<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IP spoofing for just one IP Address in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/227001#M43646</link>
    <description>&lt;P&gt;Is it the ingress or egress interface that the spoofing message is occurring on?&lt;BR /&gt;That will determine where we need to adjust anti-spoofing settings.&lt;/P&gt;</description>
    <pubDate>Tue, 17 Sep 2024 21:04:50 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2024-09-17T21:04:50Z</dc:date>
    <item>
      <title>IP spoofing for just one IP Address</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/226722#M43569</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;We are facing this weird situation. On the internal interface of our firewall we have configured antispoofing so that all 10.0.0.0/8 is coming from this interface, Since we have other DMZs on this firewall that have an IP address in the 10.x.x.x. form, we have excluded some (not all) of the DMZ subnets from the antispoofing mechanism of the internal interface (action: prevent and log)&lt;/P&gt;&lt;P&gt;My question is why aren't we getting drops for the packets that belong to the "not excluded" subnets? Out of the blue we saw drops from a DMZ IP towards a specific destination situated in the internal LAN. Traffic from the same IP to other stuff in the internal LAN is passing without any problems! Traffic from other IPs in the DMZ subnet towards the exact same destination is passing without problems!&amp;nbsp;&lt;/P&gt;&lt;P&gt;To sum it up:&lt;/P&gt;&lt;P&gt;Internal: 10.0.0.0/8&lt;/P&gt;&lt;P&gt;DMZ: 10.1.1.0/24 not excluded from the anitspoofing mechanism on internal:&lt;/P&gt;&lt;P&gt;Destination: 10.2.2.2 , 10.3.3.3 (internal subnets)&lt;/P&gt;&lt;P&gt;Src: 10.1.1.1 --&amp;gt; 10.2.2.2 , 10.3.3.3 ok&lt;/P&gt;&lt;P&gt;Src: 10.1.1.2 --&amp;gt; 10.2.2.2 NOT ok (message on log: spoofing address)&lt;/P&gt;&lt;P&gt;Src: 10.1.1.2 --&amp;gt; 10.3.3.3 ok&lt;/P&gt;&lt;P&gt;Any insight will be highly appreciated!&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 09:52:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/226722#M43569</guid>
      <dc:creator>kadar2</dc:creator>
      <dc:date>2024-09-16T09:52:34Z</dc:date>
    </item>
    <item>
      <title>Re: IP spoofing for just one IP Address</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/226772#M43583</link>
      <description>&lt;P&gt;Please post the results from this one-liner, being sure to redact any Internet-routable outside addresses:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/One-liner-for-Address-Spoofing-Troubleshooting/m-p/33204" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/One-liner-for-Address-Spoofing-Troubleshooting/m-p/33204&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 12:44:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/226772#M43583</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-09-16T12:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: IP spoofing for just one IP Address</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/226880#M43618</link>
      <description>&lt;P&gt;Hi Timothy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Attached is the output for the related interfaces (DMZ and internal).&lt;/P&gt;&lt;P&gt;For one IP address from 10.20.32.0/18 subnet I get an antispoofing message when the destination address is in 10.0.0.0/8 subnet. All other IP addresses from 10.20.32.0/18 can access the same destination without any problems.&lt;/P&gt;&lt;P&gt;So the questions are:&lt;/P&gt;&lt;P&gt;Should 10.20.32.0/18 be excluded from the interfaces to be spoofed in the internal zone?&lt;/P&gt;&lt;P&gt;Why is just one IP address shown as spoofed? Could this be related to a setting on the specific PC?&lt;/P&gt;&lt;P&gt;Thank you in advance,&lt;/P&gt;&lt;P&gt;Katerina&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2024 06:55:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/226880#M43618</guid>
      <dc:creator>kadar2</dc:creator>
      <dc:date>2024-09-17T06:55:04Z</dc:date>
    </item>
    <item>
      <title>Re: IP spoofing for just one IP Address</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/227001#M43646</link>
      <description>&lt;P&gt;Is it the ingress or egress interface that the spoofing message is occurring on?&lt;BR /&gt;That will determine where we need to adjust anti-spoofing settings.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2024 21:04:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/227001#M43646</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-09-17T21:04:50Z</dc:date>
    </item>
    <item>
      <title>Re: IP spoofing for just one IP Address</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/227034#M43652</link>
      <description>&lt;P&gt;What you are stating is really interesting, because the interface on which the message is occuring should not be in the path at all!!!!&lt;/P&gt;&lt;P&gt;I will further look into that!&lt;/P&gt;&lt;P&gt;What I don't understand is if directly connected interfaces of the firewall should also be excluded from the spoofing checks on the interface connecting to the internal LAN. It confuses me, since we have excluded some, but not all DMZ directly connected subnets, and everything is working fine.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2024 06:44:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/227034#M43652</guid>
      <dc:creator>kadar2</dc:creator>
      <dc:date>2024-09-18T06:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: IP spoofing for just one IP Address</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/227088#M43673</link>
      <description>&lt;P&gt;Each packet is checked for anti-spoofing twice (in ingress interface and egress interface).&lt;BR /&gt;Knowing where it came from is, therefore, a critical part of resolving the issue.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2024 13:48:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/227088#M43673</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-09-18T13:48:48Z</dc:date>
    </item>
    <item>
      <title>Re: IP spoofing for just one IP Address</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/227112#M43675</link>
      <description>&lt;P&gt;See if this sk helps.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk115276" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk115276&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Also, here is important point about anti-spoofing options.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/SmartConsole_OLH/EN/Topics-OLH/ZvkmnUK_XluBBIIAw1mF3A2.htm?cshid=ZvkmnUK_XluBBIIAw1mF3A2" target="_blank"&gt;Interface - Topology Settings (checkpoint.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;An interface can be defined as being External (leading to the Internet) or Internal (leading to the LAN).&lt;/P&gt;
&lt;P&gt;The type of network that the interface&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Leads To&lt;/SPAN&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;Internet (External)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;This Network (Internal)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- This is the default setting. It is automatically calculated from the topology of the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_gw variable"&gt;gateway&lt;/SPAN&gt;. To update the topology of an internal network after changes to static routes, click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Network Management&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Get Interfaces&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;General Properties&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;window of the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_gw variable"&gt;gateway&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;Override&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- Override the default setting.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Override&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;the default setting:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;Internet (External)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- All external/Internet addresses&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;This Network (Internal)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;-&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;Not Defined&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- All IP addresses behind this interface are considered a part of the internal network that connects to this interface&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;Network defined by the interface IP and Net Mask&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- Only the network that directly connects to this internal interface&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="Menu_Options"&gt;Network defined by routes&lt;/SPAN&gt;&amp;nbsp;- The&amp;nbsp;&lt;SPAN class="mc-variable Vars_Other.tp_gw variable"&gt;gateway&lt;/SPAN&gt;&amp;nbsp;dynamically calculates the topology behind this interface. If the network changes, there is no need to click "Get Interfaces" and install a policy.&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;Specific&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- A specific network object (a network, a host, an address range, or a network group) behind this internal interface&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;Interface leads to DMZ&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- The DMZ that directly connects to this internal interface&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;VPN Tunnel Interfaces&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If the interface is part of a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="MCTextPopup MCTextPopupHotSpot MCTextPopupHotSpot_ #text MCTextPopup_Closed" role="button" href="https://sc1.checkpoint.com/documents/R81.20/SmartConsole_OLH/EN/Topics-OLH/ZvkmnUK_XluBBIIAw1mF3A2.htm?cshid=ZvkmnUK_XluBBIIAw1mF3A2#" data-mc-state="closed" data-aria-describedby="bc6cfd1d-0a9e-406c-83f8-8d2b01036cc4" target="_blank"&gt;VPN Tunnel&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="the_rock_0-1726674511411.gif" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27677i4F28E2FFAD92BCC6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="the_rock_0-1726674511411.gif" alt="the_rock_0-1726674511411.gif" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;, then the interface&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Leads To&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Point to Point&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;network. The interface is one end of the point to point connection. All traffic in the network behind the interface is part of the point to point connection. Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Override&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to define a specific network.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2024 15:48:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/227112#M43675</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-09-18T15:48:46Z</dc:date>
    </item>
    <item>
      <title>Re: IP spoofing for just one IP Address</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/227164#M43683</link>
      <description>&lt;P&gt;Thanks for the info.&lt;/P&gt;&lt;P&gt;Your questions helped me clarify the issue.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2024 08:11:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/227164#M43683</guid>
      <dc:creator>kadar2</dc:creator>
      <dc:date>2024-09-19T08:11:51Z</dc:date>
    </item>
    <item>
      <title>Re: IP spoofing for just one IP Address</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/227247#M43695</link>
      <description>&lt;P&gt;Did you find the source of the issue?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2024 14:33:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/227247#M43695</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-09-19T14:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: IP spoofing for just one IP Address</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/227712#M43802</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;It seems that the issue was within the laptop itself, so we have arranged for a fresh installation of operating system and applications. Nothing could be found on the network side or on the Firewall.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 09:08:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IP-spoofing-for-just-one-IP-Address/m-p/227712#M43802</guid>
      <dc:creator>kadar2</dc:creator>
      <dc:date>2024-09-24T09:08:40Z</dc:date>
    </item>
  </channel>
</rss>

