- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello,
I want to perform Access Control and Threat Prevention between the local networks.
Description:
All networks are connected to a Router, which will detour all traffic to the Security Gateway, even when the destination is direct attached. For the Security Gateway, the inbound and outbound interface is the same in all packets but there is no assymetrical routing.
Questions:
Will the Threat Prevention and Firewall Blades work without issues on this scenario/layout?
Will the SG send to the router a ICMP Redirect Message?
Thanks
Lanello
Not a good idea. Use Bridge mode instead or IP forwarding in a normal mode.
Hello
For the Bridge Mode can get a little bit complicated.
The Checkpoint would be at a side instead Man-In-The-Middle (Check the drawing).
It is a ClusterXL with 6 VSX. Two of them are Perimeter Firewalls, but I want to perform IPS between the local networks.
I know I can connect the networks direct to the Checkpoint and get rid of the router, but I still want to have it arround.
Thanks for your help.
Lanello
Hi, as stated before.. not a good idea. 🙂
Its like a firewall-on-a-stick setup, and I would guess that you will need to spend some time to get the routing set up and working. But yeah - sure I can't see that it wont work.
I have had setups where you had a main vrf with several 'child' vrf's, connecting the firewall to the main vrf and providing access between the 'childs' on the SG. This can be comapred to what you are asking.
Regaring the question on 'icmp redirects' vs. 'all networks connected to a router' gives me a confused picture on how you are planning to actually set this up.. is there to be several networks/subnets ? If you have ex. 2 client subnets and a subnet where the SG is to be placed, the packet flow will be pretty regular, just entering and leaving on same.
But all in all. not a good idea.
Your example with the VRF is exaclty the same I want to do.
The routing part is already solved with a forced unconditional next-hop leading the packets to the firewall and the default route for the SG is the Core Router again (that's the plan).
Yes, there is a separated subnet for the comm between the SG and the Router.
If the VRF scenario is working for you, I can see the light at the end of the tunnel.
But you still say it is not a good idea...
Have you inter-VRF traffic that pass through the SG?
Thanks for you comment @Maarten_Sjouw !
I will desist. The common sentence in teh comments of all of you is "This is a bad idead".
Anyways I will test the scenario in a lab and let you know.
Thanks guys!
PS:
Redirecting the traffic is very easy.
A Policy based route overrides the general routing table, setting the "default-nexthop" the firewall.
I have tested this step already without issues.
Lanello
I don't need to inspect traffic between the hosts on the same network.
Only the inter-subnet traffic.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 17 | |
| 17 | |
| 8 | |
| 7 | |
| 7 | |
| 4 | |
| 3 | |
| 3 | |
| 2 | |
| 2 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY