- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi all, we're replacing EOL 15000 series FWs with 6000 series. The configurations are largely identical (using ClusterXL in active/standby) and the replacement FWs are sized correctly. We've had several failed migration attempts to the new Firewalls - all acceptance tests complete succesfully, yet when production traffic starts to return to normal levels following end of the outage window, poor performance is observed.
According to CPVIEW, there are a high number of drops due to "Capacity" - yet nowhere can I find what this relates to. It can't be CPU or interface, since these are nowhere near maximum. Does anyone know what can cause drops due to "capacity"? This counter can be seen to incremement at a high rate and having ruled everything else out, it would appear this is the cause of the perceived performance issues.
Probably memory, look at the first few output lines of fw ctl pstat for capacity statistics. Make sure that connection table size is set to "automatically" on your gateway/cluster object, and not still set to a manual limit which was the only option in the SecurePlatform/IPSO days (and still required for VSX).
Hi @SteveM
Where do you see this in CPVIEW? Can you attach a screenshot? Just blur the sensitive info.
Akos
Probably memory, look at the first few output lines of fw ctl pstat for capacity statistics. Make sure that connection table size is set to "automatically" on your gateway/cluster object, and not still set to a manual limit which was the only option in the SecurePlatform/IPSO days (and still required for VSX).
Memory doesn't exceed 32%, but the concurrent connection table is set to 25000 limit on the new Cluster object - but automatic on the old FWs. It looks like this could be the cause - according to CPVIEW, the concurrent connections never exceeds 24,720. Thank you!!
That could be your issue, just change it to automatic, as thats best setting, since it lets firewall auto calculate the usage. Install policy, test.
Andy
I would also check bottom setting.
Enable or disable firewall drop optimization to improve gateway resource consumption during periods of heavy traffic load. Let SecureXL handle traffic that the firewall policy determines should be dropped.
Not enabling this option means that only Allowed connections are off loaded to SecureXL, leaving the gateway to handle connections that should be dropped or rejected.
Andy
And of course we need some info more:
Akos
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 26 | |
| 19 | |
| 11 | |
| 8 | |
| 6 | |
| 6 | |
| 5 | |
| 5 | |
| 5 | |
| 4 |
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY