how to configure two external interfaces on checkpoint firewall

Checkpoint  firewall
We do have checkpoint firewall appliance with 3 Ethernet ports and 2 local subnets (10.0.0.0 and 10.0.1.0) behind it.
Currently we have 1 local interface on the firewall and 1 external. My goal is to configure second external interface in such way that
1.      Traffic from Local subnet 10.0.0.0 to the internet will be routed to fire External port 1 and NAT (hidden behind IP of External port 1) to my ISP
2.      Traffic from Local subnet 10.0.1.0 with be routed to External Port 2 and NAT (hidden behind IP of the External Port 2) and to my ISP
How can it be implemented
leop1212Asked:
Who is Participating?

Improve company productivity with a Business Account.Sign Up

x
 
deimarkConnect With a Mentor Commented:
Check the release notes and system requirements for gaia to make sure your hardware is fine.

For the ability to use your existing policies then its a yes however I would perhaps suggest an upgrade to R76 on Gaia as this is a later and allegedly more stable version.

http://www.checkpoint.com/services/techsupport/hcl/ is the link for the HCL
0
 
deimarkCommented:
To effectively do policy based routing, you will need to use Gaia as the operating system here.

Its the OS that does the routing, not the Check Point appliaction and as Check Point do operate their own OS in the form of Gaia we now have this feature.

Check out the Gaia admin docs that explain PBR.

HTH
0
 
leop1212Author Commented:
I am not use Gaia,
I am using 75.40 and like to impliment it on 75.40
0
Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

 
deimarkCommented:
WHat is the OS you are using.

SPLAT, Windows, IPSO etc?
0
 
leop1212Author Commented:
IPSO
0
 
deimarkCommented:
In IPSO 6.2 (and I suspect earlier versions) have the ability to do policy based routing.

Using PBR allows us to base routing decisions on parameters other than the destination address which is the default for normal routing, ie we route towards to the destination immaterial of the source address etc.

PBR allows us to use ACLs to decide which routes we use and we when, normally based on some form of source based parameters, ie address or service needing access to.

Have a look at the CLI and Voyager web guides for more details on the PBR options
0
 
leop1212Author Commented:
Oopss,
Management is not IPSO,
management is on windows. I use to have Voyger when we had Nokia box. Current box is UTM-1 270. I can only connect via ssh or https: or smartdashboard
0
 
deimarkCommented:
Thats fine, its the OS that needs to do the routing, so all the PBR is configured on IPSO and voyager here.

PBR does not involve the check point application, its an OS level feature.  Check Point needs no changes other than to add new policies to allow/deny the traffic.

the routing is done by IPSO
0
 
leop1212Author Commented:
sorry mY OS turned out to be SPAT and not IPSO
0
 
deimarkCommented:
Then I am afraid that you cannot do policy based routing, SPLAT does not support it.
0
 
leop1212Author Commented:
ok Could you provide details on PBR for Gaia? Is Gaia as robust as SPLAT?
if I upgrade to Gaia will my policies worked without any changes? Do I need more CPU/memory to run Gaia compare to SPLATA?
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.