<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Virtual System bridge interfaces in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/49587#M9895</link>
    <description>I saw the diagram.&lt;BR /&gt;As others have said, you will need to use a VS per VLAN translation or translate them outside of VSX.</description>
    <pubDate>Tue, 02 Apr 2019 14:21:05 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2019-04-02T14:21:05Z</dc:date>
    <item>
      <title>Virtual System bridge interfaces</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/48155#M9885</link>
      <description>&lt;P&gt;Hello team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been configuring some gateways in bridge mode with "inter-vlan multibridging" i mean:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;3 bridge interfaces with the following squeme: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;bridge 1 = bond2.10 and bond3.100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;bridge 2 = bond2.20 and bond3.200&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;bridge 3 = bond2.30 and bond3.300&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I had no problems with this configuration and the gateways bridge the traffic correctly between the corresponding vlan subinterfaces. By definition:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="tpbodytext"&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Bridging two interfaces causes every Ethernet frame that is received on one bridge port to be transmitted to the other port. Thus, the two bridge ports participate in the same Broadcast domain (which is different from router ports behavior).&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="tpbodytext"&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Only two interfaces can be connected by a single Bridge interface. These two interfaces can then be thought of as a two-ports switch. Each port can be a physical, VLAN, or bond device.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have tried to configure the same scenario in a VirtualSystem and I found the following limitation:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have a VSX cluster and I followed this procedure: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1. Configure 2 bond interfaces in each VSX member: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;add bonding group 2 &lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;set bonding group 2 mode 8023AD &lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;set interface eth1-01 &lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;state on set interface eth1-02 state on &lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;add bonding group 2 interface eth1-01 &lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;add bonding group 2 interface eth1-02 &lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Set interface bond2 comments Outside&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;The same configuration with bond3.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2. I created the VLAN interfaces in the VSX Cluster via SmartClient. Then, when I create the VS, I select bridge mode, and then I add, for example, bond2.2 and bond 3.200. Vlan 2 is the outside vlan and vlan 200 is the inside vlan (both are in the same ip address range). The purpose of this is to bridge these vlan interfaces in order to force L2 traffic to pass through the VS.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The problem is that when I try to add more bondX.y interfaces to the virtualsystem and click accept an ERROR is prompted: Something like interfaces vlan must be created in pairs for bridge.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have read in VSX admin guide:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="procedureheading"&gt;&lt;FONT size="2"&gt;&lt;EM&gt;To configure the external and internal interfaces:&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;FONT size="2"&gt;&lt;EM&gt;In&amp;nbsp;&lt;STRONG&gt;Virtual System Network Configuration&lt;/STRONG&gt;&amp;nbsp;page for the Separate Interfaces template in bridge mode, select the interfaces for the internal and external networks from the list.&lt;/EM&gt;&lt;/FONT&gt;&lt;P class="listcontinue"&gt;&lt;FONT size="2"&gt;&lt;EM&gt;If the selected interface is a VLAN interface, e&lt;FONT color="#FF0000"&gt;nter the same VLAN tag in both the external and internal&amp;nbsp;&lt;STRONG&gt;VLAN Tag&lt;/STRONG&gt;&amp;nbsp;fields&lt;/FONT&gt;. This field is not available for non-VLAN interfaces.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;So after some tests I get the conclusion that in VS you can:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT size="3"&gt;* Configure only one intervlan bridge interface (different vlan in external and internal interfaces)&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT size="3"&gt;* Configure multi-bridge interfaces with same vlan tag for internal and external interfaces.&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;Limitation:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;*&lt;EM&gt; Configure multi-bridge interfaces with different vlan in external and internal interfaces (as you can do in standard gateway operation)&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is this correct? Do you know the reason that we cannot configure this on VirtualSystems?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you in advance.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 17:45:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/48155#M9885</guid>
      <dc:creator>DPB_Point</dc:creator>
      <dc:date>2019-03-21T17:45:37Z</dc:date>
    </item>
    <item>
      <title>Re: Virtual System bridge interfaces</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/48174#M9886</link>
      <description>&lt;P&gt;Have you tried using vSwitch as the intermediary?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 20:52:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/48174#M9886</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-03-21T20:52:34Z</dc:date>
    </item>
    <item>
      <title>Re: Virtual System bridge interfaces</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/48212#M9887</link>
      <description>Are you trying to add more than one bridge to a VS?&lt;BR /&gt;I believe a given VS can only have one.</description>
      <pubDate>Fri, 22 Mar 2019 05:19:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/48212#M9887</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-03-22T05:19:55Z</dc:date>
    </item>
    <item>
      <title>Re: Virtual System bridge interfaces</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/48238#M9888</link>
      <description>&lt;P&gt;Yes, by definition it seems I can configure it in active-active mode with same vlan tag:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="2"&gt;Multi Bridges&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="tpbodytext"&gt;&lt;FONT size="2"&gt;&lt;EM&gt;This feature is supported only in R77.30 and higher, for VSX Gateways, and VSX clusters in Active/Active Bridge mode.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="tpbodytext"&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Multi Bridge&amp;nbsp;allows traffic from many different VLANs to move over one Virtual System in Bridge mode. In a Virtual System in Bridge mode, you can add physical and VLAN interfaces. When you add more than two VLAN interfaces, Multi Bridge is automatically enabled. Configure the same VLAN tag on each set of two interfaces to make them bridged.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="tpbodytext"&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Requirements for Multi Bridge interfaces:&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT size="2"&gt;&lt;EM&gt;All interfaces must be VLANs.&lt;/EM&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="2"&gt;&lt;EM&gt;You can make multiple bridges only between two VLAN trunks.&lt;/EM&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="2"&gt;&lt;EM&gt;You can add up to 64 pairs of VLAN interfaces for one Multi-bridge.&lt;/EM&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Those two VLAN trunks must be used together, and not with other VLAN trunks, in other Virtual Systems in Bridge mode or Multi Bridges.&lt;/EM&gt;&lt;/FONT&gt;&lt;P class="listcontinue"&gt;&lt;FONT size="2"&gt;&lt;EM&gt;For example, you define eth1.10, eth2.10, eth1.20, eth2.20. Now the VLAN trunks, eth1 and eth2, cannot be used with other VLAN trunks on other Virtual Systems in Bridge mode: eth1.30 cannot bridge with eth3.30.&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Captura.JPG" style="width: 747px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/360iE3B20CC99A5D111E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Captura.JPG" alt="Captura.JPG" /&gt;&lt;/span&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I tried this and it works but it is not exactly what I need. I am trying to migrate from other environment that can work with virtual contexts, multibridges and vlan translation but I cannot find the correct way to configure this in checkpoint.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2019 08:37:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/48238#M9888</guid>
      <dc:creator>DPB_Point</dc:creator>
      <dc:date>2019-03-22T08:37:03Z</dc:date>
    </item>
    <item>
      <title>Re: Virtual System bridge interfaces</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/48239#M9889</link>
      <description>&lt;P&gt;Do you mean to connect inside and outside trunks links directly to a Vswitch and then change the tags there in order to match the gateway bridge interfaces? I don't know if I understand&amp;nbsp;you right.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2019 08:39:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/48239#M9889</guid>
      <dc:creator>DPB_Point</dc:creator>
      <dc:date>2019-03-22T08:39:58Z</dc:date>
    </item>
    <item>
      <title>Re: Virtual System bridge interfaces</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/48298#M9890</link>
      <description>A diagram of what exactly you're trying to achieve would help tremendously.</description>
      <pubDate>Fri, 22 Mar 2019 15:50:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/48298#M9890</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-03-22T15:50:08Z</dc:date>
    </item>
    <item>
      <title>Re: Virtual System bridge interfaces</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/48306#M9891</link>
      <description>&lt;P&gt;Given the limitations described in the "multi bridge" section it appears that you may have to use a dedicated VS for each VLAN translation instance.&lt;/P&gt;
&lt;P&gt;Alternatively, translate them outside of the VSX.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2019 16:57:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/48306#M9891</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-03-22T16:57:33Z</dc:date>
    </item>
    <item>
      <title>Re: Virtual System bridge interfaces</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/48413#M9892</link>
      <description>&lt;P&gt;Sure, will be like this. Endusers, for example in VLAN2, have their default gateway 192.168.1.254 in vlan 200 (who knows all the routes to get to remote networks). As we want to have the minimum impact in network design, we separate the ip network in two broadcast domains (vlan 2 and 200) and we bridge them at Checkpoint firewall in order to force this traffic to pass through it.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Screenshot_1.jpg" style="width: 771px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/375iAB1EEC1FD60240C0/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot_1.jpg" alt="Screenshot_1.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Mar 2019 11:56:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/48413#M9892</guid>
      <dc:creator>DPB_Point</dc:creator>
      <dc:date>2019-03-24T11:56:24Z</dc:date>
    </item>
    <item>
      <title>Re: Virtual System bridge interfaces</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/48414#M9893</link>
      <description>&lt;P&gt;Thank you for your reply. I think that using a VS per Bridge will not be cost effective (vs licenses) and will be hard manageable. I think we will need to change the network design, separate networks physically or translate vlans outside the VSX as you said.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Mar 2019 12:01:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/48414#M9893</guid>
      <dc:creator>DPB_Point</dc:creator>
      <dc:date>2019-03-24T12:01:38Z</dc:date>
    </item>
    <item>
      <title>Re: Virtual System bridge interfaces</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/49564#M9894</link>
      <description>&lt;P&gt;Hi mate!&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp; I don't know if you saw the network diagram. Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 02 Apr 2019 11:54:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/49564#M9894</guid>
      <dc:creator>DPB_Point</dc:creator>
      <dc:date>2019-04-02T11:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: Virtual System bridge interfaces</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/49587#M9895</link>
      <description>I saw the diagram.&lt;BR /&gt;As others have said, you will need to use a VS per VLAN translation or translate them outside of VSX.</description>
      <pubDate>Tue, 02 Apr 2019 14:21:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/49587#M9895</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-04-02T14:21:05Z</dc:date>
    </item>
    <item>
      <title>Re: Virtual System bridge interfaces</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/49591#M9896</link>
      <description>&lt;P&gt;Thanks!!!&lt;/P&gt;&lt;P&gt;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Apr 2019 14:52:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/49591#M9896</guid>
      <dc:creator>DPB_Point</dc:creator>
      <dc:date>2019-04-02T14:52:50Z</dc:date>
    </item>
    <item>
      <title>Re: Virtual System bridge interfaces</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/79684#M9897</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;I am deploying also a VS in bridge mode between two switches and I need to form the OSPF between the switches but I am having issues.&lt;/P&gt;&lt;P&gt;In the VS side, I setup the following interfaces to form the bridge using smart console.&lt;/P&gt;&lt;P&gt;br10&lt;/P&gt;&lt;P&gt;- eth1.200 (trunk)&lt;/P&gt;&lt;P&gt;- eth2.200 (trunk)&lt;/P&gt;&lt;P&gt;br20&lt;/P&gt;&lt;P&gt;- eth1.300 (trunk)&lt;/P&gt;&lt;P&gt;- eth2.300 (trunk)&lt;/P&gt;&lt;P&gt;In the switch side, I configure an SVI per VLAN. Then I configure the uplinks as trunk ports. This way, the OSPF is not forming and I do not see any traffic passing in the firewall.&lt;/P&gt;&lt;P&gt;However, when I configure the uplink ports of the switch to an access port for example access to vlan 200, the OSPF is forming and I can see traffic now in the firewall.&lt;/P&gt;&lt;P&gt;I would like to know what did I missed? The switchport should be working when I set it to trunk because my firewall interfaces are also in trunk mode as well.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 16:08:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/79684#M9897</guid>
      <dc:creator>CyberBreaker</dc:creator>
      <dc:date>2020-03-25T16:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: Virtual System bridge interfaces</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/79688#M9898</link>
      <description>I think this is not related with this post.&lt;BR /&gt;I don't know if I understand your config. I think you need something like:&lt;BR /&gt;&lt;BR /&gt;Bond1: eth1 + eth2&lt;BR /&gt;&lt;BR /&gt;Create two bond subinterfaces:&lt;BR /&gt;bond1.200&lt;BR /&gt;bond1.300&lt;BR /&gt;&lt;BR /&gt;Then bridge that two subinterfaces:&lt;BR /&gt;br10: Vlan200 and vlan300 have the same address range and the bridge will tag and untag packets between the two bound interfaces.&lt;BR /&gt;&lt;BR /&gt;After this you must be able to see packets flowing through your firewall. Please, after changing the configuration run in CLI: &amp;gt;fw monitor -e 'accept host(YourSwitchIP);' and paste here the output. You can check it with tcpdump(from expert) too.&lt;BR /&gt;You must see the packet flowing through the 4 inspection points iIoO.</description>
      <pubDate>Wed, 25 Mar 2020 16:22:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/79688#M9898</guid>
      <dc:creator>DPB_Point</dc:creator>
      <dc:date>2020-03-25T16:22:11Z</dc:date>
    </item>
    <item>
      <title>Re: Virtual System bridge interfaces</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/96641#M9899</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21783"&gt;@DPB_Point&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="top.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/8049iB9EF8764827FBAC5/image-size/large?v=v2&amp;amp;px=999" role="button" title="top.png" alt="top.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;What are the configuration of port1 and port2,thanks!&lt;/P&gt;</description>
      <pubDate>Sun, 13 Sep 2020 12:17:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Virtual-System-bridge-interfaces/m-p/96641#M9899</guid>
      <dc:creator>Jeff_Gao</dc:creator>
      <dc:date>2020-09-13T12:17:30Z</dc:date>
    </item>
  </channel>
</rss>

