<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Unable to get bridge mode working in R80.10 Checkpoint VM in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Unable-to-get-bridge-mode-working-in-R80-10-Checkpoint-VM/m-p/61359#M3830</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I have installed an evaluation version of All-in-one R80.10 Checkpoint Firewall in a VM.&lt;/P&gt;&lt;P&gt;I don't have Smart Console in our setup, so I have done all the configuration using Gaia CLI.&lt;/P&gt;&lt;P&gt;Following is the configuration I have done:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;set interface eth1 state on&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;set interface eth2 state on&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;add bridging group 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;add bridging group 0 interface eth1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;add bridging group 0 interface eth2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;mgmt add host name "Mgmt" ip-address "10.0.2.2"&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;mgmt add access-rule layer "Network" name "Management Rule" source "Mgmt" service.1 "ssh" service.2 "https" position "top" action "Accept"&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;mgmt add access-rule layer "Network" name "FW-rule" source "All_Internet" service "any" position.below "Management Rule" action "Accept"&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;mgmt publish&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;mgmt install-policy policy-package "Standard"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;But I am facing one issue, the bridge is not forwarding the traffic received on eth1 to eth2. I have tried disabling anti-spoofing also but it didn't help.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;fw ctl set int fw_local_interface_anti_spoofing 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;fw ctl set int fw_antispoofing_enabled 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;The &lt;EM&gt;fw monitor&lt;/EM&gt; logs shows only inbound traffic.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;eth1:i0 (IP Options Strip (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:i1 (Stateless verifications (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:i2 (fw multik misc proto forwarding)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:i3 (SecureXL conn sync)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:i4 (fw VM inbound )[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I5 (SecureXL inbound)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I6 (fw SCV inbound)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I7 (passive streaming (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I8 (TCP streaming (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I9 (IP Options Restore (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I10 (Chain End)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:i0 (IP Options Strip (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:i1 (Stateless verifications (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:i2 (fw multik misc proto forwarding)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:i3 (SecureXL conn sync)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:i4 (fw VM inbound )[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I5 (SecureXL inbound)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I6 (fw SCV inbound)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I7 (passive streaming (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I8 (TCP streaming (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I9 (IP Options Restore (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I10 (Chain End)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Can anyone please suggest what I am missing in the configuration?&lt;/P&gt;</description>
    <pubDate>Wed, 28 Aug 2019 04:06:53 GMT</pubDate>
    <dc:creator>ravikush11</dc:creator>
    <dc:date>2019-08-28T04:06:53Z</dc:date>
    <item>
      <title>Unable to get bridge mode working in R80.10 Checkpoint VM</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Unable-to-get-bridge-mode-working-in-R80-10-Checkpoint-VM/m-p/61359#M3830</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I have installed an evaluation version of All-in-one R80.10 Checkpoint Firewall in a VM.&lt;/P&gt;&lt;P&gt;I don't have Smart Console in our setup, so I have done all the configuration using Gaia CLI.&lt;/P&gt;&lt;P&gt;Following is the configuration I have done:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;set interface eth1 state on&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;set interface eth2 state on&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;add bridging group 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;add bridging group 0 interface eth1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;add bridging group 0 interface eth2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;mgmt add host name "Mgmt" ip-address "10.0.2.2"&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;mgmt add access-rule layer "Network" name "Management Rule" source "Mgmt" service.1 "ssh" service.2 "https" position "top" action "Accept"&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;mgmt add access-rule layer "Network" name "FW-rule" source "All_Internet" service "any" position.below "Management Rule" action "Accept"&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;mgmt publish&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;mgmt install-policy policy-package "Standard"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;But I am facing one issue, the bridge is not forwarding the traffic received on eth1 to eth2. I have tried disabling anti-spoofing also but it didn't help.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;fw ctl set int fw_local_interface_anti_spoofing 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;fw ctl set int fw_antispoofing_enabled 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;The &lt;EM&gt;fw monitor&lt;/EM&gt; logs shows only inbound traffic.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;eth1:i0 (IP Options Strip (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:i1 (Stateless verifications (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:i2 (fw multik misc proto forwarding)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:i3 (SecureXL conn sync)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:i4 (fw VM inbound )[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I5 (SecureXL inbound)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I6 (fw SCV inbound)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I7 (passive streaming (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I8 (TCP streaming (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I9 (IP Options Restore (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I10 (Chain End)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:i0 (IP Options Strip (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:i1 (Stateless verifications (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:i2 (fw multik misc proto forwarding)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:i3 (SecureXL conn sync)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:i4 (fw VM inbound )[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I5 (SecureXL inbound)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I6 (fw SCV inbound)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I7 (passive streaming (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I8 (TCP streaming (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I9 (IP Options Restore (in))[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;eth1:I10 (Chain End)[1010]: 1.2.3.4 -&amp;gt; 19.19.19.5 (UDP) len=1010 id=1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Can anyone please suggest what I am missing in the configuration?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2019 04:06:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Unable-to-get-bridge-mode-working-in-R80-10-Checkpoint-VM/m-p/61359#M3830</guid>
      <dc:creator>ravikush11</dc:creator>
      <dc:date>2019-08-28T04:06:53Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to get bridge mode working in R80.10 Checkpoint VM</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Unable-to-get-bridge-mode-working-in-R80-10-Checkpoint-VM/m-p/61369#M3831</link>
      <description>Be aware that when you have an ip address that will be showing up on more than one network interfaces the VM switches will mess it up with their security settings. You will probably need to disable all security settings on those ports.</description>
      <pubDate>Wed, 28 Aug 2019 07:52:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Unable-to-get-bridge-mode-working-in-R80-10-Checkpoint-VM/m-p/61369#M3831</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-08-28T07:52:00Z</dc:date>
    </item>
  </channel>
</rss>

