<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Drops between the Security Gateway and the Management Server in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135420#M20409</link>
    <description>&lt;P&gt;Something makes no sense there. If you run tcpdump between fw and mgmt server, you have to see some traffic. Can you send exact command you ran?&lt;/P&gt;</description>
    <pubDate>Thu, 02 Dec 2021 14:57:37 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2021-12-02T14:57:37Z</dc:date>
    <item>
      <title>Drops between the Security Gateway and the Management Server</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135402#M20395</link>
      <description>&lt;P&gt;We have a large number of drops between security cluster members (regardless of gateway activity) and the management server on various UDP ports.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The following services have been added to the allow rule: icmp-request, ssh,FIBMGR.&lt;BR /&gt;We observe drops on Clean up rules.&lt;/P&gt;&lt;P&gt;We tried entering the #fw ctl command set int fwha_forw_packet_to_not_active 1, but no result.&lt;/P&gt;&lt;P&gt;We observe that the Security Gateways access on different ports.&lt;BR /&gt;Is this expected Check Point behavior or not? Is there any information available on this problem?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 13:55:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135402#M20395</guid>
      <dc:creator>Hllrdm</dc:creator>
      <dc:date>2021-12-02T13:55:05Z</dc:date>
    </item>
    <item>
      <title>Re: Drops between the Security Gateway and the Management Server</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135404#M20396</link>
      <description>&lt;P&gt;If you have a rule to allow the traffic, no, its not normal There is good command you can run fw up_execute src=x.x.x.x dst=y.y.y.y ipp=0&lt;/P&gt;
&lt;P&gt;This would show you whether traffic is indeed permitted. Is it new behavior or it happened before?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 14:06:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135404#M20396</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-12-02T14:06:49Z</dc:date>
    </item>
    <item>
      <title>Re: Drops between the Security Gateway and the Management Server</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135408#M20397</link>
      <description>&lt;P&gt;hello!&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We have icmp-request, ssh,FIBMGR.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We have an allow rule for icmp-request, ssh,FIBMGR. That is, Check Point correctly handles drops because UDP ports are not allowed by a rule. It is not clear to us why the Security Gateways are sending udp packets to the management server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The problem may have been there before, we just discovered it recently.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 14:22:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135408#M20397</guid>
      <dc:creator>Hllrdm</dc:creator>
      <dc:date>2021-12-02T14:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: Drops between the Security Gateway and the Management Server</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135410#M20399</link>
      <description>&lt;P&gt;Regarding the command, we get the message that no command was found:&lt;BR /&gt;Unknown command "src=10.x.x.x."&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 14:29:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135410#M20399</guid>
      <dc:creator>Hllrdm</dc:creator>
      <dc:date>2021-12-02T14:29:49Z</dc:date>
    </item>
    <item>
      <title>Re: Drops between the Security Gateway and the Management Server</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135411#M20400</link>
      <description>&lt;P&gt;So say you want to see that command between IPs 1.1.1.1 and 2.2.2.2, you do this:&lt;/P&gt;
&lt;P&gt;fw up_execute src=1.1.1.1 dst=2.2.2.2 ipp=0&lt;/P&gt;
&lt;P&gt;IPP is for IP protocol, that can be any&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_CLI_ReferenceGuide/Topics-CLIG/FWG/fw-up_execute.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_CLI_ReferenceGuide/Topics-CLIG/FWG/fw-up_execute.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Is it possible that traffic is being sent to mgmt server due to implied rule? Can you see it in the logs?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 14:37:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135411#M20400</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-12-02T14:37:16Z</dc:date>
    </item>
    <item>
      <title>Re: Drops between the Security Gateway and the Management Server</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135412#M20401</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We have icmp-request, ssh,FIBMGR.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We have an allow rule for icmp-request, ssh,FIBMGR. That is, Check Point correctly handles drops because UDP ports are not allowed by a rule. It is not clear to us why the Security Gateways are sending udp packets to the management server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The problem may have been there before, we just discovered it recently.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regarding the mistake in the team. The error repeats in expert mode.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 14:38:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135412#M20401</guid>
      <dc:creator>Hllrdm</dc:creator>
      <dc:date>2021-12-02T14:38:09Z</dc:date>
    </item>
    <item>
      <title>Re: Drops between the Security Gateway and the Management Server</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135415#M20404</link>
      <description>&lt;P&gt;Message me directly, lets do remote later in the afternoon if you are free? Im in EST, what time zone are you in?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 14:45:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135415#M20404</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-12-02T14:45:08Z</dc:date>
    </item>
    <item>
      <title>Re: Drops between the Security Gateway and the Management Server</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135416#M20405</link>
      <description>&lt;P&gt;GMT+3&lt;BR /&gt;Our company policy does not allow remote connection sessions, so we cannot show you the problem.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 14:46:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135416#M20405</guid>
      <dc:creator>Hllrdm</dc:creator>
      <dc:date>2021-12-02T14:46:45Z</dc:date>
    </item>
    <item>
      <title>Re: Drops between the Security Gateway and the Management Server</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135417#M20406</link>
      <description>&lt;P&gt;Ok, I totally understand. So here is where I would start myself. Look at the logs and see if there are any logs for implied rules regarding this. If not, and regular logs still show you the same, do tcpdump and/or fw monitor&lt;/P&gt;
&lt;P&gt;tcpdump -nni any host x.x.x.x&lt;/P&gt;
&lt;P&gt;fw monitor -e "accept host(x.x.x.x) and port(x);"&lt;/P&gt;
&lt;P&gt;fw monitor -F 'x.x.x.x,0,y.y.y.y,0,0' -F 'y.y.y.y,0,x.x.x.x,0,0'&lt;/P&gt;
&lt;P&gt;Captures will ALWAYS tell you where/why the problem happens, 100%.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 14:50:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135417#M20406</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-12-02T14:50:57Z</dc:date>
    </item>
    <item>
      <title>Re: Drops between the Security Gateway and the Management Server</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135418#M20407</link>
      <description>&lt;P&gt;We have already collected dumps, but unfortunately we have not found any useful information.&lt;/P&gt;&lt;P&gt;1. [expert@:0]# tcpdump -i any src 10.х.х.х. (fw) and dst 10.x.x.x (mgmt)&lt;BR /&gt;tcpdump: WARNING: Promiscuous mode not supported on the "any" device&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on any, link-type LINUX_SLL (Linux cooked), capture size 96 bytes&lt;/P&gt;&lt;P&gt;command output is empty&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. [expert@:0]# fw ctl zdebug + drop | grep 10.x.x.x. (fw)&lt;BR /&gt;;[cpu_1];[fw4_0];fw_log_drop_ex: Packet proto=17 10.x.x.x:18234 -&amp;gt; 10.x.x.x:21771 dropped by fw_handle_first_packet Reason: Rulebase drop - rule 30;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 14:53:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135418#M20407</guid>
      <dc:creator>Hllrdm</dc:creator>
      <dc:date>2021-12-02T14:53:41Z</dc:date>
    </item>
    <item>
      <title>Re: Drops between the Security Gateway and the Management Server</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135420#M20409</link>
      <description>&lt;P&gt;Something makes no sense there. If you run tcpdump between fw and mgmt server, you have to see some traffic. Can you send exact command you ran?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 14:57:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135420#M20409</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-12-02T14:57:37Z</dc:date>
    </item>
    <item>
      <title>Re: Drops between the Security Gateway and the Management Server</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135426#M20410</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/65060"&gt;@Hllrdm&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Port 18234/UDP is used by vpn blade for tunnel_test protocol. It seems to me that someone is sending tunnel_test packets to your firewall and the reply packets are being dropped, it should not happen between gateway and management AFAIK, but i think maybe a NAT rule is changing&amp;nbsp; dest ip address and we are not seeing entire picture. You can check tunnel test packets on your firewall to find who is generating this traffic and if there is some nat involved:&lt;/P&gt;&lt;P&gt;fw monitor -e "port(18234),accept;"&lt;/P&gt;&lt;P&gt;I would disable acceleration before doing the capture, this will give you more information to continue the tshoot. HTH.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 15:48:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Drops-between-the-Security-Gateway-and-the-Management-Server/m-p/135426#M20410</guid>
      <dc:creator>RS_Daniel</dc:creator>
      <dc:date>2021-12-02T15:48:54Z</dc:date>
    </item>
  </channel>
</rss>

