- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hi guys, this is my first post here.
I've a strange situation, it's not something impacting for my customer but I'd like to go deeply into this and try to understand what's going on.
I'm trying to ping a device connected behind a VPN installed in another firewall using as source one interface physically connected to the 1st firewall.
The destination is known;
[Expert@FW1]# ip route get 10.20.20.2
10.20.20.2 via 10.39.39.3 dev eth3.439 src 10.39.39.252
cache mtu 1500 advmss 1460 hoplimit 64
The source is this one:
[Expert@FW1]# ip route get 172.28.10.0
broadcast 172.28.10.0 dev eth3.412 src 172.28.10.2
cache <local,brd> mtu 1500 advmss 1460 hoplimit 64
ping -I eth3.412 10.20.20.2
PING 10.20.20.2 (10.20.20.2) from 172.28.10.2 eth3.412: 56(84) bytes of data.
From 172.28.10.2 icmp_seq=2 Destination Host Unreachable
From 172.28.10.2 icmp_seq=3 Destination Host Unreachable
From 172.28.10.2 icmp_seq=4 Destination Host Unreachable
--- 10.20.20.2 ping statistics ---
4 packets transmitted, 0 received, +3 errors, 100% packet loss, time 3000ms
The interesting part is that a tcpdump shows only this:
[Expert@SFW1]# tcpdump -nni any host 10.20.20.2
tcpdump: WARNING: Promiscuous mode not supported on the "any" device
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on any, link-type LINUX_SLL (Linux cooked), capture size 96 bytes
11:39:17.295162 arp who-has 10.20.20.2 tell 172.28.10.2
11:39:17.295164 arp who-has 10.20.20.2 tell 172.28.10.2
11:39:18.295084 arp who-has 10.20.20.2 tell 172.28.10.2
11:39:18.295086 arp who-has 10.20.20.2 tell 172.28.10.2
11:39:19.295006 arp who-has 10.20.20.2 tell 172.28.10.2
11:39:19.295008 arp who-has 10.20.20.2 tell 172.28.10.2
11:39:21.294846 arp who-has 10.20.20.2 tell 172.28.10.2
11:39:21.294848 arp who-has 10.20.20.2 tell 172.28.10.2
In the logs traffic is accepted and with the fw ctl zdebug drop there is no evdience of any dropped packet.
Below a fwmonitor
[vs_0][fw_1] eth3.412:o[84]: 172.28.10.2 -> 10.20.20.2 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=4973 seq=93
[vs_0][fw_1] eth3.412:O[84]: 172.28.10.2 -> 10.20.20.2 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=4973 seq=93
[vs_0][fw_1] eth3.412:o[84]: 172.28.10.2 -> 10.20.20.2 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=4973 seq=94
[vs_0][fw_1] eth3.412:O[84]: 172.28.10.2 -> 10.20.20.2 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=4973 seq=94
[vs_0][fw_1] eth3.412:o[84]: 172.28.10.2 -> 10.20.20.2 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=4973 seq=95
[vs_0][fw_1] eth3.412:O[84]: 172.28.10.2 -> 10.20.20.2 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=4973 seq=95
[vs_0][fw_1] eth3.412:o[84]: 172.28.10.2 -> 10.20.20.2 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=4973 seq=96
[vs_0][fw_1] eth3.412:O[84]: 172.28.10.2 -> 10.20.20.2 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=4973 seq=96
[vs_0][fw_1] eth3.412:o[84]: 172.28.10.2 -> 10.20.20.2 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=4973 seq=97
[vs_0][fw_1] eth3.412:O[84]: 172.28.10.2 -> 10.20.20.2 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=4973 seq=97
[vs_0][fw_1] eth3.412:o[84]: 172.28.10.2 -> 10.20.20.2 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=4973 seq=98
[vs_0][fw_1] eth3.412:O[84]: 172.28.10.2 -> 10.20.20.2 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=4973 seq=98
[vs_0][fw_1] eth3.412:o[84]: 172.28.10.2 -> 10.20.20.2 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=4973 seq=99
[vs_0][fw_1] eth3.412:O[84]: 172.28.10.2 -> 10.20.20.2 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=4973 seq=99
[vs_0][fw_1] eth3.412:o[84]: 172.28.10.2 -> 10.20.20.2 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=4973 seq=100
[vs_0][fw_1] eth3.412:O[84]: 172.28.10.2 -> 10.20.20.2 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=4973 seq=100
Traffic doesn't live the generating interface.
Someone can help me?
Thanks in advance gurus
Is ping -I [ip of eth3.412] 10.20.20.2 working? Are all networks in the encryption domain? Could you provide a sketch of the setup please?
Hi,
chain ends:
out chain (18):
0: -7f800000 (ffffffff887fff30) (ffffffff) IP Options Strip (out) (ipopt_strip)
1: -78000000 (ffffffff88fd3ac0) (00000003) vpn multik forward out
2: - 1ffffff (ffffffff88fa03a0) (00000003) vpn nat outbound (vpn_nat)
3: - 1fffff0 (ffffffff88c363c0) (00000001) TCP streaming (out) (cpas)
4: - 1ffff50 (ffffffff88a16ad0) (00000001) passive streaming (out) (pass_str)
5: - 1ff0000 (ffffffff88fe3950) (00000003) vpn tagging outbound (tagging)
6: - 1f00000 (ffffffff88801780) (00000001) Stateless verifications (out) (asm)
7: 0 (ffffffff8879cac0) (00000001) fw VM outbound (fw)
8: 2000000 (ffffffff88fa0770) (00000003) vpn policy outbound (vpn_pol)
9: 10000000 (ffffffff888e1d20) (00000003) SecureXL outbound (secxl)
10: 15000000 (ffffffff8d3d3b60) (00000001) FG-1 outbound (fg_pol)
11: 18000000 (ffffffff88996100) (00000001) fw record data outbound
12: 1ffffff0 (ffffffff88fc2590) (00000001) l2tp outbound (l2tp)
13: 20000000 (ffffffff88fa1010) (00000003) vpn encrypt (vpn)
14: 24000000 (ffffffff8d2bf960) (00000001) RTM packet out (rtm)
15: 7f000000 (ffffffff887b2790) (00000001) fw accounting outbound (acct)
16: 7f700000 (ffffffff88c365b0) (00000001) TCP streaming post VM (cpas)
17: 7f800000 (ffffffff888002f0) (ffffffff) IP Options Restore (out) (ipopt_res)
monitor: monitoring (control-C to stop)
[vs_0][fw_1] eth3.412:o0 (IP Options Strip (out))[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:o1 (vpn multik forward out)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:o2 (vpn nat outbound)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:o3 (TCP streaming (out))[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:o4 (passive streaming (out))[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:o5 (vpn tagging outbound)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:o6 (Stateless verifications (out))[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:o7 (fw VM outbound)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O8 (vpn policy outbound)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O9 (SecureXL outbound)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O10 (FG-1 outbound)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O11 (fw record data outbound)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O12 (l2tp outbound)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O13 (vpn encrypt)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O14 (RTM packet out)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O15 (fw accounting outbound)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O16 (TCP streaming post VM)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O17 (IP Options Restore (out))[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O18 (Chain End)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
Chain ends:
monitor: monitoring (control-C to stop)
[vs_0][fw_1] eth3.412:o0 (IP Options Strip (out))[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:o1 (vpn multik forward out)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:o2 (vpn nat outbound)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:o3 (TCP streaming (out))[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:o4 (passive streaming (out))[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:o5 (vpn tagging outbound)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:o6 (Stateless verifications (out))[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:o7 (fw VM outbound)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O8 (vpn policy outbound)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O9 (SecureXL outbound)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O10 (FG-1 outbound)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O11 (fw record data outbound)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O12 (l2tp outbound)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O13 (vpn encrypt)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O14 (RTM packet out)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O15 (fw accounting outbound)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O16 (TCP streaming post VM)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O17 (IP Options Restore (out))[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
[vs_0][fw_1] eth3.412:O18 (Chain End)[84]: 172.28.10.2 -> 10.20.20.1 (ICMP) len=84 id=0
ICMP: type=8 code=0 echo request id=12660 seq=1
Is ping -I [ip of eth3.412] 10.20.20.2 working? Are all networks in the encryption domain? Could you provide a sketch of the setup please?
The VPNs are built under the other firewall so for this firewall is normal traffic. anyway, using the IP as source instead of eth it's working.
Is this normal?
[Expert@FW1]# ping -I 172.28.10.2 10.20.20.1
[Expert@FW1]# tcpdump -nni eth3.439 host 10.20.20.1
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth3.439, link-type EN10MB (Ethernet), capture size 96 bytes
09:20:28.957779 IP 172.28.10.2 > 10.20.20.1: ICMP echo request, id 65046, seq 47, length 64
09:20:29.957711 IP 172.28.10.2 > 10.20.20.1: ICMP echo request, id 65046, seq 48, length 64
09:20:30.957639 IP 172.28.10.2 > 10.20.20.1: ICMP echo request, id 65046, seq 49, length 64
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 8 | |
| 8 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 2 |
Tue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY