;&lt;P&gt;if we go according to the definition&amp;nbsp; "connection that exists in the Firewall Connections Table, but not in the SecureXL Connections Table"&lt;/P&gt;&lt;P&gt;in my opinion, the secureXl queries the firewall maybe ??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 May 2017 09:19:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Secure-XL/m-p/3338#M201</guid>
      <dc:creator>Atul_Sharma</dc:creator>
      <dc:date>2017-05-23T09:19:18Z</dc:date>
    </item>
    <item>
      <title>Re: Secure XL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Secure-XL/m-p/3339#M202</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Isn't Anticipated connections prevent dropping of connections due to drop templates ?&lt;/P&gt;&lt;P&gt;when we see the secureXL connection table, we see tags such as p/P which means partial/not partial.&lt;BR /&gt;how secureXL knows that a particular connection is partial or not.&lt;/P&gt;&lt;P&gt;if we go according to the definition&amp;nbsp; "connection that exists in the Firewall Connections Table, but not in the SecureXL Connections Table"&lt;/P&gt;&lt;P&gt;in my opinion, the secureXl queries the firewall maybe ??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 May 2017 09:20:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Secure-XL/m-p/3339#M202</guid>
      <dc:creator>Atul_Sharma</dc:creator>
      <dc:date>2017-05-23T09:20:17Z</dc:date>
    </item>
    <item>
      <title>Re: Secure XL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Secure-XL/m-p/178028#M29650</link>
      <description>&lt;P&gt;Hi Atul_Sharma.&lt;/P&gt;&lt;P&gt;I found information about your question here:&lt;/P&gt;&lt;P&gt;&lt;A href="http://dkcheckpoint.blogspot.com/2019/01/r80x-security-gateway-architecture.html" target="_blank"&gt;http://dkcheckpoint.blogspot.com/2019/01/r80x-security-gateway-architecture.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I understood that a partial connection is when a TCP handshake has been established, and a&amp;nbsp;non-partial connection is when this one is about to do a TCP handshake. In other words, a partial connection carries data information, and a non-partial connection carries packets such as SYN, ACK, SYN-ACK, RST, FIN, and FIN-ACK.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards!&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2023 16:22:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Secure-XL/m-p/178028#M29650</guid>
      <dc:creator>VictorRuiz</dc:creator>
      <dc:date>2023-04-13T16:22:52Z</dc:date>
    </item>
  </channel>
</rss>

