?
Solved

Sub Int on Checkpoint

Posted on 2010-08-17
5
Medium Priority
?
2,019 Views
Last Modified: 2013-11-16
Hi,

Is it possible to create sub interfaces connections on Checkpoint R65, I will also be required to create vrrp for redunacy.

I want to be able create seprate dmz with servers connected to 1 switch and limit the amount port used on the checkpoint
0
Comment
Question by:skywalker101
  • 3
  • 2
5 Comments
 
LVL 14

Accepted Solution

by:
grimkin earned 2000 total points
ID: 33453189
Hi,

Yes, that is all possible, you can do this through the sysconfig command line if using Splat or through the Voyager interface if using Nokias.

After configuring your sub interfaces, you do a "Get topology with interfaces" on the topology tab of the gateway in question.

HTH
0
 

Author Comment

by:skywalker101
ID: 33453203
IS there any downside in this i.e. on the lack security as all devices connected via the same switch even though will be on differnet vlans ?
0
 
LVL 14

Expert Comment

by:grimkin
ID: 33453246
No, as long as they're on different VLANs then you will be fine, HTH
0
 

Author Comment

by:skywalker101
ID: 33455737
Can this type of configuration be also used for VRRP for failover ?
0
 
LVL 14

Expert Comment

by:grimkin
ID: 33456793
Yes, absolutely.
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
This video shows how to quickly and easily deploy an email signature for all users in Office 365 and prevent it from being added to replies and forwards. (the resulting signature is applied on the server level in Exchange Online) The email signat…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question