Solved

how to configure two external interfaces on checkpoint firewall

Posted on 2013-06-12
11
3,147 Views
Last Modified: 2013-06-20
Checkpoint  firewall
We do have checkpoint firewall appliance with 3 Ethernet ports and 2 local subnets (10.0.0.0 and 10.0.1.0) behind it.
Currently we have 1 local interface on the firewall and 1 external. My goal is to configure second external interface in such way that
1.      Traffic from Local subnet 10.0.0.0 to the internet will be routed to fire External port 1 and NAT (hidden behind IP of External port 1) to my ISP
2.      Traffic from Local subnet 10.0.1.0 with be routed to External Port 2 and NAT (hidden behind IP of the External Port 2) and to my ISP
How can it be implemented
0
Comment
Question by:leop1212
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 6
  • 5
11 Comments
 
LVL 18

Expert Comment

by:deimark
ID: 39243617
To effectively do policy based routing, you will need to use Gaia as the operating system here.

Its the OS that does the routing, not the Check Point appliaction and as Check Point do operate their own OS in the form of Gaia we now have this feature.

Check out the Gaia admin docs that explain PBR.

HTH
0
 

Author Comment

by:leop1212
ID: 39248085
I am not use Gaia,
I am using 75.40 and like to impliment it on 75.40
0
 
LVL 18

Expert Comment

by:deimark
ID: 39248113
WHat is the OS you are using.

SPLAT, Windows, IPSO etc?
0
Create the perfect environment for any meeting

You might have a modern environment with all sorts of high-tech equipment, but what makes it worthwhile is how you seamlessly bring together the presentation with audio, video and lighting. The ATEN Control System provides integrated control and system automation.

 

Author Comment

by:leop1212
ID: 39252521
IPSO
0
 
LVL 18

Expert Comment

by:deimark
ID: 39252637
In IPSO 6.2 (and I suspect earlier versions) have the ability to do policy based routing.

Using PBR allows us to base routing decisions on parameters other than the destination address which is the default for normal routing, ie we route towards to the destination immaterial of the source address etc.

PBR allows us to use ACLs to decide which routes we use and we when, normally based on some form of source based parameters, ie address or service needing access to.

Have a look at the CLI and Voyager web guides for more details on the PBR options
0
 

Author Comment

by:leop1212
ID: 39252855
Oopss,
Management is not IPSO,
management is on windows. I use to have Voyger when we had Nokia box. Current box is UTM-1 270. I can only connect via ssh or https: or smartdashboard
0
 
LVL 18

Expert Comment

by:deimark
ID: 39252886
Thats fine, its the OS that needs to do the routing, so all the PBR is configured on IPSO and voyager here.

PBR does not involve the check point application, its an OS level feature.  Check Point needs no changes other than to add new policies to allow/deny the traffic.

the routing is done by IPSO
0
 

Author Comment

by:leop1212
ID: 39261479
sorry mY OS turned out to be SPAT and not IPSO
0
 
LVL 18

Expert Comment

by:deimark
ID: 39261618
Then I am afraid that you cannot do policy based routing, SPLAT does not support it.
0
 

Author Comment

by:leop1212
ID: 39262310
ok Could you provide details on PBR for Gaia? Is Gaia as robust as SPLAT?
if I upgrade to Gaia will my policies worked without any changes? Do I need more CPU/memory to run Gaia compare to SPLATA?
0
 
LVL 18

Accepted Solution

by:
deimark earned 500 total points
ID: 39262542
Check the release notes and system requirements for gaia to make sure your hardware is fine.

For the ability to use your existing policies then its a yes however I would perhaps suggest an upgrade to R76 on Gaia as this is a later and allegedly more stable version.

http://www.checkpoint.com/services/techsupport/hcl/ is the link for the HCL
0

Featured Post

DevOps Toolchain Recommendations

Read this Gartner Research Note and discover how your IT organization can automate and optimize DevOps processes using a toolchain architecture.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Network access 24 58
setting up a Ubiquiti access point 3 14
FILE ACCESS/PERMISSION PROBLEM 6 26
Basic nexus configuraton 11 19
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
This article is a collection of issues that people face from time to time and possible solutions to those issues. I hope you enjoy reading it.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question