<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ClusterXL SG Bridge Mode Connection in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-SG-Bridge-Mode-Connection/m-p/76295#M9441</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/17364"&gt;@Maarten_Sjouw&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I understand that part but still I am still confused since the switch that is connecting to the gateways is a stacked switch both of the switch is&amp;nbsp; in active/active and each switch is connected to a security gateway (1 switch to 1 gateway physical connection).&lt;/P&gt;&lt;P&gt;In this scenario, there will be a possibility that the switch will send the traffic to the gateway which is the standby.&lt;/P&gt;&lt;P&gt;Let us say the active firewall for my VS1 is FW01 and FW02 is the standby, my stacked switch which has a physical connection of 1 switch to 1 gateway and both of my switch forwarding traffic, there is now a possibility that my FW02 can receive traffic but FW02 is the standby state.&lt;/P&gt;&lt;P&gt;Thank you for the help.&lt;/P&gt;</description>
    <pubDate>Tue, 25 Feb 2020 07:49:48 GMT</pubDate>
    <dc:creator>CyberBreaker</dc:creator>
    <dc:date>2020-02-25T07:49:48Z</dc:date>
    <item>
      <title>ClusterXL SG Bridge Mode Connection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-SG-Bridge-Mode-Connection/m-p/76281#M9439</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;I have 2 new security gateways in VSX bridge mode in clusterXL, these security gateways are connected to a stacked switch (1 gateway to 1 switch physical connection). My concern is that since the gateways are not running in L3 mode, the stacked switch is not pointing to a VIP to route the traffic and it is prone that the switch will pass the traffic to the standby firewall hence it will drop the traffic.&lt;/P&gt;&lt;P&gt;Is this how the CP behaves or are there any ways to prevent it?&lt;/P&gt;&lt;P&gt;Thank you very much.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 04:41:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-SG-Bridge-Mode-Connection/m-p/76281#M9439</guid>
      <dc:creator>CyberBreaker</dc:creator>
      <dc:date>2020-02-25T04:41:06Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL SG Bridge Mode Connection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-SG-Bridge-Mode-Connection/m-p/76287#M9440</link>
      <description>With VSX only 1 gateway is handling the specific VS, so there will not be any information on the other switch about MAC addresses on the other side of the bridge.</description>
      <pubDate>Tue, 25 Feb 2020 06:06:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-SG-Bridge-Mode-Connection/m-p/76287#M9440</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-02-25T06:06:50Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL SG Bridge Mode Connection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-SG-Bridge-Mode-Connection/m-p/76295#M9441</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/17364"&gt;@Maarten_Sjouw&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I understand that part but still I am still confused since the switch that is connecting to the gateways is a stacked switch both of the switch is&amp;nbsp; in active/active and each switch is connected to a security gateway (1 switch to 1 gateway physical connection).&lt;/P&gt;&lt;P&gt;In this scenario, there will be a possibility that the switch will send the traffic to the gateway which is the standby.&lt;/P&gt;&lt;P&gt;Let us say the active firewall for my VS1 is FW01 and FW02 is the standby, my stacked switch which has a physical connection of 1 switch to 1 gateway and both of my switch forwarding traffic, there is now a possibility that my FW02 can receive traffic but FW02 is the standby state.&lt;/P&gt;&lt;P&gt;Thank you for the help.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 07:49:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-SG-Bridge-Mode-Connection/m-p/76295#M9441</guid>
      <dc:creator>CyberBreaker</dc:creator>
      <dc:date>2020-02-25T07:49:48Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL SG Bridge Mode Connection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-SG-Bridge-Mode-Connection/m-p/76300#M9442</link>
      <description>Each switch builds its MAC table per port. When the VS is not active on member 2 it will not tell Switch2 any MAC addresses. So again Switch2 does not know about these addresses and will not forward anything for those addresses to your FW02.</description>
      <pubDate>Tue, 25 Feb 2020 08:15:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-SG-Bridge-Mode-Connection/m-p/76300#M9442</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-02-25T08:15:02Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL SG Bridge Mode Connection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-SG-Bridge-Mode-Connection/m-p/76303#M9443</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/17364"&gt;@Maarten_Sjouw&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the clarification about that, so this is also applicable for modes of deployment either L3 or bridge mode?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 08:37:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-SG-Bridge-Mode-Connection/m-p/76303#M9443</guid>
      <dc:creator>CyberBreaker</dc:creator>
      <dc:date>2020-02-25T08:37:33Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL SG Bridge Mode Connection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-SG-Bridge-Mode-Connection/m-p/76311#M9444</link>
      <description>Also in L3 the VS is only active on 1 of the 2 FW's not on the other.</description>
      <pubDate>Tue, 25 Feb 2020 09:22:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-SG-Bridge-Mode-Connection/m-p/76311#M9444</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-02-25T09:22:28Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL SG Bridge Mode Connection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-SG-Bridge-Mode-Connection/m-p/76312#M9445</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/17364"&gt;@Maarten_Sjouw&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;But it should be the same if in bridge mode right?&amp;nbsp;&lt;/P&gt;&lt;P&gt;A VS can be active in only 1 FW in ClusterXL?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 09:24:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-SG-Bridge-Mode-Connection/m-p/76312#M9445</guid>
      <dc:creator>CyberBreaker</dc:creator>
      <dc:date>2020-02-25T09:24:59Z</dc:date>
    </item>
    <item>
      <title>Re: ClusterXL SG Bridge Mode Connection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-SG-Bridge-Mode-Connection/m-p/76313#M9446</link>
      <description>As I already said a VS can only be active on 1 FW it will not do anything on the other FW except for keeping the connection table up to date.&lt;BR /&gt;It is not active in either mode on the Backup FW.</description>
      <pubDate>Tue, 25 Feb 2020 09:28:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ClusterXL-SG-Bridge-Mode-Connection/m-p/76313#M9446</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-02-25T09:28:32Z</dc:date>
    </item>
  </channel>
</rss>

