- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
need to announce the x.x.x.x/x network from firewall to the different AS.
Do I need to have x.x.x.x/x in the firewall's routing table.
Hi,
You will, as @PhoneBoy say, have the route as either a static or from another routing proto like ospf.
If you want to test something, lets say before things come online or even for some production enviroments, you can add a Null0 route, also known as a blackhole route.
You just add the route as usual, choosing blackhole as gateway - then it will be available for redist in BGP.
So if you want to redist to another AS, depending on your design of course, you could do a blackhole static to (example) 192.168.22.0/24 ..and then that can be redistributed even if the link providing that interface is down - or some other routing protocoll brings it down. .. Note that looking at metrics and priorites etc etc.. Best to have a wider blackhole route than using the exact same as the one you want to get over - a blackhole pretty much just drop the traffic.
If you have eBGP to your ISP and you have gotten a /20 prefix with public ip addresses to use. You would put up a blackhole route on your end for that /20 prefix and use it for redist - then the more specific routes in your IGP would take precedence over the wide blackhole. Thus dropping all traffic that is not explicit routed in your network to blackhole. So if you get an interface or a static route with /24 within the same prefix it will take precedence and route it correctly.. but the redistributed prefix is still the /20
Up through R80.40, adding a blackhole route for the prefix you want to advertise was the preferred way to make it exist in the routing table. Can look a bit confusing to someone else but it got the job done. Starting in R81 Check Point has introduced the concept of "NAT Pools" which is a much more elegant way to accomplish this; here is an excerpt from my Gaia 3.10 Immersion class mentioning this new feature:
hello timothy,
any impact on the network added to Nat Pools ?
Let's say i wanna redistribute 10.0.0.0/10 to a BGP Peer but i have a lot of smaller networks with different next-hop, can i safely add 10.0.0.0/10 to nat Pools to include them all and redistrute it? or it is better to work with Route aggregation?
thank you
thanks
Hello Timothy,
i tried nat pools and i confirm that it works, i can redistribute to bgp peers. (i tried with a host inside a network)
But something ugly happens in routing tables:
Let's say i wanna enlarge /32 to /25 network, it is safe?
Why are you using a NAT Pool that overlaps with an existing route in this way, what is the use case?
If you already have a route for the /24 why would you need a NAT pool the same mask length...
Hello Chris,
The use case is to redistribute a network not in routing table.
This happens to me in a lot of customer: usually they wanna redistribute one larger network which includes lot of smaller net with different next hop.
please take a look to my example below about 10.0.0.0/10 network.
In other use case i need every time to add a static route to make it elegible for redistribution
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 19 | |
| 17 | |
| 13 | |
| 8 | |
| 7 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY