<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Packet Loss and Traffic Drops Caused by ARP Table Overflow in Layer 2 Core Topology in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-and-Traffic-Drops-Caused-by-ARP-Table-Overflow-in/m-p/275280#M104859</link>
    <description>&lt;P&gt;This was a while ago...having done it back in the R77.x days. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 10 Apr 2026 13:37:15 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2026-04-10T13:37:15Z</dc:date>
    <item>
      <title>Packet Loss and Traffic Drops Caused by ARP Table Overflow in Layer 2 Core Topology</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-and-Traffic-Drops-Caused-by-ARP-Table-Overflow-in/m-p/275136#M104803</link>
      <description>&lt;P&gt;The purpose of this post is to present a technical analysis of the behavior observed in the customer environment, detailing the symptoms, investigation process, identified root cause, and corrective actions applied.&lt;/P&gt;&lt;P&gt;During the analysis, the environment presented intermittent packet loss affecting communication between internal networks and services traversing the Check Point Firewall (R82.10). The issue was not constant, which made the initial identification more complex and required a deeper investigation.&lt;/P&gt;&lt;P&gt;From an operational standpoint, one of the main observed behaviors was the firewall dropping traffic unexpectedly. Legitimate traffic was being matched against the cleanup rule without any clear indication of misconfiguration in security policies or NAT rules. The behavior appeared random and inconsistent across different traffic flows.&lt;/P&gt;&lt;P&gt;The initial investigation focused on common areas such as:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Security policy evaluation&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;NAT rules&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Connection table utilization&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;CPU and memory consumption&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;No abnormal behavior or resource exhaustion was identified in these components that could justify the observed symptoms.&lt;/P&gt;&lt;P&gt;The analysis then progressed to system-level verification, where logs from /var/log/messages were reviewed. During this step, repeated entries of:&lt;/P&gt;&lt;P&gt;kernel: neighbour table overflow&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;DIV&gt;&lt;BR /&gt;&lt;DIV&gt;&lt;SPAN&gt;Apr 8 11:20:03 2026 FW-CP-01 kernel:[140434.823181] neighbour&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;arp_cache&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;neighbor table overflow!&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Apr 8 11:20:03 2026 FW-CP-01 kernel:[140434.823291] neighbour&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;arp_cache&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;neighbor table overflow!&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Apr 8 11:20:03 2026 FW-CP-01 kernel:[140434.823416] neighbour&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;arp_cache&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;neighbor table overflow!&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;were identified.&lt;/P&gt;&lt;P&gt;This finding indicated a condition related to the ARP/neighbor table at the operating system level.&lt;/P&gt;&lt;P&gt;From a topology perspective, the client environment is designed with the core switch operating at Layer 2, delegating Layer 3 responsibilities to the Check Point firewall. As a result, the firewall is responsible for both inter-VLAN routing and maintaining ARP resolution (IP-to-MAC mapping) for all connected devices.&lt;/P&gt;&lt;P&gt;Considering the high number of devices in the environment, this design leads to a significant increase in ARP table entries on the firewall.&lt;/P&gt;&lt;P&gt;To support the analysis, the following command was used to monitor the ARP table size:&lt;/P&gt;&lt;PRE&gt;ip -s neigh | wc -l&lt;/PRE&gt;&lt;P&gt;It was observed that the number of ARP entries was approaching and reaching the configured limit of the ARP cache.&lt;/P&gt;&lt;P&gt;Based on this evidence, the root cause was identified as an insufficient ARP table size. The cache-size parameter was configured with a limit of 4096 (&lt;STRONG&gt;Default value&lt;/STRONG&gt;) entries, which is not adequate for the scale and characteristics of the client’s environment.&lt;/P&gt;&lt;P&gt;Once this threshold was reached:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;The system began aggressively removing entries from the ARP table&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;ARP resolution became inconsistent&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The firewall was intermittently unable to resolve destination MAC addresses&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Valid traffic could not be properly forwarded&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;This behavior directly explains the packet loss observed and the fact that legitimate traffic was being dropped and matched against the cleanup rule.&lt;/P&gt;&lt;P&gt;As a corrective action, the ARP table size was increased using the following command:&lt;/P&gt;&lt;PRE&gt;set arp table cache-size 16000&lt;/PRE&gt;&lt;P&gt;The change was applied immediately, without requiring a reboot or policy installation.&lt;/P&gt;&lt;P&gt;After the adjustment:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;The “neighbour table overflow” messages were no longer observed&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Packet loss symptoms were eliminated&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Traffic stopped being unexpectedly matched against the cleanup rule&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Overall network stability was restored&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;In conclusion, the observed behavior was caused by ARP table exhaustion due to the number of devices in an architecture where Layer 3 functions are centralized on the firewall. The implemented adjustment resolved the issue, and this analysis documents the scenario for future reference and preventive actions.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Reference SK:&lt;BR /&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk43772" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk43772&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 01:29:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-and-Traffic-Drops-Caused-by-ARP-Table-Overflow-in/m-p/275136#M104803</guid>
      <dc:creator>Tchangoloro</dc:creator>
      <dc:date>2026-04-09T01:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Loss and Traffic Drops Caused by ARP Table Overflow in Layer 2 Core Topology</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-and-Traffic-Drops-Caused-by-ARP-Table-Overflow-in/m-p/275137#M104804</link>
      <description>&lt;P&gt;I’d like to thank my Friend work Paulo Henrique for his support during the analysis of this issue. His contribution was important in identifying the root cause and helping drive the investigation forward.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 01:35:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-and-Traffic-Drops-Caused-by-ARP-Table-Overflow-in/m-p/275137#M104804</guid>
      <dc:creator>Tchangoloro</dc:creator>
      <dc:date>2026-04-09T01:35:10Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Loss and Traffic Drops Caused by ARP Table Overflow in Layer 2 Core Topology</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-and-Traffic-Drops-Caused-by-ARP-Table-Overflow-in/m-p/275201#M104829</link>
      <description>&lt;P&gt;Great write-up, this was covered in the last edition of my book and will be covered in the new one as well.&amp;nbsp; I characterize this issue as a "rolling outage": some systems can seem to communicate OK through the firewall, then suddenly can't, then can again, etc.&amp;nbsp; Tough to troubleshoot, as it is not a Check Point code problem; it is a Linux issue.&amp;nbsp; Whenever I see a subnet mask on firewall interfaces of /22 or larger (i.e. /22 through /8), I'm definitely on the lookout for this issue.&amp;nbsp; It could have just been someone being lazy with subnet mask assignments, or there really could be hundreds or thousands of systems directly adjacent to the firewall overflowing the ARP cache, which is shared by all firewall interfaces.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 14:02:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-and-Traffic-Drops-Caused-by-ARP-Table-Overflow-in/m-p/275201#M104829</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2026-04-09T14:02:20Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Loss and Traffic Drops Caused by ARP Table Overflow in Layer 2 Core Topology</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-and-Traffic-Drops-Caused-by-ARP-Table-Overflow-in/m-p/275220#M104837</link>
      <description>&lt;P&gt;I mostly see this triggered by inventory scanners checking for new systems they don't yet know about. Say you have a firewall with 20 interfaces with /24 blocks (e.g, a whole /24 playground for 20 different application teams to build things in). Ping through the firewall to every address on those blocks to discover new stuff which hasn't been added to asset management, and the firewall's ARP table will fill with thousands of "Incomplete" entries.&lt;/P&gt;
&lt;P&gt;It's really annoying how tightly Linux hangs on to open ARP requests.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 16:33:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-and-Traffic-Drops-Caused-by-ARP-Table-Overflow-in/m-p/275220#M104837</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-04-09T16:33:31Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Loss and Traffic Drops Caused by ARP Table Overflow in Layer 2 Core Topology</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-and-Traffic-Drops-Caused-by-ARP-Table-Overflow-in/m-p/275230#M104841</link>
      <description>&lt;P&gt;I ran into a similar problem when I set my default route to an interface rather than a specific IP address.&lt;BR /&gt;In that case, it wasn't resolved by increasing the arp cache.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 22:03:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-and-Traffic-Drops-Caused-by-ARP-Table-Overflow-in/m-p/275230#M104841</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-04-09T22:03:35Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Loss and Traffic Drops Caused by ARP Table Overflow in Layer 2 Core Topology</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-and-Traffic-Drops-Caused-by-ARP-Table-Overflow-in/m-p/275232#M104843</link>
      <description>&lt;P&gt;Oof. I thought there was a guardrail against that. Setting a route to an interface with no gateway says to ARP out that interface for the addresses. With the default route set that way, you'll ARP for everything unless you have a more specific route pointing elsewhere.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 22:07:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-and-Traffic-Drops-Caused-by-ARP-Table-Overflow-in/m-p/275232#M104843</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-04-09T22:07:43Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Loss and Traffic Drops Caused by ARP Table Overflow in Layer 2 Core Topology</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-and-Traffic-Drops-Caused-by-ARP-Table-Overflow-in/m-p/275280#M104859</link>
      <description>&lt;P&gt;This was a while ago...having done it back in the R77.x days. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Apr 2026 13:37:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-and-Traffic-Drops-Caused-by-ARP-Table-Overflow-in/m-p/275280#M104859</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-04-10T13:37:15Z</dc:date>
    </item>
  </channel>
</rss>

