<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: strange address spoofing on standby firewall in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/strange-address-spoofing-on-standby-firewall/m-p/124369#M17940</link>
    <description>&lt;P&gt;If whatever is sending the spoofed traffic is using the MAC address of the backup gateway, then the backup will drop and log the traffic.&lt;BR /&gt;You’d have to take some packet captures on the gateway to determine if this is happening.&lt;/P&gt;</description>
    <pubDate>Mon, 19 Jul 2021 19:58:11 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2021-07-19T19:58:11Z</dc:date>
    <item>
      <title>strange address spoofing on standby firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/strange-address-spoofing-on-standby-firewall/m-p/124325#M17921</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please I need an explanation to a behavior noticed when we are having address spoofing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a cluster of 2 firewalls in HA mode (active/standby).&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is a traffic that is dropped because of address spoofing, the strange think is that the spoofed traffic is passing through the standby firewall instead of the active one.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it normal? If yes, why is it not the active firewall that should drop a spoofed traffic?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance for your help.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jul 2021 14:03:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/strange-address-spoofing-on-standby-firewall/m-p/124325#M17921</guid>
      <dc:creator>prisciltetchou1</dc:creator>
      <dc:date>2021-07-19T14:03:41Z</dc:date>
    </item>
    <item>
      <title>Re: strange address spoofing on standby firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/strange-address-spoofing-on-standby-firewall/m-p/124369#M17940</link>
      <description>&lt;P&gt;If whatever is sending the spoofed traffic is using the MAC address of the backup gateway, then the backup will drop and log the traffic.&lt;BR /&gt;You’d have to take some packet captures on the gateway to determine if this is happening.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jul 2021 19:58:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/strange-address-spoofing-on-standby-firewall/m-p/124369#M17940</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-07-19T19:58:11Z</dc:date>
    </item>
    <item>
      <title>Re: strange address spoofing on standby firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/strange-address-spoofing-on-standby-firewall/m-p/124388#M17945</link>
      <description>&lt;P&gt;Phoneboy is correct. Do some packet captures and figure out why this might be happening...is HA status if you run cphaprob state showing correct state on both members? Can you attach screenshots showing the actual drop and how thats configured in topology in dashboard (you can blur out the IP addresses).&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jul 2021 02:05:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/strange-address-spoofing-on-standby-firewall/m-p/124388#M17945</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-07-20T02:05:33Z</dc:date>
    </item>
    <item>
      <title>Re: strange address spoofing on standby firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/strange-address-spoofing-on-standby-firewall/m-p/124447#M17953</link>
      <description>&lt;P&gt;Specifically use the -e option for &lt;STRONG&gt;tcpdump&lt;/STRONG&gt; or -D option for &lt;STRONG&gt;cppcap&lt;/STRONG&gt; which will show you the Layer 2 MAC addresses; these options are covered in my Max Capture course.&amp;nbsp; You will need to look at the source MAC address to see where the spoofed packet is coming from, and may need to trace it back through your switching/routing infrastructure to see where it is actually originating.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jul 2021 13:51:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/strange-address-spoofing-on-standby-firewall/m-p/124447#M17953</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-07-20T13:51:46Z</dc:date>
    </item>
  </channel>
</rss>

