- CheckMates
- :
- CloudMates Products
- :
- Cloud Network Security
- :
- Local interface address spoofing
Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Matthias_Honold
Explorer
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
2020-07-24
04:39 AM
Local interface address spoofing
Hello,
We ve got an issue with "Local interface address spoofing" on a Cloudguard GW.
We're running a Monitoring Solution which sends ping and snmp requests to Cloudguard Management Network.
This issue occors only for the GW which resides on the same ESXi Host where the Monitoring Solution is running. Other Cloudguard GWs can be reached without any issue. If the monitoring solution is migrated to a different ESXi Host the problem also occures on the new ESXi Host. In fw monitor I can see that traffic is hitting eth2 interface which it shouldn't. We're on the latest Patchlevel for Cloudguard on NSX-V.
I found sk105899, but im not sure if it's applicable.
How can we fix this?
Best Regards
2 Replies
This widget could not be displayed.
Labels
-
ACI
1 -
API
1 -
architecture
4 -
Automation
3 -
Automation and APIs
1 -
Aviatrix
1 -
AWS
6 -
Azure
5 -
Azure DevOps
1 -
bash
1 -
CDT
1 -
cisco
1 -
Cisco ACI
1 -
Cloud
3 -
Cloud - Automation - Orchestration
1 -
Cloud network security
2 -
Cloud Security
1 -
cloudappsecurity
1 -
CloudGuard
4 -
CloudGuard IaaS
4 -
cloudwatch
1 -
Cluster
1 -
ClusterXL
1 -
deployment
2 -
DevSecOps
1 -
DHCP
1 -
DirectConnect
1 -
firewall
1 -
Gaia
1 -
IaC
1 -
identity
1 -
loadbalancer
1 -
MDS 80.40
1 -
multi cloud
1 -
NAT
1 -
NDR
1 -
networking
1 -
next generation firewall
1 -
NSX-T
2 -
private
1 -
public
1 -
R81
1 -
R81.10
1 -
reference
1 -
script
1 -
Site to Site VPN
1 -
Smart Console
1 -
Structura.io
1 -
technical
1 -
Terraform
3 -
TGW
1 -
VMSS
1 -
vsec_lic_cli
1
- « Previous
- Next »