<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SMTP Packet Drop in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Packet-Drop/m-p/192018#M35451</link>
    <description>&lt;P&gt;When migrating from R80.10 to 80.40, there are changes in the implied_rule.def and communicated.def files.&lt;/P&gt;&lt;P&gt;However, I am not sure if this was changed intentionally by someone or if the logic changed as the version changed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 08 Sep 2023 09:20:40 GMT</pubDate>
    <dc:creator>ChoiYunSoo</dc:creator>
    <dc:date>2023-09-08T09:20:40Z</dc:date>
    <item>
      <title>SMTP Packet Drop</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Packet-Drop/m-p/189857#M34990</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone ever experienced SMTP sessions dropping?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After upgrading the customer's management server OS (R80.10 to R80.40) recently, we are experiencing SMTP packets being dropped.&lt;/P&gt;&lt;P&gt;What is unusual is that there were no policy or other option modifications, and the gateway remains at the original R80.10 version.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a detailed symptom, the customer's firewall consists of only two interfaces.&lt;BR /&gt;And when I run tcpdump on the firewall, I see Syn packets on the inside interface, but I don't see packets going out on the outside interface.&lt;/P&gt;&lt;P&gt;I'm expecting the firewall to randomly drop packets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another peculiarity was that the service was normalized when the policy was installed without any modification on the management server.&lt;/P&gt;&lt;P&gt;So I'm thinking it's more likely a firewall and mail server or L4 managed session issue rather than policy or firewall logic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are there any settings that can affect firewall sessions in the R80.10 and R80.40 management servers? For example, such as the Inspection Setting part or Virtual Session timeout&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PS&lt;/P&gt;&lt;P&gt;I want to execute the 'fw ctl zdebug + drop' command, but I am afraid that secondary problems will occur due to performance load, so I am not able to proceed.&lt;/P&gt;&lt;P&gt;Firewalls usually flow about 6 to 10 Gbps of traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 08:53:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Packet-Drop/m-p/189857#M34990</guid>
      <dc:creator>ChoiYunSoo</dc:creator>
      <dc:date>2023-08-18T08:53:14Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Packet Drop</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Packet-Drop/m-p/189876#M34995</link>
      <description>&lt;P&gt;You can safely run zdebug command, it definitely would not cause any load on the firewall. By the way, I also suspect something either with inspection settings or possibly IPS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 12:43:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Packet-Drop/m-p/189876#M34995</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-08-18T12:43:15Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Packet Drop</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Packet-Drop/m-p/189888#M35000</link>
      <description>&lt;P&gt;Keep in mind R80.10 is End of Support and R80.40 is about to be End of Support.&lt;BR /&gt;R81.20 is the current recommended release.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 13:45:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Packet-Drop/m-p/189888#M35000</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-08-18T13:45:56Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Packet Drop</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Packet-Drop/m-p/192018#M35451</link>
      <description>&lt;P&gt;When migrating from R80.10 to 80.40, there are changes in the implied_rule.def and communicated.def files.&lt;/P&gt;&lt;P&gt;However, I am not sure if this was changed intentionally by someone or if the logic changed as the version changed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2023 09:20:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Packet-Drop/m-p/192018#M35451</guid>
      <dc:creator>ChoiYunSoo</dc:creator>
      <dc:date>2023-09-08T09:20:40Z</dc:date>
    </item>
  </channel>
</rss>

