Hello !
Since several days, we're trying to optimize/tunne a virtual FW (4 cores, 8Go RAM), which use to treat arround 100mo/s in term of throughput.
This is our missunderstanding point, we're using arround 1/3 of each CPU (3), only for treating arround 100mo throughput...Doesn't make sense for us... (At the beginning, we had only 2 cores, and due to high CPU, we decided to add 2 additionnal to solve the issue quickly as we were in migration).
-----------------------------------------------------------------------------------------------------------------------------
About core assignement :
fw ctl affinity -l -v
Interface eth0 (irq 75): CPU 0
Interface eth1 (irq 91): CPU 0
Interface eth2 (irq 107): CPU 0
Interface eth3 (irq 115): CPU 0
Kernel fw_0: CPU 3
Kernel fw_1: CPU 2
Kernel fw_2: CPU 1
Daemon mpdaemon: CPU 1 2 3
Daemon lpd: CPU 1 2 3
Daemon in.asessiond: CPU 1 2 3
Daemon fwd: CPU 1 2 3
Daemon in.acapd: CPU 1 2 3
Daemon cpd: CPU 1 2 3
Daemon cprid: CPU 1 2 3
-----------------------------------------------------------------------------------------------------------------------------
show version all :
Product version Check Point Gaia R80.30
OS build 200
OS kernel version 2.6.18-92cpx86_64
OS edition 64-bit
-----------------------------------------------------------------------------------------------------------------------------
cpinfo -y all
This is Check Point CPinfo Build 914000202 for GAIA
[IDA]
No hotfixes..
[MGMT]
HOTFIX_R80_30_JUMBO_HF_MAIN Take: 155
[CPFC]
HOTFIX_R80_30_JUMBO_HF_MAIN Take: 155
[FW1]
HOTFIX_MAAS_TUNNEL_AUTOUPDATE
HOTFIX_R80_30_JUMBO_HF_MAIN Take: 155
FW1 build number:
This is Check Point's software version R80.30 - Build 001
kernel: R80.30 - Build 135
[SecurePlatform]
HOTFIX_R80_30_JUMBO_HF_MAIN Take: 155
[CPinfo]
No hotfixes..
[DIAG]
No hotfixes..
[PPACK]
HOTFIX_R80_30_JUMBO_HF_MAIN Take: 155
[CVPN]
No hotfixes..
[CPUpdates]
BUNDLE_MAAS_TUNNEL_AUTOUPDATE Take: 25
BUNDLE_INFRA_AUTOUPDATE Take: 25
BUNDLE_DEP_INSTALLER_AUTOUPDATE Take: 13
BUNDLE_R80_30_JUMBO_HF_MAIN Take: 155
[CPDepInst]
No hotfixes..
[AutoUpdater]
No hotfixes..
[CPPinj]
HOTFIX_R80_10
-----------------------------------------------------------------------------------------------------------------------------
Regarding acceleration statistic :
fwaccel stats -s
Accelerated conns/Total conns : 1524/19166 (7%) => Too low, should be higher
Accelerated pkts/Total pkts : 2103698529/4306719728 (48%) => Not so bad
F2Fed pkts/Total pkts : 292614545/4306719728 (6%) => Full path (not accelerated)
F2V pkts/Total pkts : 44209469/4306719728 (1%)
CPASXL pkts/Total pkts : 0/4306719728 (0%)
PSLXL pkts/Total pkts : 1910406654/4306719728 (44%) => Medium Path
QOS inbound pkts/Total pkts : 0/4306719728 (0%)
QOS outbound pkts/Total pkts : 0/4306719728 (0%)
Corrected pkts/Total pkts : 0/4306719728 (0%)
-----------------------------------------------------------------------------------------------------------------------------
Most of the CPU used is related to "microsoft-ds" (default service defined in Checkpoint)
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
https://community.checkpoint.com/t5/General-Topics/High-Performance-Gateways-and-Tuning/td-p/33076
We gave a look to the following very interesting post above, thinking that we will be able to improve performance, remplacing microsoft-ds services by a "manual one" (Protocol : None option), then it will be accelerated and by consequence, improving CPU. Fail 😛
----------------------------------------------------------------------------------------------------------------------
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
We tried to build our own acceleration rules (see below) : We had good results regarding DNS & increasing from the following statistics :
Accelerated conns/Total conns : 1524/19166 (7%) to 50%.
But regarding CPU, it remained exactly the same... In kind of CPU utilization, no changes has noticed (CPU remains the same, and protocol CPU utilization also...)
Regarding port 1024, why it has been never matched, as counter remained to 0 ?
When we compiled the Firewall, looks like the table rule acceleration has been removed and created a lot of mess, FW has rebooted and switched on other member. But this is another point and issue.
----------------------------------------------------------------------------------------------------------------------
cat table_connex_accel.txt | grep 445 | wc -l
7658
cat table_connex_accel.txt | grep 53 | wc -l
18532
cat table_connex_accel.txt | grep 1024 | wc -l
10
Thanks in advance for your help on this 😉
Best regards,
Robin.