- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi Team,
We are facing issue where reverse https traffic from destination to source is being dropped.
Below example FYI
*****Forward Traffic******
Source:10.10.10.10 (source is behind gateway 1)
Source port: Random (52437)
Destination: 20.20.20.20 (Destination is behind gateway 2)
Destination port: 443
Traffic is getting allowed on both Gateway
*****Reverse Traffic******
Source: 20.20.20.20 (Destination is behind gateway 2)
Source port: 443
Destination: 10.10.10.10 (source is behind gateway 1)
Destination port: Random (52437) --->Same Random Port which observed in forward traffic
Traffic is getting dropped on gateway 2
**********************
This is unexpected behavior in stateful firewall,
Any thoughts on why this is happening , and what could be solution?
What does the drop log say?
For TCP 443 you do not need two rules, one should be enough. Also, what about NAT?
Hello _Val_
Thanks for reply.
Zdebug Drop logs says "dropped by fw_send_log_drop Reason: Rulebase drop". Same observed in smartconsole logs, traffic is getting dropped by default cleanup rule.
Nating is not enabled for both source and destination.
Do you see accept logs for forward traffic on both gateways, and which gateway is logging the drop?
Hello emmap,
Yes can see accept logs for forward traffic on both gateways.
Drop log is observed on first gateway of return traffic (gateway 2 as explain in question)
This does not make much sense. Check for asymmetric routing.
Please provide screenshots of both the accept and drop logs (masking sensitive data).
Please provide the full log card for each log entry.
I’m not seeing the “origin” field on these log entries (I.e. the gateway that is actually logging these packets).
Have you confirmed the same gateway that is allowing the traffic is actually blocking it?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 26 | |
| 15 | |
| 13 | |
| 12 | |
| 9 | |
| 7 | |
| 6 | |
| 6 | |
| 5 | |
| 5 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY