- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello everyone!
We’ve encountered the following phenomenon: many websites don’t fully load when opened (for example, Reddit, GitHub, etc.). In the logs, we see the following events (see attached screenshots). At the same time, we notice HTTP parser errors, and despite the fact that we have the Allow Fail-Open mode enabled and the traffic is allowed, the sites still don’t work. In the browser’s debug console, we can see that connections for fetching *.js files are being reset.
Does anyone have any ideas about this?
Thanks in advance!
Here you go...just follow this sk, Im sure it will fix the issue. Needs short maintenance window, since it involves cprestart, but if its a cluster, you are good.
sk116022 - Check Point inspection of HTTP/2 protocol (RFC 7540)
Hello everyone! Thank you very much for your support! The problem is solved. The SK116022 has become the solution!
best regards,
Roman
I suspect based on screenshot you are running https inspection. I assume if you bypass problematic website, it works. What Jumbo take do you run? You blocked quic already? -> https://support.checkpoint.com/results/sk/sk111754
Hi! Yes, we are blocking QUIC. We had the same effect with JHF105 and also with JHF118 (currently).
Are you doing bypass?
Sure, if we set up an HTTPS inspection bypass for the affected sites, the problem is solved. But we can't bypass everything — otherwise, what's the point of having full Threat Prevention?
Not saying bypass everything, but certain things may need to be bypassed.
One thing I would suggest is maybe going through below.
https://support.checkpoint.com/results/sk/sk112066
I second all the points @Lesley had made.
Other than the fact the gateway can see the underlying HTTP connection as a result of HTTPS Inspection being applied, it's not relevant to HTTPS Inspection.
There is an Inspection Setting called Non-Compliant HTTP that can be disabled or exceptions can be set for.
This is set in Security Policies > Shared Policies > Inspection Settings and requires an Access Policy install to take effect.
There are other instances where this occurs where TAC may need to be involved.
Colleagues, during the process we discovered another very interesting phenomenon — for example, there is a specific link https://www.gesetze-im-internet.de/kaeano/KAEAnO.pdf : when accessing it through a browser, the connection gets "ERR_CONNECTION_RESET",
but when using curl or wget, everything works as expected
wget https://www.gesetze-im-internet.de/kaeano/KAEAnO.pdf
StatusCode : 200
StatusDescription : OK
Content : {37, 80, 68, 70...}
RawContent : HTTP/1.1 200 OK
X-Content-Type-Options: nosniff
X-Frame-Options: sameorigin
X-XSS-Protection: 1; mode=block
Keep-Alive: timeout=5, max=59
Connection: Keep-Alive
Content-Disposition: inline; file...
Headers : {[X-Content-Type-Options, nosniff], [X-Frame-Options, sameorigin], [X-XSS-Protection, 1;
mode=block], [Keep-Alive, timeout=5, max=59]...}
RawContentLength : 132767
Do you have an extended log you could attach?
Works like a charm in my lab.
PS C:\Windows\system32> wget
cmdlet Invoke-WebRequest at command pipeline position 1
Supply values for the following parameters:
Uri: https://www.gesetze-im-internet.de/kaeano/KAEAnO.pdf
StatusCode : 200
StatusDescription : OK
Content : {37, 80, 68, 70...}
RawContent : HTTP/1.1 200 OK
X-Content-Type-Options: nosniff
X-Frame-Options: sameorigin
X-XSS-Protection: 1; mode=block
Keep-Alive: timeout=5, max=68
Connection: Keep-Alive
Accept-Ranges: bytes
Content-Len...
Headers : {[X-Content-Type-Options, nosniff], [X-Frame-Options, sameorigin], [X-XSS-Protection, 1;
mode=block], [Keep-Alive, timeout=5, max=68]...}
RawContentLength : 56456
PS C:\Windows\system32>
Right, everything works the same for me through wget (the file downloads and the correct TP policy matches), but on the same machine the connection is reset... when using a browser
In my lab, bith R81.20 and R82, same machine works for the browser as well. Does any log show this is inspected by the blade?
I suspect this will require a TAC case to investigate, especially given you can reproduce the issue consistently.
What is particularly interesting is that everything works perfectly if the user is connected through the remote VPN access client. Also, there is no parser error and all websites are displayed normally. The internal network and the VPN network are both included in the role. Up to L4 everything works identically. If the VPN client connects to the internal company network, the issues start again. I just can’t figure out how to debug this…
Let me try it in my lab. I thought wget would work on Gaia by default, but guess not.
Thanks!
Saw this one solved today in latest take:
|
PRJ-62472, |
IPS |
UPDATE: HTTP/1.1 requests missing host headers are now processed by the non-compliant HTTP Protection feature (Strict Parsing option). Previously, such requests were dropped immediately. |
Worth trying...not sure it may fix the issue, but does not hurt to give it a go.
The entry mentioning bond4.509 looks like a Threat Emulation log based on the icon here.
If you're not using an on-premise Threat Emulation appliance, it would explain the difference and why the external interface is used.
wir haben on-premise TE2000N.
Unfortunately, English is not my strong side 😉 but I will try once again to describe the issue we are facing. We have three different network segments where client machines are located and they all need access to the Internet. These segments are: x.x.x.x (LAN), y.y.y.y (Wi-Fi), and VPN Remote Access Clients z.z.z.z. All three networks share the same Access Layer for Internet access, as well as the same HTTPS Inspection role. All three networks are included in the Protection Scope in the Custom Threat Prevention Role.
The problem is that clients have no issues downloading files or accessing websites when they are connected through a VPN tunnel (i.e. outside the company). In the logs we can see that the correct roles are applied and everything works as expected. However, as soon as the clients connect to the internal LAN or Wi-Fi, they start having problems loading websites and downloading files. At the same time, the traffic still goes through the correct Access Rules.
The most interesting part is that if we use curl instead of a browser on the affected machine, everything works…
From what I can see in Take 119, there are quite a lot of fixes related to TP and IPS — but I am not sure if they will help us.
Wait, is this split or full tunnel?
full.
So is this only site with the issue or they have problems with random websites?
Its very hard for me to say why that happens without doing remote sesison. Is it new issue or has been there for some time? Did you open TAC case already?
No, a TAC case has not been opened yet. It’s not clear when exactly this issue first appeared. Previously, we were using an explicit web proxy, but now we want to move away from it in favor of direct Internet access through the Check Point gateway and we want to make a PoC
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Thu 06 Nov 2025 @ 10:00 AM (CET)
CheckMates Live BeLux: Get to Know Veriti – What It Is, What It Does, and Why It MattersTue 11 Nov 2025 @ 10:00 AM (CET)
Your First Response: Immediate Actions for Cyber Incident Containment- EMEAThu 06 Nov 2025 @ 10:00 AM (CET)
CheckMates Live BeLux: Get to Know Veriti – What It Is, What It Does, and Why It MattersTue 11 Nov 2025 @ 10:00 AM (CET)
Your First Response: Immediate Actions for Cyber Incident Containment- EMEAThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 13 Nov 2025 @ 10:00 AM (CET)
Cloud Architect Series - Guarding Generative AI: Next-Gen Application Security with CloudGuard WAFTue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightTue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY