<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CP4800 C2S VPN Optimization in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/CP4800-C2S-VPN-Optimization/m-p/79957#M11134</link>
    <description>&lt;P&gt;Want to give a feedback to this topic:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Check Point 4800 can manage up to 650 concurrent VPN Users in our enviroment with mixed real traffic.&lt;/LI&gt;&lt;LI&gt;But it will slow down alot the bandwith.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The global settings helped with bandwith because easy encryption methods before we reached the maximum on this GW.&lt;BR /&gt;We will switch to a bigger appliance to manage much more Users.&lt;/P&gt;&lt;P&gt;Thans to all!&lt;/P&gt;</description>
    <pubDate>Fri, 27 Mar 2020 12:57:36 GMT</pubDate>
    <dc:creator>SubSeven11</dc:creator>
    <dc:date>2020-03-27T12:57:36Z</dc:date>
    <item>
      <title>CP4800 C2S VPN Optimization</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/CP4800-C2S-VPN-Optimization/m-p/78882#M11126</link>
      <description>&lt;P&gt;Ladies and Gentleman,&lt;/P&gt;&lt;P&gt;due to corona crisis we have build up a secondary backup VPN gateway in our infrastructure with an CP4800 appliance. This gateway should only be used when the primary VPN Gateway CP5800 is overloaded.&lt;BR /&gt;Actually we know that the primary GW can handle up to 4000 VPN C2S Session on R77.30 - but the backup GW with R80.10 is only for VPN GW which routes all traffic to the primary GW.&lt;/P&gt;&lt;P&gt;In direct comparison the CP4800 GW with the newer R80.10 and only 10 VPN user is much slower (direct comparison between two gw - 4800 10-15mbit slower) than the primary GW with R77.30 and 3000 Users. We already tried alot of checks and configuration setting.&lt;/P&gt;&lt;P&gt;Any body out there who can give some tipps/tricks or hints for performance tweeks?&lt;BR /&gt;4800 does not support AES-NI so this SK will not work for us.&lt;/P&gt;&lt;P&gt;Active Blades: FW, NAT, VPN&lt;/P&gt;&lt;P&gt;Internet Interface (incoming traffic) = eth4&lt;/P&gt;&lt;P&gt;xxx1:TACP-0&amp;gt; fw ctl affinity -l&lt;BR /&gt;eth5: CPU 0&lt;BR /&gt;eth1: CPU 0&lt;BR /&gt;eth2: CPU 0&lt;BR /&gt;eth3: CPU 0&lt;BR /&gt;eth4: CPU 0&lt;BR /&gt;Kernel fw_0: CPU 3&lt;BR /&gt;Kernel fw_1: CPU 2&lt;BR /&gt;Kernel fw_2: CPU 1&lt;BR /&gt;Daemon mpdaemon: CPU 1 2 3&lt;BR /&gt;Daemon fwd: CPU 1 2 3&lt;BR /&gt;Daemon lpd: CPU 1 2 3&lt;BR /&gt;Daemon wsdnsd: CPU 1 2 3&lt;BR /&gt;Daemon cpd: CPU 1 2 3&lt;BR /&gt;Daemon cprid: CPU 1 2 3&lt;/P&gt;&lt;P&gt;xxx1:TACP-0&amp;gt; fwaccel stat&lt;BR /&gt;Accelerator Status : on&lt;BR /&gt;Accept Templates : disabled by Firewall&lt;BR /&gt;&amp;nbsp;Security disables template offloads from rule #15&lt;BR /&gt;Throughput acceleration still enabled.&lt;BR /&gt;Drop Templates : disabled&lt;BR /&gt;NAT Templates : disabled by user&lt;BR /&gt;NMR Templates : enabled&lt;BR /&gt;NMT Templates : enabled&lt;/P&gt;&lt;P&gt;Accelerator Features : Accounting, NAT, Cryptography, Routing,&lt;BR /&gt;HasClock, Templates, Synchronous, IdleDetection,&lt;BR /&gt;Sequencing, TcpStateDetect, AutoExpire,&lt;BR /&gt;DelayedNotif, TcpStateDetectV2, CPLS, McastRouting,&lt;BR /&gt;WireMode, DropTemplates, NatTemplates,&lt;BR /&gt;Streaming, MultiFW, AntiSpoofing, Nac,&lt;BR /&gt;ViolationStats, AsychronicNotif, ERDOS,&lt;BR /&gt;McastRoutingV2, NMR, NMT, NAT64, GTPAcceleration,&lt;BR /&gt;SCTPAcceleration&lt;BR /&gt;Cryptography Features : Tunnel, UDPEncapsulation, MD5, SHA1, NULL,&lt;BR /&gt;3DES, DES, CAST, CAST-40, AES-128, AES-256,&lt;BR /&gt;ESP, LinkSelection, DynamicVPN, NatTraversal,&lt;BR /&gt;EncRouting, AES-XCBC, SHA256&lt;/P&gt;&lt;P&gt;xxx1:TACP-0&amp;gt; fw ver&lt;BR /&gt;This is Check Point's software version R80.10 - Build 083&lt;/P&gt;&lt;P&gt;It will be great if somebody has some tuning tipps for us.&lt;/P&gt;&lt;P&gt;Br. Sub7&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2020 22:11:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/CP4800-C2S-VPN-Optimization/m-p/78882#M11126</guid>
      <dc:creator>SubSeven11</dc:creator>
      <dc:date>2020-03-19T22:11:39Z</dc:date>
    </item>
    <item>
      <title>Re: CP4800 C2S VPN Optimization</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/CP4800-C2S-VPN-Optimization/m-p/78883#M11127</link>
      <description>Why did you build the backup gateway with R80.10 and not with a later release?&lt;BR /&gt;There are some significant improvements in later releases, particularly with SecureXL and encryption.&lt;BR /&gt;&lt;BR /&gt;It would also help to know how clients are connecting (using which version of which client).</description>
      <pubDate>Thu, 19 Mar 2020 22:48:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/CP4800-C2S-VPN-Optimization/m-p/78883#M11127</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-19T22:48:04Z</dc:date>
    </item>
    <item>
      <title>Re: CP4800 C2S VPN Optimization</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/CP4800-C2S-VPN-Optimization/m-p/78886#M11128</link>
      <description>&lt;P&gt;It was an existing Gateway which was only used for Wireless LAN connection with PBR.&lt;BR /&gt;So nobody is in the office and the Gateway will not used for a while.&lt;BR /&gt;It was pretty easy to integrate and activate mobile access on this gateway.&lt;BR /&gt;We are using E81.40 on the Clients with FOB + Softtoken Authentication.&lt;/P&gt;&lt;P&gt;Any Ideas how to became this appliance faster?&lt;BR /&gt;All checks on the routers and switches did not show any relevant configurations that should be changed or optimized.&lt;/P&gt;&lt;P&gt;Br.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2020 22:57:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/CP4800-C2S-VPN-Optimization/m-p/78886#M11128</guid>
      <dc:creator>SubSeven11</dc:creator>
      <dc:date>2020-03-19T22:57:27Z</dc:date>
    </item>
    <item>
      <title>Re: CP4800 C2S VPN Optimization</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/CP4800-C2S-VPN-Optimization/m-p/78888#M11129</link>
      <description>&lt;P&gt;I was thinking about Encryption Strenght and had a look into the Global Settings -&amp;gt; Activated some additional Supported Algortihms. Actualy it seems that it is now a little bit faster then before!&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2020 23:22:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/CP4800-C2S-VPN-Optimization/m-p/78888#M11129</guid>
      <dc:creator>SubSeven11</dc:creator>
      <dc:date>2020-03-19T23:22:22Z</dc:date>
    </item>
    <item>
      <title>Re: CP4800 C2S VPN Optimization</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/CP4800-C2S-VPN-Optimization/m-p/78889#M11130</link>
      <description>That will definitely help.&lt;BR /&gt;Am curious how you were testing the speed and if you had similar settings to your other gateway.</description>
      <pubDate>Thu, 19 Mar 2020 23:24:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/CP4800-C2S-VPN-Optimization/m-p/78889#M11130</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-19T23:24:46Z</dc:date>
    </item>
    <item>
      <title>Re: CP4800 C2S VPN Optimization</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/CP4800-C2S-VPN-Optimization/m-p/78892#M11131</link>
      <description>&lt;P&gt;My testing setup (yes I know that actually all local providers in EUROPE have some problems with bandwith)&lt;/P&gt;&lt;P&gt;Testing with Speedtesting Providers in the Public Internet like "speedtest.net" and others..&lt;BR /&gt;Looking how fast it is going without VPN directly from local infrastructure to the internet.&lt;/P&gt;&lt;P&gt;Testing with IPERF3 on Client + Server which is located in the Dataceneter.&lt;BR /&gt;Only Reachable with VPN for some Encryption Domains.&lt;BR /&gt;IPERF3.exe -R -c "IP-Adress"&lt;BR /&gt;&lt;BR /&gt;Do that with Primary Gateway CP5800 R77.30 and then do it with the Backup GW CP4800 R80.10.&lt;BR /&gt;- Compare Results.&lt;/P&gt;&lt;P&gt;I know there will be some overhead in the packets but it should bring up at least 50% of public inet speed in the VPN.&lt;BR /&gt;My actual Test is 120Mbit/s Public / 60Mbit with VPN to Datacenter.&lt;BR /&gt;This was my experience in the last years over the same provider.&lt;/P&gt;&lt;P&gt;Do you have any hints to additional settings or encryption algorithms that could bring more performance?&lt;BR /&gt;Actually it is a litte bit better on the Backup GW 53Mbit/s.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2020 23:39:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/CP4800-C2S-VPN-Optimization/m-p/78892#M11131</guid>
      <dc:creator>SubSeven11</dc:creator>
      <dc:date>2020-03-19T23:39:41Z</dc:date>
    </item>
    <item>
      <title>Re: CP4800 C2S VPN Optimization</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/CP4800-C2S-VPN-Optimization/m-p/78901#M11132</link>
      <description>AES-128 might the be the lightest in terms of CPU, but is less secure with the shorter key lengths.&lt;BR /&gt;AES-256 is probably the best balance of security and performance.&lt;BR /&gt;Also, don't forget the hashes.&lt;BR /&gt;SHA-1 is considered insecure and you should probably use SHA-256 instead, but I'm sure with more CPU overhead.&lt;BR /&gt;That said, I don't know if the others are better/worse.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 20 Mar 2020 01:34:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/CP4800-C2S-VPN-Optimization/m-p/78901#M11132</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-20T01:34:19Z</dc:date>
    </item>
    <item>
      <title>Re: CP4800 C2S VPN Optimization</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/CP4800-C2S-VPN-Optimization/m-p/78990#M11133</link>
      <description>&lt;P&gt;Prohibit the use of 3DES completely as it is much slower especially if the firewall supports AES-NI.&amp;nbsp; This may break some very very old VPN clients if you have any floating around but that is unlikely.&amp;nbsp; Force DH Group 20 and AES-256 for Phase 1 and AES-128 for phase 2 which carries the majority of traffic.&amp;nbsp; Force SHA-256 for both phases.&amp;nbsp; Not sure if RA VPN supports&amp;nbsp;AES-GCM-128 for Phase 2 but it is much more efficient than straight AES-128 if AES-NI is supported on the firewall.&amp;nbsp; Avoid SHA-384 as VPN traffic using it cannot be accelerated by the firewall.&lt;/P&gt;
&lt;P&gt;These are very general recommendations specifically geared for performance, if the VPN traffic is subject to additional security requirements you may need stronger algorithms.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2020 15:17:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/CP4800-C2S-VPN-Optimization/m-p/78990#M11133</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-03-20T15:17:52Z</dc:date>
    </item>
    <item>
      <title>Re: CP4800 C2S VPN Optimization</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/CP4800-C2S-VPN-Optimization/m-p/79957#M11134</link>
      <description>&lt;P&gt;Want to give a feedback to this topic:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Check Point 4800 can manage up to 650 concurrent VPN Users in our enviroment with mixed real traffic.&lt;/LI&gt;&lt;LI&gt;But it will slow down alot the bandwith.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The global settings helped with bandwith because easy encryption methods before we reached the maximum on this GW.&lt;BR /&gt;We will switch to a bigger appliance to manage much more Users.&lt;/P&gt;&lt;P&gt;Thans to all!&lt;/P&gt;</description>
      <pubDate>Fri, 27 Mar 2020 12:57:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/CP4800-C2S-VPN-Optimization/m-p/79957#M11134</guid>
      <dc:creator>SubSeven11</dc:creator>
      <dc:date>2020-03-27T12:57:36Z</dc:date>
    </item>
  </channel>
</rss>

