I defined a group for each interface (called INTERFACE_INTERNAL,
INTERFACE_DMZ1, INTERFACE_EXTERNAL, etc) that contain the network objects
that are permitted to enter an interface (based on source address). I then
applied the group to the security settings for each specific interface on
each firewall object that we have. You then have to select the correct type
of security. Others+, others, specific, etc.

This is how you "create spoofing rules".

Hope this helps,

MH 

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Monday, October 01, 2001 2:43 PM
To: [EMAIL PROTECTED]
Subject: [FW1] anti-spoofing



Hi all! 

How can I define anti-spoofing rule? 

tks, 
Renato 

_________________________________________________________
Oi! Voc� quer um iG-mail gratuito?
Ent�o clique aqui: http://registro.ig.com.br/



============================================================================
====
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
============================================================================
====


<<Disclaimer>>

This electronic mail is intended only for the use of the addressee(s) named
herein. Unless otherwise specifically stated, the views contained and
expressed in this electronic mail are strictly those of the individual
sender and are not the views of the Company or any of its Directors or other
employees. If you are not the intended recipient of this electronic mail,
you are hereby notified that any dissemination, distribution or coping of
this electronic mail is strictly prohibited. If you received this electronic
mail in error please immediately notify us by return electronic mail and
delete this electronic mail from your system. 


================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to