<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.x Security Gateway Architecture (Logical Packet Flow) in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41830#M8917</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;great job&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 06 Dec 2018 20:48:21 GMT</pubDate>
    <dc:creator>Eduard_Mammitzs</dc:creator>
    <dc:date>2018-12-06T20:48:21Z</dc:date>
    <item>
      <title>R81.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41747#M8834</link>
      <description>&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Introduction&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&lt;SPAN style="font-size: 15px;"&gt;This document describes the packet flow (partly also connection flows) in a Check Point &lt;STRONG&gt;R80.10 and above&lt;/STRONG&gt; with SecureXL and CoreXL, Content Inspection, Stateful inspection, network and port address translation (NAT), MultiCore Virtual Private Network (VPN) functions and forwarding are applied per-packet on the inbound and outbound interfaces of the device&lt;/SPAN&gt;. &lt;SPAN style="font-size: 15px;"&gt;There should be an overview of the basic technologies of a Check Point Firewall.&lt;/SPAN&gt; &lt;SPAN style="font-size: 15px;"&gt;We have also reworked the document several times with Check Point, so that it is now finally available.&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Chapter&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;STRONG&gt;More interesting articles:&lt;BR /&gt;&lt;/STRONG&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-x-Architecture-and-Performance-Tuning-Link-Collection/m-p/47883#M9336" target="_blank" rel="noopener" data-objecttype="102"&gt;- R80.x Architecture and Performance Tuning - Link Collection&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://cp.ankenbrand24.de" target="_blank" rel="noopener nofollow noopener noreferrer"&gt;- Article list (Heiko Ankenbrand)&lt;/A&gt;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Logical Packet Flow R80.10&lt;BR /&gt;&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="r8010_packet_flow_1.7a_pdf-1.jpg" style="width: 1126px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5783i9A23333B50CC0989/image-dimensions/1126x1589?v=v2" width="1126" height="1589" role="button" title="r8010_packet_flow_1.7a_pdf-1.jpg" alt="r8010_packet_flow_1.7a_pdf-1.jpg" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt; Attention! &lt;BR /&gt;Starting with R80.20 the flows in the firewall have changed.&lt;/STRONG&gt;&lt;/FONT&gt; &lt;BR /&gt;&lt;BR /&gt;Therefore the flows can no longer be shown 100% in a drawing. This drawing can only be used as a schematic view. For example, correction flows are used to reinject packets.&amp;nbsp;SecureXL parts are now executed in the inspection code.&amp;nbsp;The processing of accept templates and rule based checks have also changed. A drawing is provided below in this article.&amp;nbsp;If you want to know how the packets physically pass through the firewall, please open TAC tickets or use Check Point training.&amp;nbsp;Please note that the content inspection is one unit and in this image it is divided into two parts to better explain the flows.&amp;nbsp;Encryption, decryption and QoS are performed in SecureXL or CoreXL, depending on whether SecureXL is switched on or off.&amp;nbsp;I have worked about 100 hours on this article and the pictures and am looking for a solution how to display it 100% in R80.40 or in future in R81.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Download&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Download: &lt;A href="https://www.ankenbrand24.de/wp-content/uploads/2020/01/r8010_packet_flow_1.6a_pdf.pdf" target="_self"&gt;R80.x Flowchart v1.6 PDF&lt;/A&gt;&amp;nbsp;(new R80.10 version)&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Download: &lt;A href="https://www.ankenbrand24.de/wp-content/uploads/2019/12/r8010_packet_flow_1.5b_pdf.pdf" target="_self"&gt;R80.30 Flowchart v1.5 PDF&lt;/A&gt; (old R80.10 version)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;What's new in R80.10 and above&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;STRONG&gt;R80.10 and above&lt;/STRONG&gt; offer many technical innovations regarding R77. I will look at the following in this article:&lt;BR /&gt;- new fw monitor inspection points for VPN (e and E)&lt;BR /&gt;- new MultiCore VPN&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 15px;"&gt;- UP Manager&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;- Content Awareness (CTNT)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;R80.20 and above&lt;/STRONG&gt;:&lt;BR /&gt;- SecureXL has been significantly revised in R80.20. It now works in user space. This has also led to some changes in "fw monitor"&lt;BR /&gt;- There are new fw monitor chain (SecureXL) objects that do not run in the virtual machine.&lt;BR /&gt;- N&lt;SPAN style="font-size: 15px;"&gt;ow SecureXL works in user space.&lt;/SPAN&gt; The SecureXL driver takes a certain amount of kernel memory&amp;nbsp;per core&amp;nbsp;and that was adding up to more kernel memory than Intel/Linux was allowing.&lt;BR /&gt;- SecureXL supportes now Async SecureXL with Falcon cards&lt;BR /&gt;- That's new in acceleration high level architecture (SecureXL on Acceleration Card): Streaming over SecureXL, Lite Parsers, Scalable SecureXL, Acceleration stickiness&lt;BR /&gt;- Policy push acceleration on Falcon cards&lt;BR /&gt;- Falcon cards for: Low Latency, High Connections Rate, SSL Boost, Deep Inspection Acceleration, Modular Connectivity, Multible Acceleration modules&lt;BR /&gt;- Falcon card compatible with 5900, 15000 &amp;amp; 23000 Appliance Series &amp;gt; 1G (8x1 GbE), 10G (4x10 GbE) and 40G (2x40 GbE)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;R80.30 and above:&lt;BR /&gt;&lt;/STRONG&gt;&lt;SPAN&gt;- In R80.30+, you can also allocate a core for management traffic if you have 8 or more cores licensed, but this is not the default.&lt;BR /&gt;- Active streaming for https with full SNI support.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;R80.40 and above:&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;- &lt;/STRONG&gt;Support for automatic allocation of CoreXL SNDs and Firewall instances that does not require a Security Gateway reboot.&lt;BR /&gt;- &lt;STRONG&gt;CoreXL and Multi-Queue:&lt;/STRONG&gt; Improved out of the box experience - Security Gateway &lt;SPAN style="color: #ef6950;"&gt;&lt;STRONG&gt;automatically changes the number of CoreXL SNDs and Firewall instances&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;STRONG&gt;&lt;SPAN style="color: #ef6950;"&gt;and the Multi-Queue&lt;/SPAN&gt;&lt;/STRONG&gt; configuration based on the current traffic load.&lt;BR /&gt;- Check Point's Security Gateway now support HTTP/2&lt;BR /&gt;- A new Policy Layer in SmartConsole dedicated to TLS Inspection and different TLS Inspection layers can be used in different policy packages.&lt;BR /&gt;- Enhanced NAT port allocation mechanism - on Security Gateways with 6 or more CoreXL Firewall instances, all instances use the same pool of NAT ports, which optimizes the port utilization and reuse.&lt;BR /&gt;- Multiple CoreXL Firewall instances handle the SIP protocol to enhance performance.&lt;BR /&gt;- Cluster Control Protocol encryption is now enabled by default.&lt;BR /&gt;&lt;BR /&gt;R80.20 EA and above:&lt;BR /&gt;-&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Logical Packet Flow R80.20+ &lt;BR /&gt;&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;STRONG&gt;SecureXL has been significantly revised in R80.20&lt;/STRONG&gt;. This has also led to some changes in "fw monitor". There are new fw monitor chain (SecureXL) objects that do not run in the virtual machine. N&lt;SPAN style="font-size: 15px;"&gt;ow SecureXL works in part in user space.&lt;/SPAN&gt; The SecureXL driver takes a certain amount of kernel memory&amp;nbsp;per core&amp;nbsp;and that was adding up to more kernel memory than Intel/Linux was allowing. The packet flow in R80.20+ is a little bit different from the flow lower than R80.20. Now it is possible to use async SecureXL and other new functions. This figure shows the new features with the reinjection of SecureXL packages. SecureXL supportes now also Async SecureXL with Falcon cards. That's new in acceleration high level architecture (SecureXL on Acceleration Card): Streaming over SecureXL, Lite Parsers, Scalable SecureXL, Acceleration stickiness.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="accel_path_d_1.PNG" style="width: 729px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11189iDA630A93B7C41A69/image-size/large?v=v2&amp;amp;px=999" role="button" title="accel_path_d_1.PNG" alt="accel_path_d_1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;F2V&lt;/STRONG&gt;&lt;/EM&gt; - Describes "Forward to Virtual Machine" path. F2V stands for "Forward to Virtual Machine" from version R80.20 and above. These packets always belong to an existing connection, which are optimized via the SecureXL path. If a packet needs a new Rulbase look up in the SXL path, it is sent to the F2V path.&amp;nbsp;When the rule base lookup is done, the packet is reinjected into the SXL path (accelerated path).&lt;/P&gt;
&lt;P&gt;As a result, packets are reinjected with the new SecureXL ID into the correct SecureXL instance again&amp;nbsp;after they have been allowed by access template or rule set. After the packet has been reinjected, the SecureXL ID is added to the SecureXL connetion table and&amp;nbsp;the packet is forwarded to the correct SecureXL instance.&amp;nbsp;Therefore the flow is slightly different to older version before R80.20.&amp;nbsp;This new&amp;nbsp;mechanism also offers the possibility to transfer packets into a new SecureXL instance on Falcon cards.&lt;/P&gt;
&lt;P&gt;Whats new in R80.20/R80.30+:&lt;/P&gt;
&lt;P&gt;Now there are several SecureXL instances possible. As a result, there are now&amp;nbsp;&lt;STRONG&gt;eight pathes in R80.20/R80.30 and nine in R80.40&lt;/STRONG&gt; instead of &lt;STRONG&gt;six in R80.10&lt;/STRONG&gt;. (I will make a drawing with the new paths in the near future).&lt;/P&gt;
&lt;TABLE width="633px"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="322.883px" style="background-color: #c0c0c0;"&gt;
&lt;P&gt;Path&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px" style="background-color: #c0c0c0;"&gt;
&lt;P&gt;R80.10&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px" style="background-color: #c0c0c0;"&gt;
&lt;P&gt;R80.20&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6667px" style="background-color: #c0c0c0;"&gt;
&lt;P&gt;R80.30&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px" style="background-color: #c0c0c0;"&gt;
&lt;P&gt;R80.40&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px" style="background-color: #c0c0c0;"&gt;
&lt;P&gt;R81.20&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="322.883px"&gt;
&lt;P&gt;Firewall Path (F2F - slow path)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6667px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="322.883px"&gt;
&lt;P&gt;F2V (Forward to Virtual Machine)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6667px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="322.883px"&gt;
&lt;P&gt;Accelerated Path (Fast Path)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6667px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="322.883px"&gt;
&lt;P&gt;Accelerated VPN Path&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6667px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="322.883px"&gt;
&lt;P&gt;Medium Path (PXL/PSL)*&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6667px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="322.883px"&gt;
&lt;P&gt;Medium Streaming Path PXL/CPASXL*&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6667px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="322.883px"&gt;
&lt;P&gt;Inline Streaming Path PSL/CPAS*&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6667px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="322.883px"&gt;
&lt;P&gt;&amp;nbsp;Buffer Path&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6667px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="322.883px"&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; TLS Decrypt&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6667px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="322.883px"&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; TLS Parser&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6667px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="322.883px"&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; HTTP Disp&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6667px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="322.883px"&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ADVP&amp;nbsp; - Advanced Patterns&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6667px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="322.883px"&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; WS LITE&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6667px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="322.883px"&gt;
&lt;P&gt;FireWall QoS Path&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6667px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="322.883px"&gt;
&lt;P&gt;Accelerated QoS Path&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6667px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="322.883px"&gt;
&lt;P&gt;PSL inline Path&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6667px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;X&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="322.883px"&gt;
&lt;P&gt;PSL Pipeline Path&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6833px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63.6667px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="59.1px"&gt;
&lt;P&gt;new&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;BR /&gt;*)&amp;nbsp; Starting with version R80.20, the medium path is split into two paths "Medium Streaming Path" and "Inline Streaming Path"&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;PXL&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;vs.&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;PSLXL&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;- Technology name for combination of SecureXL and PSL. PXL was renamed to PSLXL in R80.20. This is from my point of view the politically correct better term.&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Packet Flow with Falcon Cards&lt;BR /&gt;&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;R80.20 SecureXL adds support for &lt;/SPAN&gt;offloading on Falcon cards from appliance to acceleration card leaving the appliance to do more.&amp;nbsp;The following flowchart shows the new R80.20/r80.30 offloaded architecture in pink.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Host Path&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- For non acceleration connections (eg. local connections) and connections on non acceleration card interface.&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="71356_pastedImage_2.png" style="width: 652px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/2960i8FD4779FEF6DE71B/image-dimensions/652x197?v=v2" width="652" height="197" role="button" title="71356_pastedImage_2.png" alt="71356_pastedImage_2.png" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Buffer path&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- For HTTP requests, HTTP response headers and TLS handshakes.&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="71357_pastedImage_3.png" style="width: 652px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/2961i0186A2742A0D5409/image-dimensions/652x194?v=v2" width="652" height="194" role="button" title="71357_pastedImage_3.png" alt="71357_pastedImage_3.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Inline path&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- For HTTP response body (until 1&lt;SUP&gt;st&lt;/SUP&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;tier match) and TLS bulk encryption/ decryption.&lt;/P&gt;
&lt;TABLE style="width: 100%; border-collapse: collapse; border-style: none;" border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="71358_pastedImage_4.png" style="width: 653px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/2962i821B0245A5FD2D37/image-dimensions/653x196?v=v2" width="653" height="196" role="button" title="71358_pastedImage_4.png" alt="71358_pastedImage_4.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD style="width: 50%; border-style: none;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;BR /&gt;For t&lt;SPAN&gt;he new acceleration Falcon card architecture with R80.20+ and SecureXL offloading read this article:&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-x-Security-Gateway-Architecture-Acceleration-Card-Offloading/td-p/41650" target="_self"&gt;R80.x Security Gateway Architecture (Acceleration Card Offloading)&lt;/A&gt;:&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;VPN&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 14.0pt;"&gt;&lt;STRONG&gt;Decrypting a packet:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;R80.10 and R80.20 introduced &lt;STRONG&gt;MultiCore support&lt;/STRONG&gt; (&lt;STRONG&gt;it is new in R80 and above&lt;/STRONG&gt;) for IPsec VPN. An IPSec packet enters the Security Gateway. The decrypted original packet is forwarded to the &lt;EM&gt;connection&lt;/EM&gt; CoreXL FW instance for FireWall inspection at Pre-Inbound chain "i" from SND. The decrypted inspected packet is sent to the OS Kernel.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 14.0pt;"&gt;&lt;STRONG&gt;Encrypting a packet:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Encryption information is prepared at Post-Outbound chain "O". The &lt;EM&gt;vpnk&lt;/EM&gt; module on the &lt;EM&gt;tunnel&lt;/EM&gt; CoreXL FW instance gets the packet &lt;STRONG&gt;before encryption&lt;/STRONG&gt; at chain &lt;STRONG&gt;"e"&lt;/STRONG&gt;. The encryption packet is forwarded to the &lt;EM&gt;connection&lt;/EM&gt; CoreXL FW instance for FireWall from SND. The packet is &lt;STRONG&gt;encrypted by &lt;EM&gt;vpnk&lt;/EM&gt; module&lt;/STRONG&gt; at chain &lt;STRONG&gt;"E"&lt;/STRONG&gt;. Afterwards the IPsec packet is sent out on interface. This fw monitor inspection points "&lt;STRONG&gt;e&lt;/STRONG&gt;" and "&lt;STRONG&gt;E&lt;/STRONG&gt;" are new in R80.10 and &lt;SPAN&gt;"oe" and "OE" are new in R80.20&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: It's true, they only exist on the outbound side for encrypting packets &lt;STRONG&gt;not for decrypting&lt;/STRONG&gt; packets on inbound side.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;R80.20 VPN+SecureXL and above:&lt;/EM&gt;&lt;/STRONG&gt; (SK151114) Disabling acceleration by running fwaccel off will not have an immediate effect on IPsec acceleration, as it did before R80.20. Using fwaccel off, will cause every existing VPN connection to continue to be processed by the acceleration module (SecureXL), and only new connections will not be offloaded to the acceleration module. As long as there are accelerated VPN connections associated with the IPsec tunnel, all decryption/encryption operations will continue to be handled by the acceleration module.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;VPN before R80.20,&lt;/STRONG&gt;&lt;/EM&gt; VPN connections could be migrated between acceleration module and Firewall-1 instances due to synchronous communication between those modules.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;VPN s&lt;/STRONG&gt;&lt;STRONG&gt;&lt;EM&gt;ince R80&lt;/EM&gt;.20&lt;/STRONG&gt;&lt;/EM&gt;, fwaccel off does not stop the SecureXL device, and the communication between SecureXL and firewall-1 is now asynchronous. All connections that were accelerated will continue to be handled by PPAK. Furthermore, when new decryption/encryption keys are generated, the decision whether to accelerate the tunnel or not depends on whether there are accelerated connections associated with the tunnel. As a result, to disable VPN tunnel acceleration all outstanding related connections should be terminated. This behavior prevents disabling acceleration of tunnels as long as accelerated connections are associated with those tunnels.&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Firewall Core&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 14.0pt;"&gt;&lt;STRONG&gt;Inbound Stateless Check:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The firewall does preliminary “stateless” checks that do not require context in order to decide whether to accept a packet or not. For instance we check that the packet is a valid packet and if the header is compliant with RFC standards.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 14.0pt;"&gt;&lt;STRONG&gt;Anti-Spoofing:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Anti-Spoofing verifies that the source IP of each packet matches the interface, on which it was encountered. On internal interfaces we only allow packets whose source IP is within the user-defined network topology. On the external interface we allow all source IPs except for ones that belong to internal networks.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 14.0pt;"&gt;&lt;STRONG&gt;Connection Setup:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;A core component of the Check Point R80.x Threat Prevention gateway is the stateful inspection firewall. A stateful firewall tracks the state of network connections in memory to identify other packets belonging to the same connection and to dynamically open connections that belong to the same session. Allowing FTP data connections using the information in the control connection is one such example. Using Check Point INSPECT code the firewall is able to dynamically recognize that the FTP control connection is opening a separate data connection to transfer data. When the client requests that the server generate the back-connection (an FTP PORT command), INSPECT code extracts the port number from the request. Both client and server IP addresses and both port numbers are recorded in an FTP-data pending request list. When the FTP data connection is attempted, the firewall examines the list and verifies that the attempt is in response to a valid request. The list of connections is maintained dynamically, so that only the required FTP ports are opened.&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;SecureXL&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;STRONG&gt;SecureXL&lt;/STRONG&gt; is a software acceleration product installed on Security Gateways. Performance Pack uses &lt;EM&gt;SecureXL&lt;/EM&gt; technology and other innovative network acceleration techniques to deliver wire-speed performance for Security Gateways. SecureXL is implemented either in software or in hardware:&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SAM cards on Check Point 21000 appliances&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ADP cards on IP Series appliances&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Falcon cards (&lt;STRONG&gt;new in R80.20&lt;/STRONG&gt;) on different appliances&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;The SecureXL device minimizes the connections that are processed by the INSPECT driver. SecureXL accelerates connections on two ways.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;EM&gt;&lt;STRONG&gt;New in R80.10&lt;/STRONG&gt;&lt;/EM&gt;:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black; font-size: 15px;"&gt;In R80.10 SecureXL adds support for Domain Objects, Dynamic Objects and Time Objects. CoreXL accelerates VPN traffic by distributing Next Generation Threat Prevention inspection across multiple cores.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black; font-size: 15px;"&gt;&lt;STRONG&gt;&lt;EM&gt;New in R80.20&lt;/EM&gt;&lt;/STRONG&gt;:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: black; font-size: 15px;"&gt;SecureXL was &lt;SPAN style="font-size: 15px;"&gt;significantly&lt;/SPAN&gt; revised in R80.20. It no longer works in Linux kernel mode but now in user space. In kernel mode&amp;nbsp; resources (for example memory) are very limited. This has the advantage that more resources can be used in user space.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The SecureXL driver takes a certain amount of kernel memory&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;per core&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;and that was adding up to more kernel memory than Intel/Linux was allowing. On the 23900 in particular, we could not leverage all the processor cores due to this limitation. By moving all or most of SecureXL to user space, it's possible to leverage more processor cores as the firewall can entirely run in user space.It still doesn't by default in R80.20 in non-VSX mode, but it can be enabled.&lt;/P&gt;
&lt;DIV class=""&gt;
&lt;P&gt;&amp;nbsp;It also means certain kinds of low-level packet processing that could not easily be done in SecureXL because it was being done in the kernel now can. For VSX in particular, it means you can now configure the penalty box features on a per-VS basis. It also improves session establishment rates on the higher-end appliances.&lt;/P&gt;
&lt;/DIV&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black; font-size: 15px;"&gt;In addition, the following functions have been integrated in R80.20 SecureXL:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SecureXL on Acceleration Cards (AC)&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Streaming over SecureXL&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lite Parsers&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Async SecureXL&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scalable SecureXL&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Acceleration stickiness&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Policy push acceleration&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;EM&gt;&lt;STRONG&gt;Throughput Acceleration&lt;/STRONG&gt;&lt;/EM&gt; - The first packets of a new TCP connection require more processing when processed by the firewall module. If the connection is eligible for acceleration, after minimal security processing the packet is offloaded to the SecureXL device associated with the proper egress interface. Subsequent packets of the connection can be processed on the accelerated path and directly sent from the inbound to the outbound interface via the SecureXL device.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;EM&gt;&lt;STRONG&gt;Connection Rate Acceleration&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt; SecureXL also improves the rate of new connections (connections per second) and the connection setup/teardown rate (sessions per second). To accelerate the rate of new connections, connections that do not match a specified 5 tuple are still processed by SecureXL. For example, if the source port is masked and only the other 4 tuple attributes require a match. When a connection is processed on the accelerated path, SecureXL creates a template of that connection that does not include the source port tuple. A new connection that matches the other 4 tuples is processed on the accelerated path because it matches the template. The firewall module does not inspect the new connection, increasing firewall connection rates.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 15px;"&gt;SecureXL and the firewall module keep their own state tables and communicate updates to each other.&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="font-size: 15px;"&gt;Connection notification - SecureXL passes the relevant information about accelerated connections that match an accept template.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-size: 15px;"&gt;Connection offload - Firewall kernel passes the relevant information about the connection from firewall connections table to SecureXL connections table.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;In addition to accept templates the SecureXL device is also able to apply drop templates which are derived from security rules where the action is drop. In addition to firewall security policy enforcement, SecureXL also accelerates NAT, and IPsec VPN traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;QXL&lt;/EM&gt;&lt;/STRONG&gt; - Technology name for combination of SecureXL and QoS (R77.10 and above).&lt;SPAN style="font-size: 15px;"&gt;This has no direct association with PXL. It is used exclusively for QoS. But also here it is possible to use the QoS path in combination with PSL.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;SAM card&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp; and &lt;EM&gt;&lt;STRONG&gt;Falcon card&lt;/STRONG&gt;&lt;/EM&gt; (R80.20 and above) - Security Acceleration Module card. Connections that use SAM/Falcon card, are accelerated by SecureXL and are processed by the SAM/Falcon card's CPU instead of the main CPU (refer to &lt;A href="http://downloads.checkpoint.com/dc/download.htm?ID=18043" target="_blank" rel="noopener"&gt;21000 Appliance Security Acceleration Module Getting Started Guide)&lt;/A&gt;).&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;SecureXL use the following templates:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If templating is used under SecureXL, the templates are created when the firewall ruleset is installed.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Accept Template&lt;/EM&gt;&lt;/STRONG&gt; - Feature that accelerates the speed, at which a connection is established by matching a new connection to a set of attributes. When a new connection matches the Accept Template, subsequent connections are established without performing a rule match and therefore are accelerated. Accept Templates are generated from active connections according to policy rules. Currently, Accept Template acceleration is performed only on connections with the &lt;STRONG&gt;same&lt;/STRONG&gt; destination port (using wildcards for source ports).&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Accept Tamplate is enabled by default if SecureXL is used.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Drop Template&lt;/EM&gt;&lt;/STRONG&gt; - Feature that accelerates the speed, at which a connection is dropped by matching a new connection to a set of attributes. When a new connection matches the Drop Template, subsequent connections are dropped without performing a rule match and therefore are accelerated. Currently, Drop Template acceleration is performed only on connections with the &lt;STRONG&gt;same&lt;/STRONG&gt; destination port (does not use wildcards for source ports).&lt;BR /&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Drop Template is disabled by default if SecureXL is used. It can be activated via smart Dashboard and does not require a reboot of the firewall.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;STRONG&gt;&lt;EM&gt;NAT Templates&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;SPAN style="font-size: 11.0pt;"&gt;- Using SecureXL Templates for NAT traffic is critical to achieve high session rate for NAT. SecureXL Templates are supported for Static NAT and Hide NAT using the existing SecureXL Templates mechanism. Normally the first packet would use the F2F path. However, if SecureXL is used, the first packet will not be forwarded to the F2F path if Accept Tamplate and NAT Template match. Enabling or disabling of NAT Templates requires a firewall reboot.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;R80.10 and lower:&amp;nbsp; NAT Template is disabled by default.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;R80.20 and above: NAT Template is enabled by design.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 14.0pt;"&gt;&lt;STRONG&gt;SecureXL path:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Fast path (Accelerated Path)&lt;/EM&gt;&lt;/STRONG&gt; - Packet flow when the packet is completely handled by the SecureXL device. It is processed and forwarded to the network.&lt;BR /&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; In many discusions and images, the SXL path is marked with the "accelerated path". This also happened to me by mistake in this flowchart.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Medium path&lt;/EM&gt;&lt;/STRONG&gt; (&lt;STRONG&gt;PXL&lt;/STRONG&gt;) - The CoreXL layer passes the packet to one of the CoreXL FW instances to perform the processing (even when CoreXL is disabled, the CoreXL infrastructure is used by SecureXL device to send the packet to the single FW instance that still functions). When Medium Path is available, TCP handshake is fully accelerated with SecureXL. Rulebase match is achieved for the first packet through an existing connection acceleration template. SYN-ACK and ACK packets are also fully accelerated. However, once data starts flowing, to stream it for Content Inspection, the packets will be now handled by a FWK instance. Any packets containing data will be sent to FWK for data extraction to build the data stream. RST, FIN and FIN-ACK packets once again are only handled by SecureXL as they do not contain any data that needs to be streamed. This path is available only when CoreXL is enabled.&lt;/P&gt;
&lt;P&gt;Packet flow when the packet is handled by the SecureXL device, except for:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;IPS (some protections)&lt;/LI&gt;
&lt;LI&gt;VPN (in some configurations)&lt;/LI&gt;
&lt;LI&gt;Application Control&lt;/LI&gt;
&lt;LI&gt;Content Awareness&lt;/LI&gt;
&lt;LI&gt;Anti-Virus&lt;/LI&gt;
&lt;LI&gt;Anti-Bot&lt;/LI&gt;
&lt;LI&gt;HTTPS Inspection&lt;/LI&gt;
&lt;LI&gt;Proxy mode&lt;/LI&gt;
&lt;LI&gt;Mobile Access&lt;/LI&gt;
&lt;LI&gt;VoIP&lt;/LI&gt;
&lt;LI&gt;Web Portals.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;EM&gt;&lt;STRONG&gt;PXL&lt;/STRONG&gt;&lt;/EM&gt; vs. &lt;EM&gt;&lt;STRONG&gt;PSLXL&lt;/STRONG&gt;&lt;/EM&gt; - Technology name for combination of SecureXL and PSL. PXL was renamed to PSLXL in R80.20. This is from my point of view the politically correct better term.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;EM&gt;&lt;STRONG&gt;Medium path (CPASXL)&lt;/STRONG&gt;&lt;/EM&gt; - Now also CPAS use the SecureXL path in R80.20. CPAS works through the F2F path in R80.10 and R77.30. Now CPASXL is offered in SecureXL path in R80.20. This should lead to a higher performance. &lt;SPAN style="color: #4e4e4e; font-size: 15px;"&gt;Check Point Active Streaming active streaming allow the changing of data and play the role of “man in the middle”. Several protocols uses CPAS, for example: Client Authentication, VoIP (SIP, Skinny/SCCP, H.323, etc.), Data Leak Prevention (DLP) blade, Security Servers processes, etc. I think it's not to be underestimated in tuning.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Slow path&lt;/EM&gt;&lt;/STRONG&gt; &amp;nbsp;or &lt;STRONG&gt;&lt;EM&gt;Firewall path&lt;/EM&gt;&lt;/STRONG&gt; (&lt;STRONG&gt;F2F&lt;/STRONG&gt;) - Packet flow when the SecureXL device is unable to process the packet. The packet is passed on to the CoreXL layer and then to one of the Core FW instances for full processing. This path also processes all packets when SecureXL is disabled.&lt;/P&gt;
&lt;P&gt;New in R80.20:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Inline Streaming&lt;/STRONG&gt; path&lt;STRONG&gt;, Medium Streaming&lt;/STRONG&gt; path&lt;STRONG&gt;,&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt; &lt;STRONG&gt;&lt;EM&gt;Host&lt;/EM&gt;&lt;/STRONG&gt; &lt;EM&gt;p&lt;/EM&gt;&lt;EM&gt;ath&lt;/EM&gt; and &lt;STRONG&gt;&lt;EM&gt;Buffer&lt;/EM&gt;&lt;/STRONG&gt; &lt;EM&gt;path&lt;/EM&gt; - Are new SecureXL paths used in conjunction with Falcon cards. They are described in more detail in the following article "&lt;A href="https://community.checkpoint.com/docs/DOC-3190" target="_blank" rel="noopener"&gt;R80.x Security Gateway Architecture (Acceleration Card Offloading)&lt;/A&gt; ".&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;PSL inline&lt;/STRONG&gt;&lt;/EM&gt; - “PSL inline” refers to the legacy Falcon Cards. This flow is deprecated and the statistics will be removed in R81.20 and JHFs. This stat will always show as 0 as well.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;New in R81.20:&lt;BR /&gt;&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;BR /&gt;PSL pipeline&lt;/STRONG&gt;&lt;/EM&gt; - PSL pipeline refers to packets passing through Pipeline processing path and handled by PSL. A connection which is handled by more than one CPU (unlike in other paths in which a connection is handled by a dedicated CPU). Preparations for this infra were first introduced over R80.40.&lt;BR /&gt;The project is targeted for R81.20 (would be also ported to several JHFs), its main goal is to allow better utilization of the systems resources to tackle elephant flows scenarios in NGTP env. at first stage (content would be expanding over future releases)&lt;BR /&gt;Project is due to start EA phase soon (refer to article &lt;A href="https://community.checkpoint.com/t5/General-Topics/PSL-inline-vs-pipeline/m-p/127255#M23295" target="_self"&gt;PSL inline vs pipeline&lt;/A&gt;).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note to Falcon Cards:&lt;/STRONG&gt; Theoretically and practically there are even more than these three paths. This has to do with the offloading of SAM and Falcon cards (new in R80.20)&amp;nbsp; and with QXL (Quality of Service) and other SecureXL technologies. It's beyond the scope of this one.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Fast Accelerator&lt;/EM&gt;&lt;/STRONG&gt; - The Fast Acceleration feature (green) lets you define trusted connections to allow bypassing deep packet inspection on R80.20 JHF103 and above gateways. This feature significantly improves throughput for these trusted high volume connections and reduces CPU consumption.&lt;/P&gt;
&lt;P&gt;The CLI of the gateway can be used to create rules that allow you to bypass the SecureXL PSLXL path to route all connections through the fast path.&amp;nbsp;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fast_accel_3.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/3159i78B36665481448CB/image-size/large?v=v2&amp;amp;px=999" role="button" title="fast_accel_3.PNG" alt="fast_accel_3.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;SecureXL chain modules (new in R80.20 and above)&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;SecureXL has been significantly revised in R80.20. It now works in user space.&amp;nbsp;This has also led to some changes in "fw monitor"&lt;/P&gt;
&lt;P&gt;There are new fw monitor chain (SecureXL) objects that do not run in the virtual machine.&lt;/P&gt;
&lt;P&gt;The new fw monitor chain modules&amp;nbsp;(SecureXL) do not run in the virtual machine (vm).&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;STRONG&gt;SecureXL inbound (sxl_in)&lt;/STRONG&gt;&lt;/SPAN&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt; Packet received in SecureXL from network&lt;BR /&gt;&lt;SPAN style="color: #000000;"&gt;&lt;STRONG&gt;SecureXL inbound CT (sxl_ct)&lt;/STRONG&gt;&amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;gt; Accelerated packets moved from inbound to outbound processing (post routing)&lt;BR /&gt;&lt;SPAN style="color: #000000;"&gt;&lt;STRONG&gt;SecureXL outbound (sxl_out)&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;gt; Accelerated packet starts outbound processing&lt;BR /&gt;&lt;SPAN style="color: #000000;"&gt;&lt;STRONG&gt;SecureXL deliver (sxl_deliver)&lt;/STRONG&gt;&lt;/SPAN&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt; SecureXL transmits accelerated packet&lt;/P&gt;
&lt;P&gt;There are more new chain modules in R80.20&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #000000;"&gt;vpn before offload (vpn_in)&lt;/SPAN&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt; FW inbound preparing the tunnel for offloading the packet (along with the connection)&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #000000;"&gt;fw offload inbound (offload_in)&lt;/SPAN&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt; FW inbound that perform the offload&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #000000;"&gt;fw post VM inbound&amp;nbsp; (post_vm)&lt;/SPAN&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt; Packet was not offloaded (slow path) - continue processing in FW inbound&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;CoreXL&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;CoreXL is a performance-enhancing technology for Security Gateways on multi-CPU-core processing platforms. CoreXL enhances Security Gateway performance by enabling the processing CPU cores to concurrently perform multiple tasks. CoreXL provides almost linear scalability of performance, according to the number of processing CPU cores on a single machine. The increase in performance is achieved without requiring any changes to management or to network topology.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;On a Security Gateway with CoreXL enabled, the Firewall kernel is replicated multiple times. Each replicated copy, or FW instance, runs on one processing CPU core. These FW instances handle traffic concurrently, and each FW instance is a complete and independent FW inspection kernel. When CoreXL is enabled, all the FW kernel instances in the Security Gateway process traffic through the same interfaces and apply the same security policy.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;R80.20 CoreXL does not support these Check Point features: Overlapping NAT, VPN Traditional Mode,&amp;nbsp; 6in4 traffic - this traffic is always processed by the global CoreXL FW instance #0 (fw_worker_0) and more (see &lt;A title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk61701" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk61701" target="_blank" rel="noopener"&gt;CoreXL Known Limitations&lt;/A&gt;).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG&gt;&lt;EM&gt;Secure Network Distributor&lt;/EM&gt;&lt;/STRONG&gt; (&lt;STRONG&gt;SND&lt;/STRONG&gt;) - Traffic entering network interface cards (NICs) is directed to a processing CPU core running the SND, which is responsible for:&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Processing incoming traffic from the network interfaces&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Securely accelerating authorized packets (if SecureXL is enabled)&lt;/LI&gt;
&lt;LI style="text-indent: -18.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Distributing non-accelerated packets among Firewall kernel instances (SND maintains global dispatching table - which connection was assigned to which instance)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;SND does not really touch any packet. The decision to stick to a particular FWK core is done at the first packet of connection on a very high level before anything else. Depending on SXL settings and in most of the cases, SXL can be offloading decryption calculations. However, in some other cases, such as with Route-Based VPN, it is done by FWK.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Firewall Instance&lt;/EM&gt;&lt;/STRONG&gt; &lt;STRONG&gt;&lt;EM&gt;(fw_worker) -&lt;/EM&gt;&lt;/STRONG&gt; On a Security Gateway with CoreXL enabled, the Firewall kernel is replicated multiple times. Each replicated copy, or Firewall Instance, runs on one CPU processing core. These FW instances handle traffic concurrently, and each FW instance is a complete and independent Firewall inspection kernel. When CoreXL is enabled, all the Firewall kernel instances on the Security Gateway process traffic through the same interfaces and apply the same security policy.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Dynamic Dispat&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG&gt;cher -&lt;/STRONG&gt; Rather than statically assigning new connections to a CoreXL FW instance based on packet's IP addresses and IP protocol (static hash function), the new dynamic assignment mechanism is based on the utilization of CPU cores, on which the CoreXL FW instances are running. The dynamic decision is made for first packets of connections, by assigning each of the CoreXL FW instances a rank, and selecting the CoreXL FW instance with the &lt;EM&gt;lowest&lt;/EM&gt; rank. The rank&lt;/P&gt;
&lt;P&gt;for each CoreXL FW instance is calculated according to its CPU utilization. The higher the CPU utilization, the higher the CoreXL FW instance's rank is, hence this CoreXL FW instance is less likely to be selected by the CoreXL SND. The CoreXL Dynamic Dispatcher allows for better load distribution and helps mitigate connectivity issues during traffic "peaks", as connections opened at a high rate that would have been assigned to the same CoreXL FW instance by a static decision, will now be distributed to several CoreXL FW instances.&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;&lt;STRONG&gt;&lt;EM&gt;Multi Queue&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;SPAN style="color: black;"&gt;- Network interfaces on a security gateway typically receive traffic at different throughputs; some are busier than others. At a low level, when a packet is received from the NIC, then a CPU core must be “interrupted” to the exclusion of all other processes, in order to receive the packet for processing. To avoid bottlenecks we allow multiple buffers, and therefore CPU cores, to be affined to an interface. Each affined buffer can “interrupt” its own CPU core allowing high volumes of inbound packets to be shared across multiple dispatchers.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;When most of the traffic is accelerated by the SecureXL, the CPU load from the CoreXLSND instances can be very high, while the CPU load from the CoreXL FW instances can be very low. This is an inefficient utilization of CPU capacity. By default, the number of CPU cores allocated to CoreXL SND instances is limited by the number of network interfaces that handle the traffic. Because each interface has one traffic queue, only one CPU core can handle each traffic queue at a time. This means that each CoreXL SND instance can use only one CPU core at a time for each network interface. Check Point Multi-Queue lets you configure more than one traffic queue for each network interface. For each interface, you can use more than one CPU core (that runs CoreXL SND) for traffic acceleration. This balances the load efficiently between the CPU cores that run the CoreXL SND instances and the CPU cores that run CoreXL FW instances.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;&lt;EM&gt;&lt;STRONG&gt;Priority Queues&lt;/STRONG&gt;&lt;/EM&gt; -&amp;nbsp; In some situations a security gateway can be overwhelmed; in circumstances where traffic levels exceed the capabilities of the hardware, either legitimate traffic or from a DOS attack, it is vital that we can maintain management communications and continue to interact with dynamic routing neighbors. The Priority Queues functionality prioritizes control connections over data connections based on priority.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin-bottom: 12.0pt;"&gt;&lt;STRONG&gt;&lt;EM&gt;Affinity&lt;/EM&gt;&lt;/STRONG&gt; - Association of a particular network interface / FW kernel instance / daemon with a CPU core (either 'Automatic' (default), or 'Manual'). The default CoreXL interface affinity setting for all interfaces is 'Automatic' when SecureXL is installed and enabled. If SecureXL is &lt;EM&gt;enabled&lt;/EM&gt; - the default affinities of all interfaces are 'Automatic' - the affinity for each interface is automatically reset every 60 seconds, and balanced between available CPU cores based on the current load. If SecureXL is &lt;EM&gt;disabled&lt;/EM&gt; - the default affinities of all interfaces are with available CPU cores - those CPU cores that are not running a CoreXL FW instance or not defined as the affinity for a daemon.&lt;/P&gt;
&lt;P&gt;The association of a particular interface with a specific processing CPU core is called the interface's affinity with that CPU core. This affinity causes the interface's traffic to be directed to that CPU core and the CoreXL SND to run on that CPU core. The association of a particular CoreXL FW instance with a specific CPU core is called the CoreXL FW instance's affinity with that CPU core. The association of a particular user space process with a specific CPU core is called the process's affinity with that CPU core. The default affinity setting for all interfaces is Automatic. Automatic affinity means that if SecureXL is enabled, the affinity for each interface is reset periodically and balanced between the available CPU cores. If SecureXL is disabled, the default affinities of all interfaces are with one available CPU core. In both cases, all processing CPU cores that run a CoreXL FW instance, or defined as the affinity for another user space process, is considered unavailable, and the affinity for interfaces is not set to those CPU cores.&lt;/P&gt;
&lt;P&gt;The default affinity setting for all interfaces is Automatic. Automatic affinity means that if SecureXL is enabled, the affinity for each interface is reset periodically and balanced between the available CPU cores. If SecureXL is disabled, the default affinities of all interfaces are with one available CPU core. In both cases, all processing CPU cores that run a CoreXL FW instance, or defined as the affinity for another user space process, is considered unavailable, and the affinity for interfaces is not set to those CPU cores.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Passive Streaming Library&lt;/EM&gt;&lt;/STRONG&gt; (&lt;STRONG&gt;PSL&lt;/STRONG&gt;) - IPS infrastructure, which transparently listens to TCP traffic as network packets, and rebuilds the TCP stream out of these packets. Passive Streaming can listen to all TCP traffic, but process only the data packets, which belong to a previously registered connection.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;PXL&lt;/EM&gt;&lt;/STRONG&gt; - Technology name for combination of SecureXL and PSL.&lt;/P&gt;
&lt;P&gt;The maximal number of possible CoreXL IPv4 FW in &lt;STRONG&gt;kernel mode&lt;/STRONG&gt; instances:&lt;/P&gt;
&lt;TABLE style="text-align: center; width: 497px;"&gt;
&lt;TBODY&gt;
&lt;TR style="background-color: lightgray;"&gt;
&lt;TD style="width: 176px;"&gt;Version&lt;/TD&gt;
&lt;TD style="width: 156px;"&gt;Check Point Appliance&lt;/TD&gt;
&lt;TD style="width: 143px;"&gt;Open Server&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 176px;"&gt;R80.10 (Gaia 32-bit)&lt;/TD&gt;
&lt;TD style="width: 156px;"&gt;16&lt;/TD&gt;
&lt;TD style="width: 143px;"&gt;16&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 176px;"&gt;R80.10 (Gaia 64-bit)&lt;/TD&gt;
&lt;TD style="width: 156px;"&gt;40&lt;/TD&gt;
&lt;TD style="width: 143px;"&gt;40&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 176px;"&gt;R77.30 (Gaia 32-bit)&lt;/TD&gt;
&lt;TD style="width: 156px;"&gt;16&lt;/TD&gt;
&lt;TD style="width: 143px;"&gt;16&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 176px;"&gt;R77.30 (Gaia 64-bit)&lt;/TD&gt;
&lt;TD style="width: 156px;"&gt;32&lt;/TD&gt;
&lt;TD style="width: 143px;"&gt;32&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;EM&gt;USFW&lt;/EM&gt; -&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;In kernel-mode FW, the maximum number of running cores is limited to 40 because of the Linux/Intel limitation of 2GB kernel memory, and because CoreXL architecture needs to load a large driver (~40MB) dozens of times (according to the CPU number, and up to 40 times). Newer platforms that contain more than 40 cores (e.g., 23900) are not fully utilized. Now it is possible to use more then 40 CoreXL cores in R80.10+ user mode firewall. For more informations see &lt;SPAN&gt;sk149973,&lt;/SPAN&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Management&lt;/STRONG&gt;&lt;/EM&gt;&lt;STRONG&gt; Core&lt;/STRONG&gt; - New i&lt;SPAN&gt;n R80.30+, you can also allocate a core for management traffic if you have 8 or more cores licensed, but this is not the default.&amp;nbsp;&lt;/SPAN&gt;R80.30+ feature for separating management from data traffic via Routing Separation and Resource Separation as described in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk138672" target="_self" rel="nofollow noopener noreferrer"&gt;sk138672&lt;/A&gt;.&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;CoreXL vs. SND&lt;BR /&gt;&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;BR /&gt;CPU cores are divided into two groups: SND and Firewall instances (CoreXL). Each group handles different tasks.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Tasks distribution:&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px" style="background-color: #c0c0c0;"&gt;Task&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px" style="background-color: #c0c0c0;"&gt;R80.10&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px" style="background-color: #c0c0c0;"&gt;R80.20+&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Soft IRQ processing&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;SND&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;SND&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Multi-Queue&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;SND&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;SND&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;TPUT acceleration &amp;amp; Path determination&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;SND&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Firewall&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="47px"&gt;Accept templates matching (new connection) &amp;amp; offload to SecureXL&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="47px"&gt;SND&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="47px"&gt;Firewall&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="47px"&gt;Nat templates matching (new connection) &amp;amp; offload to SecureXL&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="47px"&gt;SND&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="47px"&gt;Firewall&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="47px"&gt;SecureXL/Acceleration path packet handling&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="47px"&gt;SND&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="47px"&gt;SND&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Dynamic dispatcher&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px" style="width: 587.219px; height: 21px;"&gt;SND&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px" style="width: 124.219px; height: 21px;"&gt;SND&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="47px"&gt;Fragmentation - IP fragments always sent F2F&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="47px"&gt;SND&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="47px"&gt;N/A&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="47px"&gt;Fragmentation - Virtual reassembly of IP fragments (non-accelerated)&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="47px"&gt;Firewall&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="47px"&gt;Firewall&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="47px"&gt;Fragmentation - Virtual reassembly of IP fragments (accelerated)&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="47px"&gt;Firewall&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="47px"&gt;SND&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;QoS - Traffic handling (non-accelerated)&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px" style="width: 587.219px; height: 21px;"&gt;Firewall&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px" style="width: 124.219px; height: 21px;"&gt;Firewall&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;QoS - Traffic handling (accelerated)&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Firewall&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;SND&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Rule base matching (non-accelerated)&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Firewall&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Firewall&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Rule base matching (accelerated)&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;N/A&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;SND&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;PSLXL path packets handling&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Firewall&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Firewall&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;F2F path (+CPAS)&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Firewall&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Firewall&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;PSLXL, CPASXL paths&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Firewall&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Firewall&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Priority queue (when enabled)&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Firewall&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="25px"&gt;Firewall&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;R80.40+ (automatically changes CoreXL, SNDˋs and the Multi-Queue)&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;New in R80.40+&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/EM&gt;Support for automatic allocation of CoreXL SNDs and Firewall instances that does not require a Security Gateway reboot.&lt;BR /&gt;&lt;STRONG&gt;CoreXL and Multi-Queue:&lt;/STRONG&gt; Improved out of the box experience - Security Gateway &lt;FONT color="#000000"&gt;&lt;STRONG&gt;automatically changes the number of CoreXL SNDs and Firewall instances and the Multi-Queue&lt;/STRONG&gt;&lt;/FONT&gt; configuration based on the current traffic load. Changing CoreXL split between FW workers and SND on the fly based on CPU utilization&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Deciding keys:&lt;U&gt;&lt;BR /&gt;&lt;/U&gt;&lt;/STRONG&gt;The average utilization of CoreXL SNDs and FWs are regularly sampled. If either CoreXL SNDs or FWs utilization is higher than the other, perform an estimate of utilization post “migrating” a CPU to the other group.&amp;nbsp; Note when SMT is on, change is doubled.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Supported on OS 3.10 (USFW/Kernel). Check Point appliances with 8 cores or more and VSX is currently a limitation.&amp;nbsp;Supported on Cluster HA and VSLS is currently a limitation.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Flows:&lt;U&gt;&lt;BR /&gt;&lt;/U&gt;&lt;/STRONG&gt;If more SNDs are needed:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Find least utilized CoreXL FW instance&lt;/LI&gt;
&lt;LI&gt;Stop dispatching new connections to the least utilized CoreXL FW instance&lt;/LI&gt;
&lt;LI&gt;Move the CoreXL FW instance to the CPU of next least utilized CoreXL FW instance&lt;/LI&gt;
&lt;LI&gt;Turn on a new MQ queue on the “evicted” CPU&lt;BR /&gt;Note: Eligible CoreXL SNDs must have a MQ queue ready&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;If more FWs (CoreXL) are needed:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Choose the last “stopped” CoreXL FW instance&lt;/LI&gt;
&lt;LI&gt;Turn off MQ queue from the CPU it originally occupied&lt;/LI&gt;
&lt;LI&gt;Move the chosen CoreXL FW instance to the original CPU it occupied&lt;/LI&gt;
&lt;LI&gt;Start dispatching new connections to that CoreXL FW instance&lt;BR /&gt;Note: No more than the maximum number of FWs can be added&lt;/LI&gt;
&lt;/OL&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;FW Monitor Inspection Points&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 14.0pt;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;There are&amp;nbsp;new fw monitor inspection points (red) when a packet passes through a R80.20+ Security Gateway:&lt;/P&gt;
&lt;TABLE class="j-table jiveBorder" style="border: 1px solid #c6c6c6;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR style="background-color: #efefef; height: 25px;"&gt;
&lt;TH style="width: 10%; height: 25px;"&gt;Inspection point&lt;/TH&gt;
&lt;TH style="width: 22%; height: 25px;"&gt;Name of fw monitor inspection point&lt;/TH&gt;
&lt;TH style="width: 53.6022%; height: 25px;"&gt;Relation to firewall VM&lt;/TH&gt;
&lt;TH style="width: 59.3978%; height: 25px;"&gt;Available since version&lt;/TH&gt;
&lt;/TR&gt;
&lt;TR style="height: 27px;"&gt;
&lt;TD style="width: 10%; height: 27px;"&gt;i&lt;/TD&gt;
&lt;TD style="width: 22%; height: 27px;"&gt;Pre-Inbound&lt;/TD&gt;
&lt;TD style="width: 53.6022%; height: 27px;"&gt;Before the inbound FireWall VM &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; (for example, &lt;CODE class=""&gt;eth1:i&lt;/CODE&gt;)&lt;/TD&gt;
&lt;TD style="width: 59.3978%; height: 27px;"&gt;always&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 27px;"&gt;
&lt;TD style="width: 10%; height: 27px;"&gt;I&lt;/TD&gt;
&lt;TD style="width: 22%; height: 27px;"&gt;Post-Inbound&lt;/TD&gt;
&lt;TD style="width: 53.6022%; height: 27px;"&gt;After the inbound FireWall VM&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (for example, &lt;CODE class=""&gt;eth1:I&lt;/CODE&gt;)&lt;/TD&gt;
&lt;TD style="width: 59.3978%; height: 27px;"&gt;always&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 27px;"&gt;
&lt;TD style="width: 10%; height: 27px;"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;id&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 22%; height: 27px;"&gt;Pre-Inbound VPN&lt;/TD&gt;
&lt;TD style="width: 53.6022%; height: 27px;"&gt;Inbound before decrypt&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (for example, &lt;CODE class=""&gt;eth1:id&lt;/CODE&gt;)&lt;/TD&gt;
&lt;TD style="width: 59.3978%; height: 27px;"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;R80.20&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 27px;"&gt;
&lt;TD style="width: 10%; height: 27px;"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;ID&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 22%; height: 27px;"&gt;Post-Inbound VPN&lt;/TD&gt;
&lt;TD style="width: 53.6022%; height: 27px;"&gt;Inbound after decrypt&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (for example, &lt;CODE class=""&gt;eth1:ID&lt;/CODE&gt;)&lt;/TD&gt;
&lt;TD style="width: 59.3978%; height: 27px;"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;R80.20&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 27px;"&gt;
&lt;TD style="width: 10%; height: 27px;"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;iq&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 22%; height: 27px;"&gt;Pre-Inbound QoS&lt;/TD&gt;
&lt;TD style="width: 53.6022%; height: 27px;"&gt;Inbound before QoS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (for example, &lt;CODE class=""&gt;eth1:iq&lt;/CODE&gt;)&lt;/TD&gt;
&lt;TD style="width: 59.3978%; height: 27px;"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;R80.20&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 27px;"&gt;
&lt;TD style="width: 10%; height: 27px;"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;IQ&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 22%; height: 27px;"&gt;Post-Inbound QoS&lt;/TD&gt;
&lt;TD style="width: 53.6022%; height: 27px;"&gt;Inbound after QoS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (for example, &lt;CODE class=""&gt;eth1:IQ&lt;/CODE&gt;)&lt;/TD&gt;
&lt;TD style="width: 59.3978%; height: 27px;"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;R80.20&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 27px;"&gt;
&lt;TD style="width: 10%; height: 27px;"&gt;o&lt;/TD&gt;
&lt;TD style="width: 22%; height: 27px;"&gt;Pre-Outbound&lt;/TD&gt;
&lt;TD style="width: 53.6022%; height: 27px;"&gt;Before the outbound FireWall VM&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (for example, &lt;CODE class=""&gt;eth1:o&lt;/CODE&gt;)&lt;/TD&gt;
&lt;TD style="width: 59.3978%; height: 27px;"&gt;always&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 27px;"&gt;
&lt;TD style="width: 10%; height: 27px;"&gt;O&lt;/TD&gt;
&lt;TD style="width: 22%; height: 27px;"&gt;Post-Outbound&lt;/TD&gt;
&lt;TD style="width: 53.6022%; height: 27px;"&gt;After the outbound FireWall VM&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (for example, &lt;CODE class=""&gt;eth1:O&lt;/CODE&gt;)&lt;/TD&gt;
&lt;TD style="width: 59.3978%; height: 27px;"&gt;always&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 27px;"&gt;
&lt;TD style="width: 10%; height: 27px;"&gt;
&lt;P&gt;&lt;SPAN style="color: #33cccc;"&gt;&lt;STRONG&gt;e&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;oe&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 22%; height: 27px;"&gt;Pre-Outbound VPN&lt;/TD&gt;
&lt;TD style="width: 53.6022%; height: 27px;"&gt;
&lt;P&gt;Outbound before encrypt&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (for example, &lt;CODE class=""&gt;eth1:e&lt;/CODE&gt;)&amp;nbsp;&amp;nbsp;&amp;nbsp; in R80.10&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (for example, &lt;CODE class=""&gt;eth1:oe&lt;/CODE&gt;)&amp;nbsp; in R80.20&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 59.3978%; height: 27px;"&gt;
&lt;P&gt;&lt;SPAN style="color: #00ccff;"&gt;&lt;STRONG&gt;R80.10&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;R80.20&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 27px;"&gt;
&lt;TD style="width: 10%; height: 27px;"&gt;
&lt;P&gt;&lt;SPAN style="color: #33cccc;"&gt;&lt;STRONG&gt;E&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;OE&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 22%; height: 27px;"&gt;Post-Outbound VPN&lt;/TD&gt;
&lt;TD style="width: 53.6022%; height: 27px;"&gt;
&lt;P&gt;Outbound after encrypt &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; (for example, &lt;CODE class=""&gt;eth1:E&lt;/CODE&gt;)&amp;nbsp;&amp;nbsp;&amp;nbsp; in R80.10&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (for example, &lt;CODE class=""&gt;eth1:OE&lt;/CODE&gt;)&amp;nbsp; in R80.20&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 59.3978%; height: 27px;"&gt;
&lt;P&gt;&lt;SPAN style="color: #33cccc;"&gt;&lt;STRONG&gt;R80.10&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;R80.20&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 27px;"&gt;
&lt;TD style="width: 10%; height: 27px;"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;oq&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 22%; height: 27px;"&gt;Pre-Outbound QoS&lt;/TD&gt;
&lt;TD style="width: 53.6022%; height: 27px;"&gt;Outbound before QoS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (for example, &lt;CODE class=""&gt;eth1:oq&lt;/CODE&gt;)&lt;/TD&gt;
&lt;TD style="width: 59.3978%; height: 27px;"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;R80.20&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 27px;"&gt;
&lt;TD style="width: 10%; height: 27px;"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;OQ&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 22%; height: 27px;"&gt;Post-Outbound QoS&lt;/TD&gt;
&lt;TD style="width: 53.6022%; height: 27px;"&gt;Outbound after QoS &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; (for example, &lt;CODE class=""&gt;eth1:OQ&lt;/CODE&gt;)&lt;/TD&gt;
&lt;TD style="width: 59.3978%; height: 27px;"&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;R80.20&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The "&lt;SPAN style="color: black;"&gt;Pre-Encrypt&lt;/SPAN&gt;" fw monitor inspection point (e) and the "&lt;SPAN style="color: black;"&gt;Post-Encrypt"&lt;/SPAN&gt; fw monitor inspection point (E) are new in R80 and &lt;SPAN&gt;above.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: It's true, they only exist on the outbound side for encrypting packets &lt;STRONG&gt;not for decrypting&lt;/STRONG&gt; packets on inbound side.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;New in R80.20+:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In Firewall kernel (now also SecureXL), each kernel is associated with a key witch specifies the type of traffic applicable to the chain modul.&lt;/P&gt;
&lt;P&gt;# &lt;STRONG&gt;fw ctl chain&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;TABLE class="j-table jiveBorder" style="border: 1px solid #c6c6c6; width: 45.8412%;"&gt;
&lt;THEAD&gt;
&lt;TR style="background-color: #efefef;"&gt;
&lt;TH style="width: 12%;"&gt;Key&lt;/TH&gt;
&lt;TH style="width: 30.8412%;"&gt;Function&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="width: 12%;"&gt;&lt;SPAN style="font-family: terminal, monaco, monospace;"&gt;&lt;STRONG&gt;ffffffff&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 30.8412%;"&gt;all packets&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 12%;"&gt;&lt;SPAN style="font-family: terminal, monaco, monospace;"&gt;&lt;STRONG&gt;00000001&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 30.8412%;"&gt;stateful mode&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 12%;"&gt;&lt;SPAN style="font-family: terminal, monaco, monospace;"&gt;&lt;STRONG&gt;00000002&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 30.8412%;"&gt;wire mode&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 12%;"&gt;&lt;SPAN style="font-family: terminal, monaco, monospace;"&gt;&lt;STRONG&gt;00000003&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 30.8412%;"&gt;all packets&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 12%;"&gt;&lt;SPAN style="color: #0000ff; font-family: terminal, monaco, monospace;"&gt;&lt;STRONG&gt;00000000&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 30.8412%;"&gt;SecureXL offloading&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Content Inspection&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;For more details see article: &lt;A href="https://community.checkpoint.com/docs/DOC-3073" target="_blank" rel="noopener"&gt;R80.x Security Gateway Architecture (Content Inspection)&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Content inspection is a very complicated process, it is only shown in the example for R80.10 IPS and R80.10 &lt;SPAN style="color: black;"&gt;App Classifier&lt;/SPAN&gt;. It is also possible for other services. Please refer to the corresponding SK's. In principle, all content is processed via the Context Management Infrastructure (CMI) and CMI loader and forwarded to the corresponding daemon.&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;Session-based processing enforces advanced access control and threat detection and prevention capabilities. To do this we assemble packets into a stream, parse the stream for relevant contexts and then security modules inspect the content. When possible, a common pattern matcher does simultaneous inspection of the content for multiple security modules. In multi-core systems this processing is distributed amongst the cores to provide near linear scalability on each additional core.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: black;"&gt;Security modules use a local cache to detect known threats. This local cache is backed up with real-time lookups of an&amp;nbsp; cloud service. The result of cloud lookups are then cached in the kernel for subsequent lookups. Cloud assist also enhances unknown threat detection and prevention. In particular a file whose signature is not known in a local cache is sent to our cloud service for processing where compute, disk and memory are virtually unlimited. Our sandboxing technology, SandBlast Threat Emulation, identifies threats in their infancy before malware has an opportunity to deploy and evade detection. Newly discovered threats are sent to the cloud database to protect other Check Point connected gateways and devices. When possible, active content is removed from files which are then sent on to the user while the emulation is done.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Passive Streaming Library (PSL)&lt;/STRONG&gt;&lt;/EM&gt; -Packets may arrive out of order or may be legitimate retransmissions of packets that have not yet received an acknowledgment. In some cases a retransmission may also be a deliberate attempt to evade IPS detection by sending the malicious payload in the retransmission. Security Gateway ensures that only valid packets are allowed to proceed to destinations. It does this with Passive Streaming Library (PSL) technology.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;PSL is an infrastructure layer, which provides stream reassembly for TCP connections.&lt;/LI&gt;
&lt;LI&gt;The gateway makes sure that TCP data seen by the destination system is the same as seen by code above PSL.&lt;BR /&gt;This layer handles packet reordering, congestion handling and is responsible for various security aspects of the TCP layer such as handling payload overlaps, some DoS attacks and others.&lt;/LI&gt;
&lt;LI&gt;The PSL layer is capable of receiving packets from the firewall chain and from SecureXL module.&lt;/LI&gt;
&lt;LI&gt;The PSL layer serves as a middleman between the various security applications and the network packets. It provides the applications with a coherent stream of data to work with, free of various network problems or attacks&lt;/LI&gt;
&lt;LI&gt;The PSL infrastructure is wrapped with well defined APIs called the Unified Streaming APIs which are used by the applications to register and access streamed data.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;EM&gt;Protocol Parsers&lt;/EM&gt; -&lt;BR /&gt;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;The Protocol Parsers main functions are to ensure compliance to well-defined protocol standards, detect anomalies if any exist, and assemble the data for further inspection by other components of the IPS engine. They include HTTP, SMTP, DNS, IMAP, Citrix, and many others. In a way, protocol parsers are the heart of the IPS system. They register themselves with the streaming engine (usually PSL), get the streamed data, and dissect the protocol.&lt;BR /&gt;The protocol parsers can analyze the protocols on both Client to Server (C2S) and Server to Client (S2C) directions. The outcome of the protocol parsers are contexts. A context is a well defined part of the protocol, on which further security analysis can be made. Examples of such contexts are HTTP URL, FTP command, FTP file name, HTTP response, and certain files.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Context Management Infrastructure (CMI) and Protections&lt;/EM&gt; -&lt;/STRONG&gt; The Context Management Infrastructure (CMI) is the "brain" of the content inspection. It coordinates different components, decides which protections should run on a certain packet, decides the final action to be performed on the packet and issues an event log.&lt;BR /&gt;CMI separates parsers and protections. Protection is a set of signatures or/and handlers, where&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Signature - a malicious pattern that is searched for&lt;/LI&gt;
&lt;LI&gt;Handler - INSPECT code that performs more complex inspection&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;CMI is a way to connect and manage parsers and protections. Since they are separated, protections can be added in updates, while performance does not depend on the number of active protections. Protections are usually written per protocol contexts - they get the data from the contexts and validate it against relevant signatures Based on the IPS policy, the CMI determines which protections should be activated on every context discovered by a protocol parser. If policy dictates that no protections should run, then the relevant parsers on this traffic are bypassed in order to improve performance and reduce potential false positives.&lt;/SPAN&gt; When a protection is activated, it can decide whether the given packet or context is OK or not. It does not decide what to do with this packet. The CMI is responsible for the final action to be performed on the packet, given several considerations.&lt;/P&gt;
&lt;P&gt;The considerations include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Activation status of the protection (Prevent, Detect, Inactive)&lt;/LI&gt;
&lt;LI&gt;Exceptions either on traffic or on protection&lt;/LI&gt;
&lt;LI&gt;Bypass mode status (the software fail open capability)&lt;/LI&gt;
&lt;LI&gt;Troubleshooting mode status&lt;/LI&gt;
&lt;LI&gt;Are we protecting the internal network only or all traffic&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;CMI Loader&lt;/STRONG&gt;&lt;/EM&gt; - collects signatures from multiple sources (e.g. IPS, Application Control,...) and compiles them together into unified Pattern Matchers (PM) (one for each context - such as URL, Host header etc.).&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Pattern Matcher&lt;/STRONG&gt;&lt;/EM&gt; -The Pattern Matcher is a fundamental engine within the new enforcement architecture.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Pattern Matcher quickly identifies harmless packets, common signatures inmalicious packets, and does a second level analysis to reduce false positives.&lt;/LI&gt;
&lt;LI&gt;Pattern Matcher engine provides the ability to find regular expressions on a stream of data using a two tiered inspection process.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;&lt;EM&gt;&lt;STRONG&gt;UP Manager&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt; &lt;SPAN style="color: black;"&gt;- The UP Manager controls all interactions of the components and interfaces with the Context Management Infrastructure (CMI) Loader, the traffic director of the CMI. The UP Manager also has a list of Classifiers that have registered for “first packets” and uses a bitmap to instruct the UP Classifier to execute these Classifier Apps to run on the packet. The “first packets” arrive directly from the CMI. Parsing of the protocol and streaming are not needed in this stage of the connection. For “first packets” the UP Manager executes the rule base.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;EM&gt;&lt;STRONG&gt;Classifier&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt; &lt;SPAN style="font-size: 11.0pt;"&gt;- When the “first packet” rule base check is complete Classifiers initiate streaming for subsequent packets in the session. The “first packet” rule base check identifies a list of rules that possibly may match and a list of &lt;STRONG&gt;classifier objects (CLOBs)&lt;/STRONG&gt; that are required to complete the rule base matching process. The Classifier reads this list and generates the required CLOBs to complete the rule base matching. Each Classifier App executes on the packet and tells the result of the CLOB to the UP Manager. The CMI then tells the Protocol Parser to enable streaming.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;In some cases Classifier Apps do not require streaming, e.g. the first packet information is sufficient. Then the rule base decision can be done on the first packet.&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="margin-bottom: 2.95pt; text-indent: -18.0pt;"&gt;&lt;SPAN style="color: black;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt; &lt;SPAN style="color: black;"&gt;Dynamic Objects&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-bottom: 2.95pt; text-indent: -18.0pt;"&gt;&lt;SPAN style="color: black;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt; &lt;SPAN style="color: black;"&gt;Domain Objects&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-bottom: .0001pt; text-indent: -18.0pt;"&gt;&lt;SPAN style="color: black;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt; &lt;SPAN style="color: black;"&gt;Only the firewall is enabled&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;On subsequent packets the Classifier can be contacted directly from the CMI using the CMI Loader infrastructure, e.g. when the Pattern Matcher has found a match it informs the CMI it has found application xyz. The CMI Loader passes this information to the Classifier. The Classifier runs the Classification Apps to generate CLOBs required for Application Control and sends the CLOBs to the Observer.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;&lt;EM&gt;&lt;STRONG&gt;Observer&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt; &lt;SPAN style="color: black;"&gt;- The Observer decides if enough information is known to publish a CLOB to the security policy. CLOBs are observed in the context of their transaction and the connection that the transaction belongs to. The Observer may request more CLOBs for a dedicated packet from the Classifier or decides that it has sufficient information about the packet to execute the rule base on the CLOB, e.g. if a file type is needed for Content Awareness and the gateway hasn’t yet received the S2C response containing the file. Executing the rule base on a CLOB is called “publishing a CLOB”. The Observer may wait to receive more CLOBs that belong to the same transaction before publishing the CLOBs.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;&lt;EM&gt;&lt;STRONG&gt;Security Policy&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt; &lt;SPAN style="color: black;"&gt;- The Security Policy receives the CLOB published by the Observer. The CLOB includes a description of the Blade it belongs to so that matching can be performed on a column basis. The security policy saves the current state on the transaction Handle; either to continue the inspection or final match.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: black;"&gt;The first packets are received directly from the UP Manager. Subsequent packets are received by the rule base from the Observer.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;&lt;EM&gt;&lt;STRONG&gt;Handle&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt; &lt;SPAN style="color: black;"&gt;- Each connection may consist of several transactions. Each transaction has a Handle. Each Handle contains a list of published CLOBs. The Handle holds the state of the security policy matching process. The Handle infrastructure component stores the rule base matching state related information.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: black;"&gt;&lt;EM&gt;&lt;STRONG&gt;Subsequent Packets&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt; &lt;SPAN style="color: black;"&gt;- Subsequent packets are handled by the streaming engine. The streaming engine notifies the Classifier to perform the classification. The Classifier will notify the UP Manager about the performed classification and pass the CLOBs to the Observer. The CLOBs will then be received by the Observer that will need to wait for information from the CMI. The CMI sends the information describing the result of the Protocol Parser and the Pattern Matcher to the Classifier. The Classifier informs the UP Manager and sends the CLOB to the Observer. The UP Manager then instructs the Observer to publish the CLOBs to the Rule Base.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: black;"&gt;The Rule Base is executed on the CLOBs and the result is communicated to the UP Manager. The CLOBs and related Rule Base state are stored in the Handle. The UP Manager provides the result of the rule base check to the CMI that then decides to allow or to drop the connection. The CMI generates a log message and instructs the streaming engine to forward the packets to the outbound interface.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="min-height: 8pt; padding: 0px;"&gt;&lt;EM&gt;&lt;STRONG&gt;Content Awareness (CTNT)&lt;/STRONG&gt;&lt;/EM&gt; -&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt; is a &lt;STRONG&gt;new blade introduced in R80.10&lt;/STRONG&gt; as part of the new Unified Access Control Policy. Using Content Awareness blade as part of Firewall policy allows the administrator to enforce the Security Policy based on the content of the traffic by identifying files and its content. Content Awareness restricts the Data Types that users can upload or download.&lt;BR /&gt;Content Awareness can be used together with Application Control to enforce more interesting scenarios (e.g. identify which files are uploaded to DropBox).&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Definitions&lt;BR /&gt;&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Performance Pack&lt;/STRONG&gt;&lt;/EM&gt; is a software acceleration product installed on Security Gateways. Performance Pack uses &lt;EM&gt;SecureXL&lt;/EM&gt; technology and other innovative network acceleration techniques to deliver wire-speed performance for Security Gateways. SecureXL is implemented either in software, or in hardware (SAM cards on Check Point 21000 appliances; ADP cards on IP Series appliances).&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Affinity&lt;/STRONG&gt;&lt;/EM&gt; - Association of a particular network interface with a CPU core (either 'Automatic' (default), or 'Static' / 'Manual'). Interfaces are bound to CPU cores via SMP IRQ affinity settings (refer to &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk61962" target="_blank" rel="noopener"&gt;sk61962 - SMP IRQ Affinity on Check Point Security Gateway&lt;/A&gt;). Note: on X-Series chassis, SIM Affinity must be set to Static mode (refer to &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk99490" target="_blank" rel="noopener"&gt;sk99490&lt;/A&gt;).&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;BR /&gt;FWACCEL&lt;/STRONG&gt;&lt;/EM&gt; - FireWall Accelerator (acceleration feature).&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;SIM&lt;/STRONG&gt;&lt;/EM&gt; - SecureXL Implementation Module (acceleration device).&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Connection offload&lt;/STRONG&gt;&lt;/EM&gt; - Firewall kernel passes the relevant information about the connection from Firewall Connections Table to SecureXL Connections Table.&lt;BR /&gt;Note: In ClusterXL High Availability, the connections are &lt;STRONG&gt;not&lt;/STRONG&gt; offloaded to SecureXL on &lt;EM&gt;Standby&lt;/EM&gt; member.&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Connection notification&lt;/STRONG&gt;&lt;/EM&gt; - SecureXL passes the relevant information about the accelerated connection from SecureXL Connections Table to Firewall Connections Table.&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Accept Template&lt;/STRONG&gt;&lt;/EM&gt; - Feature that accelerates the speed, at which a connection is established by matching a new connection to a set of attributes. When a new connection matches the Accept Template, subsequent connections are established without performing a rule match and therefore are accelerated. Accept Templates are generated from active connections according to policy rules. Currently, Accept Template acceleration is performed only on connections with the &lt;STRONG&gt;same&lt;/STRONG&gt; destination port (using wildcards for source ports).&lt;BR /&gt;Note: Size of SecureXL Connections Templates table (&lt;EM&gt;cphwd_tmpl&lt;/EM&gt;, id 8111) is limited to 1/4 of the size of Firewall Connections Table (&lt;EM&gt;connections&lt;/EM&gt;, id 8158).&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Drop Template&lt;/STRONG&gt;&lt;/EM&gt; - Feature that accelerates the speed, at which a connection is dropped by matching a new connection to a set of attributes. When a new connection matches the Drop Template, subsequent connections are dropped without performing a rule match and therefore are accelerated. Currently, Drop Template acceleration is performed only on connections with the &lt;STRONG&gt;same&lt;/STRONG&gt; destination port (does not use wildcards for source ports). Drop Templates are generated from policy rules by special algorithm:&lt;/P&gt;
&lt;DIV id="Show_Hide_Definitions"&gt;
&lt;UL&gt;
&lt;LI&gt;Analyze the rulebase&lt;/LI&gt;
&lt;LI&gt;Produce mutually exclusive ranges&lt;/LI&gt;
&lt;LI&gt;Offload the ranges to SecureXL&lt;/LI&gt;
&lt;LI&gt;Once a packet is dropped, offload a Drop Template&lt;/LI&gt;
&lt;LI&gt;All subsequent packets matching that range will be dropped by SecureXL&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Accelerated path&lt;/STRONG&gt;&lt;/EM&gt; - Packet flow when the packet is completely handled by the SecureXL device. It is processed and forwarded to the network.&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Medium path&lt;/STRONG&gt;&lt;/EM&gt; (&lt;STRONG&gt;PXL&lt;/STRONG&gt;) - Packet flow when the packet is handled by the SecureXL device, except for IPS (some protections) / VPN (in some configurations) / Application Control / Content Awareness / Anti-Virus / Anti-Bot / HTTPS Inspection / Proxy mode / Mobile Access / VoIP / Web Portals. The CoreXL layer passes the packet to one of the CoreXL FW instances to perform the processing (even when CoreXL is disabled, the CoreXL infrastructure is used by SecureXL device to send the packet to the single FW instance that still functions).&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Firewall path&lt;/STRONG&gt;&lt;/EM&gt; / &lt;EM&gt;&lt;STRONG&gt;Slow path&lt;/STRONG&gt;&lt;/EM&gt; (&lt;STRONG&gt;F2F&lt;/STRONG&gt;) - Packet flow when the SecureXL device is unable to process the packet (refer to &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk32578" target="_blank" rel="noopener"&gt;sk32578 - SecureXL Mechanism&lt;/A&gt;). The packet is passed on to the CoreXL layer and then to one of the Core FW instances for full processing. This path also processes all packets when SecureXL is disabled.&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Active Streaming&lt;/STRONG&gt;&lt;/EM&gt; (&lt;STRONG&gt;CPAS&lt;/STRONG&gt;) - Technology that sends streams of data to be inspected in the kernel, since more than a single packet at a time is needed in order to understand the application that is running (such as HTTP data). Active Streaming is Read- and Write-enabled, and works as a transparent proxy. Connections that pass through Active Streaming can not be accelerated by SecureXL.&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Passive Streaming&lt;/STRONG&gt;&lt;/EM&gt; - Technology that sends streams of data to be inspected in the kernel, since more than a single packet at a time is needed in order to understand the application that is running (such as HTTP data). Passive Streaming is Read-only and it cannot hold packets, but the connections are accelerated by SecureXL.&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Passive Streaming Library&lt;/STRONG&gt;&lt;/EM&gt; (&lt;STRONG&gt;PSL&lt;/STRONG&gt;) - IPS infrastructure, which transparently listens to TCP traffic as network packets, and rebuilds the TCP stream out of these packets. Passive Streaming can listen to all TCP traffic, but process only the data packets, which belong to a previously registered connection. For more details, refer to &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk95193" target="_blank" rel="noopener"&gt;sk95193 - ATRG: IPS&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;PXL&lt;/STRONG&gt;&lt;/EM&gt; - Technology name for combination of SecureXL and PSL.&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;QXL&lt;/STRONG&gt;&lt;/EM&gt; - Technology name for combination of SecureXL and QoS (R77.10 and higher).&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;F2F&lt;/STRONG&gt;&lt;/EM&gt;&lt;STRONG&gt; / &lt;EM&gt;F2Fed&lt;/EM&gt;&lt;/STRONG&gt; - Packets that can not be accelerated by SecureXL (refer to &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk32578" target="_blank" rel="noopener"&gt;sk32578 - SecureXL Mechanism&lt;/A&gt;) are Forwarded to Firewall.&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;F2P&lt;/STRONG&gt;&lt;/EM&gt; - Forward to PSL/Applications. Feature that allows to perform the PSL processing on the CPU cores, which are dedicated to the Firewall.&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;F2V&lt;/STRONG&gt;&lt;/EM&gt; - -Forward to VM. Packet which arrive to FW inbound and is reinjected back to SecureXL for further processing.&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;SAM card&lt;/STRONG&gt;&lt;/EM&gt; - Security Acceleration Module card (&lt;EM&gt;Acceleration Ready&lt;/EM&gt; card). Connections that use SAM card, are accelerated by SecureXL and are processed by the SAM card's CPU instead of the main CPU (refer to &lt;A href="http://downloads.checkpoint.com/dc/download.htm?ID=18043" target="_blank" rel="noopener"&gt;21000 Appliance Security Acceleration Module Getting Started Guide&lt;/A&gt;).&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;ADP card&lt;/STRONG&gt;&lt;/EM&gt; - Accelerated Data Path card. Connections that use ADP card, are accelerated by SecureXL and are processed by network processors (NP) instead of the main CPU (refer to &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk60508" target="_blank" rel="noopener"&gt;sk60508 - How to Configure ADP &amp;amp; SecureXL on IPSO&lt;/A&gt;).&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;IRQ Swizzling&lt;/STRONG&gt;&lt;/EM&gt; - Traditionally, in a PCIe bus, all PCIe ports are mapped to one interrupt. Swizzling allows the PCIe slots to be balanced across four interrupts instead of one (enabling IRQ Swizzling requires a BIOS update).&lt;/P&gt;
&lt;/DIV&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;References&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98722#Introduction" target="_blank" rel="noopener"&gt;SecureKnowledge: SecureXL&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk71200" target="_blank" rel="noopener"&gt;SecureKnowledge: NAT Templates&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104760" target="_blank" rel="noopener"&gt;SecureKnowledge: VPN Core&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98737" target="_blank" rel="noopener"&gt;SecureKnowledge: CoreXL&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105261" target="_blank" rel="noopener"&gt;SecureKnowledge: CoreXL Dynamic Dispatcher in R77.30 / R80.10 and above&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk73220" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk73220" target="_blank" rel="noopener"&gt;SecureKnowledge: Application Control&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92743" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92743" target="_blank" rel="noopener"&gt;SecureKnowledge: URL Filtering&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk119715" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk119715" target="_blank" rel="noopener"&gt;SecureKnowledge: Content Awareness (CTNT)&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk95193" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk95193" target="_blank" rel="noopener"&gt;SecureKnowledge: IPS&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92264" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92264" target="_blank" rel="noopener"&gt;SecureKnowledge: Anti-Bot and Anti-Virus&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk114806" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk114806" target="_blank" rel="noopener"&gt;SecureKnowledge: Threat Emulation&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98348" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98348" target="_blank" rel="noopener"&gt;SecureKnowledge: Best Practices - Security Gateway Performance&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A class="link-titled" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk118097&amp;amp;partition=Advanced&amp;amp;product=CoreXL," href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk118097&amp;amp;partition=Advanced&amp;amp;product=CoreXL," target="_blank" rel="noopener"&gt;SecureKnowledge: MultiCore Support for IPsec VPN in R80.10 and above&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&amp;amp;eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk156672" target="_self" rel="nofollow noopener noreferrer"&gt;SecureKnowledge: SecureXL Fast Accelerator (fw fast_accel) for R80.20 and above.&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A href="http://dl3.checkpoint.com/paid/c1/c1918858f31222841a08b76bbdca62b0/wp-checkpoint-R80-security-gateway-architecture.pdf?HashKey=1532719982_4926d9c9b61f8d28973e2215e1e4e5ba&amp;amp;xtn=.pdf" target="_blank" rel="noopener"&gt;Download Center: R80.10 Next Generation Threat Prevention Platforms&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A class="link-titled" title="http://downloads.checkpoint.com/dc/download.htm?ID=54724" href="http://downloads.checkpoint.com/dc/download.htm?ID=54724" target="_blank" rel="noopener"&gt;Download Center: R77 Security Gateway Packet Flow&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A class="link-titled" title="http://downloads.checkpoint.com/dc/download.htm?ID=54704" href="http://downloads.checkpoint.com/dc/download.htm?ID=54704" target="_blank" rel="noopener"&gt;Download Center: R77 Security Gateway Architecture&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk116255" target="_blank" rel="noopener"&gt;Support Center: Check Point Security Gateway Architecture and Packet Flow&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A href="https://community.checkpoint.com/thread/5083-check-point-threat-prevention-packet-flow-and-architecture" target="_blank" rel="noopener" data-objecttype="1"&gt;Checkmates: Check Point Threat Prevention Packet Flow and Architecture&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A href="https://community.checkpoint.com/thread/6176-fw-monitor-inspection-point-e-or-e" target="_blank" rel="noopener" data-objecttype="1"&gt;Checkmates: fw monitor inspection point e or E&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-2241" target="_blank" rel="noopener"&gt;Infinity NGTP architecture &lt;/A&gt; &amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3061" target="_blank" rel="noopener"&gt;Security Gateway Packet Flow and Acceleration - with Diagrams&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3073" target="_blank" rel="noopener"&gt;R80.x Security Gateway Architecture (Content Inspection)&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Questions and Answers&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; Why this diagram with SecureXL and CoreXL?&lt;BR /&gt;&lt;STRONG&gt;A:&lt;/STRONG&gt; I dared to map both worlds of CoreXL and SecureXL in a diangram. This is only possible to a limited extent, as these are different technologies. It's really an impossible mission. Why!&lt;BR /&gt;- CoreXL is a mechanism to assign, balance and manage CPU cores. CoreXL SND makes a decision to "stick" particular connection going through to a specific FWK instance.&lt;BR /&gt;- SecureXL certain connections could avoid FW path partially (packet acceleration) or completely (acceleration with templates)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; Why both technologies in one flowchart?&lt;BR /&gt;&lt;STRONG&gt;A:&lt;/STRONG&gt; There are both technologies that play hand in hand. The two illustrations become problematic, e.g. in the Medium Path.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; Why in the Medium Path?&lt;BR /&gt;&lt;STRONG&gt;A:&lt;/STRONG&gt; Here, the packet-oriented part (SecureXL) cannot be mapped with the connection-based part (CoreXL). Therefore, the following note from an new Check Point article from &lt;A href="https://community.checkpoint.com/people/vlouk80ce7dc1-40a3-44d6-a227-b5782636a5cb" target="_blank" rel="noopener" data-objecttype="3"&gt;Valeri Loukine&lt;/A&gt;&amp;nbsp;&amp;nbsp; (&lt;A href="https://community.checkpoint.com/docs/DOC-3061-security-gateway-packet-flow-and-acceleration-with-diagrams" target="_blank" rel="noopener" data-objecttype="102"&gt;Security Gateway Packet Flow and Acceleration - with Diagrams - 08-07-2018&lt;/A&gt;) and original article from&amp;nbsp;&lt;A href="https://community.checkpoint.com/people/moti50852693-eafc-4efe-88b1-ae2368b6613e" target="_blank" rel="noopener" data-objecttype="3"&gt;Moti Sagey&lt;/A&gt; (&lt;A href="https://community.checkpoint.com/thread/5083-check-point-threat-prevention-packet-flow-and-architecture" target="_blank" rel="noopener" data-objecttype="1"&gt;Check Point Threat Prevention Packet Flow and Architecture - 04-25-2017&lt;/A&gt;) :&lt;BR /&gt;When Medium Path is available, TCP handshake is fully accelerated with SecureXL. Rulebase match is achieved for the first packet through an existing connection acceleration template. SYN-ACK and ACK packets are also fully accelerated. However, once data starts flowing, to stream it for Content Inspection, the packets will be now handled by a FWK instance. Any packets containing data will be sent to FWK for data extraction to build the data stream. RST, FIN and FIN-ACK packets once again are only handled by SecureXL as they do not contain any data that needs to be streamed.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; What is the point of this article?&lt;BR /&gt;&lt;STRONG&gt;A:&lt;/STRONG&gt; To create an overview of both worlds with regard to the following innovations in R80.x:&lt;BR /&gt;- new fw monitor inspection points in R80 (e and E)&lt;BR /&gt;- new MultiCore VPN with dispatcher&lt;BR /&gt;- new UP Manager in R80&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; Why is there the designation "Logical Packet Flow"?&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A:&lt;/STRONG&gt; Since the logical flow in the overview differs from the real flow. For example, the medium path is only a single-logical representation of the real path. This was necessary to map all three paths (F2F, SXL, PXL) in one image. That is why the name "Logical Packet Flow".&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;What's the next step?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A:&lt;/STRONG&gt; I'm thinking about how to make the overview even better.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q&lt;/STRONG&gt;: Wording?&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A&lt;/STRONG&gt;: It was important for me that the right terms from Check Point were used. Many documents on the Internet use the terms incorrectly.&amp;nbsp;Therefore I am grateful to everyone who still finds wording errors here.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q:&lt;/STRONG&gt; &lt;SPAN&gt;What's the &lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;GA version&lt;/STRONG&gt;&lt;SPAN style="color: #000000;"&gt;?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A:&lt;/STRONG&gt; &lt;SPAN style="color: #ff0000;"&gt;This version has approved by Check Point representative,&amp;nbsp;&lt;SPAN style="color: #000000;"&gt;and we agreed that this should be the final version&lt;/SPAN&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;TABLE style="border: 1px solid #c6c6c6; border-collapse: separate; border-radius: 5px; background-color: #e15180; padding: 6px; text-indent: 10px;" width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left"&gt;&lt;FONT size="4" color="#ffffff"&gt;Versions&lt;/FONT&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Version R81.20:&lt;BR /&gt;2.0a - EA info &lt;SPAN&gt;PSL pipline - The project is targeted for R81.20 (24.08.2021)&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;Version R81.10:&lt;/P&gt;
&lt;P&gt;1.9a - Now with R81.10 upgrade (29.07.2021)&lt;BR /&gt;1.9b - Fix error in "fw ctl chain" (30.07.2021)&lt;/P&gt;
&lt;P&gt;Version R81:&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;FONT color="#000000"&gt;1.8a - Bug fix R80.20+ packet flow (28.03.2021)&lt;/FONT&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;FONT color="#000000"&gt;Version R80.40&lt;/FONT&gt;&lt;/SPAN&gt;:&lt;BR /&gt;&lt;BR /&gt;1.7c - Article with new pictures and text revised for R80.40 (07.09.2020)&lt;BR /&gt;1.7b - attention note to the flowchart (24.04.2020)&lt;BR /&gt;1.7a - after long discussions with Val_Loukine @, the R&amp;amp;D version has been changed back to an approved version 1.4d (24.04.2020)&lt;BR /&gt;1.6a - new R80.30+ flowchart with SK104468 and SK156672 (13.01.2020)&lt;/P&gt;
&lt;P&gt;Version R80.30:&lt;BR /&gt;&lt;BR /&gt;1.5a - added new R80.30+ flowchart picture and pdf, add QoS path in flowchart, added R80.30 new path names (16.12.2019)&lt;BR /&gt;1.4a - update - automatically changes the number of CoreXL SNDs and Firewall instances and the Multi-Queue&amp;nbsp;(02.09.2019) &lt;BR /&gt;1.4b - update - http/2 support (03.09.2019)&lt;BR /&gt;1.4c - update - Host path, Buffer path,&amp;nbsp;Inline path (04.09.2019)&lt;BR /&gt;1.4c - update -&amp;nbsp;now eight firewall paths are possible (14.09.2019)&lt;BR /&gt;1.4d - R&amp;amp;D guys checks the logical packet flowchart for R80.20 and gives green lights (05.11.2019)&amp;nbsp;&amp;nbsp;&lt;BR /&gt;1.4e - add R80.20 JHF103 fast accelerator feature (15.11.2019)&lt;BR /&gt;1.4f&amp;nbsp; - update flowchart with "Fast Accel" (16.11.2019)&lt;BR /&gt;1.4g - update R80.40 EA infos (27.11.2019)&lt;BR /&gt;1.4h - new table with R80.10/ R80.20/ R80.30/ R80.40 paths (15.12.2019)&lt;/P&gt;
&lt;P&gt;1.3a - update R80.30 managment core ( 25.07.2019 )&amp;nbsp;&lt;BR /&gt;1.3b - update R80.30 https SNI (28.07.2019)&lt;BR /&gt;1.3c - update R80.20 new async flowchart (15.08.2019)&lt;BR /&gt;1.3d - update R80.20 packet reinjection (20.08.2019)&lt;/P&gt;
&lt;P&gt;Version R80.20:&lt;/P&gt;
&lt;P&gt;1.2a - article update to R80.20 (16.11.2018)&lt;BR /&gt;1.2b - update inspection points id, iD and more (19.11.2018)&lt;BR /&gt;1.2c - update maximal number of CoreXL IPv4 FW instances (20.11.2018)&lt;BR /&gt;1.2d - update R80.20 new functions (05.11.2018)&lt;BR /&gt;1.2e - bug&amp;nbsp; fix (06.01.2019)&lt;BR /&gt;1.2f - update fw monitor inspection points ie/ IE (23.01.2019)&lt;BR /&gt;1.2g - update sk 151114 VPN+SecureXL (20.04.2019)&lt;BR /&gt;1.2h - update fw monitor inspection points (10.07.2019)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P style="min-height: 8pt; padding: 0px;"&gt;&lt;SPAN style="color: #000000;"&gt;Version R80.10:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="min-height: 8pt; padding: 0px;"&gt;1.1b - final GA version (08.08.2018)&lt;BR /&gt;1.1c - change words to new R80 terms (08.08.2018)&lt;BR /&gt;1.1d - correct a mistak with SXL and "Accelerated path" (09.08.2018)&lt;BR /&gt;1.1e - bug fixed (29.08.2018)&lt;BR /&gt;1.1f - QoS (24.09.2018)&lt;BR /&gt;1.1g - correct a mistak in pdf (26.09.2018)&lt;BR /&gt;1.1h - add PSLXL and CPASXL path in R80.20 (27.09.2018)&lt;BR /&gt;1.1i - add "Medium Streaming Path" and "Inline Streaming Path" in R80.20 (28.09.2018)&lt;BR /&gt;1.1j - add "new R80.20 chain modules" (22.10.2018)&lt;BR /&gt;1.1k - bug fix chain modules (04.11.2018)&lt;BR /&gt;1.1l - add "chaptures" (10.11.2018)&lt;BR /&gt;1.1m - add R80.20 fw monitor inspection points "oe" and "OE" (17.12.2018)&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;R80.10 EA Version:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;1.0a&amp;nbsp;- final version (28.07.2018)&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;1.0c&amp;nbsp;- change colors (28.07.2018)&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;1.0d&amp;nbsp;- add content inspection text (29.07.2018)&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;1.0e - add content inspection drawing (29.07.2018)&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;1.0f - update links (29.07.2018)&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;1.0g - update content inspection drawing flows and action (30.07.2018)&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;1.0h - change SecureXL flow (30.07.2018)&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;1.0i - correct SecureXL packet flow (01.08.2018)&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;1.0j - correct SecureXL names and correct "fw monitor inspection points" (02.08.2018)&lt;BR /&gt;1.0k - add new article "Security Gateway Packet Flow and Acceleration - with Diagrams" from 06.08.2018&amp;nbsp; to "&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;References and links&lt;/SPAN&gt;" (06.08.2018)&lt;BR /&gt;&lt;SPAN style="font-size: 15px;"&gt;1.0l - add "Questions and Answers&lt;STRONG&gt;"&lt;/STRONG&gt; (07.08.2018)&lt;BR /&gt;1.0m - R&amp;amp;D guys checks the logical packet flowchart for R80.10 and gives green lights (08.08.2018)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Aug 2021 07:11:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41747#M8834</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2021-08-24T07:11:24Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41748#M8835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Heiko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it is a very nice flowchart.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THX&lt;BR /&gt;Christian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2018 22:21:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41748#M8835</guid>
      <dc:creator>Christian_Wagen</dc:creator>
      <dc:date>2018-07-30T22:21:32Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41749#M8836</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Heiko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there also inspection points for decryption (e and E)?&lt;BR /&gt;Are they missing in the drawing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the ecellent drawing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regads,&lt;/P&gt;&lt;P&gt;Hong&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2018 22:31:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41749#M8836</guid>
      <dc:creator>hong_jungil</dc:creator>
      <dc:date>2018-07-30T22:31:24Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41750#M8837</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great work!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2018 22:43:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41750#M8837</guid>
      <dc:creator>Florian_Winterb</dc:creator>
      <dc:date>2018-07-30T22:43:43Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41751#M8838</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Hong,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it is correct. Inspection points are only in the encryption path.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Heiko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2018 07:53:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41751#M8838</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-07-31T07:53:00Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41752#M8839</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice flowchart it is very helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THX&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2018 08:20:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41752#M8839</guid>
      <dc:creator>Paul_Prissel</dc:creator>
      <dc:date>2018-07-31T08:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41753#M8840</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;excellent work Heiko, amazing detail! very well done &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2018 10:57:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41753#M8840</guid>
      <dc:creator>Jerry</dc:creator>
      <dc:date>2018-07-31T10:57:22Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41754#M8841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Exzellent flowchart.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THX&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2018 21:27:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41754#M8841</guid>
      <dc:creator>Rolf_Kaschek</dc:creator>
      <dc:date>2018-07-31T21:27:10Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41755#M8842</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2018 23:14:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41755#M8842</guid>
      <dc:creator>Lee_SoonFat</dc:creator>
      <dc:date>2018-07-31T23:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41756#M8843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;THX, for the answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hong&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2018 23:24:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41756#M8843</guid>
      <dc:creator>hong_jungil</dc:creator>
      <dc:date>2018-07-31T23:24:38Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41757#M8844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have redesigned the SecureXL packet flow in version 1.0h. The first packet that passed through the firewall chain and only then is executed, I have marked it with a "1". I hope this makes the overview even better.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/55229"&gt;Heiko&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2018 23:37:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41757#M8844</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-07-31T23:37:39Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41758#M8845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is this new in R80.x or is it also available in R77.30?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 00:02:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41758#M8845</guid>
      <dc:creator>Alice_Shields</dc:creator>
      <dc:date>2018-08-01T00:02:00Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41759#M8846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;R77.30 works differently. (something in between totally differently and slightly differently)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 08:05:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41759#M8846</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2018-08-01T08:05:29Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41760#M8847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is it me or is the attachment no longer present?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 08:11:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41760#M8847</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2018-08-01T08:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41761#M8848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Hugo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;You can download the flowchart version 1.0j as PDF in the appendix.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="" data-containerid="-1" data-containertype="-1" data-objectid="55229" data-objecttype="3" href="https://community.checkpoint.com/people/h.ank2614aef2-c5d1-3f73-bbbd-45c59b9e2728"&gt;Heiko&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 09:10:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41761#M8848</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-08-01T09:10:50Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41762#M8849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Heiko,&lt;/P&gt;&lt;P&gt;Well my point is that I don't see the appendix in this thread if I open it from my inbox list.&lt;/P&gt;&lt;P&gt;I have to open the thread in a seperate windows to see the appendix.&lt;/P&gt;&lt;P&gt;Thats obviously a limitation of the community site but one that is easy to miss if you work mainly from the inbox list.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 12:05:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41762#M8849</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2018-08-01T12:05:57Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41763#M8850</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can download the flowchart pdf.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 12:50:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41763#M8850</guid>
      <dc:creator>Tim_Maurer</dc:creator>
      <dc:date>2018-08-01T12:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41764#M8851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Heiko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you also provide a flowchart from content inspection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards.&lt;/P&gt;&lt;P&gt;Jan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 20:35:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41764#M8851</guid>
      <dc:creator>Jan_Elbers</dc:creator>
      <dc:date>2018-08-01T20:35:18Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41765#M8852</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it is very difficult to include all packet flows in one diagram. I will try to work on content inspection part in the next days or weeks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first thing that was important for me:&lt;BR /&gt;- &lt;STRONG&gt;new inspection points&lt;/STRONG&gt; in R80 (&lt;STRONG&gt;e&lt;/STRONG&gt; and &lt;STRONG&gt;E&lt;/STRONG&gt;)&lt;BR /&gt;- &lt;STRONG&gt;new&lt;/STRONG&gt; &lt;STRONG&gt;MultiCore VPN&lt;/STRONG&gt; with dispatcher&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the second step the old known points:&lt;BR /&gt;- basic SecureXL flows (access tamplates, drop temp., SXL vs. PXL and F2F,...)&lt;BR /&gt;- basic CoreXL flows (dispatcher SND and FW Worker,...)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the last step the basic overview of CMI with:&lt;/P&gt;&lt;P&gt;- PSL, protocol parser, ...&lt;/P&gt;&lt;P&gt;- &lt;STRONG&gt;new&lt;/STRONG&gt; &lt;STRONG&gt;UP Manager&lt;/STRONG&gt; in R80&lt;/P&gt;&lt;P&gt;- CMI Loader for other Security Modules (URLF, AV,...)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And it's an attempt to logically map all flows.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the article's references, you can find some good articles from Check Point on this topic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Heiko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 21:22:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41765#M8852</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-08-01T21:22:28Z</dc:date>
    </item>
    <item>
      <title>Re: R80.x Security Gateway Architecture (Logical Packet Flow)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41766#M8853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Hugo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think it is a portal issue.&lt;/P&gt;&lt;P&gt;Ask &lt;A href="https://community.checkpoint.com/migrated-users/2075"&gt;https://community.checkpoint.com/people/dwelccfe6e688-522c-305c-adaa-194bd7a7becc&lt;/A&gt; for more details.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Heiko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 21:56:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41766#M8853</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-08-01T21:56:33Z</dc:date>
    </item>
  </channel>
</rss>

