Hi Check Point experts,
We have a VSX environment and recently noticed an interesting behavior that we’d like to get some feedback on.
From SmartView, the customer observed a large number of connections coming from Internet IPs with source port 443 trying to access an internal OA subnet. After checking tcpdump captures, we believe this is related to TCP sessions that are not being closed gracefully when OA clients access Internet services over port 443.
In our setup, there is an F5 load balancer in front of the Check Point firewall. When a connection is abnormally terminated, F5 starts its TCP idle timeout counter (300 seconds). Once the timer expires, F5 sends a RST-ACK packet toward the firewall on behalf of the original Internet IP. These RST-ACK packets are then dropped by the firewall and show up in the logs.
We already tried enabling the workaround mentioned in SK19746:
fw ctl set int fw_rst_expired_conn 1
but this does not seem to change the behavior.
At this point, we’re trying to better understand whether this is expected behavior in such a topology, or if there are other tuning options or best practices (on either Check Point or F5 side) that people have successfully used in similar scenarios.
Any shared experience or suggestions would be greatly appreciated.

