<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FW in L2 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243657#M47350</link>
    <description>&lt;P&gt;Definitely you need an IP brother.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;TABLE class="TableStyle-TP_Table_Dark_Header_and_Pattern" cellspacing="0"&gt;&lt;COLGROUP&gt;&lt;COL class="TableStyle-TP_Table_Dark_Header_and_Pattern-Column-Column_Style" /&gt;&lt;COL class="TableStyle-TP_Table_Dark_Header_and_Pattern-Column-Column_Style" /&gt;&lt;/COLGROUP&gt;
&lt;THEAD&gt;
&lt;TR class="TableStyle-TP_Table_Dark_Header_and_Pattern-Head-Header_Style"&gt;
&lt;TH class="TableStyle-TP_Table_Dark_Header_and_Pattern-HeadE-Column_Style-Header_Style" scope="col"&gt;
&lt;P&gt;Step&lt;/P&gt;
&lt;/TH&gt;
&lt;TH class="TableStyle-TP_Table_Dark_Header_and_Pattern-HeadD-Column_Style-Header_Style" scope="col"&gt;
&lt;P&gt;Instructions&lt;/P&gt;
&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR class="TableStyle-TP_Table_Dark_Header_and_Pattern-Body-White_Background"&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyE-Column_Style-White_Background"&gt;
&lt;P&gt;1&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyD-Column_Style-White_Background"&gt;
&lt;P&gt;In the left navigation tree, click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Network Management&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Network Interfaces&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="TableStyle-TP_Table_Dark_Header_and_Pattern-Body-Grey_Background"&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyE-Column_Style-Grey_Background"&gt;
&lt;P&gt;2&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyD-Column_Style-Grey_Background"&gt;
&lt;P&gt;Make sure that the subordinate interfaces, which you wish to add to the Bridge interface, do not have IP addresses assigned.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="TableStyle-TP_Table_Dark_Header_and_Pattern-Body-White_Background"&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyE-Column_Style-White_Background"&gt;
&lt;P&gt;3&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyD-Column_Style-White_Background"&gt;
&lt;P&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Add&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Bridge&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;To configure an existing Bridge interface, select the Bridge interface and click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Edit&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="TableStyle-TP_Table_Dark_Header_and_Pattern-Body-Grey_Background"&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyE-Column_Style-Grey_Background"&gt;
&lt;P&gt;4&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyD-Column_Style-Grey_Background"&gt;
&lt;P&gt;On the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Bridge&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;tab, enter or select a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Bridge Group&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;ID (unique integer between 1 and 1024).&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="TableStyle-TP_Table_Dark_Header_and_Pattern-Body-White_Background"&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyE-Column_Style-White_Background"&gt;
&lt;P&gt;5&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyD-Column_Style-White_Background"&gt;
&lt;P&gt;Select the interfaces from the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Available Interfaces&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;list and then click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Add&lt;/SPAN&gt;.&lt;/P&gt;
&lt;TABLE class="TableStyle-TP_Table_Notes" cellspacing="0"&gt;&lt;COLGROUP&gt;&lt;COL class="TableStyle-TP_Table_Notes-Column-Column_Style_Image" /&gt;&lt;COL class="TableStyle-TP_Table_Notes-Column-Column_Style_Text" /&gt;&lt;/COLGROUP&gt;
&lt;TBODY&gt;
&lt;TR class="TableStyle-TP_Table_Notes-Body-Body"&gt;
&lt;TD class="TableStyle-TP_Table_Notes-BodyB-Column_Style_Image-Body"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Notes-BodyA-Column_Style_Text-Body"&gt;
&lt;P&gt;&lt;SPAN class="Note"&gt;Notes:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Make sure that the subordinate interfaces do not have any IP addresses or aliases configured.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Do&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;not&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;select the interface that you configured as&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.r_gaia variable"&gt;Gaia&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Management Interface.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;A Bridge interface in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.r_gaia variable"&gt;Gaia&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;can contain only two subordinate interfaces.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="TableStyle-TP_Table_Dark_Header_and_Pattern-Body-Grey_Background"&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyE-Column_Style-Grey_Background"&gt;
&lt;P&gt;6&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyD-Column_Style-Grey_Background"&gt;
&lt;P&gt;On the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;IPv4&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;tab, enter the IPv4 address and subnet mask.&lt;/P&gt;
&lt;P&gt;You can optionally select the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Obtain IPv4 Address automatically&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;option.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="TableStyle-TP_Table_Dark_Header_and_Pattern-Body-White_Background"&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyE-Column_Style-White_Background"&gt;
&lt;P&gt;7&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyD-Column_Style-White_Background"&gt;
&lt;P&gt;&lt;STRONG&gt;Optional:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;On the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;IPv6&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;tab, do one of these:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Obtain IPv6 address automatically via Autoconfig&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Obtain IPv6 address automatically via Normal DHCPv6&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Obtain IPv6 address automatically via Prefix Delegation&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Use the following IPv6 address.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;TABLE class="TableStyle-TP_Table_Notes" cellspacing="0"&gt;&lt;COLGROUP&gt;&lt;COL class="TableStyle-TP_Table_Notes-Column-Column_Style_Image" /&gt;&lt;COL class="TableStyle-TP_Table_Notes-Column-Column_Style_Text" /&gt;&lt;/COLGROUP&gt;
&lt;TBODY&gt;
&lt;TR class="TableStyle-TP_Table_Notes-Body-Body"&gt;
&lt;TD class="TableStyle-TP_Table_Notes-BodyB-Column_Style_Image-Body"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Notes-BodyA-Column_Style_Text-Body"&gt;
&lt;P&gt;&lt;SPAN class="Important_Note"&gt;Important:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;First, you must enable the IPv6 Support and reboot (see&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="MCXref xref" href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_Installation_and_Upgrade_Guide/Content/Topics-GAG/System-Configuration.htm" target="_blank"&gt;System Configuration&lt;/A&gt;).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="mc-variable Book_Variables_Common.tp_cpversion variable"&gt;R82&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;does&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;not&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;support IPv6 Address on the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.r_gaia variable"&gt;Gaia&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Management Interface (Known Limitation PMTR-47313).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;On a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_mdsecmgmt_server variable"&gt;Multi-Domain&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="MCTextPopup MCTextPopupHotSpot MCTextPopupHotSpot_ #text MCTextPopup_Closed" role="button" href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_Installation_and_Upgrade_Guide/Content/Topics-IUG/Configuring-Single-Security-Gateway-in-Bridge-Mode.htm#" data-mc-state="closed" data-aria-describedby="d309b074-4e88-4afa-978b-a7724239f06e" target="_blank"&gt;Security Management Server&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;, follow these instructions to configure an IPv6 address -&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="MCXref xref" href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_Installation_and_Upgrade_Guide/Content/Topics-GAG/Advanced-Configuration-IPv6-on-MDS.htm" target="_blank"&gt;Configuring an IPv6 Address on a Multi-Domain Server&lt;/A&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Scalable Platforms (ElasticXL, Maestro, and Chassis) do&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;not&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;support this feature (Known Limitation MBS-3246).&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
    <pubDate>Wed, 12 Mar 2025 14:32:37 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-03-12T14:32:37Z</dc:date>
    <item>
      <title>FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242662#M47140</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;We have a FW that we want to work in transparent mode, to avoid making sudden changes in our network.&lt;/P&gt;
&lt;P&gt;We have enabled 2 fiber interfaces (Eth1-1 and Eth1-2) in bridge mode, which we understand is the way to make the FW work in L2.&lt;/P&gt;
&lt;P&gt;The intention is that the FW only performs web filtering to the LAN of our headquarters.&lt;/P&gt;
&lt;P&gt;Some questions&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Is it necessary to pull the topology from the SmartConsole, and should the Interfaces that are in bridge mode also be seen from here?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;If we only want the appliance to perform web filter control to the LAN, is it necessary to have the FW blade of our appliance enabled?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;FW: R82 - JHF 10&lt;/P&gt;
&lt;P&gt;Thank you for your answers.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 14:01:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242662#M47140</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-02-28T14:01:08Z</dc:date>
    </item>
    <item>
      <title>Re: FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242667#M47144</link>
      <description>&lt;P&gt;Review the documentation here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_Installation_and_Upgrade_Guide/Content/Topics-IUG/Configuring-Single-Security-Gateway-in-Bridge-Mode.htm?Highlight=Bridge" target="_blank"&gt;https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_Installation_and_Upgrade_Guide/Content/Topics-IUG/Configuring-Single-Security-Gateway-in-Bridge-Mode.htm?Highlight=Bridge&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;See also&amp;nbsp;&lt;SPAN&gt;sk106319, sk101371&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 14:16:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242667#M47144</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-02-28T14:16:07Z</dc:date>
    </item>
    <item>
      <title>Re: FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242670#M47147</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;This is the documentation I was looking at, but I wondered since I started reading the documentation, if the interfaces that one sets in the GAIA Portal as bridge mode, should or should not be pulled from the SmartConsole in the topology part.&lt;/P&gt;
&lt;P&gt;So if I have 1, 2, or many interfaces in bridge, the topology still has to be pulled from the SmartConsole, right?&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 14:26:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242670#M47147</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-02-28T14:26:28Z</dc:date>
    </item>
    <item>
      <title>Re: FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242673#M47149</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/82839"&gt;@Matlu&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Double-check the mentioned documentaions, especially the topoligy settings.&lt;/P&gt;
&lt;P&gt;Long story short:&lt;/P&gt;
&lt;P&gt;Q1: yes&lt;/P&gt;
&lt;P&gt;Q2: yes. BTW you can't have a GW appliance without firewall enabled from my point of view. (grayed out)&lt;/P&gt;
&lt;DIV id="tinyMceEditor_4345e375ec3ed5AkosBakos_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 200px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29752i67618B77749BAA0B/image-size/small?v=v2&amp;amp;px=200" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Akos&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 14:34:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242673#M47149</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2025-02-28T14:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242674#M47150</link>
      <description>&lt;P&gt;Q1 -&amp;gt; yes&lt;/P&gt;
&lt;P&gt;Q2 -&amp;gt; fw blade is enabled by default when object is created&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 14:34:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242674#M47150</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-02-28T14:34:43Z</dc:date>
    </item>
    <item>
      <title>Re: FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242716#M47159</link>
      <description>&lt;P&gt;Firewall blade is always required to be enabled.&lt;BR /&gt;Topology on the Bridge Mode interface should be External.&lt;/P&gt;
&lt;P&gt;See also:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk105899" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk105899&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_Installation_and_Upgrade_Guide/Content/Topics-IUG/Deploying-Security-Gateway-or-ClusterXL-in-Bridge-Mode.htm?Highlight=Bridge%20mode" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_Installation_and_Upgrade_Guide/Content/Topics-IUG/Deploying-Security-Gateway-or-ClusterXL-in-Bridge-Mode.htm?Highlight=Bridge%20mode&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 28 Feb 2025 17:22:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242716#M47159</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-02-28T17:22:57Z</dc:date>
    </item>
    <item>
      <title>Re: FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242734#M47172</link>
      <description>&lt;P&gt;Hello, Mate&lt;BR /&gt;&lt;BR /&gt;Before putting the FW CP, the network topology is something like this.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="E1.png" style="width: 382px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29759i48EDC278A41A5418/image-size/large?v=v2&amp;amp;px=999" role="button" title="E1.png" alt="E1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;When we put the FW CP, the topology changes to this model.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="E2.png" style="width: 626px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29757i55102BC89BC01B8B/image-size/large?v=v2&amp;amp;px=999" role="button" title="E2.png" alt="E2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;So to be sure to apply the changes correctly, both Eth1-1 and Eth1-2 interfaces must be configured as “External”, right?&lt;/P&gt;
&lt;P&gt;Because currently they look like “This Network”.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="E3.png" style="width: 506px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29758iAB0E3AA1D3DEB58A/image-size/large?v=v2&amp;amp;px=999" role="button" title="E3.png" alt="E3.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;A &lt;STRONG&gt;DUMB&lt;/STRONG&gt; question, but if the interfaces in the topology are not “configured” in the right way, can this cause traffic problems?&lt;/P&gt;
&lt;P&gt;Thank you for your help. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Mar 2025 00:04:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242734#M47172</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-01T00:04:37Z</dc:date>
    </item>
    <item>
      <title>Re: FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242736#M47173</link>
      <description>&lt;P&gt;No dumb questions my friend. Technically, if you do get interfaces WITHOUT topology, it should fetch the right info. However, if something is incorrect, yes, it could cause issues, but considering its in bridge mode, you might be okay.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 01 Mar 2025 00:07:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242736#M47173</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-01T00:07:24Z</dc:date>
    </item>
    <item>
      <title>Re: FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242738#M47175</link>
      <description>&lt;P&gt;Buddy,&lt;/P&gt;
&lt;P&gt;Thanks for getting back to me.&lt;/P&gt;
&lt;P&gt;In my scenario, and based on PhoneBoy's comment, my &lt;STRONG&gt;Eth1-1 and Eth1-2&lt;/STRONG&gt; interfaces do you think it is “&lt;STRONG&gt;mandatory&lt;/STRONG&gt;” to put them in “&lt;STRONG&gt;External&lt;/STRONG&gt;” mode both interfaces?&lt;/P&gt;
&lt;P&gt;In this FW, I only have 1 more interface connected, which is the &lt;STRONG&gt;MGMT&lt;/STRONG&gt; port, and it is in the topology as “&lt;STRONG&gt;External&lt;/STRONG&gt;”.&lt;/P&gt;
&lt;P&gt;Apart from that interface, I don't have another one (I don't take into account the maas_tunnel interface, since my FW is hooked to a Smart-1 Cloud).&lt;/P&gt;
&lt;P&gt;Cheers.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Mar 2025 00:35:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242738#M47175</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-01T00:35:08Z</dc:date>
    </item>
    <item>
      <title>Re: FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242739#M47176</link>
      <description>&lt;P&gt;Yes, I believe they would need to be set as external, correct.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 01 Mar 2025 00:37:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/242739#M47176</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-01T00:37:04Z</dc:date>
    </item>
    <item>
      <title>Re: FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243132#M47223</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;We have inherited a FW that is configured to work as a L2 device, the goal is that this device only does “Web Filters” but we have had problems with the loss of some services when testing, something that should not happen, since we are working 2 interfaces in bridge mode.&lt;/P&gt;
&lt;P&gt;A query in my scenario I currently have 4 interfaces&lt;/P&gt;
&lt;P&gt;Eth1-1&lt;BR /&gt;Eth1-2&lt;BR /&gt;Mgmt&lt;BR /&gt;maas_tunnel&lt;/P&gt;
&lt;P&gt;Currently the FW goes out to the Internet through the “Mgmt” interface, and it is important to mention that this FW is hooked to a Smart-1 Cloud.&lt;/P&gt;
&lt;P&gt;I have reviewed the documentation, and the following section causes me doubts.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="E5.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29826iE0D4A2379BAF8811/image-size/large?v=v2&amp;amp;px=999" role="button" title="E5.png" alt="E5.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="E6.png" style="width: 468px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29827i427584A4F36FEA1B/image-size/large?v=v2&amp;amp;px=999" role="button" title="E6.png" alt="E6.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Can I have the 2 interface topology configured in External mode?&lt;/P&gt;
&lt;P&gt;The interface that gives output to the Internet to the CP device, should be if or if, one of the interfaces that is in bridge mode?&lt;/P&gt;
&lt;P&gt;Cheers. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Mar 2025 00:39:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243132#M47223</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-06T00:39:28Z</dc:date>
    </item>
    <item>
      <title>Re: FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243135#M47224</link>
      <description>&lt;P&gt;Hey bro,&lt;/P&gt;
&lt;P&gt;If routing is correct, just do get interfaces without topology and it would give right output.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 06 Mar 2025 02:30:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243135#M47224</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-06T02:30:49Z</dc:date>
    </item>
    <item>
      <title>Re: FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243136#M47225</link>
      <description>&lt;P&gt;Hey Buddy.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Is it no longer necessary to configure 1 of the 2 interfaces that are in bridge mode, as “External”?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The objective is that this FW works in L2, that it does not “intervene” at the routing level.&lt;BR /&gt;We only want the device to make web filters with the URL Filtering blade.&lt;/P&gt;
&lt;P&gt;Cheers. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Mar 2025 02:36:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243136#M47225</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-06T02:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243137#M47226</link>
      <description>&lt;P&gt;Thats right, as long as bridge interface is external.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 06 Mar 2025 02:43:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243137#M47226</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-06T02:43:02Z</dc:date>
    </item>
    <item>
      <title>Re: FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243207#M47239</link>
      <description>&lt;P&gt;If the interfaces "touch" the external network (directly or indirectly), they should be marked external.&lt;BR /&gt;That includes most L2 deployments.&lt;/P&gt;
&lt;P&gt;Why is your management interface external?&lt;BR /&gt;How does it fit into the overall topology of the environment?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Mar 2025 23:40:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243207#M47239</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-03-06T23:40:34Z</dc:date>
    </item>
    <item>
      <title>Re: FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243209#M47240</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;The goal is that the box, works as a “Web Filter” with the URLF+APPC blade.&lt;/P&gt;
&lt;P&gt;They configured the “Mgmt” interface as “External” as I was informed, because of the fact that the box needs to be able to reach the Internet to be updating the engine of the mentioned blades, and also because of the fact that this box is hooked to a Smart-1 Cloud, so it needs the output to the Internet.&lt;/P&gt;
&lt;P&gt;At the end of the day, this box only has 4 interfaces:&lt;/P&gt;
&lt;P&gt;2 Interfaces in bridge mode, Eth1-1 and Eth1-2.&lt;BR /&gt;1 “Mgmt” interface&lt;BR /&gt;1 LOM interface&lt;/P&gt;
&lt;P&gt;So, does it make sense to you, that the MGMT interface is “configured” as “External”?&lt;/P&gt;
&lt;P&gt;Cheers.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Mar 2025 23:55:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243209#M47240</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-06T23:55:11Z</dc:date>
    </item>
    <item>
      <title>Re: FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243211#M47241</link>
      <description>&lt;P&gt;How does the Management interface reach the Internet?&lt;BR /&gt;Does the traffic have to traverse the L2 bridge on this gateway?&lt;BR /&gt;If so, it can (should) be internal and you'll have to apply:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk105899" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk105899&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 00:01:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243211#M47241</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-03-07T00:01:54Z</dc:date>
    </item>
    <item>
      <title>Re: FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243219#M47242</link>
      <description>&lt;P&gt;This box reaches the Internet through a default route.&lt;/P&gt;
&lt;P&gt;IP MGMT: 10.123.119.46&lt;BR /&gt;IP Gateway: 10.123.119.34&lt;/P&gt;
&lt;P&gt;Above our CP box, there is an F5 equipment, which is the one that does the NAT to our IP so that it can go out to the Internet.&lt;/P&gt;
&lt;P&gt;The box could not be without Internet because it is hooked to a Smart-1 Cloud, and if we remove the output to the Internet, we understand that we will lose the management from our Tenant.&lt;/P&gt;
&lt;P&gt;Now, as for the internal network traffic, effectively, this traffic must go through the bridge interfaces, without trying to go through the MGMT.&lt;/P&gt;
&lt;P&gt;The objective of the box having Internet is related to not losing management of the equipment from the Tenant, and that the signatures of all the blades are kept up to date, besides that the box can know that there are new JHF packages for its installation.&lt;/P&gt;
&lt;P&gt;Regards.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 00:28:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243219#M47242</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-03-07T00:28:18Z</dc:date>
    </item>
    <item>
      <title>Re: FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243224#M47245</link>
      <description>&lt;P&gt;Can you send what topology looks like at the moment?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 01:36:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243224#M47245</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-07T01:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: FW in L2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243279#M47258</link>
      <description>&lt;P&gt;So the Management interface is reaching the Internet not through the L2 bridge?&lt;BR /&gt;Topology impacts a few things:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Anti-spoofing (doesn't make sense in this configuration)&lt;/LI&gt;
&lt;LI&gt;The "Internet" object (if used, probably shouldn't in this configuration)&lt;/LI&gt;
&lt;LI&gt;Threat Prevention scope (which might require a tweak to the profile, but not relevant since not used currently)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;External should be fine here aside from the above issues.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 16:23:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FW-in-L2/m-p/243279#M47258</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-03-07T16:23:14Z</dc:date>
    </item>
  </channel>
</rss>

