<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Sharing Management network in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sharing-Management-network/m-p/97120#M78404</link>
    <description>&lt;P&gt;Other than the potential issue with cluster IDs, which I believe should be a non-issue in current gateway versions, there shouldn’t be any issues with this.&lt;/P&gt;</description>
    <pubDate>Sun, 20 Sep 2020 22:23:48 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2020-09-20T22:23:48Z</dc:date>
    <item>
      <title>Sharing Management network</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sharing-Management-network/m-p/97032#M78403</link>
      <description>&lt;P&gt;&amp;nbsp; I have a number of firewalls managed from one management system.&amp;nbsp; That system lives in a dedicated management DMZ that is shared to all the firewall clusters.&lt;/P&gt;&lt;P&gt;&amp;nbsp; I have a need to created three new clusters for a substantially different purpose than all the rest and they will report to a new management system.&amp;nbsp; These new firewalls will not share any of the internal or external networks common to the original firewall clusters.&lt;/P&gt;&lt;P&gt;&amp;nbsp; For simplicity's sake, I am contemplating placing the new management system in the same DMZ as the original and cabling the management DMZ to the new firewall clusters.&lt;/P&gt;&lt;P&gt;&amp;nbsp; Is this a good idea?&amp;nbsp; Or should I create a brand new management network for the new management system and new firewall clusters?&lt;/P&gt;&lt;P&gt;&amp;nbsp; I am wondering if there could be collisions somewhere between the old and new firewalls if they share this management DMZ with two independent management systems. e.g. where the independent management systems may assign the same cluster ids (as in sk50840 where the management assigned cluster id is used for VMAC) to different clusters because they would not be aware of each other.&lt;/P&gt;&lt;P&gt;&amp;nbsp; So, any leanings one way or the other?&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2020 16:42:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sharing-Management-network/m-p/97032#M78403</guid>
      <dc:creator>Dale_Lobb</dc:creator>
      <dc:date>2020-09-18T16:42:26Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing Management network</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sharing-Management-network/m-p/97120#M78404</link>
      <description>&lt;P&gt;Other than the potential issue with cluster IDs, which I believe should be a non-issue in current gateway versions, there shouldn’t be any issues with this.&lt;/P&gt;</description>
      <pubDate>Sun, 20 Sep 2020 22:23:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sharing-Management-network/m-p/97120#M78404</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-09-20T22:23:48Z</dc:date>
    </item>
  </channel>
</rss>

