- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
We are seeing a case where a firewall receives a tcp reset from the client host and keep it(doesn't send it to the server) and doesn't remove the tcp session from the tcp session table. Why would do it?
This is case of a load balancer configured to do tcp half close check so it send tcp resets after receiving a sin ack from the server.
However the firewall keep the RESET and doesn't close the session in the session table and therefore the loadbalancer keeps sending RESETS and the server keeps sending SYN-ACKs ....
fwaccel conns shows me all the connections in SYNC-ACK received state
Note: It happens all the time. This behavior is not related with Policy Installation and connection persistency
TCP connections are generally hung onto for 25 seconds after closing.
This is by design.
https://support.checkpoint.com/results/sk/sk110672
TCP connections
UDP sessions
ICMP sessions
TCP, UDP, and ICMP session timers can be configured in 'Global Properties > Stateful Inspection'.
https://support.checkpoint.com/results/sk/sk41248
TCP connections are generally hung onto for 25 seconds after closing.
This is by design.
https://support.checkpoint.com/results/sk/sk110672
TCP connections
UDP sessions
ICMP sessions
TCP, UDP, and ICMP session timers can be configured in 'Global Properties > Stateful Inspection'.
https://support.checkpoint.com/results/sk/sk41248
It looks like the checkpoint keeps the tcp session in the session table for about 30 seconds and it consistently drops the TCP RESET from the client. Perhaps because the 3-way handshake never gets established.
The client is configured to do a tcp half open helth check so it always sends a tcp reset after syn, syn ack.
Those 30 seconds are close to the TCP start time out (25)+ TPC End Timeout (5)
tcpdump on the client side
11:24:32.453451 IP client.ip > server_ip.server_port: Flags [S], seq 2125582756, win 512, length 0
11:24:32.453617 IP server_ip.server_port > client.ip: Flags [S.], seq 3760118362, ack 2125582757, win 29200, options [mss 1460], length 0
11:24:33.953414 IP server_ip.server_port > client.ip: Flags [S.], seq 3760118362, ack 2125582757, win 29200, options [mss 1460], length 0
11:24:35.953369 IP server_ip.server_port > client.ip: Flags [S.], seq 3760118362, ack 2125582757, win 29200, options [mss 1460], length 0
11:24:39.953411 IP server_ip.server_port > client.ip: Flags [S.], seq 3760118362, ack 2125582757, win 29200, options [mss 1460], length 0
11:24:47.953370 IP server_ip.server_port > client.ip: Flags [S.], seq 3760118362, ack 2125582757, win 29200, options [mss 1460], length 0
11:25:03.953390 IP server_ip.server_port > client.ip: Flags [S.], seq 3760118362, ack 2125582757, win 29200, options [mss 1460], length 0
tcpdump on the external server side
11:24:32.453312 IP client.ip > server_ip.server_port: Flags [S], seq 2125582756, win 512, length 0
11:24:32.453627 IP server_ip.server_port > client.ip: Flags [S.], seq 3760118362, ack 2125582757, win 29200, options [mss 1460], length 0
11:24:32.453962 IP client.ip > server_ip.server_port: Flags [R], seq 2125582757:2125582817, win 0, length 60
11:24:33.953426 IP server_ip.server_port > client.ip: Flags [S.], seq 3760118362, ack 2125582757, win 29200, options [mss 1460], length 0
11:24:33.956704 IP client.ip > server_ip.server_port: Flags [R.], seq 1:47, ack 1, win 0, length 46
11:24:35.953383 IP server_ip.server_port > client.ip: Flags [S.], seq 3760118362, ack 2125582757, win 29200, options [mss 1460], length 0
11:24:35.954858 IP client.ip > server_ip.server_port: Flags [R.], seq 1:47, ack 1, win 0, length 46
11:24:39.953426 IP server_ip.server_port > client.ip: Flags [S.], seq 3760118362, ack 2125582757, win 29200, options [mss 1460], length 0
11:24:39.955255 IP client.ip > server_ip.server_port: Flags [R.], seq 1:47, ack 1, win 0, length 46
11:24:47.953382 IP server_ip.server_port > client.ip: Flags [S.], seq 3760118362, ack 2125582757, win 29200, options [mss 1460], length 0
11:24:47.953631 IP client.ip > server_ip.server_port: Flags [R.], seq 1:47, ack 1, win 0, length 46
11:25:03.953402 IP server_ip.server_port > client.ip: Flags [S.], seq 3760118362, ack 2125582757, win 29200, options [mss 1460], length 0
11:25:03.953505 IP client.ip > server_ip.server_port: Flags [R.], seq 1:47, ack 1, win 0, length 46
Its 100% because 3 way handshake is failing, but we need to be sure which end is the one resetting the connection. And now, I will go celebrate Canada day 🙂
Cheers mate.
Andy
The client (loadbalancer) sends the reset by design. It is the typical tcp half open health check sent by load balancers.
In other words, checkpoint default configuration doesn't interoperate well will typical loadbalancers tcp half open checks
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 23 | |
| 19 | |
| 10 | |
| 9 | |
| 8 | |
| 7 | |
| 6 | |
| 4 | |
| 4 | |
| 4 |
Fri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeThu 04 Jun 2026 @ 07:00 PM (IDT)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - AmericaFri 12 Jun 2026 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 47: Continuous Threat Exposure ManagementThu 18 Jun 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point WAF - The Next Generation of AI powered protectionFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY