- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello,
Does anyone now the source address 0.0.127.243?
R&D found the Bug. There is a Fix currently for R82 (GA). It will be installed on our Gateway when we update from EA to GA, later this month.
The Bug was introduced into the main train with R81.20 HFA 65 and is tracked under PRHF-36813.
If you have this error please contact the TAC nearest to you for a port of the Fix.
Regards
Peter
That doesn't seem like a valid IP address.
Might need TAC to investigate that.
I opened the TAC SR two or three weeks before I wrote this.
It is with R&D.
Regards
Peter
Looks a bit look a loopback IP that got messed up. Do you know traffic comes from internal or internet?
I see destination internal IP and not external so I assume internal?
@JP_Rex Did you ever get an answer on this?
I also noticed something similar in a customer's environment. Reading the packet capture shows a different source IP than the log, itself.
I'm in the process of investigating the device generating the traffic to learn more. Considering opening a TAC case to report it as unexpected behavior, since this doesn't otherwise appear to be a valid log.
@JP_RexGot a response for a CP representative. Looks like this is a bug that will be patched by PRHF-36797.
Sounds good.
Did you have the same IP Pattern (0.0.127.x) in your logs?
Regards
Peter
Yes, same IPs specifically in IPS logs. Reviewing the attached packet captures in Wireshark showed the real source IP.
You might have TAC double check with R&D whether PRHF-36797 is relevant to your case.
Do that.
But check the RAW log entry before How to enable raw log data for firewall logs in R80.x and R81.x
Because the SmartView Service adds Information and may change the RAW Data.
Regards
Peter
R&D found the Bug. There is a Fix currently for R82 (GA). It will be installed on our Gateway when we update from EA to GA, later this month.
The Bug was introduced into the main train with R81.20 HFA 65 and is tracked under PRHF-36813.
If you have this error please contact the TAC nearest to you for a port of the Fix.
Regards
Peter
same issue
We have also found this kind of log among our customers. Will this bug be included in the R81.20 jumbo hotfix?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY