HowTo Bridge
HowTo Bridge
HowTo Bridge
Technical Paper
8 May 2013
Classification: [Protected]
© 2013 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed under
licensing restricting their use, copying, distribution, and decompilation. No part of this product or related
documentation may be reproduced in any form or by any means without prior written authorization of Check
Point. While every precaution has been taken in the preparation of this book, Check Point assumes no
responsibility for errors or omissions. This publication and features described herein are subject to change
without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph
(c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR
52.227-19.
TRADEMARKS:
Refer to the Copyright page (http://www.checkpoint.com/copyright.html) for a list of our trademarks.
Refer to the Third Party copyright notices (http://www.checkpoint.com/3rd_party_copyright.html) for a list of
relevant copyrights and third-party licenses.
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date with the latest functional
improvements, stability fixes, security enhancements and protection against new and evolving attacks.
Latest Documentation
The latest version of this document is at:
http://supportcontent.checkpoint.com/documentation_download?ID=21482
For additional technical information, visit the Check Point Support Center
(http://supportcenter.checkpoint.com).
Revision History
Date Description
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
(mailto:[email protected]?subject=Feedback on Bridge Mode Technical Paper).
Contents
Important Information.............................................................................................3
Objective .................................................................................................................5
Supported Versions, OS, Appliances ....................................................................5
Supported Software Blades ...................................................................................6
Bridge Interfaces ....................................................................................................6
Topologies ..............................................................................................................7
Configuring Single Gateway in Bridge Mode........................................................ 7
Configuring an IP Address for the Bridge ........................................................ 8
Configuring Gateway Cluster in Bridge Mode ...................................................... 9
Configuring Active/Standby Mode ................................................................... 9
Configuring Active/Active STP Mode .............................................................10
Cluster Between Four Switches .....................................................................11
Routing and Bridges.............................................................................................11
Management Through the Bridge .......................................................................12
Link State ..............................................................................................................13
Configuring Bridge Interfaces CLI .......................................................................13
Configuration using the CLI ................................................................................14
VLANs ....................................................................................................................14
Access Mode VLAN............................................................................................15
Special Protocols ................................................................................................16
Trunk Mode ........................................................................................................16
Configuring a Dedicated DLP Gateway in Bridge Mode.....................................18
Required Routing in Bridge Mode .......................................................................18
Configuring Bridge IP Address ...........................................................................18
Required VLAN Trunk Interfaces ........................................................................18
Virtual System in Bridge Mode ............................................................................19
Core Network Security........................................................................................20
Three Layer Hierarchical Model .....................................................................20
Configuring Virtual Systems for Active/Standby Bridge Mode .............................20
Enabling Active/Standby Bridge Mode for a New Member ..................................21
Enabling Active/Standby Bridge Mode for Existing Members..............................21
Enabling STP Bridge Mode when Creating Member ...........................................21
Enabling the STP Bridge Mode for Existing Members ........................................21
Custom or Override in Bridge Mode ...................................................................22
VLAN Shared Interface Deployment ...................................................................22
VSX Clusters ......................................................................................................23
Configuring Clusters for Active/Standby Bridge Mode ....................................23
Configuring Clusters for STP Bridge Mode ....................................................23
Separate Interfaces in Bridge Mode ...................................................................23
Virtual System Load Sharing (VSLS) ..................................................................24
Converting from High Availability to VSLS .....................................................25
Objective
Objective
This document explains how to set up the bridge mode (also known as Layer 2) on a single Security
Gateway, or on cluster gateways.
You should be familiar with ClusterXL.
This document replaces these Secure Knowledge solutions:
• sk76541 (http://supportcontent.checkpoint.com/solutions?id=sk76541) (R75.40VS known limitation
00892775)
• sk79700 (http://supportcontent.checkpoint.com/solutions?id=sk79700) (R75.40VS VSX mode known
limitation: "Virtual System in Bridge mode" section)
• sk41320 (http://supportcontent.checkpoint.com/solutions?id=41320) (Bridge/Transparent mode FAQ)
Important related solutions:
• FONIC limitations - sk85560 (http://supportcontent.checkpoint.com/solutions?id=sk85560)
For IPSO:
How To Setup a Bridge Mode Firewall on an IP Appliance with IPSO
(http://supportcontent.checkpoint.com/documentation_download?ID=15361)
DLP Yes No
Unsupported: SMTP and FTP in a
cluster deployment.
HTTPS Yes No
Unsupported inspection feature:
Predefined rules with Internet object are
not effective - all traffic inspected as
external.
On all blades, Access to Portals from bridged networks is not supported, unless the bridge interface has an
IP address assigned to it.
Note - Mobile Access and IPSec VPN Software Blades are not supported.
Bridge Interfaces
Bridge interfaces connect two different interfaces (bridge ports). Bridging two interfaces causes every
Ethernet frame that is received on one bridge port to be transmitted to the other port. Thus, the two bridge
ports participate in the same Broadcast domain (which is different from router ports behavior).
Only two interfaces can be connected by a single Bridge interface. These two interfaces can then be thought
of as a two-ports switch. Each port can be a physical, VLAN, or bond device.
Bridge interfaces can be configured on Check Point Security Gateway, and can be used for different
deployments. The Security Gateway inspects every Ethernet frame that passes through the bridge.
Topologies
You can configure bridge mode with a single gateway or with a cluster. VSX bridge deployments are
explained later ("Virtual System in Bridge Mode" on page 19).
Configuring Topologies
Configuring Single Gateway in Bridge Mode 7
Configuring Gateway Cluster in Bridge Mode 9
First you configure the bridge interface. Then you define the bridge topology in SmartDashboard.
To configure a bridge interface with the CLI:
1. Run: add bridging group <Group Name> interface <physical interface name>
For example:
add bridging group 1
add bridging group 1 interface eth2
add bridging group 1 interface eth3
2. Run again for each interface in the bridge.
3. Run: save config
3. On the Bridge tab, enter or select a Bridge Group ID (unique integer between 1 and 1024).
4. Select the interfaces from the Available Interfaces list and then click Add.
5. Click OK.
To define the bridge topology:
Important - The topology of the bridge ports cannot be automatically calculated, because the
bridge ports do not have IP addresses. There are no routes defined on the Security Gateway
which include the bridge ports as gateways.
You must manually configure the topology for the bridge ports, with the network or group object that
represents the networks or subnets behind each port.
Make sure that only the bridge interface has an IP address. The bridge ports must not have IP addresses.
3 eth1
4 eth2
You can configure cluster gateways for bridge mode in different deployments:
• Active/Standby mode
• Active/Active (STP) mode
4. Install Policy.
5. Test the cluster state: cphaprob stat
The output should be similar to:
Cluster Mode: High Availability (Active Up, Bridge Mode) with IGMP Membership
Number Unique Address Firewall State (*)
1 (local> 2.2.2.3 Active
2 2.2.2.2 Active
Item Description
1, 2, 3, 4 Switches
5 eth1
6 eth2
Item Description
1 Switch
2 Router
3 management interface
4 eth1
5 eth2
Note: This removes inspection from the management interface and could compromise gateway security. If
you are unsure whether your environment is safe to use this method, contact Check Point Solution Center.
To configure management over the bridge:
1. Open $PPKDIR/boot/modules/simkern.conf and add:
simlinux_excluded_ifs_list=interface name
(Create this file if not found.)
Where the value (interface name) is the management interface name.
This excludes the management interface from SecureXL.
2. Edit $FWDIR/modules/fwkern.conf.
Link State
When one port of a bridge loses its link, the link on the other bridge port goes down too.This lets the switch
detect and react to a link failure on the other side of the bridge.
Link state propagation is supported on these Check Point appliance line cards:
• CPAC-4-1C/CPAC-8-1C – copper line cards with igb driver
• CPAC-4-1F – 1Gbe fiber line card with igb driver
• CPAC-4-10F – 10Gbe fiber line card with ixgbe driver
Note - From R75.40VS, link state propagation is available as a hotfix, on special request
from Check Point Solution Center.
To enable link state propagation contact Check Point technical support.
Important - After using CLI commands to add, configure or delete features, you must run the
save config command. This makes sure that the new configuration settings remain after
reboot.
VLANs
When switches are configured with VLANs, VLAN traffic can pass through our bridge in Access mode or in
Trunk mode:
• Access mode (VLAN translation) – Bridge is constructed from two VLAN interfaces.
• Trunk mode – Bridge is constructed from two non-VLAN interfaces. The VLAN tag is not removed, and
the firewall processes the tagged packet. The traffic passes with the original tag to its destination.
Note - VLAN translation is not supported over bridged FONIC (Fail open NIC) ports. See
sk85560 (http://supportcontent.checkpoint.com/solutions?id=sk85560).
2. Open the Add Bridge window and select the VLAN interfaces in the Bridge tab.
VLAN ID 2 traffic will be translated into VLAN ID 22, and vice versa.
Special Protocols
PVST - Per-VLAN Spanning Tree. PVST is a CISCO proprietary version of STP and maintains a spanning
tree instance for each VLAN configured in the network. It uses ISL Trunking and lets a VLAN trunk be
forwarded for some VLANs and blocked for others. Because PVST treats each VLAN as a separate
network, it can load balance traffic at layer-2. It forwards some VLANs on one trunk and other VLANs on
another trunk without causing a Spanning Tree loop.
BPDU - Bridge Protocol Data Unit. BPDUs are data messages that are exchanged across the switches
within an extended LAN that uses a spanning tree protocol (STP) topology.
When VLAN translation is configured, BPDU frames can arrive with the wrong VLAN number to the ports
through the bridge. This mismatch can cause the switch port to enter into blocking mode.
In Active-Standby mode only, there are options to avoid blocking mode.
Disable BPDU forwarding:
1. Add to /etc/sysctl.conf the line: net.bridge.bpdu_forwarding = 0
2. Reboot.
Block all non IPv4, IPv6 and ARP traffic going through the gateway.
1. Add to $FWDIR/modules/fwkern.conf the line: fwaccept_unknown_protocol=0
2. Reboot.
Trunk Mode
If you configure the switch ports as VLAN trunk, the Check Point bridge should not interfere with the VLANs.
To configure bridge with VLAN trunk, create the bridge from two interfaces (no VLAN).
If you configure a cluster in Active-Standby mode only, CCP monitoring on interfaces may be dropped by
the switch when the switch is configured with VLAN tags.
To avoid cpha interfaces active check issues and to solve CCP drops: disable interface monitoring, or add a
VLAN to the bridge slave ports.
To disable interface monitoring:
1. Log in to the gateway in expert mode.
2. Run: vi $FWDIR/conf/discntd.if
3. Add the names of the slave interfaces to the file.
4. Save the file.
5. Reboot.
• In a VLAN trunk interface, another interface must be configured as the management interface for the
required bridge routing.
VSX ensures connectivity between the core network and the Internet or external networks, while providing
perimeter security. Security can be configured on a per VLAN basis.
• Define the external and internal interfaces and links to devices in the Interfaces table.
• If the cluster with the bridge is on IPSO, select Enable Layer-3 Bridge Interface Monitoring and define
the IP address and net mask. Make sure the IP address to be monitored is on a different subnet than the
subnet that handles bridge traffic.
With Active/Standby bridge mode in High Availability mode, ClusterXL directs traffic to members according
to administrator-defined priorities and status. In VSLS deployments, the system distributes the traffic load
amongst members according to your VSLS configuration.
VSX Clusters
A VSX cluster has two or more identical, interconnected VSX Gateways for continuous data synchronization
and transparent failover. Virtual System Load Sharing (VSLS) enhances throughput by distributing Virtual
Systems, with their traffic load, among multiple, redundant machines.
If the selected interface is a VLAN interface, enter the same VLAN tag in both the external and internal
VLAN Tag fields. This field is not available for non-VLAN interfaces.
2. Define the topology for the internal interface:
• Select Not Defined if you do not want to define an IP address.
• Select Specific and then select an IP address definition from the list. IP address definitions can be
based on object groups or predefined networks that define the topology.
To create a new IP address definition:
a) Select Specific and click New.
b) Select Group or Network.
c) Enter the group object properties, or network properties, in the window that opens.
3. Select Layer-3 bridge interface monitoring to enable layer 3 network fault detection for this Virtual
System.
Enter an IP address and subnet mask for this Virtual System, which continuously monitors the specified
network for faults or connectivity issues. The IP address/subnet should define the network on which the
Virtual System resides.
4. Complete the definition process.
A different member hosts the active peer for each Virtual System. This distribution spreads the load equally
amongst the members. Once you create a Virtual System, VSX automatically assigns standby and backup
states to the appropriate peers and distributes them among the other cluster members.
In the event that a cluster member fails, VSLS directs traffic destined to affected Virtual Systems to their fully
synchronized standby peers, which then become active. At the same time, a backup Virtual Systems
switches to standby, and synchronizes with the newly active Virtual System.
In the event that an individual active Virtual System fails, it immediately fails over to its standby peer and
one of its backup peers becomes the standby, synchronizing with the newly active peer.
Note - You cannot convert a VSX cluster to the VSLS mode if it contains Virtual Systems in the
STP Bridge mode or Virtual Routers.