<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Anti-spoofing on external interface in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Anti-spoofing-on-external-interface/m-p/83191#M11408</link>
    <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/18838"&gt;@Roy_Smith&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think it's R80.30. I could see these problems with several other gateways.&amp;nbsp;Here the TAC is also involved.&lt;/P&gt;
&lt;P&gt;1) Are your office mode addresses of IP spoofing used for internal interfaces?&amp;nbsp;This may also cause this error.&lt;/P&gt;
&lt;P&gt;2)&amp;nbsp;Is IP spoofing active for the office mode pool?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="case1.JPG" style="width: 843px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5794i53CF52283088D96F/image-size/large?v=v2&amp;amp;px=999" role="button" title="case1.JPG" alt="case1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;3) Or set don't check packets from:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="case2.JPG" style="width: 654px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5796i752DD0E9234C8999/image-size/large?v=v2&amp;amp;px=999" role="button" title="case2.JPG" alt="case2.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;Emergency solution:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;From my point of view, change to detect mode of IP spoofing on the &lt;STRONG&gt;external&lt;/STRONG&gt; interface is not very security relevant.&lt;/P&gt;
&lt;P&gt;Why! All internet IP addresses are allowed here. Private addresses 10.x.x.x, 192.168.x.x, ... are not routed in the internet.&amp;nbsp;If you now drop IP addresses from 224.0.0.0-255.255.255.254, you are reasonably safe.&amp;nbsp;But keep in mind that you have to activate certain multicast IPs (for example HSRP, VRRP,...).&amp;nbsp;But you should also allow 255.255.255.255 in individual cases.&lt;/P&gt;
&lt;P&gt;I think the solution is not nice, but you can live with it.&lt;/P&gt;
&lt;P&gt;Then you can analyze the issues.&amp;nbsp;The goal should be to enable IP spoofing again.&lt;/P&gt;</description>
    <pubDate>Sun, 26 Apr 2020 09:43:28 GMT</pubDate>
    <dc:creator>HeikoAnkenbrand</dc:creator>
    <dc:date>2020-04-26T09:43:28Z</dc:date>
    <item>
      <title>Anti-spoofing on external interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Anti-spoofing-on-external-interface/m-p/83185#M11404</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;We have a VSX cluster with a VS for Remote Access. Since our staff now work from home, there is a requirement to allow support staff to use SCCM Remote Control. This is set to connect from an office PC or server out to a Remote Access VPN user.&amp;nbsp;&lt;/P&gt;&lt;P&gt;After trying various things to get this to work, as a last resort I disabled anti-spoofing on the external interface. Once done, RC worked absolutely fine.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Leaving this makes me nervous as everything I know says to always have anti-spoofing enabled. So, does disabling it on one interface potentially open us up to more issues?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;BR /&gt;Roy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 26 Apr 2020 06:46:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Anti-spoofing-on-external-interface/m-p/83185#M11404</guid>
      <dc:creator>Roy_Smith</dc:creator>
      <dc:date>2020-04-26T06:46:25Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-spoofing on external interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Anti-spoofing-on-external-interface/m-p/83187#M11405</link>
      <description>Have you tried to add the network you need to connect to externally in the box 'Don't check packets from'?</description>
      <pubDate>Sun, 26 Apr 2020 08:14:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Anti-spoofing-on-external-interface/m-p/83187#M11405</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-04-26T08:14:08Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-spoofing on external interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Anti-spoofing-on-external-interface/m-p/83189#M11406</link>
      <description>&lt;P&gt;Maarten&lt;/P&gt;&lt;P&gt;Yes, I have tried putting the VPN subnets in the box and I also tried the internal subnets the VPN clients try to connect with no success. I have messed about with various settings in our anti-spoofing group and encryption domain, again with no success.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Roy&lt;/P&gt;</description>
      <pubDate>Sun, 26 Apr 2020 08:35:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Anti-spoofing-on-external-interface/m-p/83189#M11406</guid>
      <dc:creator>Roy_Smith</dc:creator>
      <dc:date>2020-04-26T08:35:53Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-spoofing on external interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Anti-spoofing-on-external-interface/m-p/83191#M11408</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/18838"&gt;@Roy_Smith&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think it's R80.30. I could see these problems with several other gateways.&amp;nbsp;Here the TAC is also involved.&lt;/P&gt;
&lt;P&gt;1) Are your office mode addresses of IP spoofing used for internal interfaces?&amp;nbsp;This may also cause this error.&lt;/P&gt;
&lt;P&gt;2)&amp;nbsp;Is IP spoofing active for the office mode pool?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="case1.JPG" style="width: 843px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5794i53CF52283088D96F/image-size/large?v=v2&amp;amp;px=999" role="button" title="case1.JPG" alt="case1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;3) Or set don't check packets from:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="case2.JPG" style="width: 654px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5796i752DD0E9234C8999/image-size/large?v=v2&amp;amp;px=999" role="button" title="case2.JPG" alt="case2.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;Emergency solution:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;From my point of view, change to detect mode of IP spoofing on the &lt;STRONG&gt;external&lt;/STRONG&gt; interface is not very security relevant.&lt;/P&gt;
&lt;P&gt;Why! All internet IP addresses are allowed here. Private addresses 10.x.x.x, 192.168.x.x, ... are not routed in the internet.&amp;nbsp;If you now drop IP addresses from 224.0.0.0-255.255.255.254, you are reasonably safe.&amp;nbsp;But keep in mind that you have to activate certain multicast IPs (for example HSRP, VRRP,...).&amp;nbsp;But you should also allow 255.255.255.255 in individual cases.&lt;/P&gt;
&lt;P&gt;I think the solution is not nice, but you can live with it.&lt;/P&gt;
&lt;P&gt;Then you can analyze the issues.&amp;nbsp;The goal should be to enable IP spoofing again.&lt;/P&gt;</description>
      <pubDate>Sun, 26 Apr 2020 09:43:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Anti-spoofing-on-external-interface/m-p/83191#M11408</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-04-26T09:43:28Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-spoofing on external interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Anti-spoofing-on-external-interface/m-p/83338#M11409</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21670"&gt;@HeikoAnkenbrand&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your screenshots helped a lot. It turned out that "Perform anti-spoofing on Office Mode addresses" was enabled. I disabled this and re-enabled "Perform anti-spoofing" on the interface and everything works as we want.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Much happier situation now with anti-spoofing enabled again&lt;/P&gt;&lt;P&gt;Thanks for the help&lt;BR /&gt;Roy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Apr 2020 13:48:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Anti-spoofing-on-external-interface/m-p/83338#M11409</guid>
      <dc:creator>Roy_Smith</dc:creator>
      <dc:date>2020-04-27T13:48:53Z</dc:date>
    </item>
  </channel>
</rss>

