<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VSX, anti spoofing and dynamic routing in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-anti-spoofing-and-dynamic-routing/m-p/239125#M46400</link>
    <description>&lt;P&gt;Thanks all for the replies. We took more time to look at the implementations and it appears this is related to the same prefix being learnt on two or more peerings simultaneously and ECMP being off. After enabling ECMP, our observation IP doesn't report spoofing anymore.&lt;/P&gt;
&lt;P&gt;We will continue working on the general architecture of this deployment to see if this is the solution.&lt;/P&gt;</description>
    <pubDate>Tue, 21 Jan 2025 08:54:34 GMT</pubDate>
    <dc:creator>Alex-</dc:creator>
    <dc:date>2025-01-21T08:54:34Z</dc:date>
    <item>
      <title>VSX, anti spoofing and dynamic routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-anti-spoofing-and-dynamic-routing/m-p/238158#M46210</link>
      <description>&lt;P&gt;I was checking &lt;A href="https://support.checkpoint.com/results/sk/sk32500" target="_blank" rel="noopener"&gt;sk32500&lt;/A&gt; - &lt;EM&gt;Anti-spoofing on VSX (static and dynamic)&lt;/EM&gt; in order to manage anti-spoofing on a VSX which has switched from static to dynamic routing and enforce anti-spoofing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Steps so far:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Dynamic routing enabled and working&lt;/LI&gt;
&lt;LI&gt;Disable "Calculate topology automatically based on routing information" at the VS level&lt;/LI&gt;
&lt;LI&gt;Edit the relevant interface and select "Internal - Defined by routes" for the topology&lt;/LI&gt;
&lt;LI&gt;Set the anti-spoofing to Detect for initial verification&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But then, sources coming from the interface which match prefixes received by the dynamic routing protocol on that interface are flagged as anti-spoofing with the yellow shield as we are in detection mode.&lt;/P&gt;
&lt;P&gt;So if a prefix on interface bond10.20 is learnt as 10.1.1.0/24, we see for instance 10.1.1.1 flagged as spoofed with direction incoming on that interface in the logs.&lt;/P&gt;
&lt;P&gt;We are probably missing something, but what? Any tips are welcome.&lt;/P&gt;
&lt;P&gt;CP appliances, R81.10 Take 150.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2025 12:08:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-anti-spoofing-and-dynamic-routing/m-p/238158#M46210</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2025-01-10T12:08:18Z</dc:date>
    </item>
    <item>
      <title>Re: VSX, anti spoofing and dynamic routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-anti-spoofing-and-dynamic-routing/m-p/238192#M46221</link>
      <description>&lt;P&gt;I suggest doing a kernel debug on the VS to see what the actual reason is for the drop.&lt;BR /&gt;TAC may be necessary to investigate this further.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;# Step 1: Determine the VSID
vsx stat -v

# Step 2: Allocate Kernel Debug Buffer
fw ctl debug -buf 32768 -v &amp;lt;VSID&amp;gt;

# Step 3: Enable Debug Flags for Anti-Spoofing
fw ctl debug -m fw + drop -v &amp;lt;VSID&amp;gt;

# Step 4: Start Capturing the Debug Output
fw ctl kdebug -T -f -v &amp;lt;VSID&amp;gt; &amp;gt; /var/log/debug.txt

# Step 5: Replicate the Issue
# Perform the actions that trigger the anti-spoofing mechanism

# Step 6: Stop the Debugging
# Press Ctrl+C in the terminal where fw ctl kdebug is running

# Step 7: Analyze the Debug Output
# The debug output will be saved in /var/log/debug.txt
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2025 16:11:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-anti-spoofing-and-dynamic-routing/m-p/238192#M46221</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-01-10T16:11:56Z</dc:date>
    </item>
    <item>
      <title>Re: VSX, anti spoofing and dynamic routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-anti-spoofing-and-dynamic-routing/m-p/238212#M46230</link>
      <description>&lt;P&gt;Just to make sure, is there no 10.1.1.0/24 hidden in the anti-spoofing group behind a different interface then bond10.20?&lt;/P&gt;
&lt;P&gt;Sometimes I see customers that for example define 10/8 behind interface X and smaller subnet 10.0.0.0/24 behind interface y.&lt;/P&gt;
&lt;P&gt;Do you get my point? For now work around is do disable AS and put the network in the option: "Do not check packets from": and add there the group with network. Hope that helps&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2025 19:11:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-anti-spoofing-and-dynamic-routing/m-p/238212#M46230</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-01-10T19:11:29Z</dc:date>
    </item>
    <item>
      <title>Re: VSX, anti spoofing and dynamic routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-anti-spoofing-and-dynamic-routing/m-p/238266#M46236</link>
      <description>&lt;P&gt;Maybe check your config to see how relevant&amp;nbsp;&lt;SPAN&gt;sk181768 is...&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Jan 2025 07:02:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-anti-spoofing-and-dynamic-routing/m-p/238266#M46236</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-01-11T07:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: VSX, anti spoofing and dynamic routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-anti-spoofing-and-dynamic-routing/m-p/238288#M46237</link>
      <description>&lt;P&gt;I faced similar issue on VSX, but anti-spoofing was dropping BGP communication within the same subnet, from same External interface. Lets say I have VLAN 10 with subnet 10.0.0.0/24. VS has 10.0.0.1 and BGP peer has 10.0.0.10. BGP traffic from VS to BGP peer was dropped by anti-spoofing...&lt;/P&gt;
&lt;P&gt;Workaround used: "Don't check packets from: 10.0.0.0/24".&lt;/P&gt;
&lt;P&gt;Here are some related articles:&lt;/P&gt;
&lt;P&gt;Anti-Spoofing drops packets that arrive at a &lt;A href="https://support.checkpoint.com/results/sk/sk181768" target="_blank" rel="noopener"&gt;Security Gateway through interfaces with Topology "External"&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk182725" target="_blank" rel="noopener"&gt;Anti-Spoofing drops IPv6 traffic that arrives at an interface with an IPv6 address configured&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Jan 2025 15:08:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-anti-spoofing-and-dynamic-routing/m-p/238288#M46237</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2025-01-11T15:08:16Z</dc:date>
    </item>
    <item>
      <title>Re: VSX, anti spoofing and dynamic routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-anti-spoofing-and-dynamic-routing/m-p/238578#M46265</link>
      <description>&lt;P&gt;Related forum threads:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/What-is-the-difference-between-interface-topologies-Internet-and/td-p/237010/jump-to/first-unread-message" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/What-is-the-difference-between-interface-topologies-Internet-and/td-p/237010/jump-to/first-unread-message&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/What-is-the-difference-between-interface-topologies-Internet-and/td-p/237010/jump-to/first-unread-message" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/What-is-the-difference-between-interface-topologies-Internet-and/td-p/237010/jump-to/first-unread-message&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2025 21:29:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-anti-spoofing-and-dynamic-routing/m-p/238578#M46265</guid>
      <dc:creator>AlekzNet</dc:creator>
      <dc:date>2025-01-14T21:29:02Z</dc:date>
    </item>
    <item>
      <title>Re: VSX, anti spoofing and dynamic routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-anti-spoofing-and-dynamic-routing/m-p/239125#M46400</link>
      <description>&lt;P&gt;Thanks all for the replies. We took more time to look at the implementations and it appears this is related to the same prefix being learnt on two or more peerings simultaneously and ECMP being off. After enabling ECMP, our observation IP doesn't report spoofing anymore.&lt;/P&gt;
&lt;P&gt;We will continue working on the general architecture of this deployment to see if this is the solution.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2025 08:54:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-anti-spoofing-and-dynamic-routing/m-p/239125#M46400</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2025-01-21T08:54:34Z</dc:date>
    </item>
    <item>
      <title>Re: VSX, anti spoofing and dynamic routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-anti-spoofing-and-dynamic-routing/m-p/239449#M46441</link>
      <description>&lt;P&gt;Since we live in those times, I had a chat with Copilot at the Support Center which was more explicit than the documentation. &lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;So without ECMP, the FW will hash the destination and assign it to an interface. If the same traffic comes also from another, it's considered as spoofed. With ECMP, it will allow up to 8 paths and will install the prefixes on any of those.&lt;/P&gt;
&lt;P&gt;Since "Topology defined by network routes" checks these tables, ECMP must be on for multi path to work in conjunction with anti-spoofing, otherwise it must be manually set, turned off or set to detect.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2025 11:25:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-anti-spoofing-and-dynamic-routing/m-p/239449#M46441</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2025-01-23T11:25:55Z</dc:date>
    </item>
  </channel>
</rss>

