- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello friends,
So I'm having a hard time trying to block bad tcp checksums. Here's the deal! I have a FTP connection that transfers files from A to B. In the middle there's a Check Point firewall. From time to time some files get corrupted by bad checksums and mess a databases (as they are injected directly in some tables).
Tried to block it with Check Point using the Inspection Settings but after failed attempts I've opened a case. I was told that it works in conjunction with IPS. Well .. few weeks later here's IPS blade and threat prevention profile applied.
It doesn't give an 'octet' about my policy. FTP transfer gets bad checksums, files get corrupted, injected in database. The funny part is that Fortinet blocks this by design , even without IPS activated.
So back to Check Point gateway, I have tried literally everything. I even wrote a small script that uses scapy and tried to generate bad checksum packets. Other firewalls detects and block it. Even tcpdump confirms they have bad checksums.
Checkpoint blocks other stuff like but not bad checksums. By the way, IPS policy is set to strict and during a file transfer I intentionally injected some invalid checkum (0xFFFF).
Am I doing something wrong here ?
Let me test this in the lab Sunday when my colleague and I have cutover for a customer. Will update you then.
Have a nice weekend!
Andy
Could this one maybe be related?
https://support.checkpoint.com/results/sk/sk180863
also are you using ftp handler on the protocol in the relevant rule? Just be sure it is plain unecrypted ftp right?
Good point, definitely could be.
Andy
Is this a check point physical appliance or VM and which version?
Please share output: ethtool -k <interface>
So to get everything sorted:
- It's just a lame FTP transfer (tcp 21 and data on tcp22). Not encrypted, everything is clear. (not SFTP). The problem is that trafic is not blocked at all with bad tcp checksums, not that it's blocked by Bounce.
- It's hardware, 28600 in HA. I will ask for ethtool ouput but I can assure you that it was not modified (as I've installed those gateways). By default linux kernel blocks tcp checksums.
Now explain the client that a Fortigate blockes by design (even out of the box, no nothing on it) and checkpoint with Threat Prevention rule and Inspection doesn't 🙂 I dare you to :))
Understand the frustration however we need more information in order to help, apologies if you've been around this loop with TAC already.
The two places I'm aware of that we would tackle something this are via the inspection settings and the NIC level hence the output & version info previously requested.
I forgot to update today, due to long maintenance window I had to attend, but also checked the same in R82 lab and I agree, those are the right settings.
Andy
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY