<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.x Performance Tuning Tip - AES-NI in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41592#M8697</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Heiko,&lt;/P&gt;&lt;P&gt;Great write-up! Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you happen to know if AES-NI is working in VSX?&lt;/P&gt;&lt;P&gt;If it does, is it a global setting for the parent host or is it working on per-VS basis?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 07 Nov 2018 17:57:27 GMT</pubDate>
    <dc:creator>Vladimir</dc:creator>
    <dc:date>2018-11-07T17:57:27Z</dc:date>
    <item>
      <title>R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41590#M8695</link>
      <description>&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;What is AES-NI&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/73316_pastedImage_1.png" border="0" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif';"&gt;Intel‘s AES New Instructions AES-NI is a encryption instruction set that improves on the Advanced Encryption Standard (AES) algorithm and accelerates the encryption of data in many processor familys.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif';"&gt;Comprised of seven new instructions, AES-NI gives your environment faster, more affordable data protection and greater security.&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Chapter&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;STRONG&gt;More interesting articles:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-x-Architecture-and-Performance-Tuning-Link-Collection/m-p/47883#M9336" target="_blank" rel="noopener" data-objecttype="102"&gt;- R80.x Architecture and Performance Tuning - Link Collection&lt;/A&gt;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Appliances and Open Servers with AES-NI&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Better throughput can be achieved by selecting a faster encryption algorithm. For a comparison of encryption algorithm speeds, refer to sk73980 - Relative speeds of algorithms for IPsec and SSL.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;AES-NI is Intel's dedicated instruction set, which significantly improves the speed of Encrypt-Decrypt actions and allows one to increase AES throughput for:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="margin-left: 36.0pt; text-indent: -18.0pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt; &lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Site-to-Site VPN&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-left: 36.0pt; text-indent: -18.0pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt; &lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Remote Access VPN&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-left: 36.0pt; text-indent: -18.0pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt; &lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Mobile Access&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-left: 36.0pt; text-indent: -18.0pt;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt; &lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;HTTPS Interception&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;The general speed of the system depends on additional parameters.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Check Point supports AES-NI on many appliances, only when running Gaia OS with 64-bit kernel. On these appliances AES-NI is enabled by default. AES-NI is also supported on Open Servers.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Affected encryption algorithms include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;AES-CBC (128-bit and 256-bit)&lt;/LI&gt;
&lt;LI&gt;AES-GCM (128-bit and 256-bit), which shows the most significant improvement - with AES-NI, it is faster than AES-CBC, when both sides support AES-NI. Without AES-NI support, it is slightly slower than AES-CBC + HMAC-SHA1&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Check Point supports AES-NI on the most appliances (only when running Gaia OS with 64-bit kernel).&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;AES-NI is also supported on Open Servers.&amp;nbsp;Make sure that Gaia OS is running in 64-bit mode.&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Check if AES-NI is activated&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="100%" style="border-style: hidden; width: 100%; background-color: #c0c0c0;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;R80.10 - R80.30&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;Old AES-NI commands with "dmesg" no longer work in R80.40 and R81 (&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk170779" target="_self"&gt;sk170779&lt;/A&gt;).&lt;STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;# dmesg | grep "AES-NI"&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/73317_pastedImage_6.png" border="0" /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif';"&gt;If it is not available, the following message is displayed:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif';"&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/73318_pastedImage_7.png" border="0" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="100%" style="border-style: hidden; width: 100%; background-color: #c0c0c0;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;R80.40 Jumbo HFA 100+ and R81 Jumbo HFA 13+&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;# fw ctl get int AESNI_is_supporte&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;0 = not supported&lt;BR /&gt;1 = supported&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="100%" style="border-style: hidden; width: 100%; background-color: #c0c0c0;"&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;Check AESNI CPU support&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif';"&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;It can also be checked if the CPU provides AES-NI. For this the following command should be executed. Here "aes" should now be displayed.&lt;STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif';"&gt;&lt;STRONG&gt;# grep -m1 -o aes /proc/cpuinfo&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;If AES-NI is not enabled, it must be turned on in the BIOS (if available). Typical way for Open Servers.&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif';"&gt;&lt;STRONG&gt;&lt;IMG class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/73319_pastedImage_9.png" border="0" /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;AES-NI performance measurement&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;A little bit of reverse engineering.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Check Point uses OpenSSL as library. Therefore the command "openssl" is provided as "cpopenssl". This gives us the possibility to execute all openssl commands. With this I tested a little bit and came to the conclusion that performance measurements are possible with the following command. So you can test the performance differences with enabled and disabled AES-NI.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000; font-size: 11.0pt;"&gt;&lt;STRONG&gt;Warning notice:&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;SPAN style="font-size: 11.0pt;"&gt;If you execute this command you have 100% CPU usage on the firewall for 20 sec.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;# cpopenssl speed aes-256-cbc&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Enabled AES-NI:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;IMG class="image-5 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/73320_pastedImage_12.png" border="0" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Disabled AES-NI:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;IMG class="image-6 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/73321_pastedImage_13.png" border="0" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;After these results I would always recommend to activate AES-NI and AES is preferred to 3DES because it offers many performance advantages through the hardware acceleration.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;With the following command you can test and compare &lt;STRONG&gt;all encryption methods&lt;/STRONG&gt;. After these results I would always recommend to activate AES-NI and AES is preferred to 3DES because it offers many performance advantages through the hardware acceleration.&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000; font-size: 11.0pt;"&gt;&lt;STRONG&gt;Warning notice:&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;SPAN style="font-size: 11.0pt;"&gt;If you execute this command you have 100% CPU usage for a long time!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;# cpopenssl speed&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;&lt;IMG class="image-7 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/73325_pastedImage_2.png" border="0" /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;This makes it possible to compare encryption algorithms. It shows that e.g. AES 256 is more performant than DES. Therefore AES 256 should rather be used for VPN connections than DES or 3DES. This is also well described in the following SK &lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif';"&gt;&lt;A title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk73980" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk73980" target="_blank" rel="noopener"&gt;Relative speeds of algorithms for IPsec and SSL&lt;/A&gt;.&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;References&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif';"&gt;&lt;A title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk73980" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk73980" target="_blank" rel="noopener"&gt;Relative speeds of algorithms for IPsec and SSL&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif';"&gt;&lt;A title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105119&amp;amp;partition=General&amp;amp;product=IPSec" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105119&amp;amp;partition=General&amp;amp;product=IPSec" target="_blank" rel="noopener"&gt;Best Practices - VPN Performance&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif';"&gt;&lt;A title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110549&amp;amp;partition=General&amp;amp;product=vSEC" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110549&amp;amp;partition=General&amp;amp;product=vSEC" target="_blank" rel="noopener"&gt;vSEC Virtual Edition (VE) Gateway support for AES-NI on VMware ESX&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif';"&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105119" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105119" target="_blank" rel="noopener"&gt;Best Practices - VPN Performance&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif';"&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk118097" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk118097" target="_blank" rel="noopener"&gt;MultiCore Support for IPsec VPN in R80.10 and above&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Arial','sans-serif';"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 19:03:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41590#M8695</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2021-06-11T19:03:32Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41591#M8696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;What I noticed was, that R80.20 uses a 1 year old openssl version. I think R&amp;amp;D should look at that.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;# cpopenssl version&lt;BR /&gt; &lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/73323_pastedImage_1.png" /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2018 17:36:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41591#M8696</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-11-07T17:36:16Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41592#M8697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Heiko,&lt;/P&gt;&lt;P&gt;Great write-up! Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you happen to know if AES-NI is working in VSX?&lt;/P&gt;&lt;P&gt;If it does, is it a global setting for the parent host or is it working on per-VS basis?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2018 17:57:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41592#M8697</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-11-07T17:57:27Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41593#M8698</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/55229"&gt;,&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;Am I getting this right?&lt;/DIV&gt;&lt;DIV&gt;From your point of view it makes more sense to use AES256 for VPN than 3DES. Is that correct?&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Cheers&lt;/DIV&gt;&lt;DIV&gt;Sandro&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2018 19:21:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41593#M8698</guid>
      <dc:creator>Sandro_Gerdel</dc:creator>
      <dc:date>2018-11-07T19:21:41Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41594#M8699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/64484"&gt;Sandro,&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, according to SK and my tests, AES256 with AES-NI should be more effective.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;More see here: &lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk73980" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk73980"&gt;Relative speeds of algorithms for IPsec and SSL&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/55229"&gt;Heiko&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2018 19:27:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41594#M8699</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-11-07T19:27:19Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41595#M8700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/48025"&gt;Vladimir.&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't say that 100% because the R&amp;amp;D guys should say something. But I think so, because this is actually on the operating system level. Here the linux crypto API is provided or the openssl crypto library.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Heiko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2018 19:33:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41595#M8700</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-11-07T19:33:44Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41596#M8701</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;Note:&amp;nbsp;&lt;/SPAN&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/people/d401179d-0d5b-369d-a0f2-387c3ef54533" style="color: #2989c5;"&gt;Tim&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;wrote on page 44 of his &lt;/SPAN&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-3169" style="color: #2989c5;"&gt;Security Gateway Performance Optimization&lt;/A&gt;&lt;SPAN&gt; presentation that l&lt;/SPAN&gt;&lt;SPAN&gt;arge amounts of IPSec VPN tra&lt;/SPAN&gt;&lt;SPAN&gt;ffi&lt;/SPAN&gt;&lt;SPAN&gt;c using algorithms SHA-384, AES-GCM-128 or AES-GCM-256&lt;/SPAN&gt;&lt;SPAN&gt; can cause an elevated percentage &lt;/SPAN&gt;&lt;SPAN&gt;of&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;traffic to be handled by SecureXL in F2F (&lt;/SPAN&gt;&lt;EM&gt;Slow path&lt;/EM&gt;&lt;SPAN&gt;).&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2018 20:54:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41596#M8701</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2018-11-07T20:54:48Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41597#M8702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;Hi &lt;A ___default_attr="41735" _jive_internal="true" data-orig-content="Danny Jung" href="https://community.checkpoint.com/people/917b8439-9d5c-34f0-b86a-f0e1b0a14cbd" jivemacro="user"&gt;Danny,&lt;/A&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;I agree with you and&amp;nbsp;&lt;A ___default_attr="41625" _jive_internal="true" data-orig-content="Timothy Hall" href="https://community.checkpoint.com/people/d401179d-0d5b-369d-a0f2-387c3ef54533" jivemacro="user"&gt;Timothy.&lt;/A&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;IPSec VPN trafic utlizing the AES-128 or AES-256 algorithms does not require handling in F2F (Slow path). I always use AES-256 for site to site VPN. Here I get the best performance (AES-NI) with a good security level.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;.&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2018 21:37:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41597#M8702</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-11-07T21:37:48Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41598#M8703</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;P&gt;When SecureXL is enabled, Encrypt-Decrypt actions usually take place on SecureXL level (on CPU cores running as CoreXL SND). All VPN traffic will be handled on the CPU cores running as CoreXL SND under the following conditions:&lt;/P&gt;&lt;UL type="disc"&gt;&lt;LI&gt;Only "Firewall" and "IPSec VPN" software blades are enabled&lt;/LI&gt;&lt;LI&gt;There are no fragmented packets&lt;/LI&gt;&lt;LI&gt;SecureXL acceleration is not disabled by any of the security rules (refer to &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk32578" target="_blank"&gt;sk32578&lt;/A&gt;)&lt;/LI&gt;&lt;LI&gt;VPN features that are disqualified from SecureXL (see below) are disabled&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;If all the above conditions are met, all VPN traffic will be handled on CPU cores running as CoreXL SND with minimum traffic being forwarded to the CoreXL FW instances, resulting in multi-core processing of VPN traffic (depending on the number of CPU cores running as CoreXL SND).&lt;/P&gt;&lt;P&gt;The following VPN features are handled by CPU cores running as CoreXL FW instances:&lt;/P&gt;&lt;UL type="disc"&gt;&lt;LI&gt;Fragmented VPN packets&lt;/LI&gt;&lt;LI&gt;Any compression algorithms (go to IPSec VPN Community properties - "Advanced Settings" pane - "Advanced VPN Properties")&lt;/LI&gt;&lt;LI&gt;Using HMAC-SHA384 for data integrity and authentication (refer to &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk104578" target="_blank"&gt;sk104578&lt;/A&gt;)&lt;/LI&gt;&lt;LI&gt;Any transport mode SA (used in L2TP clients and GRE tunnels)&lt;/LI&gt;&lt;LI&gt;Multicast IPsec (GDOI)&lt;/LI&gt;&lt;LI&gt;Monitoring Software Blade - if in addition to "System Counters", also "Traffic" counters are enabled in Security Gateway object (in such a case, connections are flagged with "Accounting" flag in the output of "fwaccel conns" command)&lt;/LI&gt;&lt;LI&gt;Any Software Blades other than "Firewall"&amp;nbsp;are used&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note:&lt;/P&gt;&lt;P&gt;With R80.20 fragmented packets do not necessarily have to run over the F2F path. With fragmented VPN packets under R80.20 I'm not sure which way they go.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;More see here: &lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105119" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105119"&gt;Best Practices - VPN Performance&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2018 21:49:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41598#M8703</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-11-07T21:49:35Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41599#M8704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am really shocked and worried that you are still talking and comparing Speed with DES and 3DES. No matter what Speed DES and 3DES has it is insecure and should never be used anymore - independent if it is faster or not. My opinion!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Nov 2018 14:03:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41599#M8704</guid>
      <dc:creator>Alexander_Wilke</dc:creator>
      <dc:date>2018-11-14T14:03:10Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41600#M8705</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can check OpenSSH version and you will be surprised ... &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Nov 2018 14:04:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41600#M8705</guid>
      <dc:creator>Alexander_Wilke</dc:creator>
      <dc:date>2018-11-14T14:04:19Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41601#M8706</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/45529"&gt;Alexander,&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;The statement I find great.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;Point 1:&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="font-size: 15px;"&gt;I totally agree with you. DES, 3DES, SHA1, RC4,… &amp;nbsp;should not be used anymore. That is also a clear recommendation in all my concepts. Now reality is catching up with us. Many firewall environments still use 3DES because the administrators have work with the change to AES-256. I think about 40% of the firewalls I see are still using 3DES. Secure Client connection is also used 3DES as default for phase 2 (see picture) in R80.20. I think it's a security issue.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;IMG __jive_id="74424" height="205" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74424_pastedImage_2.png" width="517" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;Point 2:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;Performance and security is a difficult issue in firewall tuning. There is a fine line between more security and high performance. This article is about performance and in this case the more powerful AES-256 encryption is also the safer one. It couldn't be better:-)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;Point 3:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;Please have a look at what Check Point offers with IPSec VPN in phase 1 and phase 2 in R80.20. Here DES and 3DES are still provided.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;IMG __jive_id="74425" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74425_pastedImage_3.png" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;IMG __jive_id="74432" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74432_pastedImage_4.png" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;From my point of view, DES and 3DES will continue to exist for a long time. Why? Many other manufacturers do not manage to implement high encryption standards. These are often seen in medical sector or in industry sector. It's even worse for industrial systems. Often no encryption is used here&lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/angry.png" /&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;And I agree with you, away with DES, 3DES, SHA1, RC4.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;Heiko&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Nov 2018 18:06:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41601#M8706</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-11-14T18:06:44Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41602#M8707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Heiko, Alexander,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your notices, I have talked with RnD owners about these questions.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The OpenSSH and OpenSSL libraries are being patched with every relevant CVE. Open source packages on Check Point are being hardened and modified to answer our strict security standards. We also port many features from newer versions.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;In other words, for example, the "OpenSSH 4.3p2" version in the R80.20 isn't equal to the OpenSSH 4.3p2, which we can download from the openssh.com. This is "OpenSSH 4.3p2 Checkpoint Edition".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Nov 2018 07:15:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41602#M8707</guid>
      <dc:creator>Dmitry_Krupnik</dc:creator>
      <dc:date>2018-11-30T07:15:53Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41603#M8708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was explaining to a customer the AES-NI thing and bumped on this interesting thread. It is in my understanding that&amp;nbsp;there is a consensus that AES-GCM is preferable to AES-CBC because of built-in authentication and better general performance.&amp;nbsp;Also, on 64-bit systems a subset of SHA-512 like SHA-384 is supposed to be more CPU efficient than SHA-256.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/41625"&gt;Timothy Hall&lt;/A&gt;'s&amp;nbsp;presentation seems to show that using GCM and SHA-384 is actually worse than CBC and SHA256 on Checkpoint. Is it correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2019 14:34:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41603#M8708</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2019-01-11T14:34:04Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41604#M8709</link>
      <description>&lt;P&gt;"Worse" is a relative term.&amp;nbsp; VPN traffic that uses any form of GCM or SHA-384 cannot be handled by SecureXL in R80.10 and earlier and will be forced F2F which is a much less efficient processing path.&amp;nbsp; This assumes of course that there is not some other "Deep Inspection" blade such as APCL or Threat Prevention needing to inspect the traffic coming out of the VPN and forcing it into a higher path anyway.&amp;nbsp; So in a situation where only the most basic blades are enabled on a gateway (Firewall, IPSec VPN, and IPS w/ profile Default_Protection/Optimized) the vast majority of traffic can typically be handled in the most efficient SXL path at ludicrous speed, even if it is encrypting/decrypting&amp;nbsp;to/from a VPN.&amp;nbsp; However use of GCM or SHA-384 on a VPN tunnel will force all of that tunnel's traffic F2F in R80.10 and earlier regardless of what blades are enabled.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However on most modern firewalls, at least one "Deep Inspection" blade is enabled so most traffic won't be able to be handled in the SXL path anyway, and will end up in the Medium Path (PXL) or F2F.&amp;nbsp; An entire 16-page chapter of the second edition of my book (chapter 8)&lt;/img&gt; was dedicated to this topic of VPN optimization.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However this limitation can be turned to your advantage.&amp;nbsp; If you suspect SecureXL acceleration is mishandling a certain VPN, simply enable a GCM-based algorithm or SHA-384 for that VPN which will keep SecureXL from trying to handle it and make it all go F2F in R80.10 or earlier.&amp;nbsp; This technique is much more efficient than disabling SecureXL completely, or alternatively switching off all SecureXL VPN acceleration with &lt;STRONG&gt;sim vpn off&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Edit: I forgot to mention that AES-NI can be successfully leveraged in all processing paths including SXL and F2F.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Update&lt;/STRONG&gt;&lt;SPAN&gt;: AES-GCM-128 or AES-GCM-256 (Galois/Counter Mode algorithms) can be fully handled inside SecureXL/Accelerated Path starting in R80.30.&amp;nbsp; SHA-384 is still not implemented in SecureXL as of R80.30, so VPN traffic utilizing SHA-384 still cannot be accelerated by SecureXL.&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV style="border: 0px; font-weight: inherit; font-size: 14px;"&gt;
&lt;DIV class="" style="border: 0px; font-weight: inherit; margin: 20px 0px;"&gt;
&lt;P style="color: #333333; background-color: #ffffff; border: 0px; font-weight: inherit;"&gt;--&lt;/P&gt;
&lt;P style="color: #333333; background-color: #ffffff; border: 0px; font-weight: inherit;"&gt;CheckMates Break Out Sessions Speaker&lt;/P&gt;
&lt;P style="color: #333333; background-color: #ffffff; border: 0px; font-weight: inherit;"&gt;CPX 2019 Las Vegas &amp;amp; Vienna - Tuesday@13:30&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Sun, 09 Feb 2020 15:08:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41604#M8709</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-02-09T15:08:45Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41605#M8710</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you &lt;A href="https://community.checkpoint.com/migrated-users/41625"&gt;Timothy Hall&lt;/A&gt;‌, very interesting. I will review that chapter of your book.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2019 20:11:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41605#M8710</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2019-01-16T20:11:25Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41606#M8711</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;THX for this info.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Heiko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Mar 2019 20:04:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41606#M8711</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-03-09T20:04:01Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41607#M8712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I also think that's a better way than disabling SecureXL completely.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd rather use:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;sim vpn off&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Heiko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Mar 2019 20:07:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/41607#M8712</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-03-09T20:07:46Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/47834#M9329</link>
      <description>&lt;P&gt;nice nice nice&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 22:33:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/47834#M9329</guid>
      <dc:creator>Tim_Maurer</dc:creator>
      <dc:date>2019-03-19T22:33:11Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Performance Tuning Tip - AES-NI</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/58365#M11770</link>
      <description>Small addition to this thread from R&amp;amp;D:&lt;BR /&gt;AES-NI is supported and enabled out-of-the-box for 2.6.18 kernels.&lt;BR /&gt;In 3.10 kernels it’s supported and enabled out-of-the-box since R80.30 GA.</description>
      <pubDate>Tue, 16 Jul 2019 17:48:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-x-Performance-Tuning-Tip-AES-NI/m-p/58365#M11770</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-07-16T17:48:01Z</dc:date>
    </item>
  </channel>
</rss>

