- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
when should I start worrying if the CPU is high and can cause firewall problems?
Personally, and this is just my honest opinion, I generally start looking into things if it goes over 70% and I have that mentality for ANY fw vendor, not just CP.
Andy
In my firewall it's very high so
O wow, thats bad. Seems possibly related to corexl. What do top and ps -auxw show?
Andy
ps -auxw
PID TTY TIME CMD
53303 pts/2 00:00:00 ps
what is the purpose of this command? (ps -auxw)
what is the purpose of this? (fwk0_dev_0)
this is the appliance:
Platform: QM-35-00
Model: Check Point 7000
CPU Model: Intel(R) Xeon(R) Silver 4216 CPU
CPU Frequency: 2100.000 Mhz
Number of Cores: 32
CPU Hyperthreading: Enabled
ps -auxw would show all the processes and what they are "consuming"
Andy
From ps -auxw, what is consuming most CPU?
Andy
This is expected behavior on a firewall in USFW mode (which all modern ones are). That fwk0_dev_0 process is the lead process for all your firewall worker instance threads which handle medium path, slowpath, & rule base lookups among other things which consume significant CPU resources. See here from my Gateway Performance Optimization course:
But would it be normal to show 465% though??
Andy
Yeah because in USFW it's multithreaded so 465% doesnt mean it's using 465% of 1 core and hogging it.
K, fair enough. I was just little surprised to see that high of a number, caught me off guard. I would definitely verify the real numbers by running cpview and maybe also check the history with t flag.
Andy
I agree, however if the appliance resources are monitored correctly, and over time, you would easily know what is deemed normal traffic, and this would trigger an investigation.
I tend to aim for 50 - 60% peak CPU utilization, during the working week, if it goes above this, and when it does it tends to be pretty obvious I would be all over it.
In past cases it generally some new service that's been rolled out that's not working correctly or another country going through the UK firewalls to reach the internet as an example when they should be going out there local country POP.
CPView can help to determine to IPs, and I know there are utilities on checkmates (Phoneboy has mentioned this in later comments) that can help define top ten IP as example, equal NMS's monitoring the appliances could glean this information via SNMP as well.
Yep... @RemoteUser , see if running below command returns anything, might help.
Andy
fw ctl multik print_heavy_conn
another good command.
fw ctl multik print_heavy_conn:
See if maybe terminating some of those would help.
Andy
Uh most of those elephant flows lasted 2-3 seconds, not even long enough for Hyperflow to kick in. The longest elephant flow in your output lasted 12 seconds, not enough to cause sustained high CPU usage in your Firewall Worker Instances. Please provide the outputs from the Super Seven as requested earlier so we can make a concrete determination and not just engage in more idle speculation. I suspect you may have a lot of F2F/slowpath traffic.
We need to see the output of "Super Seven" to see what needs to be done here.
https://community.checkpoint.com/t5/Scripts/S7PAC-Super-Seven-Performance-Assessment-Commands/m-p/40...
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
9 | |
7 | |
6 | |
6 | |
5 | |
5 | |
5 | |
5 | |
5 | |
4 |
Fri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY