Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
VannessChen
Explorer
Jump to solution

Regarding gateway handling of asymmetric routing

Hi, Check Point Experts

I have a request and would like to seek your help and opinions.

Both the Client and Server are on directly connected networks of the Gateway. When the Client accesses an internal Server service via the Load Balancer (F5)'s virtual server IP, and without configuring S-NAT on F5 or PBR on the Gateway, how can we make the reply packet (blue line) return to the F5?

A simulated architecture diagram is shown below.

 

Image_2025-06-03_11-42-33.png

update:

After discussions between the CP team and the customer, the customer’s goal is to ensure that reply packets exit through the same interface the request packets entered from.

I’ve updated the interface port numbers in the network diagram:

  • the request packet enters the Gateway via eth5 and is then forwarded to the Server.
  • When the Gateway receives the reply packet from the Server, it should preferably be sent out via eth5 as well.

Is there a configuration method that can achieve this behavior?

0 Kudos
1 Solution

Accepted Solutions
PhoneBoy
Admin
Admin

As for the fact Fortinet handles this "out of the box," the question I have is: at what security cost?
Given the number of critical vulnerabilities known to be exploited in their products, I personally think it's a fair question.

ElasticXL (in R82) might actually handle this with the CCL (when the other gateway receives traffic and it's not the primary, it's forwarded to the primary).
Otherwise, what you're asking for is likely an RFE and the solution in the meantime is, in fact, using SNAT.

View solution in original post

19 Replies
the_rock
Legend
Legend

I always found issues like that to be related to incorrectly set topology.

Andy

0 Kudos
VannessChen
Explorer

Hi Andy
Thank you for your response.

This traffic flow works under the same conditions on FortiGate. Since the customer intends to replace FortiGate with Check Point, they are asking whether we can achieve the same behavior.

I’ve reviewed a number of documents but haven’t found any discussion specifically addressing this scenario.

0 Kudos
the_rock
Legend
Legend

But keep in mind, with Fortigates, there is no setting like topology in CP smart console, even if you use forti manager to manage them, regardless if its onprem or cloud. In my personal experience, as long as routes and topology are right, this will work fine. 

Relevant discussion:

https://community.checkpoint.com/t5/Security-Gateways/Asymmetric-routing/td-p/166680

Andy

Andy

0 Kudos
Chris_Atkinson
Employee Employee
Employee

You may want to share the configuration options / choices used with the Fortigate in that case?

CCSM R77/R80/ELITE
0 Kudos
VannessChen
Explorer

Hi Chris
According to the customer, FortiGate does not require any additional configuration to achieve this behavior. We are currently analyzing the FortiGate configuration provided by the customer to verify this.

0 Kudos
the_rock
Legend
Legend

Personally, Im not aware of any additional control on CP either to achieve that behavior. Keep in mind that on Fortigate, you can enable asymetric routing globally, so maybe that have that on?

Andy

0 Kudos
Chris_Atkinson
Employee Employee
Employee

I think there is some confusion on the use of terminology or the topology is different / involves VRFs?

If the F5 or something else doesn't alter the src (or other parameters) of the request of course the return from the server will follow the normal routing table direct towards the client subnet.

CCSM R77/R80/ELITE
0 Kudos
VannessChen
Explorer

Hi Chris

It appears that FortiGate prioritizes routing reply packets based on the session table, rather than strictly following the routing table. I believe this is the behavior the customer is aiming for, which is why they want to confirm whether Check Point can achieve the same functionality.

0 Kudos
_Val_
Admin
Admin

I am sorry, what is the exact challenge here? If routing is configured properly, it should work out of the box, shouldn't it? What do I miss?

0 Kudos
VannessChen
Explorer

Hi Val

Based on the network diagram I provided, the customer wants to achieve symmetrical routing (same path for request and reply) without configuring S-NAT on the F5 and without setting PBR on the Gateway.

Can Check Point route reply packets based on the session table, rather than strictly relying on the routing table, to achieve this behavior?

0 Kudos
the_rock
Legend
Legend

I dont see why not...thats how whole concept of stateful inspection is designed to work.

Andy

0 Kudos
Chris_Atkinson
Employee Employee
Employee

Not exactly.

I suspect if it's possible at all it would be a secureXL kernel parameter, might be a topic for TAC / RFE.

CCSM R77/R80/ELITE
0 Kudos
VannessChen
Explorer

Hi Andy:

Since the source IP remains unchanged throughout the entire request path from the Client, when the Server sends the reply packet back to the Gateway, the Gateway routes it directly to the Client based on the routing table.

If the packet is not returned to the F5, the F5 will drop the entire connection because it does not receive the ACK packet.

You can refer to the tcpdump I captured in the lab for more details.

 

Image_2025-06-02_15-11-09.png

0 Kudos
Chris_Atkinson
Employee Employee
Employee

The problem is clear.

If it was me I would prefer not to design the network based on a particular vendor implementation to avoid lock in.

CCSM R77/R80/ELITE
0 Kudos
PhoneBoy
Admin
Admin

As for the fact Fortinet handles this "out of the box," the question I have is: at what security cost?
Given the number of critical vulnerabilities known to be exploited in their products, I personally think it's a fair question.

ElasticXL (in R82) might actually handle this with the CCL (when the other gateway receives traffic and it's not the primary, it's forwarded to the primary).
Otherwise, what you're asking for is likely an RFE and the solution in the meantime is, in fact, using SNAT.

the_rock
Legend
Legend

100% fair.

0 Kudos
VannessChen
Explorer

Hi PhoneBoy

Thank you for the response.
We'll continue discussing the feasibility of this issue with the Check Point team today, and we hope for a good outcome.
Cheers!

0 Kudos
_Val_
Admin
Admin

Ooookay, I see it now.

This is a weird topology. Why do you need to FW traffic to F5 twice, on both server and client side? It would only be reasonable to set F5 and the servers in the same segment.

0 Kudos
VannessChen
Explorer

Hi Val 

In the customer's architecture, if the Client wants to access the Server's service, it must do so via the F5's virtual server IP (used for load balancing).

There’s no issue when the Client is located on the outside of the F5, but as shown in the architecture diagram, if the Client is on the inside, it cannot access the service properly.

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events