CoreXL for Virtual Systems

Note - In Security Groups in Maestro and Scalable Chassis:

Introduction

CoreXLClosed Performance-enhancing technology for Security Gateways on multi-core processing platforms. Multiple Check Point Firewall instances are running in parallel on multiple CPU cores. creates multiple Firewall instances that are, in reality, independent firewalls. You can use CoreXL to increase the performance of the VSX Gateway with multiple CPU cores. You can also assign each CoreXL Firewall instance to a group of CPU cores with the "fw ctl affinity" command.

You configure CoreXL Firewall instances differently for the VSX Gateway (VS0) than for other Virtual Systems.

You can configure several CoreXL Firewall instances for each Virtual SystemClosed Virtual Device on a VSX Gateway or VSX Cluster Member that implements the functionality of a Security Gateway. Acronym: VS.. When you change the number of CoreXL Firewall instances on a Virtual System, there is some downtime for that Virtual System.

Important:

  • Each CoreXL Firewall instance you create uses additional system memory.

    A Virtual System with five CoreXL Firewall instances would use approximately the same amount of memory as five separate Virtual Systems.

  • The number of IPv6 instances cannot exceed the number of IPv4 CoreXL Firewall instances.

For more about configuring CoreXL, see the R81.10 Performance Tuning Administration Guide > Chapter "CoreXL".

Configuring CoreXL on a VSX Gateway

Important - Enabling CoreXL on VS0 is not recommended because of increased memory overhead and potential performance degradation. Most VSX deployments do not require more than a single Firewall instance for VS0 as its main purpose is managing the VSX Gateway.

Use the "cpconfig" command to configure CoreXL on the VSX Gateway (VS0).

The number of instances for the VSX Gateway is limited to the physical number of cores on the server or appliance.

To configure the number of instances on the VSX Gateway:

  1. Connect to the command line on the VSX Gateway / each VSX Cluster MemberClosed Security Gateway that is part of a cluster..

  2. Run:

    cpconfig

  3. Select Configure Check Point CoreXL.

  4. Make sure that CoreXL is enabled.

  5. Configure the number of CoreXL Firewall instances.

  6. Exit the cpconfig menu.

Note - It is not necessary to reboot the VSX Gateway after you configure CoreXL.

Configuring CoreXL on a Scalable Platform Security Group

Important - Enabling CoreXL on VS0 is not recommended because of increased memory overhead and potential performance degradation. Most VSX deployments do not require more than a single Firewall instance for VS0 as its main purpose is managing the Security Group.

To configure CoreXL on the Security Group (VS0):

To configure the number of instances on the Security Group:

  1. Connect to the command line on the Security Group.

  2. Log in to Gaia gClish.

    If your default shell is the Expert mode, then run: gclish

  3. Run:

    cpconfig

  4. Select Configure Check Point CoreXL.

  5. Make sure that CoreXL is enabled.

  6. Configure the number of CoreXL Firewall instances.

  7. Exit the cpconfig menu.

Note - It is not necessary to reboot the Security Group after you configure CoreXL.

Configuring CoreXL on Virtual Systems

Use SmartConsole to configure the number of CoreXL Firewall instances on the Virtual Systems.

In 64-bit Gaia, you can assign up to 32 CoreXL Firewall instances on a Virtual System.

The number of CoreXL Firewall instances is not limited by the physical CPU cores on the VSX Gateway.

You can assign the number of IPv6 CoreXL Firewall instances. It must be less or equal to the number of IPv4 CoreXL Firewall instances. The number of IPv6 CoreXL Firewall instances may be zero. IPv6 CoreXL Firewall instances are only enabled, if an IPv6 address is configured for that Virtual System.

Notes:

  • We recommend that you use the number of CoreXL Firewall instances for each Virtual System according to the expected network traffic on the Virtual System. Configuring unnecessary CoreXL Firewall instances can have a negative impact on performance.

  • We recommend that you do not configure more CoreXL Firewall instances than the total number of physical CPU cores on the VSX Gateway.

To configure CoreXL on a Virtual System:

  1. Connect with SmartConsole to the Security Management ServerClosed Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. or Target Domain Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. that manages the Virtual System.

  2. From the Gateways & Servers view or Object Explorer, double-click the Virtual System object.

    The Virtual System General Properties window opens.

  3. From the left navigation tree, select CoreXL.

  4. Select the number of CoreXL Firewall instances for the Virtual System.

  5. Click OK.

  6. Install the Access Control Policy on the Virtual System object.