<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic First packet isn't Syn; tcp_flags: ACK in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159795#M28091</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our Firewall drops traffic between client and server randomly and we can't figure out why. Here are configuration and the log info found&lt;/P&gt;&lt;P&gt;Host A is configured as Client&amp;nbsp;&lt;BR /&gt;Host B is configured as Server&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;In the Checkpoint traffic details:&lt;BR /&gt;&lt;STRONG&gt;Source:&lt;/STRONG&gt; Host B's IP Address&lt;BR /&gt;&lt;STRONG&gt;Destination:&lt;/STRONG&gt; Host A's IP Address&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;TCP Packet out of state:&lt;/STRONG&gt; First packet isn't SYN&lt;BR /&gt;&lt;STRONG&gt;TCP Flags:&lt;/STRONG&gt; ACK&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If TCP Flags is ACK, this means that the source is trying to send ACK to the destination. But the firewall blocks it because this is not following the TCP 3-way handshake. Is my understanding correct?&lt;BR /&gt;&lt;BR /&gt;If true, why is the source which is configured as the server sending an ACK? Any ideas?&lt;BR /&gt;Thank you!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;</description>
    <pubDate>Tue, 18 Oct 2022 08:35:38 GMT</pubDate>
    <dc:creator>MODBUSTCP88</dc:creator>
    <dc:date>2022-10-18T08:35:38Z</dc:date>
    <item>
      <title>First packet isn't Syn; tcp_flags: ACK</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159795#M28091</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our Firewall drops traffic between client and server randomly and we can't figure out why. Here are configuration and the log info found&lt;/P&gt;&lt;P&gt;Host A is configured as Client&amp;nbsp;&lt;BR /&gt;Host B is configured as Server&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;In the Checkpoint traffic details:&lt;BR /&gt;&lt;STRONG&gt;Source:&lt;/STRONG&gt; Host B's IP Address&lt;BR /&gt;&lt;STRONG&gt;Destination:&lt;/STRONG&gt; Host A's IP Address&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;TCP Packet out of state:&lt;/STRONG&gt; First packet isn't SYN&lt;BR /&gt;&lt;STRONG&gt;TCP Flags:&lt;/STRONG&gt; ACK&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If TCP Flags is ACK, this means that the source is trying to send ACK to the destination. But the firewall blocks it because this is not following the TCP 3-way handshake. Is my understanding correct?&lt;BR /&gt;&lt;BR /&gt;If true, why is the source which is configured as the server sending an ACK? Any ideas?&lt;BR /&gt;Thank you!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 08:35:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159795#M28091</guid>
      <dc:creator>MODBUSTCP88</dc:creator>
      <dc:date>2022-10-18T08:35:38Z</dc:date>
    </item>
    <item>
      <title>Re: First packet isn't Syn; tcp_flags: ACK</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159803#M28092</link>
      <description>&lt;P&gt;Yes, you are correct. In some cases, a recent TCP connection can be reused by an application. In this case, the client can send ACK through an existing or just currently expired session.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 08:47:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159803#M28092</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-10-18T08:47:43Z</dc:date>
    </item>
    <item>
      <title>Re: First packet isn't Syn; tcp_flags: ACK</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159806#M28093</link>
      <description>&lt;P&gt;Thank you _Val_ for the quick reply. How can we prevent this?&lt;BR /&gt;&lt;BR /&gt;In this case, the source (configured Server) was sending ACK to the destination (configured Client) which would cause the traffic drop.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Would a probably fix be increasing the message timeout delay on the client?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 09:14:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159806#M28093</guid>
      <dc:creator>MODBUSTCP88</dc:creator>
      <dc:date>2022-10-18T09:14:30Z</dc:date>
    </item>
    <item>
      <title>Re: First packet isn't Syn; tcp_flags: ACK</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159809#M28094</link>
      <description>&lt;P&gt;Thank you _Val_ for the quick reply.&lt;BR /&gt;In our case, it is the Configured Server (Host B) that is sending the ACK not the client.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Would increasing timeout message delays on the client help? It is currently set at 1 second.&lt;BR /&gt;&lt;BR /&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 09:23:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159809#M28094</guid>
      <dc:creator>MODBUSTCP88</dc:creator>
      <dc:date>2022-10-18T09:23:47Z</dc:date>
    </item>
    <item>
      <title>Re: First packet isn't Syn; tcp_flags: ACK</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159812#M28096</link>
      <description>&lt;P&gt;This does not make any sense. Could you maybe provide some traces &amp;amp; logs? There is no reason for the server to send ACK to the client. It should be SYN-ACK or FIN-ACK, according to the TCP protocol rules.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 10:31:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159812#M28096</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-10-18T10:31:13Z</dc:date>
    </item>
    <item>
      <title>Re: First packet isn't Syn; tcp_flags: ACK</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159813#M28097</link>
      <description>&lt;P&gt;One more question. Is this issue by any chance related to VOIP?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 10:33:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159813#M28097</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-10-18T10:33:24Z</dc:date>
    </item>
    <item>
      <title>Re: First packet isn't Syn; tcp_flags: ACK</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159814#M28098</link>
      <description>&lt;P&gt;Apologies the for multiple replies, not sure how that happen. I thought the first reply didnt go through.&lt;BR /&gt;&lt;BR /&gt;Anyway, for your questions:&lt;/P&gt;&lt;P&gt;1. This is not related to VOIP. Its a communication between a control system and a field device PLC.&lt;/P&gt;&lt;P&gt;2. Unfortunately, we do not have any logs/traces other than the checkpoint data that I shared in the original post.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 10:43:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159814#M28098</guid>
      <dc:creator>MODBUSTCP88</dc:creator>
      <dc:date>2022-10-18T10:43:15Z</dc:date>
    </item>
    <item>
      <title>Re: First packet isn't Syn; tcp_flags: ACK</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159816#M28100</link>
      <description>&lt;P&gt;Understood.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If this is an application behavior, there is not much you can do on the FW. You may look at this thread, option 2:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Disable-Stateful-Inspection/td-p/120107" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/Disable-Stateful-Inspection/td-p/120107&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I would start with the application though...&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 10:51:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159816#M28100</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-10-18T10:51:16Z</dc:date>
    </item>
    <item>
      <title>Re: First packet isn't Syn; tcp_flags: ACK</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159819#M28103</link>
      <description>&lt;P&gt;Not sure if this can help, attaching screenshot from checkpoint (removed sensitive info).&lt;BR /&gt;&lt;BR /&gt;Thanks for sharing further information.&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 11:08:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159819#M28103</guid>
      <dc:creator>MODBUSTCP88</dc:creator>
      <dc:date>2022-10-18T11:08:12Z</dc:date>
    </item>
    <item>
      <title>Re: First packet isn't Syn; tcp_flags: ACK</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159846#M28111</link>
      <description>&lt;P&gt;This proves what you have said already, but does not bring any additional info, other than it seem you are using Modbus TCP over port 502.&lt;BR /&gt;&lt;BR /&gt;According to the specifications, Server &lt;U&gt;should not&lt;/U&gt; send ACK, see page 17 here:&amp;nbsp;&lt;A href="https://modbus.org/docs/Modbus_Messaging_Implementation_Guide_V1_0b.pdf" target="_blank"&gt;https://modbus.org/docs/Modbus_Messaging_Implementation_Guide_V1_0b.pdf&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I suggest running traces to prove the dropped packet is indeed ACK and not ACK-FIN, when coming from the server. If it is, you need to talk to the application owners, of you can try disabling stateful inspection selectively as&amp;nbsp; mentioned above.&lt;BR /&gt;&lt;BR /&gt;If server actually sends something other than a clean ACK, but FW considers it to be ACK and drops it eventually, you need to take it with TAC&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 13:27:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159846#M28111</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-10-18T13:27:44Z</dc:date>
    </item>
    <item>
      <title>Re: First packet isn't Syn; tcp_flags: ACK</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159885#M28121</link>
      <description>&lt;P&gt;Thanks _Val_, Unfortunately, we cannot disable the stateful inspection at this time. Will try Wireshark and also the vendor next.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 19:25:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159885#M28121</guid>
      <dc:creator>MODBUSTCP88</dc:creator>
      <dc:date>2022-10-18T19:25:09Z</dc:date>
    </item>
    <item>
      <title>Re: First packet isn't Syn; tcp_flags: ACK</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159917#M28127</link>
      <description>&lt;P&gt;Just to make it clear, I did not recommend you disable Stateful Inspection globally, I have provided a reference on how to do it for specific traffic on a limited scale. This is not the recommended workaround anyway, so I certainly understand your caution.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2022 07:51:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/159917#M28127</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-10-19T07:51:08Z</dc:date>
    </item>
    <item>
      <title>Re: First packet isn't Syn; tcp_flags: ACK</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/163150#M29101</link>
      <description>&lt;P&gt;Hi Val,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We managed to captured data with wireshark and have shared with the Vendor.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;We notice that the Server sends Keepalive packet and the firewall is blocking this.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I read somewhere that this packet is normally an ACK. If true, is there a setting in the firewall that can allow keepalive packets through?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The firewall team opened up all ports but it still drops the connection.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Nov 2022 09:30:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/163150#M29101</guid>
      <dc:creator>MODBUSTCP88</dc:creator>
      <dc:date>2022-11-25T09:30:19Z</dc:date>
    </item>
    <item>
      <title>Re: First packet isn't Syn; tcp_flags: ACK</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/163153#M29103</link>
      <description>&lt;P&gt;This is a violation of the TCP state. Any stateful security device will drop such packets.&lt;/P&gt;
&lt;P&gt;I do not think there is a way to disable TCP state on a specific service.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can try opening a TAC case to see if it is possible, but I would be very surprised with a positive outcome.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Nov 2022 09:49:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/163153#M29103</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-11-25T09:49:56Z</dc:date>
    </item>
    <item>
      <title>Re: First packet isn't Syn; tcp_flags: ACK</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/163176#M29111</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You could try sk102491.&lt;/P&gt;&lt;P&gt;Rgds,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Nov 2022 11:52:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/163176#M29111</guid>
      <dc:creator>BikeMan</dc:creator>
      <dc:date>2022-11-25T11:52:53Z</dc:date>
    </item>
    <item>
      <title>Re: First packet isn't Syn; tcp_flags: ACK</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/163209#M29119</link>
      <description>&lt;P&gt;How frequent is the keepalive? The default timeout for a connection with no traffic is one hour, so if the keepalive interval is longer than that, yes, you will see this behavior.&lt;/P&gt;
&lt;P&gt;More generally, "First packet isn't SYN" drops for packets with only the ACK flag set are almost always one of two things&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Really primitive firewalls (e.g, PIX) are sometimes set up to just allow any packet with ACK set with the expectation the endpoints will handle verifying TCP state. It could conceivably be an attack or scan trying to bypass such a firewall.&lt;/LI&gt;
&lt;LI&gt;The traffic could be a legitimate reply to a connection which was valid at one time, but which has been removed from the connections table.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;The second case is pretty easy to prove, and it turns the question into "Why was this connection removed from the connections table?", which is easy to answer. Connections are removed from the table in three ways:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;When manually deleted (e.g, 'fw tab -t connections -x')&lt;/LI&gt;
&lt;LI&gt;When the endpoints close it (either via RST or FIN)&lt;/LI&gt;
&lt;LI&gt;After the connection's timeout (this can be the default timeout for the protocol, it can be set per-service-object, and it can be adjusted by Aggressive Aging if the firewall is under load)&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;So one of those three things is happening. A long-running packet capture filtered for those endpoints should tell you which one.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Nov 2022 15:21:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/163209#M29119</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2022-11-25T15:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: First packet isn't Syn; tcp_flags: ACK</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/163505#M29202</link>
      <description>&lt;P&gt;Hi Bob,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you for the detailed explanation. The keepalive is set at 30seconds at the server.&amp;nbsp; We think that the server is taking too long to respond to the client's request, so the clients closes the connection (the timeout delay at the client is set at 1000ms). This issue did not re-occur after increasing the timeout delay from 1000ms to 3000ms.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I am trying to understand the drop details screenshot. Took one from google images below.&lt;/P&gt;&lt;P&gt;Does Policy Date value represents the date when Policy was implemented in the firewall that caused the drop to happen?&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Drop detail example.JPG" style="width: 470px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18583iA7FEA2E3C4099747/image-size/large?v=v2&amp;amp;px=999" role="button" title="Drop detail example.JPG" alt="Drop detail example.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2022 10:31:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/163505#M29202</guid>
      <dc:creator>MODBUSTCP88</dc:creator>
      <dc:date>2022-11-29T10:31:50Z</dc:date>
    </item>
    <item>
      <title>Re: First packet isn't Syn; tcp_flags: ACK</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/181385#M33188</link>
      <description>&lt;P&gt;Hi there, how or where did you change the timeout delay ? i have the same problem, some packets are passed in the configured rule and other are drop by a clean up rule, and the only information we have is that "TCP packet out of state” : First packet isn´t SYN "&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2023 18:28:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/181385#M33188</guid>
      <dc:creator>eslopezps</dc:creator>
      <dc:date>2023-05-18T18:28:42Z</dc:date>
    </item>
    <item>
      <title>Re: First packet isn't Syn; tcp_flags: ACK</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/186247#M34277</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;&amp;nbsp; I have a where it involves VOIP with remote access VPN users who intermittently not able to make outbound call and the packets is being dropped as first packet is not syn. in coming calls work fine. no asymmatric routing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2023 16:02:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/First-packet-isn-t-Syn-tcp-flags-ACK/m-p/186247#M34277</guid>
      <dc:creator>Chris_Degan</dc:creator>
      <dc:date>2023-07-12T16:02:22Z</dc:date>
    </item>
  </channel>
</rss>

