<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: route based VPN antispoofing in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/route-based-VPN-antispoofing/m-p/204477#M38571</link>
    <description>&lt;P&gt;No route loops, nothing of interest on LAN7, but ESP traffic. For some reason it is UDP encapsulated (with no NAT applied).&lt;/P&gt;</description>
    <pubDate>Tue, 30 Jan 2024 01:16:37 GMT</pubDate>
    <dc:creator>AlexandruD</dc:creator>
    <dc:date>2024-01-30T01:16:37Z</dc:date>
    <item>
      <title>route based VPN antispoofing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/route-based-VPN-antispoofing/m-p/204467#M38563</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have the following issue caused by the antispoofing mehcanism. (SMS is R81.20, SMB GWs are R81.10.08)&lt;/P&gt;&lt;P&gt;Two IPsec VPN peers (centrally managed SMB appliances) are connected via route based VPN, over an MPLS interconnection between the two.&lt;BR /&gt;The only routes associated with the MPLS connected interfaces (LAN7 on both peers), are the needed static routes in order for the peers to reach each other over the MPLS interconnection. The first peer's relevant VTI is vpnt3, and the second one's is vpnt2.&lt;BR /&gt;The logs show the following behavior, where the second peer is blocking icmp ping requests packets send by the first peer (source and destination IP addresses are of other internal interfaces of the peers):&lt;/P&gt;&lt;P&gt;origin is first peer - VPN blade - Encrypt action - vpnt3 outoging - src 172.17.0.1 - dst 172.18.0.1 - specific rule id matched&lt;BR /&gt;origin is second peer - VPN blade - Decrypt action - vpnt2 incoming - src 172.17.0.1 - dst 172.18.0.1 - specific rule id matched&lt;BR /&gt;origin is second peer - Firewall blade - Drop action - LAN7 incoming - src 172.17.0.1 - dst 172.18.0.1 - message info "Address spoofing"&lt;/P&gt;&lt;P&gt;On both peers, antispoofing is configured to be calculated by the gateway, based on its routing table. Routes to direct traffic via the route based VPN are generated via OSPF, which is running on the VTI interfaces inbetween the peers.&lt;BR /&gt;Now, I would disable antispoofing all toghether, as I find it unnecessary and annoying, the way it's performed by CP, but the resultant warning messages are just as annoying.&lt;/P&gt;&lt;P&gt;Does anyone know a solution for this, or perhaps knows hwo to disable antispoofing and the warning messages as well?&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 21:04:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/route-based-VPN-antispoofing/m-p/204467#M38563</guid>
      <dc:creator>AlexandruD</dc:creator>
      <dc:date>2024-01-29T21:04:55Z</dc:date>
    </item>
    <item>
      <title>Re: route based VPN antispoofing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/route-based-VPN-antispoofing/m-p/204469#M38564</link>
      <description>&lt;P&gt;Sounds like you have a routing loop. Traffic decrypted from a route-based VPN only shows up on the VTI. It never arrives on any real Ethernet interface. The ARM boxes definitely have some different behaviors, but I wouldn't expect this to be one of them. I would run a packet capture on LAN7 to see what's going on.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 22:41:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/route-based-VPN-antispoofing/m-p/204469#M38564</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2024-01-29T22:41:39Z</dc:date>
    </item>
    <item>
      <title>Re: route based VPN antispoofing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/route-based-VPN-antispoofing/m-p/204473#M38567</link>
      <description>&lt;P&gt;I agree with Bob here, just run captures and have a look. Can you send a screenshot of the topology? Please blur out any sensitive info.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 23:52:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/route-based-VPN-antispoofing/m-p/204473#M38567</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-01-29T23:52:06Z</dc:date>
    </item>
    <item>
      <title>Re: route based VPN antispoofing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/route-based-VPN-antispoofing/m-p/204477#M38571</link>
      <description>&lt;P&gt;No route loops, nothing of interest on LAN7, but ESP traffic. For some reason it is UDP encapsulated (with no NAT applied).&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 01:16:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/route-based-VPN-antispoofing/m-p/204477#M38571</guid>
      <dc:creator>AlexandruD</dc:creator>
      <dc:date>2024-01-30T01:16:37Z</dc:date>
    </item>
    <item>
      <title>Re: route based VPN antispoofing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/route-based-VPN-antispoofing/m-p/204478#M38572</link>
      <description>&lt;P&gt;Have a look at below, see if its helpful&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk115276" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk115276&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 01:57:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/route-based-VPN-antispoofing/m-p/204478#M38572</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-01-30T01:57:51Z</dc:date>
    </item>
    <item>
      <title>Re: route based VPN antispoofing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/route-based-VPN-antispoofing/m-p/204621#M38587</link>
      <description>&lt;P&gt;Thanks! But I'v checked and found no issues.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 07:17:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/route-based-VPN-antispoofing/m-p/204621#M38587</guid>
      <dc:creator>AlexandruD</dc:creator>
      <dc:date>2024-01-31T07:17:30Z</dc:date>
    </item>
  </channel>
</rss>

