<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ICMP generated by CP itself does not leave the Firewall in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/ICMP-generated-by-CP-itself-does-not-leave-the-Firewall/m-p/52974#M10558</link>
    <description>&lt;P&gt;The VPNs are built under the other firewall so for this firewall is normal traffic. anyway, using the IP as source instead of eth it's working.&lt;/P&gt;&lt;P&gt;Is this normal?&lt;/P&gt;&lt;P&gt;[Expert@FW1]# ping -I 172.28.10.2 10.20.20.1&lt;/P&gt;&lt;P&gt;[Expert@FW1]# tcpdump -nni eth3.439 host 10.20.20.1&lt;/P&gt;&lt;P&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on eth3.439, link-type EN10MB (Ethernet), capture size 96 bytes&lt;BR /&gt;09:20:28.957779 IP 172.28.10.2 &amp;gt; 10.20.20.1: ICMP echo request, id 65046, seq 47, length 64&lt;BR /&gt;09:20:29.957711 IP 172.28.10.2 &amp;gt; 10.20.20.1: ICMP echo request, id 65046, seq 48, length 64&lt;BR /&gt;09:20:30.957639 IP 172.28.10.2 &amp;gt; 10.20.20.1: ICMP echo request, id 65046, seq 49, length 64&lt;/P&gt;</description>
    <pubDate>Thu, 09 May 2019 07:23:51 GMT</pubDate>
    <dc:creator>Fernando_Pizzam</dc:creator>
    <dc:date>2019-05-09T07:23:51Z</dc:date>
    <item>
      <title>ICMP generated by CP itself does not leave the Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ICMP-generated-by-CP-itself-does-not-leave-the-Firewall/m-p/52883#M10532</link>
      <description>&lt;P&gt;Hi guys, this is my first post here.&lt;/P&gt;&lt;P&gt;I've a strange situation, it's not something impacting for my customer but I'd like to go deeply into this and try to understand what's going on.&lt;/P&gt;&lt;P&gt;I'm trying to ping a device connected behind a VPN installed in another firewall using as source one interface physically connected to the 1st firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The destination is known;&lt;/P&gt;&lt;P&gt;[Expert@FW1]# ip route get 10.20.20.2&lt;BR /&gt;10.20.20.2 via 10.39.39.3 dev eth3.439 src 10.39.39.252&lt;BR /&gt;cache mtu 1500 advmss 1460 hoplimit 64&lt;/P&gt;&lt;P&gt;The source is this one:&lt;/P&gt;&lt;P&gt;[Expert@FW1]# ip route get 172.28.10.0&lt;BR /&gt;broadcast 172.28.10.0 dev eth3.412 src 172.28.10.2&lt;BR /&gt;cache &amp;lt;local,brd&amp;gt; mtu 1500 advmss 1460 hoplimit 64&lt;/P&gt;&lt;P&gt;ping -I eth3.412 10.20.20.2&lt;/P&gt;&lt;P&gt;PING 10.20.20.2 (10.20.20.2) from 172.28.10.2 eth3.412: 56(84) bytes of data.&lt;BR /&gt;From 172.28.10.2 icmp_seq=2 Destination Host Unreachable&lt;BR /&gt;From 172.28.10.2 icmp_seq=3 Destination Host Unreachable&lt;BR /&gt;From 172.28.10.2 icmp_seq=4 Destination Host Unreachable&lt;/P&gt;&lt;P&gt;--- 10.20.20.2 ping statistics ---&lt;BR /&gt;4 packets transmitted, 0 received, +3 errors, 100% packet loss, time 3000ms&lt;/P&gt;&lt;P&gt;The interesting part is that a tcpdump shows only this:&lt;/P&gt;&lt;P&gt;[Expert@SFW1]# tcpdump -nni any host 10.20.20.2&lt;BR /&gt;tcpdump: WARNING: Promiscuous mode not supported on the "any" device&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on any, link-type LINUX_SLL (Linux cooked), capture size 96 bytes&lt;BR /&gt;11:39:17.295162 arp who-has 10.20.20.2 tell 172.28.10.2&lt;BR /&gt;11:39:17.295164 arp who-has 10.20.20.2 tell 172.28.10.2&lt;BR /&gt;11:39:18.295084 arp who-has 10.20.20.2 tell 172.28.10.2&lt;BR /&gt;11:39:18.295086 arp who-has 10.20.20.2 tell 172.28.10.2&lt;BR /&gt;11:39:19.295006 arp who-has 10.20.20.2 tell 172.28.10.2&lt;BR /&gt;11:39:19.295008 arp who-has 10.20.20.2 tell 172.28.10.2&lt;BR /&gt;11:39:21.294846 arp who-has 10.20.20.2 tell 172.28.10.2&lt;BR /&gt;11:39:21.294848 arp who-has 10.20.20.2 tell 172.28.10.2&lt;/P&gt;&lt;P&gt;In the logs traffic is accepted and with the fw ctl zdebug drop there is no evdience of any dropped packet.&lt;/P&gt;&lt;P&gt;Below a fwmonitor&lt;/P&gt;&lt;P&gt;[vs_0][fw_1] eth3.412:o[84]: 172.28.10.2 -&amp;gt; 10.20.20.2 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=4973 seq=93&lt;BR /&gt;[vs_0][fw_1] eth3.412:O[84]: 172.28.10.2 -&amp;gt; 10.20.20.2 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=4973 seq=93&lt;BR /&gt;[vs_0][fw_1] eth3.412:o[84]: 172.28.10.2 -&amp;gt; 10.20.20.2 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=4973 seq=94&lt;BR /&gt;[vs_0][fw_1] eth3.412:O[84]: 172.28.10.2 -&amp;gt; 10.20.20.2 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=4973 seq=94&lt;BR /&gt;[vs_0][fw_1] eth3.412:o[84]: 172.28.10.2 -&amp;gt; 10.20.20.2 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=4973 seq=95&lt;BR /&gt;[vs_0][fw_1] eth3.412:O[84]: 172.28.10.2 -&amp;gt; 10.20.20.2 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=4973 seq=95&lt;BR /&gt;[vs_0][fw_1] eth3.412:o[84]: 172.28.10.2 -&amp;gt; 10.20.20.2 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=4973 seq=96&lt;BR /&gt;[vs_0][fw_1] eth3.412:O[84]: 172.28.10.2 -&amp;gt; 10.20.20.2 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=4973 seq=96&lt;BR /&gt;[vs_0][fw_1] eth3.412:o[84]: 172.28.10.2 -&amp;gt; 10.20.20.2 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=4973 seq=97&lt;BR /&gt;[vs_0][fw_1] eth3.412:O[84]: 172.28.10.2 -&amp;gt; 10.20.20.2 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=4973 seq=97&lt;BR /&gt;[vs_0][fw_1] eth3.412:o[84]: 172.28.10.2 -&amp;gt; 10.20.20.2 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=4973 seq=98&lt;BR /&gt;[vs_0][fw_1] eth3.412:O[84]: 172.28.10.2 -&amp;gt; 10.20.20.2 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=4973 seq=98&lt;BR /&gt;[vs_0][fw_1] eth3.412:o[84]: 172.28.10.2 -&amp;gt; 10.20.20.2 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=4973 seq=99&lt;BR /&gt;[vs_0][fw_1] eth3.412:O[84]: 172.28.10.2 -&amp;gt; 10.20.20.2 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=4973 seq=99&lt;BR /&gt;[vs_0][fw_1] eth3.412:o[84]: 172.28.10.2 -&amp;gt; 10.20.20.2 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=4973 seq=100&lt;BR /&gt;[vs_0][fw_1] eth3.412:O[84]: 172.28.10.2 -&amp;gt; 10.20.20.2 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=4973 seq=100&lt;/P&gt;&lt;P&gt;Traffic doesn't live the generating interface.&lt;/P&gt;&lt;P&gt;Someone can help me?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance gurus&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2019 10:10:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ICMP-generated-by-CP-itself-does-not-leave-the-Firewall/m-p/52883#M10532</guid>
      <dc:creator>Fernando_Pizzam</dc:creator>
      <dc:date>2019-05-08T10:10:32Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP generated by CP itself does not leave the Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ICMP-generated-by-CP-itself-does-not-leave-the-Firewall/m-p/52953#M10554</link>
      <description>You might try fw monitor with -p all to see what chain the packet makes it to and compare with fw ctl chain.</description>
      <pubDate>Thu, 09 May 2019 00:31:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ICMP-generated-by-CP-itself-does-not-leave-the-Firewall/m-p/52953#M10554</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-05-09T00:31:40Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP generated by CP itself does not leave the Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ICMP-generated-by-CP-itself-does-not-leave-the-Firewall/m-p/52972#M10556</link>
      <description>&lt;P&gt;Is ping -I [ip of eth3.412] 10.20.20.2 working? Are all networks in the encryption domain? Could you provide a sketch of the setup please?&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2019 07:14:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ICMP-generated-by-CP-itself-does-not-leave-the-Firewall/m-p/52972#M10556</guid>
      <dc:creator>Benedikt_Weissl</dc:creator>
      <dc:date>2019-05-09T07:14:08Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP generated by CP itself does not leave the Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ICMP-generated-by-CP-itself-does-not-leave-the-Firewall/m-p/52973#M10557</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;chain ends:&lt;/P&gt;&lt;P&gt;out chain (18):&lt;BR /&gt;0: -7f800000 (ffffffff887fff30) (ffffffff) IP Options Strip (out) (ipopt_strip)&lt;BR /&gt;1: -78000000 (ffffffff88fd3ac0) (00000003) vpn multik forward out&lt;BR /&gt;2: - 1ffffff (ffffffff88fa03a0) (00000003) vpn nat outbound (vpn_nat)&lt;BR /&gt;3: - 1fffff0 (ffffffff88c363c0) (00000001) TCP streaming (out) (cpas)&lt;BR /&gt;4: - 1ffff50 (ffffffff88a16ad0) (00000001) passive streaming (out) (pass_str)&lt;BR /&gt;5: - 1ff0000 (ffffffff88fe3950) (00000003) vpn tagging outbound (tagging)&lt;BR /&gt;6: - 1f00000 (ffffffff88801780) (00000001) Stateless verifications (out) (asm)&lt;BR /&gt;7: 0 (ffffffff8879cac0) (00000001) fw VM outbound (fw)&lt;BR /&gt;8: 2000000 (ffffffff88fa0770) (00000003) vpn policy outbound (vpn_pol)&lt;BR /&gt;9: 10000000 (ffffffff888e1d20) (00000003) SecureXL outbound (secxl)&lt;BR /&gt;10: 15000000 (ffffffff8d3d3b60) (00000001) FG-1 outbound (fg_pol)&lt;BR /&gt;11: 18000000 (ffffffff88996100) (00000001) fw record data outbound&lt;BR /&gt;12: 1ffffff0 (ffffffff88fc2590) (00000001) l2tp outbound (l2tp)&lt;BR /&gt;13: 20000000 (ffffffff88fa1010) (00000003) vpn encrypt (vpn)&lt;BR /&gt;14: 24000000 (ffffffff8d2bf960) (00000001) RTM packet out (rtm)&lt;BR /&gt;15: 7f000000 (ffffffff887b2790) (00000001) fw accounting outbound (acct)&lt;BR /&gt;16: 7f700000 (ffffffff88c365b0) (00000001) TCP streaming post VM (cpas)&lt;BR /&gt;17: 7f800000 (ffffffff888002f0) (ffffffff) IP Options Restore (out) (ipopt_res)&lt;BR /&gt;monitor: monitoring (control-C to stop)&lt;BR /&gt;[vs_0][fw_1] eth3.412:o0 (IP Options Strip (out))[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:o1 (vpn multik forward out)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:o2 (vpn nat outbound)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:o3 (TCP streaming (out))[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:o4 (passive streaming (out))[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:o5 (vpn tagging outbound)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:o6 (Stateless verifications (out))[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:o7 (fw VM outbound)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O8 (vpn policy outbound)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O9 (SecureXL outbound)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O10 (FG-1 outbound)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O11 (fw record data outbound)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O12 (l2tp outbound)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O13 (vpn encrypt)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O14 (RTM packet out)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O15 (fw accounting outbound)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O16 (TCP streaming post VM)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O17 (IP Options Restore (out))[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O18 (Chain End)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2019 07:18:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ICMP-generated-by-CP-itself-does-not-leave-the-Firewall/m-p/52973#M10557</guid>
      <dc:creator>Fernando_Pizzam</dc:creator>
      <dc:date>2019-05-09T07:18:22Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP generated by CP itself does not leave the Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ICMP-generated-by-CP-itself-does-not-leave-the-Firewall/m-p/52974#M10558</link>
      <description>&lt;P&gt;The VPNs are built under the other firewall so for this firewall is normal traffic. anyway, using the IP as source instead of eth it's working.&lt;/P&gt;&lt;P&gt;Is this normal?&lt;/P&gt;&lt;P&gt;[Expert@FW1]# ping -I 172.28.10.2 10.20.20.1&lt;/P&gt;&lt;P&gt;[Expert@FW1]# tcpdump -nni eth3.439 host 10.20.20.1&lt;/P&gt;&lt;P&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on eth3.439, link-type EN10MB (Ethernet), capture size 96 bytes&lt;BR /&gt;09:20:28.957779 IP 172.28.10.2 &amp;gt; 10.20.20.1: ICMP echo request, id 65046, seq 47, length 64&lt;BR /&gt;09:20:29.957711 IP 172.28.10.2 &amp;gt; 10.20.20.1: ICMP echo request, id 65046, seq 48, length 64&lt;BR /&gt;09:20:30.957639 IP 172.28.10.2 &amp;gt; 10.20.20.1: ICMP echo request, id 65046, seq 49, length 64&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2019 07:23:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ICMP-generated-by-CP-itself-does-not-leave-the-Firewall/m-p/52974#M10558</guid>
      <dc:creator>Fernando_Pizzam</dc:creator>
      <dc:date>2019-05-09T07:23:51Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP generated by CP itself does not leave the Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/ICMP-generated-by-CP-itself-does-not-leave-the-Firewall/m-p/52975#M10559</link>
      <description>&lt;P&gt;Chain ends:&lt;/P&gt;&lt;P&gt;monitor: monitoring (control-C to stop)&lt;BR /&gt;[vs_0][fw_1] eth3.412:o0 (IP Options Strip (out))[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:o1 (vpn multik forward out)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:o2 (vpn nat outbound)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:o3 (TCP streaming (out))[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:o4 (passive streaming (out))[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:o5 (vpn tagging outbound)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:o6 (Stateless verifications (out))[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:o7 (fw VM outbound)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O8 (vpn policy outbound)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O9 (SecureXL outbound)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O10 (FG-1 outbound)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O11 (fw record data outbound)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O12 (l2tp outbound)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O13 (vpn encrypt)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O14 (RTM packet out)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O15 (fw accounting outbound)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O16 (TCP streaming post VM)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O17 (IP Options Restore (out))[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;BR /&gt;[vs_0][fw_1] eth3.412:O18 (Chain End)[84]: 172.28.10.2 -&amp;gt; 10.20.20.1 (ICMP) len=84 id=0&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12660 seq=1&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2019 07:27:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/ICMP-generated-by-CP-itself-does-not-leave-the-Firewall/m-p/52975#M10559</guid>
      <dc:creator>Fernando_Pizzam</dc:creator>
      <dc:date>2019-05-09T07:27:11Z</dc:date>
    </item>
  </channel>
</rss>

