<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to disable local anti-spoofing in R81.20 (cluster with bridged interfaces)? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236553#M45877</link>
    <description>&lt;P&gt;What do you get when you run ip r g 8.8.8.8?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Sat, 21 Dec 2024 01:23:27 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2024-12-21T01:23:27Z</dc:date>
    <item>
      <title>How to disable local anti-spoofing in R81.20 (cluster with bridged interfaces)?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236529#M45873</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We have a ClusterXL (R81.20 JHF76) with bridged interfaces. This cluster is managed through the bridge. Basically, this design is mentioned in &lt;A href="https://sc1.checkpoint.com/documents/R77/CP_R77_SecurityGatewayTech_WebAdmin/96332.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R77/CP_R77_SecurityGatewayTech_WebAdmin/96332.htm&lt;/A&gt;&lt;BR /&gt;(section “Management over Bridge”)&lt;/P&gt;&lt;P&gt;While it's reachable from the management station, the cluster itself can not reach anything because of the "local anti-spoofing".&lt;/P&gt;&lt;P&gt;For example, this is "ping 1.1.1.1":&lt;/P&gt;&lt;P&gt;@;6007031.309;[kern];[tid_0];[SIM4];sim_pkt_send_drop_notification: (0,0) received drop, reason: Local Spoofing (12), conn: &amp;lt;10.1.9.114,10405,1.1.1.1,0,1&amp;gt;;&lt;BR /&gt;@;6007031.310;[kern];[tid_0];[SIM4];sim_pkt_send_drop_notification: sending packet dropped notification drop mode: 0 debug mode: 1 send as is: 0 track_lvl: 2, conn: &amp;lt;10.1.9.114,10405,1.1.1.1,0,1&amp;gt;;&lt;BR /&gt;@;6007031.311;[kern];[tid_0];[SIM4];sim_pkt_send_drop_notification: sending single drop notification, conn: &amp;lt;10.1.9.114,10405,1.1.1.1,0,1&amp;gt;;&lt;BR /&gt;@;6007054.312;[kern];[tid_0];[SIM4];pkt_handle_no_match: drop packet due to local spoofing, conn: &amp;lt;10.1.9.114,10405,1.1.1.1,0,1&amp;gt;;&lt;BR /&gt;@;6007054.313;[kern];[tid_0];[SIM4];do_packet_finish: SIMPKT_IN_DROP vsid=0, conn:&amp;lt;10.1.9.114,10405,1.1.1.1,0,1&amp;gt;;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[vs_0][fw_1] eth1.121:o[44]: 10.1.9.115 -&amp;gt; 1.1.1.1 (ICMP) len=84 id=36827&lt;BR /&gt;ICMP: type=8 code=0 echo request id=35174 seq=15&lt;BR /&gt;[vs_0][fw_1] eth1.121:O[44]: 10.1.9.114 -&amp;gt; 1.1.1.1 (ICMP) len=84 id=36827&lt;BR /&gt;ICMP: type=8 code=0 echo request id=26935 seq=15&lt;BR /&gt;[vs_0][ppak_0] eth2:i[44]: 10.1.9.114 -&amp;gt; 1.1.1.1 (ICMP) len=84 id=36827&lt;BR /&gt;ICMP: type=8 code=0 echo request id=26935 seq=15&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;eth1.121 10.1.9.114 - Cluster IP&lt;BR /&gt;eth1.121 10.1.9.115 - FW1 (active FW)&lt;BR /&gt;eth2 - bridge sub-interface&lt;/P&gt;&lt;P&gt;Traffic flow:&lt;/P&gt;&lt;P&gt;eth1.121 -&amp;gt; Switch -&amp;gt; eth2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Disabled anti-spoofing on all interfaces (in "Network Topology")&lt;/LI&gt;&lt;LI&gt;Extended Cluster Anti-Spoofing is off&lt;/LI&gt;&lt;LI&gt;fw ctl set int fw_local_interface_anti_spoofing 0&lt;/LI&gt;&lt;LI&gt;fw ctl set int fw_antispoofing_enabled 0&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;But it did not work.&lt;/P&gt;&lt;P data-unlink="true"&gt;&lt;STRONG&gt;sk105899&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp; does not mention R81.20 (BTW, fwx_bridge_reroute_enabled=1 breaks access to the passive gateway).&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance!&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Sat, 21 Dec 2024 14:47:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236529#M45873</guid>
      <dc:creator>AlekzNet</dc:creator>
      <dc:date>2024-12-21T14:47:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable local anti-spoofing in R81.20 (cluster with bridged interfaces)?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236551#M45876</link>
      <description>&lt;P&gt;There is a related thread: &lt;A href="https://community.checkpoint.com/t5/Management/Disable-quot-Local-interface-address-spoofing-quot/m-p/14128" target="_blank"&gt;https://community.checkpoint.com/t5/Management/Disable-quot-Local-interface-address-spoofing-quot/m-p/14128&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;But the suggestions from that thread do not work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 21 Dec 2024 01:12:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236551#M45876</guid>
      <dc:creator>AlekzNet</dc:creator>
      <dc:date>2024-12-21T01:12:38Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable local anti-spoofing in R81.20 (cluster with bridged interfaces)?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236553#M45877</link>
      <description>&lt;P&gt;What do you get when you run ip r g 8.8.8.8?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 21 Dec 2024 01:23:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236553#M45877</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-12-21T01:23:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable local anti-spoofing in R81.20 (cluster with bridged interfaces)?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236565#M45881</link>
      <description>&lt;P&gt;# ip r g 8.8.8.8&lt;BR /&gt;8.8.8.8 via 10.1.9.113 dev eth1.121 src 10.1.9.115&lt;BR /&gt;cache&lt;/P&gt;&lt;P&gt;10.1.9.113 is the default gateway (it's the "Switch" in this flow: eth1.121 -&amp;gt; Switch -&amp;gt; eth2)&lt;/P&gt;&lt;P&gt;# ip r&lt;BR /&gt;default via 10.1.9.113 dev eth1.121 proto 7&lt;/P&gt;</description>
      <pubDate>Sat, 21 Dec 2024 14:20:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236565#M45881</guid>
      <dc:creator>AlekzNet</dc:creator>
      <dc:date>2024-12-21T14:20:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable local anti-spoofing in R81.20 (cluster with bridged interfaces)?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236566#M45882</link>
      <description>&lt;P&gt;fw ctl set int fw_local_interface_anti_spoofing 0&lt;/P&gt;
&lt;P&gt;fw ctl set int fw_antispoofing_enabled 0&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;fw&amp;nbsp; ctl&amp;nbsp; set&amp;nbsp; int&amp;nbsp; sim_anti_spoofing_enabled&amp;nbsp; 0&amp;nbsp; -a&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;SecureXL enforces anti-spoofing as well, and the first two commands do not disable it.&amp;nbsp; The third command will, see&amp;nbsp;&lt;A id="link_2_2e1a95ca425d07_46aa3" class="page-link lia-link-navigation lia-custom-event" href="https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23042?search-action-id=108879245556&amp;amp;search-result-uid=23042" target="_blank"&gt;A&amp;nbsp;Primer&amp;nbsp;on&amp;nbsp;Anti-Spoofing&lt;/A&gt;&amp;nbsp; and&amp;nbsp;&lt;SPAN&gt;sk117618 that has this command as a easily-missed footnote.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 21 Dec 2024 15:19:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236566#M45882</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-12-21T15:19:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable local anti-spoofing in R81.20 (cluster with bridged interfaces)?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236579#M45885</link>
      <description>&lt;P&gt;Yes, tried this one already - it did not work:&lt;/P&gt;&lt;P&gt;# fw ctl set int sim_anti_spoofing_enabled 0 -a&lt;BR /&gt;PPAK 0: Get before set operation succeeded of sim_anti_spoofing_enabled&lt;BR /&gt;kiss_params: failed to update VS 0&lt;/P&gt;&lt;P&gt;# fw ctl get int sim_anti_spoofing_enabled -a&lt;BR /&gt;FW:&lt;BR /&gt;Get operation failed: failed to get parameter sim_anti_spoofing_enabled&lt;BR /&gt;PPAK 0: sim_anti_spoofing_enabled = 0&lt;/P&gt;&lt;P&gt;Still see "local anti-spoofing" drops&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Dec 2024 18:47:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236579#M45885</guid>
      <dc:creator>AlekzNet</dc:creator>
      <dc:date>2024-12-22T18:47:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable local anti-spoofing in R81.20 (cluster with bridged interfaces)?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236614#M45889</link>
      <description>&lt;P&gt;Two months ago I logged a case for the CP Diamond and then to ATAM teams -no results either.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Dec 2024 04:52:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236614#M45889</guid>
      <dc:creator>AlekzNet</dc:creator>
      <dc:date>2024-12-25T04:52:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable local anti-spoofing in R81.20 (cluster with bridged interfaces)?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236615#M45890</link>
      <description>&lt;P&gt;Interestingly enough, R81.20 is not mentioned in either sk117618 or sk105899. Is the documentation not up to date, or is there is something very different in R81.20?&lt;/P&gt;</description>
      <pubDate>Sun, 22 Dec 2024 16:16:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236615#M45890</guid>
      <dc:creator>AlekzNet</dc:creator>
      <dc:date>2024-12-22T16:16:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable local anti-spoofing in R81.20 (cluster with bridged interfaces)?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236620#M45891</link>
      <description>&lt;P&gt;Things are getting more strange.&lt;/P&gt;&lt;P&gt;It does not matter whether sim_anti_spoofing_enabled is set to - 0 or 1, with fwaccel on or off. But when I set fw_local_interface_anti_spoofing = 0 and installed the policy, the result changed.&lt;/P&gt;&lt;P&gt;Quick topology reminder.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;"Internet"
    |
br1 (eth3)
   FW - eth1.121 -+
br1 (eth2)        |
    |             |
    +-- Switch ---+    &lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In other words, the configuration is the same, but instead of "local anti-spoofing" I'm getting this (a kind of asymmetrical routing?):&lt;/P&gt;&lt;P&gt;#fw ctl zdebug + drop | fgrep 1.1.1.&lt;/P&gt;&lt;P&gt;@@;381561397.18118721;[vs_0];[tid_2];[fw4_2];fw_log_drop_ex: Packet proto=1 1.1.1.1:0 -&amp;gt; 10.1.9.115:22318 dropped by fw_first_packet_state_checks Reason: ICMP reply does not match a previous request&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;#fw monitor -F "0,0,1.1.1.1,0,0" -F "1.1.1.1,0,0,0&lt;/P&gt;&lt;P&gt;[vs_0][fw_2] eth1.121:o[44]: 10.1.9.115 -&amp;gt; 1.1.1.1 (ICMP) len=84 id=5630&lt;BR /&gt;ICMP: type=8 code=0 echo request id=313 seq=5&lt;BR /&gt;[vs_0][fw_2] eth1.121:O[44]: 10.1.9.114 -&amp;gt; 1.1.1.1 (ICMP) len=84 id=5630&lt;BR /&gt;ICMP: type=8 code=0 echo request id=43556 seq=5&lt;BR /&gt;[vs_0][ppak_0] eth2:i[44]: 10.1.9.114 -&amp;gt; 1.1.1.1 (ICMP) len=84 id=5630&lt;BR /&gt;ICMP: type=8 code=0 echo request id=43556 seq=5&lt;BR /&gt;[vs_0][fw_0] eth2:i[44]: 10.1.9.114 -&amp;gt; 1.1.1.1 (ICMP) len=84 id=5630&lt;BR /&gt;ICMP: type=8 code=0 echo request id=43556 seq=5&lt;BR /&gt;[vs_0][fw_0] eth2:I[44]: 10.1.9.114 -&amp;gt; 1.1.1.1 (ICMP) len=84 id=5630&lt;BR /&gt;ICMP: type=8 code=0 echo request id=43556 seq=5&lt;BR /&gt;[vs_0][fw_0] eth3:o[44]: 10.1.9.114 -&amp;gt; 1.1.1.1 (ICMP) len=84 id=5630&lt;BR /&gt;ICMP: type=8 code=0 echo request id=43556 seq=5&lt;BR /&gt;[vs_0][fw_0] eth3:O[44]: 10.1.9.114 -&amp;gt; 1.1.1.1 (ICMP) len=84 id=5630&lt;BR /&gt;ICMP: type=8 code=0 echo request id=43556 seq=5&lt;BR /&gt;[vs_0][ppak_0] eth3:i[44]: 1.1.1.1 -&amp;gt; 10.1.9.114 (ICMP) len=84 id=37813&lt;BR /&gt;ICMP: type=0 code=0 echo reply id=43556 seq=5&lt;BR /&gt;[vs_0][fw_2] eth3:i[44]: 1.1.1.1 -&amp;gt; 10.1.9.114 (ICMP) len=84 id=37813&lt;BR /&gt;ICMP: type=0 code=0 echo reply id=43556 seq=5&lt;BR /&gt;[vs_0][fw_2] eth3:I[44]: 1.1.1.1 -&amp;gt; 10.1.9.115 (ICMP) len=84 id=37813&lt;BR /&gt;ICMP: type=0 code=0 echo reply id=313 seq=5&lt;BR /&gt;[vs_0][fw_2] eth2:o[44]: 1.1.1.1 -&amp;gt; 10.1.9.115 (ICMP) len=84 id=37813&lt;BR /&gt;ICMP: type=0 code=0 echo reply id=313 seq=5&lt;/P&gt;&lt;P&gt;So, somehow,&amp;nbsp; I've got past the local anti-spoofing, but now the return packets are getting blocked on the internal interface of the bridge in the outgoing ("southward") direction.&lt;/P&gt;&lt;P&gt;FWIW, the current setting:&lt;/P&gt;&lt;P&gt;# fw ctl get int sim_anti_spoofing_enabled -a&lt;BR /&gt;FW:&lt;BR /&gt;Get operation failed: failed to get parameter sim_anti_spoofing_enabled&lt;BR /&gt;PPAK 0: sim_anti_spoofing_enabled = 1&lt;/P&gt;</description>
      <pubDate>Sun, 22 Dec 2024 23:25:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236620#M45891</guid>
      <dc:creator>AlekzNet</dc:creator>
      <dc:date>2024-12-22T23:25:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable local anti-spoofing in R81.20 (cluster with bridged interfaces)?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236624#M45892</link>
      <description>&lt;P&gt;OK, at least it's repeatable now. In order to disable local anti-spoofing "live", the policy must be installed:&lt;/P&gt;&lt;P&gt;1. fw ctl set int fw_local_interface_anti_spoofing 0&lt;BR /&gt;2. Install the policy&lt;/P&gt;</description>
      <pubDate>Mon, 23 Dec 2024 02:15:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236624#M45892</guid>
      <dc:creator>AlekzNet</dc:creator>
      <dc:date>2024-12-23T02:15:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable local anti-spoofing in R81.20 (cluster with bridged interfaces)?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236630#M45898</link>
      <description>&lt;P&gt;Next. While ping is still not working (dropped by "fw_first_packet_state_checks Reason: ICMP reply does not match a previous request;" -- see above). DNS IS working:&lt;/P&gt;&lt;P&gt;# fw ctl zdebug + drop | fgrep 1.1.1.1&lt;/P&gt;&lt;P&gt;[vs_0][fw_0] eth1.121:o[44]: 10.1.9.115 -&amp;gt; 1.1.1.1 (UDP) len=51 id=47855&lt;BR /&gt;UDP: 42759 -&amp;gt; 53&lt;BR /&gt;[vs_0][fw_0] eth1.121:O[44]: 10.1.9.114 -&amp;gt; 1.1.1.1 (UDP) len=51 id=47855&lt;BR /&gt;UDP: 21694 -&amp;gt; 53&lt;BR /&gt;[vs_0][ppak_0] eth2:i[44]: 10.1.9.114 -&amp;gt; 1.1.1.1 (UDP) len=51 id=47855&lt;BR /&gt;UDP: 21694 -&amp;gt; 53&lt;BR /&gt;[vs_0][fw_1] eth2:i[44]: 10.1.9.114 -&amp;gt; 1.1.1.1 (UDP) len=51 id=47855&lt;BR /&gt;UDP: 21694 -&amp;gt; 53&lt;BR /&gt;[vs_0][fw_1] eth2:I[44]: 10.1.9.114 -&amp;gt; 1.1.1.1 (UDP) len=51 id=47855&lt;BR /&gt;UDP: 21694 -&amp;gt; 53&lt;BR /&gt;[vs_0][fw_1] eth3:o[44]: 10.1.9.114 -&amp;gt; 1.1.1.1 (UDP) len=51 id=47855&lt;BR /&gt;UDP: 21694 -&amp;gt; 53&lt;BR /&gt;[vs_0][fw_1] eth3:O[44]: 10.1.9.114 -&amp;gt; 1.1.1.1 (UDP) len=51 id=47855&lt;BR /&gt;UDP: 21694 -&amp;gt; 53&lt;BR /&gt;[vs_0][ppak_0] eth3:i[44]: 1.1.1.1 -&amp;gt; 10.1.9.114 (UDP) len=67 id=7847&lt;BR /&gt;UDP: 53 -&amp;gt; 21694&lt;BR /&gt;[vs_0][fw_0] eth3:i[44]: 1.1.1.1 -&amp;gt; 10.1.9.114 (UDP) len=67 id=7847&lt;BR /&gt;UDP: 53 -&amp;gt; 21694&lt;BR /&gt;[vs_0][fw_0] eth3:I[44]: 1.1.1.1 -&amp;gt; 10.1.9.115 (UDP) len=67 id=7847&lt;BR /&gt;UDP: 53 -&amp;gt; 42759&lt;BR /&gt;[vs_0][fw_0] eth2:o[44]: 1.1.1.1 -&amp;gt; 10.1.9.115 (UDP) len=67 id=7847&lt;BR /&gt;UDP: 53 -&amp;gt; 42759&lt;BR /&gt;[vs_0][fw_0] eth2:O[44]: 1.1.1.1 -&amp;gt; 10.1.9.115 (UDP) len=67 id=7847&lt;BR /&gt;UDP: 53 -&amp;gt; 42759&lt;BR /&gt;[vs_0][ppak_0] eth1.121:i[44]: 1.1.1.1 -&amp;gt; 10.1.9.115 (UDP) len=67 id=7847&lt;BR /&gt;UDP: 53 -&amp;gt; 42759&lt;BR /&gt;[vs_0][fw_0] eth1.121:i[44]: 1.1.1.1 -&amp;gt; 10.1.9.115 (UDP) len=67 id=7847&lt;BR /&gt;UDP: 53 -&amp;gt; 42759&lt;/P&gt;&lt;P&gt;Settings:&lt;/P&gt;&lt;P&gt;fw_local_interface_anti_spoofing = 0&lt;BR /&gt;fw_antispoofing_enabled = 1&lt;BR /&gt;fwx_bridge_reroute_enabled = 0&lt;BR /&gt;fwx_perform_gateway_hide = 1&lt;BR /&gt;sim_anti_spoofing_enabled = 0&lt;/P&gt;</description>
      <pubDate>Mon, 23 Dec 2024 00:33:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236630#M45898</guid>
      <dc:creator>AlekzNet</dc:creator>
      <dc:date>2024-12-23T00:33:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable local anti-spoofing in R81.20 (cluster with bridged interfaces)?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236631#M45899</link>
      <description>&lt;P&gt;More strange things. The management station is located on the "Internet" side of the firewall.&lt;/P&gt;&lt;P&gt;fw ctl set int fwx_bridge_reroute_enabled 1&lt;/P&gt;&lt;P&gt;- Passive gateway is not pingable from the management station, Active is pingable&lt;BR /&gt;- The mgmt station is pingable from the active, 1.1.1.1 is not. Nothing is pingable from the passive.&lt;/P&gt;&lt;P&gt;fw ctl set int fwx_bridge_reroute_enabled 0&lt;BR /&gt;&lt;BR /&gt;- Both passive and active are pingable from the mgmt&lt;BR /&gt;- Neither mgmt, nor 1.1.1.1 is pingable from either active or passive&lt;/P&gt;&lt;P&gt;It does not matter what fwx_perform_gateway_hide is set to: 0, 1 or 2. And it does not matter if the policy is installed afterwards or not (unlike fw_local_interface_anti_spoofing).&lt;/P&gt;&lt;P&gt;I'm lost ...&lt;/P&gt;</description>
      <pubDate>Mon, 23 Dec 2024 11:42:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236631#M45899</guid>
      <dc:creator>AlekzNet</dc:creator>
      <dc:date>2024-12-23T11:42:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable local anti-spoofing in R81.20 (cluster with bridged interfaces)?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236637#M45900</link>
      <description>&lt;P&gt;Apparently, managing ClusterXL through the bridge interface is not supported in R81.20 (just like IP-addresses on the bridges). Only a single gateway can be managed through the bridge. And this is what fwx_bridge_reroute_enabled is for. (Passive FW is not accessible when fwx_bridge_reroute_enabled=1).&lt;/P&gt;&lt;P&gt;That would explain why I'm getting VERY strange and unstable results.&lt;/P&gt;&lt;P&gt;Shouldn't it be listed in the "Limitations in Bridge Mode" documentation section? Or, better, can it be properly implemented?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;OK, time well spent ... &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Dec 2024 02:55:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236637#M45900</guid>
      <dc:creator>AlekzNet</dc:creator>
      <dc:date>2024-12-23T02:55:52Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable local anti-spoofing in R81.20 (cluster with bridged interfaces)?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236744#M45907</link>
      <description>&lt;P&gt;With ElasticXL in R82, only the active cluster member (SMO) needs to be accessible to push policy.&lt;BR /&gt;Which means this should work properly in this scenario.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Dec 2024 20:57:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236744#M45907</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-12-23T20:57:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable local anti-spoofing in R81.20 (cluster with bridged interfaces)?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236833#M45923</link>
      <description>&lt;P&gt;First of all - Merry Christmas everybody! &lt;span class="lia-unicode-emoji" title=":christmas_tree:"&gt;🎄&lt;/span&gt;Regardless if you celebrate it or not - may it be a peaceful, healthy and happy year for us all!&lt;/P&gt;&lt;P&gt;ElasticXL is definitely a good idea, and definitely might help,&amp;nbsp; provided it's implemented correctly.&lt;/P&gt;&lt;P&gt;Speaking of management over "clustered bridge". This topology is described in, for example,&amp;nbsp; R77 (&lt;A href="https://sc1.checkpoint.com/documents/R77/CP_R77_SecurityGatewayTech_WebAdmin/96332.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R77/CP_R77_SecurityGatewayTech_WebAdmin/96332.htm&lt;/A&gt;), and in R81.20 (&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_Installation_and_Upgrade_Guide/Content/Topics-IUG/Managing-Security-Gateway-through-the-Bridge-Interface.htm?tocpath=Special%20Scenarios%20for%20Security%20Gateways%7CDeploying%20a%20Security%20Gateway%20or%20a%20ClusterXL%20in%20Bridge%20Mode%7C_____5" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_Installation_and_Upgrade_Guide/Content/Topics-IUG/Managing-Security-Gateway-through-the-Bridge-Interface.htm?tocpath=Special%20Scenarios%20for%20Security%20Gateways%7CDeploying%20a%20Security%20Gateway%20or%20a%20ClusterXL%20in%20Bridge%20Mode%7C_____5&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;It's not a new concept. In both documents "&lt;EM&gt;&lt;STRONG&gt;a&lt;/STRONG&gt;&lt;/EM&gt; security gateway" is mentioned, not "a cluster". At the same time, it's nowhere stated, that this topology is not supported by ClusterXL.&lt;/P&gt;&lt;P&gt;Please correct me if I'm wrong, but it resembles a typical situation, when a project is officially completed, but some features are either not tested, or not implemented correctly and not working. But since the project is "completed and paid successfully", these "features" are simply not mentioned anywhere: in either supported or unsupported sections &lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;&lt;/P&gt;&lt;P&gt;My cumulative 30+ hour testing rather confirms this "theory". Also, it appeared, that the documentation&amp;nbsp; is either absent, or not 100% correct, or not up-to-date (e.g. R81.20 is not in the list of related OSes).&lt;/P&gt;&lt;P&gt;Examples:&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk105899" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk105899&lt;/A&gt;&lt;/P&gt;&lt;P&gt;- R81.20 is not in the version list&lt;BR /&gt;- fwx_perform_gateway_hide does not change anything related&lt;BR /&gt;- fw_local_interface_anti_spoofing - not mentioned that the policy must be installed&lt;BR /&gt;- fwx_bridge_reroute_enabled - not mentioned that it's not applicable for ClusterXL (it breaks it)&lt;BR /&gt;- sim_anti_spoofing_enabled - does not change anything related&lt;BR /&gt;- fw_antispoofing_enabled - does not change anything related&lt;/P&gt;&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_Installation_and_Upgrade_Guide/Content/Topics-IUG/Configuring-ClusterXL-in-Bridge-Mode-Active-Standby-with-Two-Switches.htm?tocpath=Special%20Scenarios%20for%20Security%20Gateways%7CDeploying%20a%20Security%20Gateway%20or%20a%20ClusterXL%20in%20Bridge%20Mode%7CConfiguring%20a%20ClusterXL%20in%20Bridge%20Mode%7C_____1" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_Installation_and_Upgrade_Guide/Content/Topics-IUG/Configuring-ClusterXL-in-Bridge-Mode-Active-Standby-with-Two-Switches.htm?tocpath=Special%20Scenarios%20for%20Security%20Gateways%7CDeploying%20a%20Security%20Gateway%20or%20a%20ClusterXL%20in%20Bridge%20Mode%7CConfiguring%20a%20ClusterXL%20in%20Bridge%20Mode%7C_____1&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;- it does not matter if the bridge interfaces or subordinates are in the Topology, it does not change anything&lt;BR /&gt;- it's not mentioned what topology should be applied to the management interface: Internet or According to the routing table. Even if the default route goes through the management interface, the result is different (even if all traffic is allowed by the FW)&lt;/P&gt;&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_Installation_and_Upgrade_Guide/Content/Topics-IUG/Routing-and-Bridge-Interfaces.htm?tocpath=Special%20Scenarios%20for%20Security%20Gateways%7CDeploying%20a%20Security%20Gateway%20or%20a%20ClusterXL%20in%20Bridge%20Mode%7C_____4" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_Installation_and_Upgrade_Guide/Content/Topics-IUG/Routing-and-Bridge-Interfaces.htm?tocpath=Special%20Scenarios%20for%20Security%20Gateways%7CDeploying%20a%20Security%20Gateway%20or%20a%20ClusterXL%20in%20Bridge%20Mode%7C_____4&lt;/A&gt;&lt;/P&gt;&lt;P&gt;- "&lt;EM&gt;A &lt;SPAN class=""&gt;Security Gateway&lt;/SPAN&gt; cannot filter or transmit packets that it inspected before on a Bridge interface (to avoid double-inspection).&lt;/EM&gt;" - and next doco section describes how to configure it (isn't what fwx_bridge_reroute_enabled is for?)&lt;/P&gt;&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_Installation_and_Upgrade_Guide/Content/Topics-IUG/Deploying-Security-Gateway-or-ClusterXL-in-Bridge-Mode.htm?TocPath=Special%20Scenarios%20for%20Security%20Gateways%7CDeploying%20a%20Security%20Gateway%20or%20a%20ClusterXL%20in%20Bridge%20Mode%7C_____0" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_Installation_and_Upgrade_Guide/Content/Topics-IUG/Deploying-Security-Gateway-or-ClusterXL-in-Bridge-Mode.htm?TocPath=Special%20Scenarios%20for%20Security%20Gateways%7CDeploying%20a%20Security%20Gateway%20or%20a%20ClusterXL%20in%20Bridge%20Mode%7C_____0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;- "&lt;EM&gt;Assigning an IP address to a Bridge interface in &lt;SPAN class=""&gt;ClusterXL&lt;/SPAN&gt;&lt;/EM&gt;." - OK, while I do agree, that assigning IP-addresses to the bridge interfaces on CusterXL breaks cluster synchronization (the bridge subordinates on the active firewall begin to flap - what looks like a bug, rather than a "feature"), I managed to configure addresses on the bridges and keep the cluster in sync (OK, it was not easy, and the config was not 100% symmetrical). What again hints on a "non fully completed project" &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;As a workaround, I tried MDPS, but it's even more buggy and even less documented - the Sync interface (while up and passing the sync traffic) was not visible on the dplane, so the cluster sync was broken. I did not waste time on the troubleshooting and removed MDPS for the time being.&lt;/P&gt;&lt;P&gt;&amp;nbsp;... and I can keep going on and on ...&lt;/P&gt;&lt;P&gt;What I achieved so far ( and more indications of a non-finished project &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;- the cluster is in full sync&lt;BR /&gt;- both members are reachable rom the management station&lt;BR /&gt;- both members are pingable from everywhere&lt;BR /&gt;- both members send logs to the management station&lt;BR /&gt;- both members can access DNS everywhere&lt;/P&gt;&lt;P&gt;What is not working:&lt;/P&gt;&lt;P&gt;- the cluster members can not PING anything on the North side&lt;BR /&gt;- the cluster members can not reach the CheckPoint site for updates or use RAD (possibly can be solved by adding a proxy on the South side of the FW).&lt;/P&gt;&lt;P&gt;In both cases, the return traffic is blocked on the "internal" bridge subordinate - see above&lt;/P&gt;&lt;P&gt;Anyway, the quest continues!&lt;/P&gt;</description>
      <pubDate>Wed, 25 Dec 2024 05:02:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/236833#M45923</guid>
      <dc:creator>AlekzNet</dc:creator>
      <dc:date>2024-12-25T05:02:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable local anti-spoofing in R81.20 (cluster with bridged interfaces)?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/237084#M46003</link>
      <description>&lt;P&gt;OK, if management over "clustered bridge" is not fixed by CP, but you have to use it, here's some tips:&lt;/P&gt;&lt;P&gt;- use a clustered interface for the management&lt;BR /&gt;- disable Extended Cluster Anti-Spoofing&lt;BR /&gt;- disable anti-spoofing for the related interface&lt;BR /&gt;- set fw_local_interface_anti_spoofing to 0 and install the policy (if you can)&lt;BR /&gt;- you might have to "fw unloadlocal" on the passive fw, but disable the "South" bridge sub-interface to prevent possible spanning-tree loop (yes, this thing also works incorrectly)&lt;BR /&gt;- to get access to the primary firewall you might have to temporary set fwx_bridge_reroute_enabled to 1&lt;BR /&gt;- you might have to install the policy several times in stages (e.g. on the active only, then on the passive, then on the cluster)&lt;/P&gt;&lt;P&gt;Another solution would be to use a single firewall with IP-address configured on the bridge (and manage it through this address) and have a spare firewall on a cold standby,&lt;/P&gt;&lt;P&gt;Any other ideas? Please let me know. On my side, I will try to chase the Diamond and the ATAM teams.&lt;/P&gt;</description>
      <pubDate>Sun, 29 Dec 2024 00:18:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/237084#M46003</guid>
      <dc:creator>AlekzNet</dc:creator>
      <dc:date>2024-12-29T00:18:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable local anti-spoofing in R81.20 (cluster with bridged interfaces)?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/238808#M46320</link>
      <description>&lt;P&gt;Sooooo.... After another round of troubleshooting...&lt;/P&gt;&lt;P&gt;It turned out, that for TCP and ICMP, no connection table entries are created for the IP-address of the physical firewall (only for the cluster IP).&lt;BR /&gt;For UDP such entries are properly created.&lt;/P&gt;&lt;P&gt;Example.&lt;/P&gt;&lt;P&gt;f1 - cluster member address&lt;BR /&gt;c1 - cluster address&lt;BR /&gt;h1 - host on the "Internet"&lt;BR /&gt;&lt;BR /&gt;If you run "fw tab -t connections -z | fgrep h1", and try to connect from f1 to h1, you will get the following (simplified! and without port/proto numbers):&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;For UDP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;c1 h1&lt;BR /&gt;f1 h1&lt;BR /&gt;h1 c1&lt;BR /&gt;h1 f1&lt;/P&gt;&lt;P&gt;And everything works.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;For ICMP/TCP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;c1 h1&lt;BR /&gt;f1 h1&lt;BR /&gt;h1 c1&lt;/P&gt;&lt;P&gt;And the return traffic gets dropped.&lt;/P&gt;&lt;P&gt;Looks like a bug in my optic. The CP case is updated, of course.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2025 14:04:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-disable-local-anti-spoofing-in-R81-20-cluster-with/m-p/238808#M46320</guid>
      <dc:creator>AlekzNet</dc:creator>
      <dc:date>2025-01-16T14:04:02Z</dc:date>
    </item>
  </channel>
</rss>

