<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CloudGuard AppSec Workshop: Step-by-Step Guide in WAF</title>
    <link>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-Workshop-Step-by-Step-Guide/m-p/250666#M328</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;We don't have a dedicated image for a KVM platform. Still, you can use our single-container deployment, which brings the functionality of the CloudGuard WAG agent and a managed NGINX environment, just like the AWS/Azure/VMWare deployments, as a "gateway".&lt;/P&gt;
&lt;P&gt;Find more information here:&amp;nbsp;&lt;A href="https://waf-doc.inext.checkpoint.com/getting-started/deploy-enforcement-point/docker/single-docker" target="_blank"&gt;Single Docker | CloudGuard WAF&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 05 Jun 2025 06:30:32 GMT</pubDate>
    <dc:creator>yuvalmamka</dc:creator>
    <dc:date>2025-06-05T06:30:32Z</dc:date>
    <item>
      <title>CloudGuard AppSec Workshop: Step-by-Step Guide</title>
      <link>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-Workshop-Step-by-Step-Guide/m-p/161957#M84</link>
      <description>&lt;P&gt;Hi to all CloudGuarders&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;&lt;BR /&gt;It was a great pleasure to meet some of you from America and Europe in our CloudGuard AppSec workshops!&lt;BR /&gt;I had a great time deploying AppSec with you and answering questions.&lt;BR /&gt;Can't wait to meet the rest of you from Europe and APAC this coming week as well!&lt;/P&gt;
&lt;P&gt;As promised, I'm posting here a step-by-step guide for the actions we did in the workshop.&lt;BR /&gt;Please note that the demo applications are live and you can use them for practice, but the labs are not - so you will need to use your own Azure subscription.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Prerequisites:&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Login to Azure Portal at: &lt;A title="Azure Portal" href="http://portal.azure.com" target="_blank" rel="noopener"&gt;portal.azure.com&lt;/A&gt; (create a new tenant in case you don't have one)&lt;/LI&gt;
&lt;LI&gt;Login to Infinity Portal at: &lt;A title="Infinity Portal" href="https://portal.checkpoint.com" target="_blank" rel="noopener"&gt;portal.checkpoint.com&lt;/A&gt;&amp;nbsp;(create a new tenant in case you don't have one)&lt;/LI&gt;
&lt;LI&gt;Download the files from this Dropbox folder: &lt;A href="https://bit.ly/46stZqb" target="_blank"&gt;&lt;SPAN&gt;https://bit.ly/46stZqb&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;(or you can find them attached in the comments)&lt;/LI&gt;
&lt;LI&gt;Review the architecture documents (located in the Dropbox folder)&lt;/LI&gt;
&lt;LI&gt;Deploy a demo website to protect using this post:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Application-Security/Vulnerable-applications-for-testing-Guide/td-p/162631" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Application-Security/Vulnerable-applications-for-testing-Guide/td-p/162631&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Deploy AppSec Single Gateway:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;U&gt;Create a New Profile&lt;/U&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Inside Infinity Portal, click on &lt;STRONG&gt;Cloud&lt;/STRONG&gt; tab --&amp;gt; &lt;STRONG&gt;Profiles&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Create a &lt;STRONG&gt;New Profile&amp;nbsp;&lt;/STRONG&gt;--&amp;gt;&amp;nbsp;&lt;STRONG&gt;AppSec Gateway Profile&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Type in the Basics: Name, Tags (Optional), and Environment (In our case, choose Azure)&lt;/LI&gt;
&lt;LI&gt;Adjust the Authentication part: Under SSL Certificates, choose:&amp;nbsp;&lt;STRONG&gt;In &lt;/STRONG&gt;&lt;STRONG&gt;AppSec Gateway local storage&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Copy the token and move on the Azure Portal&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_4-1668349657322.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18399iDA9F15A5E1386F20/image-size/large?v=v2&amp;amp;px=999" role="button" title="yuvalmamka_4-1668349657322.png" alt="yuvalmamka_4-1668349657322.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Deploy CloudGuard AppSec Gateway on Azure&lt;/U&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Inside Azure Portal, use the top search bar and type: &lt;STRONG&gt;Marketplace&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Inside Azure Marketplace, use the inner search bar and look for: &lt;STRONG&gt;CloudGuard AppSec&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Click on &lt;STRONG&gt;Create &lt;/STRONG&gt;--&amp;gt;&amp;nbsp;&lt;STRONG&gt;CloudGuard AppSec &lt;/STRONG&gt;&lt;STRONG&gt;Single &lt;/STRONG&gt;&lt;STRONG&gt;Gateway&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Now, the deployment wizard is opened, and we need to fill in the information:&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Basics:&amp;nbsp;&lt;/STRONG&gt;Choose the relevant subscription (in the lab it's the default one), resource group (you can use an existing one if it's empty or create a new one), region (you can choose the closest one to you or stay with default - note that the Key Vault should be located within the same region!), choose Scale Set name, leave the allow access from as default, choose a password for the gateway and paste the token you copied from the Profile page. Leave the Fog address empty. Click &lt;STRONG&gt;Next: VM Settings&lt;BR /&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_1-1668349614572.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18398i92EB50DC98F1928F/image-size/large?v=v2&amp;amp;px=999" role="button" title="yuvalmamka_1-1668349614572.png" alt="yuvalmamka_1-1668349614572.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/OL&gt;
&lt;OL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;VM Settings:&amp;nbsp;&lt;/STRONG&gt;Basically, we will leave all of this part as default. For those of you who want additional information on this part - At first, you can the virtual machine size. Then, you can choose if you wish to assign public IPs to the gateways (for workshop purposes, leave it on Yes), and you have the load balancer configuration options. Click &lt;STRONG&gt;Next: Network settings&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_2-1668349614575.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18397iEDC4DC461F6FD525/image-size/large?v=v2&amp;amp;px=999" role="button" title="yuvalmamka_2-1668349614575.png" alt="yuvalmamka_2-1668349614575.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/OL&gt;
&lt;OL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Network Settings:&amp;nbsp;&lt;/STRONG&gt;Here you will need to choose a VNET that AppSec will use. Note that the External Subnet must have a connection to the Internet. Usually, inside the Internal Subnets, we will have our applications. &lt;BR /&gt;For this workshop, our applications are from outside of the VNET. Click: &lt;STRONG&gt;Next: Review + Create&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="yuvalmamka_3-1668349614576.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18396i12427A7D5CF46564/image-size/large?v=v2&amp;amp;px=999" role="button" title="yuvalmamka_3-1668349614576.png" alt="yuvalmamka_3-1668349614576.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/OL&gt;
&lt;OL&gt;
&lt;UL&gt;
&lt;LI&gt;Once the Validation of the wizard is passed, click on&amp;nbsp;&lt;STRONG&gt;Create&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Deploy AppSec VMSS Gateway:&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Create a New Profile&lt;/U&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Inside Infinity Portal, click on &lt;STRONG&gt;Cloud&lt;/STRONG&gt; tab --&amp;gt; &lt;STRONG&gt;Profiles&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Create a &lt;STRONG&gt;New Profile&amp;nbsp;&lt;/STRONG&gt;--&amp;gt;&amp;nbsp;&lt;STRONG&gt;AppSec Gateway Profile&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Type in the Basics: Name, Tags (Optional), and Environment (In our case, choose Azure)&lt;/LI&gt;
&lt;LI&gt;Adjust the Authentication part: Under SSL Certificates, choose:&amp;nbsp;&lt;STRONG&gt;In Azure Key Vault&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Copy the token and move on the Azure Portal&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NewProfile.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18393i0EF2F0E42849097C/image-size/large?v=v2&amp;amp;px=999" role="button" title="NewProfile.PNG" alt="NewProfile.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Deploy CloudGuard AppSec Gateway on Azure&lt;/U&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Inside Azure Portal, use the top search bar and type: &lt;STRONG&gt;Marketplace&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Inside Azure Marketplace, use the inner search bar and look for: &lt;STRONG&gt;CloudGuard AppSec&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Click on &lt;STRONG&gt;Create &lt;/STRONG&gt;--&amp;gt;&amp;nbsp;&lt;STRONG&gt;CloudGuard AppSec Gateway: VMSS&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Now, the deployment wizard is opened and we need to fill in the information:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Basics:&amp;nbsp;&lt;/STRONG&gt;Choose the relevant subscription (in the lab it's the default one), resource group (you can use an existing one if it's empty or create a new one), region (you can choose the closest one to you or stay with default - note that the Key Vault should be located within the same region!), choose Scale Set name, leave the allow access from as default, choose a password for the gateway and paste the token you copied from the Profile page. Leave the Fog address and the Administrator email address empty. Click &lt;STRONG&gt;Next: VMSS Settings&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BasicsTab.PNG" style="width: 720px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18384i2D310B69A61FD7A1/image-size/large?v=v2&amp;amp;px=999" role="button" title="BasicsTab.PNG" alt="BasicsTab.PNG" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;VMSS Settings:&amp;nbsp;&lt;/STRONG&gt;Basically, we will leave all of this part as default. For those of you who want additional information on this part - At first, you can choose the number of availability zone for your VMSS (it depends on the region you chose and on pricing), the number of initial machines, and the maximum number of machines.&lt;BR /&gt;Then, you can choose if you wish to assign public IPs to the gateways (for workshop purposes, leave it on Yes), and you have the load balancer configuration options. Click &lt;STRONG&gt;Next: Network settings&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VMSSSettings.PNG" style="width: 716px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18385iC1989E8E555E1A92/image-size/large?v=v2&amp;amp;px=999" role="button" title="VMSSSettings.PNG" alt="VMSSSettings.PNG" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Network Settings:&amp;nbsp;&lt;/STRONG&gt;Here you will need to choose a VNET that AppSec will use. Note that the External Subnet must have a connection to the Internet. Usually, inside the Internal Subnets, we will have our applications. &lt;BR /&gt;For this workshop, our applications are from outside of the VNET. Click: &lt;STRONG&gt;Next:&amp;nbsp;HTTPS Settings&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NetworkSettings.PNG" style="width: 712px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18387iB63DDB95CC834640/image-size/large?v=v2&amp;amp;px=999" role="button" title="NetworkSettings.PNG" alt="NetworkSettings.PNG" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;HTTPS Settings:&amp;nbsp;&lt;/STRONG&gt;In this part, we can choose whether we want to use HTTPS traffic in AppSec for our assets, and if we do - we need to use Azure Key Vault. I can choose to use an existing Key Vault or create a new one. &lt;BR /&gt;For this workshop, we will choose: Create a new Azure Key Vault and upload certificates.&amp;nbsp;&lt;BR /&gt;First, choose a unique name for the Key Vault and choose 2 as the number of certificates to upload.&lt;BR /&gt;The first certificate we will upload is "Exploit.pfx" (located in the Dropbox folder), feel in description and type in the certificate password (located in the "pfx password.txt" file. Then, we will repeat this stage with "Workshop.pfx" certificate. Click &lt;STRONG&gt;Next: Review + Create&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="HTTPSSettings.PNG" style="width: 714px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18388i2064D9A66B3741BF/image-size/large?v=v2&amp;amp;px=999" role="button" title="HTTPSSettings.PNG" alt="HTTPSSettings.PNG" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;LI&gt;Once the Validation of the wizard is passed, click on&amp;nbsp;&lt;STRONG&gt;Create&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Create the Assets on Infinity Portal&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Do this part twice - one for Exploit and one for Workshop.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Click on&amp;nbsp;&lt;STRONG&gt;Cloud&lt;/STRONG&gt; tab --&amp;gt;&amp;nbsp;&lt;STRONG&gt;Assets&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Create &lt;STRONG&gt;New&lt;/STRONG&gt; asset --&amp;gt;&amp;nbsp;&lt;STRONG&gt;Web Application&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Follow the wizard and complete the information:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Application:&lt;/STRONG&gt; Type in the asset name, add tags (optional), add the web application URLs (for Exploit:&amp;nbsp;&lt;A href="http://exploit.cpptest.net," target="_blank" rel="noopener"&gt;http://exploit.cpptest.net,&lt;/A&gt; &lt;A href="https://exploit.cpptest.net" target="_blank" rel="noopener"&gt;https://exploit.cpptest.net&lt;/A&gt;&amp;nbsp;; for Workshop:&amp;nbsp;&amp;nbsp;&lt;A href="http://workshop.cpptest.net," target="_blank" rel="noopener"&gt;http://workshop.cpptest.net,&lt;/A&gt; &lt;A href="https://workshop.cpptest.net" target="_blank" rel="noopener"&gt;https://workshop.cpptest.net&lt;/A&gt;), and then, add the reverse proxy IP address (The public IP of the webserver hosting the demo sites). Click Next.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Application.PNG" style="width: 850px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18389iBBAFB10B8875DED8/image-size/large?v=v2&amp;amp;px=999" role="button" title="Application.PNG" alt="Application.PNG" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Practices:&lt;/STRONG&gt; In this window, we are able to choose what is the mode that AppSec will be on - Learn / Detect or Prevent.&lt;BR /&gt;The best practice is to deploy AppSec on Learn / Detect mode for about 2 weeks, in order for the ML to be able to learn properly your assets and avoid false positives. Click Next.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Practices.PNG" style="width: 854px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18390i71850869AA3A894E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Practices.PNG" alt="Practices.PNG" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Learning:&amp;nbsp;&lt;/STRONG&gt;Here we can choose how we will distinguish between users based on http requests. For the workshop purposes, we will choose:&amp;nbsp;&lt;STRONG&gt;Source IP address&lt;/STRONG&gt;. Click Next.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Learning.PNG" style="width: 849px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18391iE7B335AAC8C69973/image-size/large?v=v2&amp;amp;px=999" role="button" title="Learning.PNG" alt="Learning.PNG" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;
&lt;DIV class="picker-container source-identifier"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Platform:&lt;/STRONG&gt; Choose&amp;nbsp;&lt;STRONG&gt;Existing Profile&lt;/STRONG&gt; --&amp;gt; the Profile that you created in the previous steps. Click Next.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Platform.PNG" style="width: 856px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18392i6024BCBF4E9B04A3/image-size/large?v=v2&amp;amp;px=999" role="button" title="Platform.PNG" alt="Platform.PNG" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Certificates:&lt;/STRONG&gt; We have already taken care of them. Click Next.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Summary:&amp;nbsp;&lt;/STRONG&gt;Click Done.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U style="font-family: inherit; background-color: #ffffff;"&gt;Surf to your assets via AppSec Single Gateway&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Inside Infinity Portal, click on &lt;STRONG&gt;Cloud&lt;/STRONG&gt; tab --&amp;gt; Assets, and choose one of the assets.&lt;/LI&gt;
&lt;LI&gt;Click on &lt;STRONG&gt;Advanced… &lt;/STRONG&gt;--&amp;gt; Check V on: &lt;STRONG&gt;Redirect incoming HTTP requests to the same URL using HTTPS&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;Enforce&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Change your HOST file in your machine (location: \windows\system32\drivers\etc\hosts) to point exploit.cpptest.net and workshop.cpptest.net to your AppSec VM public IP on Azure (you can find it by searching “Virtual Machines” on Azure Portal).&lt;/LI&gt;
&lt;LI&gt;Use Cert-Verify tool to create .pkg files from the certificates (guide &lt;A href="https://appsec-doc.inext.checkpoint.com/getting-started/deploy-enforcement-point/gateway-virtual-machine/azure/store-certificates-on-gateway" target="_self"&gt;here&lt;/A&gt;). Connect using SSH to the AppSec machine (username: admin, password: as you chose on the deployment wizard) and place both of the files under /etc/certs. In case certs folder is not exists, create it under /etc.&lt;/LI&gt;
&lt;LI&gt;Surf the websites via browser and play with Exploit and Workshop.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Surf to your assets via AppSec VMSS Gateways&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Inside Infinity Portal, click on &lt;STRONG&gt;Cloud&lt;/STRONG&gt; tab --&amp;gt; Assets, and choose one of the assets.&lt;/LI&gt;
&lt;LI&gt;Replace the Profiles to the VMSS profile.&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;Enforce&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Change your HOST file in your machine (location: \windows\system32\drivers\etc\hosts) to point exploit.cpptest.net and workshop.cpptest.net to your Load balancer’s public IP on Azure (you can find it by searching “Load Balancers” on Azure Portal and then click on “Front End Public IP”).&lt;/LI&gt;
&lt;LI&gt;Surf the websites via browser and play with Exploit and Workshop.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That’s it!&lt;/P&gt;
&lt;P&gt;You have implemented both CloudGuard AppSec as a Single Gateway and as a VMSS gateway.&lt;BR /&gt;You created and protected 2 websites and surf them through AppSec inspections.&lt;BR /&gt;Now, you can explore the&amp;nbsp;&lt;STRONG&gt;Monitor&lt;/STRONG&gt; tab and see the traffic and the security events founded.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Dec 2023 15:17:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-Workshop-Step-by-Step-Guide/m-p/161957#M84</guid>
      <dc:creator>yuvalmamka</dc:creator>
      <dc:date>2023-12-24T15:17:10Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard AppSec Workshop: Step-by-Step Guide</title>
      <link>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-Workshop-Step-by-Step-Guide/m-p/161959#M85</link>
      <description>&lt;P&gt;Great Work!!!&lt;/P&gt;</description>
      <pubDate>Sun, 13 Nov 2022 15:16:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-Workshop-Step-by-Step-Guide/m-p/161959#M85</guid>
      <dc:creator>cpclouddemo</dc:creator>
      <dc:date>2022-11-13T15:16:14Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard AppSec Workshop: Step-by-Step Guide</title>
      <link>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-Workshop-Step-by-Step-Guide/m-p/197388#M217</link>
      <description>&lt;P&gt;Hi Yuvalmamka,&lt;/P&gt;&lt;P&gt;Any chance that the&amp;nbsp;&lt;SPAN&gt;files from this Dropbox folder could be made available again?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 10:02:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-Workshop-Step-by-Step-Guide/m-p/197388#M217</guid>
      <dc:creator>Arend</dc:creator>
      <dc:date>2023-11-08T10:02:57Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard AppSec Workshop: Step-by-Step Guide</title>
      <link>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-Workshop-Step-by-Step-Guide/m-p/197389#M218</link>
      <description>&lt;P&gt;attached&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 10:13:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-Workshop-Step-by-Step-Guide/m-p/197389#M218</guid>
      <dc:creator>Shay_Levin</dc:creator>
      <dc:date>2023-11-08T10:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard AppSec Workshop: Step-by-Step Guide</title>
      <link>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-Workshop-Step-by-Step-Guide/m-p/241832#M294</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/80409"&gt;@yuvalmamka&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for sharing this. Can you also share the same for an onprem deployment in an KVM Virtualization environement?&lt;/P&gt;&lt;P&gt;Thanks for your support.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2025 17:49:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-Workshop-Step-by-Step-Guide/m-p/241832#M294</guid>
      <dc:creator>Gerard_Konan</dc:creator>
      <dc:date>2025-02-20T17:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard AppSec Workshop: Step-by-Step Guide</title>
      <link>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-Workshop-Step-by-Step-Guide/m-p/249796#M326</link>
      <description>&lt;P&gt;This is exactly what I was hoping for.&lt;/P&gt;&lt;P&gt;May I ask if you've already implemented it?&amp;nbsp;and if so, could you please share any key considerations or lessons learned when deploying on a &lt;STRONG&gt;KVM platform&lt;/STRONG&gt;?&lt;/P&gt;&lt;P&gt;Additionally, is there any feature in &lt;STRONG&gt;KVM&lt;/STRONG&gt; that functions similarly to &lt;STRONG&gt;Azure VMSS (Virtual Machine Scale Set)&lt;/STRONG&gt; in terms of scalability and Load Balancer?&lt;/P&gt;&lt;P&gt;Your insights would be extremely helpful to us.&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Best Regards.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 May 2025 04:12:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-Workshop-Step-by-Step-Guide/m-p/249796#M326</guid>
      <dc:creator>Mk_83</dc:creator>
      <dc:date>2025-05-26T04:12:53Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard AppSec Workshop: Step-by-Step Guide</title>
      <link>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-Workshop-Step-by-Step-Guide/m-p/250666#M328</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;We don't have a dedicated image for a KVM platform. Still, you can use our single-container deployment, which brings the functionality of the CloudGuard WAG agent and a managed NGINX environment, just like the AWS/Azure/VMWare deployments, as a "gateway".&lt;/P&gt;
&lt;P&gt;Find more information here:&amp;nbsp;&lt;A href="https://waf-doc.inext.checkpoint.com/getting-started/deploy-enforcement-point/docker/single-docker" target="_blank"&gt;Single Docker | CloudGuard WAF&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2025 06:30:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-Workshop-Step-by-Step-Guide/m-p/250666#M328</guid>
      <dc:creator>yuvalmamka</dc:creator>
      <dc:date>2025-06-05T06:30:32Z</dc:date>
    </item>
  </channel>
</rss>

