- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
Users reported issue accessing one particular web site. It always ends up with a timeout error. In the logs, the connection is accepted but with reason:
Connection terminated before detection: Insufficient data passed. To learn more see sk113479
The sk offers an explanation but no solution. This site is accessible by others in different organisations but not for us.
We have a pair of gateways in a cluster running R80.20 jhf take 14
It seems that your policy requires an application or URL categorization to happen before final match, and it fails for this specific web site.
Try creating a new explicit rule with the web server as destination and web services allowed, put it before the rules matching now, and try again.
Unfortunately that didn't work. I created a rule just for that web site and placed it at the top of the rulebase and we're still getting that "Insufficient data passed" mssage.
Seems I misread your suggestion. I had created an explicit access security rule for that website. I tried again with an explicit Application rule and I'm not getting the 'Insufficient data passed' error anymore. So as far as the firewall goes everything looks ok. But I still can't access that site (cjc-ccm.ca) when it seems pretty much anyone else can, very frustrating.
I'm running into this issue with R81.10 JHF110, no issues before that. It's saying not to run the command for insufficient data, but the reason is just insufficient data in the Reason category. Do we just assume we need to allow uncategorized traffic with JHF110? Could there be a bug with R81.10 JHF110. I'm going to start a case with TAC Monday. Basically, this affected me after changing a Nat rule with 110. I have another case of it, changed a NAT rule and data won't pass, yet I have a default rule. I may have to just explicitly allow uncategorized traffic.
It might be a bug, worth a TAC case, for sure.
Andy
"Accept logs with reason "Connection terminated before detection: Insufficient data passed. To learn more see sk113479." may be wrongly generated when the matched action is user authentication and the wrong username/password is provided by the user."
Was fixed in R80.20 Take 190, but I can't say for sure it's your issue.
Take 14 is not even listed in the documentation, it would probably be worthwhile to at least upgrade to the final release of R80.20 Take 230 for your gateways if you are unable to plan to get to a supported version.
List of All Resolved Issues and New Features (checkpoint.com)
Just realized my typo. we're at R81.20 take 14. Sorry for the confusion
I cant even count how many times I was on the phone with customers and every single time TAC would tell them this message simply means its not Check Point issue...that sk is really a LONG way of saying that lol
Sorry, but this is not what Sk is saying.
Correct, sk does not, but TAC does 😂...and they are 100% correct.
Hello,
I have seen more logs with this message on R81.10 than previous versions, and usually doing a "fw ctl zdebug drop" shows that the gateway was actually dropping the traffic, try with that, if you do not see drops, it is very likely that the Connection was actually terminated before detection and a packet capture can help to understand why.
Regards
My experience was worse with R80.40 for this issue, had not seen much in R81.10 and nothing so far in R81.20
Andy
fw ctl zdebug drop does not show anything. I'll try a packet capture. thanks
Did you open TAC case foir this to verify with them?
Andy
No. I was hoping to look at a packet capture (which I haven't done yet) before trying TAC.
Unless you are not allowed to, if you can attach the capture here and give us relevant info, Im happy to also have a look.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 24 | |
| 23 | |
| 12 | |
| 12 | |
| 7 | |
| 7 | |
| 7 | |
| 6 | |
| 6 | |
| 5 |
Wed 05 Nov 2025 @ 08:00 AM (IST)
Your First Response: Immediate Actions for Cyber Incident Containment - AMERWed 05 Nov 2025 @ 11:00 AM (EST)
TechTalk: Access Control and Threat Prevention Best PracticesWed 05 Nov 2025 @ 08:00 AM (IST)
Your First Response: Immediate Actions for Cyber Incident Containment - AMERWed 05 Nov 2025 @ 11:00 AM (EST)
TechTalk: Access Control and Threat Prevention Best PracticesThu 06 Nov 2025 @ 10:00 AM (CET)
CheckMates Live BeLux: Get to Know Veriti – What It Is, What It Does, and Why It MattersTue 11 Nov 2025 @ 10:00 AM (CET)
Your First Response: Immediate Actions for Cyber Incident Containment- EMEAThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERTue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightTue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY