- CheckMates
- :
- Products
- :
- General Topics
- :
- Anti-spoofing set to "detect" on internal interfac...
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Anti-spoofing set to "detect" on internal interface recommendation.
Afternoon all.
I've just come off a call with a Check Point TAC support person related to a ticket raised for odd behaviour of anti-spoofing. The TAC person spent a good portion of the call trying to convince me that it is Check Point recommended best practice to have anti-spoofing on internal interfaces set to "detect" instead of "prevent", although when challenged they couldn't point me to any official documentation to that effect.
I've been working with Check Point products since 2006 and this is first time I'm hearing this claim. Anyone else heard this before?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Prevent is the correct way. Detect is noted in documentation as following (R81)
-
Anti-Spoofing action is set to - Select this option to define if packets will be rejected (the Prevent option) or whether the packets will be monitored (the Detect option). The Detect option is used for monitoring purposes and should be used in conjunction with one of the tracking options. It serves as a tool for learning the topology of a network without actually preventing packets from passing.
If you like this post please give a thumbs up(kudo)! 🙂
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Prevent is both common & best practice.
There are exceptions and without further context of the issue / circumstances involved it's difficult to comment further.
