<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VSX route propagation with more then one vSwitch in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-route-propagation-with-more-then-one-vSwitch/m-p/55392#M9795</link>
    <description>A diagram might be helpful to visualize this.&lt;BR /&gt;The route that propagates when you use "propagate route to adjacent Virtual Devices" is the wrp interface between the VS and the Switch.&lt;BR /&gt;If you have two routes to the same destination using different paths, not sure how it decides which one to use.&lt;BR /&gt;In any case, static routes seem like the best idea here.</description>
    <pubDate>Mon, 10 Jun 2019 00:03:49 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2019-06-10T00:03:49Z</dc:date>
    <item>
      <title>VSX route propagation with more then one vSwitch</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-route-propagation-with-more-then-one-vSwitch/m-p/55193#M9794</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;I have a question to the feature "propagate route to adjacent Virtual Devices".&lt;/P&gt;&lt;P&gt;Lets assume we have three external vs: Inbound-vs, Outbound-vs and VPN-vs&lt;/P&gt;&lt;P&gt;This three VS are in a vSwitch sandwich, one vSwitch for the external subnet and one for internal transit LAN leading to internal VS with internal networks.&lt;/P&gt;&lt;P&gt;The question is now: How does Check Point decided through which of the two vSwitch traffic is routet from one DMZ to the other? (Random, vs-id, higher ip, ...)&lt;/P&gt;&lt;P&gt;In our setup the routes are propagated through the external vSwitch. This works as consequently for all interfaces the external vSwitch is chosen and no asynch routing occurs. From a security point of view and also architectural considerations, this is not the desired path. For example traffic is coming encrpyted over VPN to the VPN-vs and is sent clear text over the external interface to the DMZ of the Outbound-vs. Assuming the two vs are on another physical VSX host, the traffic is sent over a physical switch, which is exposed to the internet. Not so good.&lt;/P&gt;&lt;P&gt;Of course, we could disable the feature and manually route through the internal transit vSwitch. As of now, it looks like we have to go that way.&lt;/P&gt;&lt;P&gt;Is there a way to force check point to choose the internal vSwitch for the propagated routes?&lt;/P&gt;&lt;P&gt;Imho check point should never use an external interface to route traffic. The information, that these interfaces are external is given in the topology. That might be an RFE.&lt;/P&gt;&lt;P&gt;What do you think about the topic?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2019 11:20:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-route-propagation-with-more-then-one-vSwitch/m-p/55193#M9794</guid>
      <dc:creator>Andreas</dc:creator>
      <dc:date>2019-06-06T11:20:20Z</dc:date>
    </item>
    <item>
      <title>Re: VSX route propagation with more then one vSwitch</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-route-propagation-with-more-then-one-vSwitch/m-p/55392#M9795</link>
      <description>A diagram might be helpful to visualize this.&lt;BR /&gt;The route that propagates when you use "propagate route to adjacent Virtual Devices" is the wrp interface between the VS and the Switch.&lt;BR /&gt;If you have two routes to the same destination using different paths, not sure how it decides which one to use.&lt;BR /&gt;In any case, static routes seem like the best idea here.</description>
      <pubDate>Mon, 10 Jun 2019 00:03:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VSX-route-propagation-with-more-then-one-vSwitch/m-p/55392#M9795</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-10T00:03:49Z</dc:date>
    </item>
  </channel>
</rss>

