- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Have you confirmed the routing is correct end-to-end and that anti-spoofing is set correctly?
Is there any NAT involved and could you please share a better/clearer screenshot?
This screenshot appears different to the original, can you provide the more detailed log cards for both flows?
There is some suggestion here that's proxy is involved, are only some ports/redirected to the proxy and others NAT different?
I didn't understand your message but the client has a proxy in his intranet.
I would agree totally with what Chris said. 99% of the time, its either NAT, routing or anti-spoofing (or combination of all of them).
Ok I will check the cpinfo file today to verify?
What will you check how in cpinfo ?
As i said, I am currently looking for the cause of the asymmetric routing
But how to accomplish this in cpinfo ? Never heard of routing issues resolved by cpinfo analysis...
I don't have access to the appliance, so i will analyze on my side the cpinfo file and after that i will contact the customer to have clear understanding of the issues.
I do not think you will find all answers in the CPInfo. In most cases, asymmetric routing is caused by external factors.
Great - which tool are you using ? Or do you search in the cpinfo text ?
CheckPoint Diagnostics View
Hey @A_KOUADIO ,
I think what @_Val_ and @G_W_Albrecht are saying is that its very unlikely you would find an answer as to why assymetric routing happens from cpinfo file review, as thats simply the config file from the firewall. Here is what I would run and examine carefully the output. So, just as an example, say the source is 10.10.10.10 and dst is 20.20.20.20, try commands like below:
fw monitor -e "accept host(10.10.10.10) and dst(20.20.20.20);"
fw monitor -e "accept host(20.20.20.20) and dst(10.10.10.10);"
fw minitor -e "accept host(10.10.10.10) or dst(20.20.20.20);"
Alternatively, you can also use below command. Idea is to filter for src IP, src port, dst IP, dst IP, protocol
fw monitor -F "10.10.10.10,0,20.20.20.20,0,0" -F "20.20.20.20,0,10.10.10.10,0,0"
I can also suggest a website my colleague made ages ago to help people with captures on different platforms (its very useful)
Hope all this helps you.
Cheers,
Andy
Dropped by Access Rule Number 1225 ???
Because the source port match another rule.
As I said previously, the return traffic is dissociated from the going trafic so it match another rule or drop by the cleanup rule.
I would not use 1225 rules - but that should not cause asymmetrical routing afaik...
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
19 | |
12 | |
7 | |
7 | |
6 | |
5 | |
4 | |
4 | |
4 | |
4 |
Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY