<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Packet corruption by firewall in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-corruption-by-firewall/m-p/199634#M37441</link>
    <description>&lt;P&gt;Do you have SYN Defender enabled?&amp;nbsp; This issue was just fixed by the most recent Jumbo HFAs:&lt;/P&gt;
&lt;TABLE id="filter1Table" class="TableStyle-TP_Table_Jumbo_Fixes" cellspacing="0"&gt;
&lt;TBODY&gt;
&lt;TR class="TableStyle-TP_Table_Jumbo_Fixes-Body-Grey_Background"&gt;
&lt;TD class="TableStyle-TP_Table_Jumbo_Fixes-BodyE-Column_Style_ID-Grey_Background"&gt;
&lt;P&gt;PRJ-49379,&lt;/P&gt;
&lt;P&gt;PRHF-30056&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Jumbo_Fixes-BodyE-Column_Style_Product-Grey_Background"&gt;
&lt;P&gt;SecureXL&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Jumbo_Fixes-BodyD-Column_Style_Description-Grey_Background"&gt;
&lt;P&gt;SYN Defender may not correctly handle reused connections.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
    <pubDate>Mon, 04 Dec 2023 13:48:02 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2023-12-04T13:48:02Z</dc:date>
    <item>
      <title>Packet corruption by firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-corruption-by-firewall/m-p/199461#M37389</link>
      <description>&lt;P&gt;I raised the issue with TAC. But I was wondering if someone has ever observed that sessions fail due to the gateway mishandling the packet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I observice this in a pcap gathered with fw monitor.&lt;/P&gt;
&lt;P&gt;On the (i) stage I have a Normal SYN packet for the new session inluding a MSS value of 1460.&lt;/P&gt;
&lt;P&gt;On the (I) stage the SYN flag is gone and an ACK flag appeared out of thin air.&lt;/P&gt;
&lt;P&gt;Everything else looks the same. A redacted screenshot is attached.&lt;/P&gt;
&lt;P&gt;The mishandling is consistent for this particular session. The next connection from the same client to the same host hapens without incident.&lt;/P&gt;
&lt;DIV id="tinyMceEditorHugo_vd_Kooij_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;It happens on a minority of the&amp;nbsp; sessions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 14:19:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-corruption-by-firewall/m-p/199461#M37389</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2023-12-01T14:19:22Z</dc:date>
    </item>
    <item>
      <title>Re: Packet corruption by firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-corruption-by-firewall/m-p/199473#M37394</link>
      <description>&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk24960" target="_blank" rel="noopener"&gt;sk24960: "Smart Connection&amp;nbsp;Reuse" feature modifies some SYN packets&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Dec 2023 14:46:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-corruption-by-firewall/m-p/199473#M37394</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-12-01T14:46:08Z</dc:date>
    </item>
    <item>
      <title>Re: Packet corruption by firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-corruption-by-firewall/m-p/199626#M37437</link>
      <description>&lt;P&gt;I was checking this and found the setting:&lt;/P&gt;
&lt;P&gt;[Expert@fw01:0]# fw ctl get int fwconn_smart_conn_reuse&lt;BR /&gt;fwconn_smart_conn_reuse = 1&lt;/P&gt;
&lt;P&gt;I will make a change and see what happens.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Dec 2023 12:51:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-corruption-by-firewall/m-p/199626#M37437</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2023-12-04T12:51:56Z</dc:date>
    </item>
    <item>
      <title>Re: Packet corruption by firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-corruption-by-firewall/m-p/199631#M37440</link>
      <description>&lt;P&gt;Definitely could be the issue. I recall spending whole night just before covid-19 hit at customer's site when they upgraded from R80.20 to R80.30 with TAC T3 and escalation and we ended up finding this setting ourselves and once turned off, it fixed the problem. It was solved later with jumbo that came out...&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 04 Dec 2023 13:43:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-corruption-by-firewall/m-p/199631#M37440</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-04T13:43:53Z</dc:date>
    </item>
    <item>
      <title>Re: Packet corruption by firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-corruption-by-firewall/m-p/199634#M37441</link>
      <description>&lt;P&gt;Do you have SYN Defender enabled?&amp;nbsp; This issue was just fixed by the most recent Jumbo HFAs:&lt;/P&gt;
&lt;TABLE id="filter1Table" class="TableStyle-TP_Table_Jumbo_Fixes" cellspacing="0"&gt;
&lt;TBODY&gt;
&lt;TR class="TableStyle-TP_Table_Jumbo_Fixes-Body-Grey_Background"&gt;
&lt;TD class="TableStyle-TP_Table_Jumbo_Fixes-BodyE-Column_Style_ID-Grey_Background"&gt;
&lt;P&gt;PRJ-49379,&lt;/P&gt;
&lt;P&gt;PRHF-30056&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Jumbo_Fixes-BodyE-Column_Style_Product-Grey_Background"&gt;
&lt;P&gt;SecureXL&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Jumbo_Fixes-BodyD-Column_Style_Description-Grey_Background"&gt;
&lt;P&gt;SYN Defender may not correctly handle reused connections.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Mon, 04 Dec 2023 13:48:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-corruption-by-firewall/m-p/199634#M37441</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-12-04T13:48:02Z</dc:date>
    </item>
    <item>
      <title>Re: Packet corruption by firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-corruption-by-firewall/m-p/199827#M37477</link>
      <description>&lt;P&gt;Will look into that today. As I followed&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk24960" target="_blank" rel="noopener noreferrer"&gt;sk24960: "Smart Connection&amp;nbsp;Reuse" feature modifies some SYN packets&lt;/A&gt;&amp;nbsp;yesterday and I still don't get dropped packets in the logs. Not even in the zdebug output.&lt;/P&gt;
&lt;P&gt;Someone raised the default idle timmer from 1 hour to 4 hours on this firewall. And digging into the connection table I could find connections that were idle for almost 3 hours. And if I read&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk65133" target="_blank" rel="noopener"&gt;sk65133: Connections Table Format&lt;/A&gt;&amp;nbsp;correctly it seems these sessins have only seen thre FIN packets from the server and not from the client.&lt;/P&gt;
&lt;P&gt;So the firewall is being stateful and keeps them open waiting for the other FIN.&lt;/P&gt;
&lt;P&gt;May do some serious packet capturing over the course of the day to find the reason for this.&lt;/P&gt;
&lt;P&gt;(2 hosting parties, one of which is Azure, a VPN tunnel, a MPLS link, .... only a dozen things that could go wrong here &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; )&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2023 06:56:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-corruption-by-firewall/m-p/199827#M37477</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2023-12-06T06:56:19Z</dc:date>
    </item>
    <item>
      <title>Re: Packet corruption by firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-corruption-by-firewall/m-p/199828#M37478</link>
      <description>&lt;P&gt;Oh and we have another weird thing on the standby member that drops HTTPS a lot on IPS stuff like maximum header length exceeded. So instaling a Jumbo Hotfix is not on the table as an option at the moment.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2023 07:00:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-corruption-by-firewall/m-p/199828#M37478</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2023-12-06T07:00:06Z</dc:date>
    </item>
  </channel>
</rss>

