<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: not so asymmetric traffic in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/not-so-asymmetric-traffic/m-p/151729#M24932</link>
    <description>&lt;P&gt;As long as the firewall is receiving both the c2s and s2c flow of packets and antispoofing is not violated, traffic coming back on a different interface than it left on will work to my knowledge.&amp;nbsp; If one of the flows is bypassing the firewall completely that will not work.&lt;/P&gt;</description>
    <pubDate>Fri, 24 Jun 2022 19:28:41 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2022-06-24T19:28:41Z</dc:date>
    <item>
      <title>not so asymmetric traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/not-so-asymmetric-traffic/m-p/151499#M24817</link>
      <description>&lt;P&gt;Assuming that anti spoofing is disabled, is there any issue&amp;nbsp; if&amp;nbsp; the gateways routes traffic towards a physical interfaces and the response returns to the same firewall on a different interface?&lt;BR /&gt;I am planning a migration and I could be in this scenario for a few minutes.&amp;nbsp;&lt;BR /&gt;I was wondering if any security feature could be sensitive to this scenario or the gateway will just process the traffic.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 15:03:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/not-so-asymmetric-traffic/m-p/151499#M24817</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2022-06-22T15:03:52Z</dc:date>
    </item>
    <item>
      <title>Re: not so asymmetric traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/not-so-asymmetric-traffic/m-p/151512#M24822</link>
      <description>&lt;P&gt;I do not think that you will experience any issues besides warnings and all existing sessions being dropped until reconnected.&lt;/P&gt;
&lt;P&gt;The only caveat is if you are using Zones and if both interfaces expected to carry asymmetric traffic are the members of the same zone.&lt;/P&gt;
&lt;P&gt;Are you planning to disable anti-spoofing globally or in select interfaces' properties?&lt;/P&gt;
&lt;P&gt;Better to get a second opinion here before trying though...&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 16:00:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/not-so-asymmetric-traffic/m-p/151512#M24822</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2022-06-22T16:00:41Z</dc:date>
    </item>
    <item>
      <title>Re: not so asymmetric traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/not-so-asymmetric-traffic/m-p/151518#M24824</link>
      <description>&lt;P&gt;SecureXL will put the initial ingress/egress interfaces in the forwarding table and use that for all packets on the connection.&lt;BR /&gt;Not exactly sure what would happen if it receives a packet on the wrong interface.&lt;BR /&gt;I would test this in the lab to confirm it doesn't break anything.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 19:02:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/not-so-asymmetric-traffic/m-p/151518#M24824</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-06-22T19:02:42Z</dc:date>
    </item>
    <item>
      <title>Re: not so asymmetric traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/not-so-asymmetric-traffic/m-p/151729#M24932</link>
      <description>&lt;P&gt;As long as the firewall is receiving both the c2s and s2c flow of packets and antispoofing is not violated, traffic coming back on a different interface than it left on will work to my knowledge.&amp;nbsp; If one of the flows is bypassing the firewall completely that will not work.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 19:28:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/not-so-asymmetric-traffic/m-p/151729#M24932</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-06-24T19:28:41Z</dc:date>
    </item>
    <item>
      <title>Re: not so asymmetric traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/not-so-asymmetric-traffic/m-p/152326#M25388</link>
      <description>&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jul 2022 10:38:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/not-so-asymmetric-traffic/m-p/152326#M25388</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2022-07-05T10:38:24Z</dc:date>
    </item>
  </channel>
</rss>

