<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Deep Dive - Azure Gateway Load Balancer and CloudGaurd AutoScale Integration in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Deep-Dive-Azure-Gateway-Load-Balancer-and-CloudGaurd-AutoScale/m-p/136402#M1206</link>
    <description>&lt;P&gt;Hi Shay,&lt;/P&gt;&lt;P&gt;Thanks for this Deep-dive session.&lt;/P&gt;&lt;P&gt;If in case I deploy CG (Cluster or VMSS) and place below FrontendLB so that it can protect internal Webservers - what difference it makes rather than creating GLB with CG pools as described?&lt;/P&gt;&lt;P&gt;Still we can perform E-W or N-S traffic inspection if CG placed below FrontendLB.&lt;/P&gt;&lt;P&gt;Whats the advantage of this New topology compared to&amp;nbsp;CG placed below FrontendLB.&lt;/P&gt;&lt;P&gt;Regards, Prabu&lt;/P&gt;</description>
    <pubDate>Wed, 15 Dec 2021 11:16:52 GMT</pubDate>
    <dc:creator>Prabulingam_N1</dc:creator>
    <dc:date>2021-12-15T11:16:52Z</dc:date>
    <item>
      <title>Deep Dive - Azure Gateway Load Balancer and CloudGaurd AutoScale Integration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Deep-Dive-Azure-Gateway-Load-Balancer-and-CloudGaurd-AutoScale/m-p/135920#M1205</link>
      <description>&lt;P&gt;&lt;FONT size="4"&gt;The new Azure GWLB service simplified the network architecture and allow you to easily get security services using third-party virtual appliances.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;Check the Deep Dive video below for a deep dive walkthrough&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2Fy7g4vFmLgbA%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dy7g4vFmLgbA&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2Fy7g4vFmLgbA%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="200" height="112" scrolling="no" title="Azure Gateway Load Balancer and CloudGuard Integration Deep Dive - Deployment Walkthrough" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Dec 2021 13:48:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Deep-Dive-Azure-Gateway-Load-Balancer-and-CloudGaurd-AutoScale/m-p/135920#M1205</guid>
      <dc:creator>Shay_Levin</dc:creator>
      <dc:date>2021-12-09T13:48:52Z</dc:date>
    </item>
    <item>
      <title>Re: Deep Dive - Azure Gateway Load Balancer and CloudGaurd AutoScale Integration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Deep-Dive-Azure-Gateway-Load-Balancer-and-CloudGaurd-AutoScale/m-p/136402#M1206</link>
      <description>&lt;P&gt;Hi Shay,&lt;/P&gt;&lt;P&gt;Thanks for this Deep-dive session.&lt;/P&gt;&lt;P&gt;If in case I deploy CG (Cluster or VMSS) and place below FrontendLB so that it can protect internal Webservers - what difference it makes rather than creating GLB with CG pools as described?&lt;/P&gt;&lt;P&gt;Still we can perform E-W or N-S traffic inspection if CG placed below FrontendLB.&lt;/P&gt;&lt;P&gt;Whats the advantage of this New topology compared to&amp;nbsp;CG placed below FrontendLB.&lt;/P&gt;&lt;P&gt;Regards, Prabu&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 11:16:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Deep-Dive-Azure-Gateway-Load-Balancer-and-CloudGaurd-AutoScale/m-p/136402#M1206</guid>
      <dc:creator>Prabulingam_N1</dc:creator>
      <dc:date>2021-12-15T11:16:52Z</dc:date>
    </item>
    <item>
      <title>Re: Deep Dive - Azure Gateway Load Balancer and CloudGaurd AutoScale Integration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Deep-Dive-Azure-Gateway-Load-Balancer-and-CloudGaurd-AutoScale/m-p/136459#M1207</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;The main advantage of the GWLB solutions is that you don't need to change the source IP address of the packet for ingress traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;So, your webservers will see the client's original source IP address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; With the "regular" scale set deployment, you will need to create a NAT rule that replaces the client's original source IP of the packet with the GW IP address for ingress traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; The second advantage is that it’s effortless to connect vNets to the service and protect them; also, the consumer vNet can be located in a different region and on another tenant.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;With the “regular” scale set / cluster, you will need to create vNet peering and set UDRs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;The disadvantage of the solution is that Azure does not support E/W traffic for now.&lt;/P&gt;
&lt;P&gt;I believe they will solve that limitation soon; as they already got heads up on that.&lt;/P&gt;
&lt;P&gt;I hope I answer your question&lt;/P&gt;
&lt;P&gt;--Shay&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 18:06:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Deep-Dive-Azure-Gateway-Load-Balancer-and-CloudGaurd-AutoScale/m-p/136459#M1207</guid>
      <dc:creator>Shay_Levin</dc:creator>
      <dc:date>2021-12-15T18:06:05Z</dc:date>
    </item>
    <item>
      <title>Re: Deep Dive - Azure Gateway Load Balancer and CloudGaurd AutoScale Integration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Deep-Dive-Azure-Gateway-Load-Balancer-and-CloudGaurd-AutoScale/m-p/136492#M1208</link>
      <description>&lt;P&gt;Hello Shay,&lt;/P&gt;&lt;P&gt;Hope E/W traffic can be covered in future.&lt;/P&gt;&lt;P&gt;Thanks for explanation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards, Prabu&lt;/P&gt;</description>
      <pubDate>Thu, 16 Dec 2021 05:49:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Deep-Dive-Azure-Gateway-Load-Balancer-and-CloudGaurd-AutoScale/m-p/136492#M1208</guid>
      <dc:creator>Prabulingam_N1</dc:creator>
      <dc:date>2021-12-16T05:49:54Z</dc:date>
    </item>
    <item>
      <title>Re: Deep Dive - Azure Gateway Load Balancer and CloudGaurd AutoScale Integration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Deep-Dive-Azure-Gateway-Load-Balancer-and-CloudGaurd-AutoScale/m-p/190652#M1209</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/12733"&gt;@Shay_Levin&lt;/a&gt;,&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;I have tried&amp;nbsp; &lt;SPAN&gt;GLB&amp;nbsp;with CG ,&amp;nbsp; Seems solution is not working in Azure platform .&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;I can inbound traffic reaching till firewall&amp;nbsp; but there us no response from firewall&amp;nbsp; .&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;tcpdump is able to capture the inbound packets&amp;nbsp; but same is not getting captured with fw monitor.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; fw ctl zdebug + drop doen't show any drops&amp;nbsp; and for same traffic logs are also not reflecting on smart console.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Interface config :&amp;nbsp;&lt;BR /&gt;[Expert@cicppocgw0:0]# tcpdump -nni vxlan801&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on vxlan801, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;09:29:43.831533 IP 165.225.124.115.49471 &amp;gt; 20.235.104.161.443: Flags [S], seq 3719711221, win 65535, options [mss 1460,sackOK,eol], length 0&lt;BR /&gt;09:29:43.832747 IP 165.225.124.115.49470 &amp;gt; 20.235.104.161.443: Flags [S], seq 3413802471, win 65535, options [mss 1460,sackOK,eol], length 0&lt;BR /&gt;09:29:44.494574 IP 123.129.217.197.6028 &amp;gt; 20.235.104.161.23: Flags [S], seq 350972065, win 24524, length 0&lt;BR /&gt;09:29:46.244334 IP 193.57.40.49.49030 &amp;gt; 20.235.104.161.13899: Flags [S], seq 519229892, win 1024, length 0&lt;BR /&gt;^C&lt;BR /&gt;4 packets captured&lt;BR /&gt;4 packets received by filter&lt;BR /&gt;0 packets dropped by kernel&lt;BR /&gt;[Expert@cicppocgw0:0]# ^C&lt;BR /&gt;[Expert@cicppocgw0:0]# tcpdump -nni vxlan801&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on vxlan801, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;^C&lt;BR /&gt;0 packets captured&lt;BR /&gt;0 packets received by filter&lt;BR /&gt;0 packets dropped by kernel&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Tcpdump ;&lt;BR /&gt;=======&lt;BR /&gt;[Expert@cicppocgw0:0]# tcpdump -nni vxlan801&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on vxlan801, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;09:29:43.831533 IP 165.225.124.115.49471 &amp;gt; 20.235.104.161.443: Flags [S], seq 3719711221, win 65535, options [mss 1460,sackOK,eol], length 0&lt;BR /&gt;09:29:43.832747 IP 165.225.124.115.49470 &amp;gt; 20.235.104.161.443: Flags [S], seq 3413802471, win 65535, options [mss 1460,sackOK,eol], length 0&lt;BR /&gt;09:29:44.494574 IP 123.129.217.197.6028 &amp;gt; 20.235.104.161.23: Flags [S], seq 350972065, win 24524, length 0&lt;BR /&gt;09:29:46.244334 IP 193.57.40.49.49030 &amp;gt; 20.235.104.161.13899: Flags [S], seq 519229892, win 1024, length 0&lt;BR /&gt;&lt;BR /&gt;==============&lt;BR /&gt;fw monitor&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;=====&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;[Expert@cicppocgw0:0]# fw monitor -e "host(20.235.104.161),accept;"&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitor_kiss_enable&lt;BR /&gt;PPAK 0: Get before set operation succeeded of simple_debug_filter_off&lt;BR /&gt;PPAK 0: Get before set operation succeeded of kiss_debug_force_kdprintf_enable&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitorfreebufs&lt;BR /&gt;************************************************************** NOTE **************************************************************&lt;BR /&gt;*** Using "-e" filter will not monitor accelerated traffic. To monitor and filter accelerated traffic please use the "-F" filter ***&lt;BR /&gt;************************************************************************************************************************************&lt;BR /&gt;FW monitor will record only ip &amp;amp; transport layers in a packet&lt;BR /&gt;For capturing the whole packet please do -w&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitor_ppak_all_position&lt;BR /&gt;monitor: getting filter (from command line)&lt;BR /&gt;monitor: compiling&lt;BR /&gt;monitorfilter:&lt;BR /&gt;Compiled OK.&lt;BR /&gt;monitor: loading&lt;BR /&gt;monitor: monitoring (control-C to stop)&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitormaxpacket&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitormask&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitorallocbufs&lt;BR /&gt;PPAK 0: Get before set operation succeeded of printuuid&lt;/P&gt;&lt;P&gt;================&lt;/P&gt;&lt;P&gt;[Expert@cicppocgw0:0]# fw ctl zdebug drop | grep 20.235.104.161&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Aug 2023 04:03:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Deep-Dive-Azure-Gateway-Load-Balancer-and-CloudGaurd-AutoScale/m-p/190652#M1209</guid>
      <dc:creator>sumeetkashyap</dc:creator>
      <dc:date>2023-08-26T04:03:54Z</dc:date>
    </item>
    <item>
      <title>Re: Deep Dive - Azure Gateway Load Balancer and CloudGaurd AutoScale Integration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Deep-Dive-Azure-Gateway-Load-Balancer-and-CloudGaurd-AutoScale/m-p/190871#M1210</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have just deployed it last week, didn't have any issue.&lt;/P&gt;
&lt;P&gt;i guess some kind of configuration issue.&lt;/P&gt;
&lt;P&gt;Drop me an email &lt;A href="mailto:shayl@checkpoint.com" target="_blank"&gt;shayl@checkpoint.com&lt;/A&gt;&amp;nbsp;, let's schedule a zoom call to solve it out&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 10:47:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Deep-Dive-Azure-Gateway-Load-Balancer-and-CloudGaurd-AutoScale/m-p/190871#M1210</guid>
      <dc:creator>Shay_Levin</dc:creator>
      <dc:date>2023-08-29T10:47:10Z</dc:date>
    </item>
  </channel>
</rss>

