<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Checkpoint anti-spoof and state inspection in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-anti-spoof-and-state-inspection/m-p/159970#M28151</link>
    <description>&lt;P&gt;Assuming it is not manually disabled, anti-spoofing is always checked for all inbound packets regardless of connection state against whatever the anti-spoofing configuration is calling for on the inbound interface.&amp;nbsp; This next fact is not well known, but anti-spoofing is also applied against all traffic on the outbound interface by checking the routing table to make sure traffic is leaving the right way.&amp;nbsp; It is likely that at some point in the upgrade (SIC reestablishment maybe) a "Get Interfaces with Topology" happened, possibly before the firewall's Gaia OS routing table was fully or correctly populated, which this operation relies on heavily.&lt;/P&gt;
&lt;P&gt;Fortunately since you are running R80.20+ your anti-spoofing configuration will be quite simple going forward:&lt;/P&gt;
&lt;P&gt;1) On all interfaces defined as Internal, set the new "Network defined by routes" option.&amp;nbsp; No need to define byzantine groups of "specific" networks that will inevitably get screwed up at a future date leading to massive anti-spoofing drops of traffic.&lt;/P&gt;
&lt;P&gt;2) Make sure your external interface is properly set&lt;/P&gt;
&lt;P&gt;That's it.&amp;nbsp; If you are still experiencing anti-spoofing drops in the logs at that point, your routing table in the Gaia OS on the firewall is incorrect.&amp;nbsp; Period.&amp;nbsp; Full stop.&lt;/P&gt;</description>
    <pubDate>Wed, 19 Oct 2022 14:12:26 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2022-10-19T14:12:26Z</dc:date>
    <item>
      <title>Checkpoint anti-spoof and state inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-anti-spoof-and-state-inspection/m-p/159760#M28062</link>
      <description>&lt;P&gt;Hello expert&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Recently we noticed an issue in our network.&lt;/P&gt;&lt;P&gt;The communication between client and server cross 2 firewalls. I can see by log and packet capture TCP syn from client pass through and reach&amp;nbsp; server and server responded.&lt;/P&gt;&lt;P&gt;But server response TCP SYNACK dropped by first firewall anti spoofing module. (This looks like just triggered by recently upgrade from version 80.10 to 81.10) This raise a interesting discussion within our team. What is the process sequence of difference inspection module?&lt;/P&gt;&lt;P&gt;Here is my understanding, please correct me if I am wrong.&lt;/P&gt;&lt;P&gt;1, for the first packet&lt;/P&gt;&lt;P&gt;anti spoof first then access rules and hold state of connection, wait for syn ack&lt;/P&gt;&lt;P&gt;2, for the ack&lt;/P&gt;&lt;P&gt;Don't know how firewall handle this one&lt;/P&gt;&lt;P&gt;3, for the following traffic&lt;/P&gt;&lt;P&gt;Check session table first, if session is there, it bypass all other modules. Otherwise follow 1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you please share some insight about this?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;</description>
      <pubDate>Mon, 17 Oct 2022 19:51:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-anti-spoof-and-state-inspection/m-p/159760#M28062</guid>
      <dc:creator>FrankXie</dc:creator>
      <dc:date>2022-10-17T19:51:35Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint anti-spoof and state inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-anti-spoof-and-state-inspection/m-p/159772#M28063</link>
      <description>&lt;P&gt;It would be similar, all packets must pass through anti-spoofing before we check for state etc. So in this case it seems like you need to check the anti-spoofing settings on the interface receiving the SYN-ACK.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 05:12:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-anti-spoof-and-state-inspection/m-p/159772#M28063</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2022-10-18T05:12:03Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint anti-spoof and state inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-anti-spoof-and-state-inspection/m-p/159784#M28070</link>
      <description>&lt;P&gt;Check that you do not have an asymmetric routing situation after an upgrade.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 07:54:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-anti-spoof-and-state-inspection/m-p/159784#M28070</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-10-18T07:54:54Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint anti-spoof and state inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-anti-spoof-and-state-inspection/m-p/159896#M28122</link>
      <description>&lt;P&gt;Asymmetric usually dropped by checking session state with message like first packet not syn.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 21:37:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-anti-spoof-and-state-inspection/m-p/159896#M28122</guid>
      <dc:creator>FrankXie</dc:creator>
      <dc:date>2022-10-18T21:37:48Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint anti-spoof and state inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-anti-spoof-and-state-inspection/m-p/159897#M28123</link>
      <description>&lt;P&gt;Though I think once session established, there's not necessary to check anti spoofing anymore.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This only happens after upgrading, looks like behavior a little inconsistent between different version. (We have another dc with old version still running without problem.)&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 21:40:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-anti-spoof-and-state-inspection/m-p/159897#M28123</guid>
      <dc:creator>FrankXie</dc:creator>
      <dc:date>2022-10-18T21:40:36Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint anti-spoof and state inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-anti-spoof-and-state-inspection/m-p/159905#M28125</link>
      <description>&lt;P&gt;If the SYN-ACK is being dropped, the session is not establishing. Pretty sure anti-spoofing is always checked, but given that packets have to pass both ways before a session can come up it already has to have been accepted both ways before the session is in the table anyway.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2022 02:46:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-anti-spoof-and-state-inspection/m-p/159905#M28125</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2022-10-19T02:46:39Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint anti-spoof and state inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-anti-spoof-and-state-inspection/m-p/159970#M28151</link>
      <description>&lt;P&gt;Assuming it is not manually disabled, anti-spoofing is always checked for all inbound packets regardless of connection state against whatever the anti-spoofing configuration is calling for on the inbound interface.&amp;nbsp; This next fact is not well known, but anti-spoofing is also applied against all traffic on the outbound interface by checking the routing table to make sure traffic is leaving the right way.&amp;nbsp; It is likely that at some point in the upgrade (SIC reestablishment maybe) a "Get Interfaces with Topology" happened, possibly before the firewall's Gaia OS routing table was fully or correctly populated, which this operation relies on heavily.&lt;/P&gt;
&lt;P&gt;Fortunately since you are running R80.20+ your anti-spoofing configuration will be quite simple going forward:&lt;/P&gt;
&lt;P&gt;1) On all interfaces defined as Internal, set the new "Network defined by routes" option.&amp;nbsp; No need to define byzantine groups of "specific" networks that will inevitably get screwed up at a future date leading to massive anti-spoofing drops of traffic.&lt;/P&gt;
&lt;P&gt;2) Make sure your external interface is properly set&lt;/P&gt;
&lt;P&gt;That's it.&amp;nbsp; If you are still experiencing anti-spoofing drops in the logs at that point, your routing table in the Gaia OS on the firewall is incorrect.&amp;nbsp; Period.&amp;nbsp; Full stop.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2022 14:12:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-anti-spoof-and-state-inspection/m-p/159970#M28151</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-10-19T14:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint anti-spoof and state inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-anti-spoof-and-state-inspection/m-p/159993#M28155</link>
      <description>&lt;P&gt;Thanks Tim&lt;/P&gt;&lt;P&gt;Yes I am new to Checkpoint.&amp;nbsp; That's all make sense. We do have specific group, maybe we change it to follow your suggestion.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2022 19:28:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-anti-spoof-and-state-inspection/m-p/159993#M28155</guid>
      <dc:creator>FrankXie</dc:creator>
      <dc:date>2022-10-19T19:28:38Z</dc:date>
    </item>
  </channel>
</rss>

