- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi Checkmates
Does anyone know how to programatically disable Extended Cluster Anti SPoofing either via API or CLI commands ? I'm trying to put together a zero touch demo environment (IaC + full Check Point Terraform config) on GCP, but the management traffic is being dropped by the cluster
@;193343.618;[vs_0];[tid_0];[fw4_0];fw_log_drop_ex: Packet proto=6 10.254.1.2:18191 -> 10.254.1.4:38596 dropped by fw_cluster_ttl_anti_spoofing Reason: ttl check drop;
From Smart Console it is possible to disable Extended Cluster Anti Spoofing but i can't see a way to do this via a command. The gateways are on R81.20 and Mgmt R82.
Thanks
Ok I've managed to do it via dbedit. cluster is called "gcp-southhub-fw-cluster"
On the management server I've created a script called dbedit.script
dbedit.script:
print network_objects gcp-southhub-fw-cluster
modify network_objects gcp-southhub-fw-cluster cluster_anti_spoofing false
update_all
print network_objects gcp-southhub-fw-cluster
quit -n
I run the command as follow:
[Expert@chkp-fwm:0]# dbedit -local -f dbedit.script | grep cluster_anti_spoofing
Now i just need to create a null_resource remote provisioner type and get it to run the script as part of the workflow
Let me try figure it out in my cluster, but I know below used to work in older versions, but does not seem its doable in R81.20...
Andy
set cluster member <member_id> advanced-settings extended-anti-spoofing off
save config
Though, when I ran your question through AI copilot, says cannot be done viia clish, not supported, but I would still double check that info.
Andy
Thanks. I think the way to go it to use dbedit in command line. I'm trying to figure out the syntax. Never used it this way before. Always GUI
I will keep trying, its very interesting challenge.
Andy
Ok I've managed to do it via dbedit. cluster is called "gcp-southhub-fw-cluster"
On the management server I've created a script called dbedit.script
dbedit.script:
print network_objects gcp-southhub-fw-cluster
modify network_objects gcp-southhub-fw-cluster cluster_anti_spoofing false
update_all
print network_objects gcp-southhub-fw-cluster
quit -n
I run the command as follow:
[Expert@chkp-fwm:0]# dbedit -local -f dbedit.script | grep cluster_anti_spoofing
Now i just need to create a null_resource remote provisioner type and get it to run the script as part of the workflow
Great job!
Andy
You can (and should) use the management API:
https://sc1.checkpoint.com/documents/latest/APIs/#cli/set-simple-cluster~v1.9.1%20
Although, the better choice is to fix the issue causing the anti-spoofing error in the first place. Anti-spoofing errors mean you have a problem with your configuration.
This is not about interface anti spoofing. This can indeed be configured via API (and it is disabled anyway as per Check Point / GCP best practices.). This is about extended cluster anti spoofing setting (cluster properties -> network Management -> Advanced -> Enable Extended Cluster Anti-Spoofing) which is enabled by default.
I have little/no control of the overlay network (GCP). The management server sits on the same L3 network (= directly connected) as the firewall sync (eth1). Both are on the same region but different zone. Somehow the cluster is not happy with the TTL value of packets from the management and drops the traffic.
Ohh! I see the problem.
Management server is on the same network. Move that to its own VPC and network. You wouldn't want management in the same network when the future comes and you need to delete the gateways VPC and re-deploy (upgrades, problem-fixing, whatever). It'll also keep your configuration more clean, with distinct separation of duties.
CloudGuard management is meant to be on its own entirely, anyway. The same applies for Azure deployments, too (of which I do a lot these days for customers).
Thank you.. It is already the case. The firewalls have a leg in the management VPC, not the other way around. I was following Checkpoint deployment guide for GCP link here
Each gateway has a network interface in a subnetwork in the Management VPC. This is the network that manages the gateways.
To be fair I'm also doing that in a trial account which comes with lot of restrictions from GCP.
So they give you $300 credits but then you can't really use it meaningfully 😄
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 26 | |
| 15 | |
| 13 | |
| 12 | |
| 9 | |
| 7 | |
| 6 | |
| 6 | |
| 5 | |
| 5 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY