Stateful Inspection checks.
It means the first packet of a TCP session (proto=6) traversing the firewall isn't the syncronization packet (first of the three way handshake of TCP) so because of this, the firewall drops the packet.
By default, Check Point Firewall is configured to drop out of state TCP Packets (Global Properties -> Stateful Inspection->Drop Out of state TCP Packets is checked)
You can completely disable the TCP out of state drops:
- By unchecking the option on Stateful Inspection and installing policy
- By adding an exception to Drop out of state TCP on Stateful Inspection and selecting the Firewall (also requires install policy).
- Executing the following command on the gateway in expert mode to disable on the fly: "fw ctl set int fw_allow_out_of_state_tcp 1" (Does not survive a reboot) .
You can follow this sk as workaround for allowing out of state packets to some traffic only: SmartView Tracker shows multiple logs for dropped 'TCP out of state' packets with various ...
Regards