<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic High CPU after upgrade from 77.30 to 80.10 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14334#M2420</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;Yesterday i upgraded from a distributed 77.30 cluster + mgmt to r80.10 on two 5600 appliances and smart 210 mgmt.&amp;nbsp;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;Today we are encountering 100% cpu usage on 3 core of the gateway while the other core (4 cores in total in 5600), which is used for dynamic dispatcher is idle. Setup was running fine on 77.30. Processes fw_worker_0 1 2 are the culprits.&amp;nbsp;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;I am also noticing the error below in var log messages&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;BR style="color: #000000; font-size: 12px;" /&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; border: 0px; font-weight: inherit; font-size: 12px;"&gt;Nov 23 17:53:44 2017 GW1 kernel: [fw4_2]^[ERROR]: fw_up_limit_new_conn: fwpslglue_newconn() failed&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;Any ideas please?&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 23 Nov 2017 22:46:12 GMT</pubDate>
    <dc:creator>Kurt_Abela</dc:creator>
    <dc:date>2017-11-23T22:46:12Z</dc:date>
    <item>
      <title>High CPU after upgrade from 77.30 to 80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14334#M2420</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;Yesterday i upgraded from a distributed 77.30 cluster + mgmt to r80.10 on two 5600 appliances and smart 210 mgmt.&amp;nbsp;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;Today we are encountering 100% cpu usage on 3 core of the gateway while the other core (4 cores in total in 5600), which is used for dynamic dispatcher is idle. Setup was running fine on 77.30. Processes fw_worker_0 1 2 are the culprits.&amp;nbsp;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;I am also noticing the error below in var log messages&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;BR style="color: #000000; font-size: 12px;" /&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; border: 0px; font-weight: inherit; font-size: 12px;"&gt;Nov 23 17:53:44 2017 GW1 kernel: [fw4_2]^[ERROR]: fw_up_limit_new_conn: fwpslglue_newconn() failed&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;Any ideas please?&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Nov 2017 22:46:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14334#M2420</guid>
      <dc:creator>Kurt_Abela</dc:creator>
      <dc:date>2017-11-23T22:46:12Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU after upgrade from 77.30 to 80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14335#M2421</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you just seeing issues with the CPU spiking or are there other traffic issues as well?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Nov 2017 00:41:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14335#M2421</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-11-24T00:41:11Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU after upgrade from 77.30 to 80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14336#M2422</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you apply the latest GA HFA for R80.10?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After running top and hitting 1, what main type of CPU load are you observing on the 3 cores allocated as workers?&amp;nbsp; (us/sy/wa/hi)&amp;nbsp; Also please provide output of the following commands from the active cluster member:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enabled_blades&lt;/P&gt;&lt;P&gt;fwaccel stat&lt;/P&gt;&lt;P&gt;fwaccel stats -s&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; now available via &lt;A href="http://maxpowerfirewalls.com" target="_blank"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Nov 2017 00:44:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14336#M2422</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2017-11-24T00:44:27Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU after upgrade from 77.30 to 80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14337#M2423</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;CPU is constant 100% on all 3 cores. this morning it is at 60% as users are still not at the office.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes fw_workers are consuming most CPU on all 3 cores.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@GW1:0]# enabled_blades&lt;BR /&gt;fw vpn urlf av aspm appi identityServer SSL_INSPECT anti_bot ThreatEmulation mon vpn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@GW1:0]# fwaccel stat&lt;BR /&gt;Accelerator Status : on&lt;BR /&gt;Accept Templates : disabled by Firewall&lt;BR /&gt;Layer ---Drop Templates : enabled&lt;BR /&gt;NAT Templates : disabled by user&lt;BR /&gt;NMR Templates : enabled&lt;BR /&gt;NMT Templates : enabled&lt;/P&gt;&lt;P&gt;Accelerator Features : Accounting, NAT, Cryptography, Routing,&lt;BR /&gt; HasClock, Templates, Synchronous, IdleDetection,&lt;BR /&gt; Sequencing, TcpStateDetect, AutoExpire,&lt;BR /&gt; DelayedNotif, TcpStateDetectV2, CPLS, McastRouting,&lt;BR /&gt; WireMode, DropTemplates, NatTemplates,&lt;BR /&gt; Streaming, MultiFW, AntiSpoofing, Nac,&lt;BR /&gt; ViolationStats, AsychronicNotif, ERDOS,&lt;BR /&gt; McastRoutingV2, NMR, NMT, NAT64, GTPAcceleration,&lt;BR /&gt; SCTPAcceleration&lt;BR /&gt;Cryptography Features : Tunnel, UDPEncapsulation, MD5, SHA1, NULL,&lt;BR /&gt; 3DES, DES, CAST, CAST-40, AES-128, AES-256,&lt;BR /&gt; ESP, LinkSelection, DynamicVPN, NatTraversal,&lt;BR /&gt; EncRouting, AES-XCBC, SHA256&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@GW1:0]# fwaccel stats -s&lt;BR /&gt;Accelerated conns/Total conns : 91/6590 (1%)&lt;BR /&gt;Accelerated pkts/Total pkts : 76830/359923 (21%)&lt;BR /&gt;F2Fed pkts/Total pkts : 106640/359923 (29%)&lt;BR /&gt;PXL pkts/Total pkts : 176453/359923 (49%)&lt;BR /&gt;QXL pkts/Total pkts : 0/359923 (0%)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Nov 2017 05:30:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14337#M2423</guid>
      <dc:creator>Kurt_Abela</dc:creator>
      <dc:date>2017-11-24T05:30:20Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU after upgrade from 77.30 to 80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14338#M2424</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, a few things:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;0) I'll ask again, have you applied the latest R80.10 GA jumbo HFA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) With that many blades enabled on a 5600 w/ 8 GB of RAM, wondering if you are running short of memory.&amp;nbsp; Please provide output of commands &lt;STRONG&gt;free -m &lt;/STRONG&gt;and &lt;STRONG&gt;uname -a&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) I'm trying to make sense of that error message you are seeing in the syslog, on the firewall cluster object do you have "Automatically" set under "Optimizations"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Looks like you have Optimized Drops enabled which is not real common, try turning it off and see if the situation improves.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) Suspecting a possibly unhealthy sync network as well, please provide output of &lt;STRONG&gt;fw ctl pstat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) Final thing to try: power off the standby member and see what happens to CPU load on the remaining member.&amp;nbsp; If it drops back to normal, that is highly indicative of some kind of ClusterXL issue (including possibly #4 above).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; now available via &lt;A href="http://maxpowerfirewalls.com" target="_blank"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Nov 2017 13:35:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14338#M2424</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2017-11-24T13:35:03Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU after upgrade from 77.30 to 80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14339#M2425</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many thanks for your assistance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue was "resolved" after disabling most of the rules in application control. We are now creating a new more optimized rulebase to mitigate the issue. Having said that, there were no particular issues or problems with the rulebase itself but we are not yet using in-line layers as we simply migrated form R77.30 to r80.10 at this stage.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;0) yes take 42&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) RAM was fine at the time but i currently&amp;nbsp;&lt;SPAN&gt;do not have any output of this during the time of the issue.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) it was set to automatic. Peak connections was less than 20k and most of the time it was around 6-7K&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) This was turned on as per TAC support to optimise drops and maybe improve CPU usage. It did not make any difference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) do not have any output of this during the time of the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) we did this during the issue and did not make a difference.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Nov 2017 07:59:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14339#M2425</guid>
      <dc:creator>Kurt_Abela</dc:creator>
      <dc:date>2017-11-27T07:59:35Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU after upgrade from 77.30 to 80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14340#M2426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;gt; The issue was "resolved" after disabling most of the rules in application control.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right this is really common, accidentally using "Any" in an APCL/URLF policy, or using the dynamic object "Internet" when your firewall's topology is not completely and correctly defined causes large amounts of LAN-speed traffic to get sucked into the Medium Path.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Nov 2017 13:11:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14340#M2426</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2017-11-27T13:11:38Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU after upgrade from 77.30 to 80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14341#M2427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How would we define our topology and not use an any or internet for the app/url policy. We need this type of functionality to define which zones we want to apply the policy to and also use these for logging traffic. We are experiencing high cpu at the moment with all fw_worker being the top cpu.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Apr 2018 17:54:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14341#M2427</guid>
      <dc:creator>Alastair_Haddix</dc:creator>
      <dc:date>2018-04-11T17:54:42Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU after upgrade from 77.30 to 80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14342#M2428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Assuming you are in an APCL/URLF policy layer, from an optimization perspective using object "Internet" is just fine (assuming that it is properly defined in your firewall's topology settings).&amp;nbsp; "Any" is what you want to avoid to keep traffic from needlessly getting pulled into the Medium Path (PXL).&amp;nbsp; Perhaps an example will help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's assume that you are using an ordered APCL/URLF policy layer for just those features. I'll use an ordered layer here since most Check Point admins have a fairly easy time understanding how ordered layers work, because R77.30 and earlier gateways operated this way.&amp;nbsp; In addition, right after a R77.30 to R80+ SMS upgrade ordered layers will be the default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An optimized APCL/URLF policy to maximize high-speed LAN traffic that can be accelerated is generally constructed as follows, if you have an R80.10 gateway Security Zones will make this much easier.&amp;nbsp; Let's assume a firewall with four interfaces and each has a single Security Zone associated with it: Inside1, Inside2, DMZ, Outside.&amp;nbsp; Let's also assume we are doing a blacklist approach for applications, so the Implicit Cleanup Action for this layer is Accept:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Name: Access Exceptions for certain users/groups&lt;/P&gt;&lt;P&gt;Source: Access Role(s) specifying users/groups, set Networks on ALL access roles here to a list of all internal subnets.&amp;nbsp; Do not include DMZs, unfortunately Security Zones can not be specified on the Network tab of an Access Role.&lt;/P&gt;&lt;P&gt;Destination: Outside zone&lt;/P&gt;&lt;P&gt;Applications: Facebook, etc&lt;/P&gt;&lt;P&gt;Action: Accept&lt;/P&gt;&lt;P&gt;Track: Detailed Log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Name: Block Bad Stuff for all users&lt;/P&gt;&lt;P&gt;Source: Inside1, Inside2 zones&lt;/P&gt;&lt;P&gt;Destination: Outside zone&lt;/P&gt;&lt;P&gt;Application: Group of prohibited applications&lt;/P&gt;&lt;P&gt;Action: Drop&lt;/P&gt;&lt;P&gt;Track: Log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Name: Separately log unknown applications (optional)&lt;/P&gt;&lt;P&gt;Source: Inside1, Inside2 zones&lt;/P&gt;&lt;P&gt;Destination: Outside zone&lt;/P&gt;&lt;P&gt;Application: Unknown Traffic&lt;/P&gt;&lt;P&gt;Action: Accept&lt;/P&gt;&lt;P&gt;Track: Detailed Log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Name: Log all else for reporting purposes (optional)&lt;/P&gt;&lt;P&gt;Source: Inside1, Inside2 zones&lt;/P&gt;&lt;P&gt;Destination: Outside zone&lt;/P&gt;&lt;P&gt;Application: Any ("Any Recognized" in R77.30)&lt;/P&gt;&lt;P&gt;Action: Accept&lt;/P&gt;&lt;P&gt;Track: Detailed Log&lt;/P&gt;&lt;P&gt;(Missing cleanup rule - Unmatched traffic will be accepted and not logged)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that traffic flowing in the following directions through the firewall won't match any rule in this policy layer at all and will "fall off" the end of this policy layer and hit the Implicit Cleanup Action of Accept:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside1,Inside2 -&amp;gt; DMZ&lt;/P&gt;&lt;P&gt;DMZ -&amp;gt; Inside1,Inside2&lt;/P&gt;&lt;P&gt;Inside1 -&amp;gt; Inside2&lt;/P&gt;&lt;P&gt;Inside2 -&amp;gt; Inside1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the desired effect, the high-speed LAN traffic blazing between these zones &lt;EM&gt;will not be evaluated by APCL/URLF at all, and is eligible to be fully accelerated by SecureXL in the SXL path&lt;/EM&gt;.&amp;nbsp; This assumes of course that the policy associated with another blade such as IPS or Threat Prevention does not need to pull that same traffic up into PXL for inspection. Using the tricks shown in &lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2739"&gt;my CPX presentation here&lt;/A&gt;, IPS/TP can be switched off on the gateway "on the fly" to see if this is indeed the case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the TP policy using these same techniques (and so-called "null" TP profiles covered in my book, NOT a TP Exception) can ensure that high-speed LAN traffic does not get unnecessarily dragged into PXL, which is a classic cause of the high Firewall Worker CPU utilization you are seeing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Apr 2018 16:27:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14342#M2428</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-04-12T16:27:24Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU after upgrade from 77.30 to 80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14343#M2429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if instead you leave the implicit cleanup rule, you set an explicit rule Source internal Destination 'Any', this will cause LAN traffic to be inspected?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2018 06:50:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14343#M2429</guid>
      <dc:creator>Kurt_Abela</dc:creator>
      <dc:date>2018-08-30T06:50:44Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU after upgrade from 77.30 to 80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14344#M2430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes it will, and you don't typically want to do that.&amp;nbsp; Only traffic that "falls off" the end of the APCL/URLF layer and hits the implicit cleanup rule will not be inspected by APCL/URLF in PXL.&amp;nbsp; There is no way to define an explicit APCL/URLF rule that basically says "don't inspect this", it just has to fall off.&amp;nbsp; For an APCL/URLF layer, there is no equivalent of the "null" Threat Prevention profile trick to avoid PXL inspection as detailed in my book.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR style="color: #333333; background-color: #fafafa; font-size: 13px;" /&gt;&lt;SPAN style="color: #333333; background-color: #fafafa; font-size: 13px;"&gt;Second Edition of my "Max Power" Firewall Book&lt;/SPAN&gt;&lt;BR style="color: #333333; background-color: #fafafa; font-size: 13px;" /&gt;&lt;SPAN style="color: #333333; background-color: #fafafa; font-size: 13px;"&gt;Now Available at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="http://www.maxpowerfirewalls.com/" style="color: #417394; background-color: #fafafa; text-decoration: none; font-size: 13px;" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2018 13:55:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14344#M2430</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-08-30T13:55:59Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU after upgrade from 77.30 to 80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14345#M2431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for&amp;nbsp;the explanation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is a bit counter-intuitive considering that you get the bellow "warning" on management when you remove the explicit clean up rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70036_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.10/SmartConsole_OLH/EN/html_frameset.htm?topic=MB_aKI6UquDmK82Th-kIOw2" title="https://sc1.checkpoint.com/documents/R80.10/SmartConsole_OLH/EN/html_frameset.htm?topic=MB_aKI6UquDmK82Th-kIOw2"&gt;SmartConsole R80.10 Help&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; font-size: 14px; padding: 0pt;"&gt;Important&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;- Always add an explicit Cleanup Rule at the end of each Layer, and make sure that its Action is the same as the Action of the Implicit Cleanup Rule. If there is no explicit Cleanup Rule, one of these messages will show under the last rule of the Layer:&lt;/P&gt;&lt;P class="" style="color: #000000; background-color: inherit; text-decoration: none; margin: 6pt 0cm; padding: 0pt;"&gt;&lt;EM class="" style="color: inherit; background-color: inherit; padding: 0pt;"&gt;Missing cleanup rule – Unmatched traffic will be dropped and not logged&lt;/EM&gt;.&lt;BR /&gt;&lt;EM class="" style="color: inherit; background-color: inherit; padding: 0pt;"&gt;Missing cleanup rule – Unmatched traffic will be accepted and not logged&lt;/EM&gt;."&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2018 09:18:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14345#M2431</guid>
      <dc:creator>Kurt_Abela</dc:creator>
      <dc:date>2018-09-05T09:18:36Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU after upgrade from 77.30 to 80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14346#M2432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm pretty sure if you specify a track of Log (versus Detailed or Extended) and don't specify any applications in a rule, then you shouldn't take a Medium Path hit.&lt;/P&gt;&lt;P&gt;That assumes all rules that match are this way.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2018 13:28:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14346#M2432</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-09-05T13:28:03Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU after upgrade from 77.30 to 80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14347#M2433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't think that is the case in R80.10 and earlier unless some kind of subtle change has been slipped into the gateway code along the way; remember that in R77.30 an Application column set for Any would display "Any Recognized" which is a bit more accurate.&amp;nbsp; "Any Recognized" oddly enough also includes any unknown applications, since "Unknown Traffic" is actually its own application that is "recognized".&amp;nbsp; Even if the Application column is set to "Any" in R80.10, APCL still needs to identify the application and that can only happen in the Medium Path.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what happens at policy install time on the gateway: once the atomic load completes into the INSPECT driver, SecureXL is automatically restarted (this restart will no longer happen in R80.20 gateway).&amp;nbsp; At that time SecureXL must determine based on IP addresses and port numbers *only* what types of connections will require "deep inspection" by APCL/URLF (and Threat Prevention among other things) and must be sent PXL.&amp;nbsp; In the case of APCL/URLF it scans through the source, destination, and service columns of all APCL/URLF rules.&amp;nbsp; It essentially calculates ranges for these three columns that DO NOT match any APCL/URLF explicit rules whatsoever; connections falling into those non-matching ranges&amp;nbsp;will attempt to be handled completely by SecureXL in the SXL path.&amp;nbsp; Of course&amp;nbsp;there could still be a future violation for those non-matching connections (violation counters are viewed with &lt;STRONG&gt;fwaccel stats -p&lt;/STRONG&gt;) that forces inspection up into F2F anyway such as the packet being fragmented.&amp;nbsp; The SecureXL calculated ranges can actually be viewed with the &lt;STRONG&gt;sim ranges&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the case of Threat Prevention, SecureXL also scans the TP policy and calculates the ranges of source, destination &amp;amp; service values that DO NOT match any Threat Prevention rules.&amp;nbsp; However SecureXL will also look at the TP profile and which TP blades are actually being invoked in the TP profile specified in the Action column.&amp;nbsp; If there is a "null" TP profile that has all five threat prevention blades unchecked, the source/destination/service of that rule is automatically added to the non-matching ranges that will attempt to be fully accelerated by SecureXL in the SXL path.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is simply no way to do this "null profile" trick with an explicit APCL/URLF rule.&amp;nbsp; Essentially unless the traffic "falls off" the end of an APCL/URLF ordered layer (or an Application/Category object is not specified in any matching inline layers that are invoking APCL/URLF) it will go PXL.&amp;nbsp; It doesn't matter what the Action or Track setting is for a rule invoking APCL/URLF.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I figured all this out when researching my book but didn't include the above because I couldn't find a way to&amp;nbsp;clearly explain it; hopefully the above didn't get too muddled.&amp;nbsp; Everything in this post is my personal opinion based on my own experience and research, if anything is incorrect I'd love to hear from those inside Check Point with deep knowledge of the actual SecureXL code.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #fafafa; font-size: 13px;"&gt;--&lt;/SPAN&gt;&lt;BR style="color: #333333; background-color: #fafafa; font-size: 13px;" /&gt;&lt;SPAN style="color: #333333; background-color: #fafafa; font-size: 13px;"&gt;Second Edition of my "Max Power" Firewall Book&lt;/SPAN&gt;&lt;BR style="color: #333333; background-color: #fafafa; font-size: 13px;" /&gt;&lt;SPAN style="color: #333333; background-color: #fafafa; font-size: 13px;"&gt;Now Available at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="http://www.maxpowerfirewalls.com/" style="color: #417394; background-color: #fafafa; text-decoration: none; font-size: 13px;" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2018 15:07:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14347#M2433</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-09-05T15:07:38Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU after upgrade from 77.30 to 80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14348#M2434</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the thorough explanation, great stuff.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On a R77.30 cluster, w/ R80.10 management, an APP/URL rules like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70084_pastedImage_4.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would be the likely culprit of this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;[Expert@fw1:0]# fwaccel stats -s&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Accelerated conns/Total conns : 121/117288 (0%)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Accelerated pkts/Total pkts : 2305602/347562163 (0%)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;F2Fed pkts/Total pkts : 21349491/347562163 (6%)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG style="font-family: 'courier new', courier, monospace;"&gt;PXL pkts/Total pkts : 323907070/347562163 (93%)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;QXL pkts/Total pkts : 0/347562163 (0%)&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Sep 2018 17:56:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14348#M2434</guid>
      <dc:creator>Matt_Taber</dc:creator>
      <dc:date>2018-09-06T17:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU after upgrade from 77.30 to 80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14349#M2435</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think that recommendation about always adding an explicit cleanup rule is based more on clarity of policy than performance considerations.&amp;nbsp; That help verbiage may also be a holdover from R77.30 management, where there was no warning message stating what would happen with no explicit cleanup rule present; kudos to Check Point for including that warning in R80+ management to clarify exactly what will happen with no explicit cleanup rule in a policy layer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Sep 2018 12:45:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14349#M2435</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-09-07T12:45:26Z</dc:date>
    </item>
    <item>
      <title>Re: High CPU after upgrade from 77.30 to 80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14350#M2436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yep exactly.&amp;nbsp; A primary tuning goal is to make as much traffic as possible eligible for the SXL path and your rule completely defeats that goal.&amp;nbsp; If PXL cannot be avoided for most traffic due to the blades enabled on the firewall, a secondary goal is to save as much CPU overhead as possible in PXL by not having unnecessary blades inspecting the traffic via policy optimizations, using TP exceptions, or employing many other techniques described in my book.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Sep 2018 12:53:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/High-CPU-after-upgrade-from-77-30-to-80-10/m-p/14350#M2436</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-09-07T12:53:50Z</dc:date>
    </item>
  </channel>
</rss>

