- Products
- Learn
- Local User Groups
- Partners
- More
Call For Papers
Your Expertise, Our Stage
Ink Dragon: A Major Nation-State Campaign
Watch HereAI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
The Great Exposure Reset
AI Security Masters E4:
Introducing Cyata, Securing the Agentic AI Era
CheckMates Go:
CheckMates Fest
Hi Everyone,
We are in process of implementing Mitel MiCollab and the requirement is the WAN interface of the Micollab server should have public ip assigned directly on it. NATting from public ip to private ip does not support.
The MiCollab server is a VM behind the Checkpoint.
How could I achieve this setup with Checkpoint?
Thank you.
@Chris_Atkinson wrote:
Having public address on only the external interface cannot achieve this if the objective is not to use NAT.
Sure you can. It's really easy.
set static-route 1.2.3.4/32 nexthop gateway logical eth1.2345 on
Due to a complicated set of requirements, I have a firewall which works like this in my environment. It's a bit weird to get used to, but pretty solid.
setup a DMZ
As Val has hinted another interface/VLAN from the Check Point addressed with the public subnet and configuration pertinent for a DMZ.
Thank you all for your comments.
Sorry I am new to Checkpoint so needing your help further.
We currently have DMZ with a different subnet.
All public IPs have been forwarded to External on a bond Interface.
So I don't know how another DMZ network/Interface will work as what would be the IP address/subnet for them?. What I am understanding is each Interface should have a different subnet.
Could you please help explaining further?
Thank you very much.
Having public address on only the external interface cannot achieve this if the objective is not to use NAT.
The vendor of Firewall doesn't matter in this context.
Does the existing DMZ have/use public addresses (Y/N)?
Yes - Connect the Mitel here with an IP from that subnet.
No - You will likely have to create a new DMZ involving networking/routing changes & possibly requesting extra or new IP addresses from your ISP.
@Chris_Atkinson wrote:
Having public address on only the external interface cannot achieve this if the objective is not to use NAT.
Sure you can. It's really easy.
set static-route 1.2.3.4/32 nexthop gateway logical eth1.2345 on
Due to a complicated set of requirements, I have a firewall which works like this in my environment. It's a bit weird to get used to, but pretty solid.
Thanks Bob, I was making an assumption from what was said that routing changes were out of scope or not possible due to the size of the existing external subnet.
Hi Bob,
I'm fairly new with checkpoint, i just have few clarifications with this solution. let me know if my assumptions are correct.
4. I am using a layer 2 switch on the DMZ, would this solution still work
5. Im a bit confused on the command will it be something like this based on the diagram
set static-route 1.1.1.2/32 nexthop gateway logical eth.xx (WAN) on
4. Yes, you would need to use a switch. Having a router in the path makes things a bit more complicated, but still possible.
5. You don't have interface names on that diagram, but it would be 'set static-route 1.1.1.2/32 nexthop gateway logical <interface leading to the switch labeled DMZ> on'. You would then need to set the default route on 1.1.1.2 to be the cluster VIP on that interface. You should not use a public IP for that VIP.
btw, this is not a part of a cluster. so it would be something like this ? since I dont have any VIP
'set static-route 1.1.1.2/32 nexthop gateway eth3 (20.20.20.1 interface) on'
set static-route 1.1.1.2/32 nexthop gateway logical eth3 on
And remember, you need to set the endpoint's default route to the firewall's address on eth3. You may also need to give the endpoint a route to the firewall's address telling it to go out a particular interface. The right way to set all that up depends on the OS on the endpoint.
Depending on the size of your public IP network, this could be accomplished by breaking it into smaller subnets.
Create DMZ using one of the small subnets with public IPs and place your Mitel unit in it.
You will have to configure static routes on the ISP router to forward traffic destined to individual subnets to use Check Point's external IP as the gateway.
Thank you @Bob_Zimmerman , @Chris_Atkinson and everyone for tipping the idea.
I now understand how it can be done. It is more complicated that I first thought where it could be just simply a special config in Checkpoint to bridge the traffic directly to Micollab in DMZ.
Will need to involve more parties into the solution.
Much appreciated.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 35 | |
| 21 | |
| 18 | |
| 12 | |
| 9 | |
| 9 | |
| 8 | |
| 8 | |
| 8 | |
| 7 |
Tue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERWed 18 Mar 2026 @ 10:00 AM (CET)
The Cloud Architects Series: An introduction to Check Point Hybrid Mesh in 2026 - In Seven LanguagesThu 19 Mar 2026 @ 11:00 AM (EDT)
Tips and Tricks 2026 #2: AI Security Challenges and SolutionsTue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERWed 18 Mar 2026 @ 10:00 AM (CET)
The Cloud Architects Series: An introduction to Check Point Hybrid Mesh in 2026 - In Seven LanguagesThu 19 Mar 2026 @ 11:00 AM (EDT)
Tips and Tricks 2026 #2: AI Security Challenges and SolutionsTue 24 Mar 2026 @ 04:00 PM (CET)
Maestro Masters EMEA: Hyperscale Firewall Architectures and OptimizationTue 24 Mar 2026 @ 06:00 PM (COT)
San Pedro Sula: Spark Firewall y AI-Powered Security ManagementThu 26 Mar 2026 @ 06:00 PM (COT)
Tegucigalpa: Spark Firewall y AI-Powered Security ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY