<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firewall State Table in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Firewall-State-Table/m-p/24629#M4916</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a&amp;nbsp;situation where I need affirmation on my thoughts. Here goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Setup:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Firewall Cluster - R77.30 - Open Server&lt;/P&gt;&lt;P&gt;Management Interface&lt;/P&gt;&lt;P&gt;External Interface&lt;/P&gt;&lt;P&gt;Internal Interface&lt;/P&gt;&lt;P&gt;Core Interface&lt;/P&gt;&lt;P&gt;Set up as a basic Firewall no other blade enabled.&lt;/P&gt;&lt;P&gt;Static Routes setup for Management Services....i.e NTP, AD, SMTP, Syslog via Management Interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Situation:&lt;/STRONG&gt;&amp;nbsp;Traffic Originates from &lt;STRONG&gt;Internal&lt;/STRONG&gt; interface and follows routes out &lt;STRONG&gt;Management&lt;/STRONG&gt; Interface; however, when return traffic is observed via fwmonitor we see the &lt;STRONG&gt;Return&lt;/STRONG&gt; traffic traverse the &lt;STRONG&gt;Core&lt;/STRONG&gt; interface and then to &lt;STRONG&gt;Internal&lt;/STRONG&gt; Interface where the originating server lives.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[vs_0][fw_3] Internal:i[52]: 192.168.231.93 -&amp;gt; 10.128.232.101 (TCP) len=52 id=21750&lt;BR /&gt;TCP: 62298 -&amp;gt; 49155 .S.... seq=c55bc946 ack=00000000&lt;BR /&gt;[vs_0][fw_3] Internal:I[52]: 192.168.231.93 -&amp;gt; 10.128.232.101 (TCP) len=52 id=21750&lt;BR /&gt;TCP: 62298 -&amp;gt; 49155 .S.... seq=c55bc946 ack=00000000&lt;BR /&gt;[vs_0][fw_3] Managment:o[52]: 192.168.231.93 -&amp;gt; 10.128.232.101 (TCP) len=52 id=21750&lt;BR /&gt;TCP: 62298 -&amp;gt; 49155 .S.... seq=c55bc946 ack=00000000&lt;BR /&gt;[vs_0][fw_3] Managment:O[52]: 192.168.231.93 -&amp;gt; 10.128.232.101 (TCP) len=52 id=21750&lt;BR /&gt;TCP: 62298 -&amp;gt; 49155 .S.... seq=c55bc946 ack=00000000&lt;BR /&gt;[vs_0][fw_3] Core:i[52]: 10.128.232.101 -&amp;gt; 192.168.231.93 (TCP) len=52 id=3954&lt;BR /&gt;TCP: 49155 -&amp;gt; 62298 .S..A. seq=6e88bb0b ack=c55bc947&lt;BR /&gt;[vs_0][fw_3] Core:I[52]: 10.128.232.101 -&amp;gt; 192.168.231.93 (TCP) len=52 id=3954&lt;BR /&gt;TCP: 49155 -&amp;gt; 62298 .S..A. seq=6e88bb0b ack=c55bc947&lt;BR /&gt;[vs_0][fw_3] Internal:o[52]: 10.128.232.101 -&amp;gt; 192.168.231.93 (TCP) len=52 id=3954&lt;BR /&gt;TCP: 49155 -&amp;gt; 62298 .S..A. seq=6e88bb0b ack=c55bc947&lt;BR /&gt;[vs_0][fw_3] Internal:O[52]: 10.128.232.101 -&amp;gt; 192.168.231.93 (TCP) len=52 id=3954&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Question:&lt;/STRONG&gt;&amp;nbsp;Is normal Check Point State Synchronization? As long as the firewall has a SYN packet for the connection in the state table it doesn't matter if the SYNACK packet comes over a different interface. Is my thinking correct? Some people would say there should be an Out-of-State error, but my understanding that is only if the firewall receives a packet that doesn't not have a state/connection entry.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 15 Jan 2019 19:55:10 GMT</pubDate>
    <dc:creator>James_Simmons</dc:creator>
    <dc:date>2019-01-15T19:55:10Z</dc:date>
    <item>
      <title>Firewall State Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-State-Table/m-p/24629#M4916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a&amp;nbsp;situation where I need affirmation on my thoughts. Here goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Setup:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Firewall Cluster - R77.30 - Open Server&lt;/P&gt;&lt;P&gt;Management Interface&lt;/P&gt;&lt;P&gt;External Interface&lt;/P&gt;&lt;P&gt;Internal Interface&lt;/P&gt;&lt;P&gt;Core Interface&lt;/P&gt;&lt;P&gt;Set up as a basic Firewall no other blade enabled.&lt;/P&gt;&lt;P&gt;Static Routes setup for Management Services....i.e NTP, AD, SMTP, Syslog via Management Interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Situation:&lt;/STRONG&gt;&amp;nbsp;Traffic Originates from &lt;STRONG&gt;Internal&lt;/STRONG&gt; interface and follows routes out &lt;STRONG&gt;Management&lt;/STRONG&gt; Interface; however, when return traffic is observed via fwmonitor we see the &lt;STRONG&gt;Return&lt;/STRONG&gt; traffic traverse the &lt;STRONG&gt;Core&lt;/STRONG&gt; interface and then to &lt;STRONG&gt;Internal&lt;/STRONG&gt; Interface where the originating server lives.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[vs_0][fw_3] Internal:i[52]: 192.168.231.93 -&amp;gt; 10.128.232.101 (TCP) len=52 id=21750&lt;BR /&gt;TCP: 62298 -&amp;gt; 49155 .S.... seq=c55bc946 ack=00000000&lt;BR /&gt;[vs_0][fw_3] Internal:I[52]: 192.168.231.93 -&amp;gt; 10.128.232.101 (TCP) len=52 id=21750&lt;BR /&gt;TCP: 62298 -&amp;gt; 49155 .S.... seq=c55bc946 ack=00000000&lt;BR /&gt;[vs_0][fw_3] Managment:o[52]: 192.168.231.93 -&amp;gt; 10.128.232.101 (TCP) len=52 id=21750&lt;BR /&gt;TCP: 62298 -&amp;gt; 49155 .S.... seq=c55bc946 ack=00000000&lt;BR /&gt;[vs_0][fw_3] Managment:O[52]: 192.168.231.93 -&amp;gt; 10.128.232.101 (TCP) len=52 id=21750&lt;BR /&gt;TCP: 62298 -&amp;gt; 49155 .S.... seq=c55bc946 ack=00000000&lt;BR /&gt;[vs_0][fw_3] Core:i[52]: 10.128.232.101 -&amp;gt; 192.168.231.93 (TCP) len=52 id=3954&lt;BR /&gt;TCP: 49155 -&amp;gt; 62298 .S..A. seq=6e88bb0b ack=c55bc947&lt;BR /&gt;[vs_0][fw_3] Core:I[52]: 10.128.232.101 -&amp;gt; 192.168.231.93 (TCP) len=52 id=3954&lt;BR /&gt;TCP: 49155 -&amp;gt; 62298 .S..A. seq=6e88bb0b ack=c55bc947&lt;BR /&gt;[vs_0][fw_3] Internal:o[52]: 10.128.232.101 -&amp;gt; 192.168.231.93 (TCP) len=52 id=3954&lt;BR /&gt;TCP: 49155 -&amp;gt; 62298 .S..A. seq=6e88bb0b ack=c55bc947&lt;BR /&gt;[vs_0][fw_3] Internal:O[52]: 10.128.232.101 -&amp;gt; 192.168.231.93 (TCP) len=52 id=3954&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Question:&lt;/STRONG&gt;&amp;nbsp;Is normal Check Point State Synchronization? As long as the firewall has a SYN packet for the connection in the state table it doesn't matter if the SYNACK packet comes over a different interface. Is my thinking correct? Some people would say there should be an Out-of-State error, but my understanding that is only if the firewall receives a packet that doesn't not have a state/connection entry.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2019 19:55:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-State-Table/m-p/24629#M4916</guid>
      <dc:creator>James_Simmons</dc:creator>
      <dc:date>2019-01-15T19:55:10Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall State Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-State-Table/m-p/24630#M4917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What you describe should not impact the state table.&lt;/P&gt;&lt;P&gt;Where you might have an issue is with anti-spoofing, which might drop the reply traffic because it's coming on the wrong interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2019 21:40:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-State-Table/m-p/24630#M4917</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-01-15T21:40:05Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall State Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-State-Table/m-p/24631#M4918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So far no issues with that because on the Management interface we have the more specific hosts in the AS and on the Core Interface the AS is all RFC1918 which it will match as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2019 21:43:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-State-Table/m-p/24631#M4918</guid>
      <dc:creator>James_Simmons</dc:creator>
      <dc:date>2019-01-15T21:43:24Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall State Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-State-Table/m-p/24632#M4919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It does matter, unless you have unticked the Drop out of state packets in the Global properties...&lt;/P&gt;&lt;P&gt;I would have thought that return packet be dropped though. Have you added that host into your Anti Spoofing group for the Core interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2019 21:54:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-State-Table/m-p/24632#M4919</guid>
      <dc:creator>Hybrid_Theory</dc:creator>
      <dc:date>2019-01-15T21:54:07Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall State Table</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-State-Table/m-p/24633#M4920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As long as both the forward c2s flow and return flow of s2c packets associated with a connection traverse the firewall (even asymmetrically through different firewall interfaces), they will not be dropped as TCP out of state.&amp;nbsp; As Dameon mentioned, this can however run afoul of antispoofing depending on how the interface topologies are defined.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now if one of those connection's flows traverses the firewall but the other one does not due to asymmetry in the surrounding network config, that is a different story and yes the connection will be dropped if "Drop out of state TCP" is set.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;--&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;CheckMates Break Out Sessions Speaker&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;CPX 2019 Las Vegas &amp;amp; Vienna - Tuesday@13:30&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2019 13:13:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-State-Table/m-p/24633#M4920</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-01-16T13:13:38Z</dc:date>
    </item>
  </channel>
</rss>

