<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: &amp;quot;It's not the firewall&amp;quot; in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/195474#M32782</link>
    <description>&lt;P&gt;For me, EVE-NG is the law for the labs, so easy and convenient.&lt;/P&gt;</description>
    <pubDate>Tue, 17 Oct 2023 23:09:23 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2023-10-17T23:09:23Z</dc:date>
    <item>
      <title>"It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/112772#M21199</link>
      <description>&lt;P&gt;Hi (check)mates,&lt;/P&gt;
&lt;P&gt;We all know that "the firewall" is one of the first things people blame when there is a traffic issue. A security gateway (a "firewall") do a lot of "intelligent stuff" more than just routing traffic (and -in fact- many network devices today do also "a lot of things") so I understand there is a good reason for thinking about the firewall but, at the same time, there is a big number of times where it's not anything related to it, or when it's not directly related.&lt;/P&gt;
&lt;P&gt;I'm looking to build a brief list of &lt;STRONG&gt;typical&amp;nbsp;or somewhat frequent&lt;/STRONG&gt; issues we face, where "the firewall" is reported as the root of the issue, but finally it isn't.&lt;/P&gt;
&lt;P&gt;It's a quite generic topic, and in terms of troubleshooting it's probably even more generic. Probably there are several simple tools that one should use first, like: traffic logs, fw monitor, tcpdump/cppcap, etcetera. But what I would like to point is not the troubleshooting, but the issues themselves. Of course, assuming the firewall side is properly configured (which would be a "firewall issue" but due to a bad configuration).&lt;/P&gt;
&lt;P&gt;To narrow down the circle, I'm specially focusing on networking issues, but every idea is welcomed.&lt;/P&gt;
&lt;P&gt;Do you think it would be useful to elaborate such list?&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; What issues do you usually find?&lt;/P&gt;
&lt;P&gt;Something to start&lt;/P&gt;
&lt;P&gt;(I'll update this list with new suggested issues):&lt;/P&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;A multicast issue with the switches, impacting the cluster behavior.&lt;/LI&gt;
&lt;LI&gt;A VLAN is not populated to all the required switches involved in the cluster communication, specially in VSX environments where not all the VLANs are monitored by default.&lt;/LI&gt;
&lt;LI&gt;Related to remote access VPN (this year has been quite active in that matter), some device at the WAN side is blocking the ISAKMP UDP 4500 packets directed to our Gateways, but not the whole UDP 4500. Typically, another firewall&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":rolling_on_the_floor_laughing:"&gt;🤣&lt;/span&gt;&lt;/LI&gt;
&lt;LI&gt;Asymmetric routing issues, where the traffic goes through one member and comes back through the other member of the cluster.&lt;/LI&gt;
&lt;LI&gt;Static ARP entries in the "neighbor" routing devices, or ARP cache issues.&lt;/LI&gt;
&lt;LI&gt;Any kind of issue with Internet access: DNS queries not allowed to Internet or to the corporate DNS servers (so we cannot solve our public domains), or TCP ports blocked, or any required URL blocked (typically by a proxy)...&lt;/LI&gt;
&lt;LI&gt;Traffic delays: these are typically more difficult to diagnose. fw monitor with timestamps is one of our friends here.&lt;/LI&gt;
&lt;LI&gt;Layer 1 (physical) issues. Don't forget to review the hardware interface counters!&lt;/LI&gt;
&lt;LI&gt;Missed route at the destination, especially related to the routes related to the encryption domains in a VPN.&lt;/LI&gt;
&lt;LI&gt;Why not: another firewall blocking the communication, of course&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;&amp;nbsp;Or a forgotten transparent layer-7 device in the middle (like an IPS), installed in a previous age. This may be a variant: "it's not my firewall"&lt;/LI&gt;
&lt;LI&gt;An application or server issue. The simplest example is that the server is not listening in the requested port. A more complex one would be an application layer issue.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Lastly, a little humor. &lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="the-moment-when-you-prove-its-not-the-firewall.jpg" style="width: 200px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10782i629DFD1B514AB844/image-size/small?v=v2&amp;amp;px=200" role="button" title="the-moment-when-you-prove-its-not-the-firewall.jpg" alt="the-moment-when-you-prove-its-not-the-firewall.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="5c9e05a465c753417dbde949ee285fd9e56f0739ad0254de838a7d8c61c1a318.jpg" style="width: 200px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10780i42C4118924F47679/image-size/small?v=v2&amp;amp;px=200" role="button" title="5c9e05a465c753417dbde949ee285fd9e56f0739ad0254de838a7d8c61c1a318.jpg" alt="5c9e05a465c753417dbde949ee285fd9e56f0739ad0254de838a7d8c61c1a318.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="169j56.jpg" style="width: 200px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10781iA1E72A494ED734DD/image-size/small?v=v2&amp;amp;px=200" role="button" title="169j56.jpg" alt="169j56.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1sg25m.jpg" style="width: 200px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10779iD4FB83E02C6FA5BB/image-size/small?v=v2&amp;amp;px=200" role="button" title="1sg25m.jpg" alt="1sg25m.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Mar 2021 17:33:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/112772#M21199</guid>
      <dc:creator>Victor_MR</dc:creator>
      <dc:date>2021-03-23T17:33:01Z</dc:date>
    </item>
    <item>
      <title>Re: "It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/112783#M21202</link>
      <description>&lt;P&gt;Arp cache often issues get blamed on the firewall.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Mar 2021 00:52:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/112783#M21202</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-03-09T00:52:47Z</dc:date>
    </item>
    <item>
      <title>Re: "It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/112788#M21203</link>
      <description>&lt;P&gt;Though this is good post to discuss, its very broad when it comes to knowledge and work done by different customers. Personally, I often find people would blame the firewall without even doing basic network tests (ping, traceroute, route lookup...). I think it would be VERY HELPFUL if there was an sk on some basic things to check on CP firewalls before engaging TAC.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Mar 2021 01:54:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/112788#M21203</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-03-09T01:54:44Z</dc:date>
    </item>
    <item>
      <title>Re: "It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/112803#M21206</link>
      <description>&lt;P&gt;Sadly true. In fact, most of the issues (if not all) in this post would be valid for any firewall vendor.&lt;/P&gt;
&lt;P&gt;Happy to know that you find it useful! I expect the wise people stop by this thread and leave their two cents &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Mar 2021 08:28:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/112803#M21206</guid>
      <dc:creator>Victor_MR</dc:creator>
      <dc:date>2021-03-09T08:28:57Z</dc:date>
    </item>
    <item>
      <title>Re: "It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/112808#M21207</link>
      <description>&lt;P&gt;Oh, don't I have those stories...&lt;/P&gt;
&lt;P&gt;Once, a customer from Scandinavia was a severe case of FW breaking down VOIP system. After changing the FW appliances, they lost phone system, which could place the calls still, but parties could not hear each other. After several escalations, I was visiting the customer on prem, to see what the hell is going on. Long story short, someone put a static ARP entry on their GateKeeper, pointing to the "old" FW mac address.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the other hand, I have quite a few opposite examples, where I was pretty confident it was not a FW myself, but proven wrong.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Mar 2021 08:38:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/112808#M21207</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-03-09T08:38:41Z</dc:date>
    </item>
    <item>
      <title>Re: "It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113060#M21228</link>
      <description>&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;I forgot the ARP issues and definitely that is one of the typical things that may happen outside the gateway.&amp;nbsp; It's not so common, but it happens from time to time.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Mar 2021 18:57:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113060#M21228</guid>
      <dc:creator>Victor_MR</dc:creator>
      <dc:date>2021-03-10T18:57:51Z</dc:date>
    </item>
    <item>
      <title>Re: "It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113061#M21229</link>
      <description>&lt;P&gt;I'll add also other things I've thought about.&lt;/P&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;Any kind of issue with Internet access: DNS queries not allowed to Internet or to the corporate DNS servers (so we cannot solve our public domains), or TCP ports blocked, or any required URL blocked (typically by a proxy)...&lt;/LI&gt;
&lt;LI&gt;Traffic delays: these are typically more difficult to diagnose. fw monitor with timestamps is one of our friends here.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I'll update the original post&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Mar 2021 19:03:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113061#M21229</guid>
      <dc:creator>Victor_MR</dc:creator>
      <dc:date>2021-03-10T19:03:01Z</dc:date>
    </item>
    <item>
      <title>Re: "It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113112#M21231</link>
      <description>&lt;P&gt;Drops for retransmitted SYN with different window scale, or retransmitted SYN with different sequence number are not problems on the firewall. They are instead symptoms. They happen when the client doesn't get a response to its connection, and it tries again with slightly different settings in case some box in the path didn't like the settings of the original SYN.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Mar 2021 20:19:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113112#M21231</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2021-03-10T20:19:26Z</dc:date>
    </item>
    <item>
      <title>Re: "It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113116#M21233</link>
      <description>&lt;P&gt;ooh, let me check dozens of incident tickets we have in firewall queue ...&lt;/P&gt;
&lt;P&gt;"Firewall is blocking the traffic, allow communication NOW !" ... in fact - route on destination is missing...&lt;/P&gt;
&lt;P&gt;"Firewall stopped passing traffic from 1.3.2021 00:01" .. in fact - regulary requested temporary time rule till the end of February expired (requested by the same person who created ticket)...&lt;/P&gt;
&lt;P&gt;"Firewall is blocking specific tcp/udp port" ... in fact - port is closed on destination server&lt;/P&gt;
&lt;P&gt;&amp;nbsp;but to blame also "us", once you dont see any logs, it doesnt mean there is no traffic ... just rule is not logging &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Mar 2021 20:56:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113116#M21233</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2021-03-10T20:56:10Z</dc:date>
    </item>
    <item>
      <title>Re: "It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113606#M21289</link>
      <description>&lt;P&gt;Oh boy, where do I even start with this one.&amp;nbsp; Let's see if anyone here can top this story, it was many years ago but just about made me lose my mind.&lt;/P&gt;
&lt;P&gt;I was asked to take a look at a problem for a midsize Check Point customer.&amp;nbsp; Apparently a certain file was being blocked by the firewall with no drop log, and no one could figure out why.&amp;nbsp; I agreed to take a remote look thinking it would be an easy fix, little did I know that it would stretch into many long days culminating in threats to rip out all Check Point products.&lt;/P&gt;
&lt;P&gt;So when Customer Windows System A would try to transfer a certain file using cleartext FTP through the firewall to Customer Windows System B, the transfer was stalling at about 5MB and never recovering, always in the exact same place in the file.&amp;nbsp; All other files could be transferred just fine between the two systems and there were no performance issues, and by this time the problematic file had been dubbed the "poison file".&amp;nbsp; The file would also be blocked if it was sent to a completely different destination "System C" through the firewall.&amp;nbsp; Sending the poison file between systems located on System A's same VLAN/subnet worked fine, so the finger was being pointed squarely at the firewall.&amp;nbsp; Customer was only using Firewall and IPSec VPN blades on this particular firewall, so no TP or APCL/URLF.&amp;nbsp; Matching speed and duplex were verified on all network interfaces and switchports.&lt;/P&gt;
&lt;P&gt;So I login to the Check Point firewall and run &lt;STRONG&gt;fw ctl zdebug drop&lt;/STRONG&gt;.&amp;nbsp; Transfer of the poison file commences and stalls as expected.&amp;nbsp; Nothing in the &lt;STRONG&gt;fw ctl zdebug drop&lt;/STRONG&gt; output related to the connection at all, so it is not being dropped/blocked by the Check Point code.&amp;nbsp; Next I disable SecureXL for System A's IP address and start an &lt;STRONG&gt;fw monitor -e&lt;/STRONG&gt;.&amp;nbsp; I see all packets of the poison file successfully traversing the firewall, then everything associated with that connection suddenly stops at the time of stall.&amp;nbsp; No retransmissions, FIN/RST or anything at all, it just stops with no further packets.&amp;nbsp; I see exactly the same thing with &lt;STRONG&gt;tcpdump&lt;/STRONG&gt;, so it isn't SecureXL which is disabled anyway.&amp;nbsp;&amp;nbsp;Pull all packets up to that point in both the &lt;STRONG&gt;fw monitor&lt;/STRONG&gt; and &lt;STRONG&gt;tcpdump&lt;/STRONG&gt; captures into Wireshark, and everything is perfectly fine with TCP window, ack/seq numbers and everything else; Wireshark doesn't flag anything suspicious.&amp;nbsp; The connection's packets just stop...&lt;/P&gt;
&lt;P&gt;Theorize that perhaps System A is dropping the "poison" packet due to some kind of local firewall/antivirus software and never transmitting it, customer makes sure all that is disabled with no effect.&amp;nbsp; Next I request to install Wireshark on System A as there was nowhere else to easily capture packets between System A and the firewall.&amp;nbsp; At this point the grumbling starts by the customer's network team, who is not very fond of Check Point and would like nothing more than to see them all replaced with Cisco firewalls.&amp;nbsp; Server A's administrator was not very happy about it either, but eventually agrees.&amp;nbsp; We start a Wireshark capture on System A along with an&amp;nbsp;&lt;STRONG&gt;fw monitor -e&lt;/STRONG&gt; on the firewall.&amp;nbsp; Poison file transmission starts and then stalls as expected.&amp;nbsp; Notice in local Wireshark capture that at time of stall, System A starts retransmitting the same packet over and over again until the connection eventually dies.&amp;nbsp; Thing is I'm not seeing this "poison packet" nor any of its retransmissions at all in &lt;STRONG&gt;fw monitor&lt;/STRONG&gt; and &lt;STRONG&gt;tcpdump&lt;/STRONG&gt;, all I see is all the packets leading up to it.&amp;nbsp; So as an example System A is retransmitting TCP SEQ number 33 over and over again, but all I see are the sequence numbers up through 32 on the firewall's captures.&amp;nbsp; The customer's network team certainly likes this finding, as System A has been verified as properly sending the poison packet to the firewall.&lt;/P&gt;
&lt;P&gt;This eventually leads to a conversation where I ask exactly what is physically sitting between System A and the firewall's interface.&amp;nbsp; Just a single Cisco Layer 2 switch and nothing else they tell me.&amp;nbsp; I ask them to manually verify this by tracing cables (cue more grumbling) as I suspect there may be some kind of IPS or other device that doesn't like the poison packet or its retransmissions.&amp;nbsp; They verify the path and only the Layer 2 Cisco switch is there.&amp;nbsp; &amp;nbsp;They try changing switchports for the firewall interface and System A, no effect.&amp;nbsp; I personally inspect the configuration of the switch and it is indeed operating in pure Layer 2 mode with no reported STP events or anything else configured that could drop traffic so specifically like this.&lt;/P&gt;
&lt;P&gt;Next step is to try replacing the switch, the customer wants to replace it with a switch of the same model but I insist that we use an unmanaged switch that is as stupid as possible during a downtime window, where we will cable System A and the firewall directly through the unmanaged switch.&amp;nbsp; This requires coordination of a downtime window, and as a result&amp;nbsp; I'm hearing that this issue is now being escalated inside the customer's organization beyond the Director level and VPs are starting to get involved.&amp;nbsp; Thinly-veiled threats to pull out this Check Point firewall and the 10 others or so they have are starting to percolate.&amp;nbsp; We get the downtime window approved and hook System A and the firewall together using a piece of crap $30 switch from Best Buy.&amp;nbsp; We start the transfer and...and...&lt;/P&gt;
&lt;P&gt;it still stalls at exactly the same place; everything still looks exactly the same in all Wireshark and firewall packet captures.&amp;nbsp; The customer's network team is getting pretty smug now thinking they have won and they'll soon be using Cisco firewalls.&amp;nbsp; At this point I'm on the brink of an existential crisis and starting to seriously question my knowledge and experience.&amp;nbsp; Humbling to say the least.&lt;/P&gt;
&lt;P&gt;Finally in desperation this conversation ensues:&lt;/P&gt;
&lt;P&gt;Me: What is physically between System A and the firewall?&lt;/P&gt;
&lt;P&gt;Them: We already told you, the Cisco switch which is clearly working fine.&lt;/P&gt;
&lt;P&gt;Me: How far apart physically are the involved systems in your Data Center? (thinking electrical interference)&lt;/P&gt;
&lt;P&gt;Them: Not sure how that is relevant but System A is about 10 feet from the switch and direct wired, and the firewall is on the other side of the Data Center about 80 feet away.&lt;/P&gt;
&lt;P&gt;Me: System A is direct wired to the switch with a single cable?&lt;/P&gt;
&lt;P&gt;Them: (Exasperated) Yes.&lt;/P&gt;
&lt;P&gt;Me: And the firewall is direct wired to the switch with a long Ethernet cable run across the room?&lt;/P&gt;
&lt;P&gt;Them: Er, no it is too far for that.&lt;/P&gt;
&lt;P&gt;Me: Wait, what?&lt;/P&gt;
&lt;P&gt;Them: There is a RJ45 patch panel in the same rack as the switch which leads to a patch panel on the other side of the room near the firewall.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Me: And you are sure there is not some kind of IPS or other device between the ports of the patch panels?&lt;/P&gt;
&lt;P&gt;Them: Dude come on, it is just a big bundle of wire going across the room.&amp;nbsp; The firewall is direct wired to the patch panel on that side.&lt;/P&gt;
&lt;P&gt;Me: What is the longest direct Ethernet cable you have on hand?&lt;/P&gt;
&lt;P&gt;Them: What?&lt;/P&gt;
&lt;P&gt;Me:&amp;nbsp;What is the longest direct Ethernet cable you have on hand?&lt;/P&gt;
&lt;P&gt;Them: Dunno, probably 100 feet or so.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Me: I want you to direct wire the firewall to the switch itself, bypassing the patch panel.&amp;nbsp; Throw the long cable on the floor for now.&lt;/P&gt;
&lt;P&gt;Them: Come on man, that won't have any effect.&lt;/P&gt;
&lt;P&gt;Me: Do it anyway please.&lt;/P&gt;
&lt;P&gt;Them: I'm calling my manager, this is ridiculous.&lt;/P&gt;
&lt;P&gt;(click)&lt;/P&gt;
&lt;P&gt;So after some more teeth gnashing and approvals we get a downtime window, the customer has already reached out to Cisco for a meeting at this point and things are looking grim.&amp;nbsp; The cable is temporarily run across the floor of the data center directly connecting the switch and firewall.&amp;nbsp; From the firewall I see the interface go down after being unplugged from the patch panel and come back up with the direct wired connection.&amp;nbsp; I carefully check the speed and duplex on both sides to ensure there is no mismatch.&amp;nbsp; Watching on a shared screen with a phone audio conference active, the transfer of the poison file starts....&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BOOM.&amp;nbsp; The poison file transfers successfully in a matter of seconds.&lt;/P&gt;
&lt;P&gt;An amazing litany of foul language spews from my phone's speaker, combined in creative ways that would make even a sailor blush.&amp;nbsp; Eventually someone manages to slam the mute button on the other end.&amp;nbsp; After they come back off mute, they incredulously ask what I changed.&amp;nbsp; Nothing.&amp;nbsp; Nothing at all.&amp;nbsp; They don't believe me so I encourage them to hook everything back up through the same patch panel ports as before.&amp;nbsp; They do so and launch the transfer.&amp;nbsp; Immediate stall at 5MB again; they are much faster on the mute button this time.&amp;nbsp; They move both sides to a different patch panel jack, poison file transfer succeeds no problem.&amp;nbsp; Move it back to the original patch panel ports, and the poison file stall at 5MB is back.&lt;/P&gt;
&lt;P&gt;At this point for the first time I check the firewall's network interface counters with &lt;STRONG&gt;netstat -ni&lt;/STRONG&gt; which I hadn't really looked at due to the specificity of the problem.&amp;nbsp; There are numerous RX-ERRs being logged, &lt;STRONG&gt;ethtool -S&lt;/STRONG&gt; shows that they are CRC errors, which start actively incrementing every time a stall happens.&amp;nbsp; Damnit.&lt;/P&gt;
&lt;P&gt;So the best I can figure was a bad punch down in the RJ45 patch panel, and when a very specific bit sequence happens to be sent (that sequence was contained within the poison file) a bit would get flipped which then caused the CRC frame checksum to fail verification on the firewall.&amp;nbsp; The packet would be retransmitted, the bit flip would happen again, and it was discarded again over and over.&amp;nbsp; What I did not know at the time is that when a frame has a CRC error like this, it is discarded by the firewall's *NIC hardware* itself and never makes it anywhere near &lt;STRONG&gt;fw monitor&lt;/STRONG&gt; and &lt;STRONG&gt;tcpdump&lt;/STRONG&gt;, which is why I couldn't see it.&amp;nbsp; There is no way to change this behavior on most NICs either.&amp;nbsp; I never tried to figure out what the poison bit pattern was that caused the bit flip but I wouldn't be surprised if it consisted of the number 6 in groups of three or something.&amp;nbsp; Jeez.&lt;/P&gt;
&lt;P&gt;So the big takeaway: CHECK YOUR BLOODY NETWORK COUNTERS.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 17:43:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113606#M21289</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-03-16T17:43:14Z</dc:date>
    </item>
    <item>
      <title>Re: "It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113619#M21292</link>
      <description>&lt;P&gt;Oh boy, had an issue last week where VPN client traffic was severely impacted to the point of clients not being able to use any internal apps.&amp;nbsp; Firewall was dropping packets with "First packet is not SYN".&amp;nbsp; Hours of troubleshooting (of course nothing changed on the network) and one SpeedTest later, we discovered that the client upgraded the ISP link, but the ISP messed up the shaping on the upstream router, giving the client 100Mb down and 1024Kb up...&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 07:13:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113619#M21292</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2021-03-16T07:13:15Z</dc:date>
    </item>
    <item>
      <title>Re: "It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113620#M21293</link>
      <description>&lt;P&gt;Lol, that reminds me something else.&lt;BR /&gt;&lt;BR /&gt;Once upon a time, there was a product called "InterSpect", kinda FW in a bridge mode with Any-Any-Accept rule, aimed to Threat Prevention only.&lt;BR /&gt;&lt;BR /&gt;I was an EA engineer at the time. So I went to install a box to one Israeli customer. And it did not work. OSPF would not re-connect when a cable was cut, and we put the box in between. It was weird, but we did some troubleshooting and it seemed the box was in fault.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I took it back and spent two days in the lab, trying to reproduce. Nothing, OSPF ran as a clock. So I called the guy and said, look man, I suspect there is something with the cables on your end. He went ballistic and hang up on me.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Two days later he calls laughing, saying I was correct. They found a mouse in the networking cabinet. That poor creature bit one of the cables, and died apparently. They found it by the smell. By luck, that was cable going to the patch we used for our box. One of 8 wires was damaged. The connection was going up, but not functioning properly.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 07:41:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113620#M21293</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-03-16T07:41:46Z</dc:date>
    </item>
    <item>
      <title>Re: "It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113622#M21294</link>
      <description>&lt;P&gt;This reminded me of an old website called routergod.com, where they had a fictional character called Max Throughput - CCIE.&amp;nbsp; And he was the private eye you called when things got weird on your network.&amp;nbsp; Found the site on the &lt;A href="https://web.archive.org/web/20050204110216/http://www.routergod.com/mtu/mtu_1.html" target="_blank" rel="noopener"&gt;waybackmachine&lt;/A&gt;, had a good chuckle now &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 08:05:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113622#M21294</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2021-03-16T08:05:23Z</dc:date>
    </item>
    <item>
      <title>Re: "It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113668#M21303</link>
      <description>&lt;P&gt;Hah, awesome! &amp;nbsp;I had several similar issues with customers over the years that ultimately was a bad cable of some variety. &amp;nbsp;While not "firewall", I had a customer trying to establish a 4x interface port-channel between a Catalyst and Nexus switch that just wouldn't get established, no matter what they tried. &amp;nbsp;They banged on it for hours before finally calling me to help. &amp;nbsp;I looked around the config and stats on the Catalyst switch and found 1 interface was clocking errors. I told one person to swap the cable on that interface, then BOOM, it came up cleanly! &amp;nbsp;I then told the guy to cut off the ends of that cable, cut into pieces, and throw it in the trash. &amp;nbsp;He laughed at me; I gave him a serious look and said "dude, I'm not kidding; don't put a cable in the trash, cut it." &amp;nbsp;The trash can was beside a filing cabinet that had a pile of cables on it. &amp;nbsp;You can just imagine someone else walking into the room and see "oh this perfectly good cable just fell off the cabinet. &amp;nbsp;I'll be helpful and put it back in the pile...". &amp;nbsp;I think he finally cut the ends off the cable.&lt;/P&gt;&lt;P&gt;Separately, I was working with a customer doing a rip-and-replace of the network gear with a brand new pile of cables. &amp;nbsp;We found at least 6 cables in the pile of 100 that were factory-new, but arrived as bad. &amp;nbsp;Yikes!&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lesson learned: Never forget Layer 1 as a suspect. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I like your "Lesson Learned" to use "ethtool" as evidence for Layer 1 suspicions. Thank you for the reminder!&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 13:37:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113668#M21303</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2021-03-16T13:37:13Z</dc:date>
    </item>
    <item>
      <title>Re: "It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113669#M21304</link>
      <description>&lt;P&gt;We have queue full of the similar incidents, but the worst ones are for slowness.&lt;/P&gt;&lt;P&gt;They also wanted to disable TCP state checking =&amp;gt; it has never help to fix the issue &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 13:38:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113669#M21304</guid>
      <dc:creator>Lukes</dc:creator>
      <dc:date>2021-03-16T13:38:23Z</dc:date>
    </item>
    <item>
      <title>Re: "It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113671#M21305</link>
      <description>&lt;P&gt;Good list! &amp;nbsp;One more to add, similar to your item "remote site blocking traffic":&lt;/P&gt;&lt;P&gt;"Check the remote/destination end routing" to make sure the packets can get back. &amp;nbsp;&amp;nbsp;&amp;nbsp;I've had several issues over the years with Remote Access VPN (or even site-to-site VPN) that ultimately was due to the destination end of the connection didn't have a return route for the VPN Office Mode network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 13:42:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113671#M21305</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2021-03-16T13:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: "It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113682#M21306</link>
      <description>&lt;P&gt;DNS Conditional Forwarding has hosed things in the past.&amp;nbsp; The joke is its always DNS.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 14:55:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113682#M21306</guid>
      <dc:creator>love-cw</dc:creator>
      <dc:date>2021-03-16T14:55:38Z</dc:date>
    </item>
    <item>
      <title>Re: "It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113686#M21307</link>
      <description>&lt;P&gt;One of battle stories I tell on community Live sessions is about just that. When migrating MDS to new IP addresses, we stumbled on one of CMAs failing to install policies on remote FWs. Immediately I asked about third party, and the customer said firmly, no, we do not have anything else. After 30 minutes of arguing and some traffic traces, I have proven to them they had something else blocking traffic. Two hours later, they have identified it was a Juniper FW they forgot about eons ago...&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 15:31:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113686#M21307</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-03-16T15:31:57Z</dc:date>
    </item>
    <item>
      <title>Re: "It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113726#M21317</link>
      <description>&lt;P&gt;What a good story!&lt;/P&gt;
&lt;P&gt;It was a quite strange issue, but it is a fantastic example of how challenging may be sometimes to prove it is not the firewall. I'll add your conclussion to the original list &lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Also, I lik&lt;EM&gt;e this moment:&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;SPAN style="font-family: inherit; background-color: #ffffff; -webkit-tap-highlight-color: transparent; -webkit-text-size-adjust: 100%;"&gt;At this point I'm on the brink of an existential crisis and starting to seriously question my knowledge and experience.&lt;/SPAN&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Although this is not your case, I find that people often reach that point too soon. Or, at least, there is too much insecurity to just tell the customer or partner that everything is fine at the firewall side. I'm a humble guy with these matters and I like to be as much collaborative as I can, but when everything seems to be working fine, I always tell the customer something like "we're going to continue looking for what is happening and we're together with you on this, but at this point I tell you that based on my experience I sincerely doubt that this is a firewall issue, and I strongly recommend that you start looking at other places. I may be wrong, but the soon you start looking at the right place, the better".&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 22:02:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113726#M21317</guid>
      <dc:creator>Victor_MR</dc:creator>
      <dc:date>2021-03-16T22:02:40Z</dc:date>
    </item>
    <item>
      <title>Re: "It's not the firewall"</title>
      <link>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113738#M21318</link>
      <description>&lt;P&gt;Does other Vendor firewall interpretation of RFC's count?&lt;/P&gt;&lt;P&gt;(Albeit I sometimes wonder about CP as well - can't remember any examples right now but all VPN related)&lt;/P&gt;&lt;P&gt;i.e. Sonicwall / Check Point ikev1 IPSEC VPN using PKI&lt;BR /&gt;&lt;BR /&gt;SonicWall firewall does not contain the full certificate chain so you have to install subordinate CA's into the Trusted section of CP. (could be the cert issuer not doing something correctly)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;SonicWall Default expects IKE ID to be Distinguished Name (DN) CP sends Main IP Address.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;SonicWall only accepts a Cert from CP if the Main IP is the first Alternate name added to the cert when generating the key. If this is not the case, one way VPN initation is still possible but fails if CP initiates the connection.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Mar 2021 03:17:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/quot-It-s-not-the-firewall-quot/m-p/113738#M21318</guid>
      <dc:creator>spottex</dc:creator>
      <dc:date>2021-03-17T03:17:45Z</dc:date>
    </item>
  </channel>
</rss>

