- Products
- Learn
- Local User Groups
- Partners
-
More
Join Us for CPX 360
23-24 February 2021
Check Point Harmony
Highest Level of Security for Remote Users
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
Advanced Protection for
Small and Medium Business
Secure Endpoints from
the Sunburst Attack
Important! R80 and R80.10
End Of Support around the corner (May 2021)
-------
17/2/2020
-------
Add screen capture on the below reply for further troubleshooting.
-------
16/2/2020
-------
HI all,
I just have a Checkpoint as bridge mode and have a scanning over the Trunk link.
Both Fortigate and H3C has a Trunk link up already before. Vlan 10 is tagged with untagged VLAN 1.
All my users are in Vlan 10.
They need to have both CP and FG scanning while visiting the internet.
Then we set up port 3 and 4 as br1 on the Check point.
FortiGate connects to p3 while h3c switch uplink to p4.
Both p3 and p4 are in the Internal zone with anti-spoofing disabled.
CP Firewall policy just has the clean up one with any to any accepted.
From the debug flow on FortiGate, I can not find the traffic to the internet, let says the dst. is "1.1.1.1"
Nevertheless, both 192.168.100.1 and 172.16.10.101 can ping mutually and have the debug log result from Fortigate.
I think this proves the CP policy working well?
Interestingly, both Firewall traffic Logging reveal the traffic is accepted if to the internet.
Only no outcome from the debug log result from Fortigate if the dst. is to internet or "1.1.1.1"
I swear to god that FortiGate original settings are good.
As we use it before and everything just normal.
Please someone helps.
Below is the lab topology after the deployment.
Do you see the traffic forwarded on Check Point through the bridge? Simple "fw monitor" would answer this question
Screen for your referencing:
No output from fw ctl zdebug drop.
And Ping result if to 9.9.9.9:
It is showing Check Point FW is not a problem here. Look outside for some external failure
Uh, I was looking at interface names and did not look at IPs.
You are correct, it seems FW is NAT-ing the connections, which should not happen on the bridge in the first place. Check your NAT policies.
Please have a look at the latest reply.
I have the NAT screen for it.
I even try manually have one to force everything translated as original ...
Well, still the same.
10.20.30.1 - who's this IP belonging to?
That is Checkpoint Br1 ip address before.
I use that for Vlan 1 and mgt ip for UTM update.
Interestingly, 10.20.30.1 is good to passthrough Fortigate over the trunk and access internet
and by the way, do you have _another_bridge_ on Check Point for VLAN10?
I assume NAT is disabled on the Check Point gateway, what other controls are active?
(Refer also sk101371,sk106319)
Is your firewall and URLF/AppC policy consolidated or in separate layers currently?
Regarding the destination, is it always specified as "Any" versus "Internet" in _all_ applicable rules...
Take a quick look at it:
I try to rebuild the Br1 into Port1 and 2, downgrade to R80.10 and replace the H3C to Cisco 2960 now.
Still no luck.
Per Val's comment, please double check the NAT options/settings on the Gateway object itself.
Bro, I check it more than 10 times really.
No box in NAT of the gateway was checked.
can you please post Bridge config from Gaia and also the GW topology tab?
All seems to be in order. Yet, after policy push and FW reboot, do you still have ping NAT-ed on the bridge?
Hi all,
We no longer waste our valued time on it now.
This issue is due to:
1. My test LAN 172.16.10.X/24 just conflicts with the CP built-in SSLVPN subnet. And this causes the default NAT triggered also.
2. DNAT allocation needs to be enabled on CP if you decide to change the CP built-in SSLVPN subnet to others.
Thanks to the TAC finally..... What the ... Great CP we have got. >_>
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY