<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Local interface address spoofing in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Local-interface-address-spoofing/m-p/92438#M2162</link>
    <description>&lt;P&gt;See:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115276" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115276&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 25 Jul 2020 04:55:58 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2020-07-25T04:55:58Z</dc:date>
    <item>
      <title>Local interface address spoofing</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Local-interface-address-spoofing/m-p/92381#M2161</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We ve got an issue with "Local interface address spoofing" on a Cloudguard GW.&lt;/P&gt;&lt;P&gt;We're running a Monitoring Solution which sends ping and snmp requests to Cloudguard Management Network.&lt;BR /&gt;This issue occors only for the GW which resides on the same ESXi Host where the Monitoring Solution is running. Other Cloudguard GWs can be reached without any issue. If the monitoring solution is migrated to a different ESXi Host the problem also occures on the new ESXi Host. In fw monitor I can see that traffic is hitting eth2 interface which it shouldn't. We're on the latest Patchlevel for Cloudguard on NSX-V.&lt;/P&gt;&lt;P&gt;I found sk105899, but im not sure if it's applicable.&lt;/P&gt;&lt;P&gt;How can we fix this?&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jul 2020 11:39:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Local-interface-address-spoofing/m-p/92381#M2161</guid>
      <dc:creator>Matthias_Honold</dc:creator>
      <dc:date>2020-07-24T11:39:55Z</dc:date>
    </item>
    <item>
      <title>Re: Local interface address spoofing</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Local-interface-address-spoofing/m-p/92438#M2162</link>
      <description>&lt;P&gt;See:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115276" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115276&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jul 2020 04:55:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Local-interface-address-spoofing/m-p/92438#M2162</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-07-25T04:55:58Z</dc:date>
    </item>
    <item>
      <title>Re: Local interface address spoofing</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Local-interface-address-spoofing/m-p/92782#M2163</link>
      <description>&lt;P&gt;There are no dublicate IPs, no Hubs. Could it be a routing issue in NSX-V?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Monitoring VM: 10.20.10.1&lt;/P&gt;&lt;P&gt;Cloudguard GW: 10.10.10.1&lt;/P&gt;&lt;P&gt;Traffic hits eth2 which hasn't an IP assigned&lt;/P&gt;&lt;P&gt;[Expert@serviceinstance-2-xyz123:0]# fw monitor -e 'accept (src=10.10.10.1 and dst=10.20.10.1) or (src=10.20.10.1 and dst=10.10.10.1);' -m iO&lt;BR /&gt;monitor: getting filter (from command line)&lt;BR /&gt;monitor: compiling&lt;BR /&gt;monitorfilter:&lt;BR /&gt;Compiled OK.&lt;BR /&gt;monitor: loading&lt;BR /&gt;monitor: monitoring (control-C to stop)&lt;/P&gt;&lt;P&gt;[vs_0][fw_0] eth2:x[51]: 10.20.10.1 -&amp;gt; 10.10.10.1 (ICMP) len=51 id=9526&lt;BR /&gt;ICMP: type=8 code=0 echo request id=583 seq=25661&lt;BR /&gt;[vs_0][fw_0] eth2:i[51]: 10.20.10.1 -&amp;gt; 10.10.10.1 (ICMP) len=51 id=9526&lt;BR /&gt;ICMP: type=8 code=0 echo request id=583 seq=25661&lt;BR /&gt;[vs_0][fw_0] eth2:O[51]: 10.20.10.1 -&amp;gt; 10.10.10.1 (ICMP) len=51 id=9526&lt;BR /&gt;ICMP: type=8 code=0 echo request id=583 seq=25661&lt;BR /&gt;[vs_0][fw_0] eth2:X[51]: 10.20.10.1 -&amp;gt; 10.10.10.1 (ICMP) len=51 id=9526&lt;BR /&gt;ICMP: type=8 code=0 echo request id=583 seq=25661&lt;BR /&gt;[vs_0][fw_0] eth0:x[51]: 10.20.10.1 -&amp;gt; 10.10.10.1 (ICMP) len=51 id=9526&lt;BR /&gt;ICMP: type=8 code=0 echo request id=583 seq=25661&lt;BR /&gt;[vs_0][fw_0] eth0:i[51]: 10.20.10.1 -&amp;gt; 10.10.10.1 (ICMP) len=51 id=9526&lt;BR /&gt;ICMP: type=8 code=0 echo request id=583 seq=25661&lt;/P&gt;&lt;P&gt;[Expert@serviceinstance-2-xyz123:0]# ip addr&lt;BR /&gt;1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 16436 qdisc noqueue&lt;BR /&gt;link/loopback 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff&lt;BR /&gt;inet 127.0.0.1/8 brd 127.255.255.255 scope host lo&lt;BR /&gt;2: eth0: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast qlen 1000&lt;BR /&gt;link/ether 00:50:56:b1:fb:de brd ff:ff:ff:ff:ff:ff&lt;BR /&gt;inet 10.10.10.1/24 brd 10.129.34.255 scope global eth0&lt;BR /&gt;3: eth1: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop qlen 1000&lt;BR /&gt;link/ether 00:50:56:b1:f7:b1 brd ff:ff:ff:ff:ff:ff&lt;BR /&gt;4: eth2: &amp;lt;NO-CARRIER,BROADCAST,MULTICAST,UP&amp;gt; mtu 1500 qdisc pfifo_fast qlen 1000&lt;BR /&gt;link/ether 00:50:56:b1:1a:49 brd ff:ff:ff:ff:ff:ff&lt;BR /&gt;5: br1: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc noqueue&lt;BR /&gt;link/ether 00:50:56:b1:1a:49 brd ff:ff:ff:ff:ff:ff&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jul 2020 16:52:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Local-interface-address-spoofing/m-p/92782#M2163</guid>
      <dc:creator>Matthias_Honold</dc:creator>
      <dc:date>2020-07-29T16:52:30Z</dc:date>
    </item>
  </channel>
</rss>

