- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi,
we have a core assigned to our sync interface.
This interface now triggers the IPS bypass under load condition even though the "relevant" fw_worker cores have no high usage.
Already found this SK but it does not help: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
So is there a way to exclude a certain core from the calculation ?
Regards Thomas
In my experience I wouldn't recommend enabling the IPS Bypass Under Load feature under any circumstances. As you discovered all it takes is one core going above the thresholds (either SND or Worker) to kill all IPS enforcement, which is very likely to happen with a busy gateway and virtually guaranteed with the presence of elephant flows/heavy connections. The real-world effect is that IPS enforcement is pretty much always disabled; this Bypass feature made sense in the old days when firewalls only had a few cores and any one of them becoming saturated by IPS enforcement duties caused a very noticeable effect. However with so many firewall cores these days, time has passed this feature by as implemented and it is frankly no longer relevant or advisable. Here are the notes from my IPS Immersion Video class about this topic:
Hi Timothy,
while disabling the feature solves the issue afaik it was also designed to cope with kind of DOS attacks caused by high IPS load (I know that its a bad work around for wrong sizing 8)).
It is not ideal to bypass IPS but the design with calculating bypass through all Cores is quite bad. It should be triggered by some other "intelligent" thresholds.
Regards Thomas
Agreed the calculation mechanism for IPS Bypass needs to be updated to consider the presence of so many more cores on today's firewalls, and is why I can't recommend ever enabling IPS Bypass in its present form. Tuning the IPS feature to reduce CPU load is far more likely to be fruitful, I think some guy wrote a book about that very topic...
Hello Tim, no fix in 2023? Just crazy that we cannot stop ips process based on average CoreXL utilization....
Recent JHF takes do have some fixes (bypass under load) but no fundamental change to the mechanism itself to my knowledge.
There are however some tweaks possible per: sk62848
Rather than bypassing IPS when a specific core goes 100%, how about use more (less utilized) cores?
This is what happens with R81.20 and HyperFlow.
Indeed this is another option, provided your appliance has 8-cores or more as a prerequisite for HyperFlow (sk178070).
If not you'll have to employ other optimization/tuning strategies per above.
IPS Bypass Under Load was unusable on a modern Check Point gateway except maybe a Quantum Spark. As originally designed if any one core went over the CPU threshold, IPS was turned off on all cores which basically means IPS is constantly off in the real world. However in R81.10 Jumbo HFA 110+ and R81.20 Take 26+ (and I assume R82) the calculation is based on the average CPU load of *all* cores instead which must cross the CPU threshold to start a bypass:
PRJ-46941,
TPP-3290
UPDATE: IPS bypass triggers will now be activated based on the average CPU load exceeding the high threshold, as opposed to the previous implementation, where a single CPU load triggered the bypass. The change will result in more effective security measures without unnecessary bypasses.
So it is actually usable now but I still would not recommend it.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY