<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Check Point Firewall behind ASA Firewall in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Firewall-behind-ASA-Firewall/m-p/24588#M95442</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Make sure the ASA is&amp;nbsp;allowing the traffic listed in this SK:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk83520" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk83520"&gt;How to verify that Security Gateway and/or Security Management Server can access Check Point servers?&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 18 May 2018 23:26:06 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2018-05-18T23:26:06Z</dc:date>
    <item>
      <title>Check Point Firewall behind ASA Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Firewall-behind-ASA-Firewall/m-p/24584#M95438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could someone point me to a design guide on implementing Check point Security appliance behind ASA firewall with firepower services. Are there known limitations that one should be aware of?&lt;/P&gt;&lt;P&gt;Network design;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="65648" alt="Dual firewall design" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65648_design.JPG" /&gt;&lt;/P&gt;&lt;P&gt;The purpose of the Check point firewall is to provide a second layer of security to internal servers and also control traffic from LAN to Server farm and LAN to internet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 May 2018 08:09:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Firewall-behind-ASA-Firewall/m-p/24584#M95438</guid>
      <dc:creator>John_Edovia</dc:creator>
      <dc:date>2018-05-18T08:09:42Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Firewall behind ASA Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Firewall-behind-ASA-Firewall/m-p/24585#M95439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Few things come to mind:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. if you intend to use VPN functionality on Check Point:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;IMG __jive_id="65659" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65659_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65666_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Exclude ASA DMZ network from Anti-spoofing protection on external interface of the Check Point gateway:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="65663" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65663_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 May 2018 20:55:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Firewall-behind-ASA-Firewall/m-p/24585#M95439</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-05-18T20:55:48Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Firewall behind ASA Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Firewall-behind-ASA-Firewall/m-p/24586#M95440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@Vladimir VPN will be setup on the ASA and the external interface of check point will be assigned a private IP address. NAT will also be configured on the ASA.&lt;/P&gt;&lt;P&gt;Some vendors recommend that the firewall behind another firewall be configured in layer 2 mode(bridge). Does this apply to check point?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 May 2018 21:28:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Firewall-behind-ASA-Firewall/m-p/24586#M95440</guid>
      <dc:creator>John_Edovia</dc:creator>
      <dc:date>2018-05-18T21:28:08Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Firewall behind ASA Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Firewall-behind-ASA-Firewall/m-p/24587#M95441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My preferred architecture is to have layer 2 bridge in front of the addressable L3 device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your case,since ASA is directly accessible from the Internet, it is easier to run DDOS against (unless there is additional filtering performed on the border routers).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a firewall/IPS in transparent bridge on the edge, you can drop a lot of stuff before it hits the device that actually has to accept connections.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 May 2018 23:22:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Firewall-behind-ASA-Firewall/m-p/24587#M95441</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-05-18T23:22:46Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Firewall behind ASA Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Firewall-behind-ASA-Firewall/m-p/24588#M95442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Make sure the ASA is&amp;nbsp;allowing the traffic listed in this SK:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk83520" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk83520"&gt;How to verify that Security Gateway and/or Security Management Server can access Check Point servers?&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 May 2018 23:26:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Firewall-behind-ASA-Firewall/m-p/24588#M95442</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-05-18T23:26:06Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Firewall behind ASA Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Firewall-behind-ASA-Firewall/m-p/24589#M95443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Site-to-site and remote access VPN is not supported on ASA in transparent mode, so we cannot have the ASA in layer 2 bridge mode. To block unwanted traffic at the edge as you rightly pointed out, we might explore the option of enabling IOS zone based firewall on the edge router.&lt;/P&gt;&lt;P&gt;Kindly&amp;nbsp;correct me if I am wrong, from what I have gathered so far from the responses here, its OK to&amp;nbsp; have the ASA and Check Point in routed mode.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 May 2018 18:16:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Firewall-behind-ASA-Firewall/m-p/24589#M95443</guid>
      <dc:creator>John_Edovia</dc:creator>
      <dc:date>2018-05-20T18:16:45Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Firewall behind ASA Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Firewall-behind-ASA-Firewall/m-p/24590#M95444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Absolutely. I've just recently deployed it in exactly the situation you are describing.&lt;/P&gt;&lt;P&gt;FYI: if the Check Point piece is a cluster, you may have to add static routes to individual member's IPs pointing to the vIP of the cluster on next hop routers, if you want to make individual members reachable. Alternatively, there is a kernel parameter fix that allows you to achieve the same. There is a thread in CheckMates regarding this issue, if you'll have to look it up.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 May 2018 21:10:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-Firewall-behind-ASA-Firewall/m-p/24590#M95444</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-05-20T21:10:36Z</dc:date>
    </item>
  </channel>
</rss>

