<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Management Plane Separation - mdps_tun connected route in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/142381#M22029</link>
    <description>&lt;P&gt;Thanks, I will get in touch with the support to investigate further.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 24 Feb 2022 09:23:40 GMT</pubDate>
    <dc:creator>vsurresh</dc:creator>
    <dc:date>2022-02-24T09:23:40Z</dc:date>
    <item>
      <title>Management Plane Separation - mdps_tun connected route</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/140903#M21647</link>
      <description>&lt;P&gt;Hi all.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I recently made the change to enable management plane separation following&amp;nbsp;sk138672. After the change, I noticed something I don't understand. Attached you will find a diagram that represents the network.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I connect (ssh, https) from the PC (green) the traffic goes to the check point management interface directly and no issues. The traffic goes directly into the management interface and doesn't have to traverse the check point data plane.&lt;/P&gt;&lt;P&gt;If I, however, connect from the laptop (shown as black on top of the diagram) from a different network, I'm getting a connection refused from the firewall. My understanding is that the data plane and management plane are totally isolated so, the traffic should follow the following path.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Laptop &amp;gt; check point (eth1) &amp;gt; Router &amp;gt; check point management interface. However, it doesn't work at the moment. I already have a firewall policy to allow the connections. (Check point has a static route for 172.16.10.0/24 pointing to the Router)&lt;/P&gt;&lt;P&gt;If I check the data plane routing table, it has an entry for 172.16.10.10/32 shown as&amp;nbsp;&lt;STRONG&gt;mdps_tun.&lt;/STRONG&gt; Does that mean the traffic is not forwarded to the router?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;C 172.16.10.10/32 is directly connected, mdps_tun&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Diagrams-1 5.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15328iB6A85051AA592C24/image-size/large?v=v2&amp;amp;px=999" role="button" title="Diagrams-1 5.jpg" alt="Diagrams-1 5.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 16:52:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/140903#M21647</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2022-02-08T16:52:36Z</dc:date>
    </item>
    <item>
      <title>Re: Management Plane Separation - mdps_tun connected route</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/142377#M22026</link>
      <description>&lt;P&gt;This is the expected behaviour if you enabled the management plane. Any your question is?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Feb 2022 08:25:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/142377#M22026</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-02-24T08:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: Management Plane Separation - mdps_tun connected route</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/142379#M22027</link>
      <description>&lt;P&gt;Thanks for the response. When you say expected behaviour, does that mean the firewall 'won't' allow traffic crossing from the data plane to the management plane even via a different path? (not directly crossing between the planes)&lt;/P&gt;&lt;P&gt;My question is, why the check point just doesn't send the traffic to the next hop which is the router?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Feb 2022 09:14:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/142379#M22027</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2022-02-24T09:14:26Z</dc:date>
    </item>
    <item>
      <title>Re: Management Plane Separation - mdps_tun connected route</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/142380#M22028</link>
      <description>&lt;P&gt;No, it does not mean that. You need to run some traces to see if the traffic from production plane to MGMT interface is dropped, and go from there. It is not enough info here to say why it happens.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Feb 2022 09:20:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/142380#M22028</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-02-24T09:20:58Z</dc:date>
    </item>
    <item>
      <title>Re: Management Plane Separation - mdps_tun connected route</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/142381#M22029</link>
      <description>&lt;P&gt;Thanks, I will get in touch with the support to investigate further.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Feb 2022 09:23:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/142381#M22029</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2022-02-24T09:23:40Z</dc:date>
    </item>
    <item>
      <title>Re: Management Plane Separation - mdps_tun connected route</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/142382#M22030</link>
      <description>&lt;P&gt;That would be a good idea&lt;/P&gt;</description>
      <pubDate>Thu, 24 Feb 2022 09:27:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/142382#M22030</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-02-24T09:27:48Z</dc:date>
    </item>
    <item>
      <title>Re: Management Plane Separation - mdps_tun connected route</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/147303#M23511</link>
      <description>&lt;P&gt;HI vsurresh, have you opened a case? I have also different problem with the mplane when it need to reach a network via the dplane.&lt;/P&gt;&lt;P&gt;the flow is blocked by the ANti Spoofing because it detect this is a local ip address. I have disabled the local antispoofing but the log is not anymore presented but the mplane don't get any response.&lt;/P&gt;&lt;P&gt;and I have another problematic to manage the NAT, because the Nat configuration is global and not by plane.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think the better way to have a plan separation is to use the VSX.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Apr 2022 08:22:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/147303#M23511</guid>
      <dc:creator>laurent_ragon</dc:creator>
      <dc:date>2022-04-28T08:22:27Z</dc:date>
    </item>
    <item>
      <title>Re: Management Plane Separation - mdps_tun connected route</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/166251#M29910</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Were u able to resolve this?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Dec 2022 15:34:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/166251#M29910</guid>
      <dc:creator>Malik1</dc:creator>
      <dc:date>2022-12-28T15:34:24Z</dc:date>
    </item>
    <item>
      <title>Re: Management Plane Separation - mdps_tun connected route</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/233388#M45158</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;I have the same issue. The configuration is very similar and on dataplane I have the route to the network where Mgmt interface (on mplane) is connected.&lt;/P&gt;&lt;P&gt;If I ping the IP of MGMT from Laptop: traffic access on dataplane but don't go out from it. Strange behavior is that it works.&lt;/P&gt;&lt;P&gt;If i try ssh to the IP of MGMT from Laptop traffic follow the same path but I have a reset maybe because sshd is on mplane binded.&lt;/P&gt;&lt;P&gt;R81.20 JHR 84 for my environment.&lt;/P&gt;&lt;P&gt;Did you solve it in some way?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2024 11:26:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/233388#M45158</guid>
      <dc:creator>Marco32</dc:creator>
      <dc:date>2024-11-21T11:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: Management Plane Separation - mdps_tun connected route</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/233581#M45213</link>
      <description>&lt;P&gt;Did you ever get a proper solution to this issue?&amp;nbsp; I have a similar topology, and am unable to pass traffic to/from the management interface once the management network's connectivity is handled by the Checkpoint FW itself.&amp;nbsp; (Converting from another FW brand)&amp;nbsp; Mgmt-initiated traffic fails when the first packet hits a dplane interface with an extended anti-spoofing hit.&amp;nbsp; Inbound traffic to Mgmt from elsewhere takes the first packet arriving on a dplane interface thru the back door via that "mdps_tun" route, and then the outbound reply from mplane/Mgmt breaks flow symmetry and dies.&amp;nbsp; Wondering if there's any legitimate reason for mdps_tun to exist at all and if there's any way to get rid of it but keep the rest of MDPS.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Nov 2024 20:50:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Plane-Separation-mdps-tun-connected-route/m-p/233581#M45213</guid>
      <dc:creator>mrdorn</dc:creator>
      <dc:date>2024-11-22T20:50:58Z</dc:date>
    </item>
  </channel>
</rss>

