- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello,
Does anyone now the source address 0.0.127.243?
R&D found the Bug. There is a Fix currently for R82 (GA). It will be installed on our Gateway when we update from EA to GA, later this month.
The Bug was introduced into the main train with R81.20 HFA 65 and is tracked under PRHF-36813.
If you have this error please contact the TAC nearest to you for a port of the Fix.
Regards
Peter
That doesn't seem like a valid IP address.
Might need TAC to investigate that.
I opened the TAC SR two or three weeks before I wrote this.
It is with R&D.
Regards
Peter
Looks a bit look a loopback IP that got messed up. Do you know traffic comes from internal or internet?
I see destination internal IP and not external so I assume internal?
@JP_Rex Did you ever get an answer on this?
I also noticed something similar in a customer's environment. Reading the packet capture shows a different source IP than the log, itself.
I'm in the process of investigating the device generating the traffic to learn more. Considering opening a TAC case to report it as unexpected behavior, since this doesn't otherwise appear to be a valid log.
@JP_RexGot a response for a CP representative. Looks like this is a bug that will be patched by PRHF-36797.
Sounds good.
Did you have the same IP Pattern (0.0.127.x) in your logs?
Regards
Peter
Yes, same IPs specifically in IPS logs. Reviewing the attached packet captures in Wireshark showed the real source IP.
You might have TAC double check with R&D whether PRHF-36797 is relevant to your case.
Do that.
But check the RAW log entry before How to enable raw log data for firewall logs in R80.x and R81.x
Because the SmartView Service adds Information and may change the RAW Data.
Regards
Peter
R&D found the Bug. There is a Fix currently for R82 (GA). It will be installed on our Gateway when we update from EA to GA, later this month.
The Bug was introduced into the main train with R81.20 HFA 65 and is tracked under PRHF-36813.
If you have this error please contact the TAC nearest to you for a port of the Fix.
Regards
Peter
same issue
We have also found this kind of log among our customers. Will this bug be included in the R81.20 jumbo hotfix?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
1 | |
1 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY