- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello Checkpoint Community,
I’m thrilled to share more findings from my ongoing research on Checkpoint firewall logs!
I’ve been investigating a confusing issue with the "Drop" label in logs when the firewall handles URG flags
I’ve found something that confuses users like someone who are new to this
I’ll explain my findings step by step, share my analysis, and propose a new improvement for Checkpoint to make logs easier to understand. I hope you’ll join me in discussing this!
What I’m Seeing in the Logs:
TCP Flags
I have a log for traffic on port 1525 (service "sqlnet2-1525") from a computer (1x.x.x.x) to a server (y.y.y.y). The log says:
Drop and accept
With lots of "Log" and "Connection" entries. Some of these are about port 1525 so some are accept connection and some are drop logs.
Checking the Log Details:
Reading sk36869:
Putting It All Together:
Why This Matters for Everyone:
This issue isn’t just about my firewall—it could affect many Checkpoint users. If the firewall strips URG flags on ports like 1524 and 1525 and calls it "Traffic Dropped," users might think their traffic is blocked when it’s not. This could lead to:
My Proposed Improvement: Replace "Drop" with "Warning"
I’ve noticed a big problem with the logs, and I have an idea to make them better:
The Problem: The log says "Traffic Dropped," but the action is only stripping the URG flag, not blocking the whole traffic. The "Informational" severity also doesn’t match "Dropped," which makes me think the package was stopped when it wasn’t. This is confusing, especially for new users like me who might panic or misunderstand what’s happening.
While I see your point in terms of the logs being confusing (similar to CPNotEnoughDataForRulebaseMatch described in https://support.checkpoint.com/results/sk/sk113479), this highlights a key thing with troubleshooting in general: trust but verify.
That means using multiple methods to verify your assumptions/conclusions based on logs.
In fact, tcpdump/fw monitor/Wireshark is usually the first thing I break out before I start diving into more detailed debugs.
Nice analysis in any case.
Hello @PhoneBoy ,
Thank you so much for your reply and for appreciating my analysis! I’m @Chinmaya_Naik , so your feedback means a lot to me. I agree with your point about "trust but verify" and using tools like tcpdump, fw monitor, or Wireshark to double-check what the logs say. I’ll try running tcpdump to capture traffic on ports 1524 and 1525 to confirm that the URG flag is stripped but the traffic still goes through, as you suggested.
I also see the similarity with sk113479, where logs say "Connection terminated" due to insufficient data, even when it’s not a big problem. It’s great to know this is a known pattern, but I think it shows we need better logs to avoid confusion. While verifying with tools is a good practice, I believe Checkpoint could make things easier for beginners like me by improving the log messages.
For example, in my case, the log says "Traffic Dropped" for ports 1524 (Trinoo) and 1525 (sqlnet2-1525) when the firewall only strips the URG flag, not blocks the traffic. This made me worry that my apps were failing, and I spent a lot of time investigating. I still think changing "Drop" to "Traffic Warning" or "URG Flag Stripped Warning" would be clearer and match the "Informational" severity. This would help new users understand what’s happening without needing to run extra tools, saving time and reducing confusion.
I’d love to hear your thoughts on this improvement idea, and if other community members have seen similar issues with log wording. Thanks again for your guidance!
Very good analysis indeed...EXCELLENT job!
Andy
I am all for improving the clarity of logs where it's needed.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 18 | |
| 12 | |
| 9 | |
| 8 | |
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 2 | |
| 2 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY