<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TCP State Logging: Only 10% of the connections have a TCP State in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-State-Logging-Only-10-of-the-connections-have-a-TCP-State/m-p/175234#M31941</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am trying to solve a problem that probably is not firewall related, but it would help us a lot if we could see how a connection ended.&lt;/P&gt;&lt;P&gt;We activated TCP State Logging as described in&amp;nbsp;&lt;SPAN&gt;sk101221. And we see log entries that contain a "TCP State" entry. Unluckily this is only available for 10% of all TCP sessions. Most TCP sessions do not contain any TCP State. This is surprising as we selected "3" (When connection state change), so we would expect every connection to have a TCP State.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;All connections were accepted.&lt;/P&gt;&lt;P&gt;I was using to "fw log" to analyse the log as SmartConsole requires you to click on a log entry to see if there is a TCP State and we have thousands of log entries. But from checking from SmartConsole, the percentage of log entries containing a TCP State is mostly the same. We made sure the connection started and ended in the same log file.&lt;/P&gt;&lt;P&gt;Are some connections excluded from Reporting the TCP State? I see no limitation in the&amp;nbsp;&lt;SPAN&gt;sk101221.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What I noticed:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Entries with "LogId: 9" always have a TCP State.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Entries with a LogId other than "9" never have a TCP State.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Environment: VSX, R81.10&lt;/P&gt;&lt;P&gt;Sincerely yours, Martin&lt;/P&gt;</description>
    <pubDate>Fri, 17 Mar 2023 16:04:17 GMT</pubDate>
    <dc:creator>Masek</dc:creator>
    <dc:date>2023-03-17T16:04:17Z</dc:date>
    <item>
      <title>TCP State Logging: Only 10% of the connections have a TCP State</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-State-Logging-Only-10-of-the-connections-have-a-TCP-State/m-p/175234#M31941</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am trying to solve a problem that probably is not firewall related, but it would help us a lot if we could see how a connection ended.&lt;/P&gt;&lt;P&gt;We activated TCP State Logging as described in&amp;nbsp;&lt;SPAN&gt;sk101221. And we see log entries that contain a "TCP State" entry. Unluckily this is only available for 10% of all TCP sessions. Most TCP sessions do not contain any TCP State. This is surprising as we selected "3" (When connection state change), so we would expect every connection to have a TCP State.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;All connections were accepted.&lt;/P&gt;&lt;P&gt;I was using to "fw log" to analyse the log as SmartConsole requires you to click on a log entry to see if there is a TCP State and we have thousands of log entries. But from checking from SmartConsole, the percentage of log entries containing a TCP State is mostly the same. We made sure the connection started and ended in the same log file.&lt;/P&gt;&lt;P&gt;Are some connections excluded from Reporting the TCP State? I see no limitation in the&amp;nbsp;&lt;SPAN&gt;sk101221.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What I noticed:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Entries with "LogId: 9" always have a TCP State.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Entries with a LogId other than "9" never have a TCP State.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Environment: VSX, R81.10&lt;/P&gt;&lt;P&gt;Sincerely yours, Martin&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 16:04:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-State-Logging-Only-10-of-the-connections-have-a-TCP-State/m-p/175234#M31941</guid>
      <dc:creator>Masek</dc:creator>
      <dc:date>2023-03-17T16:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: TCP State Logging: Only 10% of the connections have a TCP State</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-State-Logging-Only-10-of-the-connections-have-a-TCP-State/m-p/175265#M31946</link>
      <description>&lt;P&gt;TCP state logging is a rather old feature introduced in R77.10; I'm wondering if the big SecureXL changes in R80.20 are not compatible with it, and as such you are only seeing TCP state for F2F/slowpath traffic for which you normally want to see 10% or less.&amp;nbsp; You could try forcing critical traffic for which you must see TCP state info into F2F/slowpath as described here and see if it makes a difference:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104468&amp;amp;partition=Advanced&amp;amp;product=SecureXL" target="_blank"&gt;sk104468: How to disable SecureXL for specific IP addresses&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Looking at the current list of sim-specific kernel variables, I don't see one corresponding to&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;fwconn_tcp_state_logging.&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;/EM&gt;So trying to do a &lt;STRONG&gt;fw ctl set int&lt;/STRONG&gt; of this variable with the -a argument to set it inside sim/SecureXL is unlikely to have any effect but might be worth a try too.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 23:29:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-State-Logging-Only-10-of-the-connections-have-a-TCP-State/m-p/175265#M31946</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-03-17T23:29:37Z</dc:date>
    </item>
    <item>
      <title>Re: TCP State Logging: Only 10% of the connections have a TCP State</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-State-Logging-Only-10-of-the-connections-have-a-TCP-State/m-p/175270#M31949</link>
      <description>&lt;P&gt;Can you provide an example log card for connections that don't have TCP state?&lt;BR /&gt;Redact any sensitive details.&lt;BR /&gt;Recommend opening a TAC case in parallel.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 23:57:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-State-Logging-Only-10-of-the-connections-have-a-TCP-State/m-p/175270#M31949</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-17T23:57:37Z</dc:date>
    </item>
    <item>
      <title>Re: TCP State Logging: Only 10% of the connections have a TCP State</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-State-Logging-Only-10-of-the-connections-have-a-TCP-State/m-p/175271#M31950</link>
      <description>&lt;P&gt;First thing I was going to suggest was to try disable sxl to see if that fixes the problem. Also, specific log entry related to it would help, just blur out any sensitive/orivate data.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Mar 2023 00:14:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-State-Logging-Only-10-of-the-connections-have-a-TCP-State/m-p/175271#M31950</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-18T00:14:09Z</dc:date>
    </item>
  </channel>
</rss>

