<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ICMP drop with alert in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ICMP-drop-with-alert/m-p/142745#M22125</link>
    <description>&lt;P&gt;How does the NIC anti-spoofing looks?&lt;/P&gt;</description>
    <pubDate>Wed, 02 Mar 2022 07:55:17 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2022-03-02T07:55:17Z</dc:date>
    <item>
      <title>ICMP drop with alert</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ICMP-drop-with-alert/m-p/142741#M22124</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;Issue: Gateway interface is dropped ICMP with the message Local interface address spoofing.&lt;BR /&gt;Gateway Versio: R80.30 in a standalone setup&lt;/P&gt;&lt;P&gt;Referred Article:&lt;/P&gt;&lt;P&gt;sk115276&lt;BR /&gt;sk106625&lt;BR /&gt;sk107082&lt;/P&gt;&lt;P&gt;As per this article, everything seems fine.&lt;/P&gt;&lt;P&gt;--&amp;gt;Eth2-08 (10.10.1.2) interface is directly connected with the MPLS router (10.10.1.1)&lt;BR /&gt;--&amp;gt;Verified the route on Checkpoint seems fine.&lt;BR /&gt;--&amp;gt;Tried to disable the ping on the router but still, we are able to see the below drop due to this there is a High CPU.&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;--&amp;gt;Find the attached log.&lt;/P&gt;&lt;P&gt;Kindly suggest resolving this issue.&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Vinodhini&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 07:33:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ICMP-drop-with-alert/m-p/142741#M22124</guid>
      <dc:creator>Shira</dc:creator>
      <dc:date>2022-03-02T07:33:50Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP drop with alert</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ICMP-drop-with-alert/m-p/142745#M22125</link>
      <description>&lt;P&gt;How does the NIC anti-spoofing looks?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 07:55:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ICMP-drop-with-alert/m-p/142745#M22125</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-03-02T07:55:17Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP drop with alert</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ICMP-drop-with-alert/m-p/142749#M22126</link>
      <description>&lt;P&gt;It is detect and log&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 08:17:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ICMP-drop-with-alert/m-p/142749#M22126</guid>
      <dc:creator>Shira</dc:creator>
      <dc:date>2022-03-02T08:17:03Z</dc:date>
    </item>
  </channel>
</rss>

