- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Ask Check Point Threat Intelligence Anything!
October 28th, 9am ET / 3pm CET
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
10.x.x.x/24 ---> FortiGate --->Internet
current setup with vip configured on fortigate
10.x.x.x/24 --> CheckPoint-->Fortigate ---> Internet.
We want to maintain same configuration on the fortigate ie Nat, vip and VPN with checkpoint doing filtering.
PS checkpoint will not be in transparent mode.
Not sure I understand. Are you adding a second layer with Check Point?
YES additional layer of checkpoint behind fortigate. But fortigate has vip and vpns configured. Is there a way of configuring the checkpoint for just filtering and the vips and vpn works on the fortigate.
Actually, bridge mode would be the most reasonable way to approach this, as it will help you avoid massive network changes. Why don't you want to use it, then?
With that there is the drawback that the Check Point firewall will be blissfully unaware of what ever threath is lurking inside the VPN traffic.
So apart from good sales figures and crossing the "Different vendor firewalls in cascade" tickbox I don't understand the added value here. It does not add real security to the design.
Adding Check Point in any mode will improve security. But I understand your point, it seems too be too complex this way.
Yes complex but customer wants this setup for additional protection.
Then explain to the customer that bridge mode is best here 8) Or suggest to pay for CP Professional Services to make this setup work without issues...
YES bridge mode is the best approach but customer wants this setup instead. And they are ready for any network changes. Can you suggest the best approach for this set.
So you need to add a different default route to your internal network pointing to CP, while CP GW will have Forti as a DG. A networking exercise, starting from the drawing board.
Routing is not a problem but the vips on the fortigate will it work with CP in place without any config changes??.
The internal traffic is cleartext. VPN tunnels are terminated on Forti. The domain has not changed. It is essentially a Forti question, but I don't see a reason for VPNs to fail after an internal routing change
OK noted. what about the vips do we have to do natting on CP ??.
Not sure what relevance the VIPs have on the Check Point configuration except maybe as a default route.
Assuming the networking is set up correctly, it should not be required to perform any NAT on the Check Point device.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
25 | |
13 | |
9 | |
9 | |
7 | |
7 | |
6 | |
6 | |
5 | |
4 |
Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesWed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY