I have IP spoofing protection enabled on PaloAlto but it is not effective due to the following reason:
My external Interface IP is 184.108.40.206/24 . The spoofed attacks are coming from a fictitious source IP for e.g. 220.127.116.11 destined to 18.104.22.168(web server). As per Palo's IP spoofing definition, this is not blocked because 22.214.171.124 is routable over that interface. I am considering to write an ACL on the neighboring router that says block all inbound connections with source IP in 126.96.36.199/24 subnet.
Has anyone implemented this? Am I right in my approach?
So you have this network between the router and the firewall and use the IPs for destination NAT to the servers which have private IP addresses?
Now I think I understand your problem and in this case - if you do not want to change a little bit in your setup - the ACL on the router probably is the best option with the downside that then you don't see these dropped connections in the threat log.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!