- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hey CP-Team
I have the case, that there is a Cluster which many (Virtual) Interfaces which was not updated in SmartDashboard for long time. So I was wondering about 2 things:
Thanks and best regards
Interfaces that are defined in the Gaia OS but not listed in the gateway/cluster object will not have antispoofing enforced as Dameon mentioned. However traffic to and from those missing interfaces will be automatically classified as External (technically it is not explicitly defined as Internal) and blades such as APCL/URLF & possibly Threat Prevention will tend to pull traffic crossing this interface into at least the Medium Path for inspection due to the inclusion of this missing interface in dynamic object "Internet". If this is a busy, high-speed interface it can have a dramatic impact on the CPU load of the firewall and cause noticeable delays for all traffic. From my book:
So at long last, we are ready to describe exactly what object “Internet” will match when used in our policies:
Hi Linus,
to answer your questions:
Hi Linus,
right, with "central configuration of the firewall management" I don`t mean the local configuration of the specific FW which can be showed using <show configuration>.
You wrote:"Because I thought Anti-Spoofing-Settings might be derived from GW-(Cluster-)Member config or routing-table automatically" <- this is not correct as you figured out by now. You always have to keep your central (firewall management) and local (firewall) topology configuration consistent. And as you further noted by all the answers in this thread we recommend to do this manually, meaning don't use the buttons to load in the firewall's interface and topology information into the firewall management automatically.
Interfaces that are defined in the Gaia OS but not listed in the gateway/cluster object will not have antispoofing enforced as Dameon mentioned. However traffic to and from those missing interfaces will be automatically classified as External (technically it is not explicitly defined as Internal) and blades such as APCL/URLF & possibly Threat Prevention will tend to pull traffic crossing this interface into at least the Medium Path for inspection due to the inclusion of this missing interface in dynamic object "Internet". If this is a busy, high-speed interface it can have a dramatic impact on the CPU load of the firewall and cause noticeable delays for all traffic. From my book:
So at long last, we are ready to describe exactly what object “Internet” will match when used in our policies:
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 22 | |
| 15 | |
| 7 | |
| 6 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 4 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY