<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VSX Bridge Mode VS in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Bridge-Mode-VS/m-p/78607#M9477</link>
    <description>&lt;P&gt;Hi ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Trying to create a Bridge Mode VS in a VSX HA Cluster. This Cluster contains other Layer 3 VS's. I have read the User Manual and bit confused what options I need to choose . I assume following are correct.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;VSX is running on R80.10 Take 203 Active/Standby&lt;/P&gt;
&lt;P&gt;1. Go to each Cluster member, cpconfig and&amp;nbsp;&amp;nbsp;Enable ClusterXL for Bridge Active/Standby, Reboot.&lt;/P&gt;
&lt;P&gt;2.&amp;nbsp; Go to Smart Console, Cluster Object Properties, Other, VSX Bridge Configuration, Select "Check Point ClusterXL", install the VSX Policy&lt;/P&gt;
&lt;P&gt;3. Create a VS with Bridge Mode selected and configure 2 interfaces.&lt;/P&gt;
&lt;P&gt;Could you confirm above steps are correct ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also which file contains the VSX Cluster specific configuration ( I mean file name in the VSX Member) ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your help&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 17 Mar 2020 22:46:43 GMT</pubDate>
    <dc:creator>AM_2019</dc:creator>
    <dc:date>2020-03-17T22:46:43Z</dc:date>
    <item>
      <title>VSX Bridge Mode VS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Bridge-Mode-VS/m-p/78607#M9477</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Trying to create a Bridge Mode VS in a VSX HA Cluster. This Cluster contains other Layer 3 VS's. I have read the User Manual and bit confused what options I need to choose . I assume following are correct.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;VSX is running on R80.10 Take 203 Active/Standby&lt;/P&gt;
&lt;P&gt;1. Go to each Cluster member, cpconfig and&amp;nbsp;&amp;nbsp;Enable ClusterXL for Bridge Active/Standby, Reboot.&lt;/P&gt;
&lt;P&gt;2.&amp;nbsp; Go to Smart Console, Cluster Object Properties, Other, VSX Bridge Configuration, Select "Check Point ClusterXL", install the VSX Policy&lt;/P&gt;
&lt;P&gt;3. Create a VS with Bridge Mode selected and configure 2 interfaces.&lt;/P&gt;
&lt;P&gt;Could you confirm above steps are correct ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also which file contains the VSX Cluster specific configuration ( I mean file name in the VSX Member) ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your help&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Mar 2020 22:46:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Bridge-Mode-VS/m-p/78607#M9477</guid>
      <dc:creator>AM_2019</dc:creator>
      <dc:date>2020-03-17T22:46:43Z</dc:date>
    </item>
    <item>
      <title>Re: VSX Bridge Mode VS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Bridge-Mode-VS/m-p/78608#M9478</link>
      <description>Those steps look correct to me.&lt;BR /&gt;&lt;BR /&gt;As for the "VSX Cluster Specific Configuration" there isn't one specific file.&lt;BR /&gt;All the necessarily details are pushed from the management.&lt;BR /&gt;As long as that is appropriately backed up, you should be able to recover in case the gateway fails.&lt;BR /&gt;</description>
      <pubDate>Tue, 17 Mar 2020 23:36:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Bridge-Mode-VS/m-p/78608#M9478</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-17T23:36:59Z</dc:date>
    </item>
    <item>
      <title>Re: VSX Bridge Mode VS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Bridge-Mode-VS/m-p/78618#M9479</link>
      <description>&lt;P&gt;Suggest also reviewing&amp;nbsp;&lt;SPAN&gt;sk121451 and the fwkern.conf parameters.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2020 02:16:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Bridge-Mode-VS/m-p/78618#M9479</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2020-03-18T02:16:50Z</dc:date>
    </item>
    <item>
      <title>Re: VSX Bridge Mode VS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Bridge-Mode-VS/m-p/78675#M9480</link>
      <description>&lt;P&gt;Answering the last question in the post:&lt;BR /&gt;&lt;BR /&gt;There are several special provisioning files on each of VSX cluster members, called local.vs, local.vsall, local.vskeep.&lt;BR /&gt;&lt;BR /&gt;However, they are used and updated only in conjunction with management server operations. In a nutshell, if SIC is up and MDS/SMS available, VSX cluster members always contact management domain first to get most up to date provisioning info.&lt;BR /&gt;&lt;BR /&gt;For implementation part, I strongly suggest you following the admin manual for your VSX version.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2020 11:29:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Bridge-Mode-VS/m-p/78675#M9480</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-03-18T11:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: VSX Bridge Mode VS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Bridge-Mode-VS/m-p/91805#M9481</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;&amp;nbsp;, I have similar setup but I just wanted to know if my interface configuration is correct. My intention is to allow all VLANs to pass through the firewall, now my interface config is non-trunk physical port (the trunk is not checked) for both of physical interface participating in the bridge link. So far, all it passes it all and well but I am just wondering if this is correct or do I need to tag the VLANs? However, if I tag each VLANs, VSX will not accept it because I am currently in Active/Standby mode. Is this how CP behaves in VSX bridge mode? Thanks a lot.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2020 18:03:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Bridge-Mode-VS/m-p/91805#M9481</guid>
      <dc:creator>CyberBreaker</dc:creator>
      <dc:date>2020-07-17T18:03:22Z</dc:date>
    </item>
    <item>
      <title>Re: VSX Bridge Mode VS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Bridge-Mode-VS/m-p/91815#M9482</link>
      <description>&lt;P&gt;If you are talking about bridge mode, you need to create all interfaces with VLANs. there is not trunk mode there&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2020 20:31:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-Bridge-Mode-VS/m-p/91815#M9482</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-07-17T20:31:02Z</dc:date>
    </item>
  </channel>
</rss>

