<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Some office mode traffic dropped due to anti spoof in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Some-office-mode-traffic-dropped-due-to-anti-spoof/m-p/85686#M17209</link>
    <description>&lt;P&gt;Hi Timothy,&lt;/P&gt;&lt;P&gt;No NAT taking place to / from OM ranges, verified this multiple times.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I disable anti-spoofing on either the external interface or even just within the cluster object's VPN clients settings traffic flows normally and as expected (disabling either one of the two causes traffic to flow).&lt;/P&gt;&lt;P&gt;Has to be said, I've implemented this multiple times without issue, and I also did a similiar test in my lab over the weekend just to see if it's perhaps an issue with Take 191 - but worked perfectly.&amp;nbsp; Will escalate to TAC tomorrow.&lt;/P&gt;&lt;P&gt;Thanks for taking the time to respond, much appreciated!&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Ruan&lt;/P&gt;</description>
    <pubDate>Mon, 18 May 2020 15:46:44 GMT</pubDate>
    <dc:creator>Ruan_Kotze</dc:creator>
    <dc:date>2020-05-18T15:46:44Z</dc:date>
    <item>
      <title>Some office mode traffic dropped due to anti spoof</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Some-office-mode-traffic-dropped-due-to-anti-spoof/m-p/85157#M17150</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I have a scenario whereby only some traffic from office mode IP's is being dropped by antispoof.&lt;/P&gt;&lt;P&gt;Symptoms:&lt;/P&gt;&lt;P&gt;Some connection from the client works fine, e.g. DNS traffic, https intranet etc.&amp;nbsp; Some traffic however is being dropped, with anti spoofing on the external interface given as the reason.&amp;nbsp; Specifically, the traffic being dropped is RADmin.&amp;nbsp; The other observation is that all allowed traffic shows up as being encrypted in the RemoteAccess community, whereas the dropped traffic does not.&amp;nbsp; In all cases the source IP is the same.&amp;nbsp; All was working until about two weeks ago, with no apparent changes done.&lt;/P&gt;&lt;P&gt;&amp;nbsp;What I have verified:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Back Connections enabled&lt;/LI&gt;&lt;LI&gt;NAT disabled to / from Office mode IPs&lt;/LI&gt;&lt;LI&gt;Office-Mode anti spoofing enabled&lt;/LI&gt;&lt;LI&gt;Office-mode IPs are excluded from external interface anti spoof&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The one red flag is that for this specific user the gateway is handing out an IP address that is included in the gateway's encryption domain (via ipassignment.conf).&lt;/P&gt;&lt;P&gt;Environment is running R80.30 take 191.&lt;/P&gt;&lt;P&gt;Any pointers would be appreciated.&lt;/P&gt;&lt;P&gt;Ruan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 07:58:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Some-office-mode-traffic-dropped-due-to-anti-spoof/m-p/85157#M17150</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2020-05-14T07:58:20Z</dc:date>
    </item>
    <item>
      <title>Re: Some office mode traffic dropped due to anti spoof</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Some-office-mode-traffic-dropped-due-to-anti-spoof/m-p/85270#M17167</link>
      <description>&lt;P&gt;Office Mode addresses assigned to Remote Access clients should not appear in the VPN Domain of the firewall.&amp;nbsp; However you can work around this by going to the Topology Settings screen of the external interface, checking the Antispoofing box "Don't check packets from", and then put in the Office Mode IP block(s).&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 14:06:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Some-office-mode-traffic-dropped-due-to-anti-spoof/m-p/85270#M17167</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-05-14T14:06:51Z</dc:date>
    </item>
    <item>
      <title>Re: Some office mode traffic dropped due to anti spoof</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Some-office-mode-traffic-dropped-due-to-anti-spoof/m-p/85297#M17171</link>
      <description>&lt;P&gt;Hi Timothy,&lt;/P&gt;&lt;P&gt;Thanks for your response, very satisfied buyer of both your books!&amp;nbsp;&lt;/P&gt;&lt;P&gt;We did exclude the OM IP's on the external interface.&amp;nbsp; The intriguing thing is that only *some* traffic from the client is dropped.&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Ruan&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 15:36:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Some-office-mode-traffic-dropped-due-to-anti-spoof/m-p/85297#M17171</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2020-05-14T15:36:16Z</dc:date>
    </item>
    <item>
      <title>Re: Some office mode traffic dropped due to anti spoof</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Some-office-mode-traffic-dropped-due-to-anti-spoof/m-p/85299#M17172</link>
      <description>&lt;P&gt;Please provide the redacted log card, is it inbound antispoofing or outbound antispoofing that is dropping it?&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 15:39:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Some-office-mode-traffic-dropped-due-to-anti-spoof/m-p/85299#M17172</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-05-14T15:39:30Z</dc:date>
    </item>
    <item>
      <title>Re: Some office mode traffic dropped due to anti spoof</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Some-office-mode-traffic-dropped-due-to-anti-spoof/m-p/85637#M17207</link>
      <description>&lt;P&gt;Hi Timothy,&lt;/P&gt;&lt;P&gt;Apologies for the delayed response.&lt;/P&gt;&lt;P&gt;It's inbound antispoofing that's dropping the traffic, on the external interface of the gateway.&amp;nbsp; Host 172.16.100.109 is the OM IP, 172.16.200.222 is the internal host.&lt;/P&gt;&lt;P&gt;The traffic that is being dropped by AS is replies to traffic originating from inside.&amp;nbsp; If I do a unsolicited connection from the OM IP to inside, it works fine.&lt;/P&gt;&lt;P&gt;Below is one of the AS logs:&lt;/P&gt;&lt;P&gt;Time:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2020-05-18T07:26:39Z&lt;/P&gt;&lt;P&gt;Interface Direction:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound&lt;/P&gt;&lt;P&gt;Interface Name:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; eth7&lt;/P&gt;&lt;P&gt;Id Generated By Indexer: false&lt;/P&gt;&lt;P&gt;First:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; true&lt;/P&gt;&lt;P&gt;Sequencenum:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 245&lt;/P&gt;&lt;P&gt;Source:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.100.109&lt;/P&gt;&lt;P&gt;Source Port:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4899&lt;/P&gt;&lt;P&gt;Destination:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.200.222&lt;/P&gt;&lt;P&gt;Destination Port:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 53637&lt;/P&gt;&lt;P&gt;IP Protocol:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;6&lt;/P&gt;&lt;P&gt;Message Information:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Address spoofing&lt;/P&gt;&lt;P&gt;Session ID:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;Destination Machine Name:172.16.200.222&lt;/P&gt;&lt;P&gt;Action:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Drop&lt;/P&gt;&lt;P&gt;Type:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Log&lt;/P&gt;&lt;P&gt;Policy Date:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2020-05-18T07:12:00Z&lt;/P&gt;&lt;P&gt;Blade:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Firewall&lt;/P&gt;&lt;P&gt;Origin:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; xxxx&lt;/P&gt;&lt;P&gt;Service:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TCP/53637&lt;/P&gt;&lt;P&gt;Product Family:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Access&lt;/P&gt;&lt;P&gt;Interface:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; eth7&lt;/P&gt;&lt;P&gt;Description:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TCP/53637 Traffic Dropped from xxxx (172.16.100.109) to xxxx (172.16.200.222)&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Ruan&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 09:42:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Some-office-mode-traffic-dropped-due-to-anti-spoof/m-p/85637#M17207</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2020-05-18T09:42:41Z</dc:date>
    </item>
    <item>
      <title>Re: Some office mode traffic dropped due to anti spoof</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Some-office-mode-traffic-dropped-due-to-anti-spoof/m-p/85673#M17208</link>
      <description>&lt;P&gt;Do you have an automatic Hide NAT defined for the&amp;nbsp;&lt;SPAN&gt;172.16.100.0/24 object or whatever the OM IP range is?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I'm suspecting you may have something else wrong that is keeping this specific connectivity from working beyond just your antispoofing drops, which may only be a symptom.&amp;nbsp; If you disable gateway antispoofing enforcement "on the fly" as detailed in the article below, do those connections start working?&amp;nbsp; My guess is they won't...&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://community.checkpoint.com/t5/Access-Control-Products/can-anyone-tell-me-the-correct-command-to-disbale-anti-spoofing/m-p/85381#M1878" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Access-Control-Products/can-anyone-tell-me-the-correct-command-to-disbale-anti-spoofing/m-p/85381#M1878&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 15:22:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Some-office-mode-traffic-dropped-due-to-anti-spoof/m-p/85673#M17208</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-05-18T15:22:40Z</dc:date>
    </item>
    <item>
      <title>Re: Some office mode traffic dropped due to anti spoof</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Some-office-mode-traffic-dropped-due-to-anti-spoof/m-p/85686#M17209</link>
      <description>&lt;P&gt;Hi Timothy,&lt;/P&gt;&lt;P&gt;No NAT taking place to / from OM ranges, verified this multiple times.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I disable anti-spoofing on either the external interface or even just within the cluster object's VPN clients settings traffic flows normally and as expected (disabling either one of the two causes traffic to flow).&lt;/P&gt;&lt;P&gt;Has to be said, I've implemented this multiple times without issue, and I also did a similiar test in my lab over the weekend just to see if it's perhaps an issue with Take 191 - but worked perfectly.&amp;nbsp; Will escalate to TAC tomorrow.&lt;/P&gt;&lt;P&gt;Thanks for taking the time to respond, much appreciated!&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Ruan&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 15:46:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Some-office-mode-traffic-dropped-due-to-anti-spoof/m-p/85686#M17209</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2020-05-18T15:46:44Z</dc:date>
    </item>
    <item>
      <title>Re: Some office mode traffic dropped due to anti spoof</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Some-office-mode-traffic-dropped-due-to-anti-spoof/m-p/90331#M18065</link>
      <description>Hi Ruan,&lt;BR /&gt;&lt;BR /&gt;I'm facing something similar. What was the fix for you in the end?&lt;BR /&gt;&lt;BR /&gt;Regards</description>
      <pubDate>Wed, 01 Jul 2020 16:23:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Some-office-mode-traffic-dropped-due-to-anti-spoof/m-p/90331#M18065</guid>
      <dc:creator>Juan_</dc:creator>
      <dc:date>2020-07-01T16:23:33Z</dc:date>
    </item>
    <item>
      <title>Re: Some office mode traffic dropped due to anti spoof</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Some-office-mode-traffic-dropped-due-to-anti-spoof/m-p/90362#M18070</link>
      <description>It boiled down to two things for us, either disable anti-spoofing on in the cluster object's VPN clients settings or hand out a OM IP range that did not overlap with the encryption domain. We changed the OM IP range, that seemed the better way to go long-term.</description>
      <pubDate>Thu, 02 Jul 2020 05:48:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Some-office-mode-traffic-dropped-due-to-anti-spoof/m-p/90362#M18070</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2020-07-02T05:48:07Z</dc:date>
    </item>
  </channel>
</rss>

