- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
quick one chaps:
Accelerated conns/Total conns : 1287/12967 (9%)
Accelerated pkts/Total pkts : 14781656997/19848761750 (74%)
F2Fed pkts/Total pkts : 372423984/19848761750 (1%)
PXL pkts/Total pkts : 4694680769/19848761750 (23%)
QXL pkts/Total pkts : 0/19848761750 (0%)
what do you think personally went wrong with my SG so that I've got PXL 23% ?
any hints/tips/advise highly appreciated 🙂
What blades are enabled on this GW?
What are the main types of traffic going through this FW? For example, could there be a high amount of VoIP or NAT'd traffic passing through?
What model Appliance is the GW running on? If you look at netstat -ni do you see a large amount of RX-DRP on any Interfaces?
Daniel,
1. data rather than voice, no SIP really pass-through though
2. appliance 5600 in A/S HA
3. see below, although I don't believe that traffic wise there is something wrong I"m rather thinking about the fwaccell itself that some rules malform secureXL processing with fwk_x
Kernel Interface table
Iface MTU Met RX-OK RX-ERR RX-DRP RX-OVR TX-OK TX-ERR TX-DRP TX-OVR Flg
Mgmt 1500 0 11494072815 0 0 0 24103977662 0 0 0 BMRU
Sync 1500 0 138483134 0 0 0 375625940 0 0 0 BMRU
eth1-01 1500 0 61789690671 0 0 0 48260619502 0 0 0 BMRU
eth1-01.x 1500 0 3708121712 0 0 0 172286544 0 0 0 BMRU
eth1-01.x 1500 0 12412525 0 0 0 7472255 0 0 0 BMRU
eth1-01.x 1500 0 282997295 0 0 0 24901857 0 0 0 BMRU
eth1-01.x 1500 0 40214932 0 0 0 3581429 0 0 0 BMRU
eth1-01.x 1500 0 27668543605 0 0 0 76275452 0 0 0 BMRU
eth1-01.x 1500 0 326260080 0 0 0 378986686 0 0 0 BMRU
eth1-01.x 1500 0 210683847 0 0 0 4968650 0 0 0 BMRU
eth1-01.x 1500 0 17659464745 0 0 0 54373736 0 0 0 BMRU
eth1-01.x 1500 0 1824139 0 0 0 654386 0 0 0 BMRU
eth1-01.x 1500 0 228405787 0 0 0 34088098 0 0 0 BMRU
eth1-01.x 1500 0 124398097 0 0 0 32073865 0 0 0 BMRU
eth1-01.x 1500 0 794263868 0 0 0 3945996 0 0 0 BMRU
eth1-01.x 1500 0 4759642177 0 0 0 236294641 0 0 0 BMRU
eth3 1500 0 2888482568 0 0 0 2453482378 0 0 0 BMRU
eth4 1500 0 84601735 0 0 0 27402403 0 0 0 BMRU
eth8 1500 0 1268296181 0 0 0 2475779489 0 0 0 BMRU
lo 16436 0 5167245 0 0 0 5167245 0 0 0 LRU
I think that means Anti-Spoofing is set to detect on an Interface. Do you have any Anti-Spoofing events in your fw logs?
Do you have any rule for Microsoft CIFS-Traffic something like the all_dce_rpc service?
These kind of traffic isn‘t accelerated.
You found more informations to PXL here:
R80.x Security Gateway Architecture (Logical Packet Flow)
R80.x Security Gateway Architecture (Content Inspection)
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
12 | |
12 | |
7 | |
7 | |
7 | |
6 | |
6 | |
6 | |
5 | |
5 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY