<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Combining all interfaces in one bond, how bad is this practice? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29179#M2331</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The only thing I would ask, do you think you are paranoid enough?&amp;nbsp; Better practice is the separate internet and intranet traffic on different switches.&amp;nbsp; The theory is that one day, someone will 0 day VLAN or just hack the box.&amp;nbsp; Then you can bypass the firewall if it is in the same switch.&amp;nbsp; Then you would have 2 bonds and not loop back on the interface for everything.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 15 Feb 2018 20:56:33 GMT</pubDate>
    <dc:creator>George_Ellis</dc:creator>
    <dc:date>2018-02-15T20:56:33Z</dc:date>
    <item>
      <title>Combining all interfaces in one bond, how bad is this practice?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29165#M2317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a couple of clients who have proposed a design where you put all internal and Internet VLANs in a single bond. One client has dual 10G interfaces which they want to bond and another wants to bond eth1 through eth8. The end result is the same. All VLANs, including Internet in the same logical interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have my own concerns about this approach &lt;SPAN style="display: inline !important; float: none; background-color: transparent; color: #3d3d3d; font-family: Helvetica Neue,Helvetica,Arial,Lucida Grande,sans-serif; font-size: 15px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; word-wrap: break-word;"&gt;(resource allocation, availability and security etc) &lt;/SPAN&gt;but wanted to hear what the combined knowledge of this community thinks about it. I'm no design architect and these designs were proposed by architects so I need more confidence before I oppose this design. If my concerns are at all valid of course.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2018 12:23:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29165#M2317</guid>
      <dc:creator>Ilmo_Anttonen</dc:creator>
      <dc:date>2018-02-12T12:23:17Z</dc:date>
    </item>
    <item>
      <title>Re: Combining all interfaces in one bond, how bad is this practice?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29166#M2318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ilmo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well I think that's could be a good idea. I would ask you to take care of Sync interface : still use a dedicated interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2018 16:55:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29166#M2318</guid>
      <dc:creator>XavierBens</dc:creator>
      <dc:date>2018-02-12T16:55:31Z</dc:date>
    </item>
    <item>
      <title>Re: Combining all interfaces in one bond, how bad is this practice?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29167#M2319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Conceptually, there is nothing wrong with this approach. In VSX implementations, its common to use trunk for multi-VLAN allocation.&lt;/P&gt;&lt;P&gt;You may run in some LACP compatibility issues, (I've seen one just recently with Cisco 3850 switches), but other than that, I'd say it is OK for 10G interfaces.&lt;/P&gt;&lt;P&gt;My personal preference regarding 1G interfaces is not to utilize those to the full capacity of the appliance, in case you'll need to mirror the traffic, enable asymmetric connectivity of the cluster members to a non-redundant resources, etc..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If someone from CP can tell us how the buffer sizes of the bonded interfaces with VLANs are being allocated, It'll be great.&lt;/P&gt;&lt;P&gt;Additionally, I'd like to better understand the implications of bonding interfaces that belong to modules in different slots.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2018 17:36:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29167#M2319</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-12T17:36:22Z</dc:date>
    </item>
    <item>
      <title>Re: Combining all interfaces in one bond, how bad is this practice?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29168#M2320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Xavier,&lt;/P&gt;&lt;P&gt;I have DMI and a proper sync interface. I was talking about normal traffic interfaces.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2018 20:26:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29168#M2320</guid>
      <dc:creator>Ilmo_Anttonen</dc:creator>
      <dc:date>2018-02-12T20:26:32Z</dc:date>
    </item>
    <item>
      <title>Re: Combining all interfaces in one bond, how bad is this practice?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29169#M2321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the 10G interface case it's a standard two appliance cluster consisting of 5900 appliances connected to a Cisco Nexus cluster. I havent encountered any LACP issues there luckily.&lt;/P&gt;&lt;P&gt;The other installation is two 5600 standard appliances configured as VSLS cluster.&lt;/P&gt;&lt;P&gt;I realize that VSX or not may affect the decision as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My concerns are that:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You can't just pull the plug on the Internet interface in case of an DDOS like attack because it's a VLAN and your firewall might not be very responsive in such an event.&lt;/LI&gt;&lt;LI&gt;What happens if an unknowing new admin sets up a trunk interface and allows all VLANs? They might not realise they've just moved your internet over there as well.&lt;/LI&gt;&lt;LI&gt;Also, you would have to manually allocate CPU resources to this bond interface unless you're comfortable with running all your traffic on a single core. Am I wrong?&lt;/LI&gt;&lt;LI&gt;I might come off as conservative, but I'd feel a lot more at ease having separated unknown traffic (Internet) from known traffic (LAN) and not actually put my core switch between the ISP router and the firewall.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If these aren't legit conserns with this type of design then I'm all OK with it.&lt;/P&gt;&lt;P&gt;Thanks for helping guys!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/ Ilmo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2018 20:44:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29169#M2321</guid>
      <dc:creator>Ilmo_Anttonen</dc:creator>
      <dc:date>2018-02-12T20:44:36Z</dc:date>
    </item>
    <item>
      <title>Re: Combining all interfaces in one bond, how bad is this practice?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29170#M2322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; font-size: 14px;"&gt;Let's try to address those one at a time:&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; font-size: 14px;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; font-size: 14px;"&gt;My concerns are that:&lt;/P&gt;&lt;UL style="color: #333333; background-color: #ffffff; border: 0px; font-size: 14px; padding: 0px 0px 0px 30px;"&gt;&lt;LI style="border: 0px; font-weight: inherit; font-size: 14px; margin: 0.5ex 0px;"&gt;You can't just pull the plug on the Internet interface in case of an DDOS like attack because it's a VLAN and your firewall might not be very responsive in such an event.&lt;/LI&gt;&lt;LI style="border: 0px; font-weight: inherit; font-size: 14px; margin: 0.5ex 0px;"&gt;&amp;gt;&amp;gt;1. You can always bag the VLAN on the switch. You may have an option to do the same via LOM or console. That being said, if you have the option of separating external traffic from internal on the interface level, I'd do that as well.&lt;/LI&gt;&lt;LI style="border: 0px; font-weight: inherit; font-size: 14px; margin: 0.5ex 0px;"&gt;What happens if an unknowing new admin sets up a trunk interface and allows all VLANs? They might not realize they've just moved your internet over there as well.&lt;/LI&gt;&lt;LI style="border: 0px; font-weight: inherit; font-size: 14px; margin: 0.5ex 0px;"&gt;&amp;gt;&amp;gt; so long as there are no corresponding VLANs configured on Check Point devices, this traffic will be ignored. The only downside to this scenario is that there be a lot of L2 frames with wrong 802.1Q tags being discarded.&lt;/LI&gt;&lt;LI style="border: 0px; font-weight: inherit; font-size: 14px; margin: 0.5ex 0px;"&gt;Also, you would have to manually allocate CPU resources to this bond interface unless you're comfortable with running all your traffic on a single core. Am I wrong?&lt;/LI&gt;&lt;LI style="border: 0px; font-weight: inherit; font-size: 14px; margin: 0.5ex 0px;"&gt;&amp;gt;&amp;gt;Tim Hall will probably be able to give you more intelligent answer on this subject.&lt;/LI&gt;&lt;LI style="border: 0px; font-weight: inherit; font-size: 14px; margin: 0.5ex 0px;"&gt;I might come off as conservative, but I'd feel a lot more at ease having separated unknown traffic (Internet) from known traffic (LAN) and not actually put my core switch between the ISP router and the firewall.&lt;/LI&gt;&lt;LI style="border: 0px; font-weight: inherit; font-size: 14px; margin: 0.5ex 0px;"&gt;&amp;gt;&amp;gt; I share your sentiment coming from conventional infrastructure background myself, but as most of modern deployments rely on SDNs, the switching fabric really becoming a consumable commodity. Consider cloud-based deployments: you are defining vSEC instances and their interfaces, but in reality, all of those interfaces share common bonded interface connected to the top-of-the-rack switches and aggregation switches.&lt;/LI&gt;&lt;/UL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2018 22:20:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29170#M2322</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-12T22:20:52Z</dc:date>
    </item>
    <item>
      <title>Re: Combining all interfaces in one bond, how bad is this practice?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29171#M2323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many thanks Vlad!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm sure Tim Hall will have good input. I wanted to buy his book in Barcelona but he didn't accept credit card ^_^&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2018 23:14:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29171#M2323</guid>
      <dc:creator>Ilmo_Anttonen</dc:creator>
      <dc:date>2018-02-12T23:14:41Z</dc:date>
    </item>
    <item>
      <title>Re: Combining all interfaces in one bond, how bad is this practice?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29172#M2324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;At least you've got to be there:) I have not yet ever made it to CPX:(&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2018 23:17:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29172#M2324</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-12T23:17:40Z</dc:date>
    </item>
    <item>
      <title>Re: Combining all interfaces in one bond, how bad is this practice?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29173#M2325</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have to ask, would the 5900 appliance be able to handle a fully saturated 10G link? What blades are they going to use?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the 8x1G bonded links, I would make sure that they are spread over different ASIC groups on the upstream switches.&amp;nbsp; Again I question if the 5600 would be able to handle 8Gbps throughput&amp;nbsp; if you have multiple blades enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jason&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2018 02:57:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29173#M2325</guid>
      <dc:creator>Jason_Dance</dc:creator>
      <dc:date>2018-02-13T02:57:25Z</dc:date>
    </item>
    <item>
      <title>Re: Combining all interfaces in one bond, how bad is this practice?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29174#M2326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For me it depends on the placement of a gateway. If we are talking about a cluster of hardware appliances and they are situated on the perimeter, case of an external firewall, then I would use separate interfaces for external and internal connections, I even would try to use different physical switches for external and internal zones.&amp;nbsp;I'm kind of conservative in that sense too. In case of physically separated interfaces and switches we have less possibilities to do some totally bad configuration (on switches mostly), we have segmentation of devices by functions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as Vladimir mentioned it is a different case with VSX and cloud gateways. And for totally internal firewall I wouldn't have any issues with using one bond for all networks. I tend to agree with Vladimir on the topic of&amp;nbsp;gathering all 1G interfaces into one bond, better to leave 2 interfaces for possible future changes in the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had one case when I couldn't use bond interfaces for external connections. I configured two physical interfaces from an appliance into bond, I added vlan interfaces on it, and the additional trick was that there was only 1 external public IP address for this office. So I needed to configure private IP addresses (192.168.X.X) for cluster nodes and public IP address for the cluster IP. Usually this setup with different IPs work without any issues, just need to add a proper route on the cluster. But it was not working with bond and vlan interface, when all these things configured in the same time. It was R77.30 with the latest Jumbo Hotfix available at that time. We contacted Check Point Support, they took a look, we tried to fix it, but we didn't have too much time for this implementation and for all possible debugs, so our conclusion was that this setup with these three things combined is not working (bond + vlan + public and private IPs on one interface). When I used only one interface for external connections (+ vlan +&amp;nbsp;&lt;SPAN&gt;public and private IPs on one interface) it started to work.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;At the same time we had 3 interfaces combined into bond for internal networks, so it was not a configuration issue or some problem with switches.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2018 08:13:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29174#M2326</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-02-13T08:13:01Z</dc:date>
    </item>
    <item>
      <title>Re: Combining all interfaces in one bond, how bad is this practice?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29175#M2327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think you've brought up very valid questions about blades running on those appliances.&lt;/P&gt;&lt;P&gt;For 5900 appliance, under "Ideal" conditions, the numbers are:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63034_pastedImage_1.png" style="width: 620px; height: 146px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For 5600:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63035_pastedImage_2.png" style="width: 620px; height: 156px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the port aggregation may make sense from flexibility and reliability point of view, (i.e. trunking and failover), but not necessarily from performance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So long as the architect is taking these figures into account, it is still a feasible approach.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2018 15:45:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29175#M2327</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-13T15:45:25Z</dc:date>
    </item>
    <item>
      <title>Re: Combining all interfaces in one bond, how bad is this practice?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29176#M2328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My experience with enabling the various blades is that its difficult to achieve ideal conditions.&amp;nbsp; For example, you can employ URL filtering and Application control easily enough and have negligible load increase on your gateway.&amp;nbsp; As soon as you enable HTTPS filtering, you not only add the extra decryption/encryption tasks onto your CPU load, you are no longer able to pass the traffic through acceleration, which increases CPU load more as the traffic needing inspection is increased.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While the&amp;nbsp;physical connectivity&amp;nbsp;architecture of the solution is sound, the practical use may not be so depending on the blades employed in the solution.&amp;nbsp; Ilmo Anttonen may want to relay this information to his customers for further discussion.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2018 16:10:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29176#M2328</guid>
      <dc:creator>Jason_Dance</dc:creator>
      <dc:date>2018-02-13T16:10:37Z</dc:date>
    </item>
    <item>
      <title>Re: Combining all interfaces in one bond, how bad is this practice?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29177#M2329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the input both of you, Aleksei and Jason!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Very valid points you are raising as I think both of the clients wants to run all available features except for https inspection and threat extraction (not purchased). I wasn't part of the discussion when the models were decided, but from experience I know that it's not uncommon that the architect suggests a model which will suit all the customers needs and then the customer decides for a model two steps below because it looks a lot cheaper and thinks that will suffice.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not saying this is the case this time, but it wouldn't be a big surprise. Anyhow, I will raise the question with the architect.&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the numbers presented above it seems like anything above 3 interfaces in a bond is waste of interfaces on the 5600 installation. Very good to know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Big thanks, all of you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/ Ilmo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2018 16:31:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29177#M2329</guid>
      <dc:creator>Ilmo_Anttonen</dc:creator>
      <dc:date>2018-02-13T16:31:44Z</dc:date>
    </item>
    <item>
      <title>Re: Combining all interfaces in one bond, how bad is this practice?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29178#M2330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ilmo, you're welcome!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One other thing to consider.&amp;nbsp; If the gateway is providing east/west protection, you may want to also consider the remote possibility of vlan hopping to break out of a protected network.&amp;nbsp; In order to execute that type of exploit, the attacker would need some type of access to ports on switches that are willing to trunk.&amp;nbsp; If you have the east and west side both going through a single bonded group of interfaces, then it might be possible to break across into a privileged network.&amp;nbsp; The simple answer to this is to make sure the switches are configured correctly to not allow that to happen.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2018 16:46:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29178#M2330</guid>
      <dc:creator>Jason_Dance</dc:creator>
      <dc:date>2018-02-13T16:46:58Z</dc:date>
    </item>
    <item>
      <title>Re: Combining all interfaces in one bond, how bad is this practice?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29179#M2331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The only thing I would ask, do you think you are paranoid enough?&amp;nbsp; Better practice is the separate internet and intranet traffic on different switches.&amp;nbsp; The theory is that one day, someone will 0 day VLAN or just hack the box.&amp;nbsp; Then you can bypass the firewall if it is in the same switch.&amp;nbsp; Then you would have 2 bonds and not loop back on the interface for everything.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Feb 2018 20:56:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29179#M2331</guid>
      <dc:creator>George_Ellis</dc:creator>
      <dc:date>2018-02-15T20:56:33Z</dc:date>
    </item>
    <item>
      <title>Re: Combining all interfaces in one bond, how bad is this practice?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29180#M2332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The presence of a bonded interface doesn't have much of an impact performance-wise as far as the SND/IRQ cores are concerned servicing SoftIRQs from the interfaces.&amp;nbsp; When two or more interfaces are bonded, the&amp;nbsp; physical interfaces are still handled individually as far as SoftIRQ processing. If they are all very busy and SecureXL automatic affinity is enabled, each physical interface's SoftIRQ processing will probably end up on a different SND/IRQ core assuming there are enough to go around.&amp;nbsp; So the usual tuning recommendations of possibly adding more SND/IRQ cores and possibly enabling Multi-Queue to avoid RX-DRPs still applies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as using NIC ports that are "on-board" vs located on an expansion card, I have no idea if having the physical interfaces associated with a bond all be part of the same slot vs. being "diversified" between different slots would help or hurt.&amp;nbsp; I'd think it would depend on the hardware architecture.&amp;nbsp; However there is one limitation I am aware of: the built-in I211 NIC cards on the 3200/5000/15000/23000 series can only have a maximum of 2 queues defined for use with Multi-Queue, while the expansion cards can have at least four or even up to 16 depending on the card model.&amp;nbsp; &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk114625&amp;amp;partition=Advanced&amp;amp;product=Small" style="max-width: 840px;"&gt;sk114625: Multi-Queue does not work on 3200 / 5000 / 15000 / 23000 appliances when it is enabled for on-board interfaces&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I'd *probably* want to avoid using the onboard NICs on these models for the bond if possible, but the traffic levels may well not get high enough to make a meaningful difference as the processing cores will run out of gas long before this queue limitation starts to matter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Feb 2018 22:27:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29180#M2332</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-02-15T22:27:24Z</dc:date>
    </item>
    <item>
      <title>Re: Combining all interfaces in one bond, how bad is this practice?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29181#M2333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For what its worth we run 8 x 10G VPC bond and its perfect from a networking/failover viewpoint. I think Cisco call this "firewall on-a-stick". I dont like the old school separation quoted here. If you run both north and south switches then there are two failure scenarios and you also have to maintain additional switches. We also configure CoreXL and interface buffers. To my mind, none of your other concerns would change our design.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Feb 2018 22:33:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29181#M2333</guid>
      <dc:creator>Simon_Taylor</dc:creator>
      <dc:date>2018-02-15T22:33:32Z</dc:date>
    </item>
    <item>
      <title>Re: Combining all interfaces in one bond, how bad is this practice?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29182#M2334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe I am &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;Unfortunately (or rather luckily because i prefer working with firewalls) I'm not involved in the network planning. I'm just there to install firewalls, enable blades and and make sure everything is updated and working before I hand it over to the admins and give them instructions on how to handle every day operations.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 14:49:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/29182#M2334</guid>
      <dc:creator>Ilmo_Anttonen</dc:creator>
      <dc:date>2018-02-16T14:49:26Z</dc:date>
    </item>
    <item>
      <title>Re: Combining all interfaces in one bond, how bad is this practice?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/58700#M4445</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just my two cents worth ..&lt;/P&gt;&lt;P&gt;I have some customers who have had this design and they have not experienced any issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Obviously the Vlan hopping is a security consideration but it does work.&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2019 09:58:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Combining-all-interfaces-in-one-bond-how-bad-is-this-practice/m-p/58700#M4445</guid>
      <dc:creator>Darren_Fine</dc:creator>
      <dc:date>2019-07-22T09:58:52Z</dc:date>
    </item>
  </channel>
</rss>

