Configuring Policy Based Routing in Gaia Clish
|
Important - In a Cluster Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing., you must configure all the Cluster Members in the same way. |
|
Important - In VSX Virtual System Extension. Check Point virtual networking solution, hosted on a computer or cluster with virtual abstractions of Check Point Security Gateways and other network devices. These Virtual Devices provide the same functionality as their physical counterparts., to configure Policy Based Routing on a Virtual System or a Virtual Router, first you must change the context to that Virtual Device with the " |
-
To see the available "
set
" commands for Policy Based Routing, enter in Gaia Clish The name of the default command line shell in Check Point Gaia operating system. This is a restricted shell (role-based administration controls the number of commands available in the shell).:set pbr[Esc][Esc]
-
To see the available "
show
" commands for Policy Based Routing, enter in Gaia Check Point security operating system that combines the strengths of both SecurePlatform and IPSO operating systems. Clish:show pbr[Esc][Esc]
To configure Policy Based Routing (PBR):
-
Configure Action Tables - to configure static routes to destination networks.
-
Configure Policy Rules - to configure the priority and the routing action for each set of matching criteria.
Syntax
Parameters
|
Note - You can add multiple routes to the same table. To do that, run the |
Example
Create an Action Table named PBRtable1, with a route to the network 192.0.2.0/24 out of the interface Ethernet 0 and a route to the network 192.0.3.0/24 through the next hop gateway with the IP address 192.168.1.1.
|
Syntax
Parameters
Example
Create a Policy Rule that forwards all packets with the destination address 192.0.2.1/32 that arrive on the interface Ethernet 2 according to the PBR Table PBRtable1
, and assign to it the priority of 100.
|
The PBR Route Lookup option controls whether PBR rules intentionally cause same packets to traverse the Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. more than once.
Requirements
-
At least one Policy Rule must exist.
-
SecureXL Check Point product on a Security Gateway that accelerates IPv4 and IPv6 traffic that passes through a Security Gateway. must be enabled (this is the default).
Syntax
|
Parameters