Hi guys,

  I have an issue that was solved using Juniper boxes. Guess if there´s any
way to implement
  it using Checkpoint :


  Scenario :

    Datacenter as center of the internal network and one Cluster of two
VPN-1 Power gateways.

    3 countries with border firewalls attached to Internet.

    All four countries are connected internally using an MPLS network.


 Problem :

  Need to wait for a local IronPort Anti-Spam solution at each of the remote
3 countries and need
  a SMTP MX entry point on each country.

  Cannot use only Static Nat ´cause the back traffic of each connection must
flow the same way
  as entered.

  Exemple : if a conection arrives at UK firewall and cames from internet,
it will be NATed and
  directed internally, pass thru the headquarter´s firewall and delivered at
the SMTP server, but
  when this server answers, traffic must follow back thru HQ´s firewall,
follow UK´s network path
  and exit to the internet.

  Source nat cannot be used as the IronPort must check incomming IP at each
smtp session.


Solution applied using Juniper firewalls :

  Between the HQ´s firewall and the IronPort firewall was placed a Juniper
firewall. IP address of
  the IronPort was changed to a new from the Juniper internal network and
all DNS changes and
  HQ´s NAT config was done to comply with this change.

  At each border firewall is created a Tunnel interface with a false IP
address ( 192.168.xxx.1 ) and
  one route to the HQ´s Juniper internal network thru the other end of the
Tunnel´s ip address.

  Tunnels runs with basic encription and shared keys to a new Juniper next
to the Ironport server.

  At the Juniper firewall next to Ironport server were created 3 new virtual
routers with one Tunnel
  each. These tunnels also have false ip address (192.168.xxx.2) and a
default route to the other
  end of the tunnel´s ip address ( 192.168.xxx.1 ).


Example :

  From an Internet linux site i did opened a FTP session to the NAT ip in UK
and uploaded 1Gb file
  and everything was accepted at UK´s firewall, sent to HQ´s firewall thru
the tunnel and reached
  the testing FTP server and all control traffic flew back thru the tunnel.

  While that, other FTP session was started from the same linux site to the
NAT ip in HQ and also
  uploaded other 1Gb file and everything was accepted at HQ´s firewall, sent
to the server and
  all control traffic flew back thru HQ site´s internet link.

  All connections started in the testing FTP server to any internet site
will follow the HQ´s default
  gateway path and will never follow thru the ipsec tunnels.


What made this possible

  Ibound and outbound interface of each session is stored into Statefull
Inspection control tables
  at Juniper firewalls.

  Once the inbound traffic is accepted from an interface, the outbound back
traffic will allways
  exit thru the same interface


Current task

  Perform the same solution with Checkpoint using remote Juniper firewalls
as tunnel peers.


[]'S

--
Antonio Costa

[EMAIL PROTECTED]
TI - Analista de Redes e Segurança
CCSE PLus / CCNA
MCSE / LinuxAdmin
        Odebrecht Engenharia e Construção

Matriz Villa Lobos - São Paulo/SP
Av. Nações Unidas 4777, 11o. Andar
Tel.: +55-11-3443-9813/9000
Fax.: +55-11-3443-9861

=================================================
To set vacation, Out-Of-Office, or away messages,
send an email to [EMAIL PROTECTED]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[EMAIL PROTECTED]
=================================================

Reply via email to