<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Layer 2 Bridging before Internet Gateway? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Layer-2-Bridging-before-Internet-Gateway/m-p/8603#M458</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you can do what you describe.&lt;/P&gt;&lt;P&gt;However, there is an issue that you will run into where the gateway will reject its own management traffic due to "local interface spoofing."&lt;/P&gt;&lt;P&gt;This can be overcome with the following SK:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105899" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105899"&gt;When configuring two interfaces in Bridge Mode, traffic is dropped due to "local interface spoofing"&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, we are working on a more turnkey solution solution called SandBlast Now.&lt;/P&gt;&lt;P&gt;It was presented at our recent CPX 360 events.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Video: &lt;A href="https://community.checkpoint.com/videos/11033"&gt;Threat Hunting with SandBlast NOW&lt;/A&gt;‌&lt;/LI&gt;&lt;LI&gt;Presentation: &lt;A href="https://community.checkpoint.com/docs/DOC-3693"&gt;Threat Hunting with SandBlast Now.pdf&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;If you're interested, I can connect you with the relevant parties.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 28 Feb 2019 23:22:24 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2019-02-28T23:22:24Z</dc:date>
    <item>
      <title>Layer 2 Bridging before Internet Gateway?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Layer-2-Bridging-before-Internet-Gateway/m-p/8602#M457</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My Company has a number of Small Business customers who are relying on basic internet connections from Comcast, Fios, Charter, etc... for their primary internet. Most of these Customers already have a primary Internet Gateway/Router that they purchased or rent. My company provides Managed Security Services and these Customers are interested in Firewall solutions but aren't willing to change their existing setups. They want something dropped inline that doesn't change their setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We're wondering if there is an Architecture with Layer 2 Transparent bridging on some ports that will work in this setup. This would require a device to Bridge Traffic to the Gateway (pass the DHCP request) then have some capability to also communicate outbound for updates/management with only one DHCP lease. One port would need to be Layer 3 to get a routable IP and point to a Gateway for internet updates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use Case would be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INTERNET--&amp;gt;CHECKPOINT FW--&amp;gt;INTERNET ROUTER --&amp;gt; LAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone know if this is possible with any Checkpoint UTM devices?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on this article:&amp;nbsp;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R77/CP_R77_SecurityGatewayTech_WebAdmin/96332.htm" title="https://sc1.checkpoint.com/documents/R77/CP_R77_SecurityGatewayTech_WebAdmin/96332.htm"&gt;Bridge Mode&lt;/A&gt;&amp;nbsp;&amp;nbsp;it sounds like this could be possible, but I'm not clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The article section that is interesting:&lt;/P&gt;&lt;H2 class="" style="color: #7192e5; background-color: #ffffff; font-weight: bold; text-decoration: none; font-size: 20pt; margin: 0.5cm 0px 0.5em; padding: 20pt 0px 1px;"&gt;Routing and Bridges&lt;/H2&gt;&lt;P class="" style="color: #000000; background-color: #ffffff; text-decoration: none; font-size: 12px; margin: 6pt 0pt; padding: 0pt;"&gt;Security Gateways with a bridge interface can support Layer 3 routing over non-bridged interfaces. If you configure a bridge interface with an IP address for one Security Gateway (not a cluster), the bridge functions as a regular Layer 3 interface. It participates in IP routing decisions on the gateway and supports Layer 3 routing.&lt;/P&gt;&lt;UL class="" style="color: #000000; background-color: #ffffff; margin-top: 3pt; margin-bottom: 0pt;"&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;Cluster deployments do not support this configuration.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;You cannot configure the bridge to be the route gateway.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;One Security Gateway can support multiple bridge interfaces, but only one bridge can have an IP address.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;The Security Gateway cannot filter or transmit packets on a bridge interface that it inspected before (&lt;SPAN style="color: inherit; background-color: inherit; padding: 0pt;"&gt;&lt;EM class=""&gt;double-inspection&lt;/EM&gt;&lt;/SPAN&gt;).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;A style="color: #000000; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;H3 class="" style="color: #7192e5; background-color: #ffffff; font-weight: bold; text-decoration: none; font-size: 18pt; margin: 0.5cm 0px 0em; padding: 20pt 0pt 1px;"&gt;Management over Bridge&lt;/H3&gt;&lt;P class="" style="color: #000000; background-color: #ffffff; text-decoration: none; font-size: 12px; margin: 6pt 0pt; padding: 0pt;"&gt;The following diagram shows a sample topology:&lt;/P&gt;&lt;P class="" style="color: #000000; background-color: #ffffff; text-decoration: none; font-size: 12px; margin: 6pt 0pt; padding: 0pt;"&gt;&lt;IMG align="middle" alt="bridge through management interface" class="" height="268" src="https://sc1.checkpoint.com/documents/R77/CP_R77_SecurityGatewayTech_WebAdmin/96043.png" width="338" /&gt;&lt;/P&gt;&lt;TABLE style="color: #000000; background-color: #ffffff; border: 1px solid #dddddd;" width="643"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="border: 1px solid #dddddd;" width="113"&gt;&lt;P class="" style="color: #4d6185; background-color: inherit; font-weight: bold; text-decoration: none; text-indent: 0cm; font-size: 10pt; margin: 1pt -2pt 2pt; padding: 6pt;"&gt;Item&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #dddddd;" width="529"&gt;&lt;P class="" style="color: #4d6185; background-color: inherit; font-weight: bold; text-decoration: none; text-indent: 0cm; font-size: 10pt; margin: 1pt -2pt 2pt; padding: 6pt;"&gt;Description&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border: 1px solid #dddddd;" width="113"&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0cm; padding: 0pt;"&gt;1&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #dddddd;" width="529"&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0cm; padding: 0pt;"&gt;Switch&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border: 1px solid #dddddd;" width="113"&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0cm; padding: 0pt;"&gt;2&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #dddddd;" width="529"&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0cm; padding: 0pt;"&gt;Router&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border: 1px solid #dddddd;" width="113"&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0cm; padding: 0pt;"&gt;&lt;IMG align="bottom" alt="IUG_FW Icon" class="" height="25" src="https://sc1.checkpoint.com/documents/R77/CP_R77_SecurityGatewayTech_WebAdmin/86633.png" width="30" /&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #dddddd;" width="529"&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0cm; padding: 0pt;"&gt;Security Gateway Firewall bridging Layer-2 traffic&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border: 1px solid #dddddd;" width="113"&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0cm; padding: 0pt;"&gt;3&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #dddddd;" width="529"&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0cm; padding: 0pt;"&gt;Management interface (inspects first packet)&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border: 1px solid #dddddd;" width="113"&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0cm; padding: 0pt;"&gt;4&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #dddddd;" width="529"&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0cm; padding: 0pt;"&gt;eth1 (inspects first packet again)&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border: 1px solid #dddddd;" width="113"&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0cm; padding: 0pt;"&gt;5&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #dddddd;" width="529"&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0cm; padding: 0pt;"&gt;eth2&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border: 1px solid #dddddd;" width="113"&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0cm; padding: 0pt;"&gt;6&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #dddddd;" width="529"&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0cm; padding: 0pt;"&gt;Bridge interface - Management traffic drops&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border: 1px solid #dddddd;" width="113"&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0cm; padding: 0pt;"&gt;7&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #dddddd;" width="529"&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0cm; padding: 0pt;"&gt;Security Management Server&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P class="" style="color: #000000; background-color: #ffffff; text-decoration: none; font-size: 12px; margin: 6pt 0pt; padding: 0pt;"&gt;When a Layer-3 management interface sends traffic through the firewall, the traffic is dropped because it cannot inspect the same packet again.&lt;/P&gt;&lt;UL class="" style="color: #000000; background-color: #ffffff; margin-top: 3pt; margin-bottom: 0pt;"&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;The first packet is inspected and then goes from the management interface to the router.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;The router sends the packet to the bridge interface, and the firewall inspects the first packet again. The firewall concludes that this packet is a retransmission and then drops it.&lt;/LI&gt;&lt;/UL&gt;&lt;P class="" style="color: #000000; background-color: #ffffff; text-decoration: none; font-size: 12px; margin: 6pt 0pt; padding: 0pt;"&gt;Use the procedure for the applicable Security Gateway version.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2019 22:24:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Layer-2-Bridging-before-Internet-Gateway/m-p/8602#M457</guid>
      <dc:creator>Spencer_Lichten</dc:creator>
      <dc:date>2019-02-28T22:24:15Z</dc:date>
    </item>
    <item>
      <title>Re: Layer 2 Bridging before Internet Gateway?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Layer-2-Bridging-before-Internet-Gateway/m-p/8603#M458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you can do what you describe.&lt;/P&gt;&lt;P&gt;However, there is an issue that you will run into where the gateway will reject its own management traffic due to "local interface spoofing."&lt;/P&gt;&lt;P&gt;This can be overcome with the following SK:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105899" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105899"&gt;When configuring two interfaces in Bridge Mode, traffic is dropped due to "local interface spoofing"&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, we are working on a more turnkey solution solution called SandBlast Now.&lt;/P&gt;&lt;P&gt;It was presented at our recent CPX 360 events.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Video: &lt;A href="https://community.checkpoint.com/videos/11033"&gt;Threat Hunting with SandBlast NOW&lt;/A&gt;‌&lt;/LI&gt;&lt;LI&gt;Presentation: &lt;A href="https://community.checkpoint.com/docs/DOC-3693"&gt;Threat Hunting with SandBlast Now.pdf&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;If you're interested, I can connect you with the relevant parties.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2019 23:22:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Layer-2-Bridging-before-Internet-Gateway/m-p/8603#M458</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-02-28T23:22:24Z</dc:date>
    </item>
    <item>
      <title>Re: Layer 2 Bridging before Internet Gateway?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Layer-2-Bridging-before-Internet-Gateway/m-p/8604#M459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That would be fantastic if possible. This is an extremely high priority for us so I would love to speak to anyone involved.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2019 13:35:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Layer-2-Bridging-before-Internet-Gateway/m-p/8604#M459</guid>
      <dc:creator>Spencer_Lichten</dc:creator>
      <dc:date>2019-03-01T13:35:12Z</dc:date>
    </item>
    <item>
      <title>Re: Layer 2 Bridging before Internet Gateway?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Layer-2-Bridging-before-Internet-Gateway/m-p/8605#M460</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I’ve already given your details to the relevant parties.&lt;/P&gt;&lt;P&gt;You should be contacted shortly if you haven’t been already. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2019 17:14:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Layer-2-Bridging-before-Internet-Gateway/m-p/8605#M460</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-03-01T17:14:29Z</dc:date>
    </item>
  </channel>
</rss>

