- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Dear all,
We are facing this weird situation. On the internal interface of our firewall we have configured antispoofing so that all 10.0.0.0/8 is coming from this interface, Since we have other DMZs on this firewall that have an IP address in the 10.x.x.x. form, we have excluded some (not all) of the DMZ subnets from the antispoofing mechanism of the internal interface (action: prevent and log)
My question is why aren't we getting drops for the packets that belong to the "not excluded" subnets? Out of the blue we saw drops from a DMZ IP towards a specific destination situated in the internal LAN. Traffic from the same IP to other stuff in the internal LAN is passing without any problems! Traffic from other IPs in the DMZ subnet towards the exact same destination is passing without problems!
To sum it up:
Internal: 10.0.0.0/8
DMZ: 10.1.1.0/24 not excluded from the anitspoofing mechanism on internal:
Destination: 10.2.2.2 , 10.3.3.3 (internal subnets)
Src: 10.1.1.1 --> 10.2.2.2 , 10.3.3.3 ok
Src: 10.1.1.2 --> 10.2.2.2 NOT ok (message on log: spoofing address)
Src: 10.1.1.2 --> 10.3.3.3 ok
Any insight will be highly appreciated!
Please post the results from this one-liner, being sure to redact any Internet-routable outside addresses:
Hi Timothy,
Attached is the output for the related interfaces (DMZ and internal).
For one IP address from 10.20.32.0/18 subnet I get an antispoofing message when the destination address is in 10.0.0.0/8 subnet. All other IP addresses from 10.20.32.0/18 can access the same destination without any problems.
So the questions are:
Should 10.20.32.0/18 be excluded from the interfaces to be spoofed in the internal zone?
Why is just one IP address shown as spoofed? Could this be related to a setting on the specific PC?
Thank you in advance,
Katerina
Is it the ingress or egress interface that the spoofing message is occurring on?
That will determine where we need to adjust anti-spoofing settings.
What you are stating is really interesting, because the interface on which the message is occuring should not be in the path at all!!!!
I will further look into that!
What I don't understand is if directly connected interfaces of the firewall should also be excluded from the spoofing checks on the interface connecting to the internal LAN. It confuses me, since we have excluded some, but not all DMZ directly connected subnets, and everything is working fine.
Each packet is checked for anti-spoofing twice (in ingress interface and egress interface).
Knowing where it came from is, therefore, a critical part of resolving the issue.
Thanks for the info.
Your questions helped me clarify the issue.
Did you find the source of the issue?
Hi!
It seems that the issue was within the laptop itself, so we have arranged for a fresh installation of operating system and applications. Nothing could be found on the network side or on the Firewall.
See if this sk helps.
https://support.checkpoint.com/results/sk/sk115276
Also, here is important point about anti-spoofing options.
Andy
Interface - Topology Settings (checkpoint.com)
An interface can be defined as being External (leading to the Internet) or Internal (leading to the LAN).
The type of network that the interface Leads To:
Internet (External) or This Network (Internal) - This is the default setting. It is automatically calculated from the topology of the gateway. To update the topology of an internal network after changes to static routes, click Network Management > Get Interfaces in the General Properties window of the gateway.
Override - Override the default setting.
If you Override the default setting:
Internet (External) - All external/Internet addresses
This Network (Internal) -
Not Defined - All IP addresses behind this interface are considered a part of the internal network that connects to this interface
Network defined by the interface IP and Net Mask - Only the network that directly connects to this internal interface
Network defined by routes - The gateway dynamically calculates the topology behind this interface. If the network changes, there is no need to click "Get Interfaces" and install a policy.
Specific - A specific network object (a network, a host, an address range, or a network group) behind this internal interface
Interface leads to DMZ - The DMZ that directly connects to this internal interface
VPN Tunnel Interfaces
If the interface is part of a VPN Tunnel
, then the interface Leads To a Point to Point network. The interface is one end of the point to point connection. All traffic in the network behind the interface is part of the point to point connection. Click Override to define a specific network.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 26 | |
| 18 | |
| 13 | |
| 8 | |
| 6 | |
| 6 | |
| 6 | |
| 5 | |
| 4 | |
| 4 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY