<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tech Tip - Dynamic Routing: BFD in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Tech-Tip-Dynamic-Routing-BFD/m-p/276290#M105143</link>
    <description>&lt;P&gt;The number of BFD sessions needed is based on links not multiplied by cluster members, the cluster is a single logical router.&lt;/P&gt;</description>
    <pubDate>Thu, 30 Apr 2026 05:45:45 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2026-04-30T05:45:45Z</dc:date>
    <item>
      <title>Tech Tip - Dynamic Routing: BFD</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Tech-Tip-Dynamic-Routing-BFD/m-p/263012#M51601</link>
      <description>&lt;P&gt;&lt;U&gt;Background&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Bidirectional Forwarding Detection (BFD) is a fast fault detection protocol used to monitor links between network devices like routers and switches.&lt;SPAN class="pjBG2e" data-cid="331a703a-9946-4d8e-91c7-1209e8d9a8d4"&gt;&lt;SPAN class="UV3uM"&gt;&amp;nbsp;It's purpose is to detect link failures (to quickly facilitate routing around them) rather than device failures which is an important distinction in the case of a clustered pair of Firewalls.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;In a ClusterXL environment "Standby" cluster members do not respond to BFD. Hence when considering the configuration of BFD we need to pay attention to the underlying network fabric and parameters such as the ClusterXL dead timeout. Does the network topology require / warrant BFD and what is it really achieving for us?&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Timers &amp;amp; Best Practices&lt;/U&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;For a non-clustered security gateway the calculated BFD timeout should be at least 1 second, preferably 3 seconds (or more) for reliability. For more details, see&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://www.rfc-editor.org/search/rfc_search_detail.php?rfc=5880" target="_blank" rel="noopener"&gt;RFC 5880&lt;/A&gt;&lt;/SPAN&gt;.&lt;/LI&gt;
&lt;LI&gt;On&amp;nbsp;Cluster Members, make sure the calculated timeout is &lt;U&gt;longer&lt;/U&gt; than the time necessary for the cluster to complete an unattended failover in your environment. We recommend that you first test failover in your environment.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Do not use the IP Reachability Detection feature in combination with the Graceful Restart feature in dynamic routing protocols, unless the routing protocols support the BFD "c-Bit".&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Source: &lt;A href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_Gaia_Advanced_Routing_AdminGuide/Content/Topics-GARG/IP-Reachability-Detection-Configuring-in-Gaia-Clish.htm" target="_self"&gt;Check Point R82 Gaia Advanced Routing Admin Guide - IP Reachability Detection Configuring in Gaia Clish&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Access Policy&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Routing related protocols such as BGP, OSPF etc need to be allowed by the security gateway access policy in order for routing adjacencies / neighbors to be able to form successfully. In general this traffic is not covered by implied rules.&lt;/P&gt;
&lt;P&gt;Configuration of the necessary rules for common routing protocols are covered by the following knowledge article; similar rules are required to allow BFD traffic as an example (UDP destination ports control: 3784 &amp;amp; echo: 3785) e.g.&lt;/P&gt;
&lt;TABLE width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;Source&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;Destination&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;Service&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;Action&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;Install On&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;BFD neighbors&lt;BR /&gt;&lt;BR /&gt;Relevant Security Gateways&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;BFD neighbors&lt;BR /&gt;&lt;BR /&gt;Relevant Security Gateways&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;BFD-Single_hop&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Accept&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Relevant Security Gateways&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;U&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk39960" target="_blank" rel="noopener"&gt;sk39960: How to allow Dynamic Routing protocols traffic (OSPF, BGP, PIM, RIP, IGRP) through Check Point Security Gateway&lt;/A&gt; &lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Priority Queues&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;As relevant to BFD should be default in current versions, please see:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk105762" target="_blank" rel="noopener"&gt;sk105762: Firewall Priority Queues in R80.x / R81.x&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2025 03:18:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Tech-Tip-Dynamic-Routing-BFD/m-p/263012#M51601</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-11-17T03:18:13Z</dc:date>
    </item>
    <item>
      <title>Re: Tech Tip - Dynamic Routing: BFD</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Tech-Tip-Dynamic-Routing-BFD/m-p/276265#M105125</link>
      <description>&lt;P&gt;Should Explicit NAT rule with Hide under VIP for BFD service be used in the ClusterXL?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 17:13:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Tech-Tip-Dynamic-Routing-BFD/m-p/276265#M105125</guid>
      <dc:creator>akurtasanov</dc:creator>
      <dc:date>2026-04-29T17:13:18Z</dc:date>
    </item>
    <item>
      <title>Re: Tech Tip - Dynamic Routing: BFD</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Tech-Tip-Dynamic-Routing-BFD/m-p/276284#M105141</link>
      <description>&lt;P&gt;I don't recall having to manipulate NAT relative to BFD in the past, what's the scenario / version that you are trying to deploy - what are you seeing?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 23:23:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Tech-Tip-Dynamic-Routing-BFD/m-p/276284#M105141</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2026-04-29T23:23:47Z</dc:date>
    </item>
    <item>
      <title>Re: Tech Tip - Dynamic Routing: BFD</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Tech-Tip-Dynamic-Routing-BFD/m-p/276289#M105142</link>
      <description>&lt;P&gt;In the case of using NoNat rules. We have a top-level NoNat rule for the 10.0.0.0/8 network and all BFD requests fall under it. BGP itself, according to traffic data, ignores this rule and works fine. And according to the documentation, it is not entirely clear whether the BFD in the clusterxl should initially leave the active node under the VIP address or its own address of the active node, but in the latter case, it is not clear how to set up the BFD session.&lt;/P&gt;&lt;P&gt;As Example:&lt;BR /&gt;ClusterXL VIP - 10.0.0.1, Node1 - 10.0.0.2, Node2 - 10.0.0.3&lt;BR /&gt;BGP node - 10.0.0.4&lt;/P&gt;&lt;P&gt;In the case of NoNat, we have a BGP session between 10.0.0.1 and 10.0.0.4.&lt;BR /&gt;If configure BFD, the session 10.0.0.2 and 10.0.0.4 or 10.0.0.3 and 10.0.0.4 appears (depends on which node is the primary one).&lt;BR /&gt;But due to the fact that BGP peering is between 10.0.0.1 and 10.0.0.4, BFD is not working correctly.&lt;BR /&gt;And it's not entirely clear from the documentation how the BFD should behave initially, whether it's worth making Hide Nat Rule for 10.0.0.2 and 10.0.0.3 under 10.0.0.1 or somehow configuring 4 BFD sessions, although it's unclear how.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 03:30:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Tech-Tip-Dynamic-Routing-BFD/m-p/276289#M105142</guid>
      <dc:creator>akurtasanov</dc:creator>
      <dc:date>2026-04-30T03:30:55Z</dc:date>
    </item>
    <item>
      <title>Re: Tech Tip - Dynamic Routing: BFD</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Tech-Tip-Dynamic-Routing-BFD/m-p/276290#M105143</link>
      <description>&lt;P&gt;The number of BFD sessions needed is based on links not multiplied by cluster members, the cluster is a single logical router.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 05:45:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Tech-Tip-Dynamic-Routing-BFD/m-p/276290#M105143</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2026-04-30T05:45:45Z</dc:date>
    </item>
    <item>
      <title>Re: Tech Tip - Dynamic Routing: BFD</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Tech-Tip-Dynamic-Routing-BFD/m-p/276294#M105144</link>
      <description>&lt;P&gt;Therefore, in my case, I have to overlap he&amp;nbsp;NoNat rule&lt;BR /&gt;src 10.0.0.0/8 dst 10.0.0.0/8 Srv Any NewSrc Original NewDst Original&lt;BR /&gt;with more prioritized Hide Nat Rule like this&lt;BR /&gt;src 10.0.0.0/8 dst 10.0.0.4 Srv BFD NewSrc Hide_10.0.0.1 NewDst Original&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Is&lt;/SPAN&gt;&lt;SPAN&gt; that &lt;/SPAN&gt;&lt;SPAN class=""&gt;right&lt;/SPAN&gt;&lt;SPAN class=""&gt;?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 06:33:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Tech-Tip-Dynamic-Routing-BFD/m-p/276294#M105144</guid>
      <dc:creator>akurtasanov</dc:creator>
      <dc:date>2026-04-30T06:33:59Z</dc:date>
    </item>
    <item>
      <title>Re: Tech Tip - Dynamic Routing: BFD</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Tech-Tip-Dynamic-Routing-BFD/m-p/276299#M105146</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Has the settings described in sk34180 been changed for your environment?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 08:17:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Tech-Tip-Dynamic-Routing-BFD/m-p/276299#M105146</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2026-04-30T08:17:04Z</dc:date>
    </item>
    <item>
      <title>Re: Tech Tip - Dynamic Routing: BFD</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Tech-Tip-Dynamic-Routing-BFD/m-p/276300#M105147</link>
      <description>&lt;P&gt;No. By default&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;perform_cluster_hide_fold&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;is true. Nothing changed.&lt;BR /&gt;I was planning to get a simple answer:&lt;BR /&gt;1) Yes, bfd should be with VIP&lt;BR /&gt;2) No, bfd works without VIP with the private address of the active node.&lt;BR /&gt;And then sort it out further or open the case in TAC&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 08:33:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Tech-Tip-Dynamic-Routing-BFD/m-p/276300#M105147</guid>
      <dc:creator>akurtasanov</dc:creator>
      <dc:date>2026-04-30T08:33:29Z</dc:date>
    </item>
    <item>
      <title>Re: Tech Tip - Dynamic Routing: BFD</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Tech-Tip-Dynamic-Routing-BFD/m-p/276306#M105151</link>
      <description>&lt;P&gt;It should be the VIP. Actually I think your case is already described here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-BFD-Bidirectional-Forwarding-Detection/td-p/64486" target="_blank"&gt;https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-BFD-Bidirectional-Forwarding-Detection/td-p/64486&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2026 09:26:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Tech-Tip-Dynamic-Routing-BFD/m-p/276306#M105151</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2026-04-30T09:26:59Z</dc:date>
    </item>
  </channel>
</rss>

