<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Bypass Address Spoofing for a Specific Protocol in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Bypass-Address-Spoofing-for-a-Specific-Protocol/m-p/249544#M48739</link>
    <description>&lt;P&gt;Interesting question...personally, never heard of such a thing being feasable, but maybe you can verify with TAC.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Wed, 21 May 2025 21:29:30 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-05-21T21:29:30Z</dc:date>
    <item>
      <title>Bypass Address Spoofing for a Specific Protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Bypass-Address-Spoofing-for-a-Specific-Protocol/m-p/249511#M48731</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am receiving a lot of detect logs in the firewall caused by the bootp protocol. The problem is that the APs ask for an IP address for the clients using the same interface in which they ask for their own IP address (although they are different networks).&lt;/P&gt;&lt;P&gt;I know I can disable address spoofing for specific networks in the "Gateways and Servers" section but I can´t find anything similar for protocols. I also have thought about using&amp;nbsp;&lt;SPAN&gt;fast_accel but I am not sure if this would work since address spoofing is checked before firewall rules are applied.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;So, all in all, Is there any way to bypass the address spoofing check for the bootp protocol?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 15:04:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Bypass-Address-Spoofing-for-a-Specific-Protocol/m-p/249511#M48731</guid>
      <dc:creator>Solkah</dc:creator>
      <dc:date>2025-05-21T15:04:27Z</dc:date>
    </item>
    <item>
      <title>Re: Bypass Address Spoofing for a Specific Protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Bypass-Address-Spoofing-for-a-Specific-Protocol/m-p/249513#M48733</link>
      <description>&lt;P&gt;Firstly, why do you need to do that in the first place?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, I don't believe it is possible to bypass antispoofing for some of the traffic but not all the rest.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Finally, please see if you can find your case and resolution in this SK:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk104114" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk104114&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 15:29:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Bypass-Address-Spoofing-for-a-Specific-Protocol/m-p/249513#M48733</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-05-21T15:29:26Z</dc:date>
    </item>
    <item>
      <title>Re: Bypass Address Spoofing for a Specific Protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Bypass-Address-Spoofing-for-a-Specific-Protocol/m-p/249526#M48736</link>
      <description>&lt;P&gt;bootp is a legacy service so i suspect you configured dhcp incorrectly. Also bypass anti-spoofing with only a service like bootp is not possible. AS is based on IP's / networks. What port is used is not relevant for this feature&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 16:55:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Bypass-Address-Spoofing-for-a-Specific-Protocol/m-p/249526#M48736</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-05-21T16:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: Bypass Address Spoofing for a Specific Protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Bypass-Address-Spoofing-for-a-Specific-Protocol/m-p/249543#M48738</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/116680"&gt;@Solkah&lt;/a&gt;&amp;nbsp; if both networks, the APs network and the clients network are behind the same interface of your gateway you have to configure both networks for this interface in the AntiSpoofing settings.&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 20:22:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Bypass-Address-Spoofing-for-a-Specific-Protocol/m-p/249543#M48738</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2025-05-21T20:22:13Z</dc:date>
    </item>
    <item>
      <title>Re: Bypass Address Spoofing for a Specific Protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Bypass-Address-Spoofing-for-a-Specific-Protocol/m-p/249544#M48739</link>
      <description>&lt;P&gt;Interesting question...personally, never heard of such a thing being feasable, but maybe you can verify with TAC.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 21:29:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Bypass-Address-Spoofing-for-a-Specific-Protocol/m-p/249544#M48739</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-21T21:29:30Z</dc:date>
    </item>
    <item>
      <title>Re: Bypass Address Spoofing for a Specific Protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Bypass-Address-Spoofing-for-a-Specific-Protocol/m-p/249609#M48752</link>
      <description>&lt;P&gt;Pretty sure this is not possible, and using fact_accel will not help since SecureXL/sim enforces antispoofing directly on SND's.&lt;/P&gt;</description>
      <pubDate>Thu, 22 May 2025 12:17:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Bypass-Address-Spoofing-for-a-Specific-Protocol/m-p/249609#M48752</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2025-05-22T12:17:35Z</dc:date>
    </item>
  </channel>
</rss>

