<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: about session offload in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/about-session-offload/m-p/30375#M22221</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The PANFW has the internal logic to determine which traffic is subjected to offloading. The rule of thumb being that any traffic that does not require signature inspection ( for both application determination and threat checks ) is offloaded to the hardware processor. Like mentioned before, sessions for SSL traffic ( which is encrypted and the firewall cannot determine the signature ), application overridden traffic ( admin creates such custom application because he/she trusts such applications ), etc are offloaded. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 07 Jan 2014 14:28:48 GMT</pubDate>
    <dc:creator>kprakash</dc:creator>
    <dc:date>2014-01-07T14:28:48Z</dc:date>
    <item>
      <title>about session offload</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-session-offload/m-p/30371#M22217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;/P&gt;&lt;P&gt;the purpose is to minimze the cpu consomption but in wich way ?&lt;/P&gt;&lt;P&gt;how the offload work exactly?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank's &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Jan 2014 13:59:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-session-offload/m-p/30371#M22217</guid>
      <dc:creator>Gregoux</dc:creator>
      <dc:date>2014-01-07T13:59:35Z</dc:date>
    </item>
    <item>
      <title>Re: about session offload</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-session-offload/m-p/30372#M22218</link>
      <description>&lt;P&gt;The following article has the information about disabling the offload traffic:&amp;nbsp;&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm8cCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm8cCAC&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Oct 2020 16:04:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-session-offload/m-p/30372#M22218</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2020-10-06T16:04:39Z</dc:date>
    </item>
    <item>
      <title>Re: about session offload</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-session-offload/m-p/30373#M22219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi &lt;/P&gt;&lt;P&gt;Yes it's explain when the session is offloaded &lt;/P&gt;&lt;P&gt;but it didn't explain how the session is offloaded, i would like some detail on it.&lt;/P&gt;&lt;P&gt;thank's&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Jan 2014 14:19:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-session-offload/m-p/30373#M22219</guid>
      <dc:creator>Gregoux</dc:creator>
      <dc:date>2014-01-07T14:19:07Z</dc:date>
    </item>
    <item>
      <title>Re: about session offload</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-session-offload/m-p/30374#M22220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By default, the PANFW offloads traffic for which it need not perform content and threat checks ( like SSL traffic because its encrypted, and custom applications because the user/admin trusts these applications ). Offloading means that traffic is offloaded to a hardware chip, for faster packet processing. If offloading is set to "no", then all the traffic ( including the custom application traffic and encrypted traffic ) are subjected to signature checks, and it can cause unnecessary usage of CPU cycles. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Jan 2014 14:22:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-session-offload/m-p/30374#M22220</guid>
      <dc:creator>kprakash</dc:creator>
      <dc:date>2014-01-07T14:22:46Z</dc:date>
    </item>
    <item>
      <title>Re: about session offload</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-session-offload/m-p/30375#M22221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The PANFW has the internal logic to determine which traffic is subjected to offloading. The rule of thumb being that any traffic that does not require signature inspection ( for both application determination and threat checks ) is offloaded to the hardware processor. Like mentioned before, sessions for SSL traffic ( which is encrypted and the firewall cannot determine the signature ), application overridden traffic ( admin creates such custom application because he/she trusts such applications ), etc are offloaded. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Jan 2014 14:28:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-session-offload/m-p/30375#M22221</guid>
      <dc:creator>kprakash</dc:creator>
      <dc:date>2014-01-07T14:28:48Z</dc:date>
    </item>
    <item>
      <title>Re: about session offload</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-session-offload/m-p/30376#M22222</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Gregoux,&lt;/P&gt;&lt;P&gt;Threat signature match processing prior to the protocol decoder and the matching engine is used for content/ threat signature pattern matching, If signatures are changed during any transaction, we will mark the FPGA as unavailable, load the new signatures into the FPGA, then unmake it. The user or administrator is not having control &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;on&lt;/SPAN&gt; it, whether the traffic will be offloaded or not. It's depending on the traffic pattern only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Jan 2014 01:00:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-session-offload/m-p/30376#M22222</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-01-08T01:00:39Z</dc:date>
    </item>
    <item>
      <title>Re: about session offload</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-session-offload/m-p/296764#M77997</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Does anybody know if when I disable the session offload, it disables the offloading for new sessions or also for active sessions?&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2019 17:42:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-session-offload/m-p/296764#M77997</guid>
      <dc:creator>Douglas_Zan</dc:creator>
      <dc:date>2019-11-06T17:42:36Z</dc:date>
    </item>
    <item>
      <title>Re: about session offload</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-session-offload/m-p/458488#M101910</link>
      <description>&lt;P&gt;it will only disable offload for new sessions, existing session will not take effect unless clear the existing session&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jan 2022 05:58:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-session-offload/m-p/458488#M101910</guid>
      <dc:creator>xipan</dc:creator>
      <dc:date>2022-01-13T05:58:36Z</dc:date>
    </item>
  </channel>
</rss>

