<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Anti-Spoofing on VTI interfaces in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Anti-Spoofing-on-VTI-interfaces/m-p/254679#M49866</link>
    <description>&lt;P&gt;Do NOT enable anti spoofing on it, as its not supposed to be on anyway. By default, when they are configured in web UI, when you get interfaces without topology, it would come up as anti spoofing disabled, which is totally fine.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Wed, 06 Aug 2025 23:18:18 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-08-06T23:18:18Z</dc:date>
    <item>
      <title>Anti-Spoofing on VTI interfaces</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Anti-Spoofing-on-VTI-interfaces/m-p/254669#M49863</link>
      <description>&lt;P&gt;I'm working on a system at the moment that has a single cluster and has been linked to SASE with redundant tunnels. This is all working fine, however when you push the policy it completes with a warning about no anti-spoofing in the VTI interfaces. Having not worked with route based VPN's before, I just wanted to check to see if there are any reasons not to simply enable the anti-spoofing as usual on these interfaces?&lt;/P&gt;&lt;P&gt;They show as "Leads To: Point to point" and it appears that you can enable it in prevent mode only as there is no option to select between Detect and Prevent.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 16:20:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Anti-Spoofing-on-VTI-interfaces/m-p/254669#M49863</guid>
      <dc:creator>StevePearson</dc:creator>
      <dc:date>2025-08-06T16:20:11Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Spoofing on VTI interfaces</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Anti-Spoofing-on-VTI-interfaces/m-p/254673#M49864</link>
      <description>&lt;P&gt;You can configure AS for VTI interfaces. Please see:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/Route-Based-VPN.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/Route-Based-VPN.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;section:&amp;nbsp;Configuring Anti-Spoofing on VTIs in SmartConsole&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 19:25:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Anti-Spoofing-on-VTI-interfaces/m-p/254673#M49864</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-08-06T19:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Spoofing on VTI interfaces</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Anti-Spoofing-on-VTI-interfaces/m-p/254679#M49866</link>
      <description>&lt;P&gt;Do NOT enable anti spoofing on it, as its not supposed to be on anyway. By default, when they are configured in web UI, when you get interfaces without topology, it would come up as anti spoofing disabled, which is totally fine.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 23:18:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Anti-Spoofing-on-VTI-interfaces/m-p/254679#M49866</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-08-06T23:18:18Z</dc:date>
    </item>
  </channel>
</rss>

