<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Strange Firewall logic for DHCP discover packets in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Strange-Firewall-logic-for-DHCP-discover-packets/m-p/10349#M1458</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I programmed tcpdump drivers years ago.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem is that 0.0.0.0 is used as any address in many IP stacks. The 0.0.0.0 IP address is sometimes called a wildcard address, unspecified address or INADDR_ANY.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;# define INADDR_ANY ((unsigned long int) 0x00000000)&lt;BR /&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Therefore the address is not used as a real IP address. Furthermore, in some old IP stacks there are mathematical problems with 0.0.0.0, so it would never be allowed as real IP.&lt;/P&gt;&lt;P&gt;I think Check Point firewalls also intercepts the address 0.0.0.0. I would even prevent the SmartConsole software from entering the 0.0.0.0 address. But I haven't tried the input yet to see if it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" height="147" src="https://community.checkpoint.com/legacyfs/online/checkpoint/72898_pastedImage_1.png" width="490" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At R77.30 you can enter the IP 0.0.0.0. What side effects this will have:-)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Heiko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 26 Oct 2018 21:03:59 GMT</pubDate>
    <dc:creator>HeikoAnkenbrand</dc:creator>
    <dc:date>2018-10-26T21:03:59Z</dc:date>
    <item>
      <title>Strange Firewall logic for DHCP discover packets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Strange-Firewall-logic-for-DHCP-discover-packets/m-p/10347#M1456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Using R77.30 firewall we were trying to allow DHCP discover packets to our gateway which had been configured as DHCP server. We have found DHCP discover packets drop on our firewall. These packets had source IP 0.0.0.0 and destination 255.255.255.255. So, we made a permissive rule with&amp;nbsp;&amp;nbsp;respective source and destination and service bootp. Firewall still drops the packets. TAC recommended us to change source to any, we did it and firewall accepted those packets. On the next step I have created IP address range object with first IP 0.0.0.1 and last IP 255.255.255.255, added it to source instead of any and negated source cell. As a result - firewall accepts our DHCP discover packets. When I change first IP in range to 0.0.0.0, firewall drops DHCP discover packets. Can somebody explain, why we can not use as source host 0.0.0.0 to accept this traffic but when we exclude every IP address except 0.0.0.0 from source, it works properly?&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2018 07:22:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Strange-Firewall-logic-for-DHCP-discover-packets/m-p/10347#M1456</guid>
      <dc:creator>Serhii_Yaholnyt</dc:creator>
      <dc:date>2018-10-26T07:22:14Z</dc:date>
    </item>
    <item>
      <title>Re: Strange Firewall logic for DHCP discover packets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Strange-Firewall-logic-for-DHCP-discover-packets/m-p/10348#M1457</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #101010; background-color: #ffffff;"&gt;The IP address 0.0.0.0 has several special meanings on computer networks. However, it can not be used as a general-purpose device address. Probably therefore CP don't understand the range.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #101010; background-color: #ffffff;"&gt;Read more here :&amp;nbsp;&lt;A href="https://www.lifewire.com/four-zero-ip-address-818384"&gt;https://www.lifewire.com/four-zero-ip-address-818384&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2018 09:21:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Strange-Firewall-logic-for-DHCP-discover-packets/m-p/10348#M1457</guid>
      <dc:creator>ED</dc:creator>
      <dc:date>2018-10-26T09:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: Strange Firewall logic for DHCP discover packets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Strange-Firewall-logic-for-DHCP-discover-packets/m-p/10349#M1458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I programmed tcpdump drivers years ago.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem is that 0.0.0.0 is used as any address in many IP stacks. The 0.0.0.0 IP address is sometimes called a wildcard address, unspecified address or INADDR_ANY.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;# define INADDR_ANY ((unsigned long int) 0x00000000)&lt;BR /&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Therefore the address is not used as a real IP address. Furthermore, in some old IP stacks there are mathematical problems with 0.0.0.0, so it would never be allowed as real IP.&lt;/P&gt;&lt;P&gt;I think Check Point firewalls also intercepts the address 0.0.0.0. I would even prevent the SmartConsole software from entering the 0.0.0.0 address. But I haven't tried the input yet to see if it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" height="147" src="https://community.checkpoint.com/legacyfs/online/checkpoint/72898_pastedImage_1.png" width="490" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At R77.30 you can enter the IP 0.0.0.0. What side effects this will have:-)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Heiko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2018 21:03:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Strange-Firewall-logic-for-DHCP-discover-packets/m-p/10349#M1458</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-26T21:03:59Z</dc:date>
    </item>
    <item>
      <title>Re: Strange Firewall logic for DHCP discover packets</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Strange-Firewall-logic-for-DHCP-discover-packets/m-p/10350#M1459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check Point will&amp;nbsp;also drop your traffic if it has source or destination port defined as 0. It is done for similar reasons and for security.&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk27109" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk27109"&gt;SmartView Tracker drop logs show "Invalid TCP packet - source / destination port 0"...&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Oct 2018 13:39:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Strange-Firewall-logic-for-DHCP-discover-packets/m-p/10350#M1459</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-10-27T13:39:29Z</dc:date>
    </item>
  </channel>
</rss>

