Open Frames Download Complete PDF Send Feedback Print This Page

Previous

Next

Bridge Mode

In This Section:

Introduction to Bridge Mode

Configuring Bridge Interfaces

Configuring Bridge Mode for Gateways

Routing and Bridges

Configuring Link State Propagation

Managing Ethernet Protocols

VLANs

Configuring a DLP Gateway in Bridge Mode

Virtual System in Bridge Mode

Introduction to Bridge Mode

Bridge Interfaces

Bridge interfaces connect two different interfaces (bridge ports). Bridging two interfaces causes every Ethernet frame that is received on one bridge port to be transmitted to the other port. Thus, the two bridge ports participate in the same Broadcast domain (which is different from router ports behavior).

Only two interfaces can be connected by a single Bridge interface. These two interfaces can then be thought of as a two-ports switch. Each port can be a physical, VLAN, or bond device.

Bridge interfaces can be configured on Check Point Security Gateway, and can be used for different deployments. The Firewall inspects every Ethernet frame that passes through the bridge.

Supported Software Blades: Gateway and Virtual Systems

These Software Blades support bridge mode (unless stated they do not) for single Security Gateway deployment, cluster with one switch in Active/Active and Active/Standby deployment, and cluster with four switches.

Supported Blade

Supports Gateways in Bridge Mode

Supports Virtual Systems in Bridge Mode

Firewall

Yes

Yes

IPS

Yes

Yes

URL Filtering

Yes

Yes

DLP

Yes

No

Anti-Bot and Anti-Virus

Yes

Yes

Application Control

Yes

Yes

HTTPS Inspection

Yes

No

Identity Awareness

Yes

No

Threat Emulation

Yes

Yes

QoS

Yes

No

Client Authentication

No

No

User Authentication

No

No

Supported Software Blades: Management

Bridge-mode for a Security Management Server is supported only for Standalone configurations, and it supports all management Software Blades.

Unsupported for Bridge Mode

These features, Software Blades and deployments are not supported in Bridge Mode:

  • Mobile Access Software Blade
  • IPsec VPN Software Blade
  • Full High Availability deployment
  • NAT on Gateways
  • Access to Portals from bridged networks, if the bridge does not have an assigned IP address
  • Anti-Virus Traditional Mode
  • Identity Awareness authentication other than AD Query (AD Query is the only supported authentication)

Supported Operating Systems

These operating systems support Bridge Mode configurations:

For more about configuring Bridge Mode for an IPSO Security Gateway, see How To Setup a Bridge Mode Firewall on an IP Appliance with IPSO.

Configuring Bridge Interfaces

Using the Gaia WebUI

To configure a bridge interface with the WebUI:

  1. In the WebUI navigation tree, select Network Interfaces.

    gaia webui 01

  2. Click Add > Bridge.

    The Add Bridge window opens.

    gaia bridge 2

  3. On the Bridge tab, enter or select a Bridge Group ID (unique integer between 0 and 1024).
  4. Select the interfaces from the Available Interfaces list and then click Add.
  5. Click OK.

Using the CLI

Bridge interfaces are known as Bridging Groups in Gaia clish commands. You can optionally assign an IPv4 or IPv6 address to a bridge interface.

To create a new bridging group:

Run:
> add bridging group <Group ID>

<Group Name> - Bridging Group ID (unique integer between 0 and 1024)

To add an interface to the bridging group:

Run:
> add bridging group <Group ID> interface <interface>

<interface> - Physical interface name

Run this command once for each physical interface included in the bridge interface.

To delete an interface from the bridging group:

Run:
> delete bridging group <Group ID> interface <IF>.

Run this command once for each physical interface included in the bridge interface.

To delete a bridging group:

Run:
> delete bridging group <Group ID>.

To add or change a bridge interface IP address:

  • For an IPv4 IP address, run
    > set interface <interface> ipv4-address <IP> subnet-mask <Mask>.
  • For an IPv6 IP address, run
    > set interface <interface> ipv6-address <IP> mask-length <Prefix>.

    <interface> - Bridge interface name

    <IP> - IP address - IPv4 or IPv6 address

    <Mask> - IPv4 subnet mask in dotted decimal format

    <Prefix> - IPv6 prefix length

    Example:

    set interface br1 ipv6-address 3000:40::1 mask-length 64

Bridging group commands

This is a quick reference for bridge interface commands.

Description - Use these commands to configure bridge interfaces.

Syntax

add bridging group <Group ID> [interface <interface>]
delete bridging group <Group ID> interface <interface>
show bridging group <Group ID>

Parameters

Parameter

Description

<Group ID>

ID of bridging group

<interface>

Interface name

Example - add bridging group 56 interface eth1

Important - After using CLI commands to add, configure or delete features, you must run the save config command. This makes sure that the new configuration settings remain after reboot.

Configuring Bridge Mode for Gateways

You can configure bridge mode with a single gateway or with a cluster. VSX bridge deployments are explained later.

The bridge can work without an assigned IP address.

SmartDashboard helps you configure the topology for the bridge ports. There is a separate network or group object that represents the networks or subnets that connect to each port.

Configuring Single Gateway in Bridge Mode

Item

Description

1 and 2

Switches

3

Security Gateway Firewall bridging Layer-2 traffic over the one IP address, with a subnet on each side using the same address.

Before you begin, configure a dedicated management interface.

First you configure the bridge interface. Then you define the bridge topology in SmartDashboard.

To define the bridge topology:

Use SmartDashboard to manually configure the topology for the bridge ports:

  • If one of the bridge ports connects to the Internet, set the topology to External
  • If the topology uses Anti-Spoofing, for the internal port (interface), make sure that you:
    • Set the topology to Internal
    • Select the Specific network that connects to the port
  • If the topology does not use Anti-Spoofing, make sure that you disable Anti-Spoofing on the bridge port

    Note - When you use Internet objects in a rule with a Security Gateway, make sure that the bridge interface is defined as External.

gaia webui bridge 3

Configuring an IP Address for the Bridge

In a Security Gateway bridge deployment, you can configure an IP address for the bridge. The IP address of the bridge must be in the bridged subnet. The bridge IP address can be used for gateway management and access to the gateway portals.

When you assign an IP address to the bridge, the Topology window shows that both bridge ports have the same IP address as the bridge.

gaia bridge 4

Configuring Gateway Cluster in Bridge Mode

You can configure cluster gateways for bridge mode in different deployments:

  • Active/Standby mode
  • Active/Active mode

bridge cluster

 

Item

Description

1 and 2

Switches

IUG_FW Icon

Security Gateway Firewall bridging Layer-2 traffic

3

eth1

4

eth2

5

eth3 - the ClusterXL Sync interface

Configuring Active/Standby Mode

This is the preferred mode in topologies that support it.

In Active-Standby mode, ClusterXL decides the cluster state. The standby member drops all packets. It does not pass any traffic, including STP/RSTP/MSTP. If there is a failover, the switches are updated by the Security Gateway to forward traffic to the new active member.

If you use this mode, it is best to disable STP/RSTP/MSTP on the adjacent switches.

To configure Active/Standby mode:

  1. Configure the cluster.
  2. Run: cpconfig
  3. Enter 8, to select Enable Check Point ClusterXL for Bridge Active/Standby.
  4. Confirm: y
  5. Reboot the cluster member.
  6. Install Policy.
  7. Test the cluster state: cphaprob stat

    The output should be similar to:

Cluster Mode: High Availability (Active Up, Bridge Mode) with IGMP Membership
Number     Unique Address     Firewall State (*)
1 (local>  2.2.2.3            Active
2          2.2.2.2            Standby

Configuring Active/Active Mode

When you define a bridge interface on a Security Gateway cluster, Active/Active mode is activated by default.

Before you begin, install ClusterXL High Availability on a Gaia appliance or open server.

To configure Active/Active mode, do these steps on each member of the cluster:

  1. Configure dedicated management and Sync interfaces.
  2. Add a bridge interface, as in a single gateway deployment.

    Do not configure an IP address on the newly created bridge interface.

  3. In SmartDashboard, add the cluster object:
    1. Open Topology of the cluster object.
    2. Get the cluster topology.
    3. Make sure the dedicated management and Sync interfaces are configured.
    4. Make sure the bridge interface and bridge ports are not in the topology.

    Bridge port topology cannot be defined. It is external by default.

    cluster topology

  4. Install Policy.
  5. Test the cluster state: cphaprob stat

    The output should be similar to:

    Cluster Mode: High Availability (Active Up, Bridge Mode) with IGMP Membership
    Number Unique Address Firewall State (*)
    1 (local> 2.2.2.3 Active
    2 2.2.2.2 Active

  6. Make sure that cluster is configured as High Availability in SmartDashboard.

Confirming the High Availability Configuration

When you finish configuring Active/Active mode, the output for chpaprob stat shows that the Firewall State is Active/Active. Make sure that the cluster is configured as High Availability in SmartDashboard.

To confirm the High Availability configuration:

  1. From SmartDashboard, double-click the cluster object.

    The cluster window opens and shows the General Properties page.

  2. From the navigation tree, click ClusterXL.
  3. In the Cluster Mode section, make sure that High Availability is selected.
  4. Click OK.

Cluster Between Four Switches

You can configure a bridged cluster between four switches, in Active/Active mode.

Active/Standby mode is not supported.

bridge in cluster with 4 switches

Item

Description

1, 2, 3, 4

Switches

IUG_FW Icon

Security Gateway Firewall bridging Layer-2 traffic

5

eth1

6

eth2

7

eth3 - the ClusterXL Sync interface

See also: Link Aggregation with ClusterXL in Layer-2

Routing and Bridges

Security Gateways with a bridge interface can support Layer 3 routing over non-bridged interfaces. If you configure a bridge interface with an IP address for one Security Gateway (not a cluster), the bridge functions as a regular Layer 3 interface. It participates in IP routing decisions on the gateway and supports Layer 3 routing.

  • Cluster deployments do not support this configuration.
  • You cannot configure the bridge to be the route gateway.
  • One Security Gateway can support multiple bridge interfaces, but only one bridge can have an IP address.
  • The Security Gateway cannot filter or transmit packets on a bridge interface that it inspected before (double-inspection).

Management over Bridge

The following diagram shows a sample topology:

bridge through management interface

Item

Description

1

Switch

2

Router

IUG_FW Icon

Security Gateway Firewall bridging Layer-2 traffic

3

Management interface (inspects first packet)

4

eth1 (inspects first packet again)

5

eth2

6

Bridge interface - Management traffic drops

7

Security Management Server

When a Layer-3 management interface sends traffic through the firewall, the traffic is dropped because it cannot inspect the same packet again.

  • The first packet is inspected and then goes from the management interface to the router.
  • The router sends the packet to the bridge interface, and the firewall inspects the first packet again. The firewall concludes that this packet is a retransmission and then drops it.

Use the procedure for the applicable Security Gateway version.

Security Gateways R77.10 and Higher

This feature is supported in R77.10 and higher.

You can configure the Security Gateway to recognize that the first packet is from the management interface. The firewall makes sure that the MD5 hash of the packet that leaves the management interface and enters the bridge interface is the same. Other packets in this connection are handled by the bridge interface without using the router.

To enable management over the bridge:

  1. Edit $FWDIR/boot/modules/fwkern.conf.

    If necessary, create this file.

  2. Add the appropriate line to the file:
    • For IPv4 traffic - fwx_bridge_reroute_ipv4=<management>
    • For IPv6 traffic - fwx_bridge_reroute_ipv6=<management>

    <management> is the IP address of the management interface.

  3. Reboot the Security Gateway.

Security Gateways R77 and Earlier

Incoming and outgoing traffic from a Layer-3 management interface is dropped if traversed over a bridge interface. You can make this traffic pass. Disable inspection on the management interface and disable local Anti-Spoofing.

Note: This removes inspection from the management interface and could compromise gateway security. If you are unsure whether your environment is safe to use this method, contact Check Point Solution Center.

To configure management over the bridge:

  1. Open $PPKDIR/boot/modules/simkern.conf and add: simlinux_excluded_ifs_list=interface name

    (Create this file if not found.)

    Where the value (interface name) is the management interface name.

    This excludes the management interface from SecureXL.

  2. Edit $FWDIR/modules/fwkern.conf.

    (Create this file if not found.)

    Add these lines:

    fwx_bridge_use_routing=0
    fw_local_interface_anti_spoofing=0
    fwlinux_excluded_ifs_list=interface name

    Where the value (interface name) is the management interface name.

    This disables local Anti-Spoofing and bridge routing, and excludes the management interface from security inspection.

  3. Reboot.
 
Top of Page ©2015 Check Point Software Technologies Ltd. All rights reserved. Download PDF Send Feedback Print