In my experience when the connections table is overflowing on the firewall it causes terrible performance on the gateway with some connections working and others not, and even web pages partially hanging as portions of them cannot be rendered because some separate connections for third-party content are failing.
This terrible performance may well be at least partially caused by high CPU utilization on the gateway. I don't specifically recall if CPU is high when this overflow condition is present, but I can certainly see it happening due to the following:
1) The first packet of a new connection arrives
2) It runs through the Firewall/Network Policy Layer in F2F for a somewhat expensive rulebase lookup and finds a matching rule for Accept
3) Since the connection table is full, the packet is dropped and no SecureXL Accept template is able to be formed because the traffic never left through the egress side of SecureXL
4) A retransmission arrives and goes through the same process of an expensive rulebase lookup in F2F and is dropped yet again
Depending on how far over the limit you are when the connections table is full I could see a situation where thousands of new packets a second are causing massive rulebase lookups with no opportunity of being efficiently matched by a SecureXL template. Keep in mind that usually the vast majority of packets crossing the firewall are associated with existing connections, and are matched and permitted with a quick state table lookup which has very low overhead. I could see these thousands of overflowing connections retransmitting and retrying over and over again causing a very large number of rulebase lookups, which would manifest itself as high CPU load on the firewall workers/instances but not the SND/IRQ cores.
Next time this happens, determine your CoreXL split and look at the CPU utilization on just the firewall workers/instances. If they are high but the SND/IRQ cores are not nearly as busy, I can pretty much guarantee that overhead is firewall rulebase lookups which only happen on the worker cores in F2F.
Gateway Performance Optimization R81.20 Course
now available at maxpowerfirewalls.com