- Products
- Learn
- Local User Groups
- Partners
- More
Stop Babysitting Rules.
Go Agentic
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
I'm trying to configure the anti-spoofing on some newly installed Spark 1535 and 1555 gateways. These are all centrally managed so i'd expect to be able to manage this from the topology tab of the gateway object however when I edit the interfaces here and look at the anti-spoofing tab i'm seeing the settings all greyed out. I can see what appear to be the current settings but I can't change anything. I'm also seeing some enabled and some disabled which is strange as all gateways have been built in the same way.
There are no settings on the device directly (device-advanced settings), and nothing in global properties, but it's almost like there is a global setting somewhere on the SMS that is preventing me from changing the anti-spoofing settings on the spark devices.
I've been through the admin guide looking for options but it doesn't mention anything that suggests that there is a global control for this.
Can anyone advise what I'm missing here please?
Thanks, Steve
Just checked in the lab...make sure attached option is set, should work then.
Andy
You have to set manual topology definition.
I do..its because thats ONLY available for external interface.
Andy
Let me try this in the lab on smb object and will update you. I would logically assume for centrally managed, you must be able to do this, for sure.
Andy
Hi Andy,
Perfect thanks!
This is the first time i've used centrally managed sparks so its been a learning curve! Looks like the anti-spoofing is either on or off with no options for detect/prevent as you get on the bigger gateways, so i'll need to be careful that I don't lock myself out as they are all quite a distance away!
Steve
Of course, no problem, glad we can help. Yes, Im always careful if making topology changes when accessing fw remotely, because one small mistake can lead to access being lost...
Andy
Hi Andy,
Still seeing options greyed out here.
Whilst the Option to enable Antispoofing is now available, the "Don not check packets from" option remains unavailable! (see attached).
Any idea why this would be?
Thanks,
Steve
I do..its because thats ONLY available for external interface.
Andy
You have to set manual topology definition.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 20 | |
| 19 | |
| 9 | |
| 9 | |
| 8 | |
| 7 | |
| 6 | |
| 5 | |
| 4 | |
| 4 |
Fri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceTue 02 Jun 2026 @ 10:00 AM (AEST)
The Cloud Architect Series: Check Point WAF. The next generation of AI-Powered Protection - APACTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesTue 02 Jun 2026 @ 10:00 AM (AEST)
The Cloud Architect Series: Check Point WAF. The next generation of AI-Powered Protection - APACTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeThu 04 Jun 2026 @ 07:00 PM (IDT)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - AmericaFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY