- Products
- Learn
- Local User Groups
- Partners
-
More
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
IDC Spotlight -
Uplevel The SOC
Important! R80 and R80.10
End Of Support around the corner (May 2021)
In some occations you might have to run MTA on a Check Point gateway in bridge mode.
You must take care about a proper network design otherwise packet processing for traffic destined for MTA will fail.
This is the setup:
The important and mandatory thing is that traffic to and from the MTA must never be seen on any bridge interface - otherwise it will implicitly be blocked by the firewall component because the same network packet must not be seen twice on different interfaces.
So the requirement is to run all MTA traffic via dedicated interfaces (non-bridge interfaces).
That requires proper traffic routing also because you need to make sure that emails are received and send via the dedicated MTA interfaces.
I think you shouldn't run into this issue if you apply this SK (but maybe I'm wrong):
When configuring two interfaces in Bridge Mode, traffic is dropped due to "local interface spoofing"
Hi Dameon,
above configuration is from a PoC setup I did in the past. I don't remember everthing we tried to not make the bridge drop traffic (we started without dedicated interfaces for MTA) but we did not succeed. The final conclusion was that you cannot disable the "drop a packet that was seen twice on an interface". Maybe something changed in newer releases but I did not verify.
Regards Thomas
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY