- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello 'mates,
As the subject asks, I would like to deploy a pair of Sec Gateways with IPS, ASPam, AV, TE and TX but the interfaces bridged and directly connected to another firewall and switch, inline to all traffic coming a high security network.
Will the Sec Gateway device be able to block any traffic deemed to be high risk based on the blades and TX or will it be monitor only?
Hello Gateways support this deployments
| Blade | Supported in Bridge Gateway mode? | Supported in Bridge VSX mode? |
| Firewall | Yes | Yes |
| IPS | Yes | Yes |
| URL Filtering | Yes | Yes |
| Data Loss Prevention | Yes | No |
| Anti-Bot | Yes | Yes |
| Anti-Virus | Yes | Yes |
| Application Control | Yes | Yes |
| HTTPS Inspection | Yes (1) | No |
| Identity Awareness | Yes | No |
| Threat Emulation - ThreatCloud emulation | Yes | Yes in Active/Active Bridge ModeNo in Active/Standby Bridge Mode |
| Threat Emulation - Local emulation | Yes | No in all Bridge Modes |
| Threat Emulation - Remote emulation | Yes | Yes in Active/Active Bridge ModeNo in Active/Standby Bridge Mode |
| UserCheck | Yes | No |
| QoS | Yes (see sk89581) | No (see sk79700) |
| HTTP / HTTPS proxy | Yes | No |
| SMTP / HTTP / FTP / POP3 Security Servers | Yes | No |
| Client Authentication | Yes | No |
| User Authentication | Yes | No |
Sandblast Inline Mode supports this configurations
I believe you'll be able to use a subset of features to block threats, but the most important limitations of the bridge mode are the absence of support for HTTPS inspection and Identity Awareness.
Hello Gateways support this deployments
| Blade | Supported in Bridge Gateway mode? | Supported in Bridge VSX mode? |
| Firewall | Yes | Yes |
| IPS | Yes | Yes |
| URL Filtering | Yes | Yes |
| Data Loss Prevention | Yes | No |
| Anti-Bot | Yes | Yes |
| Anti-Virus | Yes | Yes |
| Application Control | Yes | Yes |
| HTTPS Inspection | Yes (1) | No |
| Identity Awareness | Yes | No |
| Threat Emulation - ThreatCloud emulation | Yes | Yes in Active/Active Bridge ModeNo in Active/Standby Bridge Mode |
| Threat Emulation - Local emulation | Yes | No in all Bridge Modes |
| Threat Emulation - Remote emulation | Yes | Yes in Active/Active Bridge ModeNo in Active/Standby Bridge Mode |
| UserCheck | Yes | No |
| QoS | Yes (see sk89581) | No (see sk79700) |
| HTTP / HTTPS proxy | Yes | No |
| SMTP / HTTP / FTP / POP3 Security Servers | Yes | No |
| Client Authentication | Yes | No |
| User Authentication | Yes | No |
Sandblast Inline Mode supports this configurations
Much thanks Pablo Barriga and https://community.checkpoint.com/people/highe19f56cc9-7e21-4ec2-8189-286599ead4d8
As a reference, the quoted excerpt is sk101371
Pablo's answer makes sense if the bridge mode is non-transparent, i.e. you'll have to assign the IP to the bridge in order to utilize HTTPS inspection, IA, DLP, and other functionality relying on it.
As you've mentioned "transparent" in the header of your question, I've supplied the limitations associated with it.
Cheers,
Vladimir
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY