<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure R81.20 Cloudguard Cluster Deployment in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-R81-20-Cloudguard-Cluster-Deployment/m-p/185998#M111</link>
    <description>&lt;P&gt;remove the FW Backed Subnet association from the Route Table.&lt;/P&gt;
&lt;P&gt;I think it creates a loop and anyway , it shouldn't be associated to the peered vNets route tables.&lt;/P&gt;</description>
    <pubDate>Mon, 10 Jul 2023 05:44:14 GMT</pubDate>
    <dc:creator>Nir_Shamir</dc:creator>
    <dc:date>2023-07-10T05:44:14Z</dc:date>
    <item>
      <title>Azure R81.20 Cloudguard Cluster Deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-R81-20-Cloudguard-Cluster-Deployment/m-p/184405#M108</link>
      <description>&lt;P&gt;Deploying R81.20 cloudguard cluster using the following IAC.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://github.com/CheckPointSW/CloudGuardIaaS/tree/master/terraform/azure/high-availability-existing-vnet" target="_blank"&gt;https://github.com/CheckPointSW/CloudGuardIaaS/tree/master/terraform/azure/high-availability-existing-vnet&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Unable to ping, SSH, webUI, or SIC the gateways post-deployment for some reason.&lt;/P&gt;
&lt;P&gt;When accessing devices via Azure serial console, the devices have internet connectivity. Both are running the initial policy.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are no NSGs associated with the VNETs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm deploying the gateways in to an existing /29 ip public prefix. But have also tried deploying using random Azure assigned public IP addresses, and creating an ip public prefix as part of the deployment.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First time I've encountered this problem post-deployment.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2023 05:25:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-R81-20-Cloudguard-Cluster-Deployment/m-p/184405#M108</guid>
      <dc:creator>Simon_Macpherso</dc:creator>
      <dc:date>2023-06-21T05:25:58Z</dc:date>
    </item>
    <item>
      <title>Re: Azure R81.20 Cloudguard Cluster Deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-R81-20-Cloudguard-Cluster-Deployment/m-p/184440#M109</link>
      <description>&lt;P&gt;Associate NSG's to the vNets.&lt;/P&gt;
&lt;P&gt;Azure has Any Drop until you associate an NSG and allow traffic , specifically for Standard SKUs&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2023 12:25:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-R81-20-Cloudguard-Cluster-Deployment/m-p/184440#M109</guid>
      <dc:creator>Nir_Shamir</dc:creator>
      <dc:date>2023-06-21T12:25:05Z</dc:date>
    </item>
    <item>
      <title>Re: Azure R81.20 Cloudguard Cluster Deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-R81-20-Cloudguard-Cluster-Deployment/m-p/185261#M110</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1792"&gt;@Nir_Shamir&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have another issue whereby&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;I have provisioned a test VM in another VNET to test egress connectivity&lt;/LI&gt;
&lt;LI&gt;The VM VNET and FW backend VNETs have been associated with the internal routable&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;The required routes have been added to the internal routable- default route is 0.0.0.0/0 with next hop IP the&amp;nbsp;&lt;SPAN&gt;backend lb&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Per the documentation, the 3 required routes are as follows.&lt;/P&gt;
&lt;P&gt;default_route 0.0.0.0/0&amp;nbsp;&lt;SPAN&gt;VirtualAppliance&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;172.18.0.69 (backend-lb)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;vm-01-vnet-local&amp;nbsp;172.19.0.0/24 VNetLocal&lt;/P&gt;
&lt;P&gt;vm-01-vnet-other-subnets&amp;nbsp;&lt;SPAN&gt;172.18.0.0/26&amp;nbsp;VirtualAppliance&amp;nbsp;172.18.0.69 (backend-lb)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;VNET peering has been setup between the VM VNET and the connectivity VNET (VNET FW subnets reside in).&lt;/LI&gt;
&lt;LI&gt;Static route to internal subnet has been configured on each gateway i.e.&amp;nbsp;&lt;BR /&gt;set static-route &amp;lt;Virtual-Network-IP-address/Prefix&amp;gt; nexthop gateway address &amp;lt;eth1-router-IP-address&amp;gt; on&lt;/LI&gt;
&lt;LI&gt;Anti-spoofing has been disabled on both eth0 and eth1 interfaces&lt;/LI&gt;
&lt;LI&gt;In Smart Console, a test VM object has been created and allowed access in policy, outbound NAT has been configured translating source to frontend eth0 external private IP.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I can see traffic hitting the active member including the a reply. But the on the VM the ICMP requests are timing out.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[Expert@checkpoint-cloudguard-ha1:0]# tcpdump -nnnei any host 172.19.0.4 and host 1.1.1.1&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes&lt;BR /&gt;06:14:29.364296 In fc:bd:67:89:19:6e ethertype IPv4 (0x0800), length 76: 172.19.0.4 &amp;gt; 1.1.1.1: ICMP echo request, id 1, seq 352, length 40&lt;BR /&gt;06:14:29.366766 Out 00:0d:3a:66:8a:a3 ethertype IPv4 (0x0800), length 76: 1.1.1.1 &amp;gt; 172.19.0.4: ICMP echo reply, id 1, seq 352, length 40&lt;BR /&gt;06:14:29.366785 Out 00:0d:3a:66:8a:a3 ethertype IPv4 (0x0800), length 76: 1.1.1.1 &amp;gt; 172.19.0.4: ICMP echo reply, id 1, seq 352, length 40&lt;BR /&gt;06:14:34.107158 In fc:bd:67:89:19:6e ethertype IPv4 (0x0800), length 76: 172.19.0.4 &amp;gt; 1.1.1.1: ICMP echo request, id 1, seq 353, length 40&lt;BR /&gt;06:14:34.109671 Out 00:0d:3a:66:8a:a3 ethertype IPv4 (0x0800), length 76: 1.1.1.1 &amp;gt; 172.19.0.4: ICMP echo reply, id 1, seq 353, length 40&lt;BR /&gt;06:14:34.109692 Out 00:0d:3a:66:8a:a3 ethertype IPv4 (0x0800), length 76: 1.1.1.1 &amp;gt; 172.19.0.4: ICMP echo reply, id 1, seq 353, length 40&lt;/P&gt;
&lt;P&gt;&lt;!--StartFragment --&gt;&lt;SPAN class="cf0"&gt;fw monitor -w -F &amp;lt;172.19.0.4&amp;gt;,0,&amp;lt;1.1.1.1&amp;gt;,0,0 -F &amp;lt;1.1.1.1&amp;gt;,0,&amp;lt;172.19.0.4&amp;gt;,0,0&lt;/SPAN&gt;&lt;!--EndFragment --&gt;&lt;/P&gt;
&lt;P&gt;[vs_0][ppak_0] eth1:i[60]: 172.19.0.4 -&amp;gt; 1.1.1.1 (ICMP) len=60 id=44093&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=356&lt;BR /&gt;[vs_0][fw_2] eth1:i[60]: 172.19.0.4 -&amp;gt; 1.1.1.1 (ICMP) len=60 id=44093&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=356&lt;BR /&gt;[vs_0][fw_2] eth1:I[60]: 172.19.0.4 -&amp;gt; 1.1.1.1 (ICMP) len=60 id=44093&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=356&lt;BR /&gt;[vs_0][fw_2] eth0:o[60]: 172.19.0.4 -&amp;gt; 1.1.1.1 (ICMP) len=60 id=44093&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=356&lt;BR /&gt;[vs_0][fw_2] eth0:I[60]: 1.1.1.1 -&amp;gt; 172.19.0.4 (ICMP) len=60 id=55497&lt;BR /&gt;ICMP: type=0 code=0 echo reply id=1 seq=356&lt;BR /&gt;[vs_0][fw_2] eth1:o[60]: 1.1.1.1 -&amp;gt; 172.19.0.4 (ICMP) len=60 id=55497&lt;BR /&gt;ICMP: type=0 code=0 echo reply id=1 seq=356&lt;BR /&gt;[vs_0][fw_2] eth1:O[60]: 1.1.1.1 -&amp;gt; 172.19.0.4 (ICMP) len=60 id=55497&lt;BR /&gt;ICMP: type=0 code=0 echo reply id=1 seq=356&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jun 2023 07:04:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-R81-20-Cloudguard-Cluster-Deployment/m-p/185261#M110</guid>
      <dc:creator>Simon_Macpherso</dc:creator>
      <dc:date>2023-06-30T07:04:50Z</dc:date>
    </item>
    <item>
      <title>Re: Azure R81.20 Cloudguard Cluster Deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-R81-20-Cloudguard-Cluster-Deployment/m-p/185998#M111</link>
      <description>&lt;P&gt;remove the FW Backed Subnet association from the Route Table.&lt;/P&gt;
&lt;P&gt;I think it creates a loop and anyway , it shouldn't be associated to the peered vNets route tables.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 05:44:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-R81-20-Cloudguard-Cluster-Deployment/m-p/185998#M111</guid>
      <dc:creator>Nir_Shamir</dc:creator>
      <dc:date>2023-07-10T05:44:14Z</dc:date>
    </item>
  </channel>
</rss>

