<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inconsistent behavior of vSEC in AWS in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6740#M4166</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So the same, basically.&lt;/P&gt;&lt;P&gt;Have you opened a TAC case like I suggested earlier?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 28 Sep 2017 20:15:11 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2017-09-28T20:15:11Z</dc:date>
    <item>
      <title>Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6721#M4147</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Weirdest thing:&lt;/P&gt;&lt;P&gt;Immediately after policy load, test traffic succeeding.&lt;/P&gt;&lt;P&gt;Few minutes later, no go.&lt;/P&gt;&lt;P&gt;There is NO Dynamic routing involved.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Lab Setup" class="image-1 jive-image j-img-original" src="/legacyfs/online/checkpoint/59149_2017-09-27 18_07_47-Check Point And AWS Scenarios.vsdx - Visio Professional.png" style="width: 620px; height: 413px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Good traffic immediately after policy load:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Client session:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[vladimir@centos7 ~]$ curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;/P&gt;&lt;P&gt;[vladimir@centos7 ~]$&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;vSEC:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[Expert@vSEC01:0]# fw monitor -e 'accept port(80);'&lt;BR /&gt; monitor: getting filter (from command line)&lt;BR /&gt; monitor: compiling&lt;BR /&gt;monitorfilter:&lt;BR /&gt;Compiled OK.&lt;BR /&gt; monitor: loading&lt;BR /&gt; monitor: monitoring (control-C to stop)&lt;BR /&gt;[vs_0][fw_1] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=27946&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 .S.... seq=e03cd91b ack=00000000&lt;BR /&gt;[vs_0][fw_1] eth0:I[60]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=60 id=27946&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 .S.... seq=e03cd91b ack=00000000&lt;BR /&gt;[vs_0][fw_1] eth1:o[60]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=60 id=27946&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 .S.... seq=e03cd91b ack=00000000&lt;BR /&gt;[vs_0][fw_1] eth1:O[60]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=60 id=27946&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 .S.... seq=e03cd91b ack=00000000&lt;BR /&gt;[vs_0][fw_1] eth1:i[60]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=60 id=0&lt;BR /&gt;TCP: 80 -&amp;gt; 19023 .S..A. seq=8cd9c86d ack=e03cd91c&lt;BR /&gt;[vs_0][fw_1] eth1:I[60]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=60 id=0&lt;BR /&gt;TCP: 80 -&amp;gt; 19023 .S..A. seq=8cd9c86d ack=e03cd91c&lt;BR /&gt;[vs_0][fw_1] eth0:o[60]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=60 id=0&lt;BR /&gt;TCP: 80 -&amp;gt; 19023 .S..A. seq=8cd9c86d ack=e03cd91c&lt;BR /&gt;[vs_0][fw_1] eth0:O[60]: 10.255.255.23 -&amp;gt; 24.89.129.101 (TCP) len=60 id=0&lt;BR /&gt;TCP: 80 -&amp;gt; 19023 .S..A. seq=8cd9c86d ack=e03cd91c&lt;BR /&gt;[vs_0][fw_1] eth0:i[52]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=52 id=27947&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 ....A. seq=e03cd91c ack=8cd9c86e&lt;BR /&gt;[vs_0][fw_1] eth0:I[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=27947&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 ....A. seq=e03cd91c ack=8cd9c86e&lt;BR /&gt;[vs_0][fw_1] eth1:o[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=27947&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 ....A. seq=e03cd91c ack=8cd9c86e&lt;BR /&gt;[vs_0][fw_1] eth1:O[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=27947&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 ....A. seq=e03cd91c ack=8cd9c86e&lt;BR /&gt;[vs_0][fw_1] eth0:i[139]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=139 id=27948&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 ...PA. seq=e03cd91c ack=8cd9c86e&lt;BR /&gt;[vs_0][fw_1] eth0:I[139]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=139 id=27948&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 ...PA. seq=e03cd91c ack=8cd9c86e&lt;BR /&gt;[vs_0][fw_1] eth1:o[139]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=139 id=27948&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 ...PA. seq=e03cd91c ack=8cd9c86e&lt;BR /&gt;[vs_0][fw_1] eth1:O[139]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=139 id=27948&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 ...PA. seq=e03cd91c ack=8cd9c86e&lt;BR /&gt;[vs_0][fw_1] eth1:i[52]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=52 id=36280&lt;BR /&gt;TCP: 80 -&amp;gt; 19023 ....A. seq=8cd9c86e ack=e03cd973&lt;BR /&gt;[vs_0][fw_1] eth1:I[52]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=52 id=36280&lt;BR /&gt;TCP: 80 -&amp;gt; 19023 ....A. seq=8cd9c86e ack=e03cd973&lt;BR /&gt;[vs_0][fw_1] eth0:o[52]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=52 id=36280&lt;BR /&gt;TCP: 80 -&amp;gt; 19023 ....A. seq=8cd9c86e ack=e03cd973&lt;BR /&gt;[vs_0][fw_1] eth0:O[52]: 10.255.255.23 -&amp;gt; 24.89.129.101 (TCP) len=52 id=36280&lt;BR /&gt;TCP: 80 -&amp;gt; 19023 ....A. seq=8cd9c86e ack=e03cd973&lt;BR /&gt;[vs_0][fw_1] eth1:i[371]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=371 id=36281&lt;BR /&gt;TCP: 80 -&amp;gt; 19023 ...PA. seq=8cd9c86e ack=e03cd973&lt;BR /&gt;[vs_0][fw_1] eth1:I[371]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=371 id=36281&lt;BR /&gt;TCP: 80 -&amp;gt; 19023 ...PA. seq=8cd9c86e ack=e03cd973&lt;BR /&gt;[vs_0][fw_1] eth0:o[371]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=371 id=36281&lt;BR /&gt;TCP: 80 -&amp;gt; 19023 ...PA. seq=8cd9c86e ack=e03cd973&lt;BR /&gt;[vs_0][fw_1] eth0:O[371]: 10.255.255.23 -&amp;gt; 24.89.129.101 (TCP) len=371 id=36281&lt;BR /&gt;TCP: 80 -&amp;gt; 19023 ...PA. seq=8cd9c86e ack=e03cd973&lt;BR /&gt;[vs_0][fw_1] eth0:i[52]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=52 id=27949&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 ....A. seq=e03cd973 ack=8cd9c9ad&lt;BR /&gt;[vs_0][fw_1] eth0:I[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=27949&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 ....A. seq=e03cd973 ack=8cd9c9ad&lt;BR /&gt;[vs_0][fw_1] eth1:o[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=27949&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 ....A. seq=e03cd973 ack=8cd9c9ad&lt;BR /&gt;[vs_0][fw_1] eth1:O[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=27949&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 ....A. seq=e03cd973 ack=8cd9c9ad&lt;BR /&gt;[vs_0][fw_1] eth0:i[52]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=52 id=27950&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 F...A. seq=e03cd973 ack=8cd9c9ad&lt;BR /&gt;[vs_0][fw_1] eth0:I[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=27950&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 F...A. seq=e03cd973 ack=8cd9c9ad&lt;BR /&gt;[vs_0][fw_1] eth1:o[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=27950&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 F...A. seq=e03cd973 ack=8cd9c9ad&lt;BR /&gt;[vs_0][fw_1] eth1:O[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=27950&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 F...A. seq=e03cd973 ack=8cd9c9ad&lt;BR /&gt;[vs_0][fw_1] eth1:i[52]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=52 id=36282&lt;BR /&gt;TCP: 80 -&amp;gt; 19023 F...A. seq=8cd9c9ad ack=e03cd974&lt;BR /&gt;[vs_0][fw_1] eth1:I[52]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=52 id=36282&lt;BR /&gt;TCP: 80 -&amp;gt; 19023 F...A. seq=8cd9c9ad ack=e03cd974&lt;BR /&gt;[vs_0][fw_1] eth0:o[52]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=52 id=36282&lt;BR /&gt;TCP: 80 -&amp;gt; 19023 F...A. seq=8cd9c9ad ack=e03cd974&lt;BR /&gt;[vs_0][fw_1] eth0:O[52]: 10.255.255.23 -&amp;gt; 24.89.129.101 (TCP) len=52 id=36282&lt;BR /&gt;TCP: 80 -&amp;gt; 19023 F...A. seq=8cd9c9ad ack=e03cd974&lt;BR /&gt;[vs_0][fw_1] eth0:i[52]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=52 id=27951&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 ....A. seq=e03cd974 ack=8cd9c9ae&lt;BR /&gt;[vs_0][fw_1] eth0:I[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=27951&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 ....A. seq=e03cd974 ack=8cd9c9ae&lt;BR /&gt;[vs_0][fw_1] eth1:o[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=27951&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 ....A. seq=e03cd974 ack=8cd9c9ae&lt;BR /&gt;[vs_0][fw_1] eth1:O[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=27951&lt;BR /&gt;TCP: 19023 -&amp;gt; 80 ....A. seq=e03cd974 ack=8cd9c9ae&lt;BR /&gt; monitor: caught sig 2&lt;BR /&gt; monitor: unloading&lt;BR /&gt;[Expert@vSEC01:0]#&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Web Server on EC2 behind Logical Server:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[ec2-user@ip-10-255-255-210 ~]$ sudo tcpdump -n host 24.89.129.101&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes&lt;BR /&gt;21:29:23.086278 IP 24.89.129.101.19023 &amp;gt; 10.255.255.210.http: Flags [S], seq 3762084123, win 29200, options &lt;BR /&gt;[mss 1460,sackOK,TS val 169391153 ecr 0,nop,wscale 7], length 0&lt;BR /&gt;21:29:23.086307 IP 10.255.255.210.http &amp;gt; 24.89.129.101.19023: Flags [S.], seq 2363082861, ack 3762084124, &lt;BR /&gt;win 26847, options [mss 8961,sackOK,TS val 2639313 ecr 169391153,nop,wscale 7], length 0&lt;BR /&gt;21:29:23.102856 IP 24.89.129.101.19023 &amp;gt; 10.255.255.210.http: Flags [.], ack 1, win 229, options &lt;BR /&gt;[nop,nop,TS val 169391175 ecr 2639313], length 0&lt;BR /&gt;21:29:23.106642 IP 24.89.129.101.19023 &amp;gt; 10.255.255.210.http: Flags [P.], seq 1:88, ack 1, win 229, options &lt;BR /&gt;[nop,nop,TS val 169391175 ecr 2639313], length 87&lt;BR /&gt;21:29:23.106660 IP 10.255.255.210.http &amp;gt; 24.89.129.101.19023: Flags [.], ack 88, win 210, options &lt;BR /&gt;[nop,nop,TS val 2639318 ecr 169391175], length 0&lt;BR /&gt;21:29:23.106875 IP 10.255.255.210.http &amp;gt; 24.89.129.101.19023: Flags [P.], seq 1:320, ack 88, win 210, &lt;BR /&gt;options [nop,nop,TS val 2639318 ecr 169391175], length 319&lt;BR /&gt;21:29:23.122734 IP 24.89.129.101.19023 &amp;gt; 10.255.255.210.http: Flags [.], ack 320, win 237, options &lt;BR /&gt;[nop,nop,TS val 169391195 ecr 2639318], length 0&lt;BR /&gt;21:29:23.124526 IP 24.89.129.101.19023 &amp;gt; 10.255.255.210.http: Flags [F.], seq 88, ack 320, win 237, options &lt;BR /&gt;[nop,nop,TS val 169391195 ecr 2639318], length 0&lt;BR /&gt;21:29:23.124553 IP 10.255.255.210.http &amp;gt; 24.89.129.101.19023: Flags [F.], seq 320, ack 89, win 210, options &lt;BR /&gt;[nop,nop,TS val 2639322 ecr 169391195], length 0&lt;BR /&gt;21:29:23.141031 IP 24.89.129.101.19023 &amp;gt; 10.255.255.210.http: Flags [.], ack 321, win 237, options &lt;BR /&gt;[nop,nop,TS val 169391213 ecr 2639322], length 0&lt;BR /&gt;^C&lt;BR /&gt;10 packets captured&lt;BR /&gt;10 packets received by filter&lt;BR /&gt;0 packets dropped by kernel&lt;BR /&gt;[ec2-user@ip-10-255-255-210 ~]$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Few minutes later:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Client session:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[vladimir@centos7 ~]$ curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;curl: (7) Failed connect to 34.235.192.92:80; Connection timed out&lt;BR /&gt;[vladimir@centos7 ~]$&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;vSEC:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[Expert@vSEC01:0]# fw monitor -e 'accept port(80);'&lt;BR /&gt; monitor: getting filter (from command line)&lt;BR /&gt; monitor: compiling&lt;BR /&gt;monitorfilter:&lt;BR /&gt;Compiled OK.&lt;BR /&gt; monitor: loading&lt;BR /&gt; monitor: monitoring (control-C to stop)&lt;BR /&gt;[vs_0][fw_1] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=21286&lt;BR /&gt;TCP: 19024 -&amp;gt; 80 .S.... seq=1901a5b5 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=21287&lt;BR /&gt;TCP: 19024 -&amp;gt; 80 .S.... seq=1901a5b5 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=21288&lt;BR /&gt;TCP: 19024 -&amp;gt; 80 .S.... seq=1901a5b5 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=21289&lt;BR /&gt;TCP: 19024 -&amp;gt; 80 .S.... seq=1901a5b5 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=21290&lt;BR /&gt;TCP: 19024 -&amp;gt; 80 .S.... seq=1901a5b5 ack=00000000&lt;BR /&gt;[vs_0][fw_1] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=21291&lt;BR /&gt;TCP: 19024 -&amp;gt; 80 .S.... seq=1901a5b5 ack=00000000&lt;BR /&gt;[vs_0][fw_1] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=21292&lt;BR /&gt;TCP: 43813 -&amp;gt; 80 .S.... seq=1901a5b5 ack=00000000&lt;BR /&gt;^C monitor: caught sig 2&lt;BR /&gt; monitor: unloading&lt;BR /&gt;[Expert@vSEC01:0]#&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Web Server on EC2 behind Logical Server:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[ec2-user@ip-10-255-255-210 ~]$ sudo tcpdump -n host 24.89.129.101&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes&lt;BR /&gt;^C&lt;BR /&gt;0 packets captured&lt;BR /&gt;0 packets received by filter&lt;BR /&gt;0 packets dropped by kernel&lt;BR /&gt;[ec2-user@ip-10-255-255-210 ~]$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Sep 2017 22:13:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6721#M4147</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-09-27T22:13:07Z</dc:date>
    </item>
    <item>
      <title>Re: Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6722#M4148</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After you load the policy &lt;EM&gt;fw monitor&lt;/EM&gt; shows:&lt;/P&gt;&lt;PRE&gt;eth0:&lt;STRONG&gt;i&lt;/STRONG&gt;: 24.89.129.101 -&amp;gt; 10.255.255.23&amp;nbsp;&amp;nbsp; TCP: 19023 -&amp;gt; 80 SYN inbound&lt;BR /&gt;eth0:&lt;STRONG&gt;I&lt;/STRONG&gt;: 24.89.129.101 -&amp;gt; 10.255.255.210&amp;nbsp; TCP: 19023 -&amp;gt; 80 SYN Inbound&lt;BR /&gt;eth1:&lt;STRONG&gt;o&lt;/STRONG&gt;: 24.89.129.101 -&amp;gt; 10.255.255.210&amp;nbsp; TCP: 19023 -&amp;gt; 80 SYN outbound&lt;BR /&gt;eth1:&lt;STRONG&gt;O&lt;/STRONG&gt;: 24.89.129.101 -&amp;gt; 10.255.255.210&amp;nbsp; TCP: 19023 -&amp;gt; 80 SYN Outbound&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and a couple minutes later only:&lt;/P&gt;&lt;PRE&gt;eth0:&lt;STRONG&gt;i&lt;/STRONG&gt;: 24.89.129.101 -&amp;gt; 10.255.255.23&amp;nbsp;&amp;nbsp; TCP: 19024 -&amp;gt; 80 SYN&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;eth0:&lt;STRONG&gt;I&lt;/STRONG&gt;: missing&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to troubleshoot where the traffic is lost on the Inbound interface eth0:I I suggest running:&lt;/P&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;fwaccel stat (check if it's active)&lt;BR /&gt;fw ctl set int fw_antispoofing_enabled 0; sim feature anti_spoofing off; fwaccel off&lt;BR /&gt;fw ctl zdebug drop | grep 24.89.129.101&lt;BR /&gt;fw ctl set int fw_antispoofing_enabled 1; sim feature anti_spoofing on&lt;BR /&gt;fwaccel on (if it was active initially)&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also check your SmartLog for &lt;STRONG&gt;src:24.89.129.101 AND http&lt;/STRONG&gt; and reply with the results.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Sep 2017 22:37:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6722#M4148</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2017-09-27T22:37:35Z</dc:date>
    </item>
    <item>
      <title>Re: Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6723#M4149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Danny, thank you for trying to puzzle it out with me.&lt;/P&gt;&lt;P&gt;The acceleration was off, but nonetheless:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@vSEC01:0]# fwaccel stat&lt;BR /&gt;Accelerator Status : off&lt;/P&gt;&lt;P&gt;Accelerator Features : Accounting, NAT, Cryptography, Routing,&lt;BR /&gt; HasClock, Templates, Synchronous, IdleDetection,&lt;BR /&gt; Sequencing, TcpStateDetect, AutoExpire,&lt;BR /&gt; DelayedNotif, TcpStateDetectV2, CPLS, McastRouting,&lt;BR /&gt; WireMode, DropTemplates, NatTemplates,&lt;BR /&gt; Streaming, MultiFW, AntiSpoofing, Nac,&lt;BR /&gt; ViolationStats, AsychronicNotif, ERDOS,&lt;BR /&gt; McastRoutingV2, NMR, NMT, NAT64, GTPAcceleration,&lt;BR /&gt; SCTPAcceleration&lt;BR /&gt;Cryptography Features Mask : not available&lt;BR /&gt;[Expert@vSEC01:0]#&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[Expert@vSEC01:0]# fw ctl zdebug drop | grep 24.89.129.101&lt;BR /&gt;;[cpu_1];[fw4_0];fw_log_drop_ex: Packet proto=6 24.89.129.101:43817 -&amp;gt; 10.255.255.23:80 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 1;&lt;BR /&gt;;[cpu_0];[fw4_1];fw_log_drop_ex: Packet proto=6 24.89.129.101:43817 -&amp;gt; 10.255.255.23:80 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 1;&lt;BR /&gt;;[cpu_0];[fw4_1];fw_log_drop_ex: Packet proto=6 24.89.129.101:43817 -&amp;gt; 10.255.255.23:80 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 1;&lt;BR /&gt;;[cpu_1];[fw4_0];fw_log_drop_ex: Packet proto=6 24.89.129.101:43817 -&amp;gt; 10.255.255.23:80 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 1;&lt;BR /&gt;;[cpu_0];[fw4_1];fw_log_drop_ex: Packet proto=6 24.89.129.101:43817 -&amp;gt; 10.255.255.23:80 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 1;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/59151_pastedImage_1.png" style="width: 620px; height: 23px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; show access-rule name "Web-Server-Access" layer "Network"&lt;/P&gt;&lt;P&gt;uid: "e6065103-64ed-468f-aff8-db4cb3cdd860"&lt;BR /&gt;name: "Web-Server-Access"&lt;BR /&gt;type: "access-rule"&lt;BR /&gt;domain: &lt;BR /&gt; uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"&lt;BR /&gt; name: "SMC User"&lt;BR /&gt; domain-type: "domain"&lt;BR /&gt;track: &lt;BR /&gt; type: &lt;BR /&gt; uid: "598ead32-aa42-4615-90ed-f51a5928d41d"&lt;BR /&gt; name: "Log"&lt;BR /&gt; type: "Track"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt; per-session: false&lt;BR /&gt; per-connection: true&lt;BR /&gt; accounting: false&lt;BR /&gt; alert: "none"&lt;BR /&gt;layer: "94b3713a-be33-4cfc-adb4-b25b58fe23c2"&lt;BR /&gt;source: &lt;BR /&gt;- uid: "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; name: "Any"&lt;BR /&gt; type: "CpmiAnyObject"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt;source-negate: false&lt;BR /&gt;destination: &lt;BR /&gt;- uid: "adcc18e6-3220-4b6a-a48f-0027de013bca"&lt;BR /&gt; name: "Simple01-LogicalServer-Web"&lt;BR /&gt; type: "CpmiLogicalServer"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"&lt;BR /&gt; name: "SMC User"&lt;BR /&gt; domain-type: "domain"&lt;BR /&gt;destination-negate: false&lt;BR /&gt;service: &lt;BR /&gt;- uid: "97aeb3d4-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; name: "http"&lt;BR /&gt; type: "service-tcp"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt; port: "80"&lt;BR /&gt;- uid: "97aeb443-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; name: "https"&lt;BR /&gt; type: "service-tcp"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt; port: "443"&lt;BR /&gt;service-negate: false&lt;BR /&gt;vpn: &lt;BR /&gt;- uid: "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; name: "Any"&lt;BR /&gt; type: "CpmiAnyObject"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt;action: &lt;BR /&gt; uid: "6c488338-8eec-4103-ad21-cd461ac2c472"&lt;BR /&gt; name: "Accept"&lt;BR /&gt; type: "RulebaseAction"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt;action-settings: &lt;BR /&gt; enable-identity-captive-portal: false&lt;BR /&gt;content: &lt;BR /&gt;- uid: "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; name: "Any"&lt;BR /&gt; type: "CpmiAnyObject"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt;content-negate: false&lt;BR /&gt;content-direction: "any"&lt;BR /&gt;time: &lt;BR /&gt;- uid: "97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;BR /&gt; name: "Any"&lt;BR /&gt; type: "CpmiAnyObject"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "a0bbbc99-adef-4ef8-bb6d-defdefdefdef"&lt;BR /&gt; name: "Check Point Data"&lt;BR /&gt; domain-type: "data domain"&lt;BR /&gt;custom-fields: &lt;BR /&gt; field-1: ""&lt;BR /&gt; field-2: ""&lt;BR /&gt; field-3: ""&lt;BR /&gt;meta-info: &lt;BR /&gt; lock: "unlocked"&lt;BR /&gt; validation-state: "ok"&lt;BR /&gt; last-modify-time: &lt;BR /&gt; posix: 1506546973191&lt;BR /&gt; iso-8601: "2017-09-27T17:16-0400"&lt;BR /&gt; last-modifier: "admin"&lt;BR /&gt; creation-time: &lt;BR /&gt; posix: 1506355676576&lt;BR /&gt; iso-8601: "2017-09-25T12:07-0400"&lt;BR /&gt; creator: "admin"&lt;BR /&gt;comments: ""&lt;BR /&gt;enabled: true&lt;BR /&gt;install-on: &lt;BR /&gt;- uid: "11893d30-4594-4281-be49-8e50cf40244d"&lt;BR /&gt; name: "vSEC01"&lt;BR /&gt; type: "simple-gateway"&lt;BR /&gt; domain: &lt;BR /&gt; uid: "41e821a0-3720-11e3-aa6e-0800200c9fde"&lt;BR /&gt; name: "SMC User"&lt;BR /&gt; domain-type: "domain"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/59152_pastedImage_2.png" style="width: 196px; height: 299px;" /&gt;&amp;nbsp;&amp;nbsp;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/59156_pastedImage_3.png" style="width: 212px; height: 179px;" /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/59157_pastedImage_4.png" style="width: 259px; height: 146px;" /&gt;&lt;IMG class="image-5 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/59158_pastedImage_5.png" style="width: 268px; height: 201px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still no&amp;nbsp;idea...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Sep 2017 23:34:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6723#M4149</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-09-27T23:34:17Z</dc:date>
    </item>
    <item>
      <title>Re: Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6724#M4150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;P.S. The SmartLog does not log these attempts at all, even with the Any--Any--Drop--Log.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Sep 2017 23:42:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6724#M4150</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-09-27T23:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6725#M4151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, since this is a rulebase drop, this relates to either the destination object '&lt;EM&gt;Simple01-LogicalServer-Web&lt;/EM&gt;' or the http/https services.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Related SKs (old): &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk100636"&gt;sk100636&lt;/A&gt;, &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk97876"&gt;sk97876&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's try to replace the destination object '&lt;EM&gt;Simple01-LogicalServer-Web&lt;/EM&gt;' with 'Any' and test again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you are missing log entries, please make sure your &lt;STRONG&gt;&lt;EM&gt;Global Properties &amp;gt; Implied Rules&lt;/EM&gt; are set to be logged.&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Sep 2017 23:48:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6725#M4151</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2017-09-27T23:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6726#M4152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, with "Any" it looks much the same:&lt;/P&gt;&lt;P&gt;[Expert@vSEC01:0]# fwaccel off&lt;BR /&gt;SecureXL device is not active.&lt;BR /&gt;[Expert@vSEC01:0]# fw ctl zdebug drop | grep 24.89.129.101&lt;BR /&gt;;[cpu_0];[fw4_1];fw_log_drop_ex: Packet proto=6 24.89.129.101:43819 -&amp;gt; 10.255.255.23:80 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 1;&lt;BR /&gt;;[cpu_0];[fw4_1];fw_log_drop_ex: Packet proto=6 24.89.129.101:43819 -&amp;gt; 10.255.255.23:80 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 1;&lt;BR /&gt;;[cpu_1];[fw4_0];fw_log_drop_ex: Packet proto=6 24.89.129.101:43819 -&amp;gt; 10.255.255.23:80 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 1;&lt;BR /&gt;;[cpu_0];[fw4_1];fw_log_drop_ex: Packet proto=6 24.89.129.101:43819 -&amp;gt; 10.255.255.23:80 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 1;&lt;BR /&gt;;[cpu_1];[fw4_0];fw_log_drop_ex: Packet proto=6 24.89.129.101:43819 -&amp;gt; 10.255.255.23:80 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 1;&lt;BR /&gt;[Expert@vSEC01:0]#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As if the Logical Server object doesn't matter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I didn't expect this test to succeed, as there is no Static Nat present for the Web Server nested in the Simple Group defined in the Logical Server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Sep 2017 23:57:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6726#M4152</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-09-27T23:57:53Z</dc:date>
    </item>
    <item>
      <title>Re: Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6727#M4153</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let's put a new rule above this one allowing only &lt;EM&gt;echo-request&lt;/EM&gt; to '&lt;EM&gt;Simple01-LogicalServer-Web&lt;/EM&gt;'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create a new TCP service called http_80 and https_443 with their specific ports and don't touch the advanced settings. Put '&lt;EM&gt;Simple01-LogicalServer-Web&lt;/EM&gt;' back into the destination of rule #2 and replace http/https with the new services http_80/https_443.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then try reaching the web server via http and icmp ping again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 00:14:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6727#M4153</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2017-09-28T00:14:33Z</dc:date>
    </item>
    <item>
      <title>Re: Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6728#M4154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/59160_pastedImage_4.png" style="width: 620px; height: 136px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Policy installed with warnings, which is not surprising:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/59159_pastedImage_1.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@vSEC01:0]# fwaccel stat&lt;BR /&gt;Accelerator Status : off&lt;/P&gt;&lt;P&gt;Accelerator Features : Accounting, NAT, Cryptography, Routing,&lt;BR /&gt; HasClock, Templates, Synchronous, IdleDetection,&lt;BR /&gt; Sequencing, TcpStateDetect, AutoExpire,&lt;BR /&gt; DelayedNotif, TcpStateDetectV2, CPLS, McastRouting,&lt;BR /&gt; WireMode, DropTemplates, NatTemplates,&lt;BR /&gt; Streaming, MultiFW, AntiSpoofing, Nac,&lt;BR /&gt; ViolationStats, AsychronicNotif, ERDOS,&lt;BR /&gt; McastRoutingV2, NMR, NMT, NAT64, GTPAcceleration,&lt;BR /&gt; SCTPAcceleration&lt;BR /&gt;Cryptography Features Mask : not available&lt;BR /&gt;[Expert@vSEC01:0]# fw ctl zdebug drop | grep 24.89.129.101&lt;BR /&gt;;[cpu_1];[fw4_0];fw_log_drop_ex: Packet proto=6 24.89.129.101:19033 -&amp;gt; 10.255.255.23:80 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 2;&lt;BR /&gt;;[cpu_1];[fw4_0];fw_log_drop_ex: Packet proto=6 24.89.129.101:19033 -&amp;gt; 10.255.255.23:80 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 2;&lt;BR /&gt;;[cpu_0];[fw4_1];fw_log_drop_ex: Packet proto=6 24.89.129.101:19033 -&amp;gt; 10.255.255.23:80 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 2;&lt;BR /&gt;;[cpu_1];[fw4_0];fw_log_drop_ex: Packet proto=6 24.89.129.101:19033 -&amp;gt; 10.255.255.23:80 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 2;&lt;BR /&gt;;[cpu_0];[fw4_1];fw_log_drop_ex: Packet proto=6 24.89.129.101:19033 -&amp;gt; 10.255.255.23:80 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 2;&lt;BR /&gt;;[cpu_1];[fw4_0];fw_log_drop_ex: Packet proto=1 24.89.129.101:2048 -&amp;gt; 10.255.255.23:9902 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 1;&lt;BR /&gt;;[cpu_1];[fw4_0];fw_log_drop_ex: Packet proto=1 24.89.129.101:2048 -&amp;gt; 10.255.255.23:17583 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 1;&lt;BR /&gt;;[cpu_1];[fw4_0];fw_log_drop_ex: Packet proto=1 24.89.129.101:2048 -&amp;gt; 10.255.255.23:9902 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 1;&lt;BR /&gt;;[cpu_1];[fw4_0];fw_log_drop_ex: Packet proto=1 24.89.129.101:2048 -&amp;gt; 10.255.255.23:18349 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 1;&lt;BR /&gt;;[cpu_0];[fw4_1];fw_log_drop_ex: Packet proto=1 24.89.129.101:2048 -&amp;gt; 10.255.255.23:17836 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 1;&lt;BR /&gt;;[cpu_0];[fw4_1];fw_log_drop_ex: Packet proto=1 24.89.129.101:2048 -&amp;gt; 10.255.255.23:19627 dropped by fw_send_log_drop Reason: Rulebase drop - on layer "Network" rule 1;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 00:52:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6728#M4154</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-09-28T00:52:41Z</dc:date>
    </item>
    <item>
      <title>Re: Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6729#M4155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;P.S. I haven't changed the Advanced parameters, but in the protocols' properties I did specify the http and https:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/59161_pastedImage_1.png" style="width: 261px; height: 230px;" /&gt;&amp;nbsp;&amp;nbsp;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/59162_pastedImage_2.png" style="width: 250px; height: 233px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 00:56:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6729#M4155</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-09-28T00:56:02Z</dc:date>
    </item>
    <item>
      <title>Re: Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6730#M4156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Curious if the output of fw stat changes when it's working and when it's not.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 05:35:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6730#M4156</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-09-28T05:35:21Z</dc:date>
    </item>
    <item>
      <title>Re: Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6731#M4157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;You may be onto something, although I am not sure what exactly.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;There was a change of the "fw stat" output, but it did not correlate exactly with the failure of the traffic passing through the firewall:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;After policy load, the status shows the eth0, but not the [&amp;lt;eth1] briefly:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@vSEC01:0]# fw stat&lt;BR /&gt;HOST POLICY DATE&lt;BR /&gt;localhost Standard 28Sep2017 8:22:23 : [&amp;gt;eth0] [&amp;lt;eth0] [&amp;lt;eth1]&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;[Expert@vSEC01:0]# fw stat&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;HOST POLICY DATE&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;localhost Standard 28Sep2017 8:26:52 : [&amp;gt;eth0] [&amp;lt;eth0]&lt;/SPAN&gt;&lt;BR /&gt;[Expert@vSEC01:0]# fw stat&lt;BR /&gt;HOST POLICY DATE&lt;BR /&gt;localhost Standard 28Sep2017 8:26:52 : [&amp;gt;eth0] [&amp;lt;eth0] [&amp;lt;eth1]&lt;BR /&gt;[Expert@vSEC01:0]# fw stat&lt;BR /&gt;HOST POLICY DATE&lt;BR /&gt;localhost Standard 28Sep2017 8:26:52 : [&amp;gt;eth0] [&amp;lt;eth0] [&amp;lt;eth1]&lt;BR /&gt;[Expert@vSEC01:0]# fw stat&lt;BR /&gt;HOST POLICY DATE&lt;BR /&gt;localhost Standard 28Sep2017 8:26:52 : [&amp;gt;eth0] [&amp;lt;eth0] [&amp;lt;eth1]&lt;BR /&gt;[Expert@vSEC01:0]#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Running curls from the client, the failure was observed later on, when the [&amp;lt;eth1] re-appeared in the fw stat output:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[root@centos7 ~]# curl &lt;A href="http://34.235.192.92/hello.html"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;curl: (7) Failed connect to 34.235.192.92:80; Connection timed out&lt;/SPAN&gt;&lt;BR /&gt;[root@centos7 ~]#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to make sure all are on the same page, the environment was re-set back to the original with stock HTTP and HTTPS services in the Rule 1:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/59165_pastedImage_7.png" style="width: 782px; height: 29px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 12:39:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6731#M4157</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-09-28T12:39:06Z</dc:date>
    </item>
    <item>
      <title>Re: Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6732#M4158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just re-run the test and the fw stat output stays the same during traffic traversal failure:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;Policy Installation (completed)&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;[Expert@vSEC01:0]# fw stat&lt;BR /&gt;HOST POLICY DATE&lt;BR /&gt;localhost Standard 28Sep2017 8:40:21 : [&amp;gt;eth0] [&amp;lt;eth0] [&amp;lt;eth1]&lt;BR /&gt;[Expert@vSEC01:0]# fw stat&lt;BR /&gt;HOST POLICY DATE&lt;BR /&gt;localhost Standard 28Sep2017 8:40:21 : [&amp;gt;eth0] [&amp;lt;eth0] [&amp;lt;eth1]&lt;BR /&gt;[Expert@vSEC01:0]# fw stat&lt;BR /&gt;HOST POLICY DATE&lt;BR /&gt;localhost Standard 28Sep2017 8:40:21 : [&amp;gt;eth0] [&amp;lt;eth0] [&amp;lt;eth1]&lt;BR /&gt;[Expert@vSEC01:0]# fw stat&lt;BR /&gt;HOST POLICY DATE&lt;BR /&gt;localhost Standard 28Sep2017 8:40:21 : [&amp;gt;eth0] [&amp;lt;eth0] [&amp;lt;eth1]&lt;BR /&gt;[Expert@vSEC01:0]# fw stat&lt;BR /&gt;HOST POLICY DATE&lt;BR /&gt;localhost Standard 28Sep2017 8:40:21 : [&amp;gt;eth0] [&amp;lt;eth0] [&amp;lt;eth1]&lt;BR /&gt;[Expert@vSEC01:0]#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;curl: (7) Failed connect to 34.235.192.92:80; Connection timed out&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;Policy Installation (completed)&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;&lt;SPAN&gt;[root@centos7 ~]# curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://34.235.192.92/hello.html" rel="nofollow"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;h1&amp;gt;Hello from Amazon EC201&amp;lt;/h1&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;[root@centos7 ~]# curl &lt;A href="http://34.235.192.92/hello.html"&gt;http://34.235.192.92/hello.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;Timeout&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;^C&lt;BR /&gt;[root@centos7 ~]#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 12:45:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6732#M4158</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-09-28T12:45:37Z</dc:date>
    </item>
    <item>
      <title>Re: Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6733#M4159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dameon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;there is obviously a change of state happening on the vSEC shortly after policy load. How can we log the event for further analysis? &amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 14:04:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6733#M4159</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-09-28T14:04:37Z</dc:date>
    </item>
    <item>
      <title>Re: Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6734#M4160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;fw stat shows when the last policy was installed.&lt;/P&gt;&lt;P&gt;If the date changes, it suggests the policy was reloaded.&lt;/P&gt;&lt;P&gt;The observed behavior suggests the policy is changing (to what and why I’m not sure).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As troubleshooting steps, you might try (test connectivity after each step)&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;fw unloadlocal&lt;/LI&gt;&lt;LI&gt;fw fetch localhost&lt;/LI&gt;&lt;LI&gt;fw unloadlocal&lt;/LI&gt;&lt;LI&gt;Push policy from manager again&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Note the “fw unloadlocal” will unload the policy from the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Beyond that, I suspect we’ll need to have someone take a deeper look.&lt;/P&gt;&lt;P&gt;For that, a TAC case is needed:&amp;nbsp;&lt;A class="link-titled" href="https://www.checkpoint.com/support-services/contact-support/" title="https://www.checkpoint.com/support-services/contact-support/"&gt;Contact Support | Check Point Software&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Please message me the TAC SR and I can have someone from R&amp;amp;D take a look.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 14:54:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6734#M4160</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-09-28T14:54:55Z</dc:date>
    </item>
    <item>
      <title>Re: Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6735#M4161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I suppose that unloading the policy will not allow for connectivity, as it relies on the Logical Server object being present, unless the simple fact that it is created is sufficient for routing to persist in the absence of policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if this is the case.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 16:59:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6735#M4161</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-09-28T16:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6736#M4162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should still be able to test connectivity to/from the gateway by unloading the policy.&lt;/P&gt;&lt;P&gt;It will break the logical server functionality, of course.&lt;/P&gt;&lt;P&gt;The steps I am proposing is&amp;nbsp;to&amp;nbsp;see if we can "reset" the policy that&amp;nbsp;is stored on the vSEC instance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 17:16:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6736#M4162</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-09-28T17:16:02Z</dc:date>
    </item>
    <item>
      <title>Re: Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6737#M4163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, these are the results, all "login as: admin" is indicative of interruptions of the SSH session:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;login as: admin&lt;BR /&gt;This system is for authorized use only.&lt;BR /&gt;Authenticating with public key "imported-openssh-key"&lt;BR /&gt;vSEC01&amp;gt; fw unloadlocal&lt;/P&gt;&lt;P&gt;Uninstalling Security Policy from all.all@vSEC01&lt;BR /&gt;Done.&lt;BR /&gt;vSEC01&amp;gt;&lt;BR /&gt;vSEC01&amp;gt;&lt;BR /&gt;vSEC01&amp;gt; fw fetch localhost&lt;/P&gt;&lt;P&gt;Installing Security Policy Standard on all.all@vSEC01&lt;BR /&gt;login as: admin&lt;BR /&gt;This system is for authorized use only.&lt;BR /&gt;Authenticating with public key "imported-openssh-key"&lt;BR /&gt;vSEC01&amp;gt; fw stat&lt;BR /&gt;HOST POLICY DATE&lt;BR /&gt;localhost Standard 28Sep2017 14:06:02 : [&amp;gt;eth0] [&amp;lt;eth0] [&amp;gt;eth1] [&amp;lt;eth1]&lt;BR /&gt;vSEC01&amp;gt; fw unloadlocal&lt;/P&gt;&lt;P&gt;Uninstalling Security Policy from all.all@vSEC01&lt;BR /&gt;Done.&lt;BR /&gt;vSEC01&amp;gt; fw stat&lt;BR /&gt;HOST POLICY DATE&lt;BR /&gt;localhost - - - : &amp;gt;eth0 &amp;lt;eth0 &amp;gt;eth1 &amp;lt;eth1&lt;BR /&gt;vSEC01&amp;gt;&lt;BR /&gt;login as: admin&lt;BR /&gt;This system is for authorized use only.&lt;BR /&gt;Authenticating with public key "imported-openssh-key"&lt;BR /&gt;CLINFR0771 Config lock is owned by admin. Use the command 'lock database override' to acquire the lock.&lt;BR /&gt;vSEC01&amp;gt; fw stat&lt;BR /&gt;HOST POLICY DATE&lt;BR /&gt;localhost Standard 28Sep2017 14:18:27 : [&amp;gt;eth0] [&amp;lt;eth0] [&amp;gt;eth1] [&amp;lt;eth1]&lt;BR /&gt;vSEC01&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are the interfaces and directional arrows represent in fw stat output?&lt;/P&gt;&lt;P&gt;[&amp;gt;eth0] [&amp;lt;eth0] [&amp;gt;eth1] [&amp;lt;eth1] are shown, but there is also an eth2 active interface present in topology, but is not listed here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 18:24:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6737#M4163</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-09-28T18:24:02Z</dc:date>
    </item>
    <item>
      <title>Re: Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6738#M4164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Reloading the policy will kill active connections, so SSH terminating is not unusual.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The interfaces and arrows indicate the interfaces that have received traffic since policy install and the direction (inbound or outbound).&lt;/P&gt;&lt;P&gt;The fact you don't see eth2 means it's seen no traffic since the last policy install.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I meant in terms of testing connectivity was do the test you had shown earlier in the thread.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 18:46:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6738#M4164</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-09-28T18:46:08Z</dc:date>
    </item>
    <item>
      <title>Re: Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6739#M4165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Policy Loaded from SMS:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[Expert@vSEC01:0]# fw stat&lt;BR /&gt;HOST POLICY DATE&lt;BR /&gt;localhost Standard 28Sep2017 15:16:51 : [&amp;gt;eth0] [&amp;lt;eth0] [&amp;lt;eth1]&lt;BR /&gt;[Expert@vSEC01:0]# fw monitor -e 'accept port(80);'&lt;BR /&gt; monitor: getting filter (from command line)&lt;BR /&gt; monitor: compiling&lt;BR /&gt;monitorfilter:&lt;BR /&gt;Compiled OK.&lt;BR /&gt; monitor: loading&lt;BR /&gt; monitor: monitoring (control-C to stop)&lt;BR /&gt;[vs_0][fw_0] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=41686&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 .S.... seq=49d1ba26 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth0:I[60]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=60 id=41686&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 .S.... seq=49d1ba26 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth1:o[60]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=60 id=41686&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 .S.... seq=49d1ba26 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth1:O[60]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=60 id=41686&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 .S.... seq=49d1ba26 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth1:i[60]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=60 id=0&lt;BR /&gt;TCP: 80 -&amp;gt; 43996 .S..A. seq=f2771eb3 ack=49d1ba27&lt;BR /&gt;[vs_0][fw_0] eth1:I[60]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=60 id=0&lt;BR /&gt;TCP: 80 -&amp;gt; 43996 .S..A. seq=f2771eb3 ack=49d1ba27&lt;BR /&gt;[vs_0][fw_0] eth0:o[60]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=60 id=0&lt;BR /&gt;TCP: 80 -&amp;gt; 43996 .S..A. seq=f2771eb3 ack=49d1ba27&lt;BR /&gt;[vs_0][fw_0] eth0:O[60]: 10.255.255.23 -&amp;gt; 24.89.129.101 (TCP) len=60 id=0&lt;BR /&gt;TCP: 80 -&amp;gt; 43996 .S..A. seq=f2771eb3 ack=49d1ba27&lt;BR /&gt;[vs_0][fw_0] eth0:i[52]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=52 id=41687&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 ....A. seq=49d1ba27 ack=f2771eb4&lt;BR /&gt;[vs_0][fw_0] eth0:I[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=41687&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 ....A. seq=49d1ba27 ack=f2771eb4&lt;BR /&gt;[vs_0][fw_0] eth1:o[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=41687&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 ....A. seq=49d1ba27 ack=f2771eb4&lt;BR /&gt;[vs_0][fw_0] eth1:O[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=41687&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 ....A. seq=49d1ba27 ack=f2771eb4&lt;BR /&gt;[vs_0][fw_0] eth0:i[139]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=139 id=41688&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 ...PA. seq=49d1ba27 ack=f2771eb4&lt;BR /&gt;[vs_0][fw_0] eth0:I[139]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=139 id=41688&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 ...PA. seq=49d1ba27 ack=f2771eb4&lt;BR /&gt;[vs_0][fw_0] eth1:o[139]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=139 id=41688&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 ...PA. seq=49d1ba27 ack=f2771eb4&lt;BR /&gt;[vs_0][fw_0] eth1:O[139]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=139 id=41688&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 ...PA. seq=49d1ba27 ack=f2771eb4&lt;BR /&gt;[vs_0][fw_0] eth1:i[52]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=52 id=13346&lt;BR /&gt;TCP: 80 -&amp;gt; 43996 ....A. seq=f2771eb4 ack=49d1ba7e&lt;BR /&gt;[vs_0][fw_0] eth1:I[52]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=52 id=13346&lt;BR /&gt;TCP: 80 -&amp;gt; 43996 ....A. seq=f2771eb4 ack=49d1ba7e&lt;BR /&gt;[vs_0][fw_0] eth0:o[52]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=52 id=13346&lt;BR /&gt;TCP: 80 -&amp;gt; 43996 ....A. seq=f2771eb4 ack=49d1ba7e&lt;BR /&gt;[vs_0][fw_0] eth0:O[52]: 10.255.255.23 -&amp;gt; 24.89.129.101 (TCP) len=52 id=13346&lt;BR /&gt;TCP: 80 -&amp;gt; 43996 ....A. seq=f2771eb4 ack=49d1ba7e&lt;BR /&gt;[vs_0][fw_0] eth1:i[371]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=371 id=13347&lt;BR /&gt;TCP: 80 -&amp;gt; 43996 ...PA. seq=f2771eb4 ack=49d1ba7e&lt;BR /&gt;[vs_0][fw_0] eth1:I[371]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=371 id=13347&lt;BR /&gt;TCP: 80 -&amp;gt; 43996 ...PA. seq=f2771eb4 ack=49d1ba7e&lt;BR /&gt;[vs_0][fw_0] eth0:o[371]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=371 id=13347&lt;BR /&gt;TCP: 80 -&amp;gt; 43996 ...PA. seq=f2771eb4 ack=49d1ba7e&lt;BR /&gt;[vs_0][fw_0] eth0:O[371]: 10.255.255.23 -&amp;gt; 24.89.129.101 (TCP) len=371 id=13347&lt;BR /&gt;TCP: 80 -&amp;gt; 43996 ...PA. seq=f2771eb4 ack=49d1ba7e&lt;BR /&gt;[vs_0][fw_0] eth0:i[52]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=52 id=41689&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 ....A. seq=49d1ba7e ack=f2771ff3&lt;BR /&gt;[vs_0][fw_0] eth0:I[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=41689&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 ....A. seq=49d1ba7e ack=f2771ff3&lt;BR /&gt;[vs_0][fw_0] eth1:o[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=41689&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 ....A. seq=49d1ba7e ack=f2771ff3&lt;BR /&gt;[vs_0][fw_0] eth1:O[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=41689&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 ....A. seq=49d1ba7e ack=f2771ff3&lt;BR /&gt;[vs_0][fw_0] eth0:i[52]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=52 id=41690&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 F...A. seq=49d1ba7e ack=f2771ff3&lt;BR /&gt;[vs_0][fw_0] eth0:I[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=41690&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 F...A. seq=49d1ba7e ack=f2771ff3&lt;BR /&gt;[vs_0][fw_0] eth1:o[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=41690&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 F...A. seq=49d1ba7e ack=f2771ff3&lt;BR /&gt;[vs_0][fw_0] eth1:O[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=41690&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 F...A. seq=49d1ba7e ack=f2771ff3&lt;BR /&gt;[vs_0][fw_0] eth1:i[52]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=52 id=13348&lt;BR /&gt;TCP: 80 -&amp;gt; 43996 F...A. seq=f2771ff3 ack=49d1ba7f&lt;BR /&gt;[vs_0][fw_0] eth1:I[52]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=52 id=13348&lt;BR /&gt;TCP: 80 -&amp;gt; 43996 F...A. seq=f2771ff3 ack=49d1ba7f&lt;BR /&gt;[vs_0][fw_0] eth0:o[52]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=52 id=13348&lt;BR /&gt;TCP: 80 -&amp;gt; 43996 F...A. seq=f2771ff3 ack=49d1ba7f&lt;BR /&gt;[vs_0][fw_0] eth0:O[52]: 10.255.255.23 -&amp;gt; 24.89.129.101 (TCP) len=52 id=13348&lt;BR /&gt;TCP: 80 -&amp;gt; 43996 F...A. seq=f2771ff3 ack=49d1ba7f&lt;BR /&gt;[vs_0][fw_0] eth0:i[52]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=52 id=41691&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 ....A. seq=49d1ba7f ack=f2771ff4&lt;BR /&gt;[vs_0][fw_0] eth0:I[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=41691&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 ....A. seq=49d1ba7f ack=f2771ff4&lt;BR /&gt;[vs_0][fw_0] eth1:o[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=41691&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 ....A. seq=49d1ba7f ack=f2771ff4&lt;BR /&gt;[vs_0][fw_0] eth1:O[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=41691&lt;BR /&gt;TCP: 43996 -&amp;gt; 80 ....A. seq=49d1ba7f ack=f2771ff4&lt;BR /&gt; monitor: caught sig 2&lt;BR /&gt; monitor: unloading&lt;BR /&gt;[Expert@vSEC01:0]#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Few minutes later:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[Expert@vSEC01:0]# fw monitor -e 'accept port(80);'&lt;BR /&gt; monitor: getting filter (from command line)&lt;BR /&gt; monitor: compiling&lt;BR /&gt;monitorfilter:&lt;BR /&gt;Compiled OK.&lt;BR /&gt; monitor: loading&lt;BR /&gt; monitor: monitoring (control-C to stop)&lt;BR /&gt;[vs_0][fw_1] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=52050&lt;BR /&gt;TCP: 43997 -&amp;gt; 80 .S.... seq=5dcfde53 ack=00000000&lt;BR /&gt;[vs_0][fw_1] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=52051&lt;BR /&gt;TCP: 43997 -&amp;gt; 80 .S.... seq=5dcfde53 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=52052&lt;BR /&gt;TCP: 43997 -&amp;gt; 80 .S.... seq=5dcfde53 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=52053&lt;BR /&gt;TCP: 43997 -&amp;gt; 80 .S.... seq=5dcfde53 ack=00000000&lt;BR /&gt; monitor: caught sig 2&lt;BR /&gt; monitor: unloading&lt;BR /&gt;[Expert@vSEC01:0]#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Policy unloaded:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[Expert@vSEC01:0]# fw unloadlocal&lt;/P&gt;&lt;P&gt;Uninstalling Security Policy from all.all@vSEC01&lt;BR /&gt;Done.&lt;BR /&gt;[Expert@vSEC01:0]# fw monitor -e 'accept port(80);'&lt;BR /&gt; monitor: getting filter (from command line)&lt;BR /&gt; monitor: compiling&lt;BR /&gt;monitorfilter:&lt;BR /&gt;Compiled OK.&lt;BR /&gt; monitor: loading&lt;BR /&gt; monitor: monitoring (control-C to stop)&lt;BR /&gt;[vs_0][fw_0] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=22893&lt;BR /&gt;TCP: 43998 -&amp;gt; 80 .S.... seq=e23068c7 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth0:I[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=22893&lt;BR /&gt;TCP: 43998 -&amp;gt; 80 .S.... seq=e23068c7 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=22894&lt;BR /&gt;TCP: 43998 -&amp;gt; 80 .S.... seq=e23068c7 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth0:I[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=22894&lt;BR /&gt;TCP: 43998 -&amp;gt; 80 .S.... seq=e23068c7 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=22895&lt;BR /&gt;TCP: 43998 -&amp;gt; 80 .S.... seq=e23068c7 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth0:I[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=22895&lt;BR /&gt;TCP: 43998 -&amp;gt; 80 .S.... seq=e23068c7 ack=00000000&lt;BR /&gt; monitor: caught sig 2&lt;BR /&gt; monitor: unloading&lt;BR /&gt;[Expert@vSEC01:0]#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Policy fetched from localhost (note that it started working when acks had value other than 00000000 and than abruptly stopped:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[Expert@vSEC01:0]# fw fetch localhost&lt;/P&gt;&lt;P&gt;Installing Security Policy Standard on all.all@vSEC01&lt;BR /&gt;login as: admin&lt;BR /&gt;This system is for authorized use only.&lt;BR /&gt;Authenticating with public key "imported-openssh-key"&lt;BR /&gt;vSEC01&amp;gt; expert&lt;BR /&gt;Enter expert password:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Warning! All configurations should be done through clish&lt;BR /&gt;You are in expert mode now.&lt;/P&gt;&lt;P&gt;[Expert@vSEC01:0]# fw monitor -e 'accept port(80);'&lt;BR /&gt; monitor: getting filter (from command line)&lt;BR /&gt; monitor: compiling&lt;BR /&gt;monitorfilter:&lt;BR /&gt;Compiled OK.&lt;BR /&gt; monitor: loading&lt;BR /&gt; monitor: monitoring (control-C to stop)&lt;BR /&gt;[vs_0][fw_0] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=6614&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 .S.... seq=2d39bde1 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth0:I[60]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=60 id=6614&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 .S.... seq=2d39bde1 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth1:o[60]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=60 id=6614&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 .S.... seq=2d39bde1 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth1:O[60]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=60 id=6614&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 .S.... seq=2d39bde1 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth1:i[60]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=60 id=0&lt;BR /&gt;TCP: 80 -&amp;gt; 43999 .S..A. seq=d5802251 ack=2d39bde2&lt;BR /&gt;[vs_0][fw_0] eth1:I[60]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=60 id=0&lt;BR /&gt;TCP: 80 -&amp;gt; 43999 .S..A. seq=d5802251 ack=2d39bde2&lt;BR /&gt;[vs_0][fw_0] eth0:o[60]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=60 id=0&lt;BR /&gt;TCP: 80 -&amp;gt; 43999 .S..A. seq=d5802251 ack=2d39bde2&lt;BR /&gt;[vs_0][fw_0] eth0:O[60]: 10.255.255.23 -&amp;gt; 24.89.129.101 (TCP) len=60 id=0&lt;BR /&gt;TCP: 80 -&amp;gt; 43999 .S..A. seq=d5802251 ack=2d39bde2&lt;BR /&gt;[vs_0][fw_0] eth0:i[52]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=52 id=6615&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 ....A. seq=2d39bde2 ack=d5802252&lt;BR /&gt;[vs_0][fw_0] eth0:I[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=6615&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 ....A. seq=2d39bde2 ack=d5802252&lt;BR /&gt;[vs_0][fw_0] eth1:o[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=6615&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 ....A. seq=2d39bde2 ack=d5802252&lt;BR /&gt;[vs_0][fw_0] eth1:O[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=6615&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 ....A. seq=2d39bde2 ack=d5802252&lt;BR /&gt;[vs_0][fw_0] eth0:i[139]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=139 id=6616&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 ...PA. seq=2d39bde2 ack=d5802252&lt;BR /&gt;[vs_0][fw_0] eth0:I[139]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=139 id=6616&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 ...PA. seq=2d39bde2 ack=d5802252&lt;BR /&gt;[vs_0][fw_0] eth1:o[139]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=139 id=6616&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 ...PA. seq=2d39bde2 ack=d5802252&lt;BR /&gt;[vs_0][fw_0] eth1:O[139]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=139 id=6616&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 ...PA. seq=2d39bde2 ack=d5802252&lt;BR /&gt;[vs_0][fw_0] eth1:i[52]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=52 id=28466&lt;BR /&gt;TCP: 80 -&amp;gt; 43999 ....A. seq=d5802252 ack=2d39be39&lt;BR /&gt;[vs_0][fw_0] eth1:I[52]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=52 id=28466&lt;BR /&gt;TCP: 80 -&amp;gt; 43999 ....A. seq=d5802252 ack=2d39be39&lt;BR /&gt;[vs_0][fw_0] eth0:o[52]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=52 id=28466&lt;BR /&gt;TCP: 80 -&amp;gt; 43999 ....A. seq=d5802252 ack=2d39be39&lt;BR /&gt;[vs_0][fw_0] eth0:O[52]: 10.255.255.23 -&amp;gt; 24.89.129.101 (TCP) len=52 id=28466&lt;BR /&gt;TCP: 80 -&amp;gt; 43999 ....A. seq=d5802252 ack=2d39be39&lt;BR /&gt;[vs_0][fw_0] eth1:i[371]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=371 id=28467&lt;BR /&gt;TCP: 80 -&amp;gt; 43999 ...PA. seq=d5802252 ack=2d39be39&lt;BR /&gt;[vs_0][fw_0] eth1:I[371]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=371 id=28467&lt;BR /&gt;TCP: 80 -&amp;gt; 43999 ...PA. seq=d5802252 ack=2d39be39&lt;BR /&gt;[vs_0][fw_0] eth0:o[371]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=371 id=28467&lt;BR /&gt;TCP: 80 -&amp;gt; 43999 ...PA. seq=d5802252 ack=2d39be39&lt;BR /&gt;[vs_0][fw_0] eth0:O[371]: 10.255.255.23 -&amp;gt; 24.89.129.101 (TCP) len=371 id=28467&lt;BR /&gt;TCP: 80 -&amp;gt; 43999 ...PA. seq=d5802252 ack=2d39be39&lt;BR /&gt;[vs_0][fw_0] eth0:i[52]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=52 id=6617&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 ....A. seq=2d39be39 ack=d5802391&lt;BR /&gt;[vs_0][fw_0] eth0:I[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=6617&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 ....A. seq=2d39be39 ack=d5802391&lt;BR /&gt;[vs_0][fw_0] eth1:o[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=6617&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 ....A. seq=2d39be39 ack=d5802391&lt;BR /&gt;[vs_0][fw_0] eth1:O[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=6617&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 ....A. seq=2d39be39 ack=d5802391&lt;BR /&gt;[vs_0][fw_0] eth0:i[52]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=52 id=6618&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 F...A. seq=2d39be39 ack=d5802391&lt;BR /&gt;[vs_0][fw_0] eth0:I[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=6618&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 F...A. seq=2d39be39 ack=d5802391&lt;BR /&gt;[vs_0][fw_0] eth1:o[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=6618&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 F...A. seq=2d39be39 ack=d5802391&lt;BR /&gt;[vs_0][fw_0] eth1:O[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=6618&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 F...A. seq=2d39be39 ack=d5802391&lt;BR /&gt;[vs_0][fw_0] eth1:i[52]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=52 id=28468&lt;BR /&gt;TCP: 80 -&amp;gt; 43999 F...A. seq=d5802391 ack=2d39be3a&lt;BR /&gt;[vs_0][fw_0] eth1:I[52]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=52 id=28468&lt;BR /&gt;TCP: 80 -&amp;gt; 43999 F...A. seq=d5802391 ack=2d39be3a&lt;BR /&gt;[vs_0][fw_0] eth0:o[52]: 10.255.255.210 -&amp;gt; 24.89.129.101 (TCP) len=52 id=28468&lt;BR /&gt;TCP: 80 -&amp;gt; 43999 F...A. seq=d5802391 ack=2d39be3a&lt;BR /&gt;[vs_0][fw_0] eth0:O[52]: 10.255.255.23 -&amp;gt; 24.89.129.101 (TCP) len=52 id=28468&lt;BR /&gt;TCP: 80 -&amp;gt; 43999 F...A. seq=d5802391 ack=2d39be3a&lt;BR /&gt;[vs_0][fw_0] eth0:i[52]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=52 id=6619&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 ....A. seq=2d39be3a ack=d5802392&lt;BR /&gt;[vs_0][fw_0] eth0:I[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=6619&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 ....A. seq=2d39be3a ack=d5802392&lt;BR /&gt;[vs_0][fw_0] eth1:o[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=6619&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 ....A. seq=2d39be3a ack=d5802392&lt;BR /&gt;[vs_0][fw_0] eth1:O[52]: 24.89.129.101 -&amp;gt; 10.255.255.210 (TCP) len=52 id=6619&lt;BR /&gt;TCP: 43999 -&amp;gt; 80 ....A. seq=2d39be3a ack=d5802392&lt;BR /&gt;[vs_0][fw_1] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=54867&lt;BR /&gt;TCP: 44000 -&amp;gt; 80 .S.... seq=5618676f ack=00000000&lt;BR /&gt;[vs_0][fw_1] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=54868&lt;BR /&gt;TCP: 44000 -&amp;gt; 80 .S.... seq=5618676f ack=00000000&lt;BR /&gt;[vs_0][fw_1] eth0:i[60]: 24.89.129.101 -&amp;gt; 10.255.255.23 (TCP) len=60 id=54869&lt;BR /&gt;TCP: 44000 -&amp;gt; 80 .S.... seq=5618676f ack=00000000&lt;BR /&gt; monitor: caught sig 2&lt;BR /&gt; monitor: unloading&lt;BR /&gt;[Expert@vSEC01:0]#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 19:26:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6739#M4165</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-09-28T19:26:54Z</dc:date>
    </item>
    <item>
      <title>Re: Inconsistent behavior of vSEC in AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6740#M4166</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So the same, basically.&lt;/P&gt;&lt;P&gt;Have you opened a TAC case like I suggested earlier?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Sep 2017 20:15:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inconsistent-behavior-of-vSEC-in-AWS/m-p/6740#M4166</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-09-28T20:15:11Z</dc:date>
    </item>
  </channel>
</rss>

