Bypass Support Feature Overview

Download Report

Transcript Bypass Support Feature Overview

Bypass Support
Feature Overview
August 2012
Threat Prevention Team
[Restricted] ONLY for designated groups and individuals
©2012 Check Point Software Technologies Ltd.
Agenda
1
Feature Highlights
2
Feature Description
3
Installation Overview
4
Traffic loss scenarios in case of failure
5
Notes
[Restricted] ONLY for designated groups and individuals
©2012 Check Point Software Technologies Ltd.
2
Feature Highlights
Project Goals
Providing network bypass capabilities upon
software or hardware failure
September 30th 2012, R75.40 on GAIA
Target Release Date
IPS
DLP
APPI, URLF
AB & AV
Related Product
Supported Bypass
Cards



4200
4400
4600
4800
12200
12400
12600
1GbE Copper, 4 port
1GbE SFP, 4 Port (short and long range)
10GbE SFP+, 2 Port (short and long range)
[Restricted] ONLY for designated groups and individuals
©2012 Check Point Software Technologies Ltd.
3
Feature Description

The internal bypass card is to ensure that network traffic
continues to flow if the appliance fails or loses power.

This feature is only supported for Gaia in a non-cluster
configuration.

Bypass Card Architecture
The appliance enters Bypass Mode if one of the following occurs:
•There is a power loss.
•The appliance is overloaded, it enters bypass mode for at least 1 minute.
•There is a system failure, it enters bypass mode for at least 5 minutes.
•The appliance stops responding for 60 seconds.
[Restricted] ONLY for designated groups and individuals
©2012 Check Point Software Technologies Ltd.
4
Bypass Card Installation Overview
1. Install the Bypass card in the
appliance.
2. Install the R75.40 bypass hotfix
on the appliance.
3. Use the Gaia WebUI to enable
and configure it.
4. Configure the appliance in
SmartDashboard.
5. Install the policy and reboot the
appliance.
Specific Installation Instructions will
be provided with an SK for this Hotfix.
[Restricted] ONLY for designated groups and individuals
©2012 Check Point Software Technologies Ltd.
5
Traffic loss scenarios in case of failure
When the Bypass card return from fail-open state, there
could be a delay of 15-40 seconds before the link is reestablished.
 The delay is due to Linux Bridge forwarding mechanism to allow STP
Protocol (running on Switches) enough time for listening and learning
the network topology and block switch ports in case a loop is identified.
 This is an expected behavior for Bypass cards solutions.
 A possible way to reduce the delay is to configure the switches not use
auto negotiation.
 There exist some workarounds for the delay (for example disable STP
on the interface ports of your switch or enable Port-fast in spanning
tree settings). However, this may cause severe impact to network
behavior and should be carefully considered.
[Restricted] ONLY for designated groups and individuals
©2012 Check Point Software Technologies Ltd.
6
Limitations
 Only for non-clustering Environments.
 The following features will not be supported:
– HTTPS Inspection.
– Anti Spam.
– Traditional Anti-Virus in proactive mode.
– FTP Inspection for DLP SW Blade.
– Header Spoofing Protection for IPS SW Blade.
If one of the following features is enabled, severe network
issues could result.
[Restricted] ONLY for designated groups and individuals
©2012 Check Point Software Technologies Ltd.
7
Notes
 In order to have access to the machine during bypass
state, It is required to use the dedicated management
interface on the appliance.
[Restricted] ONLY for designated groups and individuals
©2012 Check Point Software Technologies Ltd.
8