- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
-------
17/2/2020
-------
Add screen capture on the below reply for further troubleshooting.
-------
16/2/2020
-------
HI all,
I just have a Checkpoint as bridge mode and have a scanning over the Trunk link.
Both Fortigate and H3C has a Trunk link up already before. Vlan 10 is tagged with untagged VLAN 1.
All my users are in Vlan 10.
They need to have both CP and FG scanning while visiting the internet.
Then we set up port 3 and 4 as br1 on the Check point.
FortiGate connects to p3 while h3c switch uplink to p4.
Both p3 and p4 are in the Internal zone with anti-spoofing disabled.
CP Firewall policy just has the clean up one with any to any accepted.
From the debug flow on FortiGate, I can not find the traffic to the internet, let says the dst. is "1.1.1.1"
Nevertheless, both 192.168.100.1 and 172.16.10.101 can ping mutually and have the debug log result from Fortigate.
I think this proves the CP policy working well?
Interestingly, both Firewall traffic Logging reveal the traffic is accepted if to the internet.
Only no outcome from the debug log result from Fortigate if the dst. is to internet or "1.1.1.1"
I swear to god that FortiGate original settings are good.
As we use it before and everything just normal.
Please someone helps.
Below is the lab topology after the deployment.
Do you see the traffic forwarded on Check Point through the bridge? Simple "fw monitor" would answer this question
Screen for your referencing:
No output from fw ctl zdebug drop.
And Ping result if to 9.9.9.9:
It is showing Check Point FW is not a problem here. Look outside for some external failure
Uh, I was looking at interface names and did not look at IPs.
You are correct, it seems FW is NAT-ing the connections, which should not happen on the bridge in the first place. Check your NAT policies.
Please have a look at the latest reply.
I have the NAT screen for it.
I even try manually have one to force everything translated as original ...
Well, still the same.
10.20.30.1 - who's this IP belonging to?
That is Checkpoint Br1 ip address before.
I use that for Vlan 1 and mgt ip for UTM update.
Interestingly, 10.20.30.1 is good to passthrough Fortigate over the trunk and access internet
and by the way, do you have _another_bridge_ on Check Point for VLAN10?
I assume NAT is disabled on the Check Point gateway, what other controls are active?
(Refer also sk101371,sk106319)
Is your firewall and URLF/AppC policy consolidated or in separate layers currently?
Regarding the destination, is it always specified as "Any" versus "Internet" in _all_ applicable rules...
Take a quick look at it:
I try to rebuild the Br1 into Port1 and 2, downgrade to R80.10 and replace the H3C to Cisco 2960 now.
Still no luck.
Per Val's comment, please double check the NAT options/settings on the Gateway object itself.
Bro, I check it more than 10 times really.
No box in NAT of the gateway was checked.
can you please post Bridge config from Gaia and also the GW topology tab?
All seems to be in order. Yet, after policy push and FW reboot, do you still have ping NAT-ed on the bridge?
Hi all,
We no longer waste our valued time on it now.
This issue is due to:
1. My test LAN 172.16.10.X/24 just conflicts with the CP built-in SSLVPN subnet. And this causes the default NAT triggered also.
2. DNAT allocation needs to be enabled on CP if you decide to change the CP built-in SSLVPN subnet to others.
Thanks to the TAC finally..... What the ... Great CP we have got. >_>
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
18 | |
10 | |
6 | |
6 | |
6 | |
6 | |
6 | |
4 | |
3 | |
3 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY