- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
We have upgraded from R80.10 to R80.40 (HF48) and have a route flipping issue:
# ip route get a.b.c.d
a.b.c.d via <correct next hop ip> dev eth5 src <correct source>
# ip route get a.b.c.d
a.b.c.d via <correct next hop ip> dev eth2 src <correct source>
For whatever reason the interface in the routing table is changed from eth5 to eth2.
In fw monitor you can see it as well, the first packet goes to eth5 correctly, the second one after a route flip goes to eth2, which is wrong.
[vs_0][fw_2] eth5:O[44]: ****** -> ***** (UDP) len=200 id=61683 UDP: 2464 -> 49910
[vs_0][fw_2] eth2:O[44]: ****** -> ****** (UDP) len=200 id=49885 UDP: 2464 -> 49910
Did anyone have similiar problems?
TAC case is opened.
Is your firewall statically or dynamically routed? What does the actual routing table (netstat -rn) show for the destination network?
It is completly static routed.
We have only seen it for UDP and ICMP never for TCP.
> We have only ssen it for UDP and ICMP never for TCP.
This statement makes no sense unless you are using Policy Based Routing (PBR), are you? Routing is performed by the Linux IP Driver and is not generally influenced by anything in Check Point's code that would be distinguishing service or protocol, unless a feature such as ISP Redundancy is in use.
Regular IP routing only looks at destination IP address and could care less about service or protocol. Please provide the output of netstat -renv from expert mode for the route in question, once when it is showing eth2 and the other when it is showing eth5. We need to see the live routing table and associated flags/use.
No pbr is used:
show pbr
PBR Summary
PBR has 0 tables
PBR has 0 rules
netstat shows:
a.b.c.d ****** 255.255.255.255 UGH 0 0 0 eth5 in the correct case
since the node is not in production right now of course I cannot provide the incorrect one.
Just for the info, there are about 130 static routes on the gateway.
Without being able to see the unredacted value of the route next hop address and the full unredacted eth2 and eth5 interface configuration it is difficult to surmise what is wrong. Feel free to PM this information to me without redacting the IP addresses. If you aren't comfortable with doing that you'll need to work through TAC.
Did you receive the PN?
No I don't see your PM.
PM sent.
No ISP redundancy configured no.
Strange, did you open TAC case? if so can you share the number so i can follow it?
Yes TAC case is open, will PM you the number.
Had a two day debugging season on the WE.
Still no solution, but additional customers with the same problem.
by chance does
show route all
from clish show anything strange?
I would enable trace (set trace kernel all on, set trace static all on, etc) and then check /var/log/routed.log to see if you can get some hints on what is going on as routed is the only process that should be making routing changes so it would be the place to debug.
Actually I've received some inside information about this case, and it appears to be a problem with the Linux route cache (ip route show cache) which is somehow getting cached route entries that are associated with the wrong interface. The main routing table (ip route show or netstat -rn) always shows the problematic route associated with the correct interface. So this would appear to be a Gaia/Linux bug, and I find it interesting that the IP route cache functionality was abandoned in the 3.6 version of the Linux kernel, but unfortunately there is no apparent way to disable it permanently. A temporary workaround is to flush the route cache with the ip route flush cache command but the problem just comes back later.
It seems, that if you have VPNs on both interfaces (eventhough, that the impacted traffic is non VPN traffic), the FW sometimes decides to switch to MAC based routing and inserts an incorrect route in the route cache.
Setting cphwd_enable_ecmp to 1 seems to fix it, we are now waiting for a confirmation and a fix.
Hmm I guess MAC based routing would be needed for Equal Cost MultiPath. The presence of cphwd in that variable name would imply that it is implemented in SecureXL, so I imagine selectively disabling SecureXL for the problematic interfaces/addresses would solve this as well.
Ok, so that is a scary bug. Any idea what is triggering it and effected versions?
I guess it happens, if you got more than one interface, which terminates VPN session (BTW the affected traffice is not VPN traffic).
Affected version for us are R80.40 with any current JHFA. I assume the bug will happen in R80.30/3.10 as well.
No disabling SecureXL did not help.
Where is this at? Any resolution?
received a HF for it, but as it requires a production down time, we cannot implement it before a WE in September.
It was promised, that it becomes part of the JFA pretty soon.
Thanks for the update.
Now there is a SK about the issue as well: SK168881.
The HF fixed the issue, now we have to wait for it to be included in the Jumbo.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
12 | |
7 | |
6 | |
6 | |
6 | |
5 | |
4 | |
3 | |
3 |
Wed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY