Here's the diagram again:
Anyway, the problem is internal routes. In my example, I have a layer 3 switch handling internal routing. The steps are:
1. Log into each Checkpoint cluster member and add static routes. You can use either ssh with the sysconfig utility, or use a web browser and go to each firewall (typically port 4434.) In this example case, you'll add:
subnet | netmask | gateway |
172.17.16.0 | 255.255.252.0 | 192.168.5.200 |
192.168.6.0 | 255.255.254.0 | 192.168.5.254 |
192.168.8.0 | 255.255.254.0 | 192.168.5.254 |
192.168.10.0 | 255.255.254.0 | 192.168.5.254 |
Note that 192.168.5.254 is the layer 3 switch.
2. Create subnet objects for each of the internal networks/VLANs.
Ignore CP_default_Office, it's part of the demo network config. |
3. If you look at the cluster interface topology, you'll see:
And now to the "Topology tab"
Topology anti-spoofing config |
4. Create a simple group and include all four subnets:
5. Now, go back to the topology anti-spoofing config in step 3 and modify it to use the group you created.
There, anti-spoofing should work correctly. Make sure NAT is configured properly!
No comments:
Post a Comment