<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote Access VPN Packet loss in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269298#M1283</link>
    <description>&lt;P&gt;1) The presence of non-zero TX errors would suggest UPPAK is enabled, although it depends on whether your current code level was reached via upgrade or a fresh install.&amp;nbsp; Please provide output of &lt;STRONG&gt;fwaccel stat&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;2) While the RX-DRP number does look concerning, it is a red herring.&amp;nbsp; The drop rate is 0.06% which is below the 0.1% guideline; based on your ethtool outputs these are "real" buffering misses and not discarded junk traffic such as unknown EtherTypes or improperly pruned VLAN tags.&amp;nbsp; Increasing the ring buffer size is not likely to make a difference and will probably make things worse in the long run by introducing jitter due to &lt;A href="https://en.wikipedia.org/wiki/Bufferbloat" target="_self"&gt;BufferBloat&lt;/A&gt;.&amp;nbsp; I'm surprised you are getting any real RX-DRPs at all if UPPAK is enabled unless the firewall is severely overloaded. Is Dynamic Split enabled to add more SND cores as needed to speed the emptying of ring buffers?&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;dynamic_balancing -p&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;As for the 50% loss specifically afflicting Remote Access VPN:&lt;/P&gt;
&lt;P&gt;a) Please describe the client(s) you are using:&amp;nbsp; Mobile Access/SSL Extender?&amp;nbsp; SecuRemote?&amp;nbsp; Check Point Mobile?&amp;nbsp; EndPoint Security?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;b) Force use of visitor mode to TCP/443 with your Remote Access IPSec client (or turn it off if already forced).&amp;nbsp; Does the performance issue go away?&amp;nbsp; That would suggest an MTU/MSS Clamping issue or other issue with IPSec (which causes about 50% packet loss for full-size packets), although your site-to-site VPNs don't seem to be affected (unless they are already separately MSS clamped by you or your peer gateway(s)).&lt;/P&gt;
&lt;P&gt;c) Check what algorithms are being used by your IPSec clients in Global Properties under Remote Access...VPN Authentication &amp;amp; Encryption...Encryption algorithms...Edit...IPSec Security Association (Phase 2).&amp;nbsp; Is it still 3DES/MD5?&amp;nbsp; May not be your complete problem but certainly not helping, and also may not be interacting well with UPPAK if it is enabled.&lt;/P&gt;
&lt;P&gt;d) Replacement of switch may have changed the state of Ethernet Flow Control (Pause Frames) and whether they are still enabled on both sides.&amp;nbsp; Please provide output of &lt;STRONG&gt;ethtool -a&lt;/STRONG&gt;&amp;nbsp;and &lt;STRONG&gt;ethtool -i&amp;nbsp;&lt;/STRONG&gt;for affected interface.&lt;/P&gt;
&lt;P&gt;e) As a last resort you can try disabling SecureXL acceleration of vpn traffic with &lt;STRONG&gt;vpn accel off&lt;/STRONG&gt; then retest Remote Access VPN performance.&amp;nbsp; Be warned this will potentially disrupt all existing IPSec tunnels including site-to-site, and will move all IPSec processing out of SecureXL (especially if UPPAK is enabled) and back onto the Firewall Worker Instances.&amp;nbsp; Schedule a maintenance window before attempting this.&lt;/P&gt;</description>
    <pubDate>Fri, 30 Jan 2026 21:59:45 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2026-01-30T21:59:45Z</dc:date>
    <item>
      <title>Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269271#M1268</link>
      <description>&lt;P&gt;We have a cluster of 2 19000 appliances running R81.20 JHF 118. We have 10 Gbps connection to the ISP. After upgrading the switch that the cluster is connected to, we are seeing packet loss on Remote Access VPNs. S2S VPNs seem unaffected. Depending on the time of the day, we up to 50% loss on ping tests. I realize it's probably caused by the equipment that was changed (Cisco C9500) but I want to rule out any thing on the Check Point side as seems to only affect RA VPN traffic.&lt;/P&gt;&lt;P&gt;WAN interface:&lt;BR /&gt;Interface eth3-01&lt;BR /&gt;state on&lt;BR /&gt;mac-addr 00:xx:xx:xx:xx:xx&lt;BR /&gt;type ethernet&lt;BR /&gt;link-state link up&lt;BR /&gt;mtu 1500&lt;BR /&gt;auto-negotiation on&lt;BR /&gt;speed 25G&lt;BR /&gt;ipv6-autoconfig Not configured&lt;BR /&gt;monitor-mode off&lt;BR /&gt;duplex full&lt;BR /&gt;link-speed Not configured&lt;BR /&gt;comments WAN&lt;BR /&gt;ipv4-address xxx.xxx.xxx.xxx/24&lt;BR /&gt;ipv6-address ***************&lt;BR /&gt;ipv6-local-link-address ***************&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 18:36:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269271#M1268</guid>
      <dc:creator>Richard_Wieser</dc:creator>
      <dc:date>2026-01-30T18:36:59Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269272#M1269</link>
      <description>&lt;P&gt;In this case, it’s a good idea to start with some basic troubleshooting, focusing on the ISP WAN link used by the Remote Access VPN.&lt;/P&gt;&lt;P&gt;Next On the Check Point side, verify the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;cpview&lt;BR /&gt;&amp;nbsp;- Check memory status and CPU usage.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;From Expert mode:&lt;/P&gt;&lt;P&gt;netstat -ni&lt;BR /&gt;&amp;nbsp; - Check if you see an abnormal number of RX-DROP or TX-DROP counters on the relevant NIC used for the RA VPN.&lt;/P&gt;&lt;P&gt;ethtool -g &amp;lt;isp-wan-ra-vpn-nic&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;- confim that the RX/TX maximum it's the same, on UPPAK can be different and cause RX-DROP, KPPAK can fix.&amp;nbsp;&lt;BR /&gt;ethtool -g &amp;lt;nic-connected-to-switch&amp;gt;&lt;/P&gt;&lt;P&gt;Verify NIC ring buffer settings and compare them if needed.&lt;/P&gt;&lt;P&gt;Additionally:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Run ping to the ISP gateway and other relevant gateways involved in this connection to check latency and packet loss.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Run traceroute to validate the path and identify possible routing or ISP-related issues.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;These checks should give you a solid starting point for the investigation.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 18:50:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269272#M1269</guid>
      <dc:creator>israelfds95</dc:creator>
      <dc:date>2026-01-30T18:50:57Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269273#M1270</link>
      <description>&lt;P&gt;CPU Looks fine:&lt;BR /&gt;| CPU type CPUs Avg utilization |&lt;BR /&gt;| CoreXL_SND 10 15% |&lt;BR /&gt;| CoreXL_FW 53 17% |&lt;BR /&gt;| FWD 1 29%&lt;/P&gt;&lt;P&gt;There are drops which are climbing.&lt;BR /&gt;Iface MTU Met RX-OK RX-ERR RX-DRP RX-OVR TX-OK TX-ERR TX-DRP TX-OVR Flg&lt;BR /&gt;eth3-01 1500 0 184241747707 0 &lt;STRONG&gt;111870671&lt;/STRONG&gt; 0 103782379871 0 0 0 ABMRU&lt;BR /&gt;eth3-02 1500 0 89235490191 0 &lt;STRONG&gt;21345804&lt;/STRONG&gt; 0 148776069625 0 &lt;STRONG&gt;6194&lt;/STRONG&gt; 0 ABMRU&lt;/P&gt;&lt;P&gt;# ethtool -g eth3-01&lt;BR /&gt;Ring parameters for eth3-01:&lt;BR /&gt;Pre-set maximums:&lt;BR /&gt;RX: 4096&lt;BR /&gt;RX Mini: 0&lt;BR /&gt;RX Jumbo: 0&lt;BR /&gt;TX: 4096&lt;BR /&gt;Current hardware settings:&lt;BR /&gt;RX: 4096&lt;BR /&gt;RX Mini: 0&lt;BR /&gt;RX Jumbo: 0&lt;BR /&gt;TX: 4096&lt;/P&gt;&lt;P&gt;LAN interface:&lt;BR /&gt;# ethtool -g eth3-02&lt;BR /&gt;Ring parameters for eth3-02:&lt;BR /&gt;Pre-set maximums:&lt;BR /&gt;RX: 4096&lt;BR /&gt;RX Mini: 0&lt;BR /&gt;RX Jumbo: 0&lt;BR /&gt;TX: 4096&lt;BR /&gt;Current hardware settings:&lt;BR /&gt;&lt;STRONG&gt;RX: 1024&lt;/STRONG&gt;&lt;BR /&gt;RX Mini: 0&lt;BR /&gt;RX Jumbo: 0&lt;BR /&gt;&lt;STRONG&gt;TX: 512&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Pings to the edge router is solid with minimal loss. Pings to the cluster's external vIP (w/o VPN) is also solid.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 19:19:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269273#M1270</guid>
      <dc:creator>Richard_Wieser</dc:creator>
      <dc:date>2026-01-30T19:19:19Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269277#M1271</link>
      <description>&lt;P&gt;Is the packet loss happening for LAN IPs on interface eth3-02 via RA VPN?&lt;BR /&gt;This is happening just on RA VPN? or in LAN testing from other machines you percept the same situation?&amp;nbsp;&lt;/P&gt;&lt;P&gt;One important point on interface &lt;STRONG&gt;eth3-02&lt;/STRONG&gt; is to adjust the &lt;STRONG&gt;RX/TX ring buffers&lt;/STRONG&gt; to the maximum supported value (4096). This usually helps reduce &lt;STRONG&gt;RX-DROP&lt;/STRONG&gt; counters and improves RX/TX performance on the interface:&lt;/P&gt;&lt;P&gt;set interface eth3-02 rx-ringsize 4096&lt;BR /&gt;set interface eth3-02 tx-ringsize 4096&lt;/P&gt;&lt;P&gt;save config&lt;/P&gt;&lt;P&gt;Normally, no reboot or cpstop; cpstart is required for this change to take effect.&lt;BR /&gt;However, if possible, performing a reboot later can be a good practice.&lt;/P&gt;&lt;P&gt;Reference:&lt;BR /&gt;How to increase the size of a ring buffer on Gaia OS for Intel NIC and Broadcom NIC&lt;BR /&gt;&lt;A class="" href="https://support.checkpoint.com/results/sk/sk42181" target="_new" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk42181&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Another relevant point regarding &lt;STRONG&gt;RX-DROP&lt;/STRONG&gt; on these interfaces is to verify the &lt;STRONG&gt;physical layer&lt;/STRONG&gt;: connectors, cabling, and both firewall and switch ports, making sure everything is properly connected and error-free.&lt;/P&gt;&lt;P&gt;It’s also useful to run &lt;STRONG&gt;ping&lt;/STRONG&gt; from the source host to the destination and test &lt;STRONG&gt;each hop&lt;/STRONG&gt; along the path, trying to identify where packet loss starts occurring. Validate the full path end-to-end.&lt;/P&gt;&lt;P&gt;Based on that, validate the responses at each hop until you can clearly identify where the bottleneck is. This kind of issue can be hard to pinpoint and usually requires a structured, step-by-step troubleshooting approach.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 19:45:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269277#M1271</guid>
      <dc:creator>israelfds95</dc:creator>
      <dc:date>2026-01-30T19:45:55Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269278#M1272</link>
      <description>&lt;P&gt;Can you run ethtool -S on external interface and post the results please?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 19:50:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269278#M1272</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-30T19:50:55Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269279#M1273</link>
      <description>&lt;P&gt;# ethtool -S eth3-01&lt;BR /&gt;NIC statistics:&lt;BR /&gt;ifs_ibytes_hi: 48896&lt;BR /&gt;ifs_ibytes_lo: 3658302049&lt;BR /&gt;ifs_obytes_hi: 12721&lt;BR /&gt;ifs_obytes_lo: 3482159730&lt;BR /&gt;ifs_ipackets: 3997561350&lt;BR /&gt;ifs_opackets: 781934380&lt;BR /&gt;ifs_imcasts: 0&lt;BR /&gt;ifs_omcasts: 0&lt;BR /&gt;ifs_noproto: 0&lt;BR /&gt;ifs_ibcasts: 0&lt;BR /&gt;ifs_obcasts: 0&lt;BR /&gt;ifs_linkchanges: 0&lt;BR /&gt;ife_ierrors: 0&lt;BR /&gt;ife_oerrors: 0&lt;BR /&gt;ife_iqdrops: 0&lt;BR /&gt;ife_oqdrops: 0&lt;BR /&gt;iee_rx_missed: 0&lt;BR /&gt;rx_q0_packets: 1006105490&lt;BR /&gt;rx_q1_packets: 607304513&lt;BR /&gt;rx_q2_packets: 631652734&lt;BR /&gt;rx_q3_packets: 504148059&lt;BR /&gt;rx_q4_packets: 827473958&lt;BR /&gt;rx_q5_packets: 502861718&lt;BR /&gt;rx_q6_packets: 664985290&lt;BR /&gt;rx_q7_packets: 315651588&lt;BR /&gt;rx_q8_packets: 714069108&lt;BR /&gt;rx_q9_packets: 884484676&lt;BR /&gt;rx_q10_packets: 2165548462&lt;BR /&gt;rx_q11_packets: 2150313934&lt;BR /&gt;rx_q12_packets: 497831970&lt;BR /&gt;rx_q13_packets: 505753463&lt;BR /&gt;rx_q14_packets: 118434909&lt;BR /&gt;rx_q15_packets: 116657162&lt;BR /&gt;rx_q16_packets: 110652105&lt;BR /&gt;rx_q17_packets: 104117640&lt;BR /&gt;rx_q18_packets: 61716064&lt;BR /&gt;rx_q19_packets: 59423713&lt;BR /&gt;rx_q20_packets: 18346048&lt;BR /&gt;rx_q21_packets: 19788763&lt;BR /&gt;rx_q22_packets: 10605&lt;BR /&gt;rx_q23_packets: 10342&lt;BR /&gt;rx_q24_packets: 36660&lt;BR /&gt;rx_q25_packets: 12214&lt;BR /&gt;rx_q26_packets: 11185&lt;BR /&gt;rx_q27_packets: 52927&lt;BR /&gt;rx_q28_packets: 7938&lt;BR /&gt;rx_q29_packets: 9890&lt;BR /&gt;rx_q30_packets: 12314&lt;BR /&gt;rx_q31_packets: 10414&lt;BR /&gt;tx_q0_packets: 2974195200&lt;BR /&gt;tx_q1_packets: 332007692&lt;BR /&gt;tx_q2_packets: 36864168&lt;BR /&gt;tx_q3_packets: 4266557949&lt;BR /&gt;tx_q4_packets: 4245789008&lt;BR /&gt;tx_q5_packets: 9955395&lt;BR /&gt;tx_q6_packets: 313&lt;BR /&gt;tx_q7_packets: 178&lt;BR /&gt;tx_q8_packets: 1335432791&lt;BR /&gt;tx_q9_packets: 253559744&lt;BR /&gt;tx_q10_packets: 50147090&lt;BR /&gt;tx_q11_packets: 38850697&lt;BR /&gt;tx_q12_packets: 22518310&lt;BR /&gt;tx_q13_packets: 24&lt;BR /&gt;tx_q14_packets: 5&lt;BR /&gt;tx_q15_packets: 21&lt;BR /&gt;tx_q16_packets: 2728173556&lt;BR /&gt;tx_q17_packets: 78883520&lt;BR /&gt;tx_q18_packets: 4170121829&lt;BR /&gt;tx_q19_packets: 4286020273&lt;BR /&gt;tx_q20_packets: 4280188530&lt;BR /&gt;tx_q21_packets: 8588916&lt;BR /&gt;tx_q22_packets: 95&lt;BR /&gt;tx_q23_packets: 466&lt;BR /&gt;tx_q24_packets: 1371308077&lt;BR /&gt;tx_q25_packets: 250363063&lt;BR /&gt;tx_q26_packets: 45751553&lt;BR /&gt;tx_q27_packets: 37940200&lt;BR /&gt;tx_q28_packets: 23243746&lt;BR /&gt;tx_q29_packets: 49&lt;BR /&gt;tx_q30_packets: 27&lt;BR /&gt;tx_q31_packets: 6&lt;BR /&gt;tx_q32_packets: 242970&lt;BR /&gt;rx_good_packets: 3997561350&lt;BR /&gt;tx_good_packets: 781934380&lt;BR /&gt;rx_good_bytes: 3658302049&lt;BR /&gt;tx_good_bytes: 3482159730&lt;BR /&gt;rx_missed_errors: 111889044&lt;BR /&gt;rx_errors: 0&lt;BR /&gt;tx_errors: 0&lt;BR /&gt;rx_mbuf_allocation_errors: 0&lt;BR /&gt;rx_unicast_packets: 3901197675&lt;BR /&gt;rx_multicast_packets: 5587460&lt;BR /&gt;rx_broadcast_packets: 204502017&lt;BR /&gt;rx_dropped_packets: 0&lt;BR /&gt;rx_unknown_protocol_packets: 1836758&lt;BR /&gt;tx_unicast_packets: 778620776&lt;BR /&gt;tx_multicast_packets: 104039&lt;BR /&gt;tx_broadcast_packets: 3209565&lt;BR /&gt;tx_dropped_packets: 0&lt;BR /&gt;tx_link_down_dropped: 9&lt;BR /&gt;rx_crc_errors: 0&lt;BR /&gt;rx_illegal_byte_errors: 0&lt;BR /&gt;rx_error_bytes: 0&lt;BR /&gt;mac_local_errors: 1&lt;BR /&gt;mac_remote_errors: 12&lt;BR /&gt;rx_len_errors: 0&lt;BR /&gt;tx_xon_packets: 0&lt;BR /&gt;rx_xon_packets: 0&lt;BR /&gt;tx_xoff_packets: 0&lt;BR /&gt;rx_xoff_packets: 0&lt;BR /&gt;rx_size_64_packets: 4280691386&lt;BR /&gt;rx_size_65_to_127_packets: 3232002451&lt;BR /&gt;rx_size_128_to_255_packets: 2448230997&lt;BR /&gt;rx_size_256_to_511_packets: 368156231&lt;BR /&gt;rx_size_512_to_1023_packets: 1410107132&lt;BR /&gt;rx_size_1024_to_1522_packets: 962033547&lt;BR /&gt;rx_size_1523_to_max_packets: 0&lt;BR /&gt;rx_undersized_errors: 0&lt;BR /&gt;rx_oversize_errors: 0&lt;BR /&gt;rx_mac_short_pkt_dropped: 0&lt;BR /&gt;rx_fragmented_errors: 0&lt;BR /&gt;rx_jabber_errors: 0&lt;BR /&gt;tx_size_64_packets: 362352262&lt;BR /&gt;tx_size_65_to_127_packets: 2316693580&lt;BR /&gt;tx_size_128_to_255_packets: 1417296860&lt;BR /&gt;tx_size_256_to_511_packets: 3492555606&lt;BR /&gt;tx_size_512_to_1023_packets: 422889831&lt;BR /&gt;tx_size_1024_to_1522_packets: 1360080833&lt;BR /&gt;tx_size_1523_to_max_packets: 0&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 19:55:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269279#M1273</guid>
      <dc:creator>Richard_Wieser</dc:creator>
      <dc:date>2026-01-30T19:55:46Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269280#M1274</link>
      <description>&lt;P&gt;I dont see any rx or tx errors at all, looks fine to me.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 19:59:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269280#M1274</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-30T19:59:35Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269281#M1275</link>
      <description>&lt;P&gt;This first from netstat -ni show RX-DRP for both&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;Iface&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;MTU&amp;nbsp; &amp;nbsp; Met RX-OK&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; RX-ERR&amp;nbsp; &amp;nbsp; &amp;nbsp;RX-DRP&amp;nbsp; &amp;nbsp; &amp;nbsp; RX-OVR&amp;nbsp; &amp;nbsp;TX-OK&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;TX-ERR TX-DRP TX-OVR Flg&lt;BR /&gt;eth3-01 1500&amp;nbsp; &amp;nbsp; &amp;nbsp;0&amp;nbsp; &amp;nbsp; &amp;nbsp; 184241747707&amp;nbsp; &amp;nbsp; 0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 111870671&amp;nbsp; &amp;nbsp;0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 103782379871&amp;nbsp; 0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;ABMRU&lt;BR /&gt;eth3-02 1500&amp;nbsp; &amp;nbsp; &amp;nbsp;0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;89235490191&amp;nbsp; &amp;nbsp; &amp;nbsp;0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;21345804&amp;nbsp; &amp;nbsp; 0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 148776069625&amp;nbsp; 0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;6194&amp;nbsp; &amp;nbsp; &amp;nbsp; 0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;ABMRU&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;So, for me still valid point increase the rx/tx buffer from nic eth3-02, simple to fix, and will bring a kickly improvement, after that will be need take&amp;nbsp; a time to see if the RX-DROP will decrease, and follow the investigation&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;One important point on interface&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;eth3-02&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is to adjust the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;RX/TX ring buffers&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to the maximum supported value (4096). This usually helps reduce&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;RX-DROP&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;counters and improves RX/TX performance on the interface:&lt;/P&gt;&lt;P&gt;set interface eth3-02 rx-ringsize 4096&lt;BR /&gt;set interface eth3-02 tx-ringsize 4096&lt;/P&gt;&lt;P&gt;save config&lt;/P&gt;&lt;P&gt;Normally, no reboot or cpstop; cpstart is required for this change to take effect.&lt;BR /&gt;However, if possible, performing a reboot later can be a good practice.&lt;/P&gt;&lt;P&gt;Reference:&lt;BR /&gt;How to increase the size of a ring buffer on Gaia OS for Intel NIC and Broadcom NIC&lt;BR /&gt;&lt;A class="" href="https://support.checkpoint.com/results/sk/sk42181" target="_new" rel="noopener noreferrer"&gt;https://support.checkpoint.com/results/sk/sk42181&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 20:23:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269281#M1275</guid>
      <dc:creator>israelfds95</dc:creator>
      <dc:date>2026-01-30T20:23:24Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269282#M1276</link>
      <description>&lt;P&gt;Asymmetric forwarding / per-packet load-balancing introduced by the new switch&lt;/P&gt;&lt;P&gt;Remote Access VPN (typically IKE/UDP 500 + NAT-T UDP 4500, plus encrypted payload) is far more sensitive to out-of-order and state asymmetry than many S2S deployments (which might be pinned differently, use different selectors, different peers, or simply have fewer concurrent flows).&lt;/P&gt;&lt;P&gt;Common patterns after a switch upgrade:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;EtherChannel/LACP hashing changed (or default hash algorithm differs) so UDP/4500 flows are not consistently pinned.&lt;/LI&gt;&lt;LI&gt;ECMP/per-packet load balancing enabled (even unintentionally) upstream/downstream.&lt;/LI&gt;&lt;LI&gt;Return traffic is not guaranteed to hit the same cluster member that established the IKE/IPsec SA.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Why this matches your symptom:&lt;BR /&gt;Time-of-day variation = congestion/microburst &lt;EM&gt;or&lt;/EM&gt; load distribution changes as more RA users connect. If the “wrong” member sees return traffic or packets arrive out-of-order, you get apparent loss inside the tunnel even if raw interface counters look okay.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 20:22:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269282#M1276</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-01-30T20:22:27Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269283#M1277</link>
      <description>&lt;P&gt;How to rule out “Check Point side” fast (with evidence)&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;A) Confirm if loss is &lt;EM&gt;already on the wire&lt;/EM&gt; or only &lt;EM&gt;inside the tunnel&lt;/EM&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;On the active member that owns the external IP at the time of testing:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Capture encrypted traffic on WAN&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;tcpdump -ni eth3-01 udp port 4500 or udp port 500&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Run a sustained ping across the RA tunnel and watch:&lt;/LI&gt;&lt;UL&gt;&lt;LI&gt;Do you see the client’s UDP/4500 packets arriving consistently?&lt;/LI&gt;&lt;LI&gt;Do you see your replies leaving consistently?&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;OL&gt;&lt;LI&gt;If packets arrive clean but loss is still seen inside tunnel, move to kernel drops / decryption path.&lt;/LI&gt;&lt;/OL&gt;&lt;OL&gt;&lt;LI&gt;&lt;BR /&gt;B) Check interface health and drops (this is the “no excuses” baseline)&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;On each cluster member (both), collect:&lt;/P&gt;&lt;P&gt;ethtool -S eth3-01 | egrep -i "drop|discard|err|crc|over|miss|fifo|timeout"&lt;/P&gt;&lt;P&gt;ip -s link show dev eth3-01&lt;/P&gt;&lt;P&gt;What you want:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;CRC / input errors should be ~0.&lt;/LI&gt;&lt;LI&gt;If you see rx_dropped / rx_missed_errors climbing, that’s a local receive path issue (driver, queueing, bursts).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Also grab:&lt;/P&gt;&lt;P&gt;cpview&lt;/P&gt;&lt;P&gt;Look specifically at:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;CPU saturation / spikes at loss times&lt;/LI&gt;&lt;LI&gt;Interrupt load&lt;/LI&gt;&lt;LI&gt;Interface drops&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;C) Check for kernel drops and acceleration constraints&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;On the active member during the test window:&lt;/P&gt;&lt;P&gt;fw ctl pstat&lt;/P&gt;&lt;P&gt;fwaccel stats -s&lt;/P&gt;&lt;P&gt;Indicators of a Check Point-side bottleneck:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;High “dropped” counters in kernel/queues&lt;/LI&gt;&lt;LI&gt;Acceleration offloading flapping (less common, but you’ll see it)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;If you suspect drops in the firewall path:&lt;/P&gt;&lt;P&gt;fw ctl zdebug drop | head&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 20:23:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269283#M1277</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-01-30T20:23:16Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269285#M1278</link>
      <description>&lt;P&gt;Asymmetric forwarding / per-packet load-balancing introduced by the new switch&lt;/P&gt;&lt;P&gt;Remote Access VPN (typically IKE/UDP 500 + NAT-T UDP 4500, plus encrypted payload) is far more sensitive to out-of-order and state asymmetry than many S2S deployments (which might be pinned differently, use different selectors, different peers, or simply have fewer concurrent flows).&lt;/P&gt;&lt;P&gt;Common patterns after a switch upgrade:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;EtherChannel/LACP hashing changed (or default hash algorithm differs) so UDP/4500 flows are not consistently pinned.&lt;/LI&gt;&lt;LI&gt;ECMP/per-packet load balancing enabled (even unintentionally) upstream/downstream.&lt;/LI&gt;&lt;LI&gt;Return traffic is not guaranteed to hit the same cluster member that established the IKE/IPsec SA.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Why this matches your symptom:&lt;BR /&gt;Time-of-day variation = congestion/microburst &lt;EM&gt;or&lt;/EM&gt; load distribution changes as more RA users connect. If the “wrong” member sees return traffic or packets arrive out-of-order, you get apparent loss inside the tunnel even if raw interface counters look okay.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 20:27:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269285#M1278</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-01-30T20:27:34Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269290#M1279</link>
      <description>&lt;P&gt;I've maxed out the ring buffers and reboot the member in question. Now I have:&lt;/P&gt;&lt;P&gt;# ethtool -g eth3-01&lt;BR /&gt;Ring parameters for eth3-01:&lt;BR /&gt;Pre-set maximums:&lt;BR /&gt;RX: 4096&lt;BR /&gt;RX Mini: 0&lt;BR /&gt;RX Jumbo: 0&lt;BR /&gt;TX: 4096&lt;BR /&gt;Current hardware settings:&lt;BR /&gt;RX: 4096&lt;BR /&gt;RX Mini: 0&lt;BR /&gt;RX Jumbo: 0&lt;BR /&gt;TX: 4096&lt;/P&gt;&lt;P&gt;# ethtool -g eth3-02&lt;BR /&gt;Ring parameters for eth3-02:&lt;BR /&gt;Pre-set maximums:&lt;BR /&gt;RX: 4096&lt;BR /&gt;RX Mini: 0&lt;BR /&gt;RX Jumbo: 0&lt;BR /&gt;TX: 4096&lt;BR /&gt;Current hardware settings:&lt;BR /&gt;RX: 4096&lt;BR /&gt;RX Mini: 0&lt;BR /&gt;RX Jumbo: 0&lt;BR /&gt;TX: 4096&lt;/P&gt;&lt;P&gt;Kernel Interface table&lt;BR /&gt;Iface&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;MTU Met RX-OK&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;RX-ERR&amp;nbsp; &amp;nbsp;RX-DRP&amp;nbsp; &amp;nbsp;RX-OVR&amp;nbsp; &amp;nbsp;TX-OK&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; TX-ERR&amp;nbsp; &amp;nbsp;TX-DRP&amp;nbsp; TX-OVR Flg&lt;BR /&gt;eth3-01 1500 0&amp;nbsp; &amp;nbsp; &amp;nbsp; 183220823&amp;nbsp; 0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10025&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;109400885&amp;nbsp; 0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;ABMRU&lt;BR /&gt;eth3-02 1500 0&amp;nbsp; &amp;nbsp; &amp;nbsp; 89822553&amp;nbsp; &amp;nbsp; 0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;5&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 143595050&amp;nbsp; 0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;ABMRU&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 21:12:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269290#M1279</guid>
      <dc:creator>Richard_Wieser</dc:creator>
      <dc:date>2026-01-30T21:12:43Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269293#M1280</link>
      <description>&lt;P&gt;Very good, this is a solid improvement on eth3-02. Now monitor netstat -ni&amp;nbsp;&amp;nbsp;to see if the RX-DROP counter on eth3-01 starts growing too much.&lt;/P&gt;&lt;P&gt;Next, run latency and packet loss tests over the Remote Access VPN and share the results.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 21:20:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269293#M1280</guid>
      <dc:creator>israelfds95</dc:creator>
      <dc:date>2026-01-30T21:20:56Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269295#M1281</link>
      <description>&lt;P&gt;RX-DRP on eth3-01 is still climbing, currently at 17063. Eth3-02 still at 5. Ping test is better.&lt;BR /&gt;Packets: Sent = 5232, Received = 5009, Lost = 223 (4% loss),&lt;BR /&gt;Approximate round trip times in milli-seconds:&lt;BR /&gt;Minimum = 8ms, Maximum = 71ms, Average = 19ms&lt;/P&gt;&lt;P&gt;This seems to vary with load. It's a lot better off business hours. Being Friday afternoon, there are less people connected, roughly 166 where the daily average is 250-270.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 21:30:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269295#M1281</guid>
      <dc:creator>Richard_Wieser</dc:creator>
      <dc:date>2026-01-30T21:30:55Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269296#M1282</link>
      <description>&lt;P&gt;Yes, eth3-02 was resolved by adjusting the RX/TX buffer sizes. eth3-01 still needs further investigation and should be monitored over the next few days, especially when normal peak business traffic returns, to see if this RX-DROP will continue grow out of an acceptable way.&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is still some packet loss, and this needs to be evaluated carefully. It’s important to validate all hops end-to-end and review all elements related to this interface, including the physical layer and the ISP next-hop.&amp;nbsp;&lt;/P&gt;&lt;P&gt;It’s also worth running hcp -r all to collect additional information from the health report.&lt;/P&gt;&lt;P&gt;Please keep us updated with any new findings.&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 21:45:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269296#M1282</guid>
      <dc:creator>israelfds95</dc:creator>
      <dc:date>2026-01-30T21:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269298#M1283</link>
      <description>&lt;P&gt;1) The presence of non-zero TX errors would suggest UPPAK is enabled, although it depends on whether your current code level was reached via upgrade or a fresh install.&amp;nbsp; Please provide output of &lt;STRONG&gt;fwaccel stat&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;2) While the RX-DRP number does look concerning, it is a red herring.&amp;nbsp; The drop rate is 0.06% which is below the 0.1% guideline; based on your ethtool outputs these are "real" buffering misses and not discarded junk traffic such as unknown EtherTypes or improperly pruned VLAN tags.&amp;nbsp; Increasing the ring buffer size is not likely to make a difference and will probably make things worse in the long run by introducing jitter due to &lt;A href="https://en.wikipedia.org/wiki/Bufferbloat" target="_self"&gt;BufferBloat&lt;/A&gt;.&amp;nbsp; I'm surprised you are getting any real RX-DRPs at all if UPPAK is enabled unless the firewall is severely overloaded. Is Dynamic Split enabled to add more SND cores as needed to speed the emptying of ring buffers?&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;dynamic_balancing -p&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;As for the 50% loss specifically afflicting Remote Access VPN:&lt;/P&gt;
&lt;P&gt;a) Please describe the client(s) you are using:&amp;nbsp; Mobile Access/SSL Extender?&amp;nbsp; SecuRemote?&amp;nbsp; Check Point Mobile?&amp;nbsp; EndPoint Security?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;b) Force use of visitor mode to TCP/443 with your Remote Access IPSec client (or turn it off if already forced).&amp;nbsp; Does the performance issue go away?&amp;nbsp; That would suggest an MTU/MSS Clamping issue or other issue with IPSec (which causes about 50% packet loss for full-size packets), although your site-to-site VPNs don't seem to be affected (unless they are already separately MSS clamped by you or your peer gateway(s)).&lt;/P&gt;
&lt;P&gt;c) Check what algorithms are being used by your IPSec clients in Global Properties under Remote Access...VPN Authentication &amp;amp; Encryption...Encryption algorithms...Edit...IPSec Security Association (Phase 2).&amp;nbsp; Is it still 3DES/MD5?&amp;nbsp; May not be your complete problem but certainly not helping, and also may not be interacting well with UPPAK if it is enabled.&lt;/P&gt;
&lt;P&gt;d) Replacement of switch may have changed the state of Ethernet Flow Control (Pause Frames) and whether they are still enabled on both sides.&amp;nbsp; Please provide output of &lt;STRONG&gt;ethtool -a&lt;/STRONG&gt;&amp;nbsp;and &lt;STRONG&gt;ethtool -i&amp;nbsp;&lt;/STRONG&gt;for affected interface.&lt;/P&gt;
&lt;P&gt;e) As a last resort you can try disabling SecureXL acceleration of vpn traffic with &lt;STRONG&gt;vpn accel off&lt;/STRONG&gt; then retest Remote Access VPN performance.&amp;nbsp; Be warned this will potentially disrupt all existing IPSec tunnels including site-to-site, and will move all IPSec processing out of SecureXL (especially if UPPAK is enabled) and back onto the Firewall Worker Instances.&amp;nbsp; Schedule a maintenance window before attempting this.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 21:59:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269298#M1283</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2026-01-30T21:59:45Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269299#M1284</link>
      <description>&lt;OL&gt;&lt;LI&gt;&lt;P&gt;# fwaccel stat&lt;BR /&gt;+---------------------------------------------------------------------------------+&lt;BR /&gt;|Id|Name |Status |Interfaces |Features |&lt;BR /&gt;+---------------------------------------------------------------------------------+&lt;BR /&gt;|0 |UPPAK |enabled |Sync,eth1-05,eth1-06, |Acceleration,Cryptography |&lt;BR /&gt;| | | |eth1-08,eth3-03,eth3-01, | |&lt;BR /&gt;| | | |eth3-04,eth3-02 |Crypto: Tunnel,UDPEncap,MD5, |&lt;BR /&gt;| | | | |SHA1,3DES,DES,AES-128,AES-256,|&lt;BR /&gt;| | | | |ESP,LinkSelection,DynamicVPN, |&lt;BR /&gt;| | | | |NatTraversal,AES-XCBC,SHA256, |&lt;BR /&gt;| | | | |SHA384,SHA512 |&lt;BR /&gt;+---------------------------------------------------------------------------------+&lt;/P&gt;&lt;P&gt;Accept Templates : enabled&lt;BR /&gt;Drop Templates : enabled&lt;BR /&gt;NAT Templates : enabled&lt;BR /&gt;LightSpeed Accel : disabled&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;# dynamic_balancing -p&lt;BR /&gt;Dynamic Balancing is currently On&lt;OL&gt;&lt;LI&gt;Endpoint Security VPN (Mostly E88.70 )&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;P1 supports DES :(, &lt;STRONG&gt;AES-128&lt;/STRONG&gt;, AES-356 MD5, SHA1 SHA256 DH:2,5,14 using 2. Phase2: 3DES, &lt;STRONG&gt;AES-128,&lt;/STRONG&gt; AES-256, data inegrity: sha1 DH Group2.&lt;/LI&gt;&lt;LI&gt;# ethtool -a eth3-01&lt;BR /&gt;Pause parameters for eth3-01:&lt;BR /&gt;Autonegotiate: off&lt;BR /&gt;RX: off&lt;BR /&gt;TX: off&lt;BR /&gt;# ethtool -i eth3-01&lt;BR /&gt;driver: net_ice&lt;BR /&gt;version: DPDK 20.11.7.7.0 (11 Jun 25)&lt;BR /&gt;firmware-version: 4.30 0x8001b94f 1.3415.0&lt;BR /&gt;expansion-rom-version:&lt;BR /&gt;bus-info: 0000:b1:00.1&lt;BR /&gt;supports-statistics: yes&lt;BR /&gt;supports-test: no&lt;BR /&gt;supports-eeprom-access: no&lt;BR /&gt;supports-register-dump: no&lt;BR /&gt;supports-priv-flags: yes&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;The SMS has been upgraded to get to this version, from the R60 days!&lt;span class="lia-unicode-emoji" title=":astonished_face:"&gt;😲&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 22:18:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269299#M1284</guid>
      <dc:creator>Richard_Wieser</dc:creator>
      <dc:date>2026-01-30T22:18:28Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269300#M1285</link>
      <description>&lt;P&gt;1) Please provide a screenshot of the IPSec Phase 2 screen for Remote Access VPN.&amp;nbsp; By default, it supports almost all algorithms but really only allows 3DES/MD5 to be used.&amp;nbsp; The checkbox at the bottom determines that.&lt;/P&gt;
&lt;P&gt;2) The ice driver in use on eth3-01 has a known issue with improper balancing of IPSec traffic across SND cores (&lt;A href="https://support.checkpoint.com/results/sk/sk183525" target="_self"&gt;sk183525 -&amp;nbsp;&lt;/A&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk183525" target="_self"&gt;High CPU usage on one SND core&lt;/A&gt;),&amp;nbsp;but supposedly UPPAK mode fixes that.&amp;nbsp; Using &lt;STRONG&gt;cpview&lt;/STRONG&gt; (not &lt;STRONG&gt;top&lt;/STRONG&gt; or any other Linux-based measuring tools), are any SND cores overloaded?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3) Pause frames are off on the gateway, so the corresponding setting on the switch does not matter.&amp;nbsp; Any carrier transitions on eth3-01?&amp;nbsp; Run &lt;STRONG&gt;ifconfig eth3-01&lt;/STRONG&gt; and check the "carrier" value.&amp;nbsp; Check counters on the switchport side as well for errors or problems.&lt;/P&gt;
&lt;P&gt;4) Try toggling Visitor Mode to see if it makes a difference, otherwise I'd suspect an issue with UPPAK mode.&amp;nbsp; You can try setting it back to KPPAK and see if that resolves the issue.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 22:35:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269300#M1285</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2026-01-30T22:35:31Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269305#M1286</link>
      <description>&lt;P&gt;# ifconfig eth3-01&lt;BR /&gt;eth3-01 Link encap:Ethernet HWaddr x:x:x:x&lt;BR /&gt;inet addr:x.x.x.x Bcast:x.x.x.x.x Mask:255.255.255.0&lt;BR /&gt;inet6 addr: x:x:x:x:x Scope:Global&lt;BR /&gt;inet6 addr: Scope:Link&lt;BR /&gt;UP BROADCAST RUNNING ALLMULTI MULTICAST MTU:1500 Metric:1&lt;BR /&gt;RX packets:791585415 errors:0 dropped:53078 overruns:0 frame:0&lt;BR /&gt;TX packets:482735314 errors:0 dropped:0 overruns:0 carrier:0&lt;BR /&gt;collisions:0 txqueuelen:2048&lt;BR /&gt;RX bytes:861738566609 (802.5 GiB) TX bytes:236663858482 (220.4 GiB)&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 22:48:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269305#M1286</guid>
      <dc:creator>Richard_Wieser</dc:creator>
      <dc:date>2026-01-30T22:48:27Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN Packet loss</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269338#M1287</link>
      <description>&lt;P&gt;Definitely good idea&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/93117"&gt;@israelfds95&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Jan 2026 16:44:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-Packet-loss/m-p/269338#M1287</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-31T16:44:21Z</dc:date>
    </item>
  </channel>
</rss>

