Disabling SecureXL for traffic sent from/to specific IP
|
Disabling SecureXL for traffic sent from/to specific IP addresses might be needed when it is not possible to disable SecureXL completely due to high traffic load on Security Gateway. This will route all packets through the F2F path (picture 1 green).
Tip 1
How to disable SecureXL for specific IP addresses? Edit the relevant table.def file, define the IP addresses, whose traffic should not be accelerated. More read here sk104468.
Picture 1
The Fast Acceleration (picture 2 green) feature lets you define trusted connections to allow bypassing deep packet inspection on R80.20 Take 103/ R80.30 Take 107 and above gateways. This feature significantly improves throughput for these trusted high volume connections and reduces CPU consumption.
The CLI of the gateway can be used to create rules that allow you to bypass the SecureXL PSLXL path to route all connections through the fast path.
Tip 2
Use this function to exclude IP's or networks from deep inspection.
Picture 2
Feature Attributes:
- Configured from the gateway's CLI.
- Can be turned On / Off, Off is the default.
- Rules can be added / deleted by demand.
- Configuration (State / rules) survive reboot.
- Maintain rule hit count (does not survive reboot).
- Every configuration change done by the user is logged in $FWDIR/log/fw_fast_accel.log file.
Read more here to create fast_accel rules: sk156672 - SecureXL Fast Accelerator.
Tip 3
Here you can see the complete packet flow in detail: R80.x - Security Gateway Architecture (Logical Packet Flow)
➜ CCSM Elite, CCME, CCTE ➜ www.checkpoint.tips