<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: how to explain the following ? in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217069#M36176</link>
    <description>&lt;P&gt;We only generate the log on the final decision, we don't log 'accepts' and then later log a 'drop' for the same connection. The reason you see an accept like this is as others have explained in this thread - some packets occurred, we accepted them because we needed more than simple IP/proto/port information to make a policy decision (due to advanced inspection being configured in the policy) but the connection stream stopped before we received this additional information. We don't want to just silently accept things as that would be a pretty terrible thing for a security device to do (unless it's explicitly configured to) so we send you these logs so that you know that these packets occurred.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 11 Jun 2024 01:53:11 GMT</pubDate>
    <dc:creator>emmap</dc:creator>
    <dc:date>2024-06-11T01:53:11Z</dc:date>
    <item>
      <title>how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/216969#M36139</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CPEarlyDrop-1.PNG" style="width: 943px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26179iCE9942F73B819DC2/image-size/large?v=v2&amp;amp;px=999" role="button" title="CPEarlyDrop-1.PNG" alt="CPEarlyDrop-1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;why does CP treat them differetly ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;The second and the&amp;nbsp; third packets are dropped ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks !!&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2024 04:03:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/216969#M36139</guid>
      <dc:creator>Gongya_Yu</dc:creator>
      <dc:date>2024-06-10T04:03:36Z</dc:date>
    </item>
    <item>
      <title>Re: how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/216970#M36140</link>
      <description>&lt;P&gt;Did you review the full log card and corresponding SK article for more information?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk113479" target="_blank"&gt;"Connection terminated before detection" in log reason for Unified Rulebase (checkpoint.com)&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2024 04:37:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/216970#M36140</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-06-10T04:37:09Z</dc:date>
    </item>
    <item>
      <title>Re: how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/216971#M36141</link>
      <description>&lt;P&gt;I did, but I still do not understand other than theory.&amp;nbsp; sorry.&lt;BR /&gt;which configuration enables this?&amp;nbsp; I do not see this on all our other firewalls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks !!&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2024 04:41:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/216971#M36141</guid>
      <dc:creator>Gongya_Yu</dc:creator>
      <dc:date>2024-06-10T04:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/216977#M36143</link>
      <description>&lt;P&gt;From the article Chris linked:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If the Access Rulebase does not reach a final match on accept, a log appears with a new unique rule specific for this case '&lt;/SPAN&gt;&lt;CODE&gt;CPNotEnoughDataForRuleMatch&lt;/CODE&gt;&lt;SPAN&gt;' and accept action.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Why a new unique rule?&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;Because the connection does not reach a final match, you cannot be sure on which rule this connection should have a match if it does not terminate before detection. To avoid a confusing rule in the log, a new unique rule indicates that this traffic reached the "&lt;/SPAN&gt;&lt;CODE&gt;Connection terminated before...&lt;/CODE&gt;&lt;SPAN&gt;" flow.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Why accept?&lt;BR /&gt;&lt;/STRONG&gt;&lt;SPAN&gt;The Security Gateway does not drop the connection. The connection terminated before a final match. The Security Gateway does accept the connection first packet (the rule base is in a possible match state). The log is "&lt;/SPAN&gt;&lt;CODE&gt;accept&lt;/CODE&gt;&lt;SPAN&gt;," reflecting that the traffic of the first packet was accepted because of a possible match.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Basically, the gateway saw a UDP packet on port 514 and accepted it as it can match a configured rule in your policy (rule 104, by the looks of your logs) but a single packet was not enough to confirm. As the packet was accepted as part of trying to figure out whether it matched the rule, we have an accept log with this notice that the packet was accepted, but we weren't able to finalise a rule match as no further packets came through on a matching session.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2024 07:20:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/216977#M36143</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-06-10T07:20:45Z</dc:date>
    </item>
    <item>
      <title>Re: how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217022#M36155</link>
      <description>&lt;P&gt;A little complicated.&lt;BR /&gt;Can I understand this way ?&lt;BR /&gt;Either Drop or Accept won't tell whether the user connection is drop and accepted finally.&amp;nbsp;&lt;BR /&gt;If yes,&amp;nbsp; what is the benefit for this log message ?&lt;BR /&gt;&lt;BR /&gt;thanks a lot !!&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2024 14:58:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217022#M36155</guid>
      <dc:creator>Gongya_Yu</dc:creator>
      <dc:date>2024-06-10T14:58:13Z</dc:date>
    </item>
    <item>
      <title>Re: how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217028#M36159</link>
      <description>&lt;P&gt;This log message almost always means the firewall isn't the problem. It accepted the traffic, and something later (e.g, a routing problem) caused the traffic to not actually work.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2024 15:13:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217028#M36159</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2024-06-10T15:13:54Z</dc:date>
    </item>
    <item>
      <title>Re: how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217032#M36160</link>
      <description>&lt;P&gt;This second log accepts the packet without reaching the final match, if some drop matches later, the connection will be dropped, right ?&lt;/P&gt;&lt;P&gt;thanks !!&lt;/P&gt;&lt;P&gt;So confusing. Based on my previous post, I was told&amp;nbsp; this log tells the connection is terminated.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2024 16:17:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217032#M36160</guid>
      <dc:creator>Gongya_Yu</dc:creator>
      <dc:date>2024-06-10T16:17:37Z</dc:date>
    </item>
    <item>
      <title>Re: how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217033#M36161</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/27871"&gt;@Bob_Zimmerman&lt;/a&gt;&amp;nbsp;explained it PERFECTLY below, which was also your question btw &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/When-does-CPEarlyDrop-occur-with-ACCPET-action/m-p/216402#M35976" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/When-does-CPEarlyDrop-occur-with-ACCPET-action/m-p/216402#M35976&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2024 17:19:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217033#M36161</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-10T17:19:32Z</dc:date>
    </item>
    <item>
      <title>Re: how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217045#M36164</link>
      <description>&lt;P&gt;To understand why this phenomenon occurs, you need to understand how rules are matched.&lt;BR /&gt;See:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Management/Unified-Policy-Column-based-Rule-Matching/m-p/9888" target="_blank"&gt;https://community.checkpoint.com/t5/Management/Unified-Policy-Column-based-Rule-Matching/m-p/9888&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;See also:&amp;nbsp;&lt;A href="https://phoneboy.org/2016/12/14/which-comes-first-the-ports-or-the-application-id/" target="_blank"&gt;https://phoneboy.org/2016/12/14/which-comes-first-the-ports-or-the-application-id/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The first "Accept" log is because there are one or more rules that potentially match this traffic (based purely on Layer 3 information).&lt;BR /&gt;If any of those rules involve Application Control (either due to the services/applications listed or because of the log setting on the rule), then additional traffic is required to properly classify it to find the matching rule.&lt;/P&gt;
&lt;P&gt;The fact you got CPNotEnoughDataForRuleMatch means that the traffic stopped flowing before we were able to properly classify it.&lt;BR /&gt;This is expected behavior depending on the order of the rules in your rulebase.&lt;BR /&gt;You can also eliminate the extra logs by creating an explicit rule early in your rulebase using the service syslog (which is a UDP object).&lt;BR /&gt;This way, the first rulebase match can be done entirely on the first packet.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2024 18:59:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217045#M36164</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-10T18:59:08Z</dc:date>
    </item>
    <item>
      <title>Re: how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217053#M36167</link>
      <description>&lt;P&gt;How do the same source, destination, and port using the same firewall rules get different filtering ? timing ? payload or etc ?&lt;/P&gt;&lt;P&gt;thanks so much !!&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2024 20:30:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217053#M36167</guid>
      <dc:creator>Gongya_Yu</dc:creator>
      <dc:date>2024-06-10T20:30:01Z</dc:date>
    </item>
    <item>
      <title>Re: how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217060#M36169</link>
      <description>&lt;P&gt;I know that may seem confusing, but as everyone said, its most likely NOT the fw issue, as the other side does not send response back, thus not allowing the firewall to fully classify the application, for the lack of better term.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2024 22:06:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217060#M36169</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-10T22:06:00Z</dc:date>
    </item>
    <item>
      <title>Re: how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217063#M36172</link>
      <description>&lt;P&gt;The first rule that matches the connection (based on rulebase order) is the one that generally applies.&lt;BR /&gt;However, some services/applications can NOT be identified on the first packet (i.e. the TCP SYN).&lt;BR /&gt;Consider the following example:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26186i5F657A0CE3EAB3EE/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Let's assume we are making an HTTP connection (port 80) to a given website.&lt;BR /&gt;The first packet does not contain enough information to determine which of these rules will ultimately apply as:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;No files have been transferred yet&lt;/LI&gt;
&lt;LI&gt;We don't know what website you are accessing until the HTTP Host header is seen&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;In this context, all three rules are potential matches.&lt;BR /&gt;Since at least one of them has an Accept action, we allow the traffic until we have enough to properly classify the connection.&lt;BR /&gt;If we do not receive enough information before the connection ultimately terminates (e.g. TCP FIN/FIN-ACK), you get the&amp;nbsp; CPNotEnoughDataForRuleMatch message.&lt;/P&gt;
&lt;P&gt;In your case, I'm guessing the first rule that "potentially matches" the relevant traffic includes either:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Something that is NOT a TCP/UDP Service Object&lt;/LI&gt;
&lt;LI&gt;Contains the tracking "Detailed" or "Extended" (these logs activate App Control)&lt;/LI&gt;
&lt;LI&gt;Uses Content Awareness (less likely, but possible)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Rules with these characteristics cannot be matched on the first packet.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2024 22:49:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217063#M36172</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-10T22:49:25Z</dc:date>
    </item>
    <item>
      <title>Re: how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217064#M36173</link>
      <description>&lt;P&gt;I will see if I have an email with explanation TAC guy gave when we had a case for this while back, I found it to be an EXCELLENT one. If I "dig it out", will update.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2024 23:07:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217064#M36173</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-10T23:07:03Z</dc:date>
    </item>
    <item>
      <title>Re: how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217067#M36174</link>
      <description>&lt;P&gt;thanks !!&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2024 00:38:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217067#M36174</guid>
      <dc:creator>Gongya_Yu</dc:creator>
      <dc:date>2024-06-11T00:38:04Z</dc:date>
    </item>
    <item>
      <title>Re: how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217068#M36175</link>
      <description>&lt;P&gt;thanks a lot !!&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2024 00:40:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217068#M36175</guid>
      <dc:creator>Gongya_Yu</dc:creator>
      <dc:date>2024-06-11T00:40:04Z</dc:date>
    </item>
    <item>
      <title>Re: how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217069#M36176</link>
      <description>&lt;P&gt;We only generate the log on the final decision, we don't log 'accepts' and then later log a 'drop' for the same connection. The reason you see an accept like this is as others have explained in this thread - some packets occurred, we accepted them because we needed more than simple IP/proto/port information to make a policy decision (due to advanced inspection being configured in the policy) but the connection stream stopped before we received this additional information. We don't want to just silently accept things as that would be a pretty terrible thing for a security device to do (unless it's explicitly configured to) so we send you these logs so that you know that these packets occurred.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2024 01:53:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217069#M36176</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-06-11T01:53:11Z</dc:date>
    </item>
    <item>
      <title>Re: how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217076#M36179</link>
      <description>&lt;P&gt;"we accepted them because we needed more than simple IP/proto/port information to make a policy decision (due to advanced inspection being configured in the policy) but the connection stream stopped before we received this additional information."&lt;BR /&gt;&lt;BR /&gt;The connection attempts for the second and the third logs will be conditionally dropped ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2024 04:17:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217076#M36179</guid>
      <dc:creator>Gongya_Yu</dc:creator>
      <dc:date>2024-06-11T04:17:52Z</dc:date>
    </item>
    <item>
      <title>Re: how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217127#M36192</link>
      <description>&lt;P&gt;I cant sadly find it, as its been some time, but it was very similar to what Phoneboy sent you.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2024 14:40:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217127#M36192</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-11T14:40:56Z</dc:date>
    </item>
    <item>
      <title>Re: how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217135#M36196</link>
      <description>&lt;P&gt;thanks a lot for many responses. Unfortunately I still don't know how I tell my users whether the second or the third logs indicate their connection attempts succeed or fail. If the log does not tell exactly the connection attempt succeeds or fails. why there ?&lt;BR /&gt;As a user, what I care most is my connection attempt succeeds or fails based on the firewall rules configured.&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2024 15:29:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217135#M36196</guid>
      <dc:creator>Gongya_Yu</dc:creator>
      <dc:date>2024-06-11T15:29:59Z</dc:date>
    </item>
    <item>
      <title>Re: how to explain the following ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217143#M36197</link>
      <description>&lt;P&gt;If you read carefully what&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/71054"&gt;@emmap&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;wrote, I dont think it even matters in this case what those entries show, whole point is there was NOT enough data to classify session as successful, thus the reason why you see that.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2024 16:07:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/how-to-explain-the-following/m-p/217143#M36197</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-11T16:07:32Z</dc:date>
    </item>
  </channel>
</rss>

