<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Policy Based Routing issue in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257742#M50488</link>
    <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/78158"&gt;@marcyn&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Grext explanation btw! Here is one question that pops up in my head...what does route to say 8.8.8.8 look like from debian host?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Fri, 19 Sep 2025 12:12:53 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-09-19T12:12:53Z</dc:date>
    <item>
      <title>Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257722#M50486</link>
      <description>&lt;P&gt;Hello CheckMates,&lt;/P&gt;&lt;P&gt;I'm struggling with an issue with PBR ... and I hope you will be able to put some light on this one.&lt;/P&gt;&lt;P&gt;Customer wants that some traffic should go different path then via default route ... so it's obvious that this is case for PBR.&lt;BR /&gt;But it doesn't work as expected.&lt;/P&gt;&lt;P&gt;I was able to recreate similar environment in my lab and it looks like this:&lt;BR /&gt;1) I have a Access Control rule:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="1.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31496i2734B1239D091A69/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;So as you can see any traffic FROM debian (10.20.200.222) will be matched.&lt;BR /&gt;2) PBR was configured to be Application Aware (it's a shame that this is hidden by default) - so I can create a rule in PBR that will tell gateway that it should match rule 1:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="2.png" style="width: 769px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31497i0A1398BA16B51F24/image-size/large?v=v2&amp;amp;px=999" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;3) Table 1: router forward traffic to different router (in my case 10.99.99.203)&lt;/P&gt;&lt;P&gt;So ... as you can see ... nothing odd, just a normal, simple PBR config.&lt;/P&gt;&lt;P&gt;This 10.99.99.203 router doesn't have network 10.20.200.0/24, but knows who has this network - based on static-route entry:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="3.png" style="width: 965px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31498iDA3E40771916AF4E/image-size/large?v=v2&amp;amp;px=999" role="button" title="3.png" alt="3.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;SPAN&gt;10.99.99.234 = my gateway, where I created PBR, etc.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Ok, now you know how it is configured ... but I will explain this below (just to be sure, you know everything &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;&amp;nbsp;) :&lt;BR /&gt;1) traffic (for example ping to 8.8.4.4) from 10.20.200.222 arrives on incoming interface on my router (10.99.99.234)&lt;BR /&gt;2) Access Control policy knows that it should be accepted and not send to external interface of this gateway, but to interface where 10.99.99.203 is connected&lt;BR /&gt;3) then this traffic arrives on router 10.99.99.203 and is accepted and is send to the internet&lt;BR /&gt;4) return traffic from 8.8.4.4 arrives on 10.99.99.203 and because this router doesn't have 10.20.200.0/24 network it will not forward this reply directly to "debian" ... but it will forward this traffic to 10.99.99.234 (via static-route)&lt;BR /&gt;5) so ... return traffic from 8.8.4.4 to 10.20.200.222 arrives on my gateway on interface where 10.99.99.203 is connected, and then it should go to "debian"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Simple...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But it doesn't work like that.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Take a look how it works (steps 1-5 from the above description):&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ad. 1)&lt;BR /&gt;root@debian:~# ping 8.8.4.4&lt;BR /&gt;PING 8.8.4.4 (8.8.4.4) 56(84) bytes of data.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ad. 2)&lt;BR /&gt;SG (10.99.99.234):&lt;BR /&gt;[vs_0][fw_1] eth2:i[44]: 10.20.200.222 -&amp;gt; 8.8.4.4 (ICMP) len=84 id=53134&lt;BR /&gt;[vs_0][fw_1] eth2:I[44]: 10.20.200.222 -&amp;gt; 8.8.4.4 (ICMP) len=84 id=53134&lt;BR /&gt;[vs_0][fw_1] eth0:o[44]: 10.20.200.222 -&amp;gt; 8.8.4.4 (ICMP) len=84 id=53134&lt;BR /&gt;[vs_0][fw_1] eth0:O[44]: 10.20.200.222 -&amp;gt; 8.8.4.4 (ICMP) len=84 id=53134&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;(traffic leaves 10.99.99.234 and goes to 10.99.99.203)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ad. 3)&lt;BR /&gt;router (10.99.99.203) - also Check Point:&lt;BR /&gt;[vs_0][fw_2] eth0:i[44]: 10.20.200.222 -&amp;gt; 8.8.4.4 (ICMP) len=84 id=53362&lt;BR /&gt;[vs_0][fw_2] eth0:I[44]: 10.20.200.222 -&amp;gt; 8.8.4.4 (ICMP) len=84 id=53362&lt;BR /&gt;[vs_0][fw_2] eth1:o[44]: 10.20.200.222 -&amp;gt; 8.8.4.4 (ICMP) len=84 id=53362&lt;BR /&gt;[vs_0][fw_2] eth1:O[44]: 203.0.113.203 -&amp;gt; 8.8.4.4 (ICMP) len=84 id=53362&lt;BR /&gt;(as you can see there is a NAT)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ad. 4)&lt;BR /&gt;[vs_0][fw_2] eth1:i[44]: 8.8.4.4 -&amp;gt; 203.0.113.203 (ICMP) len=84 id=0&lt;BR /&gt;[vs_0][fw_2] eth1:I[44]: 8.8.4.4 -&amp;gt; 10.20.200.222 (ICMP) len=84 id=0&lt;BR /&gt;[vs_0][fw_2] eth0:o[44]: 8.8.4.4 -&amp;gt; 10.20.200.222 (ICMP) len=84 id=0&lt;BR /&gt;[vs_0][fw_2] eth0:O[44]: 8.8.4.4 -&amp;gt; 10.20.200.222 (ICMP) len=84 id=0&lt;BR /&gt;(traffic leaves 10.99.99.203 and goes to 10.99.99.234)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ad. 5)&lt;BR /&gt;And .. here is my issue:&lt;BR /&gt;[vs_0][fw_1] eth0:i[44]: 8.8.4.4 -&amp;gt; 10.20.200.222 (ICMP) len=84 id=0&lt;BR /&gt;[vs_0][fw_1] eth0:I[44]: 8.8.4.4 -&amp;gt; 10.20.200.222 (ICMP) len=84 id=0&lt;BR /&gt;[vs_0][fw_1] eth0:o[44]: 8.8.4.4 -&amp;gt; 10.20.200.222 (ICMP) len=84 id=0&lt;BR /&gt;[vs_0][fw_1] eth0:O[44]: 8.8.4.4 -&amp;gt; 10.20.200.222 (ICMP) len=84 id=0&lt;BR /&gt;(traffic enters 10.99.99.234 on eth0 interface ... and stays here ... it is not routed to eth2 interface where this debian host exists)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;fw ctl zdebug + drop:&lt;BR /&gt;@;137323;[cpu_1];[fw4_2];fw_log_drop_ex: Packet proto=1 8.8.4.4:0 -&amp;gt; 10.20.200.222:19315 dropped by fw_first_packet_state_checks Reason: ICMP reply does not match a previous request;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have any idea what is wrong here ?&lt;BR /&gt;In case router 10.99.99.203 would have this network 10.20.200.0/24 there will be no issue at all, because return traffic would go directly from this router to "debian" ... but in this case this return traffic needs to go back to 10.99.99.234.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;And By The Way ... another issue:&lt;/STRONG&gt;&lt;BR /&gt;(this rule was disabled in above example ... that's why I had no NAT)&lt;BR /&gt;In case Customer would have Manual NAT rule ... not Automatic one ... PBR is doing NAT... and I have absolutely no idea why ?&lt;BR /&gt;For Automatic NAT - it will not do NAT for this PBR.&lt;BR /&gt;Take a look how my Manual NAT rule looks like:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="4.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31499iA39680738161FB44/image-size/large?v=v2&amp;amp;px=999" role="button" title="4.png" alt="4.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;So ... normal SNAT rule - any traffic from 10.20.200.0/24 to ExternalZone should be hidden behind Gateway's external IP.&lt;BR /&gt;But ... 10.99.99.203 router (this one in PBR rule) ... is behind interface that has InternalZone &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;Why this rule matches this traffic ? ... it looks like NAT is matched before routing ... and because of that Gateway decides that 8.8.4.4 is reachable via eth1 (external) interface ... not eth0 (here is this 10.99.99.203).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anybody ? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;Best&lt;BR /&gt;m.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Sep 2025 09:38:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257722#M50486</guid>
      <dc:creator>marcyn</dc:creator>
      <dc:date>2025-09-19T09:38:06Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257742#M50488</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/78158"&gt;@marcyn&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Grext explanation btw! Here is one question that pops up in my head...what does route to say 8.8.8.8 look like from debian host?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 19 Sep 2025 12:12:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257742#M50488</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-09-19T12:12:53Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257744#M50489</link>
      <description>&lt;P&gt;Hi Andy,&lt;/P&gt;&lt;P&gt;debian host knows nothing about this "other router" ... it's gateway is of course this one 10.99.99.234.&lt;BR /&gt;So any traffic from debian (10.20.200.222) directed to the Internet will go directly to Gateway with IP 10.99.99.234.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;Best&lt;BR /&gt;m.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Sep 2025 12:16:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257744#M50489</guid>
      <dc:creator>marcyn</dc:creator>
      <dc:date>2025-09-19T12:16:20Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257745#M50490</link>
      <description>&lt;P&gt;K, fair enough, so what does ip r g 8.8.8.8 show on the fw?&lt;/P&gt;</description>
      <pubDate>Fri, 19 Sep 2025 12:16:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257745#M50490</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-09-19T12:16:54Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257749#M50491</link>
      <description>&lt;P&gt;Of course default route &lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Sep 2025 12:20:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257749#M50491</guid>
      <dc:creator>marcyn</dc:creator>
      <dc:date>2025-09-19T12:20:21Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257751#M50492</link>
      <description>&lt;P&gt;Just making sure lol. Anyway, I know that zdebug drop you posted may refer to nat or possibly assymetric routing. Let me see if I can try this in the lab.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 19 Sep 2025 12:22:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257751#M50492</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-09-19T12:22:33Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257806#M50540</link>
      <description>&lt;P&gt;The PBR side of things seems to be working, but you have a stateful inspection drop for ICMP. Your final fw monitor though shows your o and O so it seems like it is actually going somewhere - can you validate with tcpdumps on eth0 and eth2 on that device?&lt;/P&gt;</description>
      <pubDate>Fri, 19 Sep 2025 22:57:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257806#M50540</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2025-09-19T22:57:12Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257812#M50543</link>
      <description>&lt;P&gt;Yes,&lt;BR /&gt;That's right ... because I see o and O it is obvious that this traffic was not blocked by FW.&lt;BR /&gt;However there should be routing in place ... this traffic should be forwarded to eth2.&lt;BR /&gt;&lt;BR /&gt;Anyway ... you asked about tcpdump - no problem, here you have it:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;[Expert@SG:0]# tcpdump -nnei eth0 icmp&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;10:57:02.807595 bc:24:11:fb:ea:30 &amp;gt; f2:f5:43:c6:50:8b, ethertype IPv4 (0x0800), length 98: 10.20.200.222 &amp;gt; 8.8.4.4: ICMP echo request, id 51904, seq 1, length 64&lt;BR /&gt;10:57:02.823689 f2:f5:43:c6:50:8b &amp;gt; bc:24:11:fb:ea:30, ethertype IPv4 (0x0800), length 98: 8.8.4.4 &amp;gt; 10.20.200.222: ICMP echo reply, id 51904, seq 1, length 64&lt;BR /&gt;10:57:02.823780 bc:24:11:fb:ea:30 &amp;gt; f2:f5:43:c6:50:8b, ethertype IPv4 (0x0800), length 98: 8.8.4.4 &amp;gt; 10.20.200.222: ICMP echo reply, id 51904, seq 1, length 64&lt;BR /&gt;10:57:03.819566 bc:24:11:fb:ea:30 &amp;gt; f2:f5:43:c6:50:8b, ethertype IPv4 (0x0800), length 98: 10.20.200.222 &amp;gt; 8.8.4.4: ICMP echo request, id 51904, seq 2, length 64&lt;BR /&gt;10:57:03.834611 f2:f5:43:c6:50:8b &amp;gt; bc:24:11:fb:ea:30, ethertype IPv4 (0x0800), length 98: 8.8.4.4 &amp;gt; 10.20.200.222: ICMP echo reply, id 51904, seq 2, length 64&lt;BR /&gt;10:57:03.834679 bc:24:11:fb:ea:30 &amp;gt; f2:f5:43:c6:50:8b, ethertype IPv4 (0x0800), length 98: 8.8.4.4 &amp;gt; 10.20.200.222: ICMP echo reply, id 51904, seq 2, length 64&lt;/P&gt;&lt;P&gt;As you can see ther is a pair request+reply ... and another reply.&lt;BR /&gt;First reply is FROM&amp;nbsp;f2:f5:43:c6:50:8b&amp;nbsp; = router behind PBR (10.99.99.203)&lt;BR /&gt;And it is addressed TO bc:24:11:fb:ea:30 = debian&lt;BR /&gt;And it's exactly what it should be (in my opinion) !&lt;BR /&gt;&lt;BR /&gt;[Expert@CP-GW1:0]# ip a l eth0&lt;BR /&gt;2: eth0: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP qlen 1000&lt;BR /&gt;link/ether f2:f5:43:c6:50:8b brd ff:ff:ff:ff:ff:ff&lt;BR /&gt;inet 10.99.99.203/24 brd 10.99.99.255 scope global eth0&lt;BR /&gt;&lt;BR /&gt;root@debian:~# ip a l ens18&lt;BR /&gt;2: ens18: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc fq_codel state UP group default qlen 1000&lt;BR /&gt;link/ether bc:24:11:7e:c1:0c brd ff:ff:ff:ff:ff:ff&lt;BR /&gt;altname enp0s18&lt;BR /&gt;inet 10.20.200.222/24 brd 10.20.200.255 scope global ens18&lt;BR /&gt;&lt;BR /&gt;But then ... this first reply instead of beeing routed to eth2 where this debian exists ... it is replied but this time:&lt;BR /&gt;FROM debian TO router 10.99.99.203 ... why ? ... it is as if this PBR rule interfere with this reply as if it was request...&lt;BR /&gt;It looks like this reply bounced back to the router behind PBR.&lt;/P&gt;&lt;P&gt;In case you wonder - arp table in my 10.99.99.234 = "source gateway" (where PBR is declared):&lt;BR /&gt;[Expert@SG:0]# arp -an&lt;BR /&gt;? (10.99.99.203) at f2:f5:43:c6:50:8b [ether] on eth0&lt;BR /&gt;? (10.20.200.222) at bc:24:11:7e:c1:0c [ether] on eth2&lt;BR /&gt;&lt;BR /&gt;Based on arp table ... it's obvious that this gateway exactly knows where this&amp;nbsp;bc:24:11:7e:c1:0c is located... =&amp;gt; eth2,&lt;BR /&gt;So why it bounced back this reply to&amp;nbsp;f2:f5:43:c6:50:8b (from&amp;nbsp;bc:24:11:7e:c1:0c).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't get it ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ah ... if you wanted - no problem - tcpdump from eth2:&lt;/P&gt;&lt;P&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on eth2, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;11:11:28.963040 bc:24:11:7e:c1:0c &amp;gt; bc:24:11:22:48:4a, ethertype IPv4 (0x0800), length 98: 10.20.200.222 &amp;gt; 8.8.4.4: ICMP echo request, id 10360, seq 1, length 64&lt;BR /&gt;11:11:29.963344 bc:24:11:7e:c1:0c &amp;gt; bc:24:11:22:48:4a, ethertype IPv4 (0x0800), length 98: 10.20.200.222 &amp;gt; 8.8.4.4: ICMP echo request, id 10360, seq 2, length 64&lt;/P&gt;&lt;P&gt;Only requests here ...&lt;/P&gt;&lt;P&gt;bc:24:11:22:48:4a = obviously gateway's IP on eth2 (10.20.200.254) = debian's default gateway&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;--&lt;BR /&gt;Best&lt;BR /&gt;m.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Sep 2025 09:16:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257812#M50543</guid>
      <dc:creator>marcyn</dc:creator>
      <dc:date>2025-09-20T09:16:07Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257817#M50544</link>
      <description>&lt;P&gt;You got me so curious now, I want to try this in the lab. But in the meantime, just a thought...what if you added a route to 10.20.200.0/24 on 10.99.99.203?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 20 Sep 2025 10:25:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257817#M50544</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-09-20T10:25:33Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257827#M50545</link>
      <description>&lt;P&gt;Andy, if there would be no route to 10.20.200.0/24 on 10.99.99.203, it would not work at all ... as this router doesn't have this network ... and I mentioned that in my opening message &lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So of course that 10.99.99.203 has a route to 10.20.200.0/24 with 10.99.99.234 as a gateway to this route.&lt;/P&gt;&lt;P&gt;BR, m.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Sep 2025 16:53:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257827#M50545</guid>
      <dc:creator>marcyn</dc:creator>
      <dc:date>2025-09-20T16:53:48Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257828#M50546</link>
      <description>&lt;P&gt;Let me try this in the lab tomorrow.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Sep 2025 16:59:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257828#M50546</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-09-20T16:59:27Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257859#M50554</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/78158"&gt;@marcyn&lt;/a&gt;&amp;nbsp;I replicated this and its exact same issue as you. I tested on R82 jumbo 41 (latest) one. Now its good challenge to fix it : - )&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 22 Sep 2025 00:44:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257859#M50554</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-09-22T00:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257860#M50555</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/78158"&gt;@marcyn&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is how I fixed it&lt;/P&gt;
&lt;P&gt;Enabled this kernel parameter -&amp;gt;&amp;nbsp;&lt;SPAN&gt;fw ctl set int fw_allow_asymmetric_routing 1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 22 Sep 2025 01:31:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257860#M50555</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-09-22T01:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257873#M50558</link>
      <description>&lt;P&gt;Hi Andy,&lt;/P&gt;&lt;P&gt;Thanks for your work on this one.&lt;BR /&gt;Because it's the 3rd environment where the same issue occurs ... it's not a coincidence &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I'm glad that you found a fix ... but ...&lt;BR /&gt;1) why asymmetric routing ? ... request:&amp;nbsp; incomming = eth2, outgouing = eth0, and as we saw reply goes from eth0 and should go to eth2 ... I don't see here asymmetric routing &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;SG (10.99.99.234):&lt;BR /&gt;10:04:19.480446 &lt;STRONG&gt;In bc:24:11:7e:c1:0c&lt;/STRONG&gt; ethertype IPv4 (0x0800), length 100: 10.20.200.222 &amp;gt; 8.8.4.4: &lt;STRONG&gt;ICMP echo request, id 58102, seq 1&lt;/STRONG&gt;, length 64&lt;BR /&gt;10:04:19.480730 &lt;STRONG&gt;Out bc:24:11:fb:ea:30&lt;/STRONG&gt; ethertype IPv4 (0x0800), length 100: 10.20.200.222 &amp;gt; 8.8.4.4: &lt;STRONG&gt;ICMP echo request, id 58102, seq 1&lt;/STRONG&gt;, length 64&lt;BR /&gt;10:04:19.497326 &lt;STRONG&gt;In f2:f5:43:c6:50:8b&lt;/STRONG&gt; ethertype IPv4 (0x0800), length 100: 8.8.4.4 &amp;gt; 10.20.200.222: &lt;STRONG&gt;ICMP echo reply, id 58102, seq 1&lt;/STRONG&gt;, length 64&lt;BR /&gt;10:04:19.497416 &lt;STRONG&gt;Out bc:24:11:fb:ea:30&lt;/STRONG&gt; ethertype IPv4 (0x0800), length 100: 8.8.4.4 &amp;gt; 10.20.200.222: &lt;STRONG&gt;ICMP echo reply,&lt;/STRONG&gt; &lt;STRONG&gt;id 58102, seq 1&lt;/STRONG&gt;, length 64&lt;BR /&gt;&lt;BR /&gt;CP-GW1 (10.99.99.203):&lt;BR /&gt;10:04:19.530303&lt;STRONG&gt; In bc:24:11:fb:ea:30&lt;/STRONG&gt; ethertype IPv4 (0x0800), length 100: 10.20.200.222 &amp;gt; 8.8.4.4: &lt;STRONG&gt;ICMP echo request, id 58102, seq 1&lt;/STRONG&gt;, length 64&lt;BR /&gt;10:04:19.530597 &lt;STRONG&gt;Out 62:93:df:1c:11:3b&lt;/STRONG&gt; ethertype IPv4 (0x0800), length 100: 203.0.113.203 &amp;gt; 8.8.4.4: &lt;STRONG&gt;ICMP echo request, id 26668, seq 1&lt;/STRONG&gt;, length 64&lt;BR /&gt;10:04:19.546660 &lt;STRONG&gt;In 26:cb:19:cd:cc:57&lt;/STRONG&gt; ethertype IPv4 (0x0800), length 100: 8.8.4.4 &amp;gt; 203.0.113.203: &lt;STRONG&gt;ICMP echo reply, id 26668, seq 1&lt;/STRONG&gt;, length 64&lt;BR /&gt;10:04:19.546713&lt;STRONG&gt; Out f2:f5:43:c6:50:8b&lt;/STRONG&gt; ethertype IPv4 (0x0800), length 100: 8.8.4.4 &amp;gt; 10.20.200.222: &lt;STRONG&gt;ICMP echo reply, id 58102, seq 1&lt;/STRONG&gt;, length 64&lt;BR /&gt;&lt;EM&gt;&lt;U&gt;10:04:19.546957 In bc:24:11:fb:ea:30 ethertype IPv4 (0x0800), length 100: 8.8.4.4 &amp;gt; 10.20.200.222: ICMP echo reply, id 58102, seq 1, length 64&amp;nbsp; &amp;nbsp; &amp;lt;-- ???&lt;/U&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;So based on the above:&lt;BR /&gt;1) seq1 with id = 58102 was received on incomming interface of my 1st gateway (10.99.99.234)&lt;BR /&gt;2) this packed was then forwarded by PBR to 2nd machine (10.99.99.203) /we can clearly see the sam id on incomming interface of 10.99.99.203/&lt;BR /&gt;3) then 10.99.99.203 sends this packet to the internet (the is different id =&amp;nbsp;26668) and it receives reply to id = 26668&lt;BR /&gt;4) this reply is then send from 10.99.99.203 to 10.99.99.234 with id = 58102, and it is received by 10.99.99.234 on eth0 interface with valid and expected id = 58102&lt;BR /&gt;&lt;BR /&gt;For me there is no asymmetric routing here...&lt;BR /&gt;&lt;BR /&gt;5) then 10.99.99.203 for some reason receives the same reply with id = 58102 ... but as an incomming messega on eth0 interface from 10.99.99.234:&lt;BR /&gt;[Expert@CP-GW1:0]# arp -na | grep bc:24:11:fb:ea:30&lt;BR /&gt;? (10.99.99.234) at bc:24:11:fb:ea:30 [ether] on eth0&lt;/P&gt;&lt;P&gt;And this a mistery for me...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyway ... I decided to test your fix (I don't get it why it could fix this ... but ok, why not to test).&lt;BR /&gt;And unfortunately on R81.20 it's not working:&lt;BR /&gt;&lt;EM&gt;[Expert@SG:0]# fw ctl set int fw_allow_asymmetric_routing 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Set operation failed: failed to get parameter fw_allow_asymmetric_routing&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;set: Operation failed&lt;/EM&gt;&lt;BR /&gt;I checked and there is no such parameter indeed.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;But ... Customer has R82 ... so ... I can check this out on R82 as well &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;BR /&gt;But2 ... I would also like to understand this, why asymmetric rounting ... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;Best&lt;BR /&gt;m.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Sep 2025 08:21:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257873#M50558</guid>
      <dc:creator>marcyn</dc:creator>
      <dc:date>2025-09-22T08:21:42Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257879#M50559</link>
      <description>&lt;P&gt;Unfortunately on R82 JHF41 this kernel parameter is not supported in my machine as well...&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;[Expert@SG:0]# cpinfo -y FW1 | grep Take&lt;/P&gt;&lt;P&gt;This is Check Point CPinfo Build 914000250 for GAIA&lt;BR /&gt;HOTFIX_R82_JUMBO_HF_MAIN Take: 41&lt;BR /&gt;[Expert@SG:0]# fw ctl get int fw_allow_asymmetric_routing&lt;BR /&gt;Get operation failed: failed to get parameter fw_allow_asymmetric_routing&lt;BR /&gt;get: Operation failed&lt;BR /&gt;Killed&lt;BR /&gt;[Expert@SG:0]# fw ctl set int fw_allow_asymmetric_routing 1&lt;BR /&gt;Set operation failed: failed to get parameter fw_allow_asymmetric_routing&lt;BR /&gt;set: Operation failed&lt;BR /&gt;Killed&lt;BR /&gt;[Expert@SG:0]#&lt;BR /&gt;&lt;BR /&gt;So ever that I don't get it why this fixed it for you Andy ... it will not work for me &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;Best&lt;BR /&gt;m.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Sep 2025 10:09:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257879#M50559</guid>
      <dc:creator>marcyn</dc:creator>
      <dc:date>2025-09-22T10:09:16Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257885#M50562</link>
      <description>&lt;P&gt;Will check my lab later on and update you.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 22 Sep 2025 11:21:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257885#M50562</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-09-22T11:21:59Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257893#M50565</link>
      <description>&lt;P&gt;Hey mate,&lt;/P&gt;
&lt;P&gt;So sorry, I pasted wrong kernel parameter, that does not work in R82 either, just tried it. I meant this one:&lt;/P&gt;
&lt;P&gt;fw ctl set int fw_allow_out_of_state_tcp 1&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 22 Sep 2025 12:06:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257893#M50565</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-09-22T12:06:17Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257896#M50568</link>
      <description>&lt;P&gt;Hello Andy,&lt;/P&gt;&lt;P&gt;I don't like this solution to allow oos ... and I don't see any relation with this issue.&lt;BR /&gt;But because this is a lab (at least my environment &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; ) .. why not to just check what will be the resuls ... so I checked and it didn't help me.&lt;/P&gt;&lt;P&gt;So question still remains:&lt;BR /&gt;[vs_0][fw_1] eth0:i[44]: 8.8.4.4 -&amp;gt; 10.20.200.222 (ICMP) len=84 id=0&lt;BR /&gt;[vs_0][fw_1] eth0:I[44]: 8.8.4.4 -&amp;gt; 10.20.200.222 (ICMP) len=84 id=0&lt;BR /&gt;[vs_0][fw_1] eth0:o[44]: 8.8.4.4 -&amp;gt; 10.20.200.222 (ICMP) len=84 id=0&lt;BR /&gt;[vs_0][fw_1] eth0:O[44]: 8.8.4.4 -&amp;gt; 10.20.200.222 (ICMP) len=84 id=0&lt;BR /&gt;&lt;BR /&gt;wtf ?&lt;/P&gt;&lt;P&gt;It looks like I'll need to contact TAC with this one ...&lt;/P&gt;&lt;P&gt;But still, thank you Andy for your afford and time.&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;Best&lt;BR /&gt;m.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Sep 2025 12:57:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257896#M50568</guid>
      <dc:creator>marcyn</dc:creator>
      <dc:date>2025-09-22T12:57:41Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257898#M50570</link>
      <description>&lt;P&gt;I agree 10%, trust me, I would not do that either in production : - )&lt;/P&gt;
&lt;P&gt;Let us know what TAC says.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 22 Sep 2025 13:00:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257898#M50570</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-09-22T13:00:12Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Based Routing issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257956#M50582</link>
      <description>&lt;P&gt;That is weird, it looks like your debian server is bouncing the reply back to the gateway - which then explains the drops, because the gateway is seeing the same packet twice and dropping it the second time around, this is normal behaviour as far as the gateway is concerned.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2025 01:47:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Based-Routing-issue/m-p/257956#M50582</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2025-09-23T01:47:17Z</dc:date>
    </item>
  </channel>
</rss>

