- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hey CP-Team
I have the case, that there is a Cluster which many (Virtual) Interfaces which was not updated in SmartDashboard for long time. So I was wondering about 2 things:
Thanks and best regards
Interfaces that are defined in the Gaia OS but not listed in the gateway/cluster object will not have antispoofing enforced as Dameon mentioned. However traffic to and from those missing interfaces will be automatically classified as External (technically it is not explicitly defined as Internal) and blades such as APCL/URLF & possibly Threat Prevention will tend to pull traffic crossing this interface into at least the Medium Path for inspection due to the inclusion of this missing interface in dynamic object "Internet". If this is a busy, high-speed interface it can have a dramatic impact on the CPU load of the firewall and cause noticeable delays for all traffic. From my book:
So at long last, we are ready to describe exactly what object “Internet” will match when used in our policies:
Hi Linus,
to answer your questions:
Hi Linus,
right, with "central configuration of the firewall management" I don`t mean the local configuration of the specific FW which can be showed using <show configuration>.
You wrote:"Because I thought Anti-Spoofing-Settings might be derived from GW-(Cluster-)Member config or routing-table automatically" <- this is not correct as you figured out by now. You always have to keep your central (firewall management) and local (firewall) topology configuration consistent. And as you further noted by all the answers in this thread we recommend to do this manually, meaning don't use the buttons to load in the firewall's interface and topology information into the firewall management automatically.
Interfaces that are defined in the Gaia OS but not listed in the gateway/cluster object will not have antispoofing enforced as Dameon mentioned. However traffic to and from those missing interfaces will be automatically classified as External (technically it is not explicitly defined as Internal) and blades such as APCL/URLF & possibly Threat Prevention will tend to pull traffic crossing this interface into at least the Medium Path for inspection due to the inclusion of this missing interface in dynamic object "Internet". If this is a busy, high-speed interface it can have a dramatic impact on the CPU load of the firewall and cause noticeable delays for all traffic. From my book:
So at long last, we are ready to describe exactly what object “Internet” will match when used in our policies:
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 66 | |
| 19 | |
| 13 | |
| 12 | |
| 11 | |
| 10 | |
| 9 | |
| 7 | |
| 7 | |
| 7 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY