<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall behavior when handling terminated TCP connections in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266149#M44766</link>
    <description>&lt;P&gt;I would agree with&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/73547"&gt;@Lesley&lt;/a&gt;&amp;nbsp;. From my experience with this, it usually turns out to be something on F5 side.&lt;/P&gt;</description>
    <pubDate>Mon, 29 Dec 2025 17:21:17 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-12-29T17:21:17Z</dc:date>
    <item>
      <title>Firewall behavior when handling terminated TCP connections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266082#M44762</link>
      <description>&lt;P&gt;Hi Check Point experts,&lt;/P&gt;&lt;P&gt;We have a VSX environment and recently noticed an interesting behavior that we’d like to get some feedback on.&lt;/P&gt;&lt;P&gt;From SmartView, the customer observed a large number of connections coming from Internet IPs with source port 443 trying to access an internal OA subnet. After checking tcpdump captures, we believe this is related to TCP sessions that are not being closed gracefully when OA clients access Internet services over port 443.&lt;/P&gt;&lt;P&gt;In our setup, there is an F5 load balancer in front of the Check Point firewall. When a connection is abnormally terminated, F5 starts its TCP idle timeout counter (300 seconds). Once the timer expires, F5 sends a RST-ACK packet toward the firewall on behalf of the original Internet IP. These RST-ACK packets are then dropped by the firewall and show up in the logs.&lt;/P&gt;&lt;P&gt;We already tried enabling the workaround mentioned in SK19746:&lt;/P&gt;&lt;P&gt;fw ctl set int fw_rst_expired_conn 1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;but this does not seem to change the behavior.&lt;/P&gt;&lt;P&gt;At this point, we’re trying to better understand whether this is expected behavior in such a topology, or if there are other tuning options or best practices (on either Check Point or F5 side) that people have successfully used in similar scenarios.&lt;/P&gt;&lt;P&gt;Any shared experience or suggestions would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Image_2025-12-29_16-03-46.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32560iFC57B855D5854EAF/image-size/large?v=v2&amp;amp;px=999" role="button" title="Image_2025-12-29_16-03-46.png" alt="Image_2025-12-29_16-03-46.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Image_2025-12-29_15-55-00.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32561i93D2F51B7514FE58/image-size/large?v=v2&amp;amp;px=999" role="button" title="Image_2025-12-29_15-55-00.png" alt="Image_2025-12-29_15-55-00.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Dec 2025 08:10:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266082#M44762</guid>
      <dc:creator>Vanness_Chen</dc:creator>
      <dc:date>2025-12-29T08:10:55Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall behavior when handling terminated TCP connections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266147#M44765</link>
      <description>&lt;P&gt;I think this needs to be changed on the F5. In capture you can see that both sides (client and server) wants to close the session with RESETS and FIN packets.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think you have to look into and change the scenario&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://my.f5.com/manage/s/article/K13004262" target="_blank"&gt;https://my.f5.com/manage/s/article/K13004262&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Dec 2025 16:58:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266147#M44765</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-12-29T16:58:07Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall behavior when handling terminated TCP connections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266149#M44766</link>
      <description>&lt;P&gt;I would agree with&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/73547"&gt;@Lesley&lt;/a&gt;&amp;nbsp;. From my experience with this, it usually turns out to be something on F5 side.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Dec 2025 17:21:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266149#M44766</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-29T17:21:17Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall behavior when handling terminated TCP connections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266156#M44769</link>
      <description>&lt;P&gt;What are the exact errors showing in the logs?&lt;BR /&gt;In any case, I suspect we are a bit more aggressive in our dropping of ended connections than the F% is:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk39272" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk39272&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Dec 2025 17:59:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266156#M44769</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-12-29T17:59:24Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall behavior when handling terminated TCP connections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266185#M44774</link>
      <description>&lt;P&gt;Hi Lesley:&lt;/P&gt;&lt;P&gt;Thanks for your reply.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I previously worked with the F5 engineer to run TCPdump at the same time, and on the F5 side we also observed both the client and the server sending RST packets to each other.&lt;/P&gt;&lt;P&gt;If the workaround described in SK19746 cannot notify F5 to stop waiting for the connection to terminate, then I’ll follow up with the F5 engineer to discuss possible configuration changes on the F5 side instead.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Dec 2025 02:29:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266185#M44774</guid>
      <dc:creator>Vanness_Chen</dc:creator>
      <dc:date>2025-12-30T02:29:06Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall behavior when handling terminated TCP connections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266186#M44775</link>
      <description>&lt;P&gt;Hi PhoenBoy:&lt;/P&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;The firewall is simply performing a policy check on the packet. Since there is no matching accept rule, the packet is eventually dropped by the cleanup rule.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Dec 2025 02:29:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266186#M44775</guid>
      <dc:creator>Vanness_Chen</dc:creator>
      <dc:date>2025-12-30T02:29:40Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall behavior when handling terminated TCP connections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266195#M44777</link>
      <description>&lt;P&gt;I think there is no point to allow the reset packet from the F5 on the check point firewall (the last packet in the capture). Both client and server already have closed it. I suspect traffic is no dropped on firewall with out of state message (please confirm)&lt;/P&gt;
&lt;P&gt;Even if you somehow allow the traffic on the firewall it will end up on the client with no purpose because session is already gone&lt;/P&gt;</description>
      <pubDate>Tue, 30 Dec 2025 09:24:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266195#M44777</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-12-30T09:24:05Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall behavior when handling terminated TCP connections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266198#M44778</link>
      <description>&lt;P&gt;Hi Lesley:&lt;/P&gt;&lt;P&gt;The RST-ACK packets coming from the F5 are simply being blocked by the firewall’s cleanup rule, and there are no any out of state messages.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Dec 2025 09:47:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266198#M44778</guid>
      <dc:creator>Vanness_Chen</dc:creator>
      <dc:date>2025-12-30T09:47:36Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall behavior when handling terminated TCP connections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266203#M44779</link>
      <description>&lt;P&gt;As a test you can allow the traffic with a rule and maybe then the out of state message will pop-up&lt;/P&gt;</description>
      <pubDate>Tue, 30 Dec 2025 10:07:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266203#M44779</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-12-30T10:07:33Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall behavior when handling terminated TCP connections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266213#M44781</link>
      <description>&lt;P&gt;That would make sense, unless you allow them explicitly.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Dec 2025 13:09:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266213#M44781</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-30T13:09:43Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall behavior when handling terminated TCP connections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266241#M44784</link>
      <description>&lt;P&gt;We remove the entries from the state table shortly after the connection gracefully closes.&lt;BR /&gt;Which would make these log messages expected.&lt;BR /&gt;If you want to eliminate them, you could create a "no log" rule for the relevant traffic.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could create a service like the following:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32588i7A796F09A1A318DA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32589i89A04970DFE53131/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;This service should match source port 443 and a destination port of TCP High Ports (above 1024).&lt;/P&gt;</description>
      <pubDate>Tue, 30 Dec 2025 16:23:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266241#M44784</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-12-30T16:23:35Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall behavior when handling terminated TCP connections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266328#M44799</link>
      <description>&lt;P&gt;Hi PhoneBoy:&lt;/P&gt;&lt;P&gt;I tried the approach you suggested today and it worked very well. I’m glad I learned how to specify the source port (s_port) in a policy rule.&lt;BR /&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jan 2026 04:19:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266328#M44799</guid>
      <dc:creator>Vanness_Chen</dc:creator>
      <dc:date>2026-01-02T04:19:35Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall behavior when handling terminated TCP connections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266374#M44801</link>
      <description>&lt;P&gt;Excellent, thanks for updating us.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jan 2026 15:39:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-behavior-when-handling-terminated-TCP-connections/m-p/266374#M44801</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-02T15:39:42Z</dc:date>
    </item>
  </channel>
</rss>

