<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: syn-ack on every IP address on port tcp_80 during vulnerability scan in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176733#M29432</link>
    <description>&lt;P&gt;You are right, it is only a SYN and a RST packet. output is from FW monitor on the gateway. However, telnet shows connected, nmap shows that port is open.&lt;/P&gt;&lt;P&gt;No protocol signature is enabled on http.&lt;/P&gt;</description>
    <pubDate>Thu, 30 Mar 2023 12:11:02 GMT</pubDate>
    <dc:creator>gnovokmet</dc:creator>
    <dc:date>2023-03-30T12:11:02Z</dc:date>
    <item>
      <title>syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176529#M29388</link>
      <description>&lt;P&gt;Dear Community,&lt;/P&gt;&lt;P&gt;I would like to share with you strange behavior and maybe someone will have a clue and point me where to look further. During our vulnerability scan in network, I have noticed vulnerability map scan detects that port tcp 80 is opened and IP host is alive on every IP address that doesn't exist in the network. I have simulated MAP scan with NMAP and result is the same: I get syn-ack packet from Checkpoint Gateway on every IP address that doesn't exist. (capture1.png)&lt;/P&gt;&lt;P&gt;Telnet to IP address shows it is connected (capture2.png)&lt;/P&gt;&lt;P&gt;FW monitor - capture3.png&lt;/P&gt;&lt;P&gt;While investigating this, I noticed that all this started&amp;nbsp; when Autonomous Threat Prevention was enabled on the Security Gateway (capture4.png). When it is changed to custom, I don't have this issue. MAP scan detects that we have 3k live hosts even the real number is 30 and I would like to solve this issue while keeping the Autonomous Threat Prevention on Gateway on.&lt;/P&gt;&lt;P&gt;Security Gateway: R81.10, JHA take 78&lt;/P&gt;&lt;P&gt;Any suggestion is more then welcomed! Many thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 08:29:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176529#M29388</guid>
      <dc:creator>gnovokmet</dc:creator>
      <dc:date>2023-03-29T08:29:35Z</dc:date>
    </item>
    <item>
      <title>Re: syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176670#M29416</link>
      <description>&lt;P&gt;What ATP profile are you using?&lt;BR /&gt;Do you see any logs when this occurs?&lt;BR /&gt;If you haven't already done so, I recommend opening a TAC case: &lt;A href="https://help.checkpoint.com" target="_blank"&gt;https://help.checkpoint.com&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 23:35:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176670#M29416</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-29T23:35:41Z</dc:date>
    </item>
    <item>
      <title>Re: syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176704#M29424</link>
      <description>&lt;P&gt;Autonomous profile: perimeter&lt;/P&gt;&lt;P&gt;In the logs, I see that packet is dropped on gateway.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 08:47:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176704#M29424</guid>
      <dc:creator>gnovokmet</dc:creator>
      <dc:date>2023-03-30T08:47:58Z</dc:date>
    </item>
    <item>
      <title>Re: syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176722#M29427</link>
      <description>&lt;P&gt;I think the Accelerated SYN Defender is turned on on your gateway.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;A TCP SYN Flood attack occurs when a host, typically with a forged IP address, sends a flood of TCP [SYN] packets. Each of these TCP [SYN] packets is handled as a connection request, which causes the server to create a half-open (unestablished) TCP connection. This occurs because the server sends a TCP [SYN+ACK] packet, and waits for a response TCP packet that does not arrive.&lt;/P&gt;
&lt;P&gt;These half-open TCP connections eventually exceed the maximum available TCP connections. This causes a denial of service condition.&lt;/P&gt;
&lt;P&gt;The Check Point Accelerated SYN Defender protects the Security GatewayClosed by preventing excessive TCP connections from being created.&lt;/P&gt;
&lt;P&gt;The Accelerated SYN Defender uses TCP [SYN] Cookies (particular choices of initial TCP sequence numbers) when under a suspected TCP SYN Flood attack. Using TCP [SYN] Cookies can reduce the load on Security Gateway and on computers behind the Security Gateway. The Accelerated SYN Defender acts as proxy for TCP connections and adjusts TCP {SEQ} and TCP {ACK} values in TCP packets.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sd_1_5435345.png" style="width: 372px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/20316i58866B1730A75FA0/image-dimensions/372x240?v=v2" width="372" height="240" role="button" title="sd_1_5435345.png" alt="sd_1_5435345.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI value="1"&gt;
&lt;P&gt;A Client sends a TCP [SYN] packet to a Server.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="2"&gt;
&lt;P&gt;The &lt;SPAN class="mc-variable Vars_BladesFeatures.tp_sxl_syn_defender variable"&gt;Accelerated SYN Defender&lt;/SPAN&gt; replies to the Client with a TCP [SYN+ACK] packet that contains a special cookie in the Seq field.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt; does not maintain the connection state at this time.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="3"&gt;
&lt;P&gt;The Client sends a reply TCP [ACK] packet. This completes the Client-side of the TCP connection.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="4"&gt;
&lt;P&gt;The &lt;SPAN class="mc-variable Vars_BladesFeatures.tp_sxl_syn_defender variable"&gt;Accelerated SYN Defender&lt;/SPAN&gt; checks if the SYN cookie in the Client's TCP [ACK] packet is legitimate.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="5"&gt;
&lt;P&gt;If the SYN cookie in the Client's TCP [ACK] packet is legitimate, the &lt;SPAN class="mc-variable Vars_BladesFeatures.tp_sxl_syn_defender variable"&gt;Accelerated SYN Defender&lt;/SPAN&gt; sends a TCP [SYN] packet to the Server to begin the Server-side of the TCP connection.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="6"&gt;
&lt;P&gt;The Server replies with a TCP [SYN+ACK] packet.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="7"&gt;
&lt;P&gt;The &lt;SPAN class="mc-variable Vars_BladesFeatures.tp_sxl_syn_defender variable"&gt;Accelerated SYN Defender&lt;/SPAN&gt; sends a TCP [ACK] packet to complete the Server-size of the TCP 3-way handshake.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="8"&gt;
&lt;P&gt;The &lt;SPAN class="mc-variable Vars_BladesFeatures.tp_sxl_syn_defender variable"&gt;Accelerated SYN Defender&lt;/SPAN&gt; marks the TCP connection as established and records the TCP sequence adjustment between the two sides.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Thu, 30 Mar 2023 10:50:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176722#M29427</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2023-03-30T10:50:41Z</dc:date>
    </item>
    <item>
      <title>Re: syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176724#M29428</link>
      <description>&lt;P&gt;That is the first thing I have checked. When disabled, same behavior. Please see capture5.png attachment.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 11:07:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176724#M29428</guid>
      <dc:creator>gnovokmet</dc:creator>
      <dc:date>2023-03-30T11:07:43Z</dc:date>
    </item>
    <item>
      <title>Re: syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176726#M29429</link>
      <description>&lt;P&gt;I do not see SYN-ACK in the "fw monitor" image (capture3.png) from your gateway.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sa_2_543534.png" style="width: 741px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/20318i42886776729776EA/image-dimensions/741x100?v=v2" width="741" height="100" role="button" title="sa_2_543534.png" alt="sa_2_543534.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;You see here only a SYN and a RST packet from the nmap scanner.&lt;BR /&gt;If the fw monitor filter is set correctly, this is probably an nmap problem.&lt;BR /&gt;&lt;BR /&gt;But maybe the fw monitor filter is not set correctly&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 11:25:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176726#M29429</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2023-03-30T11:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176730#M29430</link>
      <description>&lt;P&gt;Check the service http and any other ones that may have been created to match TCP port 80, do you have Protocol Signature set for any of them?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="proto.png" style="width: 641px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/20319i683E731BA128C900/image-size/large?v=v2&amp;amp;px=999" role="button" title="proto.png" alt="proto.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 11:58:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176730#M29430</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-03-30T11:58:44Z</dc:date>
    </item>
    <item>
      <title>Re: syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176733#M29432</link>
      <description>&lt;P&gt;You are right, it is only a SYN and a RST packet. output is from FW monitor on the gateway. However, telnet shows connected, nmap shows that port is open.&lt;/P&gt;&lt;P&gt;No protocol signature is enabled on http.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 12:11:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176733#M29432</guid>
      <dc:creator>gnovokmet</dc:creator>
      <dc:date>2023-03-30T12:11:02Z</dc:date>
    </item>
    <item>
      <title>Re: syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176767#M29434</link>
      <description>&lt;P&gt;What is the exact filter you used when capturing that fw monitor?&lt;/P&gt;
&lt;P&gt;Lots of client-side URL filtering systems spoof responses from all IPs on various ports. I know the Zscaler agent does, and it's incredibly irritating. This behavior breaks the ability to test whether a service is actually listening, and the ability to see what certificate the service actually presents if it is listening.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 14:49:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176767#M29434</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-03-30T14:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176816#M29436</link>
      <description>&lt;P&gt;fw monitor -e "host(10.28.129.1) and host(10.30.100.222), accept;"&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitor_kiss_enable&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_off&lt;BR /&gt;PPAK 0: Get before set operation succeeded of kiss_debug_force_kdprintf_enable&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitorfreebufs&lt;BR /&gt;************************************************************** NOTE **************************************************************&lt;BR /&gt;*** Using "-e" filter will not monitor accelerated traffic. To monitor and filter accelerated traffic please use the "-F" filter ***&lt;BR /&gt;************************************************************************************************************************************&lt;BR /&gt;FW monitor will record only ip &amp;amp; transport layers in a packet&lt;BR /&gt;For capturing the whole packet please do -w&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitor_ppak_all_position&lt;BR /&gt;monitor: getting filter (from command line)&lt;BR /&gt;monitor: compiling&lt;BR /&gt;monitorfilter:&lt;BR /&gt;Compiled OK.&lt;BR /&gt;monitor: loading&lt;BR /&gt;monitor: monitoring (control-C to stop)&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitormaxpacket&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitormask&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitorallocbufs&lt;BR /&gt;PPAK 0: Get before set operation succeeded of printuuid&lt;BR /&gt;[vs_0][fw_1] eth1:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=45811&lt;BR /&gt;TCP: 33088 -&amp;gt; 443 .S.... seq=e2a5eb9c ack=00000000&lt;BR /&gt;[vs_0][fw_2] eth1:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=4176&lt;BR /&gt;TCP: 49802 -&amp;gt; 80 .S.... seq=f8affa70 ack=00000000&lt;BR /&gt;[vs_0][fw_2] eth1:iq[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=62011&lt;BR /&gt;TCP: 49802 -&amp;gt; 80 ..R... seq=f8affa70 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth1:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=27271&lt;BR /&gt;TCP: 49806 -&amp;gt; 80 .S.... seq=d78d3081 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth1:iq[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=58255&lt;BR /&gt;TCP: 49806 -&amp;gt; 80 ..R... seq=d78d3081 ack=00000000&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 20:50:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176816#M29436</guid>
      <dc:creator>gnovokmet</dc:creator>
      <dc:date>2023-03-30T20:50:24Z</dc:date>
    </item>
    <item>
      <title>Re: syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176905#M29438</link>
      <description>&lt;P&gt;What do you get if you try with the -F filter syntax like the warning at the top recommends?&lt;/P&gt;
&lt;P&gt;fw monitor -F "&lt;SPAN&gt;10.28.129.1,0,10.30.100.222,0,0" -F "10.30.100.222,0,10.28.129.1,0,0"&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2023 13:42:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176905#M29438</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-03-31T13:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176911#M29439</link>
      <description>&lt;P&gt;The Zscaler mentioned by&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/27871"&gt;@Bob_Zimmerman&lt;/a&gt;&amp;nbsp; is a good hint. All your packet captures shows only one direction, from nmap host to the gateway. No returning packet seen which is needed to get a connect to port 80. Did you tried the same from another source host. Maybe something on the source intercepts the traffic?&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2023 14:30:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176911#M29439</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2023-03-31T14:30:59Z</dc:date>
    </item>
    <item>
      <title>Re: syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176939#M29440</link>
      <description>&lt;P&gt;You need to use -F with fw monitor as Bob mentioned.&amp;nbsp; When using &lt;STRONG&gt;fw monitor -e&lt;/STRONG&gt; you are only capturing the first packet of the connection and nothing else.&amp;nbsp; This is because the first packet of every new connection goes F2F to get a rulebase lookup, and if it is then offloaded back into the Medium or Fast paths &lt;STRONG&gt;fw monitor -e&lt;/STRONG&gt; can't see any of the connection's packets anymore.&amp;nbsp; &lt;STRONG&gt;fw monitor -F&lt;/STRONG&gt; will show you all matching packets regardless of path, because the -F capture is happening in the SecureXL/sim driver itself.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2023 17:37:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/176939#M29440</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-03-31T17:37:07Z</dc:date>
    </item>
    <item>
      <title>Re: syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/177100#M29478</link>
      <description>&lt;P&gt;nmap command: nmap -vv 10.30.100.222 -p 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the output of fw monitor with -F:&lt;/P&gt;&lt;P&gt;[vs_0][ppak_0] eth1:iqD[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=18854&lt;BR /&gt;TCP: 35258 -&amp;gt; 443 .S.... seq=9740b2ee ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth1:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=18854&lt;BR /&gt;TCP: 35258 -&amp;gt; 443 .S.... seq=9740b2ee ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth1:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=18854&lt;BR /&gt;TCP: 35258 -&amp;gt; 443 .S.... seq=9740b2ee ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth1:iqD[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=42732&lt;BR /&gt;TCP: 51972 -&amp;gt; 80 .S.... seq=2528f946 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth1:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=42732&lt;BR /&gt;TCP: 51972 -&amp;gt; 80 .S.... seq=2528f946 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth1:iqD[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=26687&lt;BR /&gt;TCP: 51972 -&amp;gt; 80 ..R... seq=2528f946 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth1:iq[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=26687&lt;BR /&gt;TCP: 51972 -&amp;gt; 80 ..R... seq=2528f946 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth1:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=42732&lt;BR /&gt;TCP: 51972 -&amp;gt; 80 .S.... seq=2528f946 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth1:iq[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=26687&lt;BR /&gt;TCP: 51972 -&amp;gt; 80 ..R... seq=2528f946 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth1:iqD[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=21286&lt;BR /&gt;TCP: 51976 -&amp;gt; 80 .S.... seq=3d728a22 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth1:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=21286&lt;BR /&gt;TCP: 51976 -&amp;gt; 80 .S.... seq=3d728a22 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth1:iqD[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=1274&lt;BR /&gt;TCP: 51976 -&amp;gt; 80 ..R... seq=3d728a22 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth1:iq[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=1274&lt;BR /&gt;TCP: 51976 -&amp;gt; 80 ..R... seq=3d728a22 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth1:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=21286&lt;BR /&gt;TCP: 51976 -&amp;gt; 80 .S.... seq=3d728a22 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth1:iq[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=1274&lt;BR /&gt;TCP: 51976 -&amp;gt; 80 ..R... seq=3d728a22 ack=00000000&lt;/P&gt;</description>
      <pubDate>Mon, 03 Apr 2023 07:59:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/177100#M29478</guid>
      <dc:creator>gnovokmet</dc:creator>
      <dc:date>2023-04-03T07:59:33Z</dc:date>
    </item>
    <item>
      <title>Re: syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/177102#M29480</link>
      <description>&lt;P&gt;It is happening only on port 80, all other ports are filtered.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Apr 2023 08:00:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/177102#M29480</guid>
      <dc:creator>gnovokmet</dc:creator>
      <dc:date>2023-04-03T08:00:45Z</dc:date>
    </item>
    <item>
      <title>Re: syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/177147#M29489</link>
      <description>&lt;P&gt;To be sure, you used the -F for both directions, like I wrote?&lt;/P&gt;
&lt;P&gt;That capture doesn't show any traffic coming from the firewall. If you had -F filters for both directions and you're getting a successful connection on the client, then something else between them is spoofing the reply.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Apr 2023 14:31:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/177147#M29489</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-04-03T14:31:56Z</dc:date>
    </item>
    <item>
      <title>Re: syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/177229#M29518</link>
      <description>&lt;P&gt;I've lost you know... How do you mean in both directions?&lt;/P&gt;&lt;P&gt;NMAP (10.28.129.1) is behind FW1 and 10.30.100.0/24 is terminated behind FW2, where 10.30.100.222 IP address doesn't exist.&lt;/P&gt;&lt;P&gt;Here are the outputs of FW monitor from both FW...&lt;/P&gt;&lt;P&gt;FW1:&lt;/P&gt;&lt;P&gt;[Expert@FW1:0]# fw monitor -F "10.28.129.1,0,10.30.100.222,0,0" -F "10.30.100.222,0,10.28.129.1,0,0"&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitor_kiss_enable&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_off&lt;BR /&gt;PPAK 0: Get before set operation succeeded of kiss_debug_force_kdprintf_enable&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitorfreebufs&lt;BR /&gt;PPAK 0: Get before set operation succeeded of kiss_debug_force_kdprintf_enable&lt;BR /&gt;fw ctl set string simple_debug_filter_saddr_1 10.28.129.1 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_saddr_1&lt;BR /&gt;fw ctl set int simple_debug_filter_sport_1 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_sport_1&lt;BR /&gt;fw ctl set string simple_debug_filter_daddr_1 10.30.100.222 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_daddr_1&lt;BR /&gt;fw ctl set int simple_debug_filter_dport_1 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_dport_1&lt;BR /&gt;fw ctl set int simple_debug_filter_proto_1 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_proto_1&lt;BR /&gt;PPAK 0: Get before set operation succeeded of kiss_debug_force_kdprintf_enable&lt;BR /&gt;fw ctl set string simple_debug_filter_saddr_2 10.30.100.222 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_saddr_2&lt;BR /&gt;fw ctl set int simple_debug_filter_sport_2 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_sport_2&lt;BR /&gt;fw ctl set string simple_debug_filter_daddr_2 10.28.129.1 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_daddr_2&lt;BR /&gt;fw ctl set int simple_debug_filter_dport_2 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_dport_2&lt;BR /&gt;fw ctl set int simple_debug_filter_proto_2 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_proto_2&lt;BR /&gt;FW monitor will record only ip &amp;amp; transport layers in a packet&lt;BR /&gt;For capturing the whole packet please do -w&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitor_ppak_all_position&lt;BR /&gt;monitor: getting filter (from command line)&lt;BR /&gt;monitor: compiling&lt;BR /&gt;monitorfilter:&lt;BR /&gt;Compiled OK.&lt;BR /&gt;monitor: loading&lt;BR /&gt;monitor: monitoring (control-C to stop)&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitormaxpacket&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitormask&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitorallocbufs&lt;BR /&gt;PPAK 0: Get before set operation succeeded of printuuid&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitor_kiss_enable&lt;BR /&gt;[vs_0][ppak_0] bond1.129:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=2054&lt;BR /&gt;TCP: 52156 -&amp;gt; 80 .S.... seq=96e77572 ack=00000000&lt;BR /&gt;[vs_0][fw_2] bond1.129:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=2054&lt;BR /&gt;TCP: 52156 -&amp;gt; 80 .S.... seq=96e77572 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] bond1.129:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=43334&lt;BR /&gt;TCP: 35442 -&amp;gt; 443 .S.... seq=236e6d08 ack=00000000&lt;BR /&gt;[vs_0][fw_0] bond1.129:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=43334&lt;BR /&gt;TCP: 35442 -&amp;gt; 443 .S.... seq=236e6d08 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] bond1.129:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=43334&lt;BR /&gt;TCP: 35442 -&amp;gt; 443 .S.... seq=236e6d08 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] bond1.129:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=2054&lt;BR /&gt;TCP: 52156 -&amp;gt; 80 .S.... seq=96e77572 ack=00000000&lt;BR /&gt;[vs_0][fw_2] bond0:Iq[44]: 10.30.100.222 -&amp;gt; 10.28.129.1 (TCP) len=64 id=19528&lt;BR /&gt;TCP: 80 -&amp;gt; 52156 .S..A. seq=03e58329 ack=96e77573&lt;BR /&gt;[vs_0][fw_2] bond1.129:oq[44]: 10.30.100.222 -&amp;gt; 10.28.129.1 (TCP) len=64 id=19528&lt;BR /&gt;TCP: 80 -&amp;gt; 52156 .S..A. seq=03e58329 ack=96e77573&lt;BR /&gt;[vs_0][fw_2] bond1.129:Oq[44]: 10.30.100.222 -&amp;gt; 10.28.129.1 (TCP) len=64 id=19528&lt;BR /&gt;TCP: 80 -&amp;gt; 52156 .S..A. seq=03e58329 ack=96e77573&lt;BR /&gt;[vs_0][fw_0] bond1.129:Iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=43334&lt;BR /&gt;TCP: 35442 -&amp;gt; 443 .S.... seq=236e6d08 ack=00000000&lt;BR /&gt;[vs_0][fw_0] bond0:oq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=43334&lt;BR /&gt;TCP: 35442 -&amp;gt; 443 .S.... seq=236e6d08 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] bond0:Oqe[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=43334&lt;BR /&gt;TCP: 35442 -&amp;gt; 443 .S.... seq=236e6d08 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] bond1.129:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=52 id=2055&lt;BR /&gt;TCP: 52156 -&amp;gt; 80 ....A. seq=96e77573 ack=03e5832a&lt;BR /&gt;[vs_0][fw_2] bond1.129:Iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=336&lt;BR /&gt;TCP: 52156 -&amp;gt; 80 .S.... seq=97277572 ack=00000000&lt;BR /&gt;[vs_0][fw_2] bond0:oq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=336&lt;BR /&gt;TCP: 52156 -&amp;gt; 80 .S.... seq=97277572 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] bond0:Oqe[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=336&lt;BR /&gt;TCP: 52156 -&amp;gt; 80 .S.... seq=97277572 ack=00000000&lt;BR /&gt;[vs_0][fw_2] bond0:Iq[44]: 10.30.100.222 -&amp;gt; 10.28.129.1 (TCP) len=52 id=50459&lt;BR /&gt;TCP: 80 -&amp;gt; 52156 ....A. seq=03e5832a ack=96e77573&lt;BR /&gt;[vs_0][fw_2] bond1.129:oq[44]: 10.30.100.222 -&amp;gt; 10.28.129.1 (TCP) len=52 id=50459&lt;BR /&gt;TCP: 80 -&amp;gt; 52156 ....A. seq=03e5832a ack=96e77573&lt;BR /&gt;[vs_0][fw_2] bond1.129:Oq[44]: 10.30.100.222 -&amp;gt; 10.28.129.1 (TCP) len=52 id=50459&lt;BR /&gt;TCP: 80 -&amp;gt; 52156 ....A. seq=03e5832a ack=96e77573&lt;BR /&gt;[vs_0][ppak_0] bond1.129:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=52 id=2056&lt;BR /&gt;TCP: 52156 -&amp;gt; 80 ..R.A. seq=96e77573 ack=03e5832a&lt;BR /&gt;[vs_0][fw_2] bond1.129:Iq[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=15536&lt;BR /&gt;TCP: 52156 -&amp;gt; 80 ..R... seq=97277572 ack=00000000&lt;BR /&gt;[vs_0][fw_2] bond0:oq[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=15536&lt;BR /&gt;TCP: 52156 -&amp;gt; 80 ..R... seq=97277572 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] bond0:Oqe[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=15536&lt;BR /&gt;TCP: 52156 -&amp;gt; 80 ..R... seq=97277572 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] bond1.129:iq[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=0&lt;BR /&gt;TCP: 52156 -&amp;gt; 80 ..R... seq=96e77573 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] bond1.129:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=46372&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 .S.... seq=33b5c784 ack=00000000&lt;BR /&gt;[vs_0][fw_0] bond1.129:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=46372&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 .S.... seq=33b5c784 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] bond1.129:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=46372&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 .S.... seq=33b5c784 ack=00000000&lt;BR /&gt;[vs_0][fw_0] bond0:Iq[44]: 10.30.100.222 -&amp;gt; 10.28.129.1 (TCP) len=64 id=16362&lt;BR /&gt;TCP: 80 -&amp;gt; 52160 .S..A. seq=825ff256 ack=33b5c785&lt;BR /&gt;[vs_0][fw_0] bond1.129:oq[44]: 10.30.100.222 -&amp;gt; 10.28.129.1 (TCP) len=64 id=16362&lt;BR /&gt;TCP: 80 -&amp;gt; 52160 .S..A. seq=825ff256 ack=33b5c785&lt;BR /&gt;[vs_0][fw_0] bond1.129:Oq[44]: 10.30.100.222 -&amp;gt; 10.28.129.1 (TCP) len=64 id=16362&lt;BR /&gt;TCP: 80 -&amp;gt; 52160 .S..A. seq=825ff256 ack=33b5c785&lt;BR /&gt;[vs_0][ppak_0] bond1.129:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=52 id=46373&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 ....A. seq=33b5c785 ack=825ff257&lt;BR /&gt;[vs_0][fw_0] bond1.129:Iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=29627&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 .S.... seq=33f5c784 ack=00000000&lt;BR /&gt;[vs_0][fw_0] bond0:oq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=29627&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 .S.... seq=33f5c784 ack=00000000&lt;BR /&gt;[vs_0][fw_0] bond0:Iq[44]: 10.30.100.222 -&amp;gt; 10.28.129.1 (TCP) len=52 id=46155&lt;BR /&gt;TCP: 80 -&amp;gt; 52160 ....A. seq=825ff257 ack=33b5c785&lt;BR /&gt;[vs_0][fw_0] bond1.129:oq[44]: 10.30.100.222 -&amp;gt; 10.28.129.1 (TCP) len=52 id=46155&lt;BR /&gt;TCP: 80 -&amp;gt; 52160 ....A. seq=825ff257 ack=33b5c785&lt;BR /&gt;[vs_0][fw_0] bond1.129:Oq[44]: 10.30.100.222 -&amp;gt; 10.28.129.1 (TCP) len=52 id=46155&lt;BR /&gt;TCP: 80 -&amp;gt; 52160 ....A. seq=825ff257 ack=33b5c785&lt;BR /&gt;[vs_0][ppak_0] bond0:Oqe[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=29627&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 .S.... seq=33f5c784 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] bond1.129:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=52 id=46374&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 ..R.A. seq=33b5c785 ack=825ff257&lt;BR /&gt;[vs_0][fw_0] bond1.129:Iq[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=10443&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 ..R... seq=33f5c784 ack=00000000&lt;BR /&gt;[vs_0][fw_0] bond0:oq[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=10443&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 ..R... seq=33f5c784 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] bond0:Oqe[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=10443&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 ..R... seq=33f5c784 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] bond1.129:iq[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=0&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 ..R... seq=33b5c785 ack=00000000&lt;BR /&gt;^C monitor: caught sig 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FW2:&lt;/P&gt;&lt;P&gt;[Expert@FW2:0]# fw monitor -F "10.28.129.1,0,10.30.100.222,0,0" -F "10.30.100.222,0,10.28.129.1,0,0"&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitor_kiss_enable&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_off&lt;BR /&gt;PPAK 0: Get before set operation succeeded of kiss_debug_force_kdprintf_enable&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitorfreebufs&lt;BR /&gt;PPAK 0: Get before set operation succeeded of kiss_debug_force_kdprintf_enable&lt;BR /&gt;fw ctl set string simple_debug_filter_saddr_1 10.28.129.1 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_saddr_1&lt;BR /&gt;fw ctl set int simple_debug_filter_sport_1 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_sport_1&lt;BR /&gt;fw ctl set string simple_debug_filter_daddr_1 10.30.100.222 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_daddr_1&lt;BR /&gt;fw ctl set int simple_debug_filter_dport_1 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_dport_1&lt;BR /&gt;fw ctl set int simple_debug_filter_proto_1 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_proto_1&lt;BR /&gt;PPAK 0: Get before set operation succeeded of kiss_debug_force_kdprintf_enable&lt;BR /&gt;fw ctl set string simple_debug_filter_saddr_2 10.30.100.222 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_saddr_2&lt;BR /&gt;fw ctl set int simple_debug_filter_sport_2 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_sport_2&lt;BR /&gt;fw ctl set string simple_debug_filter_daddr_2 10.28.129.1 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_daddr_2&lt;BR /&gt;fw ctl set int simple_debug_filter_dport_2 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_dport_2&lt;BR /&gt;fw ctl set int simple_debug_filter_proto_2 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_proto_2&lt;BR /&gt;FW monitor will record only ip &amp;amp; transport layers in a packet&lt;BR /&gt;For capturing the whole packet please do -w&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitor_ppak_all_position&lt;BR /&gt;monitor: getting filter (from command line)&lt;BR /&gt;monitor: compiling&lt;BR /&gt;monitorfilter:&lt;BR /&gt;Compiled OK.&lt;BR /&gt;monitor: loading&lt;BR /&gt;monitor: monitoring (control-C to stop)&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitormaxpacket&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitormask&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitorallocbufs&lt;BR /&gt;PPAK 0: Get before set operation succeeded of printuuid&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitor_kiss_enable&lt;BR /&gt;[vs_0][ppak_0] eth1:iqD[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=43334&lt;BR /&gt;TCP: 35442 -&amp;gt; 443 .S.... seq=236e6d08 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth1:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=43334&lt;BR /&gt;TCP: 35442 -&amp;gt; 443 .S.... seq=236e6d08 ack=00000000&lt;BR /&gt;[vs_0][fw_2] eth1:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=43334&lt;BR /&gt;TCP: 35442 -&amp;gt; 443 .S.... seq=236e6d08 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth1:iqD[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=336&lt;BR /&gt;TCP: 52156 -&amp;gt; 80 .S.... seq=97277572 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth1:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=336&lt;BR /&gt;TCP: 52156 -&amp;gt; 80 .S.... seq=97277572 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth1:iqD[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=15536&lt;BR /&gt;TCP: 52156 -&amp;gt; 80 ..R... seq=97277572 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth1:iq[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=15536&lt;BR /&gt;TCP: 52156 -&amp;gt; 80 ..R... seq=97277572 ack=00000000&lt;BR /&gt;[vs_0][fw_2] eth1:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=336&lt;BR /&gt;TCP: 52156 -&amp;gt; 80 .S.... seq=97277572 ack=00000000&lt;BR /&gt;[vs_0][fw_2] eth1:iq[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=15536&lt;BR /&gt;TCP: 52156 -&amp;gt; 80 ..R... seq=97277572 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth1:iqD[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=29627&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 .S.... seq=33f5c784 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth1:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=29627&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 .S.... seq=33f5c784 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth1:iqD[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=10443&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 ..R... seq=33f5c784 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth1:iq[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=10443&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 ..R... seq=33f5c784 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth1:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=64 id=29627&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 .S.... seq=33f5c784 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth1:iq[40]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=40 id=10443&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 ..R... seq=33f5c784 ack=00000000&lt;BR /&gt;^C monitor: caught sig 2&lt;BR /&gt;monitor: unloading&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 08:08:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/177229#M29518</guid>
      <dc:creator>gnovokmet</dc:creator>
      <dc:date>2023-04-04T08:08:07Z</dc:date>
    </item>
    <item>
      <title>Re: syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/177317#M29552</link>
      <description>&lt;P&gt;The -F filters only look for exact source IP, source port, destination IP, destination port, and protocol. If you only use -F a single time, you will only capture one direction of a connection. You would see the SYN, but not the SYN-ACK. Since your capture only showed the SYN and the RST from the client to the server, I was asking if you included -F filters for both directions like in the command I wrote. Seems you did.&lt;/P&gt;
&lt;P&gt;The fw monitor output you've provided suggests&amp;nbsp;10.28.129.1 or 10.30.100.222 (or possibly both) is used in some NAT rule. The destination is translated between little-i and big-I by default. We never see a big-I for the SYN.&lt;/P&gt;
&lt;P&gt;The SYN-ACK comes back in FW1 bond0. What is out that interface?&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 23:47:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/177317#M29552</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-04-04T23:47:33Z</dc:date>
    </item>
    <item>
      <title>Re: syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/177368#M29570</link>
      <description>&lt;P&gt;FW1 bond0 is ISP interface, bond is created to ISP SW for redundancy.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2023 11:00:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/177368#M29570</guid>
      <dc:creator>gnovokmet</dc:creator>
      <dc:date>2023-04-05T11:00:20Z</dc:date>
    </item>
    <item>
      <title>Re: syn-ack on every IP address on port tcp_80 during vulnerability scan</title>
      <link>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/177386#M29572</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/46843"&gt;@gnovokmet&lt;/a&gt;,&lt;BR /&gt;&lt;BR /&gt;[vs_0][ppak_0] bond1.129:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=46372&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 .S.... seq=33b5c784 ack=00000000&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;gt;&amp;gt;&amp;gt; Packet arrives at the Performance Pack - OK&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;[vs_0][fw_0] bond1.129:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=46372&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 .S.... seq=33b5c784 ack=00000000&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;gt;&amp;gt;&amp;gt; Packet is forwarded to the CoreXL instance via dynamic dispatcher - OK&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;[vs_0][ppak_0] bond1.129:iq[44]: 10.28.129.1 -&amp;gt; 10.30.100.222 (TCP) len=60 id=46372&lt;BR /&gt;TCP: 52160 -&amp;gt; 80 .S.... seq=33b5c784 ack=00000000&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;gt;&amp;gt;&amp;gt; Now the packet is probably reinjected.&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;gt;&amp;gt;&amp;gt; Is new since R80.20 (more read here&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (&lt;A href="https://community.checkpoint.com/t5/General-Topics/Update-R80-20-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/60401#M12218" target="_self"&gt;Update R80.20+ Security Gateway Architecture (Logical Packet Flow)&lt;/A&gt;&lt;/STRONG&gt;&lt;STRONG&gt;).&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; But could also be a second "SYN" package.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;gt;&amp;gt;&amp;gt; Interesting is that there is no "I" package.&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;gt;&amp;gt;&amp;gt; Could be due to the "NAT" that the filter no longer takes effect.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;[vs_0][fw_0] bond0:Iq[44]: 10.30.100.222 -&amp;gt; 10.28.129.1 (TCP) len=64 id=16362&lt;BR /&gt;TCP: 80 -&amp;gt; 52160 .S..A. seq=825ff256 ack=33b5c785&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;gt;&amp;gt;&amp;gt; Now comes a response package without a small "i".&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;gt;&amp;gt;&amp;gt; This indicates to me that a "NAT" is taking place here.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;[vs_0][fw_0] bond1.129:oq[44]: 10.30.100.222 -&amp;gt; 10.28.129.1 (TCP) len=64 id=16362&lt;BR /&gt;TCP: 80 -&amp;gt; 52160 .S..A. seq=825ff256 ack=33b5c785&lt;/P&gt;
&lt;P&gt;[vs_0][fw_0] bond1.129:Oq[44]: 10.30.100.222 -&amp;gt; 10.28.129.1 (TCP) len=64 id=16362&lt;BR /&gt;TCP: 80 -&amp;gt; 52160 .S..A. seq=825ff256 ack=33b5c785&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;gt;&amp;gt;&amp;gt; Now the packet SYN/ACK is delivered on the outgoing interface by lowercase "o" and uppercase "O" inspection point.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;-------------------------------------------&lt;BR /&gt;&lt;BR /&gt;It looks like to me, that the scanned addresses are send per NAT to an internal system that actually responds.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Please check your NAT&lt;/FONT&gt;&lt;/STRONG&gt;&lt;FONT color="#FF0000"&gt; rules!&lt;/FONT&gt;&lt;FONT color="#FF0000"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;Could also possibly be the following problem:&lt;BR /&gt;- Global Properties option that allows admins to choose between "Client side NAT" and "Server side NAT"&lt;BR /&gt;- IP pool NAT&lt;BR /&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2023 13:02:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/syn-ack-on-every-IP-address-on-port-tcp-80-during-vulnerability/m-p/177386#M29572</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2023-04-05T13:02:20Z</dc:date>
    </item>
  </channel>
</rss>

