<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: tcp state logging and SecureXL in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcp-state-logging-and-SecureXL/m-p/189998#M35046</link>
    <description>&lt;P&gt;There's an SK that talks about this feature:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk101221" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk101221&lt;/A&gt;&lt;BR /&gt;I presume it is SecureXL friendly, else there'd be a note in that SK.&lt;BR /&gt;It presumably increases load on fwd (the logging process) since additional logs are generated as a result of this setting.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 21 Aug 2023 14:59:13 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2023-08-21T14:59:13Z</dc:date>
    <item>
      <title>tcp state logging and SecureXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcp-state-logging-and-SecureXL/m-p/189982#M35038</link>
      <description>&lt;P&gt;Anyone knows how about the "include TCP state information" in the logs.&lt;/P&gt;
&lt;P&gt;Is it fully integrated with SecureXL or only F2F connection are logged here with the state?&lt;/P&gt;
&lt;P&gt;How about the performance impact ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="2023-08-21 14_19_58.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/22147iE16283C4BACE8AB8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="2023-08-21 14_19_58.png" alt="2023-08-21 14_19_58.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 12:46:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcp-state-logging-and-SecureXL/m-p/189982#M35038</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2023-08-21T12:46:45Z</dc:date>
    </item>
    <item>
      <title>Re: tcp state logging and SecureXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcp-state-logging-and-SecureXL/m-p/189998#M35046</link>
      <description>&lt;P&gt;There's an SK that talks about this feature:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk101221" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk101221&lt;/A&gt;&lt;BR /&gt;I presume it is SecureXL friendly, else there'd be a note in that SK.&lt;BR /&gt;It presumably increases load on fwd (the logging process) since additional logs are generated as a result of this setting.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 14:59:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcp-state-logging-and-SecureXL/m-p/189998#M35046</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-08-21T14:59:13Z</dc:date>
    </item>
    <item>
      <title>Re: tcp state logging and SecureXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcp-state-logging-and-SecureXL/m-p/190015#M35052</link>
      <description>&lt;P&gt;Fired up one of my &lt;A href="http://www.maxpowerfirewalls.com/gw-optimization-course.html" target="_blank" rel="noopener"&gt;Gateway Performance Optimization Class&lt;/A&gt; lab workstations, and I can confirm that TCP state information does properly appear for connections handled in the fastpath, Medium Path (both passive &amp;amp; active streaming) and F2F/slowpath.&amp;nbsp; Didn't try the QoS paths but imagine it would work there too.&lt;/P&gt;
&lt;P&gt;The big caveat here is that to see certain logged Firewall-blade specific information such as NAT operations and TCP state information, in the SmartConsole you must be viewing a log of type "Connection" (diagonal line icon) and not of type "Session" (left and right arrow icon).&amp;nbsp; This type of Firewall blade information will not be included in a log of type "Session", as first reported by&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/11879"&gt;@Vladimir&lt;/a&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Edit: Tested code version was R81.20 GA.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 17:24:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcp-state-logging-and-SecureXL/m-p/190015#M35052</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-08-21T17:24:41Z</dc:date>
    </item>
    <item>
      <title>Re: tcp state logging and SecureXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcp-state-logging-and-SecureXL/m-p/190327#M35122</link>
      <description>&lt;P&gt;Any idea if this feature logs when connections are removed from the connections table due to timeout? I don't see mention either way in the SK.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2023 15:24:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcp-state-logging-and-SecureXL/m-p/190327#M35122</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-08-23T15:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: tcp state logging and SecureXL</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcp-state-logging-and-SecureXL/m-p/190341#M35124</link>
      <description>&lt;P&gt;Not directly, no.&amp;nbsp; It simply reports the final state of the connection as "Established" instead of "Both FIN", even though the connection does not exist in the state table any more.&amp;nbsp; This is misleading but technically correct as that was indeed the final connection state before it was removed from the state table, and the state of the TCP connection itself between the two endpoints did not actually change at that time.&amp;nbsp; If you see a state of "Established" but need to determine if the connection is still present in the state table, look at the "Expire Time" and "Last Hit" items in the same log card.&amp;nbsp; Enabling Accounting on the relevant rule may also help in this regard.&lt;/P&gt;
&lt;P&gt;Also be aware that even if the TCP connection is ended by a RST sent by one of the hosts, the final connection state is still reported as "Both FIN" as if the two hosts had performed a graceful FIN, FIN-ACK, ACK.&amp;nbsp; Also misleading, really wish it would say "RST" instead to clarify that one of the hosts killed the connection ungracefully.&amp;nbsp; Could save the firewall a lot of blame...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2023 16:57:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/tcp-state-logging-and-SecureXL/m-p/190341#M35124</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-08-23T16:57:57Z</dc:date>
    </item>
  </channel>
</rss>

