<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Packet doesn't leave the FW. It ate my packets! in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28841#M5867</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Show us the topology info for your external interface. It is still incorrect.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 24 Sep 2018 12:16:36 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2018-09-24T12:16:36Z</dc:date>
    <item>
      <title>Packet doesn't leave the FW. It ate my packets!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28829#M5855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Need your expertise!&lt;/P&gt;&lt;P&gt;Packet from R80.10 firewall doesn't leave the box?&lt;/P&gt;&lt;P&gt;The FW (its external interface at 10.0.0.111) can ping its default gateway (10.0.0.1) which is behind a NAT going out to the internet. However, the FW can't reach google or ComCast DNS (75.75.75.75 or 8.8.8.8).&amp;nbsp;These IPs are&amp;nbsp;reachable by other host in 10.0.0.0/24 subnet). Traceroute at the FW indicates the packet doesn't leave the box! Did the FW eat the packets? Internal network is ok, I could ssh into the FW.&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See attached picture for the trouble firewall.....am I missing something?&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="70820" alt="Packet doesn" t="" leave="" the="" r80.10="" firewall.="" the="" fw="" ate="" all="" packets="" /&gt;&lt;/P&gt;&lt;P&gt;hoangsa@ubun2svr:~$ ping 8.8.8.8 -c 2&lt;BR /&gt;PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.&lt;BR /&gt;64 bytes from 8.8.8.8: icmp_seq=1 ttl=121 time=11.8 ms&lt;BR /&gt;64 bytes from 8.8.8.8: icmp_seq=2 ttl=121 time=10.4 ms&lt;/P&gt;&lt;P&gt;--- 8.8.8.8 ping statistics ---&lt;BR /&gt;2 packets transmitted, 2 received, 0% packet loss, time 1001ms&lt;BR /&gt;rtt min/avg/max/mdev = 10.407/11.127/11.848/0.728 ms&lt;BR /&gt;hoangsa@ubun2svr:~$ ping 75.75.75.75 -c 2&lt;BR /&gt;PING 75.75.75.75 (75.75.75.75) 56(84) bytes of data.&lt;BR /&gt;64 bytes from 75.75.75.75: icmp_seq=1 ttl=58 time=10.5 ms&lt;BR /&gt;64 bytes from 75.75.75.75: icmp_seq=2 ttl=58 time=9.48 ms&lt;BR /&gt;--- 75.75.75.75 ping statistics ---&lt;BR /&gt;2 packets transmitted, 2 received, 0% packet loss, time 1001ms&lt;BR /&gt;rtt min/avg/max/mdev = 9.486/10.041/10.597/0.564 ms&lt;BR /&gt;hoangsa@ubun2svr:~$&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Sep 2018 03:14:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28829#M5855</guid>
      <dc:creator>Matthew_Do</dc:creator>
      <dc:date>2018-09-23T03:14:19Z</dc:date>
    </item>
    <item>
      <title>Re: Packet doesn't leave the FW. It ate my packets!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28830#M5856</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;very strange.... able to access the internet only after all rules are removed.&lt;/P&gt;&lt;P&gt;HQ-FW1&amp;gt; fw unloadlocal&lt;/P&gt;&lt;P&gt;Uninstalling Security Policy from all.all@HQ-FW1&lt;BR /&gt;Done.&lt;BR /&gt;HQ-FW1&amp;gt; fw stat&lt;BR /&gt;HOST POLICY DATE&lt;BR /&gt;localhost - - - : &amp;gt;eth0 &amp;lt;eth0 &amp;gt;eth1 &amp;lt;eth1 &amp;gt;eth2&lt;BR /&gt;HQ-FW1&amp;gt; ping 8.8.8.8 -c 1&lt;BR /&gt;PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.&lt;BR /&gt;64 bytes from 8.8.8.8: icmp_seq=1 ttl=121 time=10.5 ms&lt;/P&gt;&lt;P&gt;:::::::.......&lt;/P&gt;&lt;P&gt;HQ-FW1&amp;gt; traceroute 8.8.8.8&lt;BR /&gt;traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 40 byte packets&lt;BR /&gt; 1 10.0.0.1 (10.0.0.1) 16.733 ms 16.681 ms 16.705 ms&lt;BR /&gt; 2 96.120.25.229 (96.120.25.229) 26.779 ms 26.769 ms 26.719 ms&lt;BR /&gt; 3 162.151.173.129 (162.151.173.129) 26.713 ms 26.661 ms 26.685 ms&lt;BR /&gt; 4 68.86.184.146 (68.86.184.146) 26.540 ms 26.640 ms 26.618 ms&lt;BR /&gt; 5 be-121-ar01.area4.il.chicago.comcast.net (69.139.203.169) 27.454 ms 27.412 ms 28.348 ms&lt;BR /&gt; 6 be-33491-cr02.350ecermak.il.ibone.comcast.net (68.86.91.165) 28.307 ms 13.031 ms 39.374 ms&lt;BR /&gt; 7 be-10563-pe01.350ecermak.il.ibone.comcast.net (68.86.82.158) 30.555 ms 39.274 ms 30.509 ms&lt;BR /&gt; 8 as15169.350ecermak.il.ibone.comcast.net (75.149.230.110) 39.178 ms 30.349 ms 75.149.230.26 (75.149.230.26) 39.173 ms&lt;BR /&gt; 9 * * *&lt;BR /&gt;10 108.170.233.86 (108.170.233.86) 39.120 ms 216.239.51.144 (216.239.51.144) 30.267 ms 216.239.42.108 (216.239.42.108) 39.041 ms&lt;BR /&gt;11 209.85.250.7 (209.85.250.7) 30.730 ms 72.14.235.245 (72.14.235.245) 39.036 ms 108.170.236.101 (108.170.236.101) 39.009 ms&lt;BR /&gt;12 google-public-dns-a.google.com (8.8.8.8) 20.045 ms 20.026 ms 19.953 ms&lt;BR /&gt;HQ-FW1&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Sep 2018 04:10:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28830#M5856</guid>
      <dc:creator>Matthew_Do</dc:creator>
      <dc:date>2018-09-23T04:10:52Z</dc:date>
    </item>
    <item>
      <title>Re: Packet doesn't leave the FW. It ate my packets!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28831#M5857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;and this is what happened when the policy is re-applied&amp;nbsp;......... (FW got drunk?)&lt;/P&gt;&lt;P&gt;HQ-FW1&amp;gt; fw fetch 172.16.0.25&lt;/P&gt;&lt;P&gt;Fetching FW1 Security Policy From: 172.16.0.25&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; Local Policy is Up-To-Date.&lt;BR /&gt; Reinstalling Local Policy.&lt;/P&gt;&lt;P&gt;Installing Security Policy Basic-Rules on all.all@HQ-FW1&lt;BR /&gt;Using username "admin".&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&amp;lt; I had to restart ssh session.&amp;nbsp; Rules are re-applied, the prompt is back but not the GUI&lt;BR /&gt;This is HQ-FW1. Authorized personnel only.&lt;BR /&gt;admin@172.16.0.111's password:&lt;BR /&gt;Last login: Sat Sep 22 23:12:16 2018 from 172.16.0.9&lt;BR /&gt;HQ-FW1&amp;gt; fw stat&lt;BR /&gt;HOST POLICY DATE&lt;BR /&gt;localhost Basic-Rules 22Sep2018 23:25:37 : [&amp;gt;eth0] [&amp;lt;eth0] [&amp;gt;eth1] [&amp;lt;eth1] [&amp;gt;eth2]&lt;BR /&gt;HQ-FW1&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="FW GUI (https) stays &amp;quot;loading&amp;quot; forever" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70821_r80.10-fw2.PNG" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Sep 2018 04:41:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28831#M5857</guid>
      <dc:creator>Matthew_Do</dc:creator>
      <dc:date>2018-09-23T04:41:20Z</dc:date>
    </item>
    <item>
      <title>Re: Packet doesn't leave the FW. It ate my packets!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28832#M5858</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/63322"&gt;Matthew Do&lt;/A&gt;‌, there is nothing strange. FW GW is a security device. Policy is important.&lt;BR /&gt;&lt;BR /&gt;Please make sure you apply appropriate policy allowing you require. Also, if this is a newly installed device, check the topology is properly defined, and you have both internal and at least one external interfaces probably defined on FW object.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To see why packets are not forwarded, you ca use "fw ctl zdebug drop | grep &amp;lt;IP in question&amp;gt;" command on cli to understand why packets are dropped.&lt;BR /&gt;&lt;BR /&gt;BTW, I have moved your post into more appropriate area and removed unnecessary tag&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Sep 2018 11:24:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28832#M5858</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-09-23T11:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: Packet doesn't leave the FW. It ate my packets!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28833#M5859</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Traffic originating from the firewall itself is a bit of a special case, and must still be allowed in the Firewall/Network Policy Layer by an explicit rule or the implied rule "Accept outgoing packets originating from gateway" since that traffic still passes through inspection points o and O.&amp;nbsp; As Val mentioned topology and antispoofing are enforced as well and must be properly defined.&amp;nbsp; Because traffic originated from the firewall itself does not pass through iI where destination NAT operations occur, it is impossible to NAT the destination address of this type of traffic but the source IP address can most definitely still be NATted.&amp;nbsp; When you unload policy NAT is disabled too, so I suspect you are source NATting traffic originated from the firewall to something the Comcast modem is not expecting.&amp;nbsp; Probably not relevant here, but also keep in mind that traffic originated from the firewall or bound for the firewall itself is never accelerated by SecureXL and will always go F2F.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see the slides from my CPX Barcelona/Vegas presentation where I talk about how to troubleshoot what I call the "Roach Motel" situation where packets enter the firewall, but mysteriously disappear (get "eaten") with no logging indication of what happened to them:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-2739"&gt;Best of CheckMates CLI&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Sep 2018 12:12:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28833#M5859</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-09-23T12:12:38Z</dc:date>
    </item>
    <item>
      <title>Re: Packet doesn't leave the FW. It ate my packets!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28834#M5860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you gentlemen... below is the reason but I don't know how to fix yet. The reason I tried the ping from FW is internal host (172.16.1.22) couldn't ping any thing from the internet although the packet is routed to the FW (172.16.1.111)&lt;/P&gt;&lt;P&gt;The FW ext interface is 10.0.0.111.&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70832_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Sep 2018 13:12:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28834#M5860</guid>
      <dc:creator>Matthew_Do</dc:creator>
      <dc:date>2018-09-23T13:12:11Z</dc:date>
    </item>
    <item>
      <title>Re: Packet doesn't leave the FW. It ate my packets!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28835#M5861</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" height="476" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70833_pastedImage_1.png" width="459" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70834_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and that your policy does not drop the ICMP replies.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Sep 2018 13:26:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28835#M5861</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-09-23T13:26:06Z</dc:date>
    </item>
    <item>
      <title>Re: Packet doesn't leave the FW. It ate my packets!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28836#M5862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks. Is your CP FW behind another FW?&lt;/P&gt;&lt;P&gt;These are the cfg on my FW. However, this CP FW is behind another FW (NAT) and SNAT is being used at 2 places (CP and ComCast FW). In your case, probably public IP is assigned to eth1 (ext interface) and there is no NAT after that.&lt;/P&gt;&lt;P&gt;In addition, not only ICMP can't get out but also http, udp etc.&lt;/P&gt;&lt;P&gt;Probably, I need to study Timothy Hall's suggestion above..&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70836_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Sep 2018 16:13:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28836#M5862</guid>
      <dc:creator>Matthew_Do</dc:creator>
      <dc:date>2018-09-23T16:13:16Z</dc:date>
    </item>
    <item>
      <title>Re: Packet doesn't leave the FW. It ate my packets!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28837#M5863</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please see my post above.&lt;/P&gt;&lt;P&gt;You did not configure your Forewall's topology properly: your External Interface is not defined.&lt;/P&gt;&lt;P&gt;It should look something like this:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70838_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In step 3, chose the interface connected to your ISP's router.&lt;/P&gt;&lt;P&gt;In step 7, you can chose "According to topology: ExternalZone"&lt;/P&gt;&lt;P&gt;Settings in Step 8, "Anti-Spoofing" are likely the reason you are seeing the messages shown in your screenshot above.&lt;/P&gt;&lt;P&gt;You still should keep it on "Prevent", but for experiment, you may disable "Perform Anti-Spoofing based on interface topology" load the policy ignoring the warning and see if you are getting replies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then revert to normal Anti-Spoofing settings.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Sep 2018 22:11:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28837#M5863</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-09-23T22:11:40Z</dc:date>
    </item>
    <item>
      <title>Re: Packet doesn't leave the FW. It ate my packets!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28838#M5864</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Antispoofing drops mean your topology is not properly defined. Look into interface topologies to fix the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2018 08:06:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28838#M5864</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-09-24T08:06:26Z</dc:date>
    </item>
    <item>
      <title>Re: Packet doesn't leave the FW. It ate my packets!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28839#M5865</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vladimir, this is helpful but still doesn't resolve my issue. The FW was reconfigured as your pictures suggested &amp;amp; published but still get the same output when a ping was attempted at internal host (172.16.0.7):&lt;/P&gt;&lt;P&gt;The same result for both cases: (enable&amp;nbsp;or disable perform Anti-Spoofing....)&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" height="257" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70844_pastedImage_3.png" width="269" /&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70848_pastedImage_8.png" /&gt;&lt;/P&gt;&lt;P&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.249.107.254:80 -&amp;gt; 10.0.0.111:35062 IPP 6&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 205.185.216.10:80 -&amp;gt; 10.0.0.111:10062 IPP 6&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.249.107.254:80 -&amp;gt; 10.0.0.111:35062 IPP 6&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.8.8.8:0 -&amp;gt; 10.0.0.111:10005 IPP 1&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.249.107.254:80 -&amp;gt; 10.0.0.111:35062 IPP 6&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.249.107.254:80 -&amp;gt; 10.0.0.111:35062 IPP 6&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.249.107.254:80 -&amp;gt; 10.0.0.111:35062 IPP 6&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.249.107.254:80 -&amp;gt; 10.0.0.111:35062 IPP 6&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 205.185.216.10:80 -&amp;gt; 10.0.0.111:10062 IPP 6&amp;gt;, dropped by do_inbound, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.8.8.8:0 -&amp;gt; 10.0.0.111:10005 IPP 1&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 69.89.207.99:123 -&amp;gt; 10.0.0.111:123 IPP 17&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.248.45.254:80 -&amp;gt; 10.0.0.111:35063 IPP 6&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.248.45.254:80 -&amp;gt; 10.0.0.111:35063 IPP 6&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.248.45.254:80 -&amp;gt; 10.0.0.111:35063 IPP 6&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.8.8.8:0 -&amp;gt; 10.0.0.111:10005 IPP 1&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.248.45.254:80 -&amp;gt; 10.0.0.111:35063 IPP 6&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.8.8.8:0 -&amp;gt; 10.0.0.111:10005 IPP 1&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.248.45.254:80 -&amp;gt; 10.0.0.111:35063 IPP 6&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" height="215" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70846_pastedImage_7.png" width="225" /&gt;&lt;/P&gt;&lt;P&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.252.10.254:80 -&amp;gt; 10.0.0.111:10074 IPP 6&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.8.8.8:0 -&amp;gt; 10.0.0.111:35006 IPP 1&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.249.107.254:80 -&amp;gt; 10.0.0.111:10075 IPP 6&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.8.8.8:0 -&amp;gt; 10.0.0.111:35006 IPP 1&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.249.107.254:80 -&amp;gt; 10.0.0.111:10075 IPP 6&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.249.107.254:80 -&amp;gt; 10.0.0.111:10075 IPP 6&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.249.107.254:80 -&amp;gt; 10.0.0.111:10075 IPP 6&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.8.8.8:0 -&amp;gt; 10.0.0.111:35006 IPP 1&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.249.107.254:80 -&amp;gt; 10.0.0.111:10075 IPP 6&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.249.107.254:80 -&amp;gt; 10.0.0.111:10075 IPP 6&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;BR /&gt;;[cpu_0];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 8.8.8.8:0 -&amp;gt; 10.0.0.111:35006 IPP 1&amp;gt;, dropped by handle_spoofed_susp, Reason: Address spoofing;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2018 12:10:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28839#M5865</guid>
      <dc:creator>Matthew_Do</dc:creator>
      <dc:date>2018-09-24T12:10:59Z</dc:date>
    </item>
    <item>
      <title>Re: Packet doesn't leave the FW. It ate my packets!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28840#M5866</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you install the policy after publishing the changes?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2018 12:16:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28840#M5866</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-09-24T12:16:18Z</dc:date>
    </item>
    <item>
      <title>Re: Packet doesn't leave the FW. It ate my packets!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28841#M5867</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Show us the topology info for your external interface. It is still incorrect.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2018 12:16:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28841#M5867</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-09-24T12:16:36Z</dc:date>
    </item>
    <item>
      <title>Re: Packet doesn't leave the FW. It ate my packets!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28842#M5868</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One of the root causes was...&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70869_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70870_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2018 04:22:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28842#M5868</guid>
      <dc:creator>Matthew_Do</dc:creator>
      <dc:date>2018-09-25T04:22:32Z</dc:date>
    </item>
    <item>
      <title>Re: Packet doesn't leave the FW. It ate my packets!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28843#M5869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can some expert please explain or share link to the answer?&lt;BR /&gt;I'm still unclear about the difference and when it would be appropriate to use one of the following options:&lt;BR /&gt;1) CP GWY: NAT &amp;gt; Advanced &amp;gt; Add automatic address translation rules &amp;gt; to hide this gateway behind another gateway&lt;BR /&gt;2) CP GWY: NAT &amp;gt; Hide internal networks behind the gateway's external IP&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2018 12:41:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28843#M5869</guid>
      <dc:creator>Matthew_Do</dc:creator>
      <dc:date>2018-09-25T12:41:47Z</dc:date>
    </item>
    <item>
      <title>Re: Packet doesn't leave the FW. It ate my packets!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28844#M5870</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. If you have two gateways, i.e. Internal and External, the setting "&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;CP GWY: NAT &amp;gt; Advanced &amp;gt; Add automatic address translation rules &amp;gt; to hide this gateway behind another gateway" allows you to specify that either:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;a). you'll be hiding your Internal Gateway behind IP address of the External interface of your External Gateway&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;In this case, you have to specify the actual External Gateway, behind who's IP you are hiding and the NAT rule will be installed on that unit:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70881_pastedImage_2.png" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;b). &lt;SPAN&gt;you'll be hiding your Internal Gateway behind IP address of another NAT capable device, such as your ISPs router.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;So if you have a single gateway with internal network 10.0.0.0/24 and external network 192.168.1.0/24 connected to the ISP router's internal port and the external port having a single public IP (for example 20.20.20.1/30) assigned to the router, you can specify that in this setting:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70880_pastedImage_1.png" /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;What you cannot do is hide your gateway behind it's own external IP, as this will look like dog chasing it's own tail.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;2. The "&lt;SPAN style="background-color: #ffffff;"&gt;CP GWY: NAT &amp;gt; Hide internal networks behind the gateway's external IP" simply allows you to hide all of your internal networks behind external IP of your single gateway.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN style="background-color: #ffffff;"&gt;I.e. it is the same thing any home router is doing by overloading single public IP with the internal network range on its way out to the Internet.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN style="background-color: #ffffff;"&gt;It is seldom used in business environments that have multiple public IPs or entire network ranges from ISPs, as a more prudent approach is to "Hide" or "Statically NAT" individual hosts or networks behind either external interface of the gateway (for general access to the Internet), or particular IPs (for inbound traffic, such as mail, FTP, etc..).&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2018 13:03:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Packet-doesn-t-leave-the-FW-It-ate-my-packets/m-p/28844#M5870</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-09-25T13:03:49Z</dc:date>
    </item>
  </channel>
</rss>

