- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Dear Mates
I need a hand.
We are currently having an issue with one of our application that is accessed through Check Point Endpoint Security. The application is behind a loadbalancer which then distributes the traffic to the servers where the applications are running.
We are doing NAT of the Office Pool with the VPN gateway internal address. So the IP that reaches the Load balancer is the IP of the VPN Gateway, which is then NATTed by the load balancer.
The issue is that the application sometimes works and other times it stops working. I did capture the traffic when it stops working, and the message i see is:
[Expert Info (Note/Sequence): A new tcp session is started with the same ports as an earlier session in this trace]
[A new tcp session is started with the same ports as an earlier session in this trace]

10.25.193.214 is the IP of the Loadbalancer
192.168.1.1 is the IP of the RA VPN gateway
I need an help to know if the port is being reused by the Firewall or the LoadBalancer. and How this situation could be resolved.
Thanks in advance
The client is the one who determines what source port is being used.
When HIDE NAT is being used, it's a combination of the client and the NAT gateway.
Specifically, the NAT gateway will allocate a new port when a new connection is established through the gateway.
Presumably, in the case where the client reuses the same source ip/port to the same destination ip/port, you are triggering "connection reuse."
Do you see any messages related to this in your logs?
Maybe this feature needs to be disabled.
See: "Smart Connection Reuse" feature modifies some SYN packets
I now check the log and the traffic is logged as shown bellow.
Any idea on how this could be overcomed?

The Check Point does indeed re-use ports, please check out the following:
sk24960: "Smart Connection Reuse" feature modifies some SYN packets
sk103656: Dynamic NAT port allocation feature
For that second SK, you'll want to look at the fwx_nat_dynamic_port_allocation_entry_timeout variable specifically.
--
"IPS Immersion Training" Self-paced Video Class
Now Available at http://www.maxpowerfirewalls.com
Hi All
After an interaction with Check Point TAC, it was discovered that the http traffic was not being synchronized between the cluster members (we use LS unicat mode).
After changing the protocol propertiies, the application started working as expected.

Thanks
That might cause the issue you saw in the logs ![]()
Yeah, disabling state sync for services in any kind of Load Sharing deployment is not a good idea. In HA (active/standby) it can be used to reduce utilization in the sync network and CPU overhead quite a bit. Also don't try to upgrade your gateway to R80.20, as both forms of ClusterXL Load Sharing are not supported at this time.
--
"IPS Immersion Training" Self-paced Video Class
Now Available at http://www.maxpowerfirewalls.com
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 11 | |
| 9 | |
| 9 | |
| 8 | |
| 6 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 1 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsThu 08 Jan 2026 @ 05:00 PM (CET)
AI Security Masters Session 1: How AI is Reshaping Our WorldAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY