<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: zdebug drop question in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30615#M6331</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's what I found, if you set the logging for you app/urlf rules to extended logging, you can see what the firewall is thinking the application is.&amp;nbsp; In my case, it was detecting the packet to be some other odd application and therefore dropping it.&amp;nbsp; I created a new rule specifically allowing RDP and it went way.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 16 Aug 2018 21:18:08 GMT</pubDate>
    <dc:creator>Steve_Moran1</dc:creator>
    <dc:date>2018-08-16T21:18:08Z</dc:date>
    <item>
      <title>zdebug drop question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30605#M6321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;r80.10 Take 56. &amp;nbsp; 15600 cluster&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fw ctl zdebug drop : grep &amp;nbsp;172.20.10.10 is giving me the following errors&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 2.0pt 0in 2.0pt 0in;"&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt;;[cpu_2];[fw4_27];fw_log_drop_ex: Packet proto=(public website IP):443 -&amp;gt; 172.20.10.10:51123 dropped by cphwd_pslglue_handle_packet Reason: PSL Drop: ASPII_MT&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 2.0pt 0in 2.0pt 0in;"&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 2.0pt 0in 2.0pt 0in;"&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt;closest think on Check Point's support&amp;nbsp;&lt;SPAN style="background-color: #ffffff; font-size: 14px;"&gt;sk121732. &amp;nbsp;this SK does not seem to apply in my situation.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 2.0pt 0in 2.0pt 0in;"&gt;&lt;/P&gt;&lt;P style="margin: 2.0pt 0in 2.0pt 0in;"&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt;has anybody seen this before?&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 2.0pt 0in 2.0pt 0in;"&gt;&lt;/P&gt;&lt;P style="margin: 2.0pt 0in 2.0pt 0in;"&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt;thanks.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 20:50:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30605#M6321</guid>
      <dc:creator>Neil_ZInk</dc:creator>
      <dc:date>2018-02-16T20:50:25Z</dc:date>
    </item>
    <item>
      <title>Re: zdebug drop question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30606#M6322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Neil,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had a similar issue before. It seems in R80.10 some https traffic does not match any Category or Application on that layer (and is logged as connection instead session), so to me, the traffic was dropped on a deny any rule.&lt;/P&gt;&lt;P&gt;My workaround was allow https on Service/Application from any to internet by creating a before last rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 20:57:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30606#M6322</guid>
      <dc:creator>KennyManrique</dc:creator>
      <dc:date>2018-02-16T20:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: zdebug drop question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30607#M6323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kenny&lt;/P&gt;&lt;P&gt;Thanks for quick reply. I already had HTTPS allowed on my egress rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 21:11:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30607#M6323</guid>
      <dc:creator>Neil_ZInk</dc:creator>
      <dc:date>2018-02-16T21:11:53Z</dc:date>
    </item>
    <item>
      <title>Re: zdebug drop question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30608#M6324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Even with src 172.20.10.10, destination Internet and Any Application do you have this problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 21:19:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30608#M6324</guid>
      <dc:creator>KennyManrique</dc:creator>
      <dc:date>2018-02-16T21:19:49Z</dc:date>
    </item>
    <item>
      <title>Re: zdebug drop question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30609#M6325</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 21:32:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30609#M6325</guid>
      <dc:creator>Neil_ZInk</dc:creator>
      <dc:date>2018-02-16T21:32:45Z</dc:date>
    </item>
    <item>
      <title>Re: zdebug drop question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30610#M6326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maybe this one is closer to your situation?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk119432" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk119432"&gt;Application Control/URL Filtering drops traffic from internal web server&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is also another similar ticket for DNS packets -&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk81320" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk81320"&gt;sk81320&lt;/A&gt;. And a case from a couple of years ago -&amp;nbsp;&lt;A class="link-titled" href="https://www.cpug.org/forums/showthread.php/19829-Firewall-blocking-without-rules" title="https://www.cpug.org/forums/showthread.php/19829-Firewall-blocking-without-rules"&gt;CPUG - Firewall blocking without rules&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But in any case, I would recommend to open a service request in Check Point support.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 22:01:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30610#M6326</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-02-16T22:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: zdebug drop question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30611#M6327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try to disable SecureXL (fwaccel off) and make a fw monitor capture on all inspection points for this traffic (fw monitor -p all -e "host(public_Server) and host(172.20.10.10), accept;"). You can verify at which chain the traffic is dropped.&lt;/P&gt;&lt;P&gt;After that, you can try to disable IPS from CLI (ips off) and verify if the problem persists.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Feb 2018 13:36:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30611#M6327</guid>
      <dc:creator>KennyManrique</dc:creator>
      <dc:date>2018-02-17T13:36:52Z</dc:date>
    </item>
    <item>
      <title>Re: zdebug drop question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30612#M6328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe I found out Why I am getting the error message. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I recreated the same messages from an Isolated network. &amp;nbsp;(default deny)&lt;/P&gt;&lt;P&gt;for testing purposes &amp;nbsp; i did 2 different pings&lt;/P&gt;&lt;P&gt;ping 8.8.8.8&lt;/P&gt;&lt;P&gt;ping www.yahoo.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with the rule set below I could not Ping or or DNS resolution. &amp;nbsp;Application/URL was block request&lt;/P&gt;&lt;P&gt;Policy: ICMP, &amp;nbsp;tcp/53, udp/53. tcp/443 is open&lt;/P&gt;&lt;P&gt;Application/URL. &amp;nbsp; MyAllowed sites&lt;/P&gt;&lt;P&gt;Application/URL. &amp;nbsp; block everything else&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rule set Set B: &amp;nbsp; Ping works / DNS resolution does not&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Policy: ICMP, &amp;nbsp;tcp/53, udp/53. tcp/443 is open&lt;/P&gt;&lt;P&gt;Application/URL. &amp;nbsp; MyAllowed sites&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Application/URL. &amp;nbsp; echo-request&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Application/URL. &amp;nbsp; block everything else&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rule set Set d: &amp;nbsp; Ping works / DNS works&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with every DNS request I get drop message: &amp;nbsp;cphwd_pslglue_handle_packet Reason: PSL Drop: ASPII_MT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Policy: ICMP, &amp;nbsp;tcp/53, udp/53. tcp/443 is open&lt;/P&gt;&lt;P&gt;Application/URL. &amp;nbsp; MyAllowed sites&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Application/URL. &amp;nbsp; nds&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Application/URL. &amp;nbsp; echo-request&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Application/URL. &amp;nbsp; block everything else&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tested again with IPS off&lt;/P&gt;&lt;P&gt;#ips off&lt;/P&gt;&lt;P&gt;#fwaccel off;fwaccel on&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;same results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks to me that Application/URL blade does not like protocols. &amp;nbsp; &amp;nbsp;Is there a better way to setup a rule set?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks everyone&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Feb 2018 15:35:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30612#M6328</guid>
      <dc:creator>Neil_ZInk</dc:creator>
      <dc:date>2018-02-23T15:35:06Z</dc:date>
    </item>
    <item>
      <title>Re: zdebug drop question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30613#M6329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am having the same output from the zdebug, but with RDP (tcp 3389) traffic.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Aug 2018 16:37:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30613#M6329</guid>
      <dc:creator>Steve_Moran1</dc:creator>
      <dc:date>2018-08-09T16:37:51Z</dc:date>
    </item>
    <item>
      <title>Re: zdebug drop question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30614#M6330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Zombie Thread. But here is what can help you both out. The APII drop is the application control blade not being happy. First make sure that you not only have an accept for the FW rule base but the app/URLF control rules for this either DNS or RDP service. This must of course be above and deny rules it the URLF side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might want to check to see if you are in a fail open or fail close state for the APP/URLF if you have a high CPU load as it can also cause for the firewall to do funky stuff.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Aug 2018 20:29:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30614#M6330</guid>
      <dc:creator>Lloyd_Crosby</dc:creator>
      <dc:date>2018-08-10T20:29:08Z</dc:date>
    </item>
    <item>
      <title>Re: zdebug drop question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30615#M6331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's what I found, if you set the logging for you app/urlf rules to extended logging, you can see what the firewall is thinking the application is.&amp;nbsp; In my case, it was detecting the packet to be some other odd application and therefore dropping it.&amp;nbsp; I created a new rule specifically allowing RDP and it went way.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2018 21:18:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30615#M6331</guid>
      <dc:creator>Steve_Moran1</dc:creator>
      <dc:date>2018-08-16T21:18:08Z</dc:date>
    </item>
    <item>
      <title>Re: zdebug drop question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30616#M6332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Some times I wish that the errors were a bit logical.. but hey I'd probably be out of a job it Check Point errors made too much sense eh?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2018 00:36:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30616#M6332</guid>
      <dc:creator>Lloyd_Crosby</dc:creator>
      <dc:date>2018-08-17T00:36:30Z</dc:date>
    </item>
    <item>
      <title>Re: zdebug drop question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30617#M6333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for tip, I had the same problem&lt;/P&gt;&lt;P&gt;; 5Oct2018 14:56:54.086198;[cpu_2];[fw4_1];fw_log_drop_ex: Packet proto=17 10.XX.XX.XX:53 -&amp;gt; 10.YY.YY.YY:56615 dropped by cphwd_pslglue_handle_packet Reason: PSL Drop: ASPII_MT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When DNS server was replying it went drop.&lt;/P&gt;&lt;P&gt;also for LDAP and other services&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Problem is that there is no sk in support center except&amp;nbsp;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;sk81320, but this not work for me.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;What worked was remove DROP rule at the end of APCL layer and magic happened, all was working&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2018 13:31:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/zdebug-drop-question/m-p/30617#M6333</guid>
      <dc:creator>Martin_Raska</dc:creator>
      <dc:date>2018-10-05T13:31:24Z</dc:date>
    </item>
  </channel>
</rss>

