<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VSX ClusterXL Bridge Mode in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-ClusterXL-Bridge-Mode/m-p/91842#M8857</link>
    <description>&lt;P&gt;Two options currently as I understand.&lt;/P&gt;
&lt;P&gt;- Active / Active with multi-bridge&lt;/P&gt;
&lt;P&gt;- Separate VS per-VLAN&lt;/P&gt;</description>
    <pubDate>Sat, 18 Jul 2020 14:14:41 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2020-07-18T14:14:41Z</dc:date>
    <item>
      <title>VSX ClusterXL Bridge Mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-ClusterXL-Bridge-Mode/m-p/91808#M8854</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;I have some clarifications, I have somehow successfully configured my VSX setup but I have some questions and I am not sure if the one that I configured is the correct way to do it.&lt;/P&gt;&lt;P&gt;My requirements are the following;&lt;/P&gt;&lt;P&gt;- 2x VSX Gateway in Cluster XL Active/Standby&lt;/P&gt;&lt;P&gt;- 4x Virtual Systems&lt;/P&gt;&lt;P&gt;- Allow multiple VLANs in each virtual systems&lt;/P&gt;&lt;P&gt;- All virtual systems cluster state should be active in just 1x member of the VSX gateway and the other will be on standby.&lt;/P&gt;&lt;P&gt;Currently, I set my physical interfaces to non-trunk (meaning I did not checked the VLAN Trunking option). So far, I can see traffic from my different VLANs. Is this the correct way to configure the interface or do I need to specify the VLAN in the interface (which means I need to check the VLAN Trunking option)?&amp;nbsp;&lt;/P&gt;&lt;P&gt;If this is the correct way by not checking the VLAN Trunking option in the physical interfaces, how does the Check Point knows that the traffic coming in is from VLAN X or VLAN Y then how will the firewall know that the traffic should go out to VLAN X or VLAN Y?&lt;/P&gt;&lt;P&gt;I searched already over the internet and Check Point support site but I cannot see any documents that explains this scenario.&lt;/P&gt;&lt;P&gt;Also, multi-bridge is not an option because it only supports in Active/Active and not in Active/Standby failover.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2020 18:54:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-ClusterXL-Bridge-Mode/m-p/91808#M8854</guid>
      <dc:creator>CyberBreaker</dc:creator>
      <dc:date>2020-07-17T18:54:07Z</dc:date>
    </item>
    <item>
      <title>Re: VSX ClusterXL Bridge Mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-ClusterXL-Bridge-Mode/m-p/91834#M8855</link>
      <description>&lt;P&gt;&lt;SPAN&gt;sk121451 will assist in ensuring the active/standby configuration is complete.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jul 2020 12:13:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-ClusterXL-Bridge-Mode/m-p/91834#M8855</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2020-07-18T12:13:43Z</dc:date>
    </item>
    <item>
      <title>Re: VSX ClusterXL Bridge Mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-ClusterXL-Bridge-Mode/m-p/91836#M8856</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;thanks for the feedback. But how can I configure my interfaces to accepts multiple VLANs when I am running in VSX in bridge mode?&amp;nbsp;&lt;BR /&gt;Some says, in Smart Console I need to configure the physical interfaces to be in bridge interface and that bridge interface, I need to tag the VLAN but how can I have the bridge interface to be in my Smart Console if I am running in VSX?&lt;/P&gt;&lt;P&gt;or There is no need to tag the VLANs in the interfaces either in physical or in bridge interface?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jul 2020 12:24:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-ClusterXL-Bridge-Mode/m-p/91836#M8856</guid>
      <dc:creator>CyberBreaker</dc:creator>
      <dc:date>2020-07-18T12:24:34Z</dc:date>
    </item>
    <item>
      <title>Re: VSX ClusterXL Bridge Mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-ClusterXL-Bridge-Mode/m-p/91842#M8857</link>
      <description>&lt;P&gt;Two options currently as I understand.&lt;/P&gt;
&lt;P&gt;- Active / Active with multi-bridge&lt;/P&gt;
&lt;P&gt;- Separate VS per-VLAN&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jul 2020 14:14:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-ClusterXL-Bridge-Mode/m-p/91842#M8857</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2020-07-18T14:14:41Z</dc:date>
    </item>
    <item>
      <title>Re: VSX ClusterXL Bridge Mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-ClusterXL-Bridge-Mode/m-p/91843#M8858</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;sorry for the confusion I just want to describe what my setup is&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;. But what I really need to know is how Check Point Bridge mode handles the ethernet traffic, i mean how the firewall knows how to forward the traffic from a specific VLAN (e.g. VLAN 10) to the correct VLAN which needs to be in VLAN 10 as well?&amp;nbsp;&lt;/P&gt;&lt;P&gt;All I know that in VSX, I cannot do multi-bridge setup in active/standby. So what I did is that I configured a TRUNK bridge interface by bridging two non-trunk physical ports in which works fine but it brings me back to question above about how CP handles ethernet traffic.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jul 2020 14:24:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-ClusterXL-Bridge-Mode/m-p/91843#M8858</guid>
      <dc:creator>CyberBreaker</dc:creator>
      <dc:date>2020-07-18T14:24:16Z</dc:date>
    </item>
    <item>
      <title>Re: VSX ClusterXL Bridge Mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-ClusterXL-Bridge-Mode/m-p/91844#M8859</link>
      <description>&lt;P&gt;&lt;BR /&gt;In the supported documented use-cases it is based on the configured tags.&lt;/P&gt;
&lt;P&gt;What blades are enabled and does it work "properly" for _all_ VLANs i.e. how is the interface topology configured?&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jul 2020 14:48:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-ClusterXL-Bridge-Mode/m-p/91844#M8859</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2020-07-18T14:48:31Z</dc:date>
    </item>
    <item>
      <title>Re: VSX ClusterXL Bridge Mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-ClusterXL-Bridge-Mode/m-p/91850#M8860</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;, I am just using Firewall blade and based on the logs, it seems to be working fine as far as forwarding ethernet frames are concerned as it get in and out of&amp;nbsp; firewall in the correct way. My current topology is just simple,&amp;nbsp;&lt;/P&gt;&lt;P&gt;DIST-SW &amp;lt;--&amp;gt; eth1-FW-eth2 &amp;lt;--&amp;gt; CORE-SW&lt;/P&gt;&lt;P&gt;I configured my VSX bridge mode with active/standby in Smart Console, eth1 and eth2 physical interfaces are set to non-trunk link (Trunk is not checked) then I chose those interfaces to be on my virtual system to build the bridge interface.&lt;/P&gt;&lt;P&gt;Is this correct?&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jul 2020 16:16:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-ClusterXL-Bridge-Mode/m-p/91850#M8860</guid>
      <dc:creator>CyberBreaker</dc:creator>
      <dc:date>2020-07-18T16:16:37Z</dc:date>
    </item>
    <item>
      <title>Re: VSX ClusterXL Bridge Mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-ClusterXL-Bridge-Mode/m-p/91865#M8861</link>
      <description>&lt;P&gt;Apologies for the confusion, regarding interface topology we typically refer to this as the anti-spoofing settings etc&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jul 2020 02:03:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-ClusterXL-Bridge-Mode/m-p/91865#M8861</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2020-07-19T02:03:36Z</dc:date>
    </item>
    <item>
      <title>Re: VSX ClusterXL Bridge Mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-ClusterXL-Bridge-Mode/m-p/91886#M8862</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;, I disabled the anti-spoofing for all interfaces.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jul 2020 18:54:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-ClusterXL-Bridge-Mode/m-p/91886#M8862</guid>
      <dc:creator>CyberBreaker</dc:creator>
      <dc:date>2020-07-19T18:54:11Z</dc:date>
    </item>
  </channel>
</rss>

