- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello all,
There is a regular L3 HA cluster (having internal, external and sync interfaces). It is not VSX.
There is a need to use this same cluster to do some L2 bridging. Firewall will not do any routing for L2 IP address scopes (that may change at some point, but it is not the issue here).
Lab topology for testing the scenario is displayed on drawing. When all switch ports are configured as access mode for vlan 100, two PCs can ping each other, bridging works OK. Policy allows any service from 10.10.100.0/24 to 10.10.100.0/24.
When I change switchports connecting firewalls to trunk (tagged vlans), firewall is not passing traffic anymore.
When PC 101 is trying to ping PC 102 traffic arrive on interface eth5, it is clear that traffic is tagged by vlan id 100, but nothing is seen on eth6:
Firewalls are configured to use "Check Point ClusterXL for Bridge Active/Standby" to avoid loop. The above test was also done with FW2 shut down, to make sure all traffic is passing only via FW1. Gaia configuration:
gw_dc1> show configuration bridging
add bridging group 1000
add bridging group 1000 interface eth5
add bridging group 1000 interface eth6
gw_dc1> show configuration interface
set interface br1000 state on
set interface eth0 state on
set interface eth0 auto-negotiation on
set interface eth0 ipv4-address 192.168.2.236 mask-length 24
set interface eth1 link-speed 1000M/full
set interface eth1 state on
set interface eth1 ipv4-address 10.200.200.2 mask-length 24
set interface eth2 link-speed 1000M/full
set interface eth2 state on
set interface eth2 ipv4-address 10.255.254.1 mask-length 30
set interface eth3 state off
set interface eth4 state off
set interface eth5 state on
set interface eth6 state on
set interface lo state on
set interface lo ipv4-address 127.0.0.1 mask-length 8
Bridge interface is not part of topology in Smart Console. Tested this with R80.40 and also R81 JHF take 65. Tried it with single firewall (not part of cluster) and ClusterXL described above.
I am out of ideas. According to documentation, this is supported scenario but it is not working for some reason 😞
If you configure the switch ports as VLAN trunk, the Check Point Bridge interface should not interfere with the VLANs.
To configure a Bridge interface with VLAN trunk, create the Bridge interface with two physical (non-VLAN) interfaces as its subordinate interfaces
Thank you
Is the gateway seeing the same traffic twice?
Double inspection is...not supported.
No, not really. Also, when tagging on switches is off, everything works as expected.
Did you contact TAC yet ?
I did not contact TAC, this is lab environment with eval licenses and no support. When we do it on production boxes, it will have to work from day 1, so I am trying to verify the configuration and steps upfront.
Thank you.
As long as this is for a customer with valid support you only need his UC Account# - this is a common scenario...
Hi @Srdjan_B - did you manage to get this scenario working in the end. I'm building out a similiar solution now.
Hello @Ruan_Kotze . Customer decided to accept alternative design, without firewall in bridge mode, so further testing was abandoned.
Hi Ruan_Kotze,
Try the followings:
When the traffic does not pass the bridge: have you tried to switch off the acceleration (#fwaccel off)?
According to this article: https://support.checkpoint.com/results/sk/sk105899
Set the relevant kernel parameters (all four)
Let's see what we get.
Akos
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 27 | |
| 20 | |
| 16 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 3 | |
| 3 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY