<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 'TCP packet out of state' drops in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-packet-out-of-state-drops/m-p/190446#M35151</link>
    <description>&lt;P&gt;Thank you for the reply, much appreciated ill do some digging into what you've mentioned.&amp;nbsp;&lt;/P&gt;&lt;P&gt;i am reluctant to alter the service as its HTTPs and not sure if it would end up impacting other connections. and will see what the impact could be for changing the&amp;nbsp; fw_rst_expired_conn setting.&lt;/P&gt;</description>
    <pubDate>Thu, 24 Aug 2023 08:36:40 GMT</pubDate>
    <dc:creator>anettekr</dc:creator>
    <dc:date>2023-08-24T08:36:40Z</dc:date>
    <item>
      <title>'TCP packet out of state' drops</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-packet-out-of-state-drops/m-p/85368#M6603</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;We are troubleshooting an issue and see many HTTPS packets dropped with the following message in the logs:&lt;/P&gt;&lt;P&gt;'TCP packet out of state -First packet isn't SYN'&lt;/P&gt;&lt;P&gt;I've tried to disable this protection for one specific source, so open Inspection settings, and added an Exception for this specific source IP (all protections, profiles and destinations)&lt;/P&gt;&lt;P&gt;However I still see packets being dropped with the same message in the logs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to bypass an specific source or destination of this protection?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2020 11:13:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-packet-out-of-state-drops/m-p/85368#M6603</guid>
      <dc:creator>arcotangente</dc:creator>
      <dc:date>2020-05-15T11:13:46Z</dc:date>
    </item>
    <item>
      <title>Re: 'TCP packet out of state' drops</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-packet-out-of-state-drops/m-p/85378#M6604</link>
      <description>&lt;P&gt;What TCP flags (RST, FIN, ACK, etc.) are you seeing on the packets dropped as out of state?&amp;nbsp; If they are RST or FIN the connection is already dead so you can probably ignore those.&amp;nbsp; If the flags on the dropped packets are SYN and ACK (or perhaps just ACK), that may indicate asymmetric routing going around the firewall.&amp;nbsp; If the flags on the dropped packet are some combo of only ACK/PSH/URG usually that means the connection was timed out by the firewall, in that case you can try increasing the service timeout for HTTPS on the Advanced screen of the matching HTTPS service.&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2020 12:52:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-packet-out-of-state-drops/m-p/85378#M6604</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-05-20T12:52:51Z</dc:date>
    </item>
    <item>
      <title>Re: 'TCP packet out of state' drops</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-packet-out-of-state-drops/m-p/85382#M6605</link>
      <description>&lt;P&gt;Thanks Timothy,&lt;/P&gt;&lt;P&gt;The flags are 'PUSH-ACK'&lt;/P&gt;&lt;P&gt;BR&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2020 13:33:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-packet-out-of-state-drops/m-p/85382#M6605</guid>
      <dc:creator>arcotangente</dc:creator>
      <dc:date>2020-05-15T13:33:00Z</dc:date>
    </item>
    <item>
      <title>Re: 'TCP packet out of state' drops</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-packet-out-of-state-drops/m-p/85388#M6606</link>
      <description>&lt;P&gt;Try increasing the timeout for the HTTPS service on its Advanced screen, and make sure you modify the correct HTTPS/port 443 service that is actually matching the problematic traffic as there may be several defined.&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2020 14:25:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-packet-out-of-state-drops/m-p/85388#M6606</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-05-15T14:25:39Z</dc:date>
    </item>
    <item>
      <title>Re: 'TCP packet out of state' drops</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-packet-out-of-state-drops/m-p/85860#M6628</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Finally the issue got fixed after a reboot of the secondary node, while troubleshooting another issue. Difficult to understand what happened&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks anyway!&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2020 10:19:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-packet-out-of-state-drops/m-p/85860#M6628</guid>
      <dc:creator>arcotangente</dc:creator>
      <dc:date>2020-05-20T10:19:54Z</dc:date>
    </item>
    <item>
      <title>Re: 'TCP packet out of state' drops</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-packet-out-of-state-drops/m-p/190321#M35120</link>
      <description>&lt;P&gt;Hello,&amp;nbsp; i know this is an old post but hoping you might be able to help.&lt;/P&gt;&lt;P&gt;i am having some issues pin pointing connection resets for a payment application.&amp;nbsp; trying to find out if the firewall is at fault so something else is along the path.&lt;/P&gt;&lt;P&gt;i'm seeing First Packet isn't SYN being dropped by the firewall with the flag -FIN-PUSH-ACK.&amp;nbsp; the timings of these drops don't match exactly with the connection errors seen for the payment application but there are some of these drops around the same time as connection problems.&amp;nbsp; we also see them regularly throughout the day.&lt;/P&gt;&lt;P&gt;not done any work to resolve just yet as not sure what the best approach would be seen various 'solutions': change TCP end Timeout, exclude IPs from SecureXL.&amp;nbsp; &amp;nbsp;disable HTTPsi, its enabled but connection is already excluded as its payment related.&amp;nbsp; Failover firewalls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;would you have any suggestions based on the flag we see, FIN-PUSH-ACK&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;Anette&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2023 14:47:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-packet-out-of-state-drops/m-p/190321#M35120</guid>
      <dc:creator>anettekr</dc:creator>
      <dc:date>2023-08-23T14:47:24Z</dc:date>
    </item>
    <item>
      <title>Re: 'TCP packet out of state' drops</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-packet-out-of-state-drops/m-p/190344#M35125</link>
      <description>&lt;P&gt;Unlikely that the FIN-PUSH-ACK drops are related to your suspected RST issue, as the presence of those flags reveals that the host already believes the connection is over and is trying to end it gracefully.&amp;nbsp; That connection no longer being present in the firewall's state table and the drop occurring shouldn't really affect that.&amp;nbsp; I suppose the payment app may hang waiting for the connection to gracefully end before it is able to launch a new connection and continue normal operation, and that may look like an interruption/outage.&lt;/P&gt;
&lt;P&gt;It is also possible that the long-running payment application connection is getting silently timed out by the firewall, the application realizes this and tries to close it gracefully but gets stuck.&amp;nbsp; If you suspect this is the case you could try increasing the timeout for the relevant TCP service it is using, or try changing fw_rst_expired_conn from 0 to 1.&amp;nbsp; This will cause a RST to be sent immediately upon expiration, which may help the host figure out the connection is gone and to launch a new one immediately.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2023 16:51:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-packet-out-of-state-drops/m-p/190344#M35125</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-08-23T16:51:29Z</dc:date>
    </item>
    <item>
      <title>Re: 'TCP packet out of state' drops</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-packet-out-of-state-drops/m-p/190446#M35151</link>
      <description>&lt;P&gt;Thank you for the reply, much appreciated ill do some digging into what you've mentioned.&amp;nbsp;&lt;/P&gt;&lt;P&gt;i am reluctant to alter the service as its HTTPs and not sure if it would end up impacting other connections. and will see what the impact could be for changing the&amp;nbsp; fw_rst_expired_conn setting.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2023 08:36:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TCP-packet-out-of-state-drops/m-p/190446#M35151</guid>
      <dc:creator>anettekr</dc:creator>
      <dc:date>2023-08-24T08:36:40Z</dc:date>
    </item>
  </channel>
</rss>

