- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
I have a Quantum Spark 1575 on the latest 81.10.17 GA Firmware, Locally managed. We installed this a few months ago and had no issues and then all of a sudden VOIP stopped working today. We could not get inbound calls and outbound calls were dropping after 30-60+ seconds. No updates or configuration changes.
We were at first seeing drops 104.xxx.xx.xxx:5060 -> 192.168.199.10:5060 dropped by fwpslglue_chain Reason: PSL Drop: CMI dropped connection.
After a reboot of the firewall the drops stopped but calls still did not work. When I run a tcpdump it looks like the cloud provider is reaching the gateway with port 5060 to our port 5060 but it is not NATing to the internal PBX like it originally was.
I created a test NAT and used telnet to go from my laptop to port 5060 on our gateway. This NAT works and shows up in the TCP dump as reaching the gateway and then NATing to my internal PBX. The only difference is my telnet test NAT has a different source port. The NAT rules are just the default from the VOIP module wher eis does ANY > Gateway, SIP Services Translated to Original Service to PBX as Destination.
We opened a case with support but they have no idea what is causing the issue so we are basically at a stand still. Has anyone else experienced this?
Can you try disable SIP inspection? I dont have local smb to confirm, but I believe there should be an option for that service to select protocol NONE...if so, just give that a try.
Andy
Inspection was already disabled. I also tried setting the Protocol to none as well. Like I said before, this was working just fine for several months and just stopped this morning. The provider confirmed nothing is wrong on their end or their equipment.
K, fair enough. I read your post again and what caught my eye was part about NAT. So, technically, source port never matters, only destination one, so we can eliminate that. Now, just a thought, do you happen to have recent backup that could be restored? I know you said nothing changed, but clearly there must be something that caused this to stop working.
Andy
We take backups everyday via the SMP cloud backup. I don't think we can restore the backup because support updated the firmware this morning. Unfortunately nothing did change. I am the only person who manages the firewall and I haven't logged into it in months. We have been experiencing a lot of issues with our Checkpoints. Lots of random bugs and small issues that break critical infrastructure. They just seemingly come out of nowhere.
What suggestion(s) did you get from TAC?
Andy
Nothing as of now. They just said they couldn't reproduce the problem and sent it to R&D.
Thats good, lets hope R&D can assist further. Its unfortunate that happened to you, because its simply one of those things that happen probably less than 1% of the time.
Andy
I must be the unluckiest Checkpoint user ever because I have an issue pretty much every single week with something going wrong. VPNs don't stay up, VOIP stops working, Routing stops working... I pretty much know the CLI and troubleshooting secrets inside and out because of all the cases I've opened up over the years. I really hope they improve with the 2500 Spark series. If my company wasn't so dedicated to Checkpoint and their ecosystem I would have scrapped them for Palo Alto or Fortinet years ago.
First off, sorry to hear all that, never fun dealing with those things. If I were you, I would definitely bring all those issues to your local SE and have them take it up further for you.
Just my 2 cents.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY