<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure cloudguard VMSS health probes on 8117 and __monitor__restrictive policy in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-cloudguard-VMSS-health-probes-on-8117-and-monitor/m-p/141601#M1256</link>
    <description>&lt;P&gt;HI,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What is the CME version you are running? Please run&amp;nbsp; on the management&amp;nbsp; &amp;nbsp;'cpinfo -y all'&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 16 Feb 2022 07:25:38 GMT</pubDate>
    <dc:creator>Shay_Levin</dc:creator>
    <dc:date>2022-02-16T07:25:38Z</dc:date>
    <item>
      <title>Azure cloudguard VMSS health probes on 8117 and __monitor__restrictive policy</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-cloudguard-VMSS-health-probes-on-8117-and-monitor/m-p/141582#M1254</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am hitting the following problem with R81.10 management and R81.10 VMSS on Azure. Applying "__Monitor__RestrictivePolicy" out of nowhere.&lt;/P&gt;&lt;P&gt;Cme.log shows "API call failed:set package. Message:: requested object not found" but pushing manually the very same policy is working every time.&amp;nbsp;&lt;/P&gt;&lt;P&gt;On top of that the image of the security gateways is missing "cloud_balancer_port=8117" in fwkern.conf and newly provisioned instances are not returning the health probes, respectively azure load balancer is not sending traffic because thinks they are unhealthy. Adding it manually works for the minimum count of the VMSS but is not scalable automatic solution.&lt;/P&gt;&lt;P&gt;Autoprov_cfg show all seems correct with the right policy and vSec controller is working fine. API status is ready, CME test is passing as also.&lt;/P&gt;&lt;P&gt;Any idea how to proceed? I've opened SR with Checkpoint TAC, but it's been 10 days and no development.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 18:45:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-cloudguard-VMSS-health-probes-on-8117-and-monitor/m-p/141582#M1254</guid>
      <dc:creator>Razotevs</dc:creator>
      <dc:date>2022-02-15T18:45:41Z</dc:date>
    </item>
    <item>
      <title>Re: Azure cloudguard VMSS health probes on 8117 and __monitor__restrictive policy</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-cloudguard-VMSS-health-probes-on-8117-and-monitor/m-p/141598#M1255</link>
      <description>&lt;P&gt;how do you have configured policy package for Restrictive policy? This must be assigned to "all Gateway" and in case if you have global policy, this policy must be without global rules.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 05:31:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-cloudguard-VMSS-health-probes-on-8117-and-monitor/m-p/141598#M1255</guid>
      <dc:creator>Martin_Valenta</dc:creator>
      <dc:date>2022-02-16T05:31:30Z</dc:date>
    </item>
    <item>
      <title>Re: Azure cloudguard VMSS health probes on 8117 and __monitor__restrictive policy</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-cloudguard-VMSS-health-probes-on-8117-and-monitor/m-p/141601#M1256</link>
      <description>&lt;P&gt;HI,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What is the CME version you are running? Please run&amp;nbsp; on the management&amp;nbsp; &amp;nbsp;'cpinfo -y all'&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 07:25:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-cloudguard-VMSS-health-probes-on-8117-and-monitor/m-p/141601#M1256</guid>
      <dc:creator>Shay_Levin</dc:creator>
      <dc:date>2022-02-16T07:25:38Z</dc:date>
    </item>
    <item>
      <title>Re: Azure cloudguard VMSS health probes on 8117 and __monitor__restrictive policy</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-cloudguard-VMSS-health-probes-on-8117-and-monitor/m-p/141605#M1257</link>
      <description>&lt;P&gt;It should be up to date. I've applied the latest jumbo fix. Nothing fancy with the management. Just a standalone 81.10 from the Azure marketplace without multi-domain. The __Monitor__resctrictive_policy is WEB API created with Cleanup rule only and applied to all gateways&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@cpmngmweu:0]# cpinfo -y all&lt;/P&gt;&lt;P&gt;This is Check Point CPinfo Build 914000219 for GAIA&lt;BR /&gt;[IDA]&lt;BR /&gt;No hotfixes..&lt;/P&gt;&lt;P&gt;[MGMT]&lt;BR /&gt;HOTFIX_R81_10_JUMBO_HF_MAIN Take: 30&lt;/P&gt;&lt;P&gt;[CPFC]&lt;BR /&gt;No hotfixes..&lt;/P&gt;&lt;P&gt;[FW1]&lt;BR /&gt;HOTFIX_NGM_DOCTOR_AUTOUPDATE&lt;BR /&gt;HOTFIX_PUBLIC_CLOUD_CA_BUNDLE_AUTOUPDATE&lt;BR /&gt;HOTFIX_R81_10_JUMBO_HF_MAIN Take: 30&lt;BR /&gt;HOTFIX_GOT_MGMT_AUTOUPDATE&lt;BR /&gt;HOTFIX_WEBCONSOLE_AUTOUPDATE&lt;BR /&gt;HOTFIX_GOT_TPCONF_MGMT_AUTOUPDATE&lt;/P&gt;&lt;P&gt;FW1 build number:&lt;BR /&gt;This is Check Point Security Management Server R81.10 - Build 002&lt;BR /&gt;This is Check Point's software version R81.10 - Build 006&lt;/P&gt;&lt;P&gt;[SecurePlatform]&lt;BR /&gt;HOTFIX_R81_10_JUMBO_HF_MAIN Take: 30&lt;/P&gt;&lt;P&gt;[AutoUpdater]&lt;BR /&gt;No hotfixes..&lt;/P&gt;&lt;P&gt;[CPinfo]&lt;BR /&gt;No hotfixes..&lt;/P&gt;&lt;P&gt;[DIAG]&lt;BR /&gt;No hotfixes..&lt;/P&gt;&lt;P&gt;[Reporting Module]&lt;BR /&gt;HOTFIX_R81_10_JUMBO_HF_MAIN Take: 30&lt;/P&gt;&lt;P&gt;[CPuepm]&lt;BR /&gt;HOTFIX_R81_10_JUMBO_HF_MAIN Take: 30&lt;/P&gt;&lt;P&gt;[VSEC]&lt;BR /&gt;HOTFIX_R81_10_JUMBO_HF_MAIN Take: 30&lt;/P&gt;&lt;P&gt;[CPDepCon]&lt;BR /&gt;No hotfixes..&lt;/P&gt;&lt;P&gt;[CPRepMan]&lt;BR /&gt;No hotfixes..&lt;/P&gt;&lt;P&gt;[SmartLog]&lt;BR /&gt;No hotfixes..&lt;/P&gt;&lt;P&gt;[SFWR77CMP]&lt;BR /&gt;No hotfixes..&lt;/P&gt;&lt;P&gt;[SFWR80CMP]&lt;BR /&gt;No hotfixes..&lt;/P&gt;&lt;P&gt;[R77CMP]&lt;BR /&gt;No hotfixes..&lt;/P&gt;&lt;P&gt;[R8040CMP]&lt;BR /&gt;No hotfixes..&lt;/P&gt;&lt;P&gt;[MGMTAPI]&lt;BR /&gt;No hotfixes..&lt;/P&gt;&lt;P&gt;[CPUpdates]&lt;BR /&gt;BUNDLE_CPSDC_AUTOUPDATE Take: 19&lt;BR /&gt;BUNDLE_GENERAL_AUTOUPDATE Take: 12&lt;BR /&gt;BUNDLE_INFRA_AUTOUPDATE Take: 52&lt;BR /&gt;BUNDLE_CME_AUTOUPDATE Take: 181&lt;BR /&gt;BUNDLE_R81.10_SC Take: 335&lt;BR /&gt;BUNDLE_NGM_DOCTOR_AUTOUPDATE Take: 15&lt;BR /&gt;BUNDLE_R81_10_JUMBO_HF_MAIN_SC Take: 14&lt;BR /&gt;BUNDLE_CORE_FILE_UPLOADER_AUTOUPDATE Take: 11&lt;BR /&gt;BUNDLE_DEP_INSTALLER_AUTOUPDATE Take: 23&lt;BR /&gt;BUNDLE_PUBLIC_CLOUD_CA_BUNDLE_AUTOUPDATE Take: 14&lt;BR /&gt;BUNDLE_R81_10_JUMBO_HF_MAIN Take: 30&lt;BR /&gt;BUNDLE_DC_CONTENT_AUTOUPDATE Take: 12&lt;BR /&gt;BUNDLE_GOT_MGMT_AUTOUPDATE Take: 95&lt;BR /&gt;BUNDLE_DC_INFRA_AUTOUPDATE Take: 26&lt;BR /&gt;BUNDLE_WEBCONSOLE_AUTOUPDATE Take: 48&lt;BR /&gt;BUNDLE_HCP_AUTOUPDATE Take: 49&lt;BR /&gt;BUNDLE_GOT_TPCONF_MGMT_AUTOUPDATE Take: 34&lt;/P&gt;&lt;P&gt;[hcp_wrapper]&lt;BR /&gt;HOTFIX_HCP_AUTOUPDATE&lt;/P&gt;&lt;P&gt;[itp_wrapper]&lt;BR /&gt;HOTFIX_GOT_MGMT_AUTOUPDATE&lt;/P&gt;&lt;P&gt;[core_uploader]&lt;BR /&gt;HOTFIX_CHARON_HF&lt;/P&gt;&lt;P&gt;[CME]&lt;BR /&gt;HOTFIX_CME_AUTOUPDATE&lt;/P&gt;&lt;P&gt;[cpsdc_wrapper]&lt;BR /&gt;HOTFIX_CPSDC_AUTOUPDATE&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 07:48:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-cloudguard-VMSS-health-probes-on-8117-and-monitor/m-p/141605#M1257</guid>
      <dc:creator>Razotevs</dc:creator>
      <dc:date>2022-02-16T07:48:53Z</dc:date>
    </item>
    <item>
      <title>Re: Azure cloudguard VMSS health probes on 8117 and __monitor__restrictive policy</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-cloudguard-VMSS-health-probes-on-8117-and-monitor/m-p/141609#M1258</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38150"&gt;@arielto&lt;/a&gt;&amp;nbsp;Can you please take a look?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 08:09:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-cloudguard-VMSS-health-probes-on-8117-and-monitor/m-p/141609#M1258</guid>
      <dc:creator>Shay_Levin</dc:creator>
      <dc:date>2022-02-16T08:09:33Z</dc:date>
    </item>
    <item>
      <title>Re: Azure cloudguard VMSS health probes on 8117 and __monitor__restrictive policy</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-cloudguard-VMSS-health-probes-on-8117-and-monitor/m-p/141638#M1259</link>
      <description>&lt;P&gt;This might point you in the right direction. Tried those errors on Google, but none of the solutions suggested seems to work in my scenario.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@cpmngmweu:0]# tail -n 50 /var/log/CPcme/cme.log&lt;BR /&gt;2022-02-16 13:31:40,712 CME_SERVICE INFO Configuration was not complete&lt;BR /&gt;2022-02-16 13:31:40,712 CME_SERVICE INFO Azure--CPNorthVMSS_0--HUB-NORTHBOUND-WEU state is changed to: UPDATING&lt;BR /&gt;2022-02-16 13:31:40,712 CME_SERVICE INFO SIC has successfully been established between management CPmngm-weu and gateway Azure--CPNorthVMSS_0--HUB-NORTHBOUND-WEU&lt;BR /&gt;2022-02-16 13:31:40,713 CME_SERVICE INFO Resetting gateway Azure--CPNorthVMSS_0--HUB-NORTHBOUND-WEU&lt;BR /&gt;2022-02-16 13:31:41,463 CME_SERVICE INFO Setting policy None on gateway Azure--CPNorthVMSS_0--HUB-NORTHBOUND-WEU&lt;BR /&gt;2022-02-16 13:31:46,042 CME_SERVICE INFO Init IDA blade for gateway: Azure--CPNorthVMSS_0--HUB-NORTHBOUND-WEU&lt;BR /&gt;2022-02-16 13:31:46,742 CME_SERVICE INFO IDA IAAPI portal already configured. skip to next step&lt;BR /&gt;2022-02-16 13:31:46,742 CME_SERVICE INFO IDA authorized clients (local host) already configured. skip to next step&lt;BR /&gt;2022-02-16 13:31:48,895 CME_SERVICE INFO Identity awareness software blade has been successfully added for gateway Azure--CPNorthVMSS_0--HUB-NORTHBOUND-WEU&lt;BR /&gt;2022-02-16 13:31:53,674 CME_SERVICE INFO HTTPS Inspection was successfully set&lt;BR /&gt;2022-02-16 13:32:00,960 CME_SERVICE INFO Setting policy Standart on gateway Azure--CPNorthVMSS_0--HUB-NORTHBOUND-WEU&lt;BR /&gt;2022-02-16 13:32:00,990 CME_SERVICE INFO Resetting gateway Azure--CPNorthVMSS_0--HUB-NORTHBOUND-WEU&lt;BR /&gt;2022-02-16 13:32:02,708 CME_SERVICE INFO Setting policy None on gateway Azure--CPNorthVMSS_0--HUB-NORTHBOUND-WEU&lt;BR /&gt;2022-02-16 13:32:02,708 CME_SERVICE ERROR Failed to provision the gateway instance Azure--CPNorthVMSS_0--HUB-NORTHBOUND-WEU.&lt;BR /&gt;Error details: Management API failure (set-package)..&lt;BR /&gt;2022-02-16 13:32:02,712 CME_SERVICE ERROR Error traceback: Traceback (most recent call last):&lt;BR /&gt;File "/opt/CPcme/service/cme_service.py", line 524, in sync&lt;BR /&gt;instance, gw, auto_hf)&lt;BR /&gt;cme_exceptions.cme_exceptions.ManagementApiException: Error Code: Management API error&lt;/P&gt;&lt;P&gt;API call failed: set-package. Message: : Requested object [Standart] not found&lt;BR /&gt;2022-02-16 13:32:02,712 CME_SERVICE INFO Configuration was not complete&lt;BR /&gt;2022-02-16 13:32:02,712 CME_SERVICE INFO Azure--CPNorthVMSS_1--HUB-NORTHBOUND-WEU state is changed to: UPDATING&lt;BR /&gt;2022-02-16 13:32:02,712 CME_SERVICE INFO SIC has successfully been established between management CPmngm-weu and gateway Azure--CPNorthVMSS_1--HUB-NORTHBOUND-WEU&lt;BR /&gt;2022-02-16 13:32:02,712 CME_SERVICE INFO Resetting gateway Azure--CPNorthVMSS_1--HUB-NORTHBOUND-WEU&lt;BR /&gt;2022-02-16 13:32:03,461 CME_SERVICE INFO Setting policy None on gateway Azure--CPNorthVMSS_1--HUB-NORTHBOUND-WEU&lt;BR /&gt;2022-02-16 13:32:08,167 CME_SERVICE INFO Init IDA blade for gateway: Azure--CPNorthVMSS_1--HUB-NORTHBOUND-WEU&lt;BR /&gt;2022-02-16 13:32:09,246 CME_SERVICE INFO IDA IAAPI portal already configured. skip to next step&lt;BR /&gt;2022-02-16 13:32:09,246 CME_SERVICE INFO IDA authorized clients (local host) already configured. skip to next step&lt;BR /&gt;2022-02-16 13:32:11,484 CME_SERVICE INFO Identity awareness software blade has been successfully added for gateway Azure--CPNorthVMSS_1--HUB-NORTHBOUND-WEU&lt;BR /&gt;2022-02-16 13:32:16,060 CME_SERVICE INFO HTTPS Inspection was successfully set&lt;BR /&gt;2022-02-16 13:32:22,954 CME_SERVICE INFO Setting policy Standart on gateway Azure--CPNorthVMSS_1--HUB-NORTHBOUND-WEU&lt;BR /&gt;2022-02-16 13:32:22,984 CME_SERVICE INFO Resetting gateway Azure--CPNorthVMSS_1--HUB-NORTHBOUND-WEU&lt;BR /&gt;2022-02-16 13:32:23,998 CME_SERVICE INFO Setting policy None on gateway Azure--CPNorthVMSS_1--HUB-NORTHBOUND-WEU&lt;BR /&gt;2022-02-16 13:32:23,999 CME_SERVICE ERROR Failed to provision the gateway instance Azure--CPNorthVMSS_1--HUB-NORTHBOUND-WEU.&lt;BR /&gt;Error details: Management API failure (set-package)..&lt;BR /&gt;2022-02-16 13:32:24,002 CME_SERVICE ERROR Error traceback: Traceback (most recent call last):&lt;BR /&gt;File "/opt/CPcme/service/cme_service.py", line 524, in sync&lt;BR /&gt;instance, gw, auto_hf)&lt;BR /&gt;cme_exceptions.cme_exceptions.ManagementApiException: Error Code: Management API error&lt;/P&gt;&lt;P&gt;API call failed: set-package. Message: : Requested object [Standart] not found&lt;BR /&gt;2022-02-16 13:32:24,002 CME_SERVICE INFO&lt;BR /&gt;2022-02-16 13:32:25,689 CME_SERVICE INFO&lt;BR /&gt;2022-02-16 13:32:25,689 CME_SERVICE INFO The gateways known by the management at the end of the iteration are:&lt;BR /&gt;2022-02-16 13:32:25,689 CME_SERVICE INFO 1: Azure--CPNorthVMSS_0--HUB-NORTHBOUND-WEU managed-virtual-gateway|__once__ - None&lt;BR /&gt;2022-02-16 13:32:25,689 CME_SERVICE INFO 2: Azure--CPNorthVMSS_1--HUB-NORTHBOUND-WEU managed-virtual-gateway|__once__ - None&lt;BR /&gt;2022-02-16 13:32:25,689 CME_SERVICE INFO&lt;BR /&gt;2022-02-16 13:32:25,690 CME_SERVICE INFO ********** End of the iteration number 7 for gateway instances. Iteration time: 0:00:52.196951 **********&lt;BR /&gt;2022-02-16 13:32:25,690 CME_SERVICE INFO&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 11:35:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-cloudguard-VMSS-health-probes-on-8117-and-monitor/m-p/141638#M1259</guid>
      <dc:creator>Razotevs</dc:creator>
      <dc:date>2022-02-16T11:35:21Z</dc:date>
    </item>
    <item>
      <title>Re: Azure cloudguard VMSS health probes on 8117 and __monitor__restrictive policy</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-cloudguard-VMSS-health-probes-on-8117-and-monitor/m-p/141639#M1260</link>
      <description>&lt;P&gt;per log it's looking for package called "Standard", but it cannot find it..&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 11:39:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-cloudguard-VMSS-health-probes-on-8117-and-monitor/m-p/141639#M1260</guid>
      <dc:creator>Martin_Valenta</dc:creator>
      <dc:date>2022-02-16T11:39:16Z</dc:date>
    </item>
    <item>
      <title>Re: Azure cloudguard VMSS health probes on 8117 and __monitor__restrictive policy</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-cloudguard-VMSS-health-probes-on-8117-and-monitor/m-p/141640#M1261</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/72210"&gt;@Razotevs&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Can you please verify the Standar&lt;STRONG&gt;t &lt;/STRONG&gt;package exists in the SmartConsole?&lt;BR /&gt;The default policy package we have is Standar&lt;STRONG&gt;d&amp;nbsp;&lt;/STRONG&gt; and not Standart&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Roman&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 11:41:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-cloudguard-VMSS-health-probes-on-8117-and-monitor/m-p/141640#M1261</guid>
      <dc:creator>Roman_Kats</dc:creator>
      <dc:date>2022-02-16T11:41:17Z</dc:date>
    </item>
    <item>
      <title>Re: Azure cloudguard VMSS health probes on 8117 and __monitor__restrictive policy</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-cloudguard-VMSS-health-probes-on-8117-and-monitor/m-p/141650#M1262</link>
      <description>&lt;P&gt;Thank you for the help all. All the Standart/StandarD got me thinking about it. Now my policy was "Standart" and was manually created by me. Apparently you have StandarD as stated.&lt;/P&gt;&lt;P&gt;After all all those names seems reserved or default or something like that, so I just decided to change the name to something far less controversial and harder to make a mistake. Jut changing the policy to MyName_TEST and all of a sudden CME extension is adding load balancer port = 8117 and pushing __Monitor__restrictive, but few seconds later pushing and the right one from the Autoprovision.json.&lt;/P&gt;&lt;P&gt;Have a great day ahead and thanks&lt;/P&gt;&lt;P&gt;Svetozar&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 12:52:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-cloudguard-VMSS-health-probes-on-8117-and-monitor/m-p/141650#M1262</guid>
      <dc:creator>Razotevs</dc:creator>
      <dc:date>2022-02-16T12:52:34Z</dc:date>
    </item>
  </channel>
</rss>

