- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Ask Check Point Threat Intelligence Anything!
October 28th, 9am ET / 3pm CET
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
Hello, everyone.
One question, is it advisable to disable SecureXL?
We have a problem in which our CCTV server cannot 'visualize' the IP cameras it has hooked.
The only way to solve the error, and have video of the IP cameras is if we disable SecureXL.
Is this something 'expected' in CP equipment? I am referring to the fact that SecureXL is often the cause of problems with certain types of traffic.
What would be the right way to fix this error permanently?
I currently have version R81.20.
Regards.
The software is coded and tested with the assumption that SXL is enabled. It is not recommended to leave it off. Highly recommended to tackle this one with TAC so that we can fix it properly.
Disabling SecureXL for certain connections is not a solution that can be considered as 'permanent'?
No, if you have to disable SecureXL it's a bug or misconfiguration that should be taken with TAC.
Our CP is in R82 version, managed by a Smar-1 Cloud.
Then the TAC has to give us a solution, since it is not recommended to have the SXL off right?
I would follow sk @Tal_Paz-Fridman provided. What is the exact issue when sxl is enabled? Yes, it can be disabled permanently, but I would NOT do that.
Andy
It may be the constant workaround - disabling SecureXL completely is no way to go. But a TAC case might be the proper process - but try to exclude the traffic now quickly so you can turn SecureXL on again.
I also suggest contacting TAC to resolve the issue.
A workaround could be to exclude specific traffic from SecureXL:
https://support.checkpoint.com/results/sk/sk104468
Hi @Matlu
Maybe fast_accel worths a try
https://support.checkpoint.com/results/sk/sk156672
Thats a good idea.
Andy
Hello,
Is there any way to “validate” if the SXL is “dumping” traffic, when it is active?
It seems that tshoot commands like tcpdump or fw ctl zdebug, don't exactly “see” traffic that may be being dropped by the SXL.
So, what commands can help you, to validate if SXL is being the problem for a particular traffic?
You need to use the command fw ctl zdebug + drop to also see any drops occurring in SecureXL, although they are usually much more rare than drops in the main INSPECT code.
The best way to determine if SecureXL is the source of your problem is to leave the questionable connections in the slowpath (no offloading to the Medium or Fast paths allowed) and see if the situation improves. sk104468: How to exclude traffic from SecureXL
It's a little weird.
I used the command you recommend, my destination was an IP camera.
When we have the SXL enabled on the CP, the CCTV server cannot see the video from the camera, but the command
fw ctl zdebug + drop | grep <IP CAMERA> ... at that time it shows me nothing.
It is as if for the FW everything is working fine.
Then, when we disable the SXL, immediately the CCTV server retrieves the video from the camera.
Only the “fw ctl zdebug + drop” is the command that helps to detect if it is the SXL that is giving problems?
When sxl is on, you probably would need to do sxl debugs.
Andy
If you see nothing in the fw ctl zdebug + drop that means no Check Point code (SecureXL/INSPECT) is dropping that traffic.
Also I have to ask, are you on a Quantum Force 9000/19000/29000 or Lightspeed appliance?
Is this traffic multicast? It could be getting dropped in the Gaia OS itself due to some kind of problematic interaction with SecureXL. Only way to know for sure is set up a fw monitor -F with SecureXL enabled and see if the problematic traffic is hitting inspection points iI but failing to re-enter at o. There have been issues in the past with SecureXL and multicast.
Tim - valid point about mcast, we had issues in the past where the Checkpoint was a RP and after engaging TAC it was determined this was a bug, but we never had issues with mcast being passed through the appliances, assuming correct policy is in place.
Hey bro,
Any luck with this or still same issue?
Andy
Here's a good place to start:
However as everyone has suggested, best to engage TAC, ensure your running latest recommended Jumbo etc as this will be a first step suggestion from TAC.
Last time I had an issue with SecureXL it was on R7x.x and the issue was resolve by upgrading to the latest version at the time.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
25 | |
13 | |
9 | |
9 | |
7 | |
7 | |
7 | |
6 | |
4 | |
4 |
Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesWed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY