<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why CP drops RST-ACK packets from client? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135119#M20344</link>
    <description>&lt;P&gt;emma, thank You so much!&lt;BR /&gt;This is very interesting scenario and it make sense for me. So, beside the session timeout defined 1Hour(3600sec), beside Aggressive Aging defined 10min(default), the FW has some another timeout &lt;SPAN&gt;defined 5 or 20 sec&amp;nbsp;&lt;/SPAN&gt;for&amp;nbsp;&lt;SPAN&gt;connections in a "close_wait state"...&amp;nbsp; and the FW switch the connection to&amp;nbsp;close_wait state when it met the FIN packet from any side of the connection, right?&lt;BR /&gt;I never read about this timeout and I will check... thank You!&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 29 Nov 2021 07:24:05 GMT</pubDate>
    <dc:creator>evlad</dc:creator>
    <dc:date>2021-11-29T07:24:05Z</dc:date>
    <item>
      <title>Why CP drops RST-ACK packets from client?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135084#M20331</link>
      <description>&lt;P&gt;Something that I can not fully understand:&lt;BR /&gt;Firewall stands between Client and Server, Client working with any application on Server side through usual HTTPS session. They talking, exchange data... after small pause (1-2 min, not longer) RST-ACK packet suddenly sent from Client to Server.&lt;BR /&gt;And FW drop it because the packet "doesn't SYN" (I see many of them all in the LOG)!?&lt;BR /&gt;Why? How FW knows BEFORE Client that session was closed/terminated?&lt;BR /&gt;Client doesn't know this. Client may be mentioned that smth wrong in the session and wants to close it (RST). Why FW intercepts? The timeout for dead sessions is 1Hour (by CP default) and 1-2 minutes of silence is very-very far from 1Hour...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any guru explanations will be appreciated,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Nov 2021 13:59:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135084#M20331</guid>
      <dc:creator>evlad</dc:creator>
      <dc:date>2021-11-28T13:59:14Z</dc:date>
    </item>
    <item>
      <title>Re: Why CP drops RST-ACK packets from client?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135086#M20332</link>
      <description>&lt;P&gt;Without seeing a packet capture showing the context in which the firewall dropped the RST-ACK it is not possible to determine why it was dropped.&amp;nbsp; Please provide a capture as well as the actual drop log card for this.&lt;/P&gt;
&lt;P&gt;It is also possible that you are running afoul of the IPS Core Activation "Spoofed Reset", is that signature enabled in your environment?&lt;/P&gt;
&lt;P&gt;Also any chance that there is a duplicate IP address assigned for the client?&amp;nbsp; Is the RST-ACK packet coming from the same Layer 2 MAC address involved with the successful connection packets?&lt;/P&gt;</description>
      <pubDate>Sun, 28 Nov 2021 15:06:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135086#M20332</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-11-28T15:06:27Z</dc:date>
    </item>
    <item>
      <title>Re: Why CP drops RST-ACK packets from client?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135087#M20333</link>
      <description>&lt;P&gt;If by&amp;nbsp;&lt;SPAN&gt;"doesn't SYN" (I see many of them all in the LOG)!? you mean "first packet isnt SYN? Is that what you see in the logs? If so, there could be many reasons...first, I would start by disabling securexl and see if issue goes away, but&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;is 100% right, we need to see packet capture to have better understanding.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Also, check out below, might be helpful:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/First-packet-isnt-SYN-r80-20/td-p/76108" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/First-packet-isnt-SYN-r80-20/td-p/76108&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Andy&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Nov 2021 15:20:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135087#M20333</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-11-28T15:20:31Z</dc:date>
    </item>
    <item>
      <title>Re: Why CP drops RST-ACK packets from client?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135101#M20335</link>
      <description>&lt;P&gt;O yes! I mean "first packet isn't SYN"... sorry about my english.&lt;BR /&gt;In fact I can simplify the question: how FW concludes that this is FIRST packet, not continuation of existing session? (&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;Consider that&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; You see sequence of accepted packets from that source IP to that Server IP just one minute before.)&lt;/P&gt;</description>
      <pubDate>Sun, 28 Nov 2021 21:05:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135101#M20335</guid>
      <dc:creator>evlad</dc:creator>
      <dc:date>2021-11-28T21:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: Why CP drops RST-ACK packets from client?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135102#M20336</link>
      <description>&lt;P&gt;... and yes - it's a Cluster. But I don't think the issue related ClusterXL because all LOG messages came from the same origin (same node) that is Active&lt;/P&gt;</description>
      <pubDate>Sun, 28 Nov 2021 21:10:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135102#M20336</guid>
      <dc:creator>evlad</dc:creator>
      <dc:date>2021-11-28T21:10:53Z</dc:date>
    </item>
    <item>
      <title>Re: Why CP drops RST-ACK packets from client?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135103#M20337</link>
      <description>&lt;P&gt;Tanks Timothy!&lt;BR /&gt;I will try to get Capture. But I can do this only on the FW, not on the client. Because client somewhere in the Internet (distance of many hops) and I have no possibility to ask him participate in debug (install wireshark or smth like this).&lt;BR /&gt;For the same reason I don't think the MAC on layer 2 matter...&lt;/P&gt;&lt;P&gt;And I will check "Spoofed Reset" Signature on IPS, thank You&lt;/P&gt;</description>
      <pubDate>Sun, 28 Nov 2021 21:22:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135103#M20337</guid>
      <dc:creator>evlad</dc:creator>
      <dc:date>2021-11-28T21:22:35Z</dc:date>
    </item>
    <item>
      <title>Re: Why CP drops RST-ACK packets from client?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135107#M20339</link>
      <description>&lt;P&gt;Are you able to provide more context, does this happen only when the firewall policy is installed, how is your connection persistence configured?&lt;/P&gt;</description>
      <pubDate>Sun, 28 Nov 2021 23:41:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135107#M20339</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2021-11-28T23:41:37Z</dc:date>
    </item>
    <item>
      <title>Re: Why CP drops RST-ACK packets from client?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135108#M20340</link>
      <description>&lt;P&gt;Hey, no worries, all good. Well, to answer your question, in simple terms, it could be determined by possibly how aggressive aging is configured and TCP timeout settings. Cant state that for certain in your case, but if you check the link I sent in my first response, it actually gives a pretty good explanation.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Nov 2021 00:10:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135108#M20340</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-11-29T00:10:39Z</dc:date>
    </item>
    <item>
      <title>Re: Why CP drops RST-ACK packets from client?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135114#M20343</link>
      <description>&lt;P&gt;The client may have sent a FIN packet earlier and not received a response, which would put the connection into a close_wait state and then timed out of the FW connection table after 5 or 20 seconds (depending on version). Then if the client is waiting another minute before RST-ACK'ing the connection out of its connection table, the connection would no longer be in the connection table on the gateway, and hence dropped out of state.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Nov 2021 06:05:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135114#M20343</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2021-11-29T06:05:47Z</dc:date>
    </item>
    <item>
      <title>Re: Why CP drops RST-ACK packets from client?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135119#M20344</link>
      <description>&lt;P&gt;emma, thank You so much!&lt;BR /&gt;This is very interesting scenario and it make sense for me. So, beside the session timeout defined 1Hour(3600sec), beside Aggressive Aging defined 10min(default), the FW has some another timeout &lt;SPAN&gt;defined 5 or 20 sec&amp;nbsp;&lt;/SPAN&gt;for&amp;nbsp;&lt;SPAN&gt;connections in a "close_wait state"...&amp;nbsp; and the FW switch the connection to&amp;nbsp;close_wait state when it met the FIN packet from any side of the connection, right?&lt;BR /&gt;I never read about this timeout and I will check... thank You!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Nov 2021 07:24:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135119#M20344</guid>
      <dc:creator>evlad</dc:creator>
      <dc:date>2021-11-29T07:24:05Z</dc:date>
    </item>
    <item>
      <title>Re: Why CP drops RST-ACK packets from client?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135123#M20345</link>
      <description>&lt;P&gt;It's in the global properties &amp;gt; Stateful Inspection, under TCP end timeout. Basically, it's how long the gateway will wait for a FIN-ACK after seeing a FIN, or a RST-ACK after seeing a RST. Due to this, seeing RST-ACKs being dropped is pretty normal. OSs will often send a RST-ACK to close out a half-open/half-close connection, which generally won't match an existing connection.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Nov 2021 07:29:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135123#M20345</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2021-11-29T07:29:22Z</dc:date>
    </item>
    <item>
      <title>Re: Why CP drops RST-ACK packets from client?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135142#M20348</link>
      <description>&lt;P&gt;Thank You for answer!&lt;/P&gt;</description>
      <pubDate>Mon, 29 Nov 2021 10:44:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/135142#M20348</guid>
      <dc:creator>evlad</dc:creator>
      <dc:date>2021-11-29T10:44:05Z</dc:date>
    </item>
    <item>
      <title>Re: Why CP drops RST-ACK packets from client?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/181097#M33120</link>
      <description>&lt;P&gt;Hi , today i have the same issues .. i do not see ant RST packet from client , but the firewall drop after RST ACK.&lt;/P&gt;&lt;P&gt;Have you solve the problem ? How ? thank you very much.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Max&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2023 12:52:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Why-CP-drops-RST-ACK-packets-from-client/m-p/181097#M33120</guid>
      <dc:creator>max71</dc:creator>
      <dc:date>2023-05-16T12:52:24Z</dc:date>
    </item>
  </channel>
</rss>

