- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi there,
I’m trying to fix in my lab best configuration for MDS R81.10 HA that have strict security policy for interface access.
Architecture is like this:
Customer security policy don’t want that 192.168.1.0/24 can be reached for administration traffic, SmartConsole.
Routing is configured with default gateway pointing to 192.168.1.1 on bond1 interface and with a static route to management subnet through the eth0.
If I connect to 10.0.0.1 with SmartConsole I can access MDS environment but if I try to connect to active server of CMA my pc start a new session pointing to CMD IP (ex. 192.168.1.2) and this can’t be valid for security policy.
My question is, there is a way to access CMA with SmartConsole through the eth0 and not through the bond1? Otherwise I have asymmetric routing issue.
Regards
M
If you connect to 10.0.0.1/<DomainName> (or connect to the MDS and pick the domain when it asks you which domain you want to connect to), it should connect SmartConsole to that CMA.
Hi Bob,
yes I know, but the my client start a new session to the IP 191.168.1.x ...and that network can't be reached from management network (where I have SmartConsole).
There's a way to access only from this inerface?
It is not supported to have more than 1 leading interface.
You can deploy new Windows jumpserver (with installed SmartConsole) which will be inside 192.168.1.0/24. Second interface on this new Windows jumpserver can be within 10.0.0.0/24
Thanks all,
documentation says that you need at least one leading interface. In my lab, infact, I created 2 different leading interface.
The bond1 interface (that have the VIP of the Domain) need to be accessed only by gateway
The eth0 intercase need to be the only one used from SmartConsole
There's a way to permit this configuration?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 19 | |
| 16 | |
| 7 | |
| 5 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 4 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY