- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hi Check Point experts,
We have a VSX environment and recently noticed an interesting behavior that we’d like to get some feedback on.
From SmartView, the customer observed a large number of connections coming from Internet IPs with source port 443 trying to access an internal OA subnet. After checking tcpdump captures, we believe this is related to TCP sessions that are not being closed gracefully when OA clients access Internet services over port 443.
In our setup, there is an F5 load balancer in front of the Check Point firewall. When a connection is abnormally terminated, F5 starts its TCP idle timeout counter (300 seconds). Once the timer expires, F5 sends a RST-ACK packet toward the firewall on behalf of the original Internet IP. These RST-ACK packets are then dropped by the firewall and show up in the logs.
We already tried enabling the workaround mentioned in SK19746:
fw ctl set int fw_rst_expired_conn 1
but this does not seem to change the behavior.
At this point, we’re trying to better understand whether this is expected behavior in such a topology, or if there are other tuning options or best practices (on either Check Point or F5 side) that people have successfully used in similar scenarios.
Any shared experience or suggestions would be greatly appreciated.
I think there is no point to allow the reset packet from the F5 on the check point firewall (the last packet in the capture). Both client and server already have closed it. I suspect traffic is no dropped on firewall with out of state message (please confirm)
Even if you somehow allow the traffic on the firewall it will end up on the client with no purpose because session is already gone
We remove the entries from the state table shortly after the connection gracefully closes.
Which would make these log messages expected.
If you want to eliminate them, you could create a "no log" rule for the relevant traffic.
You could create a service like the following:
This service should match source port 443 and a destination port of TCP High Ports (above 1024).
I think this needs to be changed on the F5. In capture you can see that both sides (client and server) wants to close the session with RESETS and FIN packets.
I think you have to look into and change the scenario
https://my.f5.com/manage/s/article/K13004262
Hi Lesley:
Thanks for your reply.
I previously worked with the F5 engineer to run TCPdump at the same time, and on the F5 side we also observed both the client and the server sending RST packets to each other.
If the workaround described in SK19746 cannot notify F5 to stop waiting for the connection to terminate, then I’ll follow up with the F5 engineer to discuss possible configuration changes on the F5 side instead.
I think there is no point to allow the reset packet from the F5 on the check point firewall (the last packet in the capture). Both client and server already have closed it. I suspect traffic is no dropped on firewall with out of state message (please confirm)
Even if you somehow allow the traffic on the firewall it will end up on the client with no purpose because session is already gone
Hi Lesley:
The RST-ACK packets coming from the F5 are simply being blocked by the firewall’s cleanup rule, and there are no any out of state messages.
As a test you can allow the traffic with a rule and maybe then the out of state message will pop-up
That would make sense, unless you allow them explicitly.
I would agree with @Lesley . From my experience with this, it usually turns out to be something on F5 side.
What are the exact errors showing in the logs?
In any case, I suspect we are a bit more aggressive in our dropping of ended connections than the F% is: https://support.checkpoint.com/results/sk/sk39272
Hi PhoenBoy:
Thanks for your reply.
The firewall is simply performing a policy check on the packet. Since there is no matching accept rule, the packet is eventually dropped by the cleanup rule.
We remove the entries from the state table shortly after the connection gracefully closes.
Which would make these log messages expected.
If you want to eliminate them, you could create a "no log" rule for the relevant traffic.
You could create a service like the following:
This service should match source port 443 and a destination port of TCP High Ports (above 1024).
Hi PhoneBoy:
I tried the approach you suggested today and it worked very well. I’m glad I learned how to specify the source port (s_port) in a policy rule.
Thank you
Excellent, thanks for updating us.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 8 | |
| 8 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 2 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY