<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NEW-RADIUS traffic drop in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NEW-RADIUS-traffic-drop/m-p/61861#M4736</link>
    <description>&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;First of all - I am no checkpoint guru so there could be something elementary that I've missed. But, I'm configuring EAP-TLS communication between my WLC (Cisco) &amp;amp; RADIUS (NPS in DMZ).&amp;nbsp;Please note the object is referencing the DMZ IP-address. I've created a rule for NEW-RADIUS traffic between the two objects to accept traffic, but I can still see drops.&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. From the Smartconsole in the 'Logs &amp;amp; Monitor' section I notice that the drop is missing a reference to a specific rule.&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. When I enabled ICMP echo-request the behaviour was the same, dropped traffic without a reference to a access rule.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have any tips, suggestions or if you need additional information - please let me know &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I'll await your kind reply,&lt;/P&gt;&lt;P&gt;TB&lt;/P&gt;</description>
    <pubDate>Wed, 04 Sep 2019 13:21:50 GMT</pubDate>
    <dc:creator>Brander</dc:creator>
    <dc:date>2019-09-04T13:21:50Z</dc:date>
    <item>
      <title>NEW-RADIUS traffic drop</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NEW-RADIUS-traffic-drop/m-p/61861#M4736</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;First of all - I am no checkpoint guru so there could be something elementary that I've missed. But, I'm configuring EAP-TLS communication between my WLC (Cisco) &amp;amp; RADIUS (NPS in DMZ).&amp;nbsp;Please note the object is referencing the DMZ IP-address. I've created a rule for NEW-RADIUS traffic between the two objects to accept traffic, but I can still see drops.&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. From the Smartconsole in the 'Logs &amp;amp; Monitor' section I notice that the drop is missing a reference to a specific rule.&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. When I enabled ICMP echo-request the behaviour was the same, dropped traffic without a reference to a access rule.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have any tips, suggestions or if you need additional information - please let me know &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I'll await your kind reply,&lt;/P&gt;&lt;P&gt;TB&lt;/P&gt;</description>
      <pubDate>Wed, 04 Sep 2019 13:21:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NEW-RADIUS-traffic-drop/m-p/61861#M4736</guid>
      <dc:creator>Brander</dc:creator>
      <dc:date>2019-09-04T13:21:50Z</dc:date>
    </item>
    <item>
      <title>Re: NEW-RADIUS traffic drop</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NEW-RADIUS-traffic-drop/m-p/61897#M4739</link>
      <description>Double-clicking the relevant log entry and looking at further details may explain why it's being dropped.</description>
      <pubDate>Wed, 04 Sep 2019 17:55:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NEW-RADIUS-traffic-drop/m-p/61897#M4739</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-09-04T17:55:43Z</dc:date>
    </item>
    <item>
      <title>Re: NEW-RADIUS traffic drop</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NEW-RADIUS-traffic-drop/m-p/62025#M4742</link>
      <description>&lt;P&gt;Dear PhoneBoy,&lt;BR /&gt;Is there something special I should keep an eye out for?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess something weird is the 'Message information':&amp;nbsp;Address spoofing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The source and destination is two different subnets, without a specific route enabled. Is this a requirement?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2019 10:15:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NEW-RADIUS-traffic-drop/m-p/62025#M4742</guid>
      <dc:creator>Brander</dc:creator>
      <dc:date>2019-09-06T10:15:40Z</dc:date>
    </item>
    <item>
      <title>Re: NEW-RADIUS traffic drop</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NEW-RADIUS-traffic-drop/m-p/62080#M4748</link>
      <description>It should also be logged against Rule 0, which is an implied rule.&lt;BR /&gt;Anti-spoofing is exactly why the traffic is being dropped, and you need to fix that.&lt;BR /&gt;This may mean adding routes, changing the gateway object configuration, or both.&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23042" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23042&lt;/A&gt;</description>
      <pubDate>Fri, 06 Sep 2019 15:41:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NEW-RADIUS-traffic-drop/m-p/62080#M4748</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-09-06T15:41:24Z</dc:date>
    </item>
  </channel>
</rss>

