- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello guys,
Is there any way how to monitor anti-spoofing traffic in R77.30 ? I know that I can choose Alert, Log or None in spoofing properties for specific interface. But does someone know how to send for example syslog event in case gateway recognize spoofing traffic ? Or send mail ...
Searching all logs to found "spoofing" word in Information isnt good approach... There must be something on CLI how to check if interface faced spoofing traffic (as it issue log event towards log server).
Thanks for every suggestion in advance.
One place you can see anti-spoofing drop packets (albeit not on a specific interface) is cpview.
If you want Alerts to run a script, you can set that in Global Properties (but will apply for anything with Log type set to Alert):
Thanks, I will check that.
What is default path of that UserDefined script? Or can I use full path of script, like: /var/tmp/testing.sh ?
You can use full path.
Offhand I am not sure what the default path is for this screen.
I was not managed to get it work
First, I want to test it via specific rule, so I have created new rule with Track: "Alert". My understanding is that the script located in /var/log/test.sh should be executed every time this specific rule is matched.
My settings in Global Properties:
According logs, the specific traffic is matched and I also see Alert in logs. The only problem is that it didnt activate the script.
I also tried to set Track as "UserDefined" and with this setup, the script was executed.
Is there any way how to do the same just for Alert (as in Anti-spoofing in R77.30 there are only following options available):
As far as I know both of these things should operate exactly the same.
I would open a TAC case.
Isnt some stats included in $FWDIR/state/local/FW1/local.set ? How cpview (SecureXL) knows how many packets were dropped because of anti-spoofing ?
Look into sk56701, there are some ideas how to make it work. The fact script is not working means there is something wrong with it. Most probably variables.
Hi Valeri,
The script is working in case I choose "UserDefined" in Track option for the particular rule.
In case I want to do the same for "Alert", it will not work.
My script looks like:
My rule looks like (it will not execute script):
This rule will execute the script:
And my Alert settings looks like:
That must be true. "Run popup alert script" means the binary is under $FWDIR/bin. If it is not, it is qualified as a "User defined alert"
Dameon Welch Abernathy Valeri Loukine issue solved with following configuration of Alerts in Global Properties:
So now my final question is:
How can I simulate Address Spoofing for interface eth1.50 with subnet 10.20.30.0/24 to see if this is really working in case I will select Alert in Anti-Spoofing Tracking option ?
NOTE: I am running internal LAB in VMware, so I can do (almost) everything
Create a VM with the desired address and try to ping "through" the firewall?
You'll probably have to muck with the routing/ARP tables to make it work right.
easy, configure anti-spoofing manually and exclude some parts of your network attached to this interface. Link, instead of /24 do less than that.
Hello Jozko,
Was you able to perform this. Even I want to perform anti spoofing lab in vmware. Don't know howto do it.
No, I was not able to simulate antispoofing traffic 😕
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
10 | |
6 | |
6 | |
6 | |
6 | |
6 | |
4 | |
3 | |
3 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY