- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi,
What does this indicate? It's not very clear to me do we need to make any changes?
Thanks a lot!
Accept Templates : disabled by Firewall
Layer Policy Security disables template offloads from rule #xxxx
Throughput acceleration still enabled.
Drop Templates : disabled
NAT Templates : disabled by Firewall
Layer Policy Security disables template offloads from rule #xxxx
Throughput acceleration still enabled.
LightSpeed Accel : disabled
After disabling the rule and re-installing the policy, check fwaccel stat again to see if there is any other issue with templates.
@RemoteUser even if fwaccel stat reports "Accept templates: enabled", the "Accelerated conns/Total conns" part of fwaccel stats -s may always report zero, and fwaccel templates -s may perennially report zero as well. This can be diagnosed with the fwaccel templates -R option added in R81.20, which will report a high percentage of "Prevented by Policy rules".
This situation is not the end of the world, and simply means that for the start of every new connection, a full rulebase lookup against the Firewall blade will always be required in the F2F/slowpath, with no accept template formation or matching possible. This is generally caused by at least one of the following situations being present:
1) In your first layer (ordered mode), or top/parent layer (non-sub-rules for inline mode), you have any blade other than Firewall enabled. If you do this the templating rate will always be zero, as enabling any other blades in that top/first layer makes matching against entities other than IP addresses and port numbers possible, which accept templating cannot handle.
2) Use of services in a rule with "Protocol Signature" set in their Advanced Properties; this option is never enabled by default. Utilization of these services in the policy will need to invoke Medium Path streaming to complete that first rulebase lookup for a new connection, which causes dramatically more CPU overhead and is wholly incompatible with the use of accept templates.
Did you read sk32578: SecureXL Mechanism ?
Hi
Yes, but what is mean disables template offloads from rule #xxxx?
It's affects something or not?
Remove rule #xxxx if it is not needed, or move it all the way down in rulebase.
Most of the time rule contains traceroute or ALL_DCE_RPC ports for Windows
Show the relevant rule. After this rule no performance optimization. All rules below #xxxx
I would say if anyone on this planet can explain this perfectly, its @Timothy_Hall
Andy
@RemoteUser even if fwaccel stat reports "Accept templates: enabled", the "Accelerated conns/Total conns" part of fwaccel stats -s may always report zero, and fwaccel templates -s may perennially report zero as well. This can be diagnosed with the fwaccel templates -R option added in R81.20, which will report a high percentage of "Prevented by Policy rules".
This situation is not the end of the world, and simply means that for the start of every new connection, a full rulebase lookup against the Firewall blade will always be required in the F2F/slowpath, with no accept template formation or matching possible. This is generally caused by at least one of the following situations being present:
1) In your first layer (ordered mode), or top/parent layer (non-sub-rules for inline mode), you have any blade other than Firewall enabled. If you do this the templating rate will always be zero, as enabling any other blades in that top/first layer makes matching against entities other than IP addresses and port numbers possible, which accept templating cannot handle.
2) Use of services in a rule with "Protocol Signature" set in their Advanced Properties; this option is never enabled by default. Utilization of these services in the policy will need to invoke Medium Path streaming to complete that first rulebase lookup for a new connection, which causes dramatically more CPU overhead and is wholly incompatible with the use of accept templates.
What is the rule# relative to the policy size?
Commonly this would be due to a specific objects like DCOM, RPC, DCE, snmp-readonly, rip-response which are optimally put lower in the rule base but other potential reasons are documented in sk32578.
You can move the rule lower down or remove offending object to improve templating.
this is the rule, maybe this service it's the root cause:
What happens to the rules that come after this one? This is what I want to understand?
That's in my cluster it's not enable..
What is the purpose of this?
Enable or disable firewall drop optimization to improve gateway resource consumption during periods of heavy traffic load. Let SecureXL handle traffic that the firewall policy determines should be dropped.
Not enabling this option means that only Allowed connections are off loaded to SecureXL, leaving the gateway to handle connections that should be dropped or rejected. For more, see:
so nowadays it would always seem better to enable it....
thanks a lot
Yes, I would, 100%
Also, can you send output of below?
Andy
[Expert@R82:0]# fwaccel templates
The templates table is empty
[Expert@R82:0]# fwaccel templates -s
Total number of templates: 0
[Expert@R82:0]#
The main outcome is that your policy has a rule with one of the SecureXL limitations affecting acceleration with templates. Below that rule, templates will not be applied. Depending on how many rules are in your rulebase and how high that limiting rule is placed in your policy, it may negatively affect the performance of your GW. From reading the discussion, I see that the DCE-RPC service is most probably the root cause.
The recommendation is to see if you can remove or edit this rule to overcome the limitation (for example, change DCE to ANY) or push it as deep as possible in your rulebase.
I put in disable the rule affected.
I have one question... If under the rule affected i have a lot vpn s2s, it's possible that those rule may be affected or not?
After disabling the rule and re-installing the policy, check fwaccel stat again to see if there is any other issue with templates.
After disabling the rule, now it's semmes ok
Now, you get your answer 🙂
Great job bro!
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
10 | |
7 | |
6 | |
6 | |
5 | |
5 | |
5 | |
5 | |
4 | |
4 |
Wed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY