©2012 Check Point Software Technologies Ltd. Bypass Support Feature Overview August 2012 Threat Prevention Team [Restricted] ONLY for designated groups.

Slides:



Advertisements
Similar presentations
D-Link Switch Training ©Copyright By D-Link HQ TSD James Chu.
Advertisements

10/100Base-TX to 100Base-FX Redundant Media Converter
Hub A hub is a device that connects PCs together All hubs Contain multiple access ports the hub simply forwards the packets to all the other devices connected.
CCNA3 v3 Module 7 v3 CCNA 3 Module 7 JEOPARDY K. Martin.
Part 2: Preventing Loops in the Network
1 Course Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. Cisco 7500 High Availability.
Switching & Operations. Address learning Forward/filter decision Loop avoidance Three Switch Functions.
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Changing the Face of Intrusion Prevention: Check Point IPS Software Blade.
Sept 21, 2004CS573: Network Protocols and Standards1 Reconfigurations Network Protocols and Standards Autumn
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Lesson 1: Configuring Network Load Balancing
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—3-1 Implementing Spanning Tree Describing STP Stability Mechanisms.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Introducing Spanning Tree Protocol.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Layer 2 Switching. Overview Introduction Spanning Tree Protocol Spanning Tree Terms Spanning Tree Operations LAN Switch Types Configuring Switches.
MESH Implementation With AP5131 version R.
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Switching CE
Sales Kickoff - ARCserve
STP Part II PVST (Per Vlan Spanning Tree): A Vlan field is added to the BPDU header along with Priority & Mac. Priority is 32768, Mac Address is MAC or.
IEEE 802.1q - VLANs Nick Poorman.
© 2006 Cisco Systems, Inc. All rights reserved.1 Microsoft Network Load Balancing Support Vivek V
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols LAN Switching and Wireless – Chapter 5 Part.
CN2668 Routers and Switches (V2) Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Cisco 3 - Switch Perrine. J Page 110/3/2015 Chapter 7 How does STP provide a loop-free network? 1.By placing all ports in the blocking state 2.By placing.
Example STP runs on bridges and switches that are 802.1D-compliant. There are different flavors of STP, but 802.1D is the most popular and widely implemented.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
S3C2 – LAN Switching Addressing LAN Problems. Congestion is Caused By Multitasking, Faster operating systems, More Web-based applications Client-Server.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless Implement Spanning Tree Protocols (STP) Chapter.
Configuring Cisco Switches Chapter 13 powered by DJ 1.
Click to edit Master subtitle style
Net Optics Confidential and Proprietary 1 Bypass Switches Intelligent Access and Monitoring Architecture Solutions.
Packet Capture and Analysis: An Introduction to Wireshark 1.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
Department of Computer Science and Engineering Applied Research Laboratory Architecture for a Hardware Based, TCP/IP Content Scanning System David V. Schuehler.
Spanning Tree V1.2 Slide 1 of 1 Purpose:
Switching Topic 6 Rapid spanning tree protocol. Agenda RSTP features – Port states – Port roles – BPDU format – Edge ports and link types – Proposals.
Virtual Machines Created within the Virtualization layer, such as a hypervisor Shares the physical computer's CPU, hard disk, memory, and network interfaces.
Chapter 6: Securing the Local Area Network
NetTech Solutions Protecting the Computer Lesson 10.
1 Version 3.0 Module 7 Spanning Tree Protocol. 2 Version 3.0 Redundancy Redundancy in a network is needed in case there is loss of connectivity in one.
CCNP 3: Chapter 3 Implementing Spanning Tree. Overview Basics of implementing STP Election of Root Bridge and Backup Enhancing STP RSTP MSTP EtherChannels.
CO5023 LAN Redundancy.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols (STP) LAN Switching and Wireless – Chapter.
Coping with Link Failures in Centralized Control Plane Architecture Maulik Desai, Thyagarajan Nandagopal.
Chapter-5 STP. Introduction Examine a redundant design In a hierarchical design, redundancy is achieved at the distribution and core layers through additional.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
Cisco Implementing Cisco IP Switched Networks (SWITCH )

Implement Spanning Tree Protocols
CISCO CERTIFIED NETWORK ASSOCIATE
Cisco Implementing Cisco IP Switched Networks (SWITCH )
Campus Communications Fabric
Implement Spanning Tree Protocols
Configuring EtherChannels and Switch Troubleshooting
Implementing Cisco IP Switched Networks practice-questions.html.
Spoofing Basics Presentation developed by A.F.M Bakabillah Cyber Security and Networking Consultant MCSA: Messaging, MCSE RHCE ITIL CEH.
Implement Spanning Tree Protocols
© 2002, Cisco Systems, Inc. All rights reserved.
Cisco Dumps Braindumps Dumps4download.us
Advanced Network Training
An introduction to the organization of the Internet Lab
NT2640 Unit 9 Activity 1 Handout
Firewalls Routers, Switches, Hubs VPNs
Spanning Tree Protocol (STP)
Cisco networking CNET-448
An introduction to the organization of the Internet Lab
Implement Spanning Tree Protocols
Presentation transcript:

©2012 Check Point Software Technologies Ltd. Bypass Support Feature Overview August 2012 Threat Prevention Team [Restricted] ONLY for designated groups and individuals

2©2012 Check Point Software Technologies Ltd. Agenda 1 1 Feature Highlights Feature Description 2 2 Installation Overview 3 3 Traffic loss scenarios in case of failure 4 4 [Restricted] ONLY for designated groups and individuals Notes 5 5

3©2012 Check Point Software Technologies Ltd. Project Goals Feature Highlights Providing network bypass capabilities upon software or hardware failure Target Release Date September 30 th 2012, R75.40 on GAIA Related Product IPS DLP APPI, URLF AB & AV Supported Bypass Cards 1GbE Copper, 4 port 1GbE SFP, 4 Port (short and long range) 10GbE SFP+, 2 Port (short and long range) [Restricted] ONLY for designated groups and individuals

4©2012 Check Point Software Technologies Ltd. Feature Description [Restricted] ONLY for designated groups and individuals The internal bypass card is to ensure that network traffic continues to flow if the appliance fails or loses power. This feature is only supported for Gaia in a non-cluster configuration. Bypass Card Architecture The appliance enters Bypass Mode if one of the following occurs: There is a power loss. The appliance is overloaded, it enters bypass mode for at least 1 minute. There is a system failure, it enters bypass mode for at least 5 minutes. The appliance stops responding for 60 seconds.

5©2012 Check Point Software Technologies Ltd. Bypass Card Installation Overview 1. Install the Bypass card in the appliance. 2. Install the R75.40 bypass hotfix on the appliance. 3. Use the Gaia WebUI to enable and configure it. 4. Configure the appliance in SmartDashboard. 5. Install the policy and reboot the appliance. [Restricted] ONLY for designated groups and individuals Specific Installation Instructions will be provided with an SK for this Hotfix.

6©2012 Check Point Software Technologies Ltd. Traffic loss scenarios in case of failure When the Bypass card return from fail-open state, there could be a delay of seconds before the link is re- established. The delay is due to Linux Bridge forwarding mechanism to allow STP Protocol (running on Switches) enough time for listening and learning the network topology and block switch ports in case a loop is identified. This is an expected behavior for Bypass cards solutions. A possible way to reduce the delay is to configure the switches not use auto negotiation. There exist some workarounds for the delay (for example disable STP on the interface ports of your switch or enable Port-fast in spanning tree settings). However, this may cause severe impact to network behavior and should be carefully considered. [Restricted] ONLY for designated groups and individuals

7©2012 Check Point Software Technologies Ltd. Limitations Only for non-clustering Environments. The following features will not be supported: –HTTPS Inspection. –Anti Spam. –Traditional Anti-Virus in proactive mode. –FTP Inspection for DLP SW Blade. –Header Spoofing Protection for IPS SW Blade. If one of the following features is enabled, severe network issues could result. [Restricted] ONLY for designated groups and individuals

8©2012 Check Point Software Technologies Ltd. Notes In order to have access to the machine during bypass state, It is required to use the dedicated management interface on the appliance. [Restricted] ONLY for designated groups and individuals