Solved

how to configure two external interfaces on checkpoint firewall

Posted on 2013-06-12
11
2,926 Views
Last Modified: 2013-06-20
Checkpoint  firewall
We do have checkpoint firewall appliance with 3 Ethernet ports and 2 local subnets (10.0.0.0 and 10.0.1.0) behind it.
Currently we have 1 local interface on the firewall and 1 external. My goal is to configure second external interface in such way that
1.      Traffic from Local subnet 10.0.0.0 to the internet will be routed to fire External port 1 and NAT (hidden behind IP of External port 1) to my ISP
2.      Traffic from Local subnet 10.0.1.0 with be routed to External Port 2 and NAT (hidden behind IP of the External Port 2) and to my ISP
How can it be implemented
0
Comment
Question by:leop1212
  • 6
  • 5
11 Comments
 
LVL 18

Expert Comment

by:deimark
ID: 39243617
To effectively do policy based routing, you will need to use Gaia as the operating system here.

Its the OS that does the routing, not the Check Point appliaction and as Check Point do operate their own OS in the form of Gaia we now have this feature.

Check out the Gaia admin docs that explain PBR.

HTH
0
 

Author Comment

by:leop1212
ID: 39248085
I am not use Gaia,
I am using 75.40 and like to impliment it on 75.40
0
 
LVL 18

Expert Comment

by:deimark
ID: 39248113
WHat is the OS you are using.

SPLAT, Windows, IPSO etc?
0
 

Author Comment

by:leop1212
ID: 39252521
IPSO
0
 
LVL 18

Expert Comment

by:deimark
ID: 39252637
In IPSO 6.2 (and I suspect earlier versions) have the ability to do policy based routing.

Using PBR allows us to base routing decisions on parameters other than the destination address which is the default for normal routing, ie we route towards to the destination immaterial of the source address etc.

PBR allows us to use ACLs to decide which routes we use and we when, normally based on some form of source based parameters, ie address or service needing access to.

Have a look at the CLI and Voyager web guides for more details on the PBR options
0
What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

 

Author Comment

by:leop1212
ID: 39252855
Oopss,
Management is not IPSO,
management is on windows. I use to have Voyger when we had Nokia box. Current box is UTM-1 270. I can only connect via ssh or https: or smartdashboard
0
 
LVL 18

Expert Comment

by:deimark
ID: 39252886
Thats fine, its the OS that needs to do the routing, so all the PBR is configured on IPSO and voyager here.

PBR does not involve the check point application, its an OS level feature.  Check Point needs no changes other than to add new policies to allow/deny the traffic.

the routing is done by IPSO
0
 

Author Comment

by:leop1212
ID: 39261479
sorry mY OS turned out to be SPAT and not IPSO
0
 
LVL 18

Expert Comment

by:deimark
ID: 39261618
Then I am afraid that you cannot do policy based routing, SPLAT does not support it.
0
 

Author Comment

by:leop1212
ID: 39262310
ok Could you provide details on PBR for Gaia? Is Gaia as robust as SPLAT?
if I upgrade to Gaia will my policies worked without any changes? Do I need more CPU/memory to run Gaia compare to SPLATA?
0
 
LVL 18

Accepted Solution

by:
deimark earned 500 total points
ID: 39262542
Check the release notes and system requirements for gaia to make sure your hardware is fine.

For the ability to use your existing policies then its a yes however I would perhaps suggest an upgrade to R76 on Gaia as this is a later and allegedly more stable version.

http://www.checkpoint.com/services/techsupport/hcl/ is the link for the HCL
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now