<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Anti-Spoofing detection in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/209055#M10388</link>
    <description>&lt;P&gt;You need to ensure routes are defined for all subnets that are connected to the LAN and/or DMZ interface (directly or via another hop).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 18 Mar 2024 17:07:17 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2024-03-18T17:07:17Z</dc:date>
    <item>
      <title>Anti-Spoofing detection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/207137#M10380</link>
      <description>&lt;P&gt;We've systems in the subnet A.A.A.A which is not directly connected with the firewall. While generating traffic from those systems (A.A.A.A) to servers behind the firewall (B.B.B.B), firewall blocks the traffic with the reason "anti spoofing". After disabling anti-spoofing feature, it's allowed.&lt;/P&gt;&lt;P&gt;Hope, Anti-Spoofing detects if a packet with an IP address that is behind a certain interface, arrives from a different interface. In our topology, network A.A.A.A not behind any firewall interface, so why we're getting anti-spoofing detect. Attached our topology.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 12:24:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/207137#M10380</guid>
      <dc:creator>mageshkumarg</dc:creator>
      <dc:date>2024-02-26T12:24:47Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Spoofing detection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/207185#M10381</link>
      <description>&lt;P&gt;Anti spoofing verify that each packet arrived with src IP is really configured to be behind the ingress interface.&lt;/P&gt;
&lt;P&gt;so if A.A.A.A arriving to the FW from the left interface in diagram, you need to enter this interface in smartconsole (assuming you are centrally managed) , and configure inside the networks behind this interface (the point to point + any subnets behind it).&lt;/P&gt;
&lt;P&gt;any other subnets that not explicitly configured would expect to arrive only via the external interfaces.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 15:48:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/207185#M10381</guid>
      <dc:creator>AmirArama</dc:creator>
      <dc:date>2024-02-26T15:48:56Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Spoofing detection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/207223#M10382</link>
      <description>&lt;P&gt;Hi Amir,&lt;/P&gt;&lt;P&gt;So you mean, all the subnets which is not directly connected with firewall like A.A.A.A will be detected as Spoof?&lt;/P&gt;&lt;P&gt;Also, our quantum spark 1600 security appliances is locally managed, how to permit the external subnets like A.A.A.A in locally managed firewall?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2024 05:58:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/207223#M10382</guid>
      <dc:creator>mageshkumarg</dc:creator>
      <dc:date>2024-02-27T05:58:05Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Spoofing detection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/207226#M10383</link>
      <description>&lt;P&gt;I think it uses the routing table also as information for AS. So if you add the networks there the will be allowed.&lt;/P&gt;
&lt;P&gt;I cannot find it in documentation so I dont have an example.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2024 08:13:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/207226#M10383</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-02-27T08:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Spoofing detection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/207243#M10384</link>
      <description>&lt;P&gt;Hi Lesley,&lt;/P&gt;&lt;P&gt;For return traffic, I already have static route to A.A.A.A subnet with the next hop as X.X.X.1. But still the traffic detected as Spoof.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2024 09:32:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/207243#M10384</guid>
      <dc:creator>mageshkumarg</dc:creator>
      <dc:date>2024-02-27T09:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Spoofing detection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/207313#M10385</link>
      <description>&lt;P&gt;You mention "&lt;SPAN&gt;network A.A.A.A not behind any firewall interface," -- for the purposes of anti-spoofing, A.A.A.A is behind your X.X.X.2 interface.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The anti-spoofing configuration is typically going to be consistent with your routing table as far as what network topology is defined "behind" which interfaces.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2024 20:18:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/207313#M10385</guid>
      <dc:creator>Lloyd_Braun</dc:creator>
      <dc:date>2024-02-27T20:18:32Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Spoofing detection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/208983#M10386</link>
      <description>&lt;P&gt;I think, anti-spoofing is evaluating the traffic based on interface type. By default external interface will allow all the external traffic except internal interface subnet and internal interface permit only directly connected network.&lt;/P&gt;&lt;P&gt;We are locally managing the firewall, Hence we unable to select interface type. It's undefined. So how, Anti spoof evaluate traffic from undefined interface? May be it's considering undefined interface as Internal?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 09:35:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/208983#M10386</guid>
      <dc:creator>mageshkumarg</dc:creator>
      <dc:date>2024-03-18T09:35:12Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Spoofing detection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/208994#M10387</link>
      <description>&lt;P&gt;Could you please provide the firmware version and routing table details as relevant to your example?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 11:51:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/208994#M10387</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-03-18T11:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Spoofing detection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/209055#M10388</link>
      <description>&lt;P&gt;You need to ensure routes are defined for all subnets that are connected to the LAN and/or DMZ interface (directly or via another hop).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 17:07:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/209055#M10388</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-03-18T17:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Spoofing detection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/209463#M10417</link>
      <description>&lt;P&gt;Hi Chris,&lt;/P&gt;&lt;P&gt;Details given below.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Firmware version :- R81.10.07&lt;/P&gt;&lt;P&gt;FW-1&amp;gt; show route&lt;BR /&gt;Codes: C - Connected, S - Static, R - RIP, B - BGP (D - Default),&lt;BR /&gt;O - OSPF IntraArea (IA - InterArea, E - External, N - NSSA),&lt;BR /&gt;A - Aggregate, K - Kernel Remnant, H - Hidden, P - Suppressed,&lt;BR /&gt;NP - NAT Pool, U - Unreachable, i - Inactive&lt;/P&gt;&lt;P&gt;C B.B.B.96/28 is directly connected, LANBOND0.108&lt;BR /&gt;LANBOND0.108&lt;BR /&gt;C X.X.X.0/29 is directly connected, LANBOND1&lt;BR /&gt;LANBOND1&lt;BR /&gt;S A.A.A.0/24 via X.X.X.1, LANBOND1, cost 0, age 3953839&lt;BR /&gt;S Y.Y.Y.8/32 via B.B.B.110, LANBOND0.108, cost 0, age 3953839&lt;BR /&gt;C 127.0.0.0/8 is directly connected, lo&lt;BR /&gt;lo&lt;BR /&gt;FW-1&amp;gt;&lt;/P&gt;&lt;P&gt;Source :- A.A.A.19&lt;BR /&gt;Destination :- B.B.B.100,&lt;/P&gt;&lt;P&gt;Source :- A.A.A.19&lt;BR /&gt;Destination :- Y.Y.Y.8&lt;/P&gt;&lt;P&gt;Both traffic flow detected by AS and dropped.&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Topology (2).PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/24982iCCEFB27DB4069017/image-size/large?v=v2&amp;amp;px=999" role="button" title="Topology (2).PNG" alt="Topology (2).PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2024 06:39:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/209463#M10417</guid>
      <dc:creator>mageshkumarg</dc:creator>
      <dc:date>2024-03-22T06:39:40Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Spoofing detection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/209481#M10418</link>
      <description>&lt;P&gt;Are all the concerned addresses from RFC1918 space?&lt;/P&gt;
&lt;P&gt;When practical I would also recommend upgrading to R81.10.08 or higher.&lt;/P&gt;
&lt;P&gt;I feel like we're otherwise missing something here and perhaps it's something that would be more easily navigated via a remote session with TAC.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2024 11:59:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/209481#M10418</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-03-22T11:59:30Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Spoofing detection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/209688#M10432</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;TAC unable to find root cause of the issue. They recommended to upgrade the firewall version. After upgraded firewall to latest version, issue got resolved.&lt;/P&gt;&lt;P&gt;Thanks all.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2024 10:48:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Anti-Spoofing-detection/m-p/209688#M10432</guid>
      <dc:creator>mageshkumarg</dc:creator>
      <dc:date>2024-03-26T10:48:32Z</dc:date>
    </item>
  </channel>
</rss>

