- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi Guys,
One of our customer is planning to introduce Maestro setup with Cisco ACI for N-S traffic inspection.
The Meastro setup will be connected to the Border leaf with 2 bonds (bond1: External & bond2: Internal). diagram attached.
The external connectivity will be L3 whereas the Internal connectivity will be L2, the customer & the ACI team informed us. Also they informed us that the default gateway for the ACI internal network will be the Core switch which will be placed above the Firewall. I would like to know what will be the best possible way to deploy maestro & how is the suggested connectivity.
Also I would like to understand if my external & internal Network are in different VLAN or same VLAN then can we deploy the Firewall in bridge mode then will there be any issues & what will be dependencies for this?
Without knowing any more about the network topology, it's difficult to provide you a precise recommendation.
When dealing with bridge mode, you need to ensure that a single flow is not inspected by the same gateway/virtual system more than once.
See also for general limitations: https://support.checkpoint.com/results/sk/sk101371
@PhoneBoy but can we connect Firewall in the mentioned mode where my Internal is L2 connectivity & external is L3??
Also do let me know what additional details you require.
Attaching Topology
The topology diagram provides only connectivity with switches and nothing about security zones or proposed traffic flows involving the gateway.
This information would have to be provided, particularly with respect to the L2 "internal" and L3 "external" and how traffic flows between those two.
It is critical to understand this in order to ensure no "double inspection" occurs, which is not supported.
Amit, could you please clarify?
1) How are you going to split Maestro for External/Internal?
Security groups or Virtual Systems?
2) Are you going to use tight ACI integration?
I mean are you going to use one-arm External Maestro security group or VS configuration and redirect traffic to it using ACI Contract + Service Graph (L3Out)?
Or are you going a traditional way (and in this case it is not so relevant you are using ACI, though you still can ingest objects from ACI for identity-based policy)?
Same for Internal.
My personal opinion:
- for External you may use either L3Out integration or a traditional routing
- for Internal I'd suggest one-arm configuration with full integration. In this case you do not need to change customer's topology For him it will look transparent, as he expects from bridge mode. Cisco will take care on redirecting traffic for the inspection to one-arm'ed Maestro.
Hi,
Addressing queries below:
1) How are you going to split Maestro for External/Internal?
Security groups
2) Are you going to use tight ACI integration?
We are using one-arm External Maestro security group Contract + Service Graph (L3Out). As mentioned earlier, Maestro will be connected to Border leaf both Internal Interface & external Interface.
If you are talking about one-arm deployment, I do not see a big reason to care about "bridge mode".
You may have a special Bridge Domain to put your Security Group interface to it. This BD IP will be a default gateway to reply back.
Probably a full network diagram can help better understand your concerns.
I mean a couple of VLAN's (actually EPGs, right?), relevant Bridge Domains. With "fake" IP addresses. And Contracts between them (Service Graphs will be added later).
It will be more simple to draw the flow (EPG1 connects to EPG2, traffic is redirected to Maestro). Or uSeg EPG if you'd like to inspect traffic within a EPG VLAN.
But lets say if my external connectivity is L3 & internal Connectivity is l2 then will that be an issue for my N-S traffic?
If your internal connectivity is L2 and your external connectivity is L3, how do the packets get from internal to external?
Or do they get from internal to external at all?
A diagram showing security zones and all proposed traffic flows between them involving the gateway will answer a LOT of questions.
Hi @PhoneBoy
Attached is the Network diagram for an AZ. We have decided to configure 2 bonds on Checkpoint (1-Ingress & 2-Egress) these will be L3 interface with IP. the Border leaf will send traffic to CP & CP will route it to Core switches. The Maestro setup will be in Routed mode.
So in such deployment will there be any challenges or is this best practise? All suggestions are Welcomed.
In terms of basic Layer 2 connectivity, I don't see any issues.
However, I asked two very precise questions:
The answers to these questions (along with the pertinent security requirements) will impact the ultimate configuration of any gateway (including Maestro).
Without that information, it's difficult to provide additional advice.
Response to your questions:
This will be L3 connectivity each bond intf of fw will have IP address assigned.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
14 | |
12 | |
12 | |
11 | |
11 | |
7 | |
7 | |
6 | |
5 | |
5 |
Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY