<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: A Primer on Anti-Spoofing in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23052#M4579</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Agreed, I'm pretty sure these kernel variables didn't exist back in the day. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 31 Aug 2018 16:08:33 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2018-08-31T16:08:33Z</dc:date>
    <item>
      <title>A Primer on Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23042#M4569</link>
      <description>&lt;P&gt;Every once in a while, I run across a discussion around Check Point, and I think: you know, I wrote something about that back in the day.&lt;BR /&gt;Today, that topic is Anti-Spoofing.&lt;BR /&gt;The feature hasn't changed all that much since the first versions of the product.&lt;BR /&gt;That said, a major improvement is coming in the R80.20 release!&lt;/P&gt;
&lt;P&gt;One of the ways it manifested itself back in the old days was you would see a packet accepted on one rule (say, rule 4), then immediately dropped by Rule 0.&lt;/P&gt;
&lt;P&gt;You'd have log entries that looked like so (using "fw log" output):&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&lt;TT style="color: #555555; background-color: #f8f8f8; border: 1px solid #eaeaea; font-weight: 300; font-size: 14px; margin: 0px 2px; padding: 0px 5px;"&gt;17:13:45 accept kyle&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt;le0 proto tcp src jungleman dst kyle service telnet s_port 2390 len 48 rule 4&lt;/TT&gt;&lt;SPAN style="color: #444444; background-color: #ffffff; font-weight: 300;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR style="color: #444444; background-color: #ffffff; font-weight: 300;" /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&lt;TT style="color: #555555; background-color: #f8f8f8; border: 1px solid #eaeaea; font-weight: 300; font-size: 14px; margin: 0px 2px; padding: 0px 5px;"&gt;17:13:45 reject kyle&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/TT&gt;&lt;/SPAN&gt;&lt;TT&gt;&lt;/TT&gt;&lt;/P&gt;
&lt;P&gt;Pretty much since day one, the security gateway has always inspected packets against the rulebase twice:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;When the packet enters the firewall&lt;/LI&gt;
&lt;LI&gt;When the packet is exiting the firewall (after it has been routed)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Older versions of Check Point had some ways to modify this behavior (e.g. the "Apply Gateway Rules to Interface Direction" feature and "Install On"), but this did not apply to anti-spoofing, where the above logic always applies.&lt;/P&gt;
&lt;P&gt;When anti-spoofing checks fail, they show up in the logs as either drops or rejects on rule 0. If you get a log entry that looks like:&lt;/P&gt;
&lt;P&gt;&lt;TT style="color: #555555; background-color: #f8f8f8; border: 1px solid #eaeaea; font-weight: 300; font-size: 14px; margin: 0px 2px; padding: 0px 5px;"&gt;&lt;SPAN style="color: #555555; background-color: #f8f8f8; font-weight: 300; font-size: 14px; font-family: 'courier new', courier, monospace;"&gt;17:13:45 drop&amp;nbsp;&amp;nbsp; kyle&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt;le0 proto tcp src jungleman dst kyle service telnet s_port 2390 len 48 rule 0&lt;/SPAN&gt;&lt;/TT&gt;&lt;/P&gt;
&lt;P&gt;it means that the source IP of the traffic (in this case jungleman) is not properly included in le0's "valid addresses" setting.&lt;BR /&gt;If, on the other hand, you see something like this (as was the example above):&lt;/P&gt;
&lt;P&gt;&lt;TT style="color: #555555; background-color: #f8f8f8; border: 1px solid #eaeaea; font-weight: 300; font-size: 14px; margin: 0px 2px; padding: 0px 5px;"&gt;17:13:45 reject kyle&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/TT&gt;&lt;/P&gt;
&lt;P&gt;it means that the destination IP of the traffic (in this case, kyle) is not in qe0's "valid addresses" setting.&lt;/P&gt;
&lt;P&gt;Note this may actually indicate a routing problem, particularly if the interface it is being rejected on is not the interface you expect.&lt;/P&gt;
&lt;H2&gt;How Does NAT Factor In?&lt;/H2&gt;
&lt;P&gt;In currently supported versions,&amp;nbsp;NAT occurs before routing, but only if "Perform Destination Translation on Client Side" is enabled in the Global Properties, Network Address Translation section.&lt;/P&gt;
&lt;P&gt;In FireWall-1 4.1 and earlier, both the incoming and outgoing anti-spoof checks are performed before address translation. This means that any traffic passing through the firewall must pass anti-spoofing checks before address translation rules are applied.&lt;/P&gt;
&lt;H2&gt;What about Dynamic Routing?&lt;/H2&gt;
&lt;P&gt;In an environment where the gateway participates in Dynamic Routing, if routing makes a change that is inconsistent with the anti-spoofing configuration, traffic could easily be dropped.&lt;BR /&gt;This has led some customers to disable anti-spoofing (which is, of course, not recommended).&lt;/P&gt;
&lt;P&gt;In R80.20+ Gateways, there is an option to have routing define the anti-spoofing configuration.&lt;BR /&gt;You can see this option starting in R80.20.M1 and it's available for gateways R80.20 and above:&lt;/P&gt;
&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/69910_pastedImage_6.png" border="0" /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2019 15:40:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23042#M4569</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-09-06T15:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: A Primer on Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23043#M4570</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;gt;&amp;gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;In R80.20 Gateways, there&amp;nbsp;will be an&amp;nbsp;option to have dynamic routing define the anti-spoofing configuration.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Finally!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2018 07:07:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23043#M4570</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-08-29T07:07:38Z</dc:date>
    </item>
    <item>
      <title>Re: A Primer on Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23044#M4571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Everyone is waiting for R80.20 to reach GA state because of all these improvements it features.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2018 07:09:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23044#M4571</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2018-08-29T07:09:06Z</dc:date>
    </item>
    <item>
      <title>Re: A Primer on Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23045#M4572</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We need more Production EA customers &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2018 15:46:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23045#M4572</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-08-29T15:46:35Z</dc:date>
    </item>
    <item>
      <title>Re: A Primer on Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23046#M4573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;About time for the dynamic routing integration with anti-spoofing!&lt;/P&gt;&lt;P&gt;It was one of the major pains for me in the past, when designing highly survivable infrastructures, as I had to account for all possible networks hitting the interface in question.&lt;/P&gt;&lt;P&gt;This, in turn, relaxed the normal security state, as that traffic was always allowed.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2018 17:26:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23046#M4573</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-08-29T17:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: A Primer on Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23047#M4574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Dameon.&lt;/P&gt;&lt;P&gt;Thank you for starting the topic on anti-spoofing.&lt;/P&gt;&lt;P&gt;Back in the day (R76), Check Point published a document regarding anti-spoofing; see: &lt;A href="https://sc1.checkpoint.com/documents/R76/CP_R76_Firewall_WebAdmin/92703.htm"&gt;Preventing IP Spoofing. &lt;/A&gt;The document shows the following picture:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Preventing IP Spoofing" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/69938_92904.png" /&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="2" cellspacing="0" style="border-collapse: collapse;" width="444"&gt;&lt;TBODY&gt;&lt;TR align="left" valign="top"&gt;&lt;TH bgcolor="#F5F6FB" style="border: 1px solid #DDDDDD;" width="50"&gt;&lt;P class=""&gt;Item&lt;/P&gt;&lt;/TH&gt;&lt;TH bgcolor="#F5F6FB" style="border: 1px solid #DDDDDD;" width="147"&gt;&lt;P class=""&gt;Description&lt;/P&gt;&lt;/TH&gt;&lt;TH style="border-left: 1px solid #DDDDDD; border-right: 1px solid #DDDDDD;" width="35"&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;/TH&gt;&lt;TH bgcolor="#F5F6FB" style="border: 1px solid #DDDDDD;" width="53"&gt;&lt;P class=""&gt;Item&lt;/P&gt;&lt;/TH&gt;&lt;TH bgcolor="#F5F6FB" style="border: 1px solid #DDDDDD;" width="159"&gt;&lt;P class=""&gt;Description&lt;/P&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="50"&gt;&lt;P class=""&gt;1&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="147"&gt;&lt;P class=""&gt;Interface IF1&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-left: 1px solid #DDDDDD; border-right: 1px solid #DDDDDD;" width="35"&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="53"&gt;&lt;P class=""&gt;6&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="159"&gt;&lt;P class=""&gt;Florida_LAN&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="50"&gt;&lt;P class=""&gt;2&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="147"&gt;&lt;P class=""&gt;Interface IF2&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-left: 1px solid #DDDDDD; border-right: 1px solid #DDDDDD;" width="35"&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="53"&gt;&lt;P class=""&gt;7&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="159"&gt;&lt;P class=""&gt;Alaska_RND_LAN&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="50"&gt;&lt;P class=""&gt;3&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="147"&gt;&lt;P class=""&gt;Interface IF3&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-left: 1px solid #DDDDDD; border-right: 1px solid #DDDDDD;" width="35"&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="53"&gt;&lt;P class=""&gt;8&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="159"&gt;&lt;P class=""&gt;Internet&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="50"&gt;&lt;P class=""&gt;4&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="147"&gt;&lt;P class=""&gt;Interface IF4&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-left: 1px solid #DDDDDD; border-right: 1px solid #DDDDDD;" width="35"&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="53"&gt;&lt;P class=""&gt;9&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="159"&gt;&lt;P class=""&gt;Alaska_GW&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="50"&gt;&lt;P class=""&gt;5&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="147"&gt;&lt;P class=""&gt;Alaska_LAN&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-left: 1px solid #DDDDDD; border-right: 1px solid #DDDDDD;" width="35"&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="53"&gt;&lt;P class=""&gt;10&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #DDDDDD;" width="159"&gt;&lt;P class=""&gt;Alaska_RND_GW&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;For the Alaska_GW, the Firewall makes sure that:&lt;/P&gt;&lt;UL class=""&gt;&lt;LI class=""&gt;All incoming packets to IF1 come from the Internet.&lt;/LI&gt;&lt;LI class=""&gt;All incoming packets to IF2 come from Alaska_LAN or, Alaska_RND_LAN or Florida_LAN.&lt;/LI&gt;&lt;/UL&gt;&lt;P class=""&gt;For the Alaska_RND_GW, the Firewall makes sure that:&lt;/P&gt;&lt;UL class=""&gt;&lt;LI class=""&gt;All incoming packets to IF3 come from Alaska_LAN, Florida_LAN or the Internet.&lt;/LI&gt;&lt;LI class=""&gt;All incoming packets to IF4 come from Alaka_RND_LAN.&lt;/LI&gt;&lt;/UL&gt;&lt;P class=""&gt;When you configure Anti-spoofing for a Security Gateway, specify if the interfaces go to the Internet (External) or an internal network (Internal).&lt;/P&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN style="text-decoration: underline;"&gt;Assumptions:&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;The diagram depicted above is a VSX/VSLS cluster.&lt;/LI&gt;&lt;LI&gt;The name of the gateway with interfaces if1 and if2 is vs1. if1 is connected to an ISP router.&lt;/LI&gt;&lt;LI&gt;The name of the gateway with interfaces if3 and if4 is vs2.&lt;/LI&gt;&lt;LI&gt;OSPF is configured for both vs1 and vs2.&lt;/LI&gt;&lt;LI&gt;Routes towards Internet are advertised on both vs1 and vs2: O E 0.0.0.0/0 via 192.168.1.250&lt;/LI&gt;&lt;/OL&gt;&lt;P class=""&gt;&lt;SPAN style="text-decoration: underline;"&gt;Questions:&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;For VSX/VSLS, could dynamic routing define the anti-spoofing configuration in R80.20?&lt;/LI&gt;&lt;LI&gt;How would you configure if3, defined in vs2, when using R80.20 (if1, if2, and if4 are obvious)?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;As External (leads out to the Internet)?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-2 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/69939_screen.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;As Internal&amp;nbsp; (leads to the local network) + Networks defined by routes?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-3 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/69943_screen1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Or something else? Please describe.&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I set up a lab environment earlier this week with R80.20 Public EA (August) but still get address spoofing messages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2018 21:05:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23047#M4574</guid>
      <dc:creator>Kris_Pellens</dc:creator>
      <dc:date>2018-08-30T21:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: A Primer on Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23048#M4575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you using an R80.20 EA Gateway as well?&lt;/P&gt;&lt;P&gt;That looks like the correct configuration, but it's possible this is not functioning in the Public EA as of yet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2018 21:33:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23048#M4575</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-08-30T21:33:38Z</dc:date>
    </item>
    <item>
      <title>Re: A Primer on Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23049#M4576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV class=""&gt;&lt;P&gt;Yes Dameon, we are using R80.20 EA; we hope R80.20 will be released soon, because we have to migrate our Cisco ASA 5585 appliances to Check Point 23800 &lt;SPAN style="text-decoration: underline;"&gt;before&lt;/SPAN&gt; the end of the year. As soon as R80.20 is officially released, we can open TAC cases; at the moment, we can't.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which one is the correct one, first (external) or second (internal + networks defined by routes) configuration? Please confirm.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the example above, interface if3 can receive packets from private networks and public networks. How would you configure the topology for if3 then? Can you give an example for R80.10 and R80.20 (because I have no clue; and I can't find an example in Check Point's documentation)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks.&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2018 22:57:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23049#M4576</guid>
      <dc:creator>Kris_Pellens</dc:creator>
      <dc:date>2018-08-30T22:57:24Z</dc:date>
    </item>
    <item>
      <title>Re: A Primer on Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23050#M4577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if3 should be defined as External.&lt;/P&gt;&lt;P&gt;External really means "all IPs not defined as valid on other interfaces."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, for example, if I have a gateway with:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;eth1: 192.168.1.1/24 (only this subnet behind the interface)&lt;/LI&gt;&lt;LI&gt;eth2: 172.16.0.1/24 (Various subnets in the 172.16.0.0/16 range are reachable from this interface)&lt;/LI&gt;&lt;LI&gt;eth3: 192.0.2.1/24 (Facing Internet)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The anti-spoofing configuration would be:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;eth1: Internal &amp;gt; Defined by IP and Netmask&lt;/LI&gt;&lt;LI&gt;eth2: Internal &amp;gt; Specific (Network object that represents 172.16.0.0/16)&lt;/LI&gt;&lt;LI&gt;eth3: External&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means that every IP that is not in 192.168.1.0/24 or 172.16.0.0/16 is considered valid on eth3 (regardless of whether it's a private IP or not).&lt;/P&gt;&lt;P&gt;This applies to all versions (including R80.20).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that makes things clear.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2018 23:14:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23050#M4577</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-08-30T23:14:08Z</dc:date>
    </item>
    <item>
      <title>Re: A Primer on Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23051#M4578</link>
      <description>&lt;P&gt;Although these commands have been previously disclosed, no anti-spoofing discussion would be complete without the real-time "panic button" gateway commands to temporarily disable anti-spoofing:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class=""&gt;fw ctl set int fw_antispoofing_enabled 0&lt;/DIV&gt;
&lt;DIV class=""&gt;sim feature anti_spoofing off; fwaccel off; fwaccel on&lt;/DIV&gt;
&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class=""&gt;&lt;STRONG&gt;Edit: Due to the changes introduced for SecureXL in R80.20+, the above commands (specifically the &lt;EM&gt;sim feature&lt;/EM&gt; command) will only work on an R80.10 or earlier gateway.&amp;nbsp; &amp;nbsp;For later versions see further down in this thread.&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class=""&gt;--&lt;BR /&gt;Second Edition of my "Max Power" Firewall Book&lt;BR /&gt;Now Availaible at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank" rel="noopener"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/DIV&gt;</description>
      <pubDate>Sat, 31 Aug 2019 16:28:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23051#M4578</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-08-31T16:28:46Z</dc:date>
    </item>
    <item>
      <title>Re: A Primer on Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23052#M4579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Agreed, I'm pretty sure these kernel variables didn't exist back in the day. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Aug 2018 16:08:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23052#M4579</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-08-31T16:08:33Z</dc:date>
    </item>
    <item>
      <title>Re: A Primer on Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23053#M4580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree for me is the one of biggest pain as well. So I'm happy to see it will change finally. Unfortunatelly we must always wait until new releases like R80.20 will settle down little bit after GA and after thet we can put it into production. So it seems I need to stay tunned and wait until I'll be to fully enjoy it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Sep 2018 08:21:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23053#M4580</guid>
      <dc:creator>Petr_Hantak</dc:creator>
      <dc:date>2018-09-06T08:21:34Z</dc:date>
    </item>
    <item>
      <title>Re: A Primer on Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23054#M4581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;The steps taken in R80 towards zone-ized anti-spoofing groups is a positive direction&amp;nbsp;imho, the ease of use I have found with the change is welcome. Why uRPF has been so difficult and complicated to implement here has always been a mystery for me.&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;Having said that, using dynamic routing on firewalls has been controversial for as long as I've reluctantly been labelled 'a firewall guy' (too long a time). I think we all know the risks inherent in security zones that can be dynamically changed through triggers via adjacent advertisements and the implications of a compromised router on access control under those circumstances.&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;The integration of uRPF and OSPF has long been useful for for rapid first hop dropping of virus/worm infected hosts in operations situations (where injecting a null route into the table is used to black hole infected hosts quickly). I've seen this done when firewalls are overloaded and unresponsive (it's quick, effective and less resource cost to block at the L3 switch).&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;I wonder if a similar use case could be made here with these features (for legitimate or nefarious purposes).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Sep 2018 23:42:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23054#M4581</guid>
      <dc:creator>Iain_King</dc:creator>
      <dc:date>2018-09-10T23:42:15Z</dc:date>
    </item>
    <item>
      <title>Re: A Primer on Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23055#M4582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This has just saved me some time, thankfully in the lab environment.&lt;/P&gt;&lt;P&gt;BTW, I am seeing:&amp;nbsp; &lt;STRONG&gt;Command 'sim feature' has been replaced. Use 'fwaccel feature' instead.&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Mar 2019 23:07:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/23055#M4582</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-03-02T23:07:21Z</dc:date>
    </item>
    <item>
      <title>Re: A Primer on Anti-Spoofing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/61580#M12474</link>
      <description>&lt;P&gt;The ability to disable anti-spoofing "on the fly" in SecureXL has been reintroduced with the R80.30 gateway release, but at this time it only works on an R80.30 gateway that is using the new 3.10 kernel and on R80.20 Jumbo Take 103+.&amp;nbsp; I can't see any reason why the 3.10 kernel would be required for this feature, so the relevant SecureXL kernel variable &lt;STRONG&gt;sim_anti_spoofing_enabled&lt;/STRONG&gt; may well be retroactively introduced into R80.30 using the older 2.6.18 kernel in a future Jumbo HFA.&amp;nbsp; I'm assuming the R80.30 SIM code for kernel version 3.10 is on a separate track from the kernel 2.6.18 SIM code which would explain the discrepancy.&lt;/P&gt;
&lt;P&gt;Without further ado, here are the commands I successfully tested in my lab to disable anti-spoofing "on the fly" for an R80.30 kernel version 3.10 gateway, or R80.20 Jumbo Take 103+:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;fw&amp;nbsp; ctl&amp;nbsp; set&amp;nbsp; int&amp;nbsp; fw_antispoofing_enabled&amp;nbsp; 0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Set operation succeeded&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;fw&amp;nbsp; ctl&amp;nbsp; set&amp;nbsp; int&amp;nbsp; sim_anti_spoofing_enabled&amp;nbsp; 0&amp;nbsp; -a&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;SIM:&lt;BR /&gt;Set operation succeeded&lt;BR /&gt;FW:&lt;BR /&gt;kiss_params: failed to update VS0&lt;BR /&gt;Set operation failed: failed to get parameter sim_anti_spoofing_enabled&lt;BR /&gt;set: Operation failed: Invalid argument&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Note that SecureXL does NOT need to be restarted with &lt;STRONG&gt;fwaccel off;fwaccel on &lt;/STRONG&gt;for the SIM change to take effect like it did in R80.10 and earlier with the &lt;STRONG&gt;sim feature&lt;/STRONG&gt; command.&lt;/P&gt;
&lt;P&gt;Also note the use of the new &lt;STRONG&gt;-a&lt;/STRONG&gt; option which attempts to get or set a kernel variable in BOTH the Firewall Worker/Instances and the SIM driver (SND/IRQ) simultaneously like this, so errors on one side or the other will certainly be encountered:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;fw&amp;nbsp; ctl&amp;nbsp; get&amp;nbsp; int&amp;nbsp; fw_antispoofing_enabled&amp;nbsp; -a&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;FW:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;fw_antispoofing_enabled = 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;SIM:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Failed to get from ppak&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;fw&amp;nbsp; ctl&amp;nbsp; get&amp;nbsp; int&amp;nbsp; sim_anti_spoofing_enabled&amp;nbsp; -a&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;FW:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Get operation failed: failed to get parameter sim_anti_spoofing_enabled&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;SIM:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;sim_anti_spoofing_enabled = 0&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;This new &lt;STRONG&gt;-a&lt;/STRONG&gt; option for &lt;STRONG&gt;fw ctl set/get&lt;/STRONG&gt; was introduced in R80.20, and for the first time allows SIM/SecureXL variables to be queried for their live values and even be modified "on the fly" which was not possible in R80.10 and earlier; to modify SIM/SecureXL variables in those earlier releases the new SIM variable values had to be placed in the simkern.conf file and the firewall rebooted.&lt;/P&gt;</description>
      <pubDate>Sun, 01 Sep 2019 02:50:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/A-Primer-on-Anti-Spoofing/m-p/61580#M12474</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-09-01T02:50:14Z</dc:date>
    </item>
  </channel>
</rss>

