<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: unknown drops in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/unknown-drops-fwmultik-process-f2p-cookie-inner/m-p/246970#M48186</link>
    <description>&lt;P&gt;R81.20 take 89, UserCheck is active with block page for malicious content.&lt;/P&gt;</description>
    <pubDate>Tue, 22 Apr 2025 09:05:58 GMT</pubDate>
    <dc:creator>Wolfgang</dc:creator>
    <dc:date>2025-04-22T09:05:58Z</dc:date>
    <item>
      <title>unknown drops...fwmultik_process_f2p_cookie_inner</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/unknown-drops-fwmultik-process-f2p-cookie-inner/m-p/246968#M48184</link>
      <description>&lt;P&gt;We see drops via "g_fw ctl zdedug drop" for connections between two proxies. We had some performance problems with several vidoconferencingsystems but we are not sure if this will be related.&lt;/P&gt;
&lt;P&gt;Maybe someone saw this errors in the past and can be explain.&lt;/P&gt;
&lt;P&gt;[1_01]@;2687694620.9248412;[vs_3];[tid_4];[fw4_4];fw_log_drop_ex: Packet proto=6 Proxy_02:8080 -&amp;gt; Proxy_01:50878 dropped by f&lt;STRONG&gt;wmultik_process_f2p_cookie_inner Reason: PSL Drop: TLS_PARSER&lt;/STRONG&gt;&lt;BR /&gt;[1_01]@;2687694622.9248413;[vs_3];[tid_4];[fw4_4];fw_log_drop_ex: Packet proto=6 Proxy_02:8080 -&amp;gt; Proxy_01:50878 dropped by fwmultik_process_f2p_cookie_inner Reason: PSL Drop: TLS_PARSER&lt;BR /&gt;[1_01]@;2687694624.9248414;[vs_3];[tid_4];[fw4_4];fw_log_drop_ex: Packet proto=6 Proxy_02:8080 -&amp;gt; Proxy_01:50878 dropped by fwmultik_process_f2p_cookie_inner Reason: PSL Drop: TLS_PARSER&lt;BR /&gt;[1_01]@;2687694626.9248415;[vs_3];[tid_4];[fw4_4];fw_log_drop_ex: Packet proto=6 Proxy_02:8080 -&amp;gt; Proxy_01:50878 dropped by fwmultik_process_f2p_cookie_inner Reason: PSL Drop: TLS_PARSER&lt;BR /&gt;[1_01]@;2687815396.9322859;[vs_3];[tid_2];[fw4_2];fw_log_drop_ex: Packet proto=6 Proxy_02:8080 -&amp;gt; Proxy_01:34220 dropped by &lt;STRONG&gt;fwmultik_process_f2p_cookie_inner Reason: PSL Drop: MUX_PASSIVE&lt;/STRONG&gt;&lt;BR /&gt;[1_01]@;2687815397.9322860;[vs_3];[tid_2];[fw4_2];fw_log_drop_ex: Packet proto=6 Proxy_01:34220 -&amp;gt; Proxy_02:8080 dropped by fwmultik_process_f2p_cookie_inner Reason: PSL Drop: MUX_PASSIVE&lt;BR /&gt;[1_03]@;2702488823.33144368;[vs_3];[tid_0];[fw4_0];fw_log_drop_ex: Packet proto=6 Proxy_02:8080 -&amp;gt; Proxy_03:48020 dropped by fwmultik_process_f2p_cookie_inner Reason: PSL Drop: TLS_PARSER&lt;BR /&gt;[1_03]@;2702488825.33144369;[vs_3];[tid_0];[fw4_0];fw_log_drop_ex: Packet proto=6 Proxy_02:8080 -&amp;gt; Proxy_03:48020 dropped by fwmultik_process_f2p_cookie_inner Reason: PSL Drop: TLS_PARSER&lt;BR /&gt;[1_03]@;2702488827.33144370;[vs_3];[tid_0];[fw4_0];fw_log_drop_ex: Packet proto=6 Proxy_02:8080 -&amp;gt; Proxy_03:48020 dropped by fwmultik_process_f2p_cookie_inner Reason: PSL Drop: TLS_PARSER&lt;BR /&gt;[1_03]@;2702488829.33144371;[vs_3];[tid_0];[fw4_0];fw_log_drop_ex: Packet proto=6 Proxy_02:8080 -&amp;gt; Proxy_03:48020 dropped by fwmultik_process_f2p_cookie_inner Reason: PSL Drop: TLS_PARSER&lt;BR /&gt;[1_01]@;2687815456.9322913;[vs_3];[tid_5];[fw4_5];fw_log_drop_ex: Packet proto=6 Proxy_02:8080 -&amp;gt; Proxy_01:34422 dropped by fwmultik_process_f2p_cookie_inner Reason: PSL Drop: MUX_PASSIVE&lt;BR /&gt;[1_01]@;2687815457.9322914;[vs_3];[tid_5];[fw4_5];fw_log_drop_ex: Packet proto=6 Proxy_01:34422 -&amp;gt; Proxy_02:8080 dropped by fwmultik_process_f2p_cookie_inner Reason: PSL Drop: MUX_PASSIVE&lt;BR /&gt;[1_03]@;2702488918.33144405;[vs_3];[tid_3];[fw4_3];fw_log_drop_ex: Packet proto=6 Proxy_02:8080 -&amp;gt; Proxy_03:48024 dropped by fwmultik_process_f2p_cookie_inner Reason: PSL Drop: MUX_PASSIVE&lt;BR /&gt;[1_03]@;2702488919.33144406;[vs_3];[tid_3];[fw4_3];fw_log_drop_ex: Packet proto=6 Proxy_03:48024 -&amp;gt; Proxy_02:8080 dropped by fwmultik_process_f2p_cookie_inner Reason: PSL Drop: MUX_PASSIVE&lt;/P&gt;
&lt;P&gt;TAC case is already open to investigate, but no more information right now.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 09:03:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/unknown-drops-fwmultik-process-f2p-cookie-inner/m-p/246968#M48184</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2025-04-22T09:03:02Z</dc:date>
    </item>
    <item>
      <title>Re: unknown drops</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/unknown-drops-fwmultik-process-f2p-cookie-inner/m-p/246969#M48185</link>
      <description>&lt;P&gt;Which gateway version &amp;amp; Jumbo, is UserCheck enabled here out of interest?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 09:02:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/unknown-drops-fwmultik-process-f2p-cookie-inner/m-p/246969#M48185</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-04-22T09:02:12Z</dc:date>
    </item>
    <item>
      <title>Re: unknown drops</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/unknown-drops-fwmultik-process-f2p-cookie-inner/m-p/246970#M48186</link>
      <description>&lt;P&gt;R81.20 take 89, UserCheck is active with block page for malicious content.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 09:05:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/unknown-drops-fwmultik-process-f2p-cookie-inner/m-p/246970#M48186</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2025-04-22T09:05:58Z</dc:date>
    </item>
    <item>
      <title>Re: unknown drops...fwmultik_process_f2p_cookie_inner</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/unknown-drops-fwmultik-process-f2p-cookie-inner/m-p/246978#M48187</link>
      <description>&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk167953" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk177610" target="_blank" rel="noopener"&gt;sk177610: Security Gateway generates logs with the action "Redirect", although the Access Control rule is configured with the action "Drop" and with the "Blocked Message - Access Control"&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk164972" target="_blank" rel="noopener"&gt;sk164972: Websites time out instead of redirecting to UserCheck&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 09:44:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/unknown-drops-fwmultik-process-f2p-cookie-inner/m-p/246978#M48187</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-04-22T09:44:42Z</dc:date>
    </item>
    <item>
      <title>Re: unknown drops...fwmultik_process_f2p_cookie_inner</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/unknown-drops-fwmultik-process-f2p-cookie-inner/m-p/247001#M48195</link>
      <description>&lt;P&gt;For what its worth, because I feel like I always have to say this now, AI answers should be taken with grain of salt, below is what AI copilot gave me and when I search for this in KB, same sk&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;&amp;nbsp;provided came up (2nd one).&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;************************&lt;/P&gt;
&lt;P&gt;The error message&lt;CODE&gt;fwmultik_process_f2p_cookie_inner Reason: Passive Streaming Layer Drop: MUX_PASSIVE&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;indicates that the packet was dropped by the Passive Streaming Layer (PSL) due to a MUX_PASSIVE reason.&lt;/P&gt;
&lt;H3&gt;Explanation:&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Passive Streaming Layer (PSL)&lt;/STRONG&gt;: This is an infrastructure layer in Check Point's security architecture that reassembles TCP packets into a protocol message. It ensures that only valid packets are allowed to proceed to their destinations by reordering packets and allowing inspection on the packets.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MUX (Multiplexer)&lt;/STRONG&gt;: This layer works between the Streaming layer and the Applications layer. It can choose to work over PSL (passive streaming) or CPAS (active streaming).&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Possible Causes:&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Invalid or Malformed Packets&lt;/STRONG&gt;: The packet might be malformed or invalid, causing the PSL to drop it.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Performance Issues&lt;/STRONG&gt;: There might be performance issues on the Security Gateway, causing delays or drops in packet processing.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Connectivity Issues&lt;/STRONG&gt;: Network connectivity issues between the end-user computers and the Security Gateway might lead to packet drops.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;Recommended Actions:&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Examine Network Connectivity&lt;/STRONG&gt;: Check for any network connectivity issues between the end-user computers and the Security Gateway.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Check Security Gateway Performance&lt;/STRONG&gt;: Look for any performance issues on the Security Gateway that might be causing delays or drops in packet processing.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Review Logs&lt;/STRONG&gt;: Analyze the logs to identify any patterns or specific conditions under which the packets are being dropped.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;For more detailed information, you can refer to the related solutions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk109814" target="_blank" rel="noopener"&gt;sk109814&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- What does "Redirect" action mean in Anti-Bot/Anti-Virus?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If the issue persists, consider opening a ticket with Check Point Support Center for further assistance.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 12:26:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/unknown-drops-fwmultik-process-f2p-cookie-inner/m-p/247001#M48195</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-04-22T12:26:38Z</dc:date>
    </item>
  </channel>
</rss>

