- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hey CP-Team
I have the case, that there is a Cluster which many (Virtual) Interfaces which was not updated in SmartDashboard for long time. So I was wondering about 2 things:
Thanks and best regards
Interfaces that are defined in the Gaia OS but not listed in the gateway/cluster object will not have antispoofing enforced as Dameon mentioned. However traffic to and from those missing interfaces will be automatically classified as External (technically it is not explicitly defined as Internal) and blades such as APCL/URLF & possibly Threat Prevention will tend to pull traffic crossing this interface into at least the Medium Path for inspection due to the inclusion of this missing interface in dynamic object "Internet". If this is a busy, high-speed interface it can have a dramatic impact on the CPU load of the firewall and cause noticeable delays for all traffic. From my book:
So at long last, we are ready to describe exactly what object “Internet” will match when used in our policies:
Hi Linus,
to answer your questions:
Hi Linus,
right, with "central configuration of the firewall management" I don`t mean the local configuration of the specific FW which can be showed using <show configuration>.
You wrote:"Because I thought Anti-Spoofing-Settings might be derived from GW-(Cluster-)Member config or routing-table automatically" <- this is not correct as you figured out by now. You always have to keep your central (firewall management) and local (firewall) topology configuration consistent. And as you further noted by all the answers in this thread we recommend to do this manually, meaning don't use the buttons to load in the firewall's interface and topology information into the firewall management automatically.
Interfaces that are defined in the Gaia OS but not listed in the gateway/cluster object will not have antispoofing enforced as Dameon mentioned. However traffic to and from those missing interfaces will be automatically classified as External (technically it is not explicitly defined as Internal) and blades such as APCL/URLF & possibly Threat Prevention will tend to pull traffic crossing this interface into at least the Medium Path for inspection due to the inclusion of this missing interface in dynamic object "Internet". If this is a busy, high-speed interface it can have a dramatic impact on the CPU load of the firewall and cause noticeable delays for all traffic. From my book:
So at long last, we are ready to describe exactly what object “Internet” will match when used in our policies:
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 15 | |
| 10 | |
| 8 | |
| 7 | |
| 5 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 3 |
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY