- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Dear Checkmates, I did static NAT and the required policy to reach a web server in my Network but i still cant reach the webserver.
I ran a zedebug command and the following popped up:
"dropped by fwpslglue_chain Reason: PSL Reject: ASPII_MT"
Please How can i fix this?
I think it is not an NAT issue. It is a PSL issue in combination with NAT. Behaviour may be inconsistent for NAT destinations on different internal interfaces, in that return traffic from some servers may appear to pass correctly, but return traffic through a different interface may be dropped.
Solution:
The following workaround is available:
Create a new host object that uses the Static NAT address as the main address and use it in the rulebase.
Do not configure any interface topologies which overlap if any of the overlapping interfaces have "Interface leads to DMZ" checked.
Alternately, this issue should only be possible when using Application Control Whitelist.
See sk112249 - Best Practices - Application Control, section regarding Blacklist VS Whitelist
For more informations see SK:
Application Control/URL Filtering drops traffic from internal web server
The following SK is also possible:
Regards,
Heiko
I think it is not an NAT issue. It is a PSL issue in combination with NAT. Behaviour may be inconsistent for NAT destinations on different internal interfaces, in that return traffic from some servers may appear to pass correctly, but return traffic through a different interface may be dropped.
Solution:
The following workaround is available:
Create a new host object that uses the Static NAT address as the main address and use it in the rulebase.
Do not configure any interface topologies which overlap if any of the overlapping interfaces have "Interface leads to DMZ" checked.
Alternately, this issue should only be possible when using Application Control Whitelist.
See sk112249 - Best Practices - Application Control, section regarding Blacklist VS Whitelist
For more informations see SK:
Application Control/URL Filtering drops traffic from internal web server
The following SK is also possible:
Regards,
Heiko
Hi Heiko,
Will Implement this and give you feedback.
Thanks and Best Regards.
Hello Heiko,
The issue has been resolved.
Thank you so much.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 12 | |
| 10 | |
| 9 | |
| 8 | |
| 6 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 1 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY