<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Connection failure on firewall failover - Out of state packets in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-failure-on-firewall-failover-Out-of-state-packets/m-p/231451#M44608</link>
    <description>&lt;P&gt;It could be the sk, but cant be 100% sure. To check the sync state, you can run below cluster commands.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;****************&lt;/P&gt;
&lt;P&gt;cphaprob state&lt;/P&gt;
&lt;P&gt;cphaprob -a if&lt;/P&gt;
&lt;P&gt;cphaprob -i list&lt;/P&gt;
&lt;P&gt;cphaprob -l list&lt;/P&gt;
&lt;P&gt;cphaprob syncstate&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 31 Oct 2024 22:06:01 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2024-10-31T22:06:01Z</dc:date>
    <item>
      <title>Connection failure on firewall failover - Out of state packets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-failure-on-firewall-failover-Out-of-state-packets/m-p/231449#M44607</link>
      <description>&lt;P&gt;Hardware: 23500&lt;BR /&gt;OS: GAIA R81.10 Take 94&lt;BR /&gt;Active / Standby Setup&lt;BR /&gt;ThroughPut - Typical: 250Mbps&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Many applications do not survive on cluster failover. They do not recover, only solution is to re-start the application.&lt;/P&gt;&lt;P&gt;At the time of failover, we see hundreds of out of state packets and logs showing first packet isn't syn with push-ack flags.&lt;/P&gt;&lt;P&gt;When we fail from member A to B - we did not see any traffic passing from member B unless the app is re-started.&lt;BR /&gt;Checked the # of connections on the connection table and for some IP addresses there is a big difference; Example 800 on active member and 600 on standby member. All TCP based traffic with no UDP component.&lt;/P&gt;&lt;P&gt;Not sure but I believe that this started after we change the clustering method from VRRP to ClusterXL but I may be wrong here.&lt;/P&gt;&lt;P&gt;Questions:&lt;BR /&gt;Is the difference in the # of connections in connections table acceptable?&lt;BR /&gt;Can this bee the issue explained in SK180253?&lt;BR /&gt;Any command to check if the 2 firewalls are out of Sync?&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2024 20:38:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-failure-on-firewall-failover-Out-of-state-packets/m-p/231449#M44607</guid>
      <dc:creator>Muazzam</dc:creator>
      <dc:date>2024-10-31T20:38:49Z</dc:date>
    </item>
    <item>
      <title>Re: Connection failure on firewall failover - Out of state packets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-failure-on-firewall-failover-Out-of-state-packets/m-p/231451#M44608</link>
      <description>&lt;P&gt;It could be the sk, but cant be 100% sure. To check the sync state, you can run below cluster commands.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;****************&lt;/P&gt;
&lt;P&gt;cphaprob state&lt;/P&gt;
&lt;P&gt;cphaprob -a if&lt;/P&gt;
&lt;P&gt;cphaprob -i list&lt;/P&gt;
&lt;P&gt;cphaprob -l list&lt;/P&gt;
&lt;P&gt;cphaprob syncstate&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2024 22:06:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-failure-on-firewall-failover-Out-of-state-packets/m-p/231451#M44608</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-10-31T22:06:01Z</dc:date>
    </item>
    <item>
      <title>Re: Connection failure on firewall failover - Out of state packets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-failure-on-firewall-failover-Out-of-state-packets/m-p/231464#M44610</link>
      <description>&lt;P&gt;Blame the firewall is logical since you see many drops. On the other hand, if application was not designed according to the network RFC, the blame is on application. If application didnt get reply within couple of second/packets, why it is not trying to re-establish connection using new 3-way handshake ?&lt;/P&gt;
&lt;P&gt;If you open TAC case and mention that you have T94 released in March 2023, they will most probably instruct you to update to the latest Take.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 09:18:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-failure-on-firewall-failover-Out-of-state-packets/m-p/231464#M44610</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2024-11-01T09:18:41Z</dc:date>
    </item>
    <item>
      <title>Re: Connection failure on firewall failover - Out of state packets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-failure-on-firewall-failover-Out-of-state-packets/m-p/231481#M44614</link>
      <description>&lt;P&gt;After troubleshooting the issue sufficiently (to eliminate potential causes) you may wish to reject rather than drop out of state traffic to allow the applications to better understand that it should reinitiate a new connection. This may not be viable in all scenarios however.&lt;/P&gt;
&lt;P&gt;For more information on how to control the behavior of the gateway in this regard please see:&amp;nbsp;&lt;SPAN&gt;sk60768&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 13:47:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-failure-on-firewall-failover-Out-of-state-packets/m-p/231481#M44614</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-11-01T13:47:57Z</dc:date>
    </item>
    <item>
      <title>Re: Connection failure on firewall failover - Out of state packets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-failure-on-firewall-failover-Out-of-state-packets/m-p/231482#M44615</link>
      <description>&lt;P&gt;Or at least take 169, which is recommended.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 12:10:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-failure-on-firewall-failover-Out-of-state-packets/m-p/231482#M44615</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-01T12:10:21Z</dc:date>
    </item>
    <item>
      <title>Re: Connection failure on firewall failover - Out of state packets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-failure-on-firewall-failover-Out-of-state-packets/m-p/231511#M44628</link>
      <description>&lt;P&gt;1) Find a log for a connection that was dropped as "out of state" upon failover and determine the service object that matched that particular connection in your rulebase.&amp;nbsp; Open that service for editing and on the Advanced screen make sure that this box has not been unchecked for a selective synchronization setup (it is set by default on all services):&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="selective sync.png" style="width: 614px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28302i85B87245AAA297F9/image-size/large?v=v2&amp;amp;px=999" role="button" title="selective sync.png" alt="selective sync.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) Next if you are using the IPS blade, check this setting on your gateway/cluster object and ensure it has not been changed from the default of "prefer connectivity".&amp;nbsp; If a connection is undergoing streaming inspection in the Medium or Firewall/F2F paths, it will be killed "out of state" upon failover if "prefer security" is set:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="prefer.png" style="width: 655px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28303i1B12348E9C1DC203/image-size/large?v=v2&amp;amp;px=999" role="button" title="prefer.png" alt="prefer.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3) If you have a lot of rapid-fire, short lived connections that don't exist for more than 3 seconds they will be killed "out of state" upon failover with this default setting.&amp;nbsp; If this is indeed the case try disabling it and see if that helps, although this will increase the amount of sync traffic between the cluster members substantially:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="delayed.png" style="width: 608px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28304iDF0886A4875A59D7/image-size/large?v=v2&amp;amp;px=999" role="button" title="delayed.png" alt="delayed.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;4) Make sure your sync network is healthy and not struggling, look at the error counters for the Sync interface in the outputs of &lt;STRONG&gt;netstat -ni&lt;/STRONG&gt; and &lt;STRONG&gt;cphaprob syncstat&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;5) Beyond those you'll need to run commands like &lt;STRONG&gt;fw tab -t connections -u -f&lt;/STRONG&gt; and &lt;STRONG&gt;fw ctl conntab&amp;nbsp;&lt;/STRONG&gt;on both the active and standby to determine which specific connections are not getting sync'ed which will hopefully lead to why.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 18:17:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-failure-on-firewall-failover-Out-of-state-packets/m-p/231511#M44628</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-11-01T18:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: Connection failure on firewall failover - Out of state packets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-failure-on-firewall-failover-Out-of-state-packets/m-p/231516#M44630</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/29915"&gt;@Muazzam&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have 2 lines in my local KB &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I use this usually at scheduled failover eg.: maintanance.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These are the followings:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="ui-provider coi coj c d e f g h i j k l m n o p q r s t cok col w x y z ab ac ae af ag ah ai aj ak"&gt;#fw ctl set int fw_reject_non_syn 1&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk60768" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk60768&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Have you tried the this command?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;'s explanation is the best! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Akos&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 19:47:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-failure-on-firewall-failover-Out-of-state-packets/m-p/231516#M44630</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2024-11-01T19:47:05Z</dc:date>
    </item>
    <item>
      <title>Re: Connection failure on firewall failover - Out of state packets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-failure-on-firewall-failover-Out-of-state-packets/m-p/231541#M44647</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/29915"&gt;@Muazzam&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp; had already described the important points.&lt;/P&gt;
&lt;P&gt;From a performance point of view, it makes more sense not to synchronize connections immediately in a cluster environment.&lt;/P&gt;
&lt;P&gt;For example, with http/https I often set the value “start synchronizing 3 sec. after connection initiation” to a higher value as the “tcp start timer” in the “global proprerties”. This means that the TCP sessions are only synchronized in a cluster once the SYN/SYN-ACK phase has been completed. This has the advantage that the sessions are not immediately synchronized in the event of a DDoS attack.&lt;BR /&gt;This reduces CPU performance in a cluster environment in the event of a DDoS attack.&lt;/P&gt;
&lt;P&gt;For example, in my opinion it makes no sense to synchronize DNS queries, as they are repeated after 2 or 4 seconds.&lt;/P&gt;
&lt;P&gt;So to your question. It is partly by design that the sessions are not synchronized immediately.&lt;/P&gt;</description>
      <pubDate>Sat, 02 Nov 2024 16:14:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-failure-on-firewall-failover-Out-of-state-packets/m-p/231541#M44647</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2024-11-02T16:14:19Z</dc:date>
    </item>
    <item>
      <title>Re: Connection failure on firewall failover - Out of state packets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-failure-on-firewall-failover-Out-of-state-packets/m-p/231545#M44650</link>
      <description>&lt;P&gt;Fully agreed&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21670"&gt;@HeikoAnkenbrand&lt;/a&gt;,&amp;nbsp;the 3-second sync delay has solved most of the sync network health issues encountered in the past and is a good default setting performance wise.&amp;nbsp; Sync network bandwidth jumping 10X from 100Mbps to 1Gbps certainly helped too.&lt;/P&gt;</description>
      <pubDate>Sat, 02 Nov 2024 17:58:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-failure-on-firewall-failover-Out-of-state-packets/m-p/231545#M44650</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-11-02T17:58:23Z</dc:date>
    </item>
  </channel>
</rss>

