<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: sysctl net.ipv4.tcp_timestamps in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/sysctl-net-ipv4-tcp-timestamps/m-p/64273#M4902</link>
    <description>&lt;P&gt;Hi, thanks for the reaction. According to the note below the SK: &lt;STRONG&gt;Note:&amp;nbsp;&lt;/STRONG&gt;This change will only be applied to local connections (connections where the source or destination is the gateway).&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;So not sure if this will work ?&lt;/P&gt;&lt;P&gt;kind regards,Mikel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 03 Oct 2019 08:42:13 GMT</pubDate>
    <dc:creator>Mikel_Aanstoot</dc:creator>
    <dc:date>2019-10-03T08:42:13Z</dc:date>
    <item>
      <title>sysctl net.ipv4.tcp_timestamps</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/sysctl-net-ipv4-tcp-timestamps/m-p/64141#M4894</link>
      <description>&lt;P&gt;Hi, we see on a checkpoint 5900 R80.10 cluster when Mac and Linux clients are going to certain websites that those websites load very slow or not at all. In tcpdump traces we see a lot of retransmission and dup ack's stalling the TCP session. In Windows we do not see this behaviour at all. We finally found this to happen when on the client this is set: net.ipv4.tcp_timestamps=1. In Linux you can disable this and then we do not see this issue but on Mac since El Capitan you can not disable this anymore. When you change this setting on a Windows client by&amp;nbsp;netsh int tcp set global timestamps=enabled&amp;nbsp; than you have the same behaviour. When using a proxy server for Mac clients with the tcp timestamps setting disabled also this problem disappears.&lt;/P&gt;&lt;P&gt;When the Mac and Linux clients are connected to a 1490 SMB this behaviour does not appear, so it is the combination client, Mac &amp;amp; Linux with&amp;nbsp;net.ipv4.tcp_timestamps=1 set and our Checkpoint 5900 with R80.10 (although we also saw this on a 12210 with R77.x in 2016 when&amp;nbsp; Mac went to Yosemite. We could only replicate it then when the Checkpoint had a high load and this behaviour disappeared after some tweaking with the multiple processors and added more memory.)&lt;/P&gt;&lt;P&gt;On the gateway policy we disabled all IPS, TCP Inspection settings but problem persists. Anybody else aware of some setting so the checkpoint works good with clients with tcp timestamps enabled ?&lt;/P&gt;&lt;P&gt;kind regards,&lt;/P&gt;&lt;P&gt;Mikel Aanstoot&lt;/P&gt;</description>
      <pubDate>Wed, 02 Oct 2019 09:36:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/sysctl-net-ipv4-tcp-timestamps/m-p/64141#M4894</guid>
      <dc:creator>Mikel_Aanstoot</dc:creator>
      <dc:date>2019-10-02T09:36:18Z</dc:date>
    </item>
    <item>
      <title>Re: sysctl net.ipv4.tcp_timestamps</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/sysctl-net-ipv4-tcp-timestamps/m-p/64154#M4895</link>
      <description>&lt;P&gt;What about disabling it following &amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk62700&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank"&gt;sk62700: How to disable TCP timestamps (RFC 1323)&lt;/A&gt;&amp;nbsp;?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Oct 2019 12:20:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/sysctl-net-ipv4-tcp-timestamps/m-p/64154#M4895</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-10-02T12:20:20Z</dc:date>
    </item>
    <item>
      <title>Re: sysctl net.ipv4.tcp_timestamps</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/sysctl-net-ipv4-tcp-timestamps/m-p/64273#M4902</link>
      <description>&lt;P&gt;Hi, thanks for the reaction. According to the note below the SK: &lt;STRONG&gt;Note:&amp;nbsp;&lt;/STRONG&gt;This change will only be applied to local connections (connections where the source or destination is the gateway).&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;So not sure if this will work ?&lt;/P&gt;&lt;P&gt;kind regards,Mikel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Oct 2019 08:42:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/sysctl-net-ipv4-tcp-timestamps/m-p/64273#M4902</guid>
      <dc:creator>Mikel_Aanstoot</dc:creator>
      <dc:date>2019-10-03T08:42:13Z</dc:date>
    </item>
    <item>
      <title>Re: sysctl net.ipv4.tcp_timestamps</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/sysctl-net-ipv4-tcp-timestamps/m-p/67774#M5171</link>
      <description>&lt;P&gt;FYI: We have opened a TAC case for this and Checkpoint confirmed our issue. We have received a HotFix for this issue and this seems to work perfectly. We only find it surprising that not more companies/people are affected by this behaviour. We don't have that specific config and would have expected that any Mac / Linux client could have experienced this issue.&lt;/P&gt;&lt;P&gt;Mikel&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2019 06:41:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/sysctl-net-ipv4-tcp-timestamps/m-p/67774#M5171</guid>
      <dc:creator>Mikel_Aanstoot</dc:creator>
      <dc:date>2019-11-19T06:41:48Z</dc:date>
    </item>
  </channel>
</rss>

