- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Hi Mates.
The customer pointed out something unusual:
We can see traffic on the firewall via tcpdump, but no corresponding logs appear in SmartConsole (management).
Additional, the latest logs available in date back to a week ago, although traffic is clearly flowing through the firewall.
Do you have any ideas on what could be causing this behavior on S1C R82?
Thanks,
What explicit rules do you have that involve SIP (i.e. where SIP or related services are mentioned)?
Relevant to the following, which may help: https://support.checkpoint.com/results/sk/sk65072
voice is data stream, now rule is set to ''any'' try to create a rule above the any rule with a specific service that you need.
Maybe use custom service and make sure to disable match for any under the service.
second, not sure if this traffic applies to this but check global properties in Smart Console -> firewall -> enable log implied rules (if there are any enabled)
Hi Lesley,
We tried adding a rule with a specific service, following the ATRG: VoIP guidelines.
However, it seems that the rule is not appearing in the logs.
Bro, did you check with TAC?
yes, we're working togheter
Hope its fixed soon!
Hey bro,
Please do share how this gets solved.
Thanks so much in advance.
Andy
If the connection is using all the time same source port, same source IP, same destination port, same destination IP and same protocol, then the only log connection you see is very first 3-way handshake. Even if it happened 2 months ago, but connection was never removed from connection table.
It is seen for long-lasting services like NTP and syslog. It makes sense as it will kill logserver with heavy log volume for the same connection.
The only way how to see fresh log is to cut the connection from connection table or force the client to use new source port (restart the service).
Its still odd Jozko that its ONLY for voip traffic...
Andy
If this is a case then yeah, strange indeed ...
Indeed... @RemoteUser has TAC case going, so will let us know once they have a solution.
Best,
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 5 | |
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 | |
| 2 |
Tue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceWed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactThu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY