<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Situation with PA-5250s and Global Protect connections in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/situation-with-pa-5250s-and-global-protect-connections/m-p/1235717#M6966</link>
    <description>&lt;P&gt;Specific situation we're dealing with, looking to see if anybody else has and has any input.&amp;nbsp;&lt;BR /&gt;Over the past few years we have worked a Global Protect build and deployment in our org. We opted to use PA-5250s solely on the basis that they documentation claims that model supports 30k GlobalProtect connections (IPsec AND SSL specifically).&lt;BR /&gt;&lt;BR /&gt;In our configuration we prefer ipsec, but have SSL Fallback enabled to the smallest possible configurable interval (1 hour). In production today we have about 10,000 users on one GP GW. about 9,200 are ipsec and about 200 are on SSL. We have a use-case for users who may be connecting from customer networks or home networks where ipsec is disabled.&lt;BR /&gt;&lt;BR /&gt;Well, turns out the documentation regarding the specs is inaccurate specifically due to some sort of inefficiency in the PA-5250 architecture in which SSL sessions use CONSIDERABLY more resources than expected. We've had situations where single SSL sessions can use upwards of 20% of the entire packet buffers. We're seeing packet buffers and related protections constantly triggering, and DPU is solidly at about 75% during normal production, sometims spiking in the 90s. Confirmed this issue with Palo TAC.&lt;BR /&gt;&lt;BR /&gt;Palo's only real recommendation so far has been to&lt;BR /&gt;1. upgrade the hardware to a newer and beefier x86 architecture&lt;BR /&gt;2. separate IPsec and SSL Gateways into separate hardware to spread the load out better&lt;BR /&gt;&lt;BR /&gt;Curious if anyone has dealt with this situation before?&lt;/P&gt;</description>
    <pubDate>Fri, 08 Aug 2025 12:56:36 GMT</pubDate>
    <dc:creator>NeonNetSec</dc:creator>
    <dc:date>2025-08-08T12:56:36Z</dc:date>
    <item>
      <title>Situation with PA-5250s and Global Protect connections</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/situation-with-pa-5250s-and-global-protect-connections/m-p/1235717#M6966</link>
      <description>&lt;P&gt;Specific situation we're dealing with, looking to see if anybody else has and has any input.&amp;nbsp;&lt;BR /&gt;Over the past few years we have worked a Global Protect build and deployment in our org. We opted to use PA-5250s solely on the basis that they documentation claims that model supports 30k GlobalProtect connections (IPsec AND SSL specifically).&lt;BR /&gt;&lt;BR /&gt;In our configuration we prefer ipsec, but have SSL Fallback enabled to the smallest possible configurable interval (1 hour). In production today we have about 10,000 users on one GP GW. about 9,200 are ipsec and about 200 are on SSL. We have a use-case for users who may be connecting from customer networks or home networks where ipsec is disabled.&lt;BR /&gt;&lt;BR /&gt;Well, turns out the documentation regarding the specs is inaccurate specifically due to some sort of inefficiency in the PA-5250 architecture in which SSL sessions use CONSIDERABLY more resources than expected. We've had situations where single SSL sessions can use upwards of 20% of the entire packet buffers. We're seeing packet buffers and related protections constantly triggering, and DPU is solidly at about 75% during normal production, sometims spiking in the 90s. Confirmed this issue with Palo TAC.&lt;BR /&gt;&lt;BR /&gt;Palo's only real recommendation so far has been to&lt;BR /&gt;1. upgrade the hardware to a newer and beefier x86 architecture&lt;BR /&gt;2. separate IPsec and SSL Gateways into separate hardware to spread the load out better&lt;BR /&gt;&lt;BR /&gt;Curious if anyone has dealt with this situation before?&lt;/P&gt;</description>
      <pubDate>Fri, 08 Aug 2025 12:56:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/situation-with-pa-5250s-and-global-protect-connections/m-p/1235717#M6966</guid>
      <dc:creator>NeonNetSec</dc:creator>
      <dc:date>2025-08-08T12:56:36Z</dc:date>
    </item>
  </channel>
</rss>

