<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Regarding gateway handling of asymmetric routing in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250476#M48982</link>
    <description>&lt;P&gt;The problem is clear.&lt;/P&gt;
&lt;P&gt;If it was me I would prefer not to design the network based on a particular vendor implementation to avoid lock in.&lt;/P&gt;</description>
    <pubDate>Tue, 03 Jun 2025 12:10:21 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2025-06-03T12:10:21Z</dc:date>
    <item>
      <title>Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250401#M48960</link>
      <description>&lt;P&gt;Hi, Check Point Experts&lt;/P&gt;&lt;P&gt;I have a request and would like to seek your help and opinions.&lt;/P&gt;&lt;P&gt;Both the Client and Server are on directly connected networks of the Gateway. When the Client accesses an internal Server service via the Load Balancer (F5)'s virtual server IP, and without configuring S-NAT on F5 or PBR on the Gateway, how can we make the reply packet (blue line) return to the F5?&lt;/P&gt;&lt;P&gt;A simulated architecture diagram is shown below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Image_2025-06-03_11-42-33.png" style="width: 764px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30661iE1B3C5154C927D1B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Image_2025-06-03_11-42-33.png" alt="Image_2025-06-03_11-42-33.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;update:&lt;/P&gt;&lt;P&gt;After discussions between the CP team and the customer, the customer’s goal is to ensure that reply packets exit through the same interface the request packets entered from.&lt;/P&gt;&lt;P&gt;I’ve updated the interface port numbers in the network diagram:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;the request packet enters the Gateway via eth5 and is then forwarded to the Server.&lt;/LI&gt;&lt;LI&gt;When the Gateway receives the reply packet from the Server, it should preferably be sent out via eth5 as well.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Is there a configuration method that can achieve this behavior?&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 03:52:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250401#M48960</guid>
      <dc:creator>Vanness_Chen</dc:creator>
      <dc:date>2025-06-03T03:52:48Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250402#M48961</link>
      <description>&lt;P&gt;I always found issues like that to be related to incorrectly set topology.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 02:20:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250402#M48961</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-06-03T02:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250403#M48962</link>
      <description>&lt;P&gt;Hi Andy&lt;BR /&gt;Thank you for your response.&lt;/P&gt;&lt;P&gt;This traffic flow works under the same conditions on FortiGate. Since the customer intends to replace FortiGate with Check Point, they are asking whether we can achieve the same behavior.&lt;/P&gt;&lt;P&gt;I’ve reviewed a number of documents but haven’t found any discussion specifically addressing this scenario.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 02:36:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250403#M48962</guid>
      <dc:creator>Vanness_Chen</dc:creator>
      <dc:date>2025-06-03T02:36:33Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250404#M48963</link>
      <description>&lt;P&gt;But keep in mind, with Fortigates, there is no setting like topology in CP smart console, even if you use forti manager to manage them, regardless if its onprem or cloud. In my personal experience, as long as routes and topology are right, this will work fine.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Relevant discussion:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Asymmetric-routing/td-p/166680" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/Asymmetric-routing/td-p/166680&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 02:46:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250404#M48963</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-06-03T02:46:14Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250437#M48965</link>
      <description>&lt;P&gt;You may want to share the configuration options / choices used with the Fortigate in that case?&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 09:37:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250437#M48965</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-06-03T09:37:40Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250453#M48967</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;Chris&lt;/SPAN&gt;&lt;BR /&gt;According to the customer, &lt;STRONG&gt;FortiGate does not require any additional configuration&lt;/STRONG&gt; to achieve this behavior. We are currently analyzing the FortiGate configuration provided by the customer to verify this.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 10:41:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250453#M48967</guid>
      <dc:creator>Vanness_Chen</dc:creator>
      <dc:date>2025-06-03T10:41:47Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250454#M48968</link>
      <description>&lt;P&gt;I am sorry, what is the exact challenge here? If routing is configured properly, it should work out of the box, shouldn't it? What do I miss?&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 10:42:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250454#M48968</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-06-03T10:42:50Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250455#M48969</link>
      <description>&lt;P&gt;Personally, Im not aware of any additional control on CP either to achieve that behavior. Keep in mind that on Fortigate, you can enable asymetric routing globally, so maybe that have that on?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 10:44:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250455#M48969</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-06-03T10:44:15Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250458#M48971</link>
      <description>&lt;P&gt;I think there is some confusion on the use of terminology or the topology is different / involves VRFs?&lt;/P&gt;
&lt;P&gt;If the F5 or something else doesn't alter the src (or other parameters) of the request of course the return from the server will follow the normal routing table direct towards the client subnet.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 11:13:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250458#M48971</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-06-03T11:13:31Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250466#M48974</link>
      <description>&lt;P&gt;Hi Chris&lt;/P&gt;&lt;P&gt;It appears that FortiGate prioritizes routing reply packets based on the &lt;STRONG&gt;session table&lt;/STRONG&gt;, rather than strictly following the &lt;STRONG&gt;routing table&lt;/STRONG&gt;. I believe this is the behavior the customer is aiming for, which is why they want to confirm whether &lt;STRONG&gt;Check Point&lt;/STRONG&gt; can achieve the same functionality.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 11:25:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250466#M48974</guid>
      <dc:creator>Vanness_Chen</dc:creator>
      <dc:date>2025-06-03T11:25:25Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250468#M48976</link>
      <description>&lt;P&gt;Hi Val&lt;/P&gt;&lt;P&gt;Based on the network diagram I provided, the customer wants to achieve &lt;STRONG&gt;symmetrical routing&lt;/STRONG&gt; (same path for request and reply) &lt;STRONG&gt;without configuring S-NAT on the F5&lt;/STRONG&gt; and &lt;STRONG&gt;without setting PBR on the Gateway&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;Can Check Point route reply packets based on the &lt;STRONG&gt;session table&lt;/STRONG&gt;, rather than strictly relying on the &lt;STRONG&gt;routing table&lt;/STRONG&gt;, to achieve this behavior?&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 11:32:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250468#M48976</guid>
      <dc:creator>Vanness_Chen</dc:creator>
      <dc:date>2025-06-03T11:32:05Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250469#M48977</link>
      <description>&lt;P&gt;I dont see why not...thats how whole concept of stateful inspection is designed to work.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 11:35:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250469#M48977</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-06-03T11:35:38Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250471#M48979</link>
      <description>&lt;P&gt;Ooookay, I see it now.&lt;/P&gt;
&lt;P&gt;This is a weird topology. Why do you need to FW traffic to F5 twice, on both server and client side? It would only be reasonable to set F5 and the servers in the same segment.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 11:44:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250471#M48979</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-06-03T11:44:07Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250473#M48980</link>
      <description>&lt;P&gt;Not exactly.&lt;/P&gt;
&lt;P&gt;I suspect if it's possible at all it would be a secureXL kernel parameter, might be a topic for TAC / RFE.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 12:01:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250473#M48980</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-06-03T12:01:58Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250475#M48981</link>
      <description>&lt;P&gt;Hi Andy:&lt;/P&gt;&lt;P&gt;Since the source IP remains unchanged throughout the entire request path from the Client, when the Server sends the reply packet back to the Gateway, the Gateway routes it directly to the Client based on the &lt;STRONG&gt;routing table&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;If the packet is &lt;STRONG&gt;not returned to the F5&lt;/STRONG&gt;, the F5 will &lt;STRONG&gt;drop the entire connection&lt;/STRONG&gt; because it does not receive the &lt;STRONG&gt;ACK packet&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;You can refer to the &lt;STRONG&gt;tcpdump I captured in the lab&lt;/STRONG&gt; for more details.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Image_2025-06-02_15-11-09.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30671iF97C6F55B91D953A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Image_2025-06-02_15-11-09.png" alt="Image_2025-06-02_15-11-09.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 12:07:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250475#M48981</guid>
      <dc:creator>Vanness_Chen</dc:creator>
      <dc:date>2025-06-03T12:07:11Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250476#M48982</link>
      <description>&lt;P&gt;The problem is clear.&lt;/P&gt;
&lt;P&gt;If it was me I would prefer not to design the network based on a particular vendor implementation to avoid lock in.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 12:10:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250476#M48982</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-06-03T12:10:21Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250478#M48984</link>
      <description>&lt;P&gt;Hi Val&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the customer's architecture, if the &lt;STRONG&gt;Client wants to access the Server's service&lt;/STRONG&gt;, it must do so via the &lt;STRONG&gt;F5's virtual server IP&lt;/STRONG&gt; (used for load balancing).&lt;/P&gt;&lt;P&gt;There’s no issue when the Client is located on the &lt;STRONG&gt;outside of the F5&lt;/STRONG&gt;, but as shown in the architecture diagram, if the Client is on the &lt;STRONG&gt;inside&lt;/STRONG&gt;, it &lt;STRONG&gt;cannot access the service properly&lt;/STRONG&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 12:16:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250478#M48984</guid>
      <dc:creator>Vanness_Chen</dc:creator>
      <dc:date>2025-06-03T12:16:42Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250508#M48988</link>
      <description>&lt;P&gt;As for the fact Fortinet handles this "out of the box," the question I have is: at what security cost?&lt;BR /&gt;Given the number of &lt;A href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?f%5B0%5D=vendor_project%3A813" target="_self"&gt;critical vulnerabilities known to be exploited in their products&lt;/A&gt;, I personally think it's a fair question.&lt;/P&gt;
&lt;P&gt;ElasticXL (in R82) might actually handle this with the CCL (when the other gateway receives traffic and it's not the primary, it's forwarded to the primary).&lt;BR /&gt;Otherwise, what you're asking for is likely an RFE and the solution in the meantime is, in fact, using SNAT.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 17:50:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250508#M48988</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-06-03T17:50:38Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250510#M48989</link>
      <description>&lt;P&gt;100% fair.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 17:52:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250510#M48989</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-06-03T17:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding gateway handling of asymmetric routing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250528#M48990</link>
      <description>&lt;P&gt;Hi PhoneBoy&lt;/P&gt;&lt;P&gt;Thank you for the response.&lt;BR /&gt;We'll continue discussing the feasibility of this issue with the Check Point team today, and we hope for a good outcome.&lt;BR /&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 02:55:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Regarding-gateway-handling-of-asymmetric-routing/m-p/250528#M48990</guid>
      <dc:creator>Vanness_Chen</dc:creator>
      <dc:date>2025-06-04T02:55:58Z</dc:date>
    </item>
  </channel>
</rss>

