<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco to checkpoint configuration in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cisco-to-checkpoint-configuration/m-p/59982#M4541</link>
    <description>&lt;P&gt;Then login to the GAiA WebUI on configure the interfaces as extracted from your Cisco config.&lt;/P&gt;</description>
    <pubDate>Fri, 09 Aug 2019 19:39:45 GMT</pubDate>
    <dc:creator>Danny</dc:creator>
    <dc:date>2019-08-09T19:39:45Z</dc:date>
    <item>
      <title>Cisco to checkpoint configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cisco-to-checkpoint-configuration/m-p/59974#M4535</link>
      <description>&lt;PRE&gt;Hi all, &lt;BR /&gt;Below is the Cisco router Configuration ,I would like replace the Cisco router with my Checkpoint device.&lt;BR /&gt;Could you please help me with suggestions &lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet0/0
 description Link to Internet + TWAN
 ip address 172.17.129.246 255.255.255.252
 no ip redirects
 no ip proxy-arp
 ip wccp web-cache redirect in
 ip wccp web-cache group-listen
 ip flow ingress
 ip nat outside
 ip virtual-reassembly in
 load-interval 30
 duplex auto
 speed auto
 no cdp enable
 service-policy input url-block-policy
 service-policy output WEB-BLOCK
!
interface GigabitEthernet0/1
 description 
 ip address 172.27.156.1 255.255.252.0
 no ip redirects
 no ip proxy-arp
 ip nat inside
 ip virtual-reassembly in
 duplex auto
 speed auto
 no cdp enable
!
interface GigabitEthernet0/1.2
 description LAN_NETWORK TO GEWOG CENTER
 encapsulation dot1Q 2
 ip address 172.26.159.1 255.255.252.0
 no ip redirects
 no ip proxy-arp
 ip nat inside
 ip virtual-reassembly in
 no cdp enable
!&lt;/PRE&gt;</description>
      <pubDate>Fri, 09 Aug 2019 19:02:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cisco-to-checkpoint-configuration/m-p/59974#M4535</guid>
      <dc:creator>Kul</dc:creator>
      <dc:date>2019-08-09T19:02:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco to checkpoint configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cisco-to-checkpoint-configuration/m-p/59979#M4538</link>
      <description>&lt;P&gt;What exact Check Point device do you have?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Aug 2019 19:27:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cisco-to-checkpoint-configuration/m-p/59979#M4538</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2019-08-09T19:27:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco to checkpoint configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cisco-to-checkpoint-configuration/m-p/59980#M4539</link>
      <description>&lt;P&gt;I use 4000&amp;nbsp; series&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Aug 2019 19:29:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cisco-to-checkpoint-configuration/m-p/59980#M4539</guid>
      <dc:creator>Kul</dc:creator>
      <dc:date>2019-08-09T19:29:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco to checkpoint configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cisco-to-checkpoint-configuration/m-p/59982#M4541</link>
      <description>&lt;P&gt;Then login to the GAiA WebUI on configure the interfaces as extracted from your Cisco config.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Aug 2019 19:39:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cisco-to-checkpoint-configuration/m-p/59982#M4541</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2019-08-09T19:39:45Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco to checkpoint configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cisco-to-checkpoint-configuration/m-p/59986#M4542</link>
      <description>I need to configure router on stick with default vlan. I used vlan is as 2 and it did not work. I could nothing gw.</description>
      <pubDate>Fri, 09 Aug 2019 20:23:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cisco-to-checkpoint-configuration/m-p/59986#M4542</guid>
      <dc:creator>Kul</dc:creator>
      <dc:date>2019-08-09T20:23:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco to checkpoint configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cisco-to-checkpoint-configuration/m-p/59990#M4543</link>
      <description>Even though it is not really supported you can setup and IP on eth1 and add a vlan on top of it and assign an IP to it.&lt;BR /&gt;Only thing is the Native VLAN on the switch trunk port will be the VLAN used by the main interface. &lt;BR /&gt;example:&lt;BR /&gt;eth1 is connected to a port that on the switch is set as mode access with VLAN 15 and on the FW ip address 172.17.129.246 255.255.255.252&lt;BR /&gt;eth2 is connected to a port set as trunk with native VLAN 1 and ip address 172.27.156.1 255.255.252.0&lt;BR /&gt;add eth2 vlan 2&lt;BR /&gt;eth2.2 set with ip address 172.26.159.1 255.255.252.0&lt;BR /&gt;&lt;BR /&gt;Now routing will only work when you have a policy loaded.</description>
      <pubDate>Fri, 09 Aug 2019 20:42:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cisco-to-checkpoint-configuration/m-p/59990#M4543</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-08-09T20:42:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco to checkpoint configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cisco-to-checkpoint-configuration/m-p/60006#M4551</link>
      <description>Thank you but 172.17.129.246/30 is connected to outside network for internet to ISP.&lt;BR /&gt;</description>
      <pubDate>Sat, 10 Aug 2019 04:33:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cisco-to-checkpoint-configuration/m-p/60006#M4551</guid>
      <dc:creator>Kul</dc:creator>
      <dc:date>2019-08-10T04:33:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco to checkpoint configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cisco-to-checkpoint-configuration/m-p/60028#M4559</link>
      <description>And what is your actual question? Are you doing Hide NAT behind the external IP or do you have routes for the internal networks on the ISP router?</description>
      <pubDate>Sat, 10 Aug 2019 20:52:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cisco-to-checkpoint-configuration/m-p/60028#M4559</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-08-10T20:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco to checkpoint configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cisco-to-checkpoint-configuration/m-p/60035#M4560</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That's what I do when I migrate a Cisco device to Check Point:-)&lt;/P&gt;
&lt;P&gt;1) Creat a Cisco config file. For example cisco.txt.&lt;/P&gt;
&lt;P&gt;Cisco&amp;gt; show running config&lt;/P&gt;
&lt;P&gt;2) Upload this file to your new Check Point gateway. Now found all IP&amp;nbsp; addresses in cisco config and create a IP list.&lt;/P&gt;
&lt;P&gt;Check Point GW# more cisco.txt | grep "ip address" &amp;gt; iplist.txt&lt;/P&gt;
&lt;P&gt;3) After that you can customize the file via vi. Now edit the iplist.txt and replace the cisco syntax with the check point GAIA syntax.&lt;BR /&gt;&lt;BR /&gt;For example Cisco syntax:&lt;BR /&gt;ip address &lt;FONT color="#3366FF"&gt;172.17.129.246 255.255.255.252&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;to Check Point syntax. &lt;BR /&gt;Now set the interface (red) for example &lt;FONT color="#FF0000"&gt;eth0.1&lt;/FONT&gt; and add the interface settings (green) for all interfaces:&lt;BR /&gt;&lt;BR /&gt;set interface &lt;FONT color="#FF0000"&gt;eth0.1&lt;/FONT&gt; ipv4-address &lt;FONT color="#0000FF"&gt;172.17.129.246&lt;/FONT&gt; mask &lt;FONT color="#0000FF"&gt;255.255.255.252&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#339966"&gt;set interface &lt;FONT color="#FF0000"&gt;eth0.1&lt;/FONT&gt; link-speed 1000M/full&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#339966"&gt;set interface &lt;FONT color="#FF0000"&gt;eth0.1&lt;/FONT&gt; state on&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#339966"&gt;set interface &lt;FONT color="#FF0000"&gt;eth0.1&lt;/FONT&gt; auto-negotiation on&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#339966"&gt;set interface &lt;FONT color="#FF0000"&gt;eth0.1&lt;/FONT&gt; mtu 1500&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;4) Now load the new iplist.txt file in GAIA via CLISH and save the new config:&lt;BR /&gt;Check Point GW&amp;gt; load configuration iplist.txt&lt;BR /&gt;Check Point GW&amp;gt; save config&lt;/P&gt;
&lt;P&gt;PS:&lt;BR /&gt;- You can also take over the routes by adjusting the syntax.&lt;BR /&gt;- The NAT settings are added as NAT rules in the SmartConsole.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 11 Aug 2019 08:16:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cisco-to-checkpoint-configuration/m-p/60035#M4560</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-08-11T08:16:05Z</dc:date>
    </item>
  </channel>
</rss>

