- CheckMates
- :
- Products
- :
- CloudMates Products
- :
- Cloud Network Security
- :
- Discussion
- :
- R80.10 CloudGuard IaaS High Availability for Micro...
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
R80.10 CloudGuard IaaS High Availability for Microsoft Azure
Most current version of this document will be here: Check Point CloudGuard IaaS High Availability for Microsoft Azure R80.10 Deployment Guide
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It was not a routing issue and the cause has finally been sorted.
After validating everything in the document and the setup in Azure the issue was discovered to be Anti-Spoofing.
The documentation states that Anti-Spoofing should be disabled on the frontend cluster interfaces (eth0). It does not however mention anything about disabling Anti-Spoofing on the backend cluster interfaces (eth1).
After going through the document again this morning I set a log filter for a source of the backend-lb, 168.63.129.16.
After a couple of iterations while working with support we finally came to the conclusion that Anti-Spoofing needed to be disabled on cluster internal interfaces also.
Policy was pushed after disabling Anti-Spoofing and everything started working as expected.
The documentation needs to be updated to also include disabling Anti-Spoofing on eth1.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Anyone know if there is an updated CloudGuard IaaS High Availability for Microsoft Azure guide for R80.20 release? I deployed a R80.20 IAAS Cluster and traffic to VM hosts behind the Azure gateway is not working Using a test VM host I started a tcpdump looking for traffic. The VM host responds to packets but the CP security gateway never sees the return packet.
I have been through this document several times trying to see what I may have missed but everything seems to be configured per the document.
I think the issue is somewhere between the load balancer and the CP security gateway but have figured that maybe an updated version may help me figure it out.
Any one else having this issue?
Thanks!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
That sounds like more a routing issue only..
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It was not a routing issue and the cause has finally been sorted.
After validating everything in the document and the setup in Azure the issue was discovered to be Anti-Spoofing.
The documentation states that Anti-Spoofing should be disabled on the frontend cluster interfaces (eth0). It does not however mention anything about disabling Anti-Spoofing on the backend cluster interfaces (eth1).
After going through the document again this morning I set a log filter for a source of the backend-lb, 168.63.129.16.
After a couple of iterations while working with support we finally came to the conclusion that Anti-Spoofing needed to be disabled on cluster internal interfaces also.
Policy was pushed after disabling Anti-Spoofing and everything started working as expected.
The documentation needs to be updated to also include disabling Anti-Spoofing on eth1.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The above link looks like broken