Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Mike_Jensen
Advisor
Jump to solution

SecureXL 100% F2Fed 80.30

I have a HA cluster of Check Point 15,400's running 80.30 with JHA take 215.

[Expert@xxxxx]# enabled_blades
fw vpn ips identityServer vpn
[Expert@xxxxxx0]#

Hyperthreading and CoreXL are both enabled.

A month or so ago when I checked my SecureXL statistics about 70% of my traffic was being accelerated and now 100% of packets are taking the F2Fed.  I am having a heck of a time trying to determine how literally no packets are being accelerated.

The only major things that have changed recently are IPS Protection - I make sure all protections with a critical performance rating are disabled , and JHA take 215.

 

[Expert@xxxxx]# fwaccel stat
+-----------------------------------------------------------------------------+
|Id|Name |Status |Interfaces |Features |
+-----------------------------------------------------------------------------+
|0 |SND |enabled |eth2-01,eth2-02,eth2-03, |
| | | |eth2-04,eth2-05,eth2-06, |
| | | |eth2-07,eth2-08,Sync |Acceleration,Cryptography |
| | | | |Crypto: Tunnel,UDPEncap,MD5, |
| | | | |SHA1,NULL,3DES,DES,CAST, |
| | | | |CAST-40,AES-128,AES-256,ESP, |
| | | | |LinkSelection,DynamicVPN, |
| | | | |NatTraversal,AES-XCBC,SHA256 |
+-----------------------------------------------------------------------------+

Accept Templates : enabled
Drop Templates : disabled
NAT Templates : enabled

 

[Expert@xxxxxx]# fwaccel stats -s
Accelerated conns/Total conns : 0/0 (0%)
Accelerated pkts/Total pkts : 0/2659685415 (0%)
F2Fed pkts/Total pkts : 2659685415/2659685415 (100%)
F2V pkts/Total pkts : 0/2659685415 (0%)
CPASXL pkts/Total pkts : 0/2659685415 (0%)
PSLXL pkts/Total pkts : 0/2659685415 (0%)
QOS inbound pkts/Total pkts : 0/2659685415 (0%)
QOS outbound pkts/Total pkts : 0/2659685415 (0%)
Corrected pkts/Total pkts : 0/2659685415 (0%)
[Expert@MAIN-EXT-FWA:0]#

 

[Expert@xxxx# fwaccel stats -p
F2F packets:
--------------
Violation Packets Violation Packets
-------------------- --------------- -------------------- ---------------
pkt has IP options 4197 ICMP miss conn 695465
TCP-SYN miss conn 6076140 TCP-other miss conn 829529441
UDP miss conn 1835183626 other miss conn 4260
VPN returned F2F 20 uni-directional viol 0
possible spoof viol 0 TCP state viol 0
SCTP state affecting 0 out if not def/accl 0
bridge, src=dst 0 routing decision err 0
sanity checks failed 0 fwd to non-pivot 0
broadcast/multicast 0 cluster message 38231619
cluster forward 0 chain forwarding 0
F2V conn match pkts 0 general reason 0
route changes 0

0 Kudos
1 Solution

Accepted Solutions
Mike_Jensen
Advisor

TAC resolved this issue for me!  They recreated my environment in their lab and found in one of my VPN communities in the wire mode option I had the box checked for "Allow uninspected encrypted traffic between Wire mode interfaces of this Community members".  

After I removed the check mark and installed policy I began to see accelerated traffic on all affected HA clusters!

The only debug command / output that I was able to see for this case is:

@;21151; 1Oct2020 15:11:44.275421;[cpu_1];[fw4_2];get_connkey_flags_should_accelerate: wire mode acceleration is user disabled -> F2F;

View solution in original post

5 Replies
Timothy_Hall
Legend Legend
Legend

Are you checking these statistics on the standby member of a cluster (cphaprob stat)?  100% F2F is expected in that case since all connections are to and from the firewall itself which are never accelerated.

If you did get these stats on the active member or there isn't a cluster present, it is almost certainly something in your IPS config.  You can confirm by running ips off, then fwaccel stats -r, waiting two minutes, then fwaccel stats -s.  Note that doing this may expose your organization to attacks, and don't forget to run ips on when done!

Gateway Performance Optimization R81.20 Course
now available at maxpowerfirewalls.com
0 Kudos
Mike_Jensen
Advisor

Hi Tim,

Yes, this is happening on the active cluster member (sorry I should have specified in the original post).

I performed the ips off test twice, once just "ips off" and the second time with "ips off -n", reset the SecureXL statistics, waited two minutes, then checked fw accel stats -s again and the stats are still the same 😞

[Expert@xxxx:0]# fwaccel stats -s
Accelerated conns/Total conns : 0/0 (0%)
Accelerated pkts/Total pkts : 0/3099956 (0%)
F2Fed pkts/Total pkts : 3099956/3099956 (100%)
F2V pkts/Total pkts : 0/3099956 (0%)
CPASXL pkts/Total pkts : 0/3099956 (0%)
PSLXL pkts/Total pkts : 0/3099956 (0%)
QOS inbound pkts/Total pkts : 0/3099956 (0%)
QOS outbound pkts/Total pkts : 0/3099956 (0%)
Corrected pkts/Total pkts : 0/3099956 (0%)
[Expert@TROY-EXT-A:0]# fwaccel stats -s
Accelerated conns/Total conns : 0/0 (0%)
Accelerated pkts/Total pkts : 0/3162794 (0%)
F2Fed pkts/Total pkts : 3162794/3162794 (100%)
F2V pkts/Total pkts : 0/3162794 (0%)
CPASXL pkts/Total pkts : 0/3162794 (0%)
PSLXL pkts/Total pkts : 0/3162794 (0%)
QOS inbound pkts/Total pkts : 0/3162794 (0%)
QOS outbound pkts/Total pkts : 0/3162794 (0%)
Corrected pkts/Total pkts : 0/3162794 (0%)

0 Kudos
Timothy_Hall
Legend Legend
Legend

Head to your Inspection Settings in the Access Control policy, are there any settings enabled that have a High or Critical performance impact, mainly:

  • Directory Listing
  • Small PMTU
  • SYN Attack (although this is in SecureXL in R80.20+)
  • Network Quota
  • Gzip Enforcement

  The other place to look will be the 39 IPS "Core Protections" which are still active even when IPS is disabled (!), are any of these enabled:

  • HTTP Header Spoofing
  • Inbound DNS Requests
  • ISN Spoofing
  • IP ID Masking
  • Malicious IPs
  • Mismatched Replies
  • Scrambling
  • TTL Masking

Beyond that TAC will need to run a debug to determine why everything is going F2F.  This debug isn't nearly as straightforward as it used to be prior to R80.20; please share the commands TAC uses as the kernel debug flags documentation has not been updated for R80.20+. 😀

Gateway Performance Optimization R81.20 Course
now available at maxpowerfirewalls.com
0 Kudos
Mike_Jensen
Advisor

I have all of the above Core protections off and all Threat Cloud protections with a performance impact of critical set to inactive as well.

Is there a good rule of thumb to follow in regards to how old a protection should before before marking it as inactive? 5 years, 7 years, etc?

I have a TAC case open and I will post any debug commands they run.

Mike_Jensen
Advisor

TAC resolved this issue for me!  They recreated my environment in their lab and found in one of my VPN communities in the wire mode option I had the box checked for "Allow uninspected encrypted traffic between Wire mode interfaces of this Community members".  

After I removed the check mark and installed policy I began to see accelerated traffic on all affected HA clusters!

The only debug command / output that I was able to see for this case is:

@;21151; 1Oct2020 15:11:44.275421;[cpu_1];[fw4_2];get_connkey_flags_should_accelerate: wire mode acceleration is user disabled -> F2F;

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events