- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Background
Bidirectional Forwarding Detection (BFD) is a fast fault detection protocol used to monitor links between network devices like routers and switches. It's purpose is to detect link failures (to quickly facilitate routing around them) rather than device failures which is an important distinction in the case of a clustered pair of Firewalls.
In a ClusterXL environment "Standby" cluster members do not respond to BFD. Hence when considering the configuration of BFD we need to pay attention to the underlying network fabric and parameters such as the ClusterXL dead timeout. Does the network topology require / warrant BFD and what is it really achieving for us?
Timers & Best Practices
Access Policy
Routing related protocols such as BGP, OSPF etc need to be allowed by the security gateway access policy in order for routing adjacencies / neighbors to be able to form successfully. In general this traffic is not covered by implied rules.
Configuration of the necessary rules for common routing protocols are covered by the following knowledge article; similar rules are required to allow BFD traffic as an example (UDP destination ports control: 3784 & echo: 3785) e.g.
|
Source |
Destination |
Service |
Action |
Install On |
|
BFD neighbors |
BFD neighbors |
BFD-Single_hop |
Accept |
Relevant Security Gateways |
Priority Queues
As relevant to BFD should be default in current versions, please see: sk105762: Firewall Priority Queues in R80.x / R81.x
It should be the VIP. Actually I think your case is already described here:
Should Explicit NAT rule with Hide under VIP for BFD service be used in the ClusterXL?
I don't recall having to manipulate NAT relative to BFD in the past, what's the scenario / version that you are trying to deploy - what are you seeing?
In the case of using NoNat rules. We have a top-level NoNat rule for the 10.0.0.0/8 network and all BFD requests fall under it. BGP itself, according to traffic data, ignores this rule and works fine. And according to the documentation, it is not entirely clear whether the BFD in the clusterxl should initially leave the active node under the VIP address or its own address of the active node, but in the latter case, it is not clear how to set up the BFD session.
As Example:
ClusterXL VIP - 10.0.0.1, Node1 - 10.0.0.2, Node2 - 10.0.0.3
BGP node - 10.0.0.4
In the case of NoNat, we have a BGP session between 10.0.0.1 and 10.0.0.4.
If configure BFD, the session 10.0.0.2 and 10.0.0.4 or 10.0.0.3 and 10.0.0.4 appears (depends on which node is the primary one).
But due to the fact that BGP peering is between 10.0.0.1 and 10.0.0.4, BFD is not working correctly.
And it's not entirely clear from the documentation how the BFD should behave initially, whether it's worth making Hide Nat Rule for 10.0.0.2 and 10.0.0.3 under 10.0.0.1 or somehow configuring 4 BFD sessions, although it's unclear how.
The number of BFD sessions needed is based on links not multiplied by cluster members, the cluster is a single logical router.
Therefore, in my case, I have to overlap he NoNat rule
src 10.0.0.0/8 dst 10.0.0.0/8 Srv Any NewSrc Original NewDst Original
with more prioritized Hide Nat Rule like this
src 10.0.0.0/8 dst 10.0.0.4 Srv BFD NewSrc Hide_10.0.0.1 NewDst Original
Is that right?
Has the settings described in sk34180 been changed for your environment?
No. By default perform_cluster_hide_fold is true. Nothing changed.
I was planning to get a simple answer:
1) Yes, bfd should be with VIP
2) No, bfd works without VIP with the private address of the active node.
And then sort it out further or open the case in TAC
It should be the VIP. Actually I think your case is already described here:
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 25 | |
| 11 | |
| 11 | |
| 7 | |
| 7 | |
| 6 | |
| 6 | |
| 6 | |
| 6 | |
| 5 |
Tue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceWed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactThu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY