I have a customer who after upgrading to 4.0 SP5 has a service that runs
from the firewall to an internal server failing on rule 0 with what
looks like an anti-spoofing log message. The message looks like this:

2302;12Jun2000;17:40:03;203.97.56.146;log;reject;;daemon;inbound;tcp;192.0.1.5;192.0.1.1;6666;54123;;0;;;;;;;SYN->SYN-ACK
-> RST;;

Note that the interface is 'daemon'. I have turned off the antispoofing
settings and it makes no difference.

FW is 4.0 SP5 on Solaris 2.6.

The same thing happens for standard telnet and ftp. Email relayed from
the firewall to another internal server works fine.

Any ideas?

Jim
-- 
Jim Shaw                        Email: [EMAIL PROTECTED]
Optimation NZ Ltd,              DDI: +64-4-470-5831
P.O. Box 10616,                 Ph: +64-4-472-7218
Level 2, Optimation House,      Fax: +64-4-472-7219
1 Grey Street,                  Web: http://www.optimation.co.nz
Wellington,
New Zealand


================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to