- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hey guys,
I really hope someone can clarify this for me. Had such strange issue with customer that is running 2 new instances of Azure vmss gateways on R81.20 and 2 still on R81 (until they are removed this or next week).
Anyway, what happened was I realized I could not ssh into either new R81.20 fws and once smart console launched, I saw anti spoofing was enabled, though no changes were done since week ago, when guy from CP PS team told us to leave spoofing off, as it was not supported, which I still find a bit odd, as it does not state that anywhere in the documentation (at least that I can find).
So, what we did was had to reset SIC on both firewalls, as smart dashboard was showing no communication and once that was done and spoofing disabled manually, all was well.
Here are 2 most pressing questions:
1) Is anti spoofing officially supported on Azure vmss CP firewalls?
2) Why would spoofing out of blue be enabled??!! Makes me wonder if there is some sort of script or something on mgmt server that would cause this. Its worth mentioning that on their old R81 vmss gateway, anti spoofing was ENABLED without any problems.
Anyway, I opened a TAC case to see what they have to say, because all this has me baffled, for sure.
Thanks as always for the suggestions/help.
Best regards,
Andy
It's definitely in the VMSS deployment guide known limitations:
"Anti-Spoofing is disabled by default on the VMSS instances eth0 and eth1 and must not be enabled"
Hey guys,
Just to update on this quick. I had this super nice guy from TAC call me and he explaied how anti spoofing works on Azure and why its not needed on CP gateway side. I told him that in R81, feature was enabled, but I suppose that may had been due to the fact it was not fully implemented yet on load balancer end.
Anyway, I ended up running bunch of commands from below 2 links and it shows anti spoofing is 100% off, as it should be. I still dont know how something like this could happen in the first place out of the blue, but TAC assured me there is no script on the mgmt server that would cause this at all, so Im comfortable with that answer and wont lose any sleep over this, as they say : - )
Thanks again for the help.
Andy
https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38776
PS guy sent me this, so it does state anti spoofing must not be enabled. It still baffles me how it got enabled out of the blue, makes no logical sense. Im not Azure export to dig into thus further, but to me, seems there is some sort of script or tool on mgmt server that could have caused it, but sadly, I have no proof of it...
Andy
CloudGuard Network for Azure Virtual Machine Scale Sets (VMSS) Deployment Guide (checkpoint.com)
It's definitely in the VMSS deployment guide known limitations:
"Anti-Spoofing is disabled by default on the VMSS instances eth0 and eth1 and must not be enabled"
Correct Chris, PS guy also sent me the same just before you responded. BUT, it still begs a question...how can such a feature change on its own?? To me, it makes no sense. Thats why I was thinking there must be some sort of thing running on the mgmt that could potentially affect it? I honestly have no clue, simply my logical guess..
Thanks as always for your help.
Andy
As I recall you'll get a warning about topology/spoofing when installing policy, I've seen others who weren't aware of this limitation try to clear said message by "correcting" things.
Not saying that's what's happened here but it's one consideration.
Never seen that message in Azure when installing policy.
Andy
Hey guys,
Just to update on this quick. I had this super nice guy from TAC call me and he explaied how anti spoofing works on Azure and why its not needed on CP gateway side. I told him that in R81, feature was enabled, but I suppose that may had been due to the fact it was not fully implemented yet on load balancer end.
Anyway, I ended up running bunch of commands from below 2 links and it shows anti spoofing is 100% off, as it should be. I still dont know how something like this could happen in the first place out of the blue, but TAC assured me there is no script on the mgmt server that would cause this at all, so Im comfortable with that answer and wont lose any sleep over this, as they say : - )
Thanks again for the help.
Andy
https://community.checkpoint.com/t5/Scripts/Show-AntiSpoofing-Networks-via-CLI/m-p/38776
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 21 | |
| 20 | |
| 16 | |
| 5 | |
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 3 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY