- Products
- Learn
- Local User Groups
- Partners
- More
Call For Papers
Your Expertise, Our Stage
Ink Dragon: A Major Nation-State Campaign
March 11th @ 5pm CET / 12pm EDT
AI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
The Great Exposure Reset
AI Security Masters E4:
Introducing Cyata, Securing the Agentic AI Era
CheckMates Go:
CheckMates Fest
I wanted to reach out to see if anyone has been experiencing similar issues. We've had several users indicate to us that when they do Google searches and attempt to click on a link, it just hangs and spins. You can click the address bar and hit enter a couple of times or re-click the link a few times and it finally goes to the link. I can take the system out from behind the firewall and everything works seamlessly. I've even put a troubleshooting rule to allow all outbound for myself to test and I still experience the same issue. Strangely enough, if I use firefox, I don't experience the issue. It's in Edge and Chrome which led me to believe a recent update occurred to created a problem. But again, when I take the system out from behind the firewall, everything works fine. So I don't know if there's a component in Chrome/Edge that CheckPoint is struggling with parsing or what. Again, even adding a rule that allows all outbound access doesn't change the behavior. Has anyone else come across this behavior?
Mine shows 8.45 am, but probably cause im in EST, but yes, thats it, date is the same.
Andy
It seems there is an issue when URLs that are longer than 4096 bytes are encountered, according to TAC cases that mention a similar error.
Not sure this limit can be increased without a code change, which will definitely require TAC.
Is this something fairly new that's been happening? Has there been an SK or bulletin posted referring to this yet?
It appears this is recent from the limited number of TAC cases that mention this error.
Regarding this error that has been posted before.
[ERROR]: rad_kernel_urlf_request_serialize: string len =4288 bigger than max 4096;
You say you see TAC cases with these error. Are the cases also related to issues to access Google services with HTTPS inspection? Or this error is related to any websites not Google specific?
The only way to see the full URL with most traffic is HTTPS Inspection.
It's not clear from the TAC cases if Google Services were involved in this or not.
Just curious, are you blocking quic protocol or not?
Andy
Yes we are blocking QUIC. We actually disable it through Group Policy. I did test with it on and the google searches with QUIC are doing better but that's probably because it's not being inspected.
100% true...I tested it many times and blocking quic literally does nothing if proper bypass is not in place. Honestly, I would open TAC case and provide the debug.
Andy
Can you try to whitelist *gstatic.com instead of the Google services in the bypass?
How is for example maps.google running after this?
@jberg712 Hi, any news about this topic? Could you maybe share what debug you performed to get the RAD error message?
Hi @Lesley ,
So, I ran the APPI and NRB debug.
fw ctl debug -buf 32000
fw ctl debug -m APPI all
fw ctl debug -m NRB all
fw ctl kdebug -T -f > /var/log/debug_kernel.txt
This generated a lot of data. But it was in this debug that the rad_kernel_string_length error was found.
The latest update on my TAC case with this is that they are preparing a fix.
Just word of caution...IF its custom fix, you install it on top of current jumbo, so IF you wish to install latest jumbo at some point, you will need to uninstall custom fix, reboot, then ask TAC to port to new jumbo.
Andy
Thanks for that info Andy. Yeah, i've enountered that a few times before and always ask if the fix will be included in the next JHA. I generally prefer not to have a custom fix inhibit from updating my environment when needed.
It would be nice if they could come up with a method that a JH can go on top of a custom fix. But I understand this is a linux environment and that can become cumbersome and create more issues/headaches.
Sounds good!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 36 | |
| 15 | |
| 15 | |
| 14 | |
| 12 | |
| 9 | |
| 6 | |
| 6 | |
| 6 | |
| 6 |
Fri 06 Mar 2026 @ 08:00 AM (COT)
Check Point R82 Hands‑On Bootcamp – Comunidad DOJO PanamáThu 12 Mar 2026 @ 05:00 PM (CET)
AI Security Masters Session 5: Powering Prevention: The AI Driving Check Point’s ThreatCloudThu 12 Mar 2026 @ 05:00 PM (CET)
AI Security Masters Session 5: Powering Prevention: The AI Driving Check Point’s ThreatCloudTue 17 Mar 2026 @ 10:00 AM (CET)
Industrial Cybersecurity in Practice: Manufacturing & Utilities - EMEATue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEAFri 06 Mar 2026 @ 08:00 AM (COT)
Check Point R82 Hands‑On Bootcamp – Comunidad DOJO PanamáTue 24 Mar 2026 @ 06:00 PM (COT)
San Pedro Sula: Spark Firewall y AI-Powered Security ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY