<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: External Topology and Addressing in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/External-Topology-and-Addressing/m-p/149370#M23939</link>
    <description>&lt;P&gt;My 2cents,&lt;/P&gt;&lt;P&gt;Even if an /24 sounds BIG, you will soon exhaust it&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt;.&lt;/P&gt;&lt;P&gt;I would split it in many subnets, one for routing, one for DMZ, etc etc.&lt;/P&gt;&lt;P&gt;As for size of the splits, think loong run plans...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thx,&lt;/P&gt;</description>
    <pubDate>Tue, 24 May 2022 20:01:19 GMT</pubDate>
    <dc:creator>Sorin_Gogean</dc:creator>
    <dc:date>2022-05-24T20:01:19Z</dc:date>
    <item>
      <title>External Topology and Addressing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/External-Topology-and-Addressing/m-p/149288#M23929</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have an ARIN assigned&amp;nbsp; /24 public range. The physical topology of external internet link is the typical ISP &amp;lt;&amp;gt; External Router &amp;lt;&amp;gt; Layer2 Switches &amp;lt;&amp;gt; Checkpoint ClusterXL.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it best to use /24 for addressing the external&amp;nbsp;Checkpoint ClusterXL interfaces/VIP or use a smaller /28 or /29 for addressing&amp;nbsp;the external&amp;nbsp;Checkpoint ClusterXL interfaces and then route the /24 range on the External Router to the Checkpoint ClusterXL VIP interface?&lt;BR /&gt;&lt;BR /&gt;I know both will work but wanted to get some feedback on best practices and security considerations. Note - we also have DDoS protection/scubbing on the /24 range. As a result is it safer to use the first option?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 04:30:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/External-Topology-and-Addressing/m-p/149288#M23929</guid>
      <dc:creator>ham2065</dc:creator>
      <dc:date>2022-05-24T04:30:53Z</dc:date>
    </item>
    <item>
      <title>Re: External Topology and Addressing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/External-Topology-and-Addressing/m-p/149321#M23930</link>
      <description>&lt;P&gt;Usually, external routable IPs are scares and expensive, so people are trying to be as economical as possible when defining the external subnet. But if you have /24, knock yourself out and have a party &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;From where I stand, these settings are not related to security but to networking.&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 11:42:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/External-Topology-and-Addressing/m-p/149321#M23930</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-05-24T11:42:42Z</dc:date>
    </item>
    <item>
      <title>Re: External Topology and Addressing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/External-Topology-and-Addressing/m-p/149325#M23931</link>
      <description>&lt;P&gt;Either way but routing the addresses towards the firewall and removing a reliance on proxy-arp gets my vote.&lt;/P&gt;
&lt;P&gt;Also since you raised the DDoS topic you may opt only to route the used addresses and send the others to Null.&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 12:03:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/External-Topology-and-Addressing/m-p/149325#M23931</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-05-24T12:03:03Z</dc:date>
    </item>
    <item>
      <title>Re: External Topology and Addressing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/External-Topology-and-Addressing/m-p/149370#M23939</link>
      <description>&lt;P&gt;My 2cents,&lt;/P&gt;&lt;P&gt;Even if an /24 sounds BIG, you will soon exhaust it&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt;.&lt;/P&gt;&lt;P&gt;I would split it in many subnets, one for routing, one for DMZ, etc etc.&lt;/P&gt;&lt;P&gt;As for size of the splits, think loong run plans...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thx,&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 20:01:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/External-Topology-and-Addressing/m-p/149370#M23939</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-05-24T20:01:19Z</dc:date>
    </item>
  </channel>
</rss>

