<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Programatically disable Extended Cluster Anti-Spoofing in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248786#M48628</link>
    <description>&lt;P&gt;Ok I've managed to do it via dbedit.&amp;nbsp; cluster is called "gcp-southhub-fw-cluster"&lt;/P&gt;&lt;P&gt;On the management server I've created a script called&amp;nbsp;dbedit.script&lt;BR /&gt;&lt;BR /&gt;dbedit.script:&lt;/P&gt;&lt;P&gt;print network_objects gcp-southhub-fw-cluster&lt;BR /&gt;modify network_objects gcp-southhub-fw-cluster cluster_anti_spoofing false&lt;BR /&gt;update_all&lt;BR /&gt;print network_objects gcp-southhub-fw-cluster&lt;BR /&gt;quit -n&lt;/P&gt;&lt;P&gt;I run the command as follow:&lt;/P&gt;&lt;P&gt;[Expert@chkp-fwm:0]# dbedit -local -f dbedit.script | grep cluster_anti_spoofing&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-05-13 131255.jpg" style="width: 769px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30460iBF056E3261BC3CC5/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-05-13 131255.jpg" alt="Screenshot 2025-05-13 131255.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now i just need to create a null_resource remote provisioner&amp;nbsp; type and get it to run the script as part of the workflow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 13 May 2025 12:17:05 GMT</pubDate>
    <dc:creator>Kurpeus</dc:creator>
    <dc:date>2025-05-13T12:17:05Z</dc:date>
    <item>
      <title>Programatically disable Extended Cluster Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248772#M48622</link>
      <description>&lt;P&gt;Hi Checkmates&lt;/P&gt;&lt;P&gt;Does anyone know how to programatically disable Extended Cluster Anti SPoofing&amp;nbsp; either via API or CLI commands ? I'm trying to put together a zero touch demo environment (IaC + full Check Point Terraform config) on GCP, but the management traffic is being dropped by the cluster&lt;/P&gt;&lt;P&gt;@;193343.618;[vs_0];[tid_0];[fw4_0];fw_log_drop_ex: Packet proto=6 10.254.1.2:18191 -&amp;gt; 10.254.1.4:38596 dropped by fw_cluster_ttl_anti_spoofing Reason: ttl check drop;&lt;/P&gt;&lt;P&gt;From Smart Console it is possible to disable Extended Cluster Anti Spoofing but i can't see a way to do this via a command. The gateways are on R81.20 and Mgmt R82.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 May 2025 11:14:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248772#M48622</guid>
      <dc:creator>Kurpeus</dc:creator>
      <dc:date>2025-05-13T11:14:02Z</dc:date>
    </item>
    <item>
      <title>Re: Programatically disable Extended Cluster Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248774#M48623</link>
      <description>&lt;P&gt;Let me try figure it out in my cluster, but I know below used to work in older versions, but does not seem its doable in R81.20...&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;set cluster member &amp;lt;member_id&amp;gt; advanced-settings extended-anti-spoofing off&lt;BR /&gt;save config&lt;/P&gt;</description>
      <pubDate>Tue, 13 May 2025 11:42:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248774#M48623</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-13T11:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: Programatically disable Extended Cluster Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248776#M48624</link>
      <description>&lt;P&gt;Though, when I ran your question through AI copilot, says cannot be done viia clish, not supported, but I would still double check that info.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 13 May 2025 11:49:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248776#M48624</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-13T11:49:57Z</dc:date>
    </item>
    <item>
      <title>Re: Programatically disable Extended Cluster Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248777#M48625</link>
      <description>&lt;P&gt;Thanks. I think the way to go it to use dbedit in command line. I'm trying to figure out the syntax. Never used it this way before. Always GUI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 May 2025 11:51:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248777#M48625</guid>
      <dc:creator>Kurpeus</dc:creator>
      <dc:date>2025-05-13T11:51:32Z</dc:date>
    </item>
    <item>
      <title>Re: Programatically disable Extended Cluster Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248782#M48627</link>
      <description>&lt;P&gt;I will keep trying, its very interesting challenge.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 13 May 2025 11:58:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248782#M48627</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-13T11:58:26Z</dc:date>
    </item>
    <item>
      <title>Re: Programatically disable Extended Cluster Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248786#M48628</link>
      <description>&lt;P&gt;Ok I've managed to do it via dbedit.&amp;nbsp; cluster is called "gcp-southhub-fw-cluster"&lt;/P&gt;&lt;P&gt;On the management server I've created a script called&amp;nbsp;dbedit.script&lt;BR /&gt;&lt;BR /&gt;dbedit.script:&lt;/P&gt;&lt;P&gt;print network_objects gcp-southhub-fw-cluster&lt;BR /&gt;modify network_objects gcp-southhub-fw-cluster cluster_anti_spoofing false&lt;BR /&gt;update_all&lt;BR /&gt;print network_objects gcp-southhub-fw-cluster&lt;BR /&gt;quit -n&lt;/P&gt;&lt;P&gt;I run the command as follow:&lt;/P&gt;&lt;P&gt;[Expert@chkp-fwm:0]# dbedit -local -f dbedit.script | grep cluster_anti_spoofing&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-05-13 131255.jpg" style="width: 769px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30460iBF056E3261BC3CC5/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-05-13 131255.jpg" alt="Screenshot 2025-05-13 131255.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now i just need to create a null_resource remote provisioner&amp;nbsp; type and get it to run the script as part of the workflow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 May 2025 12:17:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248786#M48628</guid>
      <dc:creator>Kurpeus</dc:creator>
      <dc:date>2025-05-13T12:17:05Z</dc:date>
    </item>
    <item>
      <title>Re: Programatically disable Extended Cluster Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248787#M48629</link>
      <description>&lt;P&gt;Great job!&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 13 May 2025 12:25:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248787#M48629</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-13T12:25:26Z</dc:date>
    </item>
    <item>
      <title>Re: Programatically disable Extended Cluster Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248865#M48641</link>
      <description>&lt;P&gt;You can (and should) use the management API:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/latest/APIs/#cli/set-simple-cluster~v1.9.1%20" target="_blank"&gt;https://sc1.checkpoint.com/documents/latest/APIs/#cli/set-simple-cluster~v1.9.1%20&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-05-13 at 3.53.05 PM.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30466i482B3BFA38E54FED/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2025-05-13 at 3.53.05 PM.png" alt="Screenshot 2025-05-13 at 3.53.05 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; Although, the better choice is to fix the issue causing the anti-spoofing error in the first place. &amp;nbsp;Anti-spoofing errors mean you have a problem with your configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 May 2025 19:54:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248865#M48641</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2025-05-13T19:54:20Z</dc:date>
    </item>
    <item>
      <title>Re: Programatically disable Extended Cluster Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248922#M48648</link>
      <description>&lt;P&gt;This is not about interface anti spoofing. This can indeed be configured via API (and it is disabled anyway as per Check Point / GCP best practices.).&amp;nbsp; This is about extended cluster anti spoofing setting&amp;nbsp; (cluster properties -&amp;gt; network Management -&amp;gt; Advanced -&amp;gt; Enable Extended Cluster Anti-Spoofing) which is enabled by default.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have little/no control of the overlay network (GCP). The management server sits on the same L3 network (= directly connected)&amp;nbsp; as the firewall sync (eth1). Both are on the same region but different zone.&amp;nbsp; Somehow the cluster is not happy with the TTL value of packets from the management and drops the traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 May 2025 08:42:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248922#M48648</guid>
      <dc:creator>Kurpeus</dc:creator>
      <dc:date>2025-05-14T08:42:37Z</dc:date>
    </item>
    <item>
      <title>Re: Programatically disable Extended Cluster Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248990#M48651</link>
      <description>&lt;P&gt;Ohh! &amp;nbsp;I see the problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Management server is on the same network. &amp;nbsp;Move that to its own VPC and network. &amp;nbsp;You wouldn't want management in the same network when the future comes and you need to delete the gateways VPC and re-deploy (upgrades, problem-fixing, whatever). &amp;nbsp;It'll also keep your configuration more clean, with distinct separation of duties.&lt;/P&gt;
&lt;P&gt;CloudGuard management is meant to be on its own entirely, anyway. &amp;nbsp;The same applies for Azure deployments, too (of which I do a lot these days for customers).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 May 2025 14:19:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/248990#M48651</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2025-05-14T14:19:55Z</dc:date>
    </item>
    <item>
      <title>Re: Programatically disable Extended Cluster Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/249483#M48723</link>
      <description>&lt;P&gt;Thank you.. It is already the case. The firewalls have a leg in the management VPC, not the other way around.&amp;nbsp;&amp;nbsp; I was following Checkpoint deployment guide for GCP&amp;nbsp;&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_Network_for_GCP_HA_Cluster/Content/Topics-GCP-HA/Network.htm?tocpath=Network%7C_____0#Network" target="_self"&gt;link here&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;EM&gt;Each&amp;nbsp;&lt;SPAN class=""&gt;gateway&lt;/SPAN&gt;&amp;nbsp;has a network interface in a subnetwork in the Management&amp;nbsp;&lt;SPAN class=""&gt;VPC&lt;/SPAN&gt;. This is the network that manages the&amp;nbsp;&lt;SPAN class=""&gt;gateways&lt;/SPAN&gt;.&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To be fair I'm also doing that in a trial account which comes with lot of restrictions from GCP.&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Limited in the number of VPC per project&lt;/LI&gt;&lt;LI&gt;Limited in the number of project per billing account&lt;/LI&gt;&lt;LI&gt;Trial credits can only be used with one billing account&lt;/LI&gt;&lt;LI&gt;Limited in the number of CPUs per region&lt;/LI&gt;&lt;LI&gt;and the list goes on ...&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;So they give you $300 credits but then you can't really use it meaningfully &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 11:23:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Programatically-disable-Extended-Cluster-Anti-Spoofing/m-p/249483#M48723</guid>
      <dc:creator>Kurpeus</dc:creator>
      <dc:date>2025-05-21T11:23:38Z</dc:date>
    </item>
  </channel>
</rss>

