<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.30 Management Interface default gateway in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-Management-Interface-default-gateway/m-p/114348#M15987</link>
    <description>&lt;P&gt;Thanks for the response.&lt;/P&gt;&lt;P&gt;If I understand correctly, let's say I assigned 10.10.10.10/24 to the MGMT interface and 192.168.1.10/24 to eth1/2 interface. Let's assume I also have a static route of 0.0.0.0/0 with the next hop of 192.168.1.1. So, If I connect to the security gateway from a subnet other than 10.10.10.0/24 then the traffic will leave the security gateway via eth1/2 interface right?&lt;/P&gt;&lt;P&gt;With Palo, I can assign 10.10.10.10/24 to the MGMT interface (management plane) and set the default gateway to 10.10.10.1. At the same time, I can have a 0.0.0.0/0 (data plane) pointing to a different interface/next hop. So, all the management traffic will ingress and egress via the MGMT only.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a reason why Check Point doesn't have a management plane separation?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Suresh&lt;/P&gt;</description>
    <pubDate>Tue, 23 Mar 2021 11:34:19 GMT</pubDate>
    <dc:creator>vsurresh</dc:creator>
    <dc:date>2021-03-23T11:34:19Z</dc:date>
    <item>
      <title>R80.30 Management Interface default gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-Management-Interface-default-gateway/m-p/114337#M15984</link>
      <description>&lt;P&gt;Hi, everyone.&lt;/P&gt;&lt;P&gt;Let me preface by saying that I just started working with Checkpoint Firewalls. I mostly worked on Palo Altos and ASAs previously.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm very confused about the security gateway management interface. How do I change the default gateway for the management interface? I can't see an option to change it? All I can see is IP and the mask option. What am I missing here?&lt;/P&gt;&lt;P&gt;I also need to change the gateway for the&amp;nbsp;Checkpoint management server as well.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Mar 2021 08:25:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-Management-Interface-default-gateway/m-p/114337#M15984</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2021-03-23T08:25:38Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 Management Interface default gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-Management-Interface-default-gateway/m-p/114344#M15986</link>
      <description>&lt;P&gt;Lol, a colleague of mine had a similar confusion when moving from Check Point (two words) to PAN.&amp;nbsp;PAN uses two separate pieces of hardware in the same box, one for control connections (management interface) and one for filtering production traffic.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;With Check Point security gateways, there is no separate routing for the management interface. Although it is called MGMT on most of the appliances, it is a part of the main connectivity framework, meaning it can receive and forward any production traffic crossing the FW, not just management connections for the gateways and back.&lt;BR /&gt;&lt;BR /&gt;So if you change the default GW, it applies to all interfaces, including your management interface, if you are working with Check Point&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Mar 2021 10:45:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-Management-Interface-default-gateway/m-p/114344#M15986</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-03-23T10:45:11Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 Management Interface default gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-Management-Interface-default-gateway/m-p/114348#M15987</link>
      <description>&lt;P&gt;Thanks for the response.&lt;/P&gt;&lt;P&gt;If I understand correctly, let's say I assigned 10.10.10.10/24 to the MGMT interface and 192.168.1.10/24 to eth1/2 interface. Let's assume I also have a static route of 0.0.0.0/0 with the next hop of 192.168.1.1. So, If I connect to the security gateway from a subnet other than 10.10.10.0/24 then the traffic will leave the security gateway via eth1/2 interface right?&lt;/P&gt;&lt;P&gt;With Palo, I can assign 10.10.10.10/24 to the MGMT interface (management plane) and set the default gateway to 10.10.10.1. At the same time, I can have a 0.0.0.0/0 (data plane) pointing to a different interface/next hop. So, all the management traffic will ingress and egress via the MGMT only.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a reason why Check Point doesn't have a management plane separation?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Suresh&lt;/P&gt;</description>
      <pubDate>Tue, 23 Mar 2021 11:34:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-Management-Interface-default-gateway/m-p/114348#M15987</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2021-03-23T11:34:19Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 Management Interface default gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-Management-Interface-default-gateway/m-p/114360#M15988</link>
      <description>&lt;P&gt;Yes, your assumption about routing is correct is correct. The reason why is mostly related to the origin of the company tech. You can read &lt;A href="https://community.checkpoint.com/t5/Check-Point-for-Beginners-2-0/Brief-History-of-Check-Point-Firewalls/ba-p/87842?cat=3" target="_self"&gt;this article&lt;/A&gt; for starters.&lt;BR /&gt;&lt;BR /&gt;Technically, you can have multiple options for management plane separation with Check Point today, but it overcomplicate things, actually.&lt;/P&gt;
&lt;P&gt;Imagine you have your management network routed through a security GW. With Palo, you have to define it twice: once on mgmt interface and another time on data plane, and also connect two cables leading to the same network two times to the same appliance. With Check Point you do not have that complexity.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Once again, the reason PAN has data plane separate is in their HW structure. With Check Point, the same code runs on open server and CP appliance.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Mar 2021 12:15:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-Management-Interface-default-gateway/m-p/114360#M15988</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-03-23T12:15:08Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 Management Interface default gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-Management-Interface-default-gateway/m-p/114373#M15989</link>
      <description>&lt;P&gt;Thanks for the explanation, it started to make sense now.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Mar 2021 14:47:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-Management-Interface-default-gateway/m-p/114373#M15989</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2021-03-23T14:47:15Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 Management Interface default gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-Management-Interface-default-gateway/m-p/114395#M15994</link>
      <description>&lt;P&gt;Check Point does offer the ability to separate management and data forwarding. The main option for this is called VSX. It's just VRFs (implemented using Linux network namespaces on R80.40 and later), which are multiple routing tables (called FIBs) under one OS. Last time I checked, every firewall license includes the ability to run one additional VS specifically for this reason. When set up this way, VS 0 handles to-traffic, while the additional VS (commonly VS 1, but might be VS 2 or more if you add some switch contexts first) handles through-traffic.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Mar 2021 17:54:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-Management-Interface-default-gateway/m-p/114395#M15994</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2021-03-23T17:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 Management Interface default gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-Management-Interface-default-gateway/m-p/114396#M15995</link>
      <description>&lt;P&gt;Ehhhh ... most Palo Alto boxes don't actually have physically separate management plane and data plane. Their data plane has something a bit like an old Nokia ADP card, but the software part of data forwarding runs on specific cores on the same CPU as management. You can get a similar result with Check Point by limiting the number of load-bearing CoreXL instances and pinning them to certain cores with process affinity. As far as I can tell, PAN does their forwarding with UML, as opposed to multi-kernel like CoreXL, but it's definitely not on physically separate hardware on anything but their blade frames. If the OS wedges, you lose both data forwarding and management.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Mar 2021 18:12:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-Management-Interface-default-gateway/m-p/114396#M15995</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2021-03-23T18:12:57Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 Management Interface default gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-Management-Interface-default-gateway/m-p/114422#M16001</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&amp;gt;&amp;gt;&amp;gt;&lt;EM&gt;Their data plane has something a bit like an old Nokia ADP card, but the software part of data forwarding runs on specific cores on the same CPU as management&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;That's not exactly 100% accurate, but you are close to what I said. Your ADP card analogy is what I imply - separate from the main computation unit piece of HW dedicated to traffic filtering.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Mar 2021 08:12:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-Management-Interface-default-gateway/m-p/114422#M16001</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-03-24T08:12:07Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 Management Interface default gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-Management-Interface-default-gateway/m-p/114461#M16013</link>
      <description>&lt;P&gt;Sure, but it can't continue filtering and forwarding traffic in isolation for more than a few seconds. It has to interact with processes running on the main CPU. My point is mostly that if the OS running the "management plane" hangs, you lose both management and traffic forwarding. If you lose a stick of RAM, you lose both management and traffic forwarding. It's not like it computes a new FPGA LUT for each rule change.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Mar 2021 13:28:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-Management-Interface-default-gateway/m-p/114461#M16013</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2021-03-24T13:28:12Z</dc:date>
    </item>
  </channel>
</rss>

