- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi Group,
Is anybody using SNX client (Windows 10 built-in) client widely (200+ users) ?? (R80.20+)
I know there is limitation about visitor mode that it shouldn't be used for several hunderd users (Best Practices - VPN Performance). Also from experience COVID-19 I notice that disable Visitor Mode makes the difference.
Is SNX/Windows bult-in client is technology that same as Visitor Mode? Is that limitation and CPU utilization also true for SNX??
From Best Practices - VPN Performance:
Each packet in Visitor Mode is processed in user space, which causes a load on CPU on Security Gateway (only several hundred Visitor Mode clients can be handled by the Security Gateway)
Yeah that's I thought. Your Windows 10 VPN clients are not using Visitor Mode as that doesn't make sense. I trust the output of vpn show_tcpt in this case more than vpn tu, since the former command is talking straight to the vpnd process that handles Visitor Mode sessions and it says it doesn't have any. On the other hand, I believe vpn tu is querying kernel tables and it appears that any VPN connection utilizing SSL/TLS as a transport such as SNX is being marked as "Visitor Mode" in those tables that vpn tu is reading, which I don't think is completely accurate.
You don't currently have Visitor Mode disabled do you?
Thanks!
What I meant writing built into Win10 client it was Capsule from Microsoft Store client. Sorry for confusion.
When I list clients connected to GW i have that entry for SNX/Win-10 clients:
Methods: SSL Tunnel 3DES MD5
Visitor Mode: 5
Regular client:
Methods: ESP Tunnel AES-256 SHA256
NAT-T
Can I somehow disable Visitor Mode for that SNX/Win-10 Bult-In client??
Do you familiar with installation where bulit-in client in Win10 is used for more then 200-300 Users??
If you run command vpn show_tcpt do the Windows 10 Capsule VPN clients show up in the output?
My impression is that Visitor Mode is for IPSec VPN remote access clients that are not also capable of SSL/TLS, and cannot pass traffic directly over ESP (IP proto 50) or UDP 4500 (NAT-T) due to an intervening enforcement device, so they pass traffic over TCP 443 instead. This specially-encapsulated Visitor Mode traffic would then have to be handled in process space by vpnd which has various performance and file descriptor limitations.
Clients that use SSL/TLS natively like SNX shouldn't need to use Visitor Mode at all, at least that's what I thought: sk159372: Visitor Mode in Remote Access clients. Pretty sure use of SSL/TLS as a VPN transport does not automatically equate to Visitor Mode and all its inherent limitations.
I suppose some VPN clients might try connectivity options in the following order until they find one that works, but if they get to the third one and are capable of SSL/TLS natively, why not just go straight to the fourth one:
Output is:
[Expert]# vpn show_tcpt
Showing all users connected in Visitor Mode:
Total number of users: 352, SNX users : 275, Visitor mode users: 0
All users connected this Capsue/Windows Store client have output for vpn tu tlist:
| Methods: SSL Tunnel 3DES MD5 | | |
| My TS: 0.0.0.0/0 | | |
| Peer TS: 10.10.x.x | | |
| User: test.test | Visitor Mode: 181 | |
| MSPI: 240009f (i: 4, p: - ) | No outbound SA | |
I have network outages at this installation (10-40s seconds, several time a day) during working hours and TAC can't find out what can cause that. I starting to suspect it is related with this type of client and remote work during COVID-19. When it happening there isn't so much traffic 300-500Mbps but all CPUs dedicated to fw_workers are 100% usage.
R80.30 take 155, open Servers (HPE 360 gen 10 8Core lic), NIC Broadcom!!, 3.10.0-693cpx86_64
Best regards,
Rafal
Yeah that's I thought. Your Windows 10 VPN clients are not using Visitor Mode as that doesn't make sense. I trust the output of vpn show_tcpt in this case more than vpn tu, since the former command is talking straight to the vpnd process that handles Visitor Mode sessions and it says it doesn't have any. On the other hand, I believe vpn tu is querying kernel tables and it appears that any VPN connection utilizing SSL/TLS as a transport such as SNX is being marked as "Visitor Mode" in those tables that vpn tu is reading, which I don't think is completely accurate.
You don't currently have Visitor Mode disabled do you?
Just for there record it looks like SNX doesn't have limitation of Visitor Mode. High load CPU was not related with that. When we move VPNs on other gateway 200-300 SNX/Windows Capsule Client generate about 3-5% CPU load.
Rafal
Right, SNX uses SSL/TLS natively which does not require the use of Visitor Mode.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
3 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 |
Thu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasMon 22 Sep 2025 @ 03:00 PM (CEST)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security EMEAMon 22 Sep 2025 @ 02:00 PM (EDT)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security AMERThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasMon 22 Sep 2025 @ 03:00 PM (CEST)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY