<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SecureXL Connections Table in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-Connections-Table/m-p/16890#M2819</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;They are different tables, implemented in two different kernel drivers.&amp;nbsp; The following applies to R80.10 and earlier gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SecureXL uses one instance of the simmod (SecureXL Implementation Module) driver, and connections are tracked through the cphwd_db table maintained in SecureXL.&amp;nbsp; There are several other individual tables SecureXL maintains as part of its overall state table, which are documented in section 7 here: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98722&amp;amp;partition=Advanced&amp;amp;product=SecureXL%22" style="max-width: 840px;"&gt;sk98722: ATRG: SecureXL&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall Workers have one instance of the fw_X kernel driver (sometimes called INSPECT driver/engine) per defined worker/kernel instance, and tracks connections through the shared "connections" table which is only one component of the overall state table.&amp;nbsp; Best description of the contents of the connections table is here: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk65133&amp;amp;partition=Advanced&amp;amp;product=Security" style="max-width: 840px;"&gt;sk65133: Connections &lt;STRONG&gt;Table&lt;/STRONG&gt; Format&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Initially all new connections arrive at the SecureXL driver inbound, then go through the Firewall Path (F2F) for an initial Firewall policy lookup, and if they are accepted an entry is added to the "connections" state table.&amp;nbsp; When the packet leaves the INSPECT driver on the outbound side, the accepted packet passes through SecureXL and a connection entry is created in the cphwd_db table for future tracking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The maximum size of the SecureXL cpwd_db table matches the maximum set for the connections table (FW Object...Optimizations...Capacity Optimization...Calculate the maximum limit for concurrent connections), but note that each individual connection is tracked as at least two separate flows of packets (c2s/outbound, s2c/inbound) and if the connection is NATted there are four separate flows being tracked (c2s/outbound pre-NAT, c2s/outbound post-NAT, s2c/inbound pre-NAT, s2c/inbound post-NAT).&amp;nbsp; This is why the reported number of connections (actually "flows") by&lt;STRONG&gt; fwaccel conns&lt;/STRONG&gt; (SecureXL) or &lt;STRONG&gt;fw tab -t connections&lt;/STRONG&gt; (INSPECT) may appear to be much higher than the number of "connections".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 17 Dec 2018 13:30:45 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2018-12-17T13:30:45Z</dc:date>
    <item>
      <title>SecureXL Connections Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-Connections-Table/m-p/16889#M2818</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is the relationship, if any, between the Connections table and the SecureXL connections table? Are these different kernel tables?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I notice if I run fw ctl pstat I get&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Concurrent Connections: 35% (17793 out of 49900) - below watermark&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and If I run fwaccel conns -s I get&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;There are 48695 connections in SecureXL connections table&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know the connections table max is set in the optimizations in Smartconsole but what is the max size of the SecureXL connections table&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;Roy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Dec 2018 12:41:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-Connections-Table/m-p/16889#M2818</guid>
      <dc:creator>Roy_Smith</dc:creator>
      <dc:date>2018-12-17T12:41:53Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL Connections Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-Connections-Table/m-p/16890#M2819</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;They are different tables, implemented in two different kernel drivers.&amp;nbsp; The following applies to R80.10 and earlier gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SecureXL uses one instance of the simmod (SecureXL Implementation Module) driver, and connections are tracked through the cphwd_db table maintained in SecureXL.&amp;nbsp; There are several other individual tables SecureXL maintains as part of its overall state table, which are documented in section 7 here: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98722&amp;amp;partition=Advanced&amp;amp;product=SecureXL%22" style="max-width: 840px;"&gt;sk98722: ATRG: SecureXL&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall Workers have one instance of the fw_X kernel driver (sometimes called INSPECT driver/engine) per defined worker/kernel instance, and tracks connections through the shared "connections" table which is only one component of the overall state table.&amp;nbsp; Best description of the contents of the connections table is here: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk65133&amp;amp;partition=Advanced&amp;amp;product=Security" style="max-width: 840px;"&gt;sk65133: Connections &lt;STRONG&gt;Table&lt;/STRONG&gt; Format&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Initially all new connections arrive at the SecureXL driver inbound, then go through the Firewall Path (F2F) for an initial Firewall policy lookup, and if they are accepted an entry is added to the "connections" state table.&amp;nbsp; When the packet leaves the INSPECT driver on the outbound side, the accepted packet passes through SecureXL and a connection entry is created in the cphwd_db table for future tracking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The maximum size of the SecureXL cpwd_db table matches the maximum set for the connections table (FW Object...Optimizations...Capacity Optimization...Calculate the maximum limit for concurrent connections), but note that each individual connection is tracked as at least two separate flows of packets (c2s/outbound, s2c/inbound) and if the connection is NATted there are four separate flows being tracked (c2s/outbound pre-NAT, c2s/outbound post-NAT, s2c/inbound pre-NAT, s2c/inbound post-NAT).&amp;nbsp; This is why the reported number of connections (actually "flows") by&lt;STRONG&gt; fwaccel conns&lt;/STRONG&gt; (SecureXL) or &lt;STRONG&gt;fw tab -t connections&lt;/STRONG&gt; (INSPECT) may appear to be much higher than the number of "connections".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Dec 2018 13:30:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-Connections-Table/m-p/16890#M2819</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-12-17T13:30:45Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL Connections Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-Connections-Table/m-p/16891#M2820</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Timothy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Really helpful reply and thanks for the links.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, when setting the maximum for the connections table, I need to consider the number of connections being seen by fwaccel conns, which could be up to 4 times the number of connections set via Smartconsole. Would that be correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Dec 2018 17:06:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-Connections-Table/m-p/16891#M2820</guid>
      <dc:creator>Roy_Smith</dc:creator>
      <dc:date>2018-12-17T17:06:16Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL Connections Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-Connections-Table/m-p/16892#M2821</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, you don't need to account for connections vs. flows when setting maximum number of connections in the SmartConsole.&amp;nbsp; The fact that there are many flows being tracked as the same "connection" is already included in the resulting kernel memory allocations derived from the max connections number.&amp;nbsp; I was just explaining why you might see far more connections (flows) than you might otherwise expect when running the various commands.&amp;nbsp; All the flows of a connections are symbolically linked&amp;nbsp;with SLINKs to each other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unless you are using SecurePlatform or IPSO, you should just set maximum connections to "Automatically" anyway and the only limiting factor to the number of concurrent connections at the point will be available kernel memory.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;--&lt;/SPAN&gt;&lt;BR style="color: #333333; background-color: #ffffff;" /&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Second Edition of my "Max Power" Firewall Book&lt;/SPAN&gt;&lt;BR style="color: #333333; background-color: #ffffff;" /&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Now Available at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="http://www.maxpowerfirewalls.com/" rel="nofollow" style="color: #6d6e71; background-color: #ffffff; border: 0px; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Dec 2018 19:50:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-Connections-Table/m-p/16892#M2821</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-12-17T19:50:43Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL Connections Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-Connections-Table/m-p/16893#M2822</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Everything I read says to leave connections to "Automatically" but I am using a VSX cluster. You can set the connections to automatic on the VSX object but not on the VS level. From hard experience, the default setting of 15000 is not enough. I have increased it which has improved things but I am still looking at various things to improve performance further.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Dec 2018 08:21:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-Connections-Table/m-p/16893#M2822</guid>
      <dc:creator>Roy_Smith</dc:creator>
      <dc:date>2018-12-18T08:21:36Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL Connections Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-Connections-Table/m-p/16894#M2823</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My book and TechTalk presentation (&lt;A href="https://community.checkpoint.com/thread/9630"&gt;TechTalk: Security Gateway Performance Optimization with Tim Hall&lt;/A&gt; ) do not specifically cover VSX but the general optimization principles still hold true.&amp;nbsp; &lt;A href="https://community.checkpoint.com/migrated-users/47831"&gt;Kaspars Zibarts&lt;/A&gt;‌ did put together this nice post specifically covering VSX though:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/thread/9707"&gt;Security Gateway Performance Optimization - VSX&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And or course Michael Endrizzi's aging but still relevant presentation here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://dreezman.wordpress.com/2015/01/24/corexl-training-youll-love-the-price/" title="https://dreezman.wordpress.com/2015/01/24/corexl-training-youll-love-the-price/"&gt;VSX &amp;amp; CoreXL Training- You’ll love the price | DreezSecurityBlog&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Dec 2018 13:17:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-Connections-Table/m-p/16894#M2823</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-12-18T13:17:01Z</dc:date>
    </item>
  </channel>
</rss>

