- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello all,
we upgraded one Security Gateway to R80.20 and we have a really strange behavior.
The gateway doesn't reply to ping requests.
We see logs that the request is accepted, and the tcpdump and fwmonitor shows that the requests successfully reach the gateway, but both tcpdump and fwmonitor don't show replies. Also on zdebug we don't see any drops at all.
We disabled SecureXL with "fwaccel off", because it has caused some problems on others upgrades and the issue persists.
It is really weird, and we cannot think what may cause this problem.
Find below tcpdump output with some requests but without replies!
08:27:18.461003 IP 10.x.78.154 > 10.x.78.1: ICMP echo request, id 6556, seq 38729, length 87
08:27:19.462044 IP 10.x.78.154 > 10.x.78.1: ICMP echo request, id 6556, seq 38730, length 87
08:27:20.463021 IP 10.x.78.154 > 10.x.78.1: ICMP echo request, id 6556, seq 38731, length 87
The 10.x.78.1 is the VIP of the cluster, and the server with 10.x.78.154 is an esxi that has to ping the default gateway as a Keep Alive mechanism.
Can you think of something to investigate, because we have reached a wall.
Thank you all
Can you initiate the ping to the esxi from the gateway? Is IPS active? Do you see anything in the logfiles?
Yes we can initiate the ping from the gateway to esxi, and works fine.
IPS is not active, and the logs show that the icmp is accepted as excepted.
Very strange. Did you check NAT-Rules and Anti-Spoofing configuration? Can you please post a censored screenshot of SmartLog?
Anything strange if you execute "dmesg"? Also check "netstat -s" starting at "Icmp:", you should see something like this
XXXX ICMP messages received
XXX input ICMP message failed.
ICMP input histogram:
destination unreachable: XXXX
timeout in transit: XX
echo requests: XXX
echo replies: XX
XX ICMP messages sent
X ICMP messages failed
ICMP output histogram:
destination unreachable: X
time exceeded: XX
echo request: X
echo replies: XXX.
Thank you for your help.
In dmesg we don't see anything weird about the interfaces and the IPs that we see the problem.
Here is the netstat -s output for icmp
Icmp:
4979831 ICMP messages received
36 input ICMP message failed.
ICMP input histogram:
destination unreachable: 28880
echo requests: 4950917
echo replies: 28
984185 ICMP messages sent
0 ICMP messages failed
ICMP output histogram:
destination unreachable: 70178
time exceeded: 27
echo request: 36
echo replies: 913944
IcmpMsg:
InType0: 28
InType3: 28880
InType8: 4950917
OutType0: 913944
OutType3: 70178
OutType8: 36
OutType11: 27
How are you filtering your tcpdump? The destination IP of the ping request is being NATted from 10.x.78.1 to 10.x.78.3, is 10.x.78.3 the dedicated IP address of the active firewall? Is there an echo request coming back sourced from 10.x.78.3?
This sounds a bit like this:
Hello,
yes the 10.x.78.3 is the original IP of the gateway interface. And yes indeed, sometimes we see an echo request from the Gateway(10.x.78.3) targeting the servers.
The simultaneously ping was our first thought, this one of the first changes we made to fix the issue but made things even worse for some reason.
Also the tcpdump is filtered like "tcpdump -nni eth2.xx host <server-IP> and icmp". The filter is alright we see the whole traffic(and replies) if there are any.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 26 | |
| 19 | |
| 11 | |
| 8 | |
| 6 | |
| 6 | |
| 6 | |
| 5 | |
| 5 | |
| 4 |
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY