<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Same source and destination (GW only) Invalid TCP flag combination (Mailformed Packet) in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Same-source-and-destination-GW-only-Invalid-TCP-flag-combination/m-p/184787#M30789</link>
    <description>&lt;P&gt;This is part of the "Packet Sanity" protection in the "Inspection Settings" which are part of the Access Control policy and not Threat Prevention.&lt;/P&gt;
&lt;P&gt;My initial take was that this is some kind of interprocess communication on the firewall using ephemeral ports that should have used the loopback/127.0.0.1 interface but used its own Mgmt interface instead.&amp;nbsp; The protection presumably doesn't like that the TCP flags PSH and URG are set but there is no ACK flag set.&amp;nbsp; It is not clear to me if this packet was originated by the firewall itself, or is some kind of spoofed packet coming in from the network.&amp;nbsp; Perhaps others can chime in.&lt;/P&gt;</description>
    <pubDate>Mon, 26 Jun 2023 12:46:21 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2023-06-26T12:46:21Z</dc:date>
    <item>
      <title>Same source and destination (GW only) Invalid TCP flag combination (Mailformed Packet)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Same-source-and-destination-GW-only-Invalid-TCP-flag-combination/m-p/184723#M30771</link>
      <description>&lt;P&gt;Dear Team,&lt;/P&gt;&lt;P&gt;Query 1: is this a default protection (Part of the access control policy) ?&lt;/P&gt;&lt;P&gt;Query 2: Why does GW send traffic to its own using Mgmt Port?&lt;/P&gt;&lt;P&gt;Query 3: What is the impact ?&lt;/P&gt;&lt;P&gt;Attack Name: Mailformed Packet&lt;BR /&gt;Attack Information: Invalid TCP flag combination&lt;BR /&gt;Protection Type: Protocol Animaly&lt;BR /&gt;Performance Impact: Very Low&lt;BR /&gt;Confidence Level: High&lt;BR /&gt;Severity:Medium&lt;BR /&gt;Industry reference: CAN-2002-1071&lt;BR /&gt;tcp_flags:PUSH-URG&lt;BR /&gt;Interface: Mgmt&lt;BR /&gt;interface Direction: Inbound&lt;BR /&gt;SRC IP: GW (10.10.10.2)&lt;BR /&gt;DST IP:GW (10.10.10.2)&lt;BR /&gt;Service: TCP/46039 (Destination Port)&lt;BR /&gt;Protocol: TCP (6) (6)&lt;BR /&gt;Threat Profile: No_protection_503******&lt;BR /&gt;Action: Detect&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CP_FW_to_FW.jpeg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21522iB5446A8C57EBFBEA/image-size/large?v=v2&amp;amp;px=999" role="button" title="CP_FW_to_FW.jpeg" alt="CP_FW_to_FW.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Jun 2023 16:37:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Same-source-and-destination-GW-only-Invalid-TCP-flag-combination/m-p/184723#M30771</guid>
      <dc:creator>Chinmaya_Naik</dc:creator>
      <dc:date>2023-06-25T16:37:26Z</dc:date>
    </item>
    <item>
      <title>Re: Same source and destination (GW only) Invalid TCP flag combination (Mailformed Packet)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Same-source-and-destination-GW-only-Invalid-TCP-flag-combination/m-p/184780#M30786</link>
      <description>&lt;P&gt;DearCheckmates Team,&lt;/P&gt;&lt;P&gt;Please help me to clarify .&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/25509"&gt;@Chinmaya_Naik&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 12:16:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Same-source-and-destination-GW-only-Invalid-TCP-flag-combination/m-p/184780#M30786</guid>
      <dc:creator>Chinmaya_Naik</dc:creator>
      <dc:date>2023-06-26T12:16:23Z</dc:date>
    </item>
    <item>
      <title>Re: Same source and destination (GW only) Invalid TCP flag combination (Mailformed Packet)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Same-source-and-destination-GW-only-Invalid-TCP-flag-combination/m-p/184787#M30789</link>
      <description>&lt;P&gt;This is part of the "Packet Sanity" protection in the "Inspection Settings" which are part of the Access Control policy and not Threat Prevention.&lt;/P&gt;
&lt;P&gt;My initial take was that this is some kind of interprocess communication on the firewall using ephemeral ports that should have used the loopback/127.0.0.1 interface but used its own Mgmt interface instead.&amp;nbsp; The protection presumably doesn't like that the TCP flags PSH and URG are set but there is no ACK flag set.&amp;nbsp; It is not clear to me if this packet was originated by the firewall itself, or is some kind of spoofed packet coming in from the network.&amp;nbsp; Perhaps others can chime in.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 12:46:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Same-source-and-destination-GW-only-Invalid-TCP-flag-combination/m-p/184787#M30789</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-06-26T12:46:21Z</dc:date>
    </item>
    <item>
      <title>Re: Same source and destination (GW only) Invalid TCP flag combination (Mailformed Packet)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Same-source-and-destination-GW-only-Invalid-TCP-flag-combination/m-p/184834#M30796</link>
      <description>&lt;P&gt;I have seen these packets when a host tries to connect to the same hide NAT address that it is being hide NATted behind. I think it was iPhones trying to connect to each other when I saw it "in the wild."&amp;nbsp; &amp;nbsp;You may be able to hunt down the original request by matching the destination port with the original post nat source port. *this is assuming you are hide NATting traffic behind your gateway's IP address&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 17:58:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Same-source-and-destination-GW-only-Invalid-TCP-flag-combination/m-p/184834#M30796</guid>
      <dc:creator>Lloyd_Braun</dc:creator>
      <dc:date>2023-06-26T17:58:46Z</dc:date>
    </item>
    <item>
      <title>Re: Same source and destination (GW only) Invalid TCP flag combination (Mailformed Packet)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Same-source-and-destination-GW-only-Invalid-TCP-flag-combination/m-p/185260#M30887</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8834"&gt;@Lloyd_Braun&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the update.&lt;/P&gt;&lt;P&gt;Please clarify more on this.&lt;/P&gt;&lt;P&gt;As per the logs, Gateway is the source and destination also.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Service: TCP/46039 (Destination Port) which is not a registered port.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As per&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;Sir it's using the Mgmt port which is a question.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I ran the&amp;nbsp; TCPDUMP with that PORT but no traffic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Looks like it's one time log generated a few days back.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/25509"&gt;@Chinmaya_Naik&lt;/a&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jun 2023 06:16:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Same-source-and-destination-GW-only-Invalid-TCP-flag-combination/m-p/185260#M30887</guid>
      <dc:creator>Chinmaya_Naik</dc:creator>
      <dc:date>2023-06-30T06:16:11Z</dc:date>
    </item>
  </channel>
</rss>

