<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Security Gateway Packet Flow and Acceleration - with Diagrams (Obsolete) in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/40244#M8475</link>
    <description>&lt;H4&gt;Note: this article is no longer actual. Refer &lt;A href="https://community.checkpoint.com/t5/General-Topics/R82-Parallel-Processing-Based-Packet-Flow/td-p/228005" target="_self"&gt;to this post from our Technical Marketing Engineering team&lt;/A&gt; for the latest diagrams.&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="text-align: right;"&gt;&lt;SPAN&gt;Version 1.1 - 07.08.2017&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Updated diagrams&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1&gt;Abstract&lt;/H1&gt;
&lt;P&gt;The purpose of this document is to provide clean and simple diagrams of Security Gateway packet flow. Although there are quite a few SecureKnowledge articles for the matter and also some attempts on CheckMates to summarize the logical packet flows, it is quite hard to find&amp;nbsp; straight forward explanation of the inspection and acceleration in a single document.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The most challenging part is to come up with a unified diagram showing all possible packet flow paths, inspection and decision points. The author of this document, after several attempts to make it right, has decided to keep main packet flow diagram separate from Content Inspection block for sake of simplicity and better visual representation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The document is not intended to provide a full explanation of Gateway architecture, technological solutions and product structure rather than be a reference point for those who seek simplified and easy to grasp materials to start with. Multiple SKs and documents for the matter are listed in the &lt;STRONG&gt;References&lt;/STRONG&gt; section of the document.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Main&amp;nbsp;packet flow&lt;/H1&gt;
&lt;P&gt;The following diagram represents general packet flow through a Security Gateway.&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-11 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/67918_Main.png" border="0" alt="" /&gt;&lt;/P&gt;
&lt;PRE&gt;Diagram 1 - Overall GW Packet Flow&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In a nutshell, once packet is received by a Security Gateway, the very first decision is about whether is has to be decrypted. Depending on acceleration settings and abilities, both individual packets and full connections can be accelerated through SecureXL. If acceleration is not possible, the packet is inspected through FW policy. Only the first packet in the accepted connection goes through policy rulebase matched routine. FW inspection for further packet belonging to a connection which is already accepted by FW is relatively lightweight.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It may be required to perform Content Inspection for the data flow of a specific connection. In this case packets will also go through Content Inspection block which is discussed below. Once all the required security checks are done, packet will be encrypted, if required, and finally forwarded out of the GW.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Content Inspection&lt;/H1&gt;
&lt;P&gt;Content Inspection is a complex process based on the data streaming capabilities of a Security Gateway. FW extracts a data content form individual packets and builds a stream which is being inspected by different security features: URL Filtering, Application Control, Anti-Bot, Content Awareness, SandBlast etc.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A simplified logical view of such inspection is shown on the diagram below:&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-12 jive-image j-img-original" src="/legacyfs/online/checkpoint/67922_Content Inspection.png" border="0" alt="" /&gt;&lt;/P&gt;
&lt;PRE&gt;Diagram 2 - Content Inspection Block&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To make it easier correlating it with the main packet flow, entry and exit point for the Content Inspection Block are shown here as well as on the Diagram 1. Content Inspection may decide to discard the packet. If that happens, the connection it belongs to will also be cut and removed from the connection table of FW kernel. If no negative security decision is made, packets will be forwarded normally.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;CoreXL and Acceleration Paths&lt;/H1&gt;
&lt;P&gt;Before CoreXL coming into picture (pre-R65 versions), FW was only capable to perform a single CPU core based policy inspection. To leverage multi-core platforms, and to avoid a single CPU core to be a bottleneck, SecureXL was added.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SecureXL is capable to offload particular part of security decisions and VPN encryption into separate computation devices: a different core or cores on the same chip or even to a CPU-on-a-card.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With SecureXL certain connections could avoid FW path&amp;nbsp;partially (packet acceleration) or completely (acceleration with templates)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CoreXL&amp;nbsp;helps GWs in leveraging multi-core platforms even better, allowing to use some CPU cores for acceleration and some others for FW and Content Inspection (fwk workers). With Content Inspection in the picture, today we can distinguish three so-called paths for the packet flow through a Security GW:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;FW Path&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Accelerated&amp;nbsp;Path and&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Medium Path&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Although CoreXL is out there for some years now, sometimes those terms can be misunderstood or misrepresented. Let's clarify what which path really means. The easiest way to do so is to use Diagram 1 and to see which parts of the packet flow is active for every case.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;FW Path&lt;/H2&gt;
&lt;P&gt;FW Path is implored when acceleration is not possible. In this case each packet in the connection goes through FW Kernel Inspection section and sometimes through Content Inspection block, if policy requires that. This is how it looks:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-13 jive-image j-img-original" src="/legacyfs/online/checkpoint/67923_FW Path.png" border="0" alt="" /&gt;&lt;/P&gt;
&lt;PRE&gt;Diagram 3 - Firewall Path Flow&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Accelerated&amp;nbsp;Path&lt;/H2&gt;
&lt;P&gt;Accelerated Path (previously also known as Fast Path) is active when a connection can be accelerated with a template through SecureXL device. In this case all individual packets within the connection will bypath both FW Kernel section an Content Inspection block:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-14 jive-image j-img-original" src="/legacyfs/online/checkpoint/67924_Fast Path.png" border="0" alt="" /&gt;&lt;/P&gt;
&lt;PRE&gt;Diagram 4 - Accelerated Path Flow&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; Drop Templates acceleration fork is omitted from the SecureXL section of the diagram as it is not considered part of Accelerated Path. We use&amp;nbsp;"Path" term only for packets forwarded&amp;nbsp;through the FW.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Medium Path&lt;/H2&gt;
&lt;P&gt;This term causes some confusion from time to time. Let's clarify what it means.&lt;/P&gt;
&lt;P&gt;Medium Path is a situation when opening and closing a connection is handled by SecureXL,&amp;nbsp;while data flow needs&amp;nbsp; some further inspection and hence goes through Content Inspection. In such case the full connection flow can be shown as follows:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-15 jive-image j-img-original" src="/legacyfs/online/checkpoint/67925_Medium Path.png" border="0" alt="" /&gt;&lt;/P&gt;
&lt;PRE&gt;Diagram 5 - Medium Path Flow&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;P&gt;When Medium Path is available, TCP handshake is fully accelerated&amp;nbsp;with SecureXL. Rulebase match is achieved for the first packet through an existing connection acceleration template. SYN-ACK and ACK packets are also fully accelerated. However, once data starts flowing, to stream it for Content Inspection, the packets will be now handled by a FWK instance. Any packets containing data will be sent to FWK for data extraction to build the data stream. RST, FIN and FIN-ACK packets once again are only handled by SecureXL as they do not contain any data that needs to be streamed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Questions and Answers&lt;/H1&gt;
&lt;P&gt;This section is containing the most common questions and answers for the matter.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q: Why CoreXL is not on the diagrams?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A:&lt;/STRONG&gt; CoreXL is a mechanism to assign, balance and manage CPU cores. CoreXL SND makes a decision to "stick" particular connection going through FW or Medium Paths to a specific FWK instance. It is not part of the logical flow for a specific packet though.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;References&lt;/H1&gt;
&lt;P&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk116255&amp;amp;partition=Advanced&amp;amp;product=Security" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk116255&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank"&gt;Check Point Security Gateway Architecture and Packet Flow&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3007" target="_blank"&gt;Context-Aware Architecture&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A class="link-titled" title="http://downloads.checkpoint.com/dc/download.htm?ID=60442" href="http://downloads.checkpoint.com/dc/download.htm?ID=60442" target="_blank"&gt;R80.10 Security Gateway Architecture&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A class="link-titled" title="http://downloads.checkpoint.com/dc/download.htm?ID=54704" href="http://downloads.checkpoint.com/dc/download.htm?ID=54704" target="_blank"&gt;R77 Security Gateway Architecture &lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98737" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98737" target="_blank"&gt;ATRG: CoreXL&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98722" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98722" target="_blank"&gt;ATRG: SecureXL&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 26 Sep 2024 09:41:26 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2024-09-26T09:41:26Z</dc:date>
    <item>
      <title>Security Gateway Packet Flow and Acceleration - with Diagrams (Obsolete)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/40244#M8475</link>
      <description>&lt;H4&gt;Note: this article is no longer actual. Refer &lt;A href="https://community.checkpoint.com/t5/General-Topics/R82-Parallel-Processing-Based-Packet-Flow/td-p/228005" target="_self"&gt;to this post from our Technical Marketing Engineering team&lt;/A&gt; for the latest diagrams.&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="text-align: right;"&gt;&lt;SPAN&gt;Version 1.1 - 07.08.2017&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Updated diagrams&lt;/SPAN&gt;&lt;/P&gt;
&lt;H1&gt;Abstract&lt;/H1&gt;
&lt;P&gt;The purpose of this document is to provide clean and simple diagrams of Security Gateway packet flow. Although there are quite a few SecureKnowledge articles for the matter and also some attempts on CheckMates to summarize the logical packet flows, it is quite hard to find&amp;nbsp; straight forward explanation of the inspection and acceleration in a single document.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The most challenging part is to come up with a unified diagram showing all possible packet flow paths, inspection and decision points. The author of this document, after several attempts to make it right, has decided to keep main packet flow diagram separate from Content Inspection block for sake of simplicity and better visual representation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The document is not intended to provide a full explanation of Gateway architecture, technological solutions and product structure rather than be a reference point for those who seek simplified and easy to grasp materials to start with. Multiple SKs and documents for the matter are listed in the &lt;STRONG&gt;References&lt;/STRONG&gt; section of the document.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Main&amp;nbsp;packet flow&lt;/H1&gt;
&lt;P&gt;The following diagram represents general packet flow through a Security Gateway.&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-11 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/67918_Main.png" border="0" alt="" /&gt;&lt;/P&gt;
&lt;PRE&gt;Diagram 1 - Overall GW Packet Flow&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In a nutshell, once packet is received by a Security Gateway, the very first decision is about whether is has to be decrypted. Depending on acceleration settings and abilities, both individual packets and full connections can be accelerated through SecureXL. If acceleration is not possible, the packet is inspected through FW policy. Only the first packet in the accepted connection goes through policy rulebase matched routine. FW inspection for further packet belonging to a connection which is already accepted by FW is relatively lightweight.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It may be required to perform Content Inspection for the data flow of a specific connection. In this case packets will also go through Content Inspection block which is discussed below. Once all the required security checks are done, packet will be encrypted, if required, and finally forwarded out of the GW.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Content Inspection&lt;/H1&gt;
&lt;P&gt;Content Inspection is a complex process based on the data streaming capabilities of a Security Gateway. FW extracts a data content form individual packets and builds a stream which is being inspected by different security features: URL Filtering, Application Control, Anti-Bot, Content Awareness, SandBlast etc.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A simplified logical view of such inspection is shown on the diagram below:&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-12 jive-image j-img-original" src="/legacyfs/online/checkpoint/67922_Content Inspection.png" border="0" alt="" /&gt;&lt;/P&gt;
&lt;PRE&gt;Diagram 2 - Content Inspection Block&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To make it easier correlating it with the main packet flow, entry and exit point for the Content Inspection Block are shown here as well as on the Diagram 1. Content Inspection may decide to discard the packet. If that happens, the connection it belongs to will also be cut and removed from the connection table of FW kernel. If no negative security decision is made, packets will be forwarded normally.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;CoreXL and Acceleration Paths&lt;/H1&gt;
&lt;P&gt;Before CoreXL coming into picture (pre-R65 versions), FW was only capable to perform a single CPU core based policy inspection. To leverage multi-core platforms, and to avoid a single CPU core to be a bottleneck, SecureXL was added.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SecureXL is capable to offload particular part of security decisions and VPN encryption into separate computation devices: a different core or cores on the same chip or even to a CPU-on-a-card.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With SecureXL certain connections could avoid FW path&amp;nbsp;partially (packet acceleration) or completely (acceleration with templates)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CoreXL&amp;nbsp;helps GWs in leveraging multi-core platforms even better, allowing to use some CPU cores for acceleration and some others for FW and Content Inspection (fwk workers). With Content Inspection in the picture, today we can distinguish three so-called paths for the packet flow through a Security GW:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;FW Path&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Accelerated&amp;nbsp;Path and&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Medium Path&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Although CoreXL is out there for some years now, sometimes those terms can be misunderstood or misrepresented. Let's clarify what which path really means. The easiest way to do so is to use Diagram 1 and to see which parts of the packet flow is active for every case.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;FW Path&lt;/H2&gt;
&lt;P&gt;FW Path is implored when acceleration is not possible. In this case each packet in the connection goes through FW Kernel Inspection section and sometimes through Content Inspection block, if policy requires that. This is how it looks:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-13 jive-image j-img-original" src="/legacyfs/online/checkpoint/67923_FW Path.png" border="0" alt="" /&gt;&lt;/P&gt;
&lt;PRE&gt;Diagram 3 - Firewall Path Flow&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Accelerated&amp;nbsp;Path&lt;/H2&gt;
&lt;P&gt;Accelerated Path (previously also known as Fast Path) is active when a connection can be accelerated with a template through SecureXL device. In this case all individual packets within the connection will bypath both FW Kernel section an Content Inspection block:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-14 jive-image j-img-original" src="/legacyfs/online/checkpoint/67924_Fast Path.png" border="0" alt="" /&gt;&lt;/P&gt;
&lt;PRE&gt;Diagram 4 - Accelerated Path Flow&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; Drop Templates acceleration fork is omitted from the SecureXL section of the diagram as it is not considered part of Accelerated Path. We use&amp;nbsp;"Path" term only for packets forwarded&amp;nbsp;through the FW.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Medium Path&lt;/H2&gt;
&lt;P&gt;This term causes some confusion from time to time. Let's clarify what it means.&lt;/P&gt;
&lt;P&gt;Medium Path is a situation when opening and closing a connection is handled by SecureXL,&amp;nbsp;while data flow needs&amp;nbsp; some further inspection and hence goes through Content Inspection. In such case the full connection flow can be shown as follows:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-15 jive-image j-img-original" src="/legacyfs/online/checkpoint/67925_Medium Path.png" border="0" alt="" /&gt;&lt;/P&gt;
&lt;PRE&gt;Diagram 5 - Medium Path Flow&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;P&gt;When Medium Path is available, TCP handshake is fully accelerated&amp;nbsp;with SecureXL. Rulebase match is achieved for the first packet through an existing connection acceleration template. SYN-ACK and ACK packets are also fully accelerated. However, once data starts flowing, to stream it for Content Inspection, the packets will be now handled by a FWK instance. Any packets containing data will be sent to FWK for data extraction to build the data stream. RST, FIN and FIN-ACK packets once again are only handled by SecureXL as they do not contain any data that needs to be streamed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Questions and Answers&lt;/H1&gt;
&lt;P&gt;This section is containing the most common questions and answers for the matter.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q: Why CoreXL is not on the diagrams?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A:&lt;/STRONG&gt; CoreXL is a mechanism to assign, balance and manage CPU cores. CoreXL SND makes a decision to "stick" particular connection going through FW or Medium Paths to a specific FWK instance. It is not part of the logical flow for a specific packet though.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;References&lt;/H1&gt;
&lt;P&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk116255&amp;amp;partition=Advanced&amp;amp;product=Security" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk116255&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank"&gt;Check Point Security Gateway Architecture and Packet Flow&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3007" target="_blank"&gt;Context-Aware Architecture&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A class="link-titled" title="http://downloads.checkpoint.com/dc/download.htm?ID=60442" href="http://downloads.checkpoint.com/dc/download.htm?ID=60442" target="_blank"&gt;R80.10 Security Gateway Architecture&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A class="link-titled" title="http://downloads.checkpoint.com/dc/download.htm?ID=54704" href="http://downloads.checkpoint.com/dc/download.htm?ID=54704" target="_blank"&gt;R77 Security Gateway Architecture &lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98737" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98737" target="_blank"&gt;ATRG: CoreXL&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98722" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98722" target="_blank"&gt;ATRG: SecureXL&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 09:41:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/40244#M8475</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-09-26T09:41:26Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway Packet Flow and Acceleration - with Diagrams</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/40245#M8476</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Valeri,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great article but you don't have to do the work twice. &lt;BR /&gt;This article has already&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/43160"&gt;Moti Sagey&lt;/A&gt;&amp;nbsp;released in 2017:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/thread/5083"&gt;Check Point Threat Prevention Packet Flow and Architecture&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See Link:&lt;/P&gt;&lt;UL style="color: #333333; background-color: #ffffff; border: 0px; padding: 0px 0px 0px 30px;"&gt;&lt;LI style="border: 0px; font-weight: inherit; margin: 0.5ex 0px; padding: 0px;"&gt;&lt;A href="http://downloads.checkpoint.com/dc/download.htm?ID=54704" rel="nofollow" style="border: 0px; font-weight: inherit; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;R77 Security Gateway Architecture&lt;/A&gt;&lt;/LI&gt;&lt;LI style="border: 0px; font-weight: inherit; margin: 0.5ex 0px; padding: 0px;"&gt;&lt;A href="http://downloads.checkpoint.com/dc/download.htm?ID=54724" rel="nofollow" style="color: #905690; border: 0px; font-weight: inherit; text-decoration: none; margin: 0px; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;R77 Security Gateway Packet Flow&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But it looks better in multicolored.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Patricia&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2018 10:29:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/40245#M8476</guid>
      <dc:creator>Patricia_OSulli</dc:creator>
      <dc:date>2018-08-06T10:29:06Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway Packet Flow and Acceleration - with Diagrams</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/40246#M8477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/58179"&gt;Patricia OSullivan&lt;/A&gt;‌&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for pointing this out. &lt;A href="https://community.checkpoint.com/migrated-users/43160"&gt;Moti Sagey&lt;/A&gt; is my boss, and I am pretty much aware of this efforts to spread the word &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can tell you more. There is another document circulating on this board with the diagrams for packet flow, you'he probably seen it. There are also quite a few SKs describing different parts of GW architecture, acceleration, packet flow logic, etc. Some of them are not up to date, some others are only available for UserCenter accounts with at least Advanced level of access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So let me explain my intentions. Here is what I am aiming at:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Accurate diagrams for the matter (Yes, the main one is the colored official SK diagram, no question. I also had to remove CI out of it to make it more user friendly). You are I both know there are things out there. The fact people are trying to make up their own diagrams means the official ones either not accessible or unknown.&lt;/P&gt;&lt;P&gt;2. Simple and accessible explanation of the subject without need to jump between multiple SKs and documents.&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Finally, as far as I know, nobody has tried using the generic packet flow diagram for explaining acceleration and CoreXL cases. I have seen a few&amp;nbsp;situations where customers and even partners misunderstood what Medium Path actually is. Showing FW, Fast and Medium paths on the main diagram is very helpful, I hope.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will be happy to answer any of your further concerns and questions&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2018 10:57:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/40246#M8477</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-08-06T10:57:10Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway Packet Flow and Acceleration - with Diagrams</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/40247#M8478</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Valeri,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the article. Please, please change the font colors and sizes if you have the time: white (and small and non-bold) characters, especially on pale backgrounds make my eyes bleed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2018 19:52:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/40247#M8478</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-08-06T19:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway Packet Flow and Acceleration - with Diagrams</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/40248#M8479</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, I have updated the diagrams. If it is still not good enough, click on any of them, a pic will be opened full screen.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Aug 2018 06:53:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/40248#M8479</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-08-07T06:53:17Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway Packet Flow and Acceleration - with Diagrams</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/40249#M8480</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very useful documenti, thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Aug 2018 18:41:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/40249#M8480</guid>
      <dc:creator>Simone_Mantovan</dc:creator>
      <dc:date>2018-08-08T18:41:08Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway Packet Flow and Acceleration - with Diagrams</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/40250#M8481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you that's very interesting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where would HTTPS Inspection fit into this? I'm&amp;nbsp;especially interested to&amp;nbsp;see&amp;nbsp;if enabling the HTTPS Inspection on a gateway could have a performance impact even on packets that are not inspected according to https inspection policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Aug 2018 08:23:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/40250#M8481</guid>
      <dc:creator>18568</dc:creator>
      <dc:date>2018-08-18T08:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway Packet Flow and Acceleration - with Diagrams</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/40251#M8482</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTTPS Inspection means that you decrypt&amp;nbsp;HTTPS traffic before full inspection and re-encrypt it into a separate session. Impact on traffic excluded from HTTPS Inspection is minimal though.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Aug 2018 12:30:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/40251#M8482</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-08-18T12:30:10Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway Packet Flow and Acceleration - with Diagrams</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/40252#M8483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HTTPS inspection goes PXL, if that was the question.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2018 11:03:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/40252#M8483</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-11-29T11:03:58Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway Packet Flow and Acceleration - with Diagrams</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/85593#M17203</link>
      <description>&lt;P&gt;Thank you very much for the detailed post and explanations, it was very useful and educational.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I have a question though, one of the first stages in the drawing is a "stateless inspection" step. I couldn't find any reference to stateless inspection before checking if the packet can be accelerated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My suspicion is that these are the inspections that we can control through "inspection settings" via the access policy, is that assumption correct?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any detail on this step would really help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 06:01:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/85593#M17203</guid>
      <dc:creator>dror</dc:creator>
      <dc:date>2020-05-18T06:01:42Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway Packet Flow and Acceleration - with Diagrams</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/85614#M17206</link>
      <description>&lt;P&gt;stateless verification means basic sanity on a packet, like checksum, IP options or allowed ICMP size. It is done by asm kernel logical module.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Only some of those parameters can be controlled.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 07:22:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/m-p/85614#M17206</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-05-18T07:22:45Z</dc:date>
    </item>
  </channel>
</rss>

