06-26-2021 11:38 AM
I have IP spoofing protection enabled on PaloAlto but it is not effective due to the following reason:
My external Interface IP is 184.108.40.206/24 . The spoofed attacks are coming from a fictitious source IP for e.g. 220.127.116.11 destined to 18.104.22.168(web server). As per Palo's IP spoofing definition, this is not blocked because 22.214.171.124 is routable over that interface. I am considering to write an ACL on the neighboring router that says block all inbound connections with source IP in 126.96.36.199/24 subnet.
Has anyone implemented this? Am I right in my approach?
06-28-2021 01:41 PM
So you have this network between the router and the firewall and use the IPs for destination NAT to the servers which have private IP addresses?
Now I think I understand your problem and in this case - if you do not want to change a little bit in your setup - the ACL on the router probably is the best option with the downside that then you don't see these dropped connections in the threat log.
06-26-2021 12:54 PM
Did you enable "Strict IP Address Check" or only "Spoofed IP address" in the packet based attack protection of the zone protection profile?
06-28-2021 05:57 AM
@vsys_remo I have none of them enabled. I was worried they may drop any legitimate traffic so, didn't enable them.
06-28-2021 06:38 AM
Now I am a little confused. Without these options, how did you expect the firewall to block spoofed connections?
06-28-2021 07:38 AM
@vsys_remo I understand but what I'm looking for is has anyone enabled this and observed such attacks getting dropped? as per the definition, those attempts will not be blocked by that IP spoofing protection feature.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!