<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: weird behaviour in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/220425#M42185</link>
    <description>&lt;P&gt;The&amp;nbsp;&lt;SPAN&gt;CPNotEnoughDataForRuleMatch log suggests the first "Possible Match" rule in your URL and App Policy involves App Control.&lt;BR /&gt;This message pops up because the connection terminated before the system could identify what application it was.&lt;BR /&gt;I would strongly suggest adding a rule at/near the top that allows the required traffic only by a simple TCP service.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 11 Jul 2024 17:12:22 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2024-07-11T17:12:22Z</dc:date>
    <item>
      <title>weird behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/220375#M42168</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I'm curious about the routing logic for this traffic. Can you take a look at the attached image? There appear to be three green logs relevant to the issue.&lt;/P&gt;
&lt;DIV class="container"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="container"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="log12.JPG" style="width: 833px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26730iF830484EB0C24122/image-size/large?v=v2&amp;amp;px=999" role="button" title="log12.JPG" alt="log12.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I wonder why the traffic would be sent like that (not inside tunnel) !&lt;/P&gt;
&lt;P&gt;the first: accept by network rule and URL rule.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="accept-log.JPG" style="width: 680px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26731iF8A890E1526E288A/image-size/large?v=v2&amp;amp;px=999" role="button" title="accept-log.JPG" alt="accept-log.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;the second: accept by network rule but URL, CPNotEnoughDataForRuleMatch!&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="accept-log2.JPG" style="width: 722px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26732i0172EECACDC1E320/image-size/large?v=v2&amp;amp;px=999" role="button" title="accept-log2.JPG" alt="accept-log2.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;the third: same as the second, and then it does as it configured to do through tunnel!&lt;/P&gt;
&lt;P&gt;10.80.91 is an internal server in central office 192.168.3.11 is a printer in branch office&lt;/P&gt;
&lt;P&gt;Why is that happening?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 09:55:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/220375#M42168</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-07-11T09:55:59Z</dc:date>
    </item>
    <item>
      <title>Re: weird behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/220380#M42170</link>
      <description>&lt;P&gt;Both tcp ports do not work 9090 and 9091? Does any traffic work at all between 10.80.91 and 192.168.3.11?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 10:48:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/220380#M42170</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-07-11T10:48:18Z</dc:date>
    </item>
    <item>
      <title>Re: weird behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/220383#M42171</link>
      <description>&lt;P&gt;Some traffic is going between these, print server and a printer. Server is trying to add the printer but fails!&lt;/P&gt;
&lt;P&gt;How do you see that these ports do not work?&lt;/P&gt;
&lt;P&gt;I could find these logs:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="log4.JPG" style="width: 792px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26734i4F21C82C6D5E0954/image-size/large?v=v2&amp;amp;px=999" role="button" title="log4.JPG" alt="log4.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 11:34:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/220383#M42171</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-07-11T11:34:46Z</dc:date>
    </item>
    <item>
      <title>Re: weird behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/220384#M42172</link>
      <description>&lt;P&gt;Read below post, it will answer your question.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/When-does-CPEarlyDrop-occur-with-ACCPET-action/m-p/216402#M35976" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/When-does-CPEarlyDrop-occur-with-ACCPET-action/m-p/216402#M35976&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 11:30:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/220384#M42172</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-07-11T11:30:25Z</dc:date>
    </item>
    <item>
      <title>Re: weird behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/220397#M42177</link>
      <description>&lt;P&gt;So, if i suspect ra routing loop, how to investiagte that?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 12:52:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/220397#M42177</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-07-11T12:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: weird behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/220398#M42178</link>
      <description>&lt;P&gt;tcpdump is the friend you need in this case &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or check routing table of fw, and check routing table of next hop. Compare them.&lt;/P&gt;
&lt;P&gt;If they point the network to each other you have loop.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 12:54:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/220398#M42178</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-07-11T12:54:26Z</dc:date>
    </item>
    <item>
      <title>Re: weird behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/220399#M42179</link>
      <description>&lt;P&gt;tcpdump, fw monitor&lt;/P&gt;
&lt;P&gt;My colleague made this site ages ago, its super helpful.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tcpdump101.com/" target="_blank"&gt;https://tcpdump101.com/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 12:58:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/220399#M42179</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-07-11T12:58:55Z</dc:date>
    </item>
    <item>
      <title>Re: weird behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/220425#M42185</link>
      <description>&lt;P&gt;The&amp;nbsp;&lt;SPAN&gt;CPNotEnoughDataForRuleMatch log suggests the first "Possible Match" rule in your URL and App Policy involves App Control.&lt;BR /&gt;This message pops up because the connection terminated before the system could identify what application it was.&lt;BR /&gt;I would strongly suggest adding a rule at/near the top that allows the required traffic only by a simple TCP service.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 17:12:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/220425#M42185</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-11T17:12:22Z</dc:date>
    </item>
    <item>
      <title>Re: weird behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/221859#M42516</link>
      <description>&lt;P&gt;What PhoneBoy suggested is the solution&lt;/P&gt;
&lt;P&gt;I strongly suggest to use URLF/APPC blade only inside inline layers well organized&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 20:44:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/221859#M42516</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2024-07-24T20:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: weird behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/221913#M42535</link>
      <description>&lt;P&gt;Note that if you have a rule using an application object instead of a plain TCP service object, and you test the connection with telnet, netcat, Test-NetConnection, and so on, you will get this&amp;nbsp;&lt;SPAN&gt;CPNotEnoughDataForRuleMatch "Connection terminated before the Security Gateway was able to make a decision" message. These tools don't send actual application traffic, so the firewall can't be sure the traffic actually is the application you have specified in the rule.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2024 14:04:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/weird-behaviour/m-p/221913#M42535</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2024-07-25T14:04:49Z</dc:date>
    </item>
  </channel>
</rss>

