<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Antispoofing Detect Bypassing ACL Policy in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Antispoofing-Detect-Bypassing-ACL-Policy/m-p/89876#M2095</link>
    <description>Its an R80.40..rules are for normal traffic and one rule for incoming traffic in web server from internet followed by any any deny.&lt;BR /&gt;The log entries show the source and destination and the action as "Detect" but no acl rule number in these entries.&lt;BR /&gt;One thing i would like to point out is that the webserver is natted with the firewall interface ip.. can this be an issue ?</description>
    <pubDate>Fri, 26 Jun 2020 04:38:39 GMT</pubDate>
    <dc:creator>LostBoY</dc:creator>
    <dc:date>2020-06-26T04:38:39Z</dc:date>
    <item>
      <title>Antispoofing Detect Bypassing ACL Policy</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Antispoofing-Detect-Bypassing-ACL-Policy/m-p/89832#M2093</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a Checkpoint Cluster in AWS whose external interface topology is defined as&amp;nbsp;&lt;/P&gt;&lt;P&gt;eth0: defined by routes&amp;nbsp;&lt;/P&gt;&lt;P&gt;Antispoofing - Detect&lt;/P&gt;&lt;P&gt;This is due to the fact that some Private IPs are also hitting eth0 for communication hence Antispoofing is set to Dectect.&lt;/P&gt;&lt;P&gt;There is a requirement where i need to allow access to internal web server from a sepcific group of Public IPs only.. the problem is even after restricting it from ACL .. traffic is getting allowed from all over the Internet and the logs for that access is under Action - "Detect" .. some how its not hitting ACL .. is this the expected behaviour ? why is the traffic not hitting ACL when the Anti spoofing is set to Detect..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jun 2020 18:18:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Antispoofing-Detect-Bypassing-ACL-Policy/m-p/89832#M2093</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2020-06-25T18:18:22Z</dc:date>
    </item>
    <item>
      <title>Re: Antispoofing Detect Bypassing ACL Policy</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Antispoofing-Detect-Bypassing-ACL-Policy/m-p/89865#M2094</link>
      <description>What precise version/JHF level?&lt;BR /&gt;What precise rules have you configured?&lt;BR /&gt;Need a network diagram of the relevant resources and a snapshot of the relevant rules.&lt;BR /&gt;The log entries should also tell you precisely what rules are being hit.</description>
      <pubDate>Fri, 26 Jun 2020 00:15:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Antispoofing-Detect-Bypassing-ACL-Policy/m-p/89865#M2094</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-06-26T00:15:34Z</dc:date>
    </item>
    <item>
      <title>Re: Antispoofing Detect Bypassing ACL Policy</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Antispoofing-Detect-Bypassing-ACL-Policy/m-p/89876#M2095</link>
      <description>Its an R80.40..rules are for normal traffic and one rule for incoming traffic in web server from internet followed by any any deny.&lt;BR /&gt;The log entries show the source and destination and the action as "Detect" but no acl rule number in these entries.&lt;BR /&gt;One thing i would like to point out is that the webserver is natted with the firewall interface ip.. can this be an issue ?</description>
      <pubDate>Fri, 26 Jun 2020 04:38:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Antispoofing-Detect-Bypassing-ACL-Policy/m-p/89876#M2095</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2020-06-26T04:38:39Z</dc:date>
    </item>
    <item>
      <title>Re: Antispoofing Detect Bypassing ACL Policy</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Antispoofing-Detect-Bypassing-ACL-Policy/m-p/89969#M2096</link>
      <description>Possibly, but you’ve given no precise details about the configuration, the logs, etc.&lt;BR /&gt;The more precise details you can provide, the more likely we can help.&lt;BR /&gt;If you don’t want to share the details publicly, I suggest working with the TAC or your local Check Point SE.</description>
      <pubDate>Sat, 27 Jun 2020 23:32:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Antispoofing-Detect-Bypassing-ACL-Policy/m-p/89969#M2096</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-06-27T23:32:38Z</dc:date>
    </item>
  </channel>
</rss>

