- CheckMates
- :
- Products
- :
- Quantum
- :
- Security Gateways
- :
- Re: Traffic sync between 2 AIX servers is slow whe...
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Traffic sync between 2 AIX servers is slow when handled by checkpoint 9400
Dear Guy,
Have a nice day!
We are currently deploying Check Point 9400 and encountering issues with the synchronization traffic of AIX servers. These servers synchronize using the ssh_v2 service. Let me describe the previous situation:
- Previously, the customer used Check Point 4800 with only the Firewall Blade enabled. They had two systems in DC and DR, each containing AIX servers that synchronized data daily. When this traffic was processed by Check Point 4800, it reached approximately 200Mb/s.
- After replacing Check Point 4800 with Check Point 9400, also with only the Firewall Blade enabled, the synchronization traffic between AIX servers across the DC and DR sites dropped to 20~30Mb/s.
Has anyone encountered this issue before? please see the image attached
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
What was the version running on the 4800 versus what is running on the 9400?
Sounds like the traffic might be hitting F2F path for some reason.
You might try to use fast_accel to ensure the flow is accelerated: https://support.checkpoint.com/results/sk/sk156672
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
What was the version running on the 4800 versus what is running on the 9400?
Sounds like the traffic might be hitting F2F path for some reason.
You might try to use fast_accel to ensure the flow is accelerated: https://support.checkpoint.com/results/sk/sk156672
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Dear PhoneBoy,
Version on cp4800 is R77.30, on cp9400 is R81.20.
I have checked on cp4800 with command fwaccel stat, securexl stopped the first rule.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Open an SR# with CP TAC to get this resolved asap.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Sure, I opened case with TAC but they response very slow, two week but they cannot resolved the issue.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I fully agree that Fast_Accel rules might be the right way to go, as I have successfully used it to boost performance in backups, and also in some VoIP areas. As always use with care, as it makes affected traffic processed faster, but not without a cost - bypassing most of the wonderfulness of Check Point's security oriented code 😉
I am also waiting if the same will be ever possible with Maestro FF, as currently it only supports traffic that is not traversing local networks. Who knows, what feature GAIA releases will bring to us.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
When SecureXL works in the User Mode (UPPAK), the Security Gateway performance for the Slow Path traffic (F2F) is lower compared to the Kernel Mode (KPPAK).
Suggest ensuring the policy is constructed / optimized in a manner to avoid scenarios impacting SecureXL.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
We need to know what path your replication connection is operating in. Start a replication connection and make sure it is alive by running fw ctl multik gconn. If you can't see the connection here it is not alive.
Next run the following while the connection is alive:
fw tab -t connections -z
fwaccel conns
netstat -ni
If you see the replication connection in the output of the first command, the traffic is slowpath and a reason will be provided. fast_accel will not work for this traffic.
If you can't find the connection in the output of the first command it will be shown by the second one which means medium or fastpath.
Please post the output of wherever you find the connection, along with the third command. If fwaccel stat is complaining about stopping on rule #1 it is referring to accept templating which has nothing do with which path the connection ends up in. With just the firewall blade enabled it should be fastpath but Core Activations & Inspection Settings can interfere with this.
March 27th with sessions for both the EMEA and Americas time zones
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Since we have clear source and destination, how can we check with these commands.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I got cpinfo on both devices while processing traffic, about securexl it shows as below
on cp-4800
on cp-9400
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Nothing is wrong with SecureXL on your new box (it is still in KPPAK mode for some reason), please provide the outputs I requested in my prior message.
March 27th with sessions for both the EMEA and Americas time zones
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Share this output and:
cpinfo -y all (to see if you have a Jumbo installed and if so a new one)
enabled_blades double check that only fw is enabled
ethtool -g INTERFACE (to checkt he rx buffers) this is follow-up question depending on nestat -ni output
If you like this post please give a thumbs up(kudo)! 🙂
