<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SecureXL on R80.10 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26175#M5293</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Vincent you are referring to the rule base session rate acceleration (templating) portion of SecureXL, which was substantially improved in R80.10.&amp;nbsp; In this release the only rulebase conditions that stop templating are use of DCE/RPC services, certain rare complex services (i.e. http_mapped), and legacy authentication actions (i.e. User Auth, Client Auth).&amp;nbsp; However even if templating does get stopped by one of these conditions it does not impact the other portion of SecureXL which is throughput acceleration via the SXL and PXL paths.&amp;nbsp; In R80.10 the output of the &lt;STRONG&gt;fwaccel stat&lt;/STRONG&gt; command now actually states this explicitly since this was such a common source of confusion.&amp;nbsp; See screenshot below from my book:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="fwaccel stat disabled throughput" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62680_securexl_temp-disabled.jpg" style="width: 620px; height: 287px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 31 Jan 2018 00:20:45 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2018-01-31T00:20:45Z</dc:date>
    <item>
      <title>SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26164#M5282</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to ask you if it is recommended to have enabled secure XL R80.10, or what is the scenario in which it is beneficial to have activated this feature, which is enabled by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could this feature be responsible for random connection issues between services that are connected on firewall interfaces?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate your valuable comments&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Jan 2018 22:17:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26164#M5282</guid>
      <dc:creator>Viviana_Checa</dc:creator>
      <dc:date>2018-01-29T22:17:20Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26165#M5283</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe SecureXL is totally very much recommended on R80.10 (and previous versions). For commentaries and opinion from very experienced guys you can check these two comments from a recent thread:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;A _jive_internal="true" class="link-titled" href="https://community.checkpoint.com/thread/6690-what-does-sticky-decision-function-do?commentID=13343#comment-13343" title="https://community.checkpoint.com/message/13343-re-what-does-sticky-decision-function-do?commentID=13343#comment-13343"&gt;Dameon Welch Abernathy&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;&lt;A _jive_internal="true" class="link-titled" href="https://community.checkpoint.com/thread/6690-what-does-sticky-decision-function-do?commentID=13343#comment-13347" title="https://community.checkpoint.com/message/13343-re-what-does-sticky-decision-function-do?commentID=13343#comment-13347"&gt;Tim Hall&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SecureXL is a&amp;nbsp;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;is a software acceleration product. It is a Fast Path (this term should be used among many firewall vendors) for traffic. Basically, if the most of traffic going this path, firewall will process it much faster, without checking each time all firewall rules.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;When you have some additional blades enabled, traffic cannot always go via fast path.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;A part from &lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_NexGenSecurityGateway_Guide/161159.htm#o137396" title="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_NexGenSecurityGateway_Guide/161159.htm#o137396"&gt;Admin Guide&lt;/A&gt;:&lt;/SPAN&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P style="text-align: justify;"&gt;When SecureXL is enabled on a Security Gateway, some CPU intensive operations are processed by virtualized software instead of the Firewall kernel. The Firewall can inspect and process connections more efficiently and accelerate throughput and connection rates. These are the SecureXL traffic flows:&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;STRONG&gt;Slow path&lt;/STRONG&gt; - Packets and connections that are inspected by the Firewall and are not processed by SecureXL.&lt;BR /&gt;&lt;STRONG&gt;Accelerated path&lt;/STRONG&gt; - Packets and connections that are offloaded to SecureXL and are not processed by the Firewall.&lt;BR /&gt;&lt;STRONG&gt;Medium path&lt;/STRONG&gt; - Packets that require deeper inspection cannot use the accelerated path. It is not necessary for the Firewall to inspect these packets, they can be offloaded and do not use the slow path. For example, packets that are inspected by IPS cannot use the accelerated path and can be offloaded to the IPS PSL (Passive Streaming Library). SecureXL processes these packets more quickly than packets on the slow path.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;BR /&gt;The goal of a SecureXL configuration is to minimize the connections that are processed on the slow path.&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;For a very detailed and technical description go to&amp;nbsp;&lt;STRONG&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98722" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98722"&gt;ATRG: SecureXL&lt;/A&gt;.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Some info can be also found in&amp;nbsp;&lt;STRONG&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98348" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98348"&gt;Best Practices - Security Gateway Performance&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;and&amp;nbsp;&lt;STRONG&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk32578" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk32578"&gt;SecureXL Mechanism&lt;/A&gt;.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;As for the second part, whether it is connected to random connection issues, it is really difficult to say without knowing more details about the situation. In general, I would say that SecureXL usually doesn't create issues with connectivity but it could be a reason of some in tricky or very specific situations.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Jan 2018 22:48:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26165#M5283</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-01-29T22:48:56Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26166#M5284</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You'll most definitely want SecureXL enabled; random connection issues can be caused by a lot of things. First step would probably be to enable TCP state logging to find out exactly why and how the connection(s) died: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101221&amp;amp;partition=Advanced&amp;amp;product=Security" style="max-width: 840px;"&gt;sk101221: &lt;STRONG&gt;TCP&lt;/STRONG&gt; &lt;STRONG&gt;state&lt;/STRONG&gt; &lt;STRONG&gt;logging&lt;/STRONG&gt;&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the problem seems to happen to a certain system's connections much more often than others, you can exonerate SecureXL as the cause of the problem by excluding all traffic to and from that system's IP address from being accelerated as described here: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104468&amp;amp;partition=Advanced&amp;amp;product=SecureXL%22" style="max-width: 840px;"&gt;sk104468: How to &lt;STRONG&gt;disable&lt;/STRONG&gt; &lt;STRONG&gt;SecureXL&lt;/STRONG&gt; for specific IP addresses.&lt;/A&gt; &amp;nbsp; You may also see recommendations to just disable SecureXL completely with the &lt;STRONG&gt;fwaccel&lt;/STRONG&gt; &lt;STRONG&gt;off&lt;/STRONG&gt; command, but doing so can be risky on systems with more than 8 cores due to the potential performance impact.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Beyond that it will depend on the contents of the firewall logs and what blades you have enabled, output of the &lt;STRONG&gt;enabled_blades&lt;/STRONG&gt; command run on the firewall would be helpful in that regard.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Jan 2018 23:35:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26166#M5284</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-01-29T23:35:23Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26167#M5285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/41625"&gt;https://community.checkpoint.com/people/thalld401179d-0d5b-369d-a0f2-387c3ef54533&lt;/A&gt;‌ - I've been looking / dreaming about tcp state log for years.. Have no idea how I missed this! Thanks heaps!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2018 10:06:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26167#M5285</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-01-30T10:06:50Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26168#M5286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just noticed the SK has not been updated for R80+ Management; you can enable TCP state logging from the R80+ SmartConsole.&amp;nbsp; See this screenshot from my book:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="tcp state logging R80" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62679_tcpstate.jpg" style="height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2018 13:24:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26168#M5286</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-01-30T13:24:28Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26169#M5287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Tim do you think we need to tuning some configuration of Corexl or SecureXL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I used to take in consideration this SK .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Best Practices - Security Gateway Performance &lt;SPAN style="text-decoration: underline;"&gt;sk98348&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Check Point solutions for improving the performance of Security Gateway:&lt;/P&gt;&lt;UL style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;LI&gt;SecureXL - refer to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98722" style="color: #905690; text-decoration: none; font-size: 14px;" target="_blank"&gt;sk98722 - ATRG: SecureXL&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;CoreXL - refer to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98737" style="color: #905690; text-decoration: none; font-size: 14px;" target="_blank"&gt;sk98737 - ATRG: CoreXL&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;SMT (HyperThreading) - refer to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk93000" style="color: #905690; text-decoration: none; font-size: 14px;" target="_blank"&gt;sk93000 - SMT (HyperThreading) Feature Guide&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Multi-Queue - refer to Performance Tuning Administration Guide (&lt;A href="http://downloads.checkpoint.com/dc/download.htm?ID=22917" style="color: #905690; text-decoration: none; font-size: 14px;" target="_blank"&gt;R76&lt;/A&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://downloads.checkpoint.com/dc/download.htm?ID=24808" style="color: #905690; text-decoration: none; font-size: 14px;" target="_blank"&gt;R77&lt;/A&gt;) and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk80940" style="color: #905690; text-decoration: none; font-size: 14px;" target="_blank"&gt;sk80940&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;ClusterXL - refer to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk93306" style="color: #905690; text-decoration: none; font-size: 14px;" target="_blank"&gt;sk93306 - ATRG: ClusterXL R6x and R7x&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;VPN - refer to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105119" style="color: #905690; text-decoration: none; font-size: 14px;" target="_blank"&gt;sk105119 - Best Practices - VPN Performance&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104760" style="color: #905690; text-decoration: none; font-size: 14px;" target="_blank"&gt;sk104760 - ATRG: VPN Core&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2018 14:01:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26169#M5287</guid>
      <dc:creator>Pablo_Barriga</dc:creator>
      <dc:date>2018-01-30T14:01:59Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26170#M5288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Has TCP state logging any significant impact in performance with and without SecureXL?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2018 15:59:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26170#M5288</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2018-01-30T15:59:11Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26171#M5289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Tim for your help.. I will read the information listed on the post, and figure out what is the issue about&amp;nbsp; random connections losses!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2018 16:20:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26171#M5289</guid>
      <dc:creator>Viviana_Checa</dc:creator>
      <dc:date>2018-01-30T16:20:12Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26172#M5290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Aleksei for the information !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2018 16:20:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26172#M5290</guid>
      <dc:creator>Viviana_Checa</dc:creator>
      <dc:date>2018-01-30T16:20:45Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26173#M5291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;TCP state logging does cause some extra logging overhead on the firewall, but I haven't seen it have a noticeable impact unless the new connections rate is very high.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2018 17:19:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26173#M5291</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-01-30T17:19:27Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26174#M5292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I remember a time where in many support tickets the first suggestion from cp was to disable SecureXL &lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/grin.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think very interesting are the conditions that lead SecureXL to stop accelerating beginning at a rule with that conditions (sk32578).&lt;/P&gt;&lt;P&gt;Analyzing rulebases and modifying them according to this sk is very annoying &lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/wink.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2018 21:53:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26174#M5292</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2018-01-30T21:53:08Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26175#M5293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Vincent you are referring to the rule base session rate acceleration (templating) portion of SecureXL, which was substantially improved in R80.10.&amp;nbsp; In this release the only rulebase conditions that stop templating are use of DCE/RPC services, certain rare complex services (i.e. http_mapped), and legacy authentication actions (i.e. User Auth, Client Auth).&amp;nbsp; However even if templating does get stopped by one of these conditions it does not impact the other portion of SecureXL which is throughput acceleration via the SXL and PXL paths.&amp;nbsp; In R80.10 the output of the &lt;STRONG&gt;fwaccel stat&lt;/STRONG&gt; command now actually states this explicitly since this was such a common source of confusion.&amp;nbsp; See screenshot below from my book:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="fwaccel stat disabled throughput" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62680_securexl_temp-disabled.jpg" style="width: 620px; height: 287px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 00:20:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26175#M5293</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-01-31T00:20:45Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26176#M5294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tim,&lt;/P&gt;&lt;P&gt;thanks a lot for your explanation. As i didn't dealt with SecureXL deeper in R80.10, this is really useful news.&lt;/P&gt;&lt;P&gt;And indeed good improvement!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 06:11:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26176#M5294</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2018-01-31T06:11:08Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26177#M5295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Really great information you have provided specially for R80.10&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 14:41:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26177#M5295</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2018-01-31T14:41:36Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26178#M5296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you very much Tim!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 14:58:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26178#M5296</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2018-01-31T14:58:16Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26179#M5297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is a great enhancement to SecureXL, however optimizing your policy for SecureXL templating isn't quite as important as it was in earlier releases due to the advent of Column-based Matching in R80.10 which in itself is quite an improvement in regards to policy evaluation.&amp;nbsp; The tl;dr recommendation to get the best gains from this feature is to avoid using "Any" in the Destination column in all your policy layers as much as possible, and secondarily avoiding "Any" in the Source and Service columns as well if you can.&amp;nbsp; More info: &lt;A _jive_internal="true" href="https://community.checkpoint.com/message/10388-unified-policy-column-based-rule-matching?sr=search&amp;amp;searchId=79f7faf3-6e3e-49d9-ad0d-28ddf5a3c7e2&amp;amp;searchIndex=0"&gt;&lt;SPAN class=""&gt;Unified Policy &lt;EM class=""&gt;Column&lt;/EM&gt;-&lt;EM class=""&gt;based&lt;/EM&gt; Rule &lt;EM class=""&gt;Matching&lt;/EM&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 14:59:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26179#M5297</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-01-31T14:59:49Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26180#M5298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have just activated tcp state logging ( &lt;EM&gt;&lt;STRONG&gt;fwconn_tcp_state_logging &lt;/STRONG&gt; &lt;/EM&gt;set to 1)&amp;nbsp; in the standby member of a clusterXL high availability cluster and I have started to see loads of logs with SYN_SENT for mostly any session through our cluster.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have checked the arp&amp;nbsp; and mac tables on clients, switches and fw and everything is okay, the cluster VIP is linked with mac of the active fw gateway and the switches and clients learn it well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So why does the standby firewall log this? May this be a cosmetic issue related with the cluster session sync? Because I don't think the standby firewall is receiving those SYN packets through the network.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 15:44:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26180#M5298</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2018-01-31T15:44:31Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26181#M5299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Known issue, look a bit further down in &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101221&amp;amp;partition=Advanced&amp;amp;product=Security" style="max-width: 840px;"&gt;sk101221: &lt;STRONG&gt;TCP&lt;/STRONG&gt; &lt;STRONG&gt;state&lt;/STRONG&gt; &lt;STRONG&gt;logging&lt;/STRONG&gt;&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;ClusterXL High Availability mode&lt;/H2&gt;&lt;P&gt;In ClusterXL, by default, all members will send TCP state logs.&lt;/P&gt;&lt;P&gt;If you wish to configure &lt;EM&gt;Standby&lt;/EM&gt; members in ClusterXL High Availability mode &lt;EM&gt;not&lt;/EM&gt; to send TCP state logs, then a hotfix has to be installed on all cluster members.&lt;BR /&gt; This hotfix adds a new kernel parameter - &lt;EM&gt;&lt;STRONG&gt;fwha_only_active_send_logs&lt;/STRONG&gt;&lt;/EM&gt; - that controls which cluster member will send TCP state logs:&lt;/P&gt;&lt;TABLE border="1" cellpadding="4" cellspacing="2"&gt;&lt;TBODY&gt;&lt;TR align="center" bgcolor="#d6dff0" class=""&gt;&lt;TD class="" style="text-align: center;"&gt;Parameter's Value&lt;/TD&gt;&lt;TD class="" style="text-align: center;"&gt;Explanation&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;EM&gt;fwha_only_active_send_logs=0&lt;/EM&gt;&lt;/TD&gt;&lt;TD&gt;Default. All members (Active and Standby) send TCP state logs.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;EM&gt;fwha_only_active_send_logs=1&lt;/EM&gt;&lt;/TD&gt;&lt;TD&gt;Only Active member sends TCP state logs.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Follow these steps:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;A href="http://www.checkpoint.com/services/contact/index.html" target="_blank"&gt;Contact Check Point Support&lt;/A&gt; to get a Hotfix that will add the required kernel parameters.&lt;BR /&gt; A Support Engineer will make sure the Hotfix is compatible with your environment before providing the Hotfix.&lt;BR /&gt; For faster resolution and verification, please collect &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk92739" target="_blank"&gt;CPinfo files&lt;/A&gt; from the Security Management Server and all cluster members involved in the case.&lt;/P&gt;&lt;P&gt;This fix is already included in:&lt;/P&gt;&lt;UL style="font-weight: bold;"&gt;&lt;LI&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk111841" target="_blank"&gt;Check Point R80.10&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk106162" target="_blank"&gt;Jumbo Hotfix Accumulator for R77.30&lt;/A&gt; - since &lt;EM&gt;Take_15&lt;/EM&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 15:52:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26181#M5299</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-01-31T15:52:22Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26182#M5300</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;sorry I read it but I misunderstood it. I thought that you needed the hotfix if you wanted to sends only logs from the active gateway,&amp;nbsp; not that logs from the standby were confusing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the clarification.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 16:00:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26182#M5300</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2018-01-31T16:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: SecureXL on R80.10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26183#M5301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@Tim&lt;/P&gt;&lt;P&gt;Just curious (haven't tested it myself yet) - if templating still functions when an L7 service is defined, does it act as the equivalent of cache (new applications will still match the original template, assuming 4-tuple is identical)?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2018 20:54:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SecureXL-on-R80-10/m-p/26183#M5301</guid>
      <dc:creator>Craig_Dods</dc:creator>
      <dc:date>2018-02-01T20:54:32Z</dc:date>
    </item>
  </channel>
</rss>

