- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi Checkmates,
My goal is:
1. ClusterXL gateways connected to ISP routers using private addresses;
2. Public network advertised using BGP;
My doubts are:
1. Static route to public network (needed to advertise on BGP) should point to blackhole, loopback, other?
2. Can I NAT both gateways traffic to internet (updates)?
3. Can I terminate IPsec and SSL VPNs on gateways without any problem?
Appreciate all the help you can provide.
Cheers
If the VIP is a public IP it should work otherwise there is another NAT layer required.
If you assigned the external interface address from the BGP ranges you would then be trying to not fold traffic to the provided "private" VIP.
Some of this could be solved with a router external to the firewalls or perhaps with discussion with the ISP rather than trying to "bend" things.
You don't necessarily need a route for the public network at all on your gateway.
If you want other addresses accessible via those public IPs, you will need NAT rules of some sort.
For IPsec VPN, you'll need to configure the public static address in Link Selection to terminate VPNs.
SSL VPN should also work though I recall there might be a specific setting necessary to make this work as well.
Thank you for your post.
I think the static route is mandatory to advertise the network in BGP.
I'm currently migrating internet connection from ISP A using connected public network to ISP B with this setup. Hide NAT is working fine and both gateways are able to reach internet (I didn't had to configure any NAT for this!?)
The only issue I'm currently facing is the remote access VPN. I've made the adjustments in Link Selection but the clients, using either web portal or mobile access clients, are unable to connect. In the logs I can see that they connect to the new IP but after that the inexplicably try to connect to old public IP (somehow the gateway is "telling" them to connect to oldIP address).
Meanwhile I'm working with TAC.
Yes, you are correct.
BGP needs a route in the RIB (Routing Information Base) to select it as a valid BGP route to advertise.
This route needs to have the correct subnet mask as well.
Hence you may have to add a null or loopback route with the correct mask and network.
Then I usually set new routes with smaller subnets within that advertised network to the correct destinations.
Routing-wise, routes with a more exact match will be used over a larger network.
Therefore you can have both the big networks, and the smaller at the same time, without the bigger one used for BGP disturbing anything.
Antonio,
for the remote access problem have a look at
Remote Access clients can connect to VPN Gateway only once
and
Configuring VPN Link Selection for Remote Access client
You have to set the external public IP for the remote access clients. If not, they get the internal IP from your private link with the ISP router in the first connection and then they can't connect again because they try to reach the private IP.
I'm running a similar configuration with no public IPs on the gateway. I f you want use local running services on the gateway, like MOB or MTA or VPN you have to do NAT on your ISP router (forwarding public IP to local private IP on your gateway) or you have to assign a "fake" interface with one of your public IPs.
regards
Wolfgang
Wolfgang,
In option 2 do you mean using a DMZ to terminate the VPN? Does that mean I will need to allocate a /29 network or can I use sk32073 ?
regards
Antonio
Sorry to revive an old thread but I have a similar setup to OP and I'm confused.
My cluster members are 172.17.0.2 and 172.17.0.3. And their VIP is 100.64.76.125 - ie: all private.
I BGP peer with 100.64.76.124 and advertise 81.189.139.96/27 as my publically reachable BGP range. (Since it's 2 years later and I'm on 81.10 I'm using NAT pool to do this).
How do I then get my cluster members external internet access (for instance, to facilitate CP updates) to NAT their traffic behind 81.189.139.97 (the first ip in the public /27)?
OP says this just worked for him but I'm confused how.
I get the part about setting a static IP address for VPN Link Selection.
If the VIP is a public IP it should work otherwise there is another NAT layer required.
If you assigned the external interface address from the BGP ranges you would then be trying to not fold traffic to the provided "private" VIP.
Some of this could be solved with a router external to the firewalls or perhaps with discussion with the ISP rather than trying to "bend" things.
I did exactly this. I split my first /27 into /29's. Took the first of 4 /29's and split it into /31s and had the ISP use that for direct peering. I then advertised the remaining 3 /29s with BGP.
Thank you
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
12 | |
6 | |
6 | |
5 | |
5 | |
4 | |
4 | |
3 | |
3 |
Wed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY