<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TCP packet out of state:Server to client packet of an old TCP connection | TCP Flags:SYN | drop in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/TCP-packet-out-of-state-Server-to-client-packet-of-an-old-TCP/m-p/105199#M20189</link>
    <description>&lt;P&gt;Sounds the connection aged out of the connections table.&lt;BR /&gt;You can see if Smart Connection Reuse will help but I suspect a TAC case may be required:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk24960&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk24960&amp;amp;partition=Advanced&amp;amp;product=Security&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 12 Dec 2020 02:45:55 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2020-12-12T02:45:55Z</dc:date>
    <item>
      <title>TCP packet out of state:Server to client packet of an old TCP connection | TCP Flags:SYN | drop</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-packet-out-of-state-Server-to-client-packet-of-an-old-TCP/m-p/105125#M20176</link>
      <description>&lt;P&gt;Network diagram:&lt;/P&gt;&lt;P&gt;Internet&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Production&lt;/P&gt;&lt;P&gt;Client behind FW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ----&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Border Router(NAT)&amp;nbsp;&amp;nbsp; ---&amp;gt; CP ---&amp;gt;&amp;nbsp; SFTP Server：TCP22&lt;/P&gt;&lt;P&gt;188.40.191.20&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (one map one)10.50.11.33 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 10.30.7.201:22&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Policy:&lt;/P&gt;&lt;P&gt;&amp;nbsp; S:10.50.11.33 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; D:10.30.7.201 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; service：ssh&amp;nbsp; &amp;amp;&amp;amp;&amp;nbsp; sshv2 &amp;nbsp; &amp;nbsp; &amp;nbsp; Action:Allow&lt;/P&gt;&lt;P&gt;&amp;nbsp; S:10.30.7.0/24 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; D:any &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; service：any &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Action:Allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Client(188.40.191.20) tries to access SFTP Server fail. connect time out.&lt;/P&gt;&lt;P&gt;But I just can see reverse direction logs as below:&lt;/P&gt;&lt;P&gt;Id: ac14481d-9b4b-f025-5fd3-32a26091001b&lt;BR /&gt;Marker: @A@@B@1607675798@C@2060526&lt;BR /&gt;Log Server Origin: 172.20.72.29&lt;BR /&gt;Time: 2020-12-11T08:49:38Z&lt;BR /&gt;Interface Direction: inbound&lt;BR /&gt;Interface Name: eth1-03&lt;BR /&gt;Id Generated By Indexer:false&lt;BR /&gt;First: true&lt;BR /&gt;Sequencenum: 1164&lt;BR /&gt;TCP packet out of state:Server to client packet of an old TCP connection&lt;BR /&gt;TCP Flags: SYN&lt;BR /&gt;Source: 10.30.7.201&lt;BR /&gt;Source Port: 22&lt;BR /&gt;Destination: 10.50.11.33&lt;BR /&gt;Destination Port: 12288&lt;BR /&gt;IP Protocol: 6&lt;BR /&gt;Action: Drop&lt;BR /&gt;Type: Connection&lt;BR /&gt;Policy Name: Standard&lt;BR /&gt;Policy Management: SmartCenter&lt;BR /&gt;Db Tag: {E8EF89A6-20F4-3044-91ED-72D3DD169570}&lt;BR /&gt;Policy Date: 2020-12-10T09:47:02Z&lt;BR /&gt;Blade: Firewall&lt;BR /&gt;Origin: ICDCFW-1&lt;BR /&gt;Service: TCP/12288&lt;BR /&gt;Product Family: Access&lt;BR /&gt;Logid: 1&lt;BR /&gt;Interface: eth1-03&lt;BR /&gt;Description: TCP/12288 Traffic Dropped from 10.30.7.201 to 10.50.11.33&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Who can tell me why and how to solve it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2020 09:51:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-packet-out-of-state-Server-to-client-packet-of-an-old-TCP/m-p/105125#M20176</guid>
      <dc:creator>Herschel_Liang</dc:creator>
      <dc:date>2020-12-11T09:51:49Z</dc:date>
    </item>
    <item>
      <title>Re: TCP packet out of state:Server to client packet of an old TCP connection | TCP Flags:SYN | drop</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-packet-out-of-state-Server-to-client-packet-of-an-old-TCP/m-p/105199#M20189</link>
      <description>&lt;P&gt;Sounds the connection aged out of the connections table.&lt;BR /&gt;You can see if Smart Connection Reuse will help but I suspect a TAC case may be required:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk24960&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk24960&amp;amp;partition=Advanced&amp;amp;product=Security&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 12 Dec 2020 02:45:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-packet-out-of-state-Server-to-client-packet-of-an-old-TCP/m-p/105199#M20189</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-12-12T02:45:55Z</dc:date>
    </item>
    <item>
      <title>Re: TCP packet out of state:Server to client packet of an old TCP connection | TCP Flags:SYN | drop</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-packet-out-of-state-Server-to-client-packet-of-an-old-TCP/m-p/105213#M20194</link>
      <description>&lt;P&gt;There is dedicated service SFTP which should be used instead of ssh (or sshv2).&lt;/P&gt;
&lt;P&gt;Not sure if relevant, but some services (like TFTP) are using&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://en.m.wikipedia.org/wiki/Ephemeral_port" target="_blank" rel="noopener"&gt;ephemeral ports&lt;/A&gt; which are required to be opened on the firewall.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 12 Dec 2020 09:50:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-packet-out-of-state-Server-to-client-packet-of-an-old-TCP/m-p/105213#M20194</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2020-12-12T09:50:20Z</dc:date>
    </item>
    <item>
      <title>Re: TCP packet out of state:Server to client packet of an old TCP connection | TCP Flags:SYN | drop</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-packet-out-of-state-Server-to-client-packet-of-an-old-TCP/m-p/105216#M20195</link>
      <description>&lt;P&gt;It seems that no SFTP dedicated service in CP.&lt;/P&gt;</description>
      <pubDate>Sat, 12 Dec 2020 10:06:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-packet-out-of-state-Server-to-client-packet-of-an-old-TCP/m-p/105216#M20195</guid>
      <dc:creator>Herschel_Liang</dc:creator>
      <dc:date>2020-12-12T10:06:42Z</dc:date>
    </item>
    <item>
      <title>Re: TCP packet out of state:Server to client packet of an old TCP connection | TCP Flags:SYN | drop</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-packet-out-of-state-Server-to-client-packet-of-an-old-TCP/m-p/105259#M20202</link>
      <description>&lt;P&gt;Right, because FTP over SSH is still basically over port 22 and the traffic is encrypted the same as regular SSH.&lt;/P&gt;</description>
      <pubDate>Sun, 13 Dec 2020 00:05:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-packet-out-of-state-Server-to-client-packet-of-an-old-TCP/m-p/105259#M20202</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-12-13T00:05:01Z</dc:date>
    </item>
    <item>
      <title>Re: TCP packet out of state:Server to client packet of an old TCP connection | TCP Flags:SYN | drop</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-packet-out-of-state-Server-to-client-packet-of-an-old-TCP/m-p/105312#M20216</link>
      <description>&lt;P&gt;Tried the sk24960 solution, but it seems it still exists.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 03:14:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-packet-out-of-state-Server-to-client-packet-of-an-old-TCP/m-p/105312#M20216</guid>
      <dc:creator>Herschel_Liang</dc:creator>
      <dc:date>2020-12-14T03:14:45Z</dc:date>
    </item>
  </channel>
</rss>

