- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
I am running an R80.40 cluster and have noted some DNS traffic being dropped by an implied rule in the logs. I have reviewed the article at: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
however this seems only to extend to R80.20. It is an old (2013) SK though, so may just not include the newer versions. The article recommends increasing the DNS Maximum Request Length and DNS Maximum Reply Length but does not say what they should be increased to.
The issue seems to hit when the query comes from a host on the VPN making a DNS query relating to an external (cloud hosted) service, so if this type of query adds to the overall size of the UDP packet I could see it potentially being related.
I have 3 questions:
1) If I were to increase those sizes, what should I increase them to?
2) The particular IPS policies relating to these are both disabled. Am I going to need to enable, and permit them in order to get past this default?
3) How can I tell if this is the issue? (How can I see the size of these UDP packets?)
Thanks for any assistance.
Matt
This is an Inspection Setting, which is not related to IPS, but the firewall.
It would help to see the log card in question (mask sensitive data).
It might be better to do something like an fw ctl zdebug drop | grep x.y.z.w to see what the kernel reports as the reason for dropping.
Did you find a solution? We're seeing something very similar. Thanks.
Nope, not yet. As I have been digging into the clients network I have found several issues with DNS, yet none of these seem to be impacting the end users. I'm slowly working it all out fixing the issues one at the time.
Just wondering...did you actually do what phoneboy suggested? run zdebug command when issue is happening, because if its being dropped on clean up rule, that would logically suggest that there is no rule above it allowing the traffic. Now, with R80+ and layers introduced, its possible its explicit layer clean up rule, rather than implicit one at the bottom, but Im not sure what the case in your environment would be.
Nope, I never got that far as the VPN issue was proven to be something else. I know there are packets being dropped, but it doesn't seem to be end user impacting, so it's pretty low on the list of priorities. I actually suspect once the client fixes up their DNS issues the dropped traffic will go away.
I know this may sound like more generic comment, but I had seen few times before depending if you use split vpn or full tunnel, it really does matter what dns server you use. For example, if you use full tunnel, it would make sense to use internal DNS server but if its split tunnel, then if user uses google dns server, that works better. Now, this is not always related to dropped traffic, but just throwing it out there : )
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 26 | |
| 20 | |
| 16 | |
| 5 | |
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 3 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY