<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: L3 mode and bridge mode in ha configuration? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/L3-mode-and-bridge-mode-in-ha-configuration/m-p/59424#M4506</link>
    <description>&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101371&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank" rel="noopener"&gt;sk101371 - Bridge Mode on Gaia OS and SecurePlatform OS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This sk lists everything related to bridge mode.&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Bridge mode is&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;fully supported&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;(unless stated otherwise) on Gaia / SecurePlatform OS by the following blades for single Security Gateway deployment, for cluster with one switch in Active/Active and Active/Standby deployment, and for cluster with four switches:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Or:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Limitations&lt;/P&gt;&lt;P&gt;Only&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;two&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;interfaces can be connected by a single Bridge interface. These two interfaces can then be thought of as a two-ports switch. Each port can be a Physical, a VLAN, or a Bond device.&lt;/P&gt;&lt;P&gt;These features, Software Blades and deployments are&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;not&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;supported in Bridge Mode:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;IPSec VPN Software Blade&lt;/LI&gt;&lt;LI&gt;Mobile Access Software Blade&lt;/LI&gt;&lt;LI&gt;"Full High Availability" deployment (where both ClusterXL members are also configured in Management HA)&lt;/LI&gt;&lt;LI&gt;NAT rules on Security Gateways (specifically, the traffic will be displayed as accepted by the FireWall kernel in logs, but will not actually depart on the other side, which may give the false impression that it is working).&lt;BR /&gt;Refer to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106146" target="_blank" rel="noopener"&gt;sk106146 - Configuration required on routers to allow NATed traffic to pass through Security Gateway in Bridge mode&lt;/A&gt;.&lt;/LI&gt;&lt;LI&gt;Access to Portals from bridged networks, if the bridge does not have an assigned IP address&lt;/LI&gt;&lt;LI&gt;Anti-Virus in Traditional Mode&lt;/LI&gt;&lt;LI&gt;Identity Awareness authentication other than AD Query (AD Query is the only supported authentication)&lt;/LI&gt;&lt;LI&gt;Assigning an IP address on Bridge interface in ClusterXL (any version)&lt;/LI&gt;&lt;LI&gt;ClusterXL in R75.40 and lower / R75.45 / R75.46 / R75.47&lt;/LI&gt;&lt;LI&gt;Asymmetric traffic inspection on Layer 2 Active/Active cluster deployment is not supported (asymmetric traffic inspection is any situation, where the Client-to-Server packet is inspected by one cluster member, while the Server-to-Client packet is inspected by the other member. In such scenarios several security features will not work)&lt;/LI&gt;&lt;/UL&gt;</description>
    <pubDate>Thu, 01 Aug 2019 08:37:15 GMT</pubDate>
    <dc:creator>Norbert_Bohusch</dc:creator>
    <dc:date>2019-08-01T08:37:15Z</dc:date>
    <item>
      <title>L3 mode and bridge mode in ha configuration?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/L3-mode-and-bridge-mode-in-ha-configuration/m-p/29968#M2385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;DIV&gt;Hi mates~!&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;BR /&gt;The check point&amp;nbsp;can&amp;nbsp;operate L3 mode and bridge mode in&amp;nbsp;HA&amp;nbsp;configuration?&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;I know&amp;nbsp;It can operate&amp;nbsp;L3 mode and bridge mode&amp;nbsp;in standalone mode.&lt;/DIV&gt;&lt;DIV&gt;But I think it is impossible in HA.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Please give me your advice.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Sep 2018 02:35:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/L3-mode-and-bridge-mode-in-ha-configuration/m-p/29968#M2385</guid>
      <dc:creator>TAEKBOM_Kim</dc:creator>
      <dc:date>2018-09-27T02:35:18Z</dc:date>
    </item>
    <item>
      <title>Re: L3 mode and bridge mode in ha configuration?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/L3-mode-and-bridge-mode-in-ha-configuration/m-p/59304#M4497</link>
      <description>&lt;P&gt;i got the same question, any answer for this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 06:05:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/L3-mode-and-bridge-mode-in-ha-configuration/m-p/59304#M4497</guid>
      <dc:creator>darrenkohcc</dc:creator>
      <dc:date>2019-07-31T06:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: L3 mode and bridge mode in ha configuration?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/L3-mode-and-bridge-mode-in-ha-configuration/m-p/59424#M4506</link>
      <description>&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101371&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank" rel="noopener"&gt;sk101371 - Bridge Mode on Gaia OS and SecurePlatform OS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This sk lists everything related to bridge mode.&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Bridge mode is&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;fully supported&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;(unless stated otherwise) on Gaia / SecurePlatform OS by the following blades for single Security Gateway deployment, for cluster with one switch in Active/Active and Active/Standby deployment, and for cluster with four switches:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Or:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Limitations&lt;/P&gt;&lt;P&gt;Only&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;two&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;interfaces can be connected by a single Bridge interface. These two interfaces can then be thought of as a two-ports switch. Each port can be a Physical, a VLAN, or a Bond device.&lt;/P&gt;&lt;P&gt;These features, Software Blades and deployments are&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;not&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;supported in Bridge Mode:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;IPSec VPN Software Blade&lt;/LI&gt;&lt;LI&gt;Mobile Access Software Blade&lt;/LI&gt;&lt;LI&gt;"Full High Availability" deployment (where both ClusterXL members are also configured in Management HA)&lt;/LI&gt;&lt;LI&gt;NAT rules on Security Gateways (specifically, the traffic will be displayed as accepted by the FireWall kernel in logs, but will not actually depart on the other side, which may give the false impression that it is working).&lt;BR /&gt;Refer to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106146" target="_blank" rel="noopener"&gt;sk106146 - Configuration required on routers to allow NATed traffic to pass through Security Gateway in Bridge mode&lt;/A&gt;.&lt;/LI&gt;&lt;LI&gt;Access to Portals from bridged networks, if the bridge does not have an assigned IP address&lt;/LI&gt;&lt;LI&gt;Anti-Virus in Traditional Mode&lt;/LI&gt;&lt;LI&gt;Identity Awareness authentication other than AD Query (AD Query is the only supported authentication)&lt;/LI&gt;&lt;LI&gt;Assigning an IP address on Bridge interface in ClusterXL (any version)&lt;/LI&gt;&lt;LI&gt;ClusterXL in R75.40 and lower / R75.45 / R75.46 / R75.47&lt;/LI&gt;&lt;LI&gt;Asymmetric traffic inspection on Layer 2 Active/Active cluster deployment is not supported (asymmetric traffic inspection is any situation, where the Client-to-Server packet is inspected by one cluster member, while the Server-to-Client packet is inspected by the other member. In such scenarios several security features will not work)&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Thu, 01 Aug 2019 08:37:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/L3-mode-and-bridge-mode-in-ha-configuration/m-p/59424#M4506</guid>
      <dc:creator>Norbert_Bohusch</dc:creator>
      <dc:date>2019-08-01T08:37:15Z</dc:date>
    </item>
  </channel>
</rss>

