- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
I have the topology in the picture, and the L2TP 192.168.18.100 route is not working, and I can't open the web page. Additionally, the route to IP 10.0.219.246 is not working. I have the PCs in my office that go through the firewall via a Mikrotik port. Strangely, the SAS page on VLAN 249 with IP 10.0.200.249 opens. The other page on VLAN 219, 10.0.219.246:9082, does not open. Both are on the same logic and pass through the same router; only the VLAN changes. Could it be blocked at the port? Is an allow policy needed? The general firewall policy is to allow communication between internal interfaces. I haven't made it strict because I know it blocks everything. The 192.168.18.100:8080 that is blocked seems like the same problem. Maybe the ports need to be allowed? My PC, which goes through the Mikrotik, opens the web page with VPN. However, the PC that goes through the firewall doesn't open it. I suspect the ports are being blocked.
First, uncheck "Show inactive routes" so we can see only the active routes. If you have inactive routes, then you have a routing protocol administrative-distance (metric) problem. Connected routes override static routes, which override all other routes (unless you have changed the protocol ranking manually).
Have you checked the gateway firewall logs? You may have an anti-spoofing problem on some interface. I also see your default route is via a DMZ VLAN interface; this is unusual. This interface would need to be an External (Internet) topology for anti-spoofing.
what is strange too is that ip from route in line 9 cam be pinged. also line 8 can be pinged. line 10 , 7 and 6 cannot be pinged.
After you check the logs and anti-spoofing, check the interior router and make sure it has valid return routes via the SMB 1575 gateway. How is your L2TP client connecting to the network; is it connecting via the SG1575 external interface, or something else? Check the active routes on the L2TP client to see if the routes are being installed correctly. You can try traceroute, but this may be ambiguous for an L2TP client, so don't fall into a trap of troubleshooting the wrong problem if traceroute fails. However, if it works, then that is excellent.
If line 9 can be pinged, but others cannot, check the internal router to make sure it has interfaces in "Up" state for those VLANs. Check the hosts on those VLANs to make sure they can send return traffic via the internal router for your L2TP client (either default route, or something else).
Which version/build firmware is this Spark device installed with?
If a path using L2TP is in the mix have you configured MSS clamping (sk121114) at all?
Again, are you running R81.10.10 firmware (build 996002906) or something else?
Solved: Anti-Spoofing detection - Check Point CheckMates
i did ospf routing and i found the solution
Ok great - what was the solution so others can understand the problem/cause better?
hello @lcako, could you please share the solution, it will help us.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
13 | |
3 | |
3 | |
1 | |
1 | |
1 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY