1) The presence of non-zero TX errors would suggest UPPAK is enabled, although it depends on whether your current code level was reached via upgrade or a fresh install. Please provide output of fwaccel stat.
2) While the RX-DRP number does look concerning, it is a red herring. The drop rate is 0.06% which is below the 0.1% guideline; based on your ethtool outputs these are "real" buffering misses and not discarded junk traffic such as unknown EtherTypes or improperly pruned VLAN tags. Increasing the ring buffer size is not likely to make a difference and will probably make things worse in the long run by introducing jitter due to BufferBloat. I'm surprised you are getting any real RX-DRPs at all if UPPAK is enabled unless the firewall is severely overloaded. Is Dynamic Split enabled to add more SND cores as needed to speed the emptying of ring buffers? dynamic_balancing -p
As for the 50% loss specifically afflicting Remote Access VPN:
a) Please describe the client(s) you are using: Mobile Access/SSL Extender? SecuRemote? Check Point Mobile? EndPoint Security?
b) Force use of visitor mode to TCP/443 with your Remote Access IPSec client (or turn it off if already forced). Does the performance issue go away? That would suggest an MTU/MSS Clamping issue or other issue with IPSec (which causes about 50% packet loss for full-size packets), although your site-to-site VPNs don't seem to be affected (unless they are already separately MSS clamped by you or your peer gateway(s)).
c) Check what algorithms are being used by your IPSec clients in Global Properties under Remote Access...VPN Authentication & Encryption...Encryption algorithms...Edit...IPSec Security Association (Phase 2). Is it still 3DES/MD5? May not be your complete problem but certainly not helping, and also may not be interacting well with UPPAK if it is enabled.
d) Replacement of switch may have changed the state of Ethernet Flow Control (Pause Frames) and whether they are still enabled on both sides. Please provide output of ethtool -a and ethtool -i for affected interface.
e) As a last resort you can try disabling SecureXL acceleration of vpn traffic with vpn accel off then retest Remote Access VPN performance. Be warned this will potentially disrupt all existing IPSec tunnels including site-to-site, and will move all IPSec processing out of SecureXL (especially if UPPAK is enabled) and back onto the Firewall Worker Instances. Schedule a maintenance window before attempting this.
Gaia 4.18 (R82) Immersion Tips, Tricks, & Best Practices Video Course
Now Available at https://shadowpeak.com/gaia4-18-immersion-course