- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi Mates.
The customer pointed out something unusual:
We can see traffic on the firewall via tcpdump, but no corresponding logs appear in SmartConsole (management).
Additional, the latest logs available in date back to a week ago, although traffic is clearly flowing through the firewall.
Do you have any ideas on what could be causing this behavior on S1C R82?
Thanks,
What explicit rules do you have that involve SIP (i.e. where SIP or related services are mentioned)?
Relevant to the following, which may help: https://support.checkpoint.com/results/sk/sk65072
voice is data stream, now rule is set to ''any'' try to create a rule above the any rule with a specific service that you need.
Maybe use custom service and make sure to disable match for any under the service.
second, not sure if this traffic applies to this but check global properties in Smart Console -> firewall -> enable log implied rules (if there are any enabled)
Hi Lesley,
We tried adding a rule with a specific service, following the ATRG: VoIP guidelines.
However, it seems that the rule is not appearing in the logs.
Bro, did you check with TAC?
yes, we're working togheter
Hope its fixed soon!
Hey bro,
Please do share how this gets solved.
Thanks so much in advance.
Andy
If the connection is using all the time same source port, same source IP, same destination port, same destination IP and same protocol, then the only log connection you see is very first 3-way handshake. Even if it happened 2 months ago, but connection was never removed from connection table.
It is seen for long-lasting services like NTP and syslog. It makes sense as it will kill logserver with heavy log volume for the same connection.
The only way how to see fresh log is to cut the connection from connection table or force the client to use new source port (restart the service).
Its still odd Jozko that its ONLY for voip traffic...
Andy
If this is a case then yeah, strange indeed ...
Indeed... @RemoteUser has TAC case going, so will let us know once they have a solution.
Best,
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 31 | |
| 18 | |
| 7 | |
| 7 | |
| 6 | |
| 4 | |
| 3 | |
| 3 | |
| 2 | |
| 2 |
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY