<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Show Address Spoofing Networks via CLI  in Scripts</title>
    <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38778#M481</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice command!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 23 Jun 2018 08:54:47 GMT</pubDate>
    <dc:creator>Ulf_Wegner</dc:creator>
    <dc:date>2018-06-23T08:54:47Z</dc:date>
    <item>
      <title>Show AntiSpoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38776#M479</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="esasn123.JPG" style="width: 615px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/9436iD1E59F88F53613B9/image-dimensions/615x338?v=v2" width="615" height="338" role="button" title="esasn123.JPG" alt="esasn123.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This CLI command shows you the address spoofing networks as list and the IP settings per interface. Type this command on security gateway.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Last version from 30-10-2025- command:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;ifconfig -a |grep -B 1 inet |grep encap| awk '{print $1}' | grep -v lo | grep -v ":" | grep -v ^lo | xargs -I % sh -c 'echo %;echo -n " VIP "; cphaprob -a if |grep %|grep -v U|grep -v D | cut -c16-| tr -d "\r\n" ;echo;echo -n " IP ";ifconfig % | grep "inet addr" | cut -d ":" -f 2 | cut -d " " -f 1;echo -n " Mask " ;ifconfig % | sed -rn "2s/ .*:(.*)$/\1/p";echo -en " ANTISPOOFING ENABLED:\t";more $FWDIR/state/local/FW1/local.set |grep -A 30 % | grep has_addr_info | cut -c17- | tr \) " " |sort -n| uniq ; echo -en " ANTISPOOFING MODE:\t"; if [ `more $FWDIR/state/local/FW1/local.set |grep -A 30 % | grep monitor_only | cut -c16- | tr \) " " |sort -n| uniq| grep -o false` ]; then echo "PREVENT"; else echo "DETECT"; fi; echo -en " ANTISPOOFING TOPO:\t"; if [ `more $FWDIR/state/local/FW1/local.set |grep -A 30 % | grep external | cut -c12- | tr \) " " |sort -n| uniq| grep -o true` ]; then echo "External"; else echo "Internal"; fi;echo " ADDRESS SPOOFING NETWORKS:";more $FWDIR/state/local/FW1/local.set | grep -A 30 %|grep ": (\""|sort -n| uniq |tr \(\)\&amp;lt;\&amp;gt;\:\" \ ;echo " "'&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now you can see the states of:&lt;/P&gt;
&lt;P&gt;- ANTISPOOFING ENABLED&lt;BR /&gt;- ANTISPOOFING MODE&lt;BR /&gt;- ANTISPOOFING TOPO&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Here is a demo video:&lt;BR /&gt;&lt;div class="lia-vid-container video-embed-center"&gt;&lt;div id="lia-vid-6384309872112w400h206r1" class="lia-video-brightcove-player-container"&gt;&lt;video-js data-video-id="6384309872112" data-account="6058022097001" data-player="default" data-embed="default" class="vjs-fluid" controls="" data-application-id="" style="width: 100%; height: 100%;"&gt;&lt;/video-js&gt;&lt;/div&gt;&lt;script src="https://players.brightcove.net/6058022097001/default_default/index.min.js"&gt;&lt;/script&gt;&lt;script&gt;(function() {  var wrapper = document.getElementById('lia-vid-6384309872112w400h206r1');  var videoEl = wrapper ? wrapper.querySelector('video-js') : null;  if (videoEl) {     if (window.videojs) {       window.videojs(videoEl).ready(function() {         this.on('loadedmetadata', function() {           this.el().querySelectorAll('.vjs-load-progress div[data-start]').forEach(function(bar) {             bar.setAttribute('role', 'presentation');             bar.setAttribute('aria-hidden', 'true');           });         });       });     }  }})();&lt;/script&gt;&lt;a class="video-embed-link" href="https://community.checkpoint.com/t5/video/gallerypage/video-id/6384309872112"&gt;(view in My Videos)&lt;/a&gt;&lt;/div&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2025 21:41:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38776#M479</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2025-10-30T21:41:16Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38777#M480</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Heiko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's a very nice command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps this can be extended even further:&lt;BR /&gt;ethtool settings - speed, duplex,...&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Jun 2018 08:25:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38777#M480</guid>
      <dc:creator>Petra_Angelmahr</dc:creator>
      <dc:date>2018-06-23T08:25:17Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38778#M481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice command!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Jun 2018 08:54:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38778#M481</guid>
      <dc:creator>Ulf_Wegner</dc:creator>
      <dc:date>2018-06-23T08:54:47Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38779#M482</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Heiko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been looking for this for years. &lt;/P&gt;&lt;P&gt;Thanks, I'll give you a badge.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THX&lt;/P&gt;&lt;P&gt;Silvia&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Jun 2018 09:20:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38779#M482</guid>
      <dc:creator>Silvia_Day</dc:creator>
      <dc:date>2018-06-23T09:20:16Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38780#M483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #454545; text-decoration: -webkit-letterpress; font-size: 17px;"&gt;This one-liner is very helpful. Can you also add routes for the interface? This makes it easier to see which networks are missing.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2018 16:14:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38780#M483</guid>
      <dc:creator>Kan_Torres</dc:creator>
      <dc:date>2018-06-24T16:14:56Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38781#M484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jun 2018 05:49:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38781#M484</guid>
      <dc:creator>Til_Hall</dc:creator>
      <dc:date>2018-06-25T05:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38782#M485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks to&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/41735"&gt;Danny Jung&lt;/A&gt; (&lt;A href="https://community.checkpoint.com/thread/8207"&gt;One-liner for Address Spoofing Troubleshooting&lt;/A&gt;) for the inspiration and to&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/41625"&gt;Timothy Hall&lt;/A&gt;&amp;nbsp; (&lt;A href="https://community.checkpoint.com/thread/6289"&gt;CLI Anti-Spoofing Information&lt;/A&gt; ) for the infos.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THX&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="" data-containerid="-1" data-containertype="-1" data-objectid="55229" data-objecttype="3" href="https://community.checkpoint.com/people/h.ank2614aef2-c5d1-3f73-bbbd-45c59b9e2728"&gt;Heiko&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jun 2018 12:33:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38782#M485</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-06-25T12:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38783#M486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is ist possible to add more interface settings:&lt;/P&gt;&lt;P&gt;- ethtool speed, duplex, driver,...&lt;/P&gt;&lt;P&gt;- routes&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2018 11:28:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38783#M486</guid>
      <dc:creator>Nuno_Thome</dc:creator>
      <dc:date>2018-06-26T11:28:46Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38784#M487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jun 2018 08:20:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38784#M487</guid>
      <dc:creator>Regi_Suhm</dc:creator>
      <dc:date>2018-06-29T08:20:31Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38785#M488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice command&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2018 13:30:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38785#M488</guid>
      <dc:creator>Udo_Struess</dc:creator>
      <dc:date>2018-07-02T13:30:49Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38786#M489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;LOL - Nice command.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2018 07:15:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38786#M489</guid>
      <dc:creator>Ukko_Metsola</dc:creator>
      <dc:date>2018-07-23T07:15:32Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38787#M490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad to see such a great tool.&amp;nbsp; Also wanted to mention this SK detailing a situation in which performing a "Get Interfaces WITHOUT Topology" will change the antispoofing state from Disabled to Enabled (with Prevent) on firewall interfaces!&amp;nbsp; Needless to say this can result in some unexpected issues:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk136372&amp;amp;partition=Expert&amp;amp;product=Security" style="max-width: 840px;"&gt;sk136372: Get Interfaces without topology resets anti-spoofing to Enabled/Prevent&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This may necessitate disabling gateway anti-spoofing enforcement "on the fly" as detailed in my presentation here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-2739"&gt;Best of CheckMates CLI&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The fix for this issue was rolled into R80.10 GA Jumbo HFA 154:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/thread/10002"&gt;R80.10: New Jumbo Hotfix (Take 154) GA-Release&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Oct 2018 13:21:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38787#M490</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-10-23T13:21:08Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38788#M491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey buddy.&amp;nbsp;Was this tested with R77.30 as well or just R80.10? On one of my old clusters that runs R77.30 it returned ton of false results as it greps too far when looking for spoofing subnets. Maybe worth adding a note if it only works or was tested on R80.10 &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;Or even better, doesn't run on R77.30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To give you an example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74685_pastedImage_4.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but with the current command following 30 lines you will get 2 extra subnets reported:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74687_pastedImage_7.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;reducing grep search to 25 lines helps but I'm not too sure how would it behave in case you had very long list of subnets &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;might need to re-think the approach for filtering those subnets &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Nov 2018 13:18:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38788#M491</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-19T13:18:00Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38790#M493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also Mgmt interface may return a lot of rubbish as it may match string "Mgmt" in the file, it's a fairly common string&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74690_pastedImage_3.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Better is to add leading bracket&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74689_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Nov 2018 13:36:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38790#M493</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-19T13:36:39Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38791#M494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Much better! I though there was another one but this one came as top search... &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Nov 2018 13:38:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38791#M494</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-19T13:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38793#M496</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had it on some but not this particular cluster&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Nov 2018 18:53:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38793#M496</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-19T18:53:50Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38794#M497</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very nice one-liner! Thumbs up!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a chace to move R&amp;amp;D to implement a simple command for this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Dec 2018 09:30:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38794#M497</guid>
      <dc:creator>Sven_Glock</dc:creator>
      <dc:date>2018-12-05T09:30:54Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38795#M498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great command, certainly very useful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As an aside, can either this command be adapted, or is there an alternative for pulling this information from a VS or VR on VSX? I am right in thinking the local.set file contains only the interface configuration for the VSX GW and not the VRs or VSs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2019 20:00:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38795#M498</guid>
      <dc:creator>Austin_Packer2</dc:creator>
      <dc:date>2019-02-28T20:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38796#M499</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, I prefer using&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/41735"&gt;Danny Jung&lt;/A&gt;&amp;nbsp;one-liner for&amp;nbsp;getting spoofing info. So it will work on any VS as long as you set&amp;nbsp;&lt;STRONG&gt;vsenv x&lt;/STRONG&gt;&amp;nbsp;environment beforehand manually&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;echo; egrep -B1 $'ifindex|:ipaddr|\(\x22&amp;lt;[0-9]|has_addr_info|:monitor_only|:external' $FWDIR/state/local/FW1/local.set | sed 's/[\x22\t()&amp;lt;&amp;gt;]//g' | sed 's/--//g' | sed 'N;s/\n:ipaddr6/ IPv6/;P;D' | sed '/IPv6/!s/://g' | sed 's/interface_topology/\tCalculated Interface Topology/g' | sed '0,/ifindex 0/{/ifindex 0/d;}' | sed '/ifindex 0/q' | sed '/spoof\|scan/d' | sed 's/has_addr_info true/\tAddress Spoofing Protection: Enabled/g' | sed 's/has_addr_info false/\tAddress Spoofing Protection: Disabled/g' | sed -e '/Prot/{n;d}' | sed 'N;s/\nmonitor_only true/ (Detect Mode)/;P;D' | sed 'N;s/\nmonitor_only false/ (Prevent Mode)/;P;D' | sed 'N;s/\nexternal false/ - Internal Interface/;P;D' | sed 'N;s/\nexternal true/ - External Interface/;P;D' | tac | sed '/ifindex 0/I,+2 d' | sed '/Address/,$!d' | tac | sed '/ifindex/d' | sed 's/,/ -/g' | sed 'N;s/\nipaddr/ &amp;gt;/;P;D' | sed '/ - /s/^ /\t/' | egrep -C 9999 --color=auto $'&amp;gt;|IPv6|External|Disabled|Detect'&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2019 09:59:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38796#M499</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2019-03-01T09:59:37Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38797#M500</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Kaspars.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did have the vsenv set to the correct environment, but I was running Danny Jungs CCC script, and running the command through there, which must default to the VS 0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Works a treat when ran directly. Thanks! &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2019 10:35:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38797#M500</guid>
      <dc:creator>Austin_Packer2</dc:creator>
      <dc:date>2019-03-01T10:35:48Z</dc:date>
    </item>
  </channel>
</rss>

