- Products
- Learn
- Local User Groups
- Partners
- More
Stop Babysitting Rules.
Go Agentic
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Have you confirmed the routing is correct end-to-end and that anti-spoofing is set correctly?
Is there any NAT involved and could you please share a better/clearer screenshot?
This screenshot appears different to the original, can you provide the more detailed log cards for both flows?
There is some suggestion here that's proxy is involved, are only some ports/redirected to the proxy and others NAT different?
I didn't understand your message but the client has a proxy in his intranet.
I would agree totally with what Chris said. 99% of the time, its either NAT, routing or anti-spoofing (or combination of all of them).
Ok I will check the cpinfo file today to verify?
What will you check how in cpinfo ?
As i said, I am currently looking for the cause of the asymmetric routing
But how to accomplish this in cpinfo ? Never heard of routing issues resolved by cpinfo analysis...
I don't have access to the appliance, so i will analyze on my side the cpinfo file and after that i will contact the customer to have clear understanding of the issues.
I do not think you will find all answers in the CPInfo. In most cases, asymmetric routing is caused by external factors.
Great - which tool are you using ? Or do you search in the cpinfo text ?
CheckPoint Diagnostics View
Hey @A_KOUADIO ,
I think what @_Val_ and @G_W_Albrecht are saying is that its very unlikely you would find an answer as to why assymetric routing happens from cpinfo file review, as thats simply the config file from the firewall. Here is what I would run and examine carefully the output. So, just as an example, say the source is 10.10.10.10 and dst is 20.20.20.20, try commands like below:
fw monitor -e "accept host(10.10.10.10) and dst(20.20.20.20);"
fw monitor -e "accept host(20.20.20.20) and dst(10.10.10.10);"
fw minitor -e "accept host(10.10.10.10) or dst(20.20.20.20);"
Alternatively, you can also use below command. Idea is to filter for src IP, src port, dst IP, dst IP, protocol
fw monitor -F "10.10.10.10,0,20.20.20.20,0,0" -F "20.20.20.20,0,10.10.10.10,0,0"
I can also suggest a website my colleague made ages ago to help people with captures on different platforms (its very useful)
Hope all this helps you.
Cheers,
Andy
Dropped by Access Rule Number 1225 ???
Because the source port match another rule.
As I said previously, the return traffic is dissociated from the going trafic so it match another rule or drop by the cleanup rule.
I would not use 1225 rules - but that should not cause asymmetrical routing afaik...
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 23 | |
| 19 | |
| 9 | |
| 9 | |
| 8 | |
| 7 | |
| 7 | |
| 6 | |
| 4 | |
| 4 |
Fri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeThu 04 Jun 2026 @ 07:00 PM (IDT)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - AmericaFri 12 Jun 2026 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 47: Continuous Threat Exposure ManagementThu 18 Jun 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point WAF - The Next Generation of AI powered protectionFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY