<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Show Address Spoofing Networks via CLI in Scripts</title>
    <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/59692#M509</link>
    <description>&lt;P&gt;I've modified slightly to improve internal code styling (consistent use of spaces in pipelines, for example) and to improve code correctness (I have an&amp;nbsp;&lt;EM&gt;incredibly weird&lt;/EM&gt; firewall which hits basically every edge case ever; this version works on it). One specific correctness change I made was wrapping the "VIP" section in a test to see if we're on a cluster in the first place. That whole line should now be silently omitted when run on a non-clustered firewall.&lt;/P&gt;&lt;P&gt;The other big one relates to the awk nightmare in the middle. The problem I ran into is $FWDIR/state/local/FW1/local.set contains data for both members of a cluster, not just the member you're on. Rather than dumping the contents and parsing them repeatedly, I try to get just the lines for the interface we want, and just on the member we're running on. My awk-fu is weak, so I'm sure that expression's correctness can be improved. Still, it's a bit better than just deduplicating, since interfaces can have different exact configuration. This is the expression I was playing with before I had to put this down for a while:&lt;/P&gt;&lt;P&gt;awk "/^: \(@$/,(/^: \([^\)]+$/ &amp;amp;&amp;amp; ! /^: \(@$/)" $FWDIR/state/local/FW1/local.set&lt;/P&gt;&lt;P&gt;It returns both instances of the interface from the local.set file, and I'm not sure yet how to filter it to just the one I want.&lt;/P&gt;&lt;P&gt;Here is my modified version of the whole script as a one-liner:&lt;/P&gt;&lt;P&gt;&lt;FONT face="terminal,monaco" size="2"&gt;interfaceAddress="";interfaceData="";ifconfig -a | grep -B 1 inet | grep encap | awk '{print $1}' | grep -v lo | grep -v ":" | xargs -I @ sh -c 'echo @;if [ $(cpprod_util FwIsHighAvail) -ne 0 ]; then printf " VIP %s\n" $(cphaprob -a if | egrep "^@ +[0-9]" | awk "{print $2}");fi;interfaceAddress=$(ifconfig "@" | grep "inet addr" | cut -d ":" -f 2 | cut -d " " -f 1);printf " IP %s\n" $interfaceAddress;printf " Mask %s\n" $(ifconfig "@" | sed -rn "2s/ .*:(.*)$/\1/p");interfaceData=$(awk "/^:ipaddr \(${interfaceAddress}\)/,/^:mss_value \([0-9]+\)/" $FWDIR/state/local/FW1/local.set);echo -en " ANTISPOOFING ENABLED:\t";echo "${interfaceData}" | grep has_addr_info | cut -c17- | tr \) " ";echo -en " ANTISPOOFING MODE:\t";echo "${interfaceData}" | grep monitor_only | grep false &amp;gt; /dev/null;if [ "$?" -eq 0 ];then echo "Prevent";else echo "Detect";fi;echo -en " ANTISPOOFING TOPO:\t";echo "${interfaceData}" | grep external | grep true &amp;gt; /dev/null;if [ "$?" -eq 0 ];then echo "External";else echo "Internal";fi;echo " ADDRESS SPOOFING NETWORKS:";echo "${interfaceData}" | grep ": (\"" | sort -ng | uniq | tr \(\)\&amp;lt;\&amp;gt;\:\" \ ;echo ""'&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The attached text file is the same script broken out into many lines to make the internal logic flow more obvious.&lt;/P&gt;</description>
    <pubDate>Mon, 05 Aug 2019 23:26:32 GMT</pubDate>
    <dc:creator>Bob_Zimmerman</dc:creator>
    <dc:date>2019-08-05T23:26:32Z</dc:date>
    <item>
      <title>Show AntiSpoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38776#M479</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="esasn123.JPG" style="width: 615px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/9436iD1E59F88F53613B9/image-dimensions/615x338?v=v2" width="615" height="338" role="button" title="esasn123.JPG" alt="esasn123.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This CLI command shows you the address spoofing networks as list and the IP settings per interface. Type this command on security gateway.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Last version from 30-10-2025- command:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;ifconfig -a |grep -B 1 inet |grep encap| awk '{print $1}' | grep -v lo | grep -v ":" | grep -v ^lo | xargs -I % sh -c 'echo %;echo -n " VIP "; cphaprob -a if |grep %|grep -v U|grep -v D | cut -c16-| tr -d "\r\n" ;echo;echo -n " IP ";ifconfig % | grep "inet addr" | cut -d ":" -f 2 | cut -d " " -f 1;echo -n " Mask " ;ifconfig % | sed -rn "2s/ .*:(.*)$/\1/p";echo -en " ANTISPOOFING ENABLED:\t";more $FWDIR/state/local/FW1/local.set |grep -A 30 % | grep has_addr_info | cut -c17- | tr \) " " |sort -n| uniq ; echo -en " ANTISPOOFING MODE:\t"; if [ `more $FWDIR/state/local/FW1/local.set |grep -A 30 % | grep monitor_only | cut -c16- | tr \) " " |sort -n| uniq| grep -o false` ]; then echo "PREVENT"; else echo "DETECT"; fi; echo -en " ANTISPOOFING TOPO:\t"; if [ `more $FWDIR/state/local/FW1/local.set |grep -A 30 % | grep external | cut -c12- | tr \) " " |sort -n| uniq| grep -o true` ]; then echo "External"; else echo "Internal"; fi;echo " ADDRESS SPOOFING NETWORKS:";more $FWDIR/state/local/FW1/local.set | grep -A 30 %|grep ": (\""|sort -n| uniq |tr \(\)\&amp;lt;\&amp;gt;\:\" \ ;echo " "'&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now you can see the states of:&lt;/P&gt;
&lt;P&gt;- ANTISPOOFING ENABLED&lt;BR /&gt;- ANTISPOOFING MODE&lt;BR /&gt;- ANTISPOOFING TOPO&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Here is a demo video:&lt;BR /&gt;&lt;div class="lia-vid-container video-embed-center"&gt;&lt;div id="lia-vid-6384309872112w400h206r323" class="lia-video-brightcove-player-container"&gt;&lt;video-js data-video-id="6384309872112" data-account="6058022097001" data-player="default" data-embed="default" class="vjs-fluid" controls="" data-application-id="" style="width: 100%; height: 100%;"&gt;&lt;/video-js&gt;&lt;/div&gt;&lt;script src="https://players.brightcove.net/6058022097001/default_default/index.min.js"&gt;&lt;/script&gt;&lt;script&gt;(function() {  var wrapper = document.getElementById('lia-vid-6384309872112w400h206r323');  var videoEl = wrapper ? wrapper.querySelector('video-js') : null;  if (videoEl) {     if (window.videojs) {       window.videojs(videoEl).ready(function() {         this.on('loadedmetadata', function() {           this.el().querySelectorAll('.vjs-load-progress div[data-start]').forEach(function(bar) {             bar.setAttribute('role', 'presentation');             bar.setAttribute('aria-hidden', 'true');           });         });       });     }  }})();&lt;/script&gt;&lt;a class="video-embed-link" href="https://community.checkpoint.com/t5/video/gallerypage/video-id/6384309872112"&gt;(view in My Videos)&lt;/a&gt;&lt;/div&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2025 21:41:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38776#M479</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2025-10-30T21:41:16Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38777#M480</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Heiko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's a very nice command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps this can be extended even further:&lt;BR /&gt;ethtool settings - speed, duplex,...&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Jun 2018 08:25:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38777#M480</guid>
      <dc:creator>Petra_Angelmahr</dc:creator>
      <dc:date>2018-06-23T08:25:17Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38778#M481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice command!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Jun 2018 08:54:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38778#M481</guid>
      <dc:creator>Ulf_Wegner</dc:creator>
      <dc:date>2018-06-23T08:54:47Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38779#M482</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Heiko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been looking for this for years. &lt;/P&gt;&lt;P&gt;Thanks, I'll give you a badge.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THX&lt;/P&gt;&lt;P&gt;Silvia&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Jun 2018 09:20:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38779#M482</guid>
      <dc:creator>Silvia_Day</dc:creator>
      <dc:date>2018-06-23T09:20:16Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38780#M483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #454545; text-decoration: -webkit-letterpress; font-size: 17px;"&gt;This one-liner is very helpful. Can you also add routes for the interface? This makes it easier to see which networks are missing.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2018 16:14:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38780#M483</guid>
      <dc:creator>Kan_Torres</dc:creator>
      <dc:date>2018-06-24T16:14:56Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38781#M484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jun 2018 05:49:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38781#M484</guid>
      <dc:creator>Til_Hall</dc:creator>
      <dc:date>2018-06-25T05:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38782#M485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks to&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/41735"&gt;Danny Jung&lt;/A&gt; (&lt;A href="https://community.checkpoint.com/thread/8207"&gt;One-liner for Address Spoofing Troubleshooting&lt;/A&gt;) for the inspiration and to&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/41625"&gt;Timothy Hall&lt;/A&gt;&amp;nbsp; (&lt;A href="https://community.checkpoint.com/thread/6289"&gt;CLI Anti-Spoofing Information&lt;/A&gt; ) for the infos.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THX&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="" data-containerid="-1" data-containertype="-1" data-objectid="55229" data-objecttype="3" href="https://community.checkpoint.com/people/h.ank2614aef2-c5d1-3f73-bbbd-45c59b9e2728"&gt;Heiko&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jun 2018 12:33:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38782#M485</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-06-25T12:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38783#M486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is ist possible to add more interface settings:&lt;/P&gt;&lt;P&gt;- ethtool speed, duplex, driver,...&lt;/P&gt;&lt;P&gt;- routes&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2018 11:28:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38783#M486</guid>
      <dc:creator>Nuno_Thome</dc:creator>
      <dc:date>2018-06-26T11:28:46Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38784#M487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jun 2018 08:20:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38784#M487</guid>
      <dc:creator>Regi_Suhm</dc:creator>
      <dc:date>2018-06-29T08:20:31Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38785#M488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice command&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2018 13:30:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38785#M488</guid>
      <dc:creator>Udo_Struess</dc:creator>
      <dc:date>2018-07-02T13:30:49Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38786#M489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;LOL - Nice command.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2018 07:15:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38786#M489</guid>
      <dc:creator>Ukko_Metsola</dc:creator>
      <dc:date>2018-07-23T07:15:32Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38787#M490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad to see such a great tool.&amp;nbsp; Also wanted to mention this SK detailing a situation in which performing a "Get Interfaces WITHOUT Topology" will change the antispoofing state from Disabled to Enabled (with Prevent) on firewall interfaces!&amp;nbsp; Needless to say this can result in some unexpected issues:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk136372&amp;amp;partition=Expert&amp;amp;product=Security" style="max-width: 840px;"&gt;sk136372: Get Interfaces without topology resets anti-spoofing to Enabled/Prevent&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This may necessitate disabling gateway anti-spoofing enforcement "on the fly" as detailed in my presentation here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-2739"&gt;Best of CheckMates CLI&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The fix for this issue was rolled into R80.10 GA Jumbo HFA 154:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/thread/10002"&gt;R80.10: New Jumbo Hotfix (Take 154) GA-Release&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Oct 2018 13:21:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38787#M490</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-10-23T13:21:08Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38788#M491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey buddy.&amp;nbsp;Was this tested with R77.30 as well or just R80.10? On one of my old clusters that runs R77.30 it returned ton of false results as it greps too far when looking for spoofing subnets. Maybe worth adding a note if it only works or was tested on R80.10 &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;Or even better, doesn't run on R77.30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To give you an example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74685_pastedImage_4.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but with the current command following 30 lines you will get 2 extra subnets reported:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74687_pastedImage_7.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;reducing grep search to 25 lines helps but I'm not too sure how would it behave in case you had very long list of subnets &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;might need to re-think the approach for filtering those subnets &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Nov 2018 13:18:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38788#M491</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-19T13:18:00Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38790#M493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also Mgmt interface may return a lot of rubbish as it may match string "Mgmt" in the file, it's a fairly common string&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74690_pastedImage_3.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Better is to add leading bracket&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74689_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Nov 2018 13:36:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38790#M493</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-19T13:36:39Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38791#M494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Much better! I though there was another one but this one came as top search... &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Nov 2018 13:38:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38791#M494</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-19T13:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38793#M496</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had it on some but not this particular cluster&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Nov 2018 18:53:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38793#M496</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-19T18:53:50Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38794#M497</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very nice one-liner! Thumbs up!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a chace to move R&amp;amp;D to implement a simple command for this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Dec 2018 09:30:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38794#M497</guid>
      <dc:creator>Sven_Glock</dc:creator>
      <dc:date>2018-12-05T09:30:54Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38795#M498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great command, certainly very useful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As an aside, can either this command be adapted, or is there an alternative for pulling this information from a VS or VR on VSX? I am right in thinking the local.set file contains only the interface configuration for the VSX GW and not the VRs or VSs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2019 20:00:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38795#M498</guid>
      <dc:creator>Austin_Packer2</dc:creator>
      <dc:date>2019-02-28T20:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38796#M499</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, I prefer using&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/41735"&gt;Danny Jung&lt;/A&gt;&amp;nbsp;one-liner for&amp;nbsp;getting spoofing info. So it will work on any VS as long as you set&amp;nbsp;&lt;STRONG&gt;vsenv x&lt;/STRONG&gt;&amp;nbsp;environment beforehand manually&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;echo; egrep -B1 $'ifindex|:ipaddr|\(\x22&amp;lt;[0-9]|has_addr_info|:monitor_only|:external' $FWDIR/state/local/FW1/local.set | sed 's/[\x22\t()&amp;lt;&amp;gt;]//g' | sed 's/--//g' | sed 'N;s/\n:ipaddr6/ IPv6/;P;D' | sed '/IPv6/!s/://g' | sed 's/interface_topology/\tCalculated Interface Topology/g' | sed '0,/ifindex 0/{/ifindex 0/d;}' | sed '/ifindex 0/q' | sed '/spoof\|scan/d' | sed 's/has_addr_info true/\tAddress Spoofing Protection: Enabled/g' | sed 's/has_addr_info false/\tAddress Spoofing Protection: Disabled/g' | sed -e '/Prot/{n;d}' | sed 'N;s/\nmonitor_only true/ (Detect Mode)/;P;D' | sed 'N;s/\nmonitor_only false/ (Prevent Mode)/;P;D' | sed 'N;s/\nexternal false/ - Internal Interface/;P;D' | sed 'N;s/\nexternal true/ - External Interface/;P;D' | tac | sed '/ifindex 0/I,+2 d' | sed '/Address/,$!d' | tac | sed '/ifindex/d' | sed 's/,/ -/g' | sed 'N;s/\nipaddr/ &amp;gt;/;P;D' | sed '/ - /s/^ /\t/' | egrep -C 9999 --color=auto $'&amp;gt;|IPv6|External|Disabled|Detect'&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2019 09:59:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38796#M499</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2019-03-01T09:59:37Z</dc:date>
    </item>
    <item>
      <title>Re: Show Address Spoofing Networks via CLI</title>
      <link>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38797#M500</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Kaspars.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did have the vsenv set to the correct environment, but I was running Danny Jungs CCC script, and running the command through there, which must default to the VS 0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Works a treat when ran directly. Thanks! &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2019 10:35:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38797#M500</guid>
      <dc:creator>Austin_Packer2</dc:creator>
      <dc:date>2019-03-01T10:35:48Z</dc:date>
    </item>
  </channel>
</rss>

