- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello!
We just update to 80.40 and with latest hotfix. (appliance 15600)
I observe with top command high CPU percentage on rad process.
I check and found that is related with URL cache.
We firstly hit the limits of 20000 (I checked it with the below command)
fw tab -t urlf_cache_tbl -s
After upgrading to 80.40 we add more users through the checkpoint (all with URL filtering enabled)
I change the limits of rad service yesterday with GuiDBedit.
The cache max hash size from 20000(default) firstly tried to 40000.
Today I saw that we reached the 40000 limit and I set it to 70000.
we hit the below values right now:
What are you proposing about this situation ?
How many internal users do you have? The table default of 20,000 entries assumes about 1,000 users with a "normal" level of web browsing activity.
Also check your policy and make sure APCL/URLF is not getting matched against inbound web requests heading to a DMZ web server farm or something.
My users generally will going to be about 5000. Does this mean that I should change the limit to 100000?
Occasionally having the cache fill up and get cleared is fine, it is when it happens constantly that it is a problem. If you have it set to 70000 and are now hitting 55000 without it constantly hitting the limit and getting cleared, I'd leave it at 70000 for now.
Thank you. Is normal the rad process going to 250% but not staying permanently ?
A CPU spike in rad every now and then is fine.
As this is multi-threaded, you will see more RAD processes and CPU can exceed 100%. This is a normal behavior.
Source: sk163793
Yes, but RAD CPU usage topping the CPU usage of all virtual firewalls on a VSX?
Does sound like normal behavior to me, sorry. Personally, I had never seen something like this pre R80 version.
This seems to me absurdly high. I'm still looking into the source of the RAD load.
My impression:
a) Malware-Blade generates a lots of queries to the RAD
b) Cache too small, that causes the RAD too often to inquire externally.
But that is only my current impression... My gut feeling has been wrong before.
The operation of the process was changed in JHFs applied over versions of R80.20 and above. That's not to say there isn't an issue warranting investigation however.
Yes, we guess that the problem started after applying JHF 219. But this is unsure as we were slow to notice the problem. I need to rewrite our monitoring. Nobody was watching the RAD CPU usage ;-).
Do you know how R80.30 differs in regard to the RAD cache from R80.40?
With R80.30 the gateway (VSX) does not yield any result with the "fw tab -t urlf_cache_tbl -s" command: Failed to get table status for urlf_cache_tbl.
Since the update to the latest JHF (Take 219), the RAD CPU usage is through the roof. It often tops the CPU usage from all the virtual firewalls together. The CPU usage alone would not worry us, but we see in tcpdumps that firewall ist sometimes "keeping" HTTP connections "on hold" for 5 seconds.
With some optimisations in the policy (exceptions in Thread Prevention Policy) the RAD load has been reduced a bit and the 5s delays occur now less often.
My impression is that the cache is too small. I asked the support on how to increase the cache, but I did not get a reply for 5 days now.
Do DNS queries somehow end up in the RAD? RAD CPU usage seems to be the highest when we see a lot of DNS traffic.
Thanks, Martin
The URLF cache increase procedure is documented per sk90422
With all due respect, it would not be the first time (and Im sure it wont be last either) that CP sk is wrong.
Thanks, I have been looking for such an SK for quite some time now. This is really helpful.
According to what I see, I rather need to increase the cache for malware instead of urlf, but that is easily adapted.
What value exactly did you change in guidbedit?
Andy
In my case I adjust the url cache at 120000. I have rad spikes but with no issues.
Okay, thats fair...BUT, personally (and I cant really speak for anyone else), to me, thats more really masking an issue, unless it truly addressed the problem you had. I always found that TAC may ask customers to increase certain values in guidbedit without a true understanding of how to fix the issue more permanently.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
18 | |
10 | |
7 | |
6 | |
6 | |
6 | |
6 | |
4 | |
3 | |
3 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY