<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Native VLAN in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Native-VLAN/m-p/148717#M23804</link>
    <description>&lt;P&gt;I'm note sure if I do not understand your question or you have a little misunderstanding what native vlan means &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Native VLAN means how to handle untagged traffic.&lt;/P&gt;
&lt;P&gt;When you say "We are using different VLAN other than VLAN 1 as native VLAN" you mean, that the switchport, your Check Point gateway is connected to, is set up as trunk and has a native vlan configured other than 1, right?&lt;/P&gt;
&lt;P&gt;In Cisco Syntax, this would look like this:&lt;/P&gt;
&lt;PRE&gt;switchport mode trunk&lt;BR /&gt;switchport trunk allowed vlan 10,25,35,999&lt;BR /&gt;switchport trunk native vlan 999&lt;/PRE&gt;
&lt;P&gt;If this is what you meant:&lt;/P&gt;
&lt;P&gt;This means that every Ethernet frame, this switchport receives from your gateway and which is not tagged (IEEE 802.1q) by the Gateway (Gaia) is handled as VLAN 999 traffic by the switch. Your SMB gateway is not tagging ethernet frames for interfaces which you define as normal (and not VLAN) interfaces.&lt;/P&gt;
&lt;P&gt;Staying in this example, your traffic send by SMB gateway will also be assigned to VLAN 999 by the switch if you configure your gateway interface als VLAN 999 Subinterface (traffic is send tagged). But take care: The switch will send the traffic to your gateway without the VLAN tag, because the native vlan is set to that VLAN ID. So this will not work.&lt;/P&gt;
&lt;P&gt;If your switchport is not configured as trunk but as access port:&lt;/P&gt;
&lt;PRE&gt;switchport mode access&lt;BR /&gt;switchport access vlan 999&lt;/PRE&gt;
&lt;P&gt;it will also only work if you configure the SMB gateway with a normal interface (without tagging).&lt;/P&gt;
&lt;P&gt;This is because the (Cisco) switch with this configuration will only accept untagged packets and send untagged packets (if no voice vlan is configured).&lt;/P&gt;
&lt;P&gt;To summarize:&lt;/P&gt;
&lt;P&gt;If you need to send/receive traffic to/from the native vlan, then configure the gateway interface as normal (not VLAN/tagged). If you do not need to send/receive traffic to/from the native vlan, than just ignore that number and configure VLAN interfaces for the VLANs you need.&lt;/P&gt;</description>
    <pubDate>Mon, 16 May 2022 14:52:02 GMT</pubDate>
    <dc:creator>Tobias_Moritz</dc:creator>
    <dc:date>2022-05-16T14:52:02Z</dc:date>
    <item>
      <title>Native VLAN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Native-VLAN/m-p/148713#M23801</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Is there any way we can define Native VLAN on Checkpoint SMB firewalls? We are using different VLAN other than VLAN 1 as native VLAN and is it possible to define it somewhere on the firewalls?&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sanjay S&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2022 14:19:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Native-VLAN/m-p/148713#M23801</guid>
      <dc:creator>Sanjay_S</dc:creator>
      <dc:date>2022-05-16T14:19:56Z</dc:date>
    </item>
    <item>
      <title>Re: Native VLAN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Native-VLAN/m-p/148716#M23803</link>
      <description>&lt;P&gt;Please, review this previous CheckMate discussion.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Gaia-r80-10-tag-vlan-1-and-native-vlan/td-p/57040" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/Gaia-r80-10-tag-vlan-1-and-native-vlan/td-p/57040&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2022 14:40:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Native-VLAN/m-p/148716#M23803</guid>
      <dc:creator>CE_SE</dc:creator>
      <dc:date>2022-05-16T14:40:29Z</dc:date>
    </item>
    <item>
      <title>Re: Native VLAN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Native-VLAN/m-p/148717#M23804</link>
      <description>&lt;P&gt;I'm note sure if I do not understand your question or you have a little misunderstanding what native vlan means &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Native VLAN means how to handle untagged traffic.&lt;/P&gt;
&lt;P&gt;When you say "We are using different VLAN other than VLAN 1 as native VLAN" you mean, that the switchport, your Check Point gateway is connected to, is set up as trunk and has a native vlan configured other than 1, right?&lt;/P&gt;
&lt;P&gt;In Cisco Syntax, this would look like this:&lt;/P&gt;
&lt;PRE&gt;switchport mode trunk&lt;BR /&gt;switchport trunk allowed vlan 10,25,35,999&lt;BR /&gt;switchport trunk native vlan 999&lt;/PRE&gt;
&lt;P&gt;If this is what you meant:&lt;/P&gt;
&lt;P&gt;This means that every Ethernet frame, this switchport receives from your gateway and which is not tagged (IEEE 802.1q) by the Gateway (Gaia) is handled as VLAN 999 traffic by the switch. Your SMB gateway is not tagging ethernet frames for interfaces which you define as normal (and not VLAN) interfaces.&lt;/P&gt;
&lt;P&gt;Staying in this example, your traffic send by SMB gateway will also be assigned to VLAN 999 by the switch if you configure your gateway interface als VLAN 999 Subinterface (traffic is send tagged). But take care: The switch will send the traffic to your gateway without the VLAN tag, because the native vlan is set to that VLAN ID. So this will not work.&lt;/P&gt;
&lt;P&gt;If your switchport is not configured as trunk but as access port:&lt;/P&gt;
&lt;PRE&gt;switchport mode access&lt;BR /&gt;switchport access vlan 999&lt;/PRE&gt;
&lt;P&gt;it will also only work if you configure the SMB gateway with a normal interface (without tagging).&lt;/P&gt;
&lt;P&gt;This is because the (Cisco) switch with this configuration will only accept untagged packets and send untagged packets (if no voice vlan is configured).&lt;/P&gt;
&lt;P&gt;To summarize:&lt;/P&gt;
&lt;P&gt;If you need to send/receive traffic to/from the native vlan, then configure the gateway interface as normal (not VLAN/tagged). If you do not need to send/receive traffic to/from the native vlan, than just ignore that number and configure VLAN interfaces for the VLANs you need.&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2022 14:52:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Native-VLAN/m-p/148717#M23804</guid>
      <dc:creator>Tobias_Moritz</dc:creator>
      <dc:date>2022-05-16T14:52:02Z</dc:date>
    </item>
    <item>
      <title>Re: Native VLAN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Native-VLAN/m-p/148719#M23806</link>
      <description>&lt;P&gt;&lt;SPAN&gt;You can get an official TAC answer, but Im 99.99% sure its not supported as of yet.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2022 14:53:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Native-VLAN/m-p/148719#M23806</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-05-16T14:53:28Z</dc:date>
    </item>
    <item>
      <title>Re: Native VLAN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Native-VLAN/m-p/148720#M23807</link>
      <description>&lt;P&gt;This is the way!&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2022 15:16:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Native-VLAN/m-p/148720#M23807</guid>
      <dc:creator>K_montalvo</dc:creator>
      <dc:date>2022-05-16T15:16:28Z</dc:date>
    </item>
    <item>
      <title>Re: Native VLAN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Native-VLAN/m-p/149043#M23860</link>
      <description>&lt;P&gt;Mixing of untagged and tagged traffic on the same interface is not supported as the_rock said.&amp;nbsp; However in my experience it does seem to work fine on a non-clustered firewall but could suddenly break at any point.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However trying to do this on a firewall that is part of a ClusterXL cluster will cause some nasty problems involving performance which was called out in my Max Power 2020 book:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;Question:&lt;/STRONG&gt; Our HA firewall cluster is using 802.1q trunked interfaces with a mixture&lt;BR /&gt;of tagged and untagged traffic on the same physical interface, and the network&lt;BR /&gt;performance is terrible. Why?&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;Answer:&lt;/STRONG&gt; Don’t do this as it is not supported. If you have an interface processing&lt;BR /&gt;VLAN-tagged traffic, all traffic inbound to the interface should be tagged. There should&lt;BR /&gt;not be any untagged (sometimes called native) traffic arriving at the interface. See&lt;BR /&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101428&amp;amp;partition=Basic&amp;amp;product=ClusterXL" target="_blank"&gt;sk101428: Poor performance on Unicast Load Sharing ClusterXL when using native/untagged VLANs&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 May 2022 14:54:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Native-VLAN/m-p/149043#M23860</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-05-19T14:54:10Z</dc:date>
    </item>
  </channel>
</rss>

