- Products
- Learn
- Local User Groups
- Partners
- More
CheckMates Fifth Birthday
Celebrate with Us!
days
hours
minutes
seconds
Join the CHECKMATES Everywhere Competition
Submit your picture to win!
Check Point Proactive support
Free trial available for 90 Days!
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
The 2022 MITRE Engenuity ATT&CK®
Evaluations Results Are In!
Now Available: SmartAwareness Security Training
Training Built to Educate and Engage
MITRE ATT&CK
Inside Check Point products!
CheckFlix!
All Videos In One Space
Hi All,
On a 44K dual chassis setup in VSX mode we are seeing drops by Local Address Spoofing on all Virtual Systems for OSPF packets. OSPF seems te work and routes are learned, but the log fills up with these log messages. It is not just a drop, but also a connection alert.
So, the source is the gateway and destination the OSPF network address.
We have checked many knowledge base articles, but none of them seems relevant. With fw monitor we looked at the traffic and we are seeing the OSPF packet leave the gateway (o, O), but also see it enter the gateway (i, I).
When we configure the parameyet fw_local_interface_anti_spoofing to 0, the message are gone.
We have checked routes which are OK and there are no host on the network with IP addresses that belong to the gateways.
Software version is R80.20SP take 304.
Not sure what the cause is and how we can solve this.
Regards,
Martijn
Did you involve TAC already ?
Hello,
I did not involve TAC yet. Customers policy does not allow me to send any data (cpinfo, logs, debugs, traces) outside the organization. So CheckMates and SK atricles are the first options for me.
If TAC is needed, I can open a SR but I am limited on what I can tell and provide them.
Martijn
The fact that the traffic is re-entering the gateway is what is causing the local interface spoofing checks to be triggered.
Disabling the check is one option, figuring out what’s causing the traffic to re-enter the gateway is the other.
What device are you pairing OSPF with ?
Hi All,
Yesterday I was onsite again and created some Wireshark traces. And we noticed the following.
The gateway is sending OSPF packets and source IP and source MAC is the gateway, so all OK there.
But at the same moment we see another OSPF packet with source IP the gateway, but with a completely different source MAC-address.
The MAC-address starts with 00:1c:99 and this seems to be the vendor Shunra Software. This is a unknown vendor to me. Is the 44K solution using technology from Shunra Software? Maybe the SSM's?
Or does anyone know who and what this vendor is?
Regards,
Martijn
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY