<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ineffective IP spoofing protection in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415741#M93297</link>
    <description>&lt;P&gt;Yeah, I think I'm left with that one option only for now.&lt;/P&gt;&lt;P&gt;Sorry for not wording the question properly. Thanks so much for your help.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 28 Jun 2021 20:49:17 GMT</pubDate>
    <dc:creator>SThatipelly</dc:creator>
    <dc:date>2021-06-28T20:49:17Z</dc:date>
    <item>
      <title>Ineffective IP spoofing protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415372#M93251</link>
      <description>&lt;P&gt;I have IP spoofing protection enabled on PaloAlto but it is not effective due to the following reason:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My external Interface IP is 1.2.3.1/24 . The spoofed attacks are coming from a fictitious source IP for e.g. 1.2.3.25 destined to 1.2.3.50(web server). As per Palo's IP spoofing definition, this is not blocked because 1.2.3.25 is routable over that interface. I am considering to write an ACL on the neighboring router that says block all inbound connections with source IP in 1.2.3.0/24 subnet.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone implemented this? Am I right in my approach?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 18:38:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415372#M93251</guid>
      <dc:creator>SThatipelly</dc:creator>
      <dc:date>2021-06-26T18:38:13Z</dc:date>
    </item>
    <item>
      <title>Re: Ineffective IP spoofing protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415390#M93253</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70284"&gt;@SThatipelly&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did you enable "Strict IP Address Check" or only "Spoofed IP address" in the packet based attack protection of the zone protection profile?&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 19:54:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415390#M93253</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2021-06-26T19:54:03Z</dc:date>
    </item>
    <item>
      <title>Re: Ineffective IP spoofing protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415593#M93275</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;I have none of them enabled. I was worried they may drop any legitimate traffic so, didn't enable them.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 12:57:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415593#M93275</guid>
      <dc:creator>SThatipelly</dc:creator>
      <dc:date>2021-06-28T12:57:51Z</dc:date>
    </item>
    <item>
      <title>Re: Ineffective IP spoofing protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415602#M93277</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70284"&gt;@SThatipelly&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now I am a little confused. Without these options, how did you expect the firewall to block spoofed connections?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 13:38:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415602#M93277</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2021-06-28T13:38:47Z</dc:date>
    </item>
    <item>
      <title>Re: Ineffective IP spoofing protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415618#M93278</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;I understand but what I'm looking for is has anyone enabled this and observed such attacks getting dropped? as per the definition, those attempts will not be blocked by that IP spoofing protection feature.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 14:38:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415618#M93278</guid>
      <dc:creator>SThatipelly</dc:creator>
      <dc:date>2021-06-28T14:38:00Z</dc:date>
    </item>
    <item>
      <title>Re: Ineffective IP spoofing protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415677#M93283</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70284"&gt;@SThatipelly&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I made a short test (as so far I have never seen such a spoofing attack - or missed it when it happened &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt; ).&lt;/P&gt;
&lt;P&gt;The setup is a pa-220 with a default route towards the internet. Then I have an internal interface with a public /24 IP range. The first test was without a zone protection. This traffic was allowed - as I expected - but the connection would never work as the destination server would send the response not back to the firewall as it would be an answer to an IP from the network where the server is located. So this scenario is only a problem because of DoS attacks or vulnerabilities that could be exploited with a single packet.&lt;/P&gt;
&lt;P&gt;The next test was with the option enabled to drop spoofed IP address. This connections were dropped with the reason spoofed IP address. Then I also added the option for strict IP address check, but compared to the second test, this made no difference in my situation. Here is a screenshot that shows the dropped packets in the threat log (the first 4 or 5 were only with drop for spoofed IP addresses enabled):&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_20210628-193137_Chrome.jpg" style="width: 1367px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/34622iDDBB58C9914C197E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_20210628-193137_Chrome.jpg" alt="Screenshot_20210628-193137_Chrome.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;So this option definately will work to drop connections from spoofed IP addresses and as long as the route table is correct (as I assume because otherwise you would have other problems in your network) it shouln't cause any issues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 18:26:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415677#M93283</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2021-06-28T18:26:35Z</dc:date>
    </item>
    <item>
      <title>Re: Ineffective IP spoofing protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415718#M93290</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;I greatly appreciate you taking time to test this. I see that is working just as described which is great however I have a concern here. So, some of my DMZ servers are in that public IP range and also a neighboring public router(outside the firewall) that has the&amp;nbsp; IP in that same public IP range. so, let's say there is a packet from that public router(1.2.3.10) destined to SNMP server(1.2.3.80). Does the IP spoofing prevent that traffic? if so, is there a way I can exclude that rather than putting in an additional security policy?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 19:24:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415718#M93290</guid>
      <dc:creator>SThatipelly</dc:creator>
      <dc:date>2021-06-28T19:24:04Z</dc:date>
    </item>
    <item>
      <title>Re: Ineffective IP spoofing protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415726#M93291</link>
      <description>&lt;P&gt;They are in the same IP range but in different subnets, right? For example you have the public IP range 1.2.3.0/24. The subnet between your router and the firewall is 1.2.3.0/28 and the servers are located in 1.2.3.64/26. Or at least something similar?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 19:55:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415726#M93291</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2021-06-28T19:55:23Z</dc:date>
    </item>
    <item>
      <title>Re: Ineffective IP spoofing protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415728#M93292</link>
      <description>&lt;P&gt;Nope, they are in same IP range and subnet. My Outside interface is a /24 which hosts the public routers and public IPs for the DMZ servers. This is what throwing me off on the protection steps I need to take.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Should I simply put in a rule saying that traffic from all but few 1.2.3.x should be blocked to 1.2.3.0/24 on firewall?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 20:03:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415728#M93292</guid>
      <dc:creator>SThatipelly</dc:creator>
      <dc:date>2021-06-28T20:03:44Z</dc:date>
    </item>
    <item>
      <title>Re: Ineffective IP spoofing protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415738#M93296</link>
      <description>&lt;P&gt;So you have this network between the router and the firewall and use the IPs for destination NAT to the servers which have private IP addresses?&lt;/P&gt;
&lt;P&gt;Now I think I understand your problem and in this case - if you do not want to change a little bit in your setup - the ACL on the router probably is the best option with the downside that then you don't see these dropped connections in the threat log.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 20:41:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415738#M93296</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2021-06-28T20:41:13Z</dc:date>
    </item>
    <item>
      <title>Re: Ineffective IP spoofing protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415741#M93297</link>
      <description>&lt;P&gt;Yeah, I think I'm left with that one option only for now.&lt;/P&gt;&lt;P&gt;Sorry for not wording the question properly. Thanks so much for your help.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 20:49:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ineffective-ip-spoofing-protection/m-p/415741#M93297</guid>
      <dc:creator>SThatipelly</dc:creator>
      <dc:date>2021-06-28T20:49:17Z</dc:date>
    </item>
  </channel>
</rss>

