- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
I wanted to reach out to see if anyone has been experiencing similar issues. We've had several users indicate to us that when they do Google searches and attempt to click on a link, it just hangs and spins. You can click the address bar and hit enter a couple of times or re-click the link a few times and it finally goes to the link. I can take the system out from behind the firewall and everything works seamlessly. I've even put a troubleshooting rule to allow all outbound for myself to test and I still experience the same issue. Strangely enough, if I use firefox, I don't experience the issue. It's in Edge and Chrome which led me to believe a recent update occurred to created a problem. But again, when I take the system out from behind the firewall, everything works fine. So I don't know if there's a component in Chrome/Edge that CheckPoint is struggling with parsing or what. Again, even adding a rule that allows all outbound access doesn't change the behavior. Has anyone else come across this behavior?
Mine shows 8.45 am, but probably cause im in EST, but yes, thats it, date is the same.
Andy
It seems there is an issue when URLs that are longer than 4096 bytes are encountered, according to TAC cases that mention a similar error.
Not sure this limit can be increased without a code change, which will definitely require TAC.
Is this something fairly new that's been happening? Has there been an SK or bulletin posted referring to this yet?
It appears this is recent from the limited number of TAC cases that mention this error.
Regarding this error that has been posted before.
[ERROR]: rad_kernel_urlf_request_serialize: string len =4288 bigger than max 4096;
You say you see TAC cases with these error. Are the cases also related to issues to access Google services with HTTPS inspection? Or this error is related to any websites not Google specific?
The only way to see the full URL with most traffic is HTTPS Inspection.
It's not clear from the TAC cases if Google Services were involved in this or not.
Just curious, are you blocking quic protocol or not?
Andy
Yes we are blocking QUIC. We actually disable it through Group Policy. I did test with it on and the google searches with QUIC are doing better but that's probably because it's not being inspected.
100% true...I tested it many times and blocking quic literally does nothing if proper bypass is not in place. Honestly, I would open TAC case and provide the debug.
Andy
Can you try to whitelist *gstatic.com instead of the Google services in the bypass?
How is for example maps.google running after this?
@jberg712 Hi, any news about this topic? Could you maybe share what debug you performed to get the RAD error message?
Hi @Lesley ,
So, I ran the APPI and NRB debug.
fw ctl debug -buf 32000
fw ctl debug -m APPI all
fw ctl debug -m NRB all
fw ctl kdebug -T -f > /var/log/debug_kernel.txt
This generated a lot of data. But it was in this debug that the rad_kernel_string_length error was found.
The latest update on my TAC case with this is that they are preparing a fix.
Just word of caution...IF its custom fix, you install it on top of current jumbo, so IF you wish to install latest jumbo at some point, you will need to uninstall custom fix, reboot, then ask TAC to port to new jumbo.
Andy
Thanks for that info Andy. Yeah, i've enountered that a few times before and always ask if the fix will be included in the next JHA. I generally prefer not to have a custom fix inhibit from updating my environment when needed.
It would be nice if they could come up with a method that a JH can go on top of a custom fix. But I understand this is a linux environment and that can become cumbersome and create more issues/headaches.
Sounds good!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
12 | |
7 | |
6 | |
6 | |
6 | |
6 | |
5 | |
3 | |
3 |
Fri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY