- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
I was testing TLS handshake inspection on custom ports and noticed an interesting behavior. Here's a summary of what I did and found:
Initially, the inspection didn't seem to function. This led me to suspect that the firewall might not be inspecting traffic directly exchanged between hosts on the same subnet. So I implemented forced routing on each host to route their inter-host traffic through the GW and it started working as expected.
So I have some questions:
Any insights or recommendations on this matter would be greatly appreciated.
Thank you!
The packets need to be sent through the firewall in some manner for it to perform inspection. Typically it is a layer 3 routing hop where the hosts are on different subnets. The firewall can potentially be positioned between hosts as a layer 2 hop, in bridge mode, if the hosts are on the same subnet.
Put it this way...there is literally nothing for CP firewall to inspect (or any fw for that matter) if hosts are on the same subnet. As @Lloyd_Braun said, if its layer 2, then its more of a switch, not exactly a typical firewall. For firewall to do proper inspection, it would need to function on layer 3. As far as your question about the inspection if traffic does not pass through it, well, there is nothing to isnpect in that instance. Btw, its important to note it also depends how you configure threat prevention blades, because if its in monitor mode, those protections wont really be active in such instance.
Best,
Andy
There are other ways to force the firewall into the path between two endpoints on the same network block. Private VLANs with proxy ARP could let you insert a firewall in the path with no modifications to the endpoints. Changing the endpoints' net masks to 32-bit and routing everything through the firewall explicitly could also work, but would require changes on the endpoints.
But yes, the point is the firewall can only inspect traffic which goes in one of its interfaces (if all you want is detection, this could be done with a hub or span port). The firewall can only drop traffic which goes in one of its interfaces and which goes out one of its interfaces (they can be the same interface).
The packets need to be sent through the firewall in some manner for it to perform inspection. Typically it is a layer 3 routing hop where the hosts are on different subnets. The firewall can potentially be positioned between hosts as a layer 2 hop, in bridge mode, if the hosts are on the same subnet.
There are other ways to force the firewall into the path between two endpoints on the same network block. Private VLANs with proxy ARP could let you insert a firewall in the path with no modifications to the endpoints. Changing the endpoints' net masks to 32-bit and routing everything through the firewall explicitly could also work, but would require changes on the endpoints.
But yes, the point is the firewall can only inspect traffic which goes in one of its interfaces (if all you want is detection, this could be done with a hub or span port). The firewall can only drop traffic which goes in one of its interfaces and which goes out one of its interfaces (they can be the same interface).
Put it this way...there is literally nothing for CP firewall to inspect (or any fw for that matter) if hosts are on the same subnet. As @Lloyd_Braun said, if its layer 2, then its more of a switch, not exactly a typical firewall. For firewall to do proper inspection, it would need to function on layer 3. As far as your question about the inspection if traffic does not pass through it, well, there is nothing to isnpect in that instance. Btw, its important to note it also depends how you configure threat prevention blades, because if its in monitor mode, those protections wont really be active in such instance.
Best,
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 18 | |
| 12 | |
| 9 | |
| 8 | |
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 2 | |
| 2 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY