<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cloudguard IAAS Routing doubt and S2S VPN in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-IAAS-Routing-doubt-and-S2S-VPN/m-p/130917#M1294</link>
    <description>&lt;P&gt;Hi Nir,&lt;/P&gt;&lt;P&gt;Thanks for the reply; now regarding public IP do we get VIP as well for public IP adress? and those needs to be defined in Topology as well?&lt;/P&gt;</description>
    <pubDate>Mon, 04 Oct 2021 09:31:04 GMT</pubDate>
    <dc:creator>Blason_R</dc:creator>
    <dc:date>2021-10-04T09:31:04Z</dc:date>
    <item>
      <title>Cloudguard IAAS Routing doubt and S2S VPN</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-IAAS-Routing-doubt-and-S2S-VPN/m-p/130899#M1292</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just a confusion about routing in Azure and would really appreicate if someone can help me on the doubt&lt;/P&gt;&lt;P&gt;I am going to setup Check Point cluster in Azure which will have&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;VNET - 10.1.0.0/16&lt;/LI&gt;&lt;LI&gt;FE Subnet - 10.1.1.0/24&lt;/LI&gt;&lt;LI&gt;BE Subnet- 10.1.2.0/24&lt;/LI&gt;&lt;LI&gt;FE-FW1 - 10.1.1.4/24&lt;/LI&gt;&lt;LI&gt;FE-FW2 - 10.1.1.5/24&lt;/LI&gt;&lt;LI&gt;FE Cluster - 10.1.1.7/24&lt;/LI&gt;&lt;LI&gt;BE-FW1 - 10.1.2.4/24&lt;/LI&gt;&lt;LI&gt;BE-FW2 - 10.1.2.5/24&lt;/LI&gt;&lt;LI&gt;BE Cluster - 10.1.2.7/24&lt;/LI&gt;&lt;LI&gt;DB Subnet - 10.1.3.0/24&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;App Subnet - 10.1.4.0/24&lt;/LI&gt;&lt;LI&gt;BE LB - 10.1.2.6/24&lt;/LI&gt;&lt;LI&gt;FE LB - 10.1.1.6/24&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;In this case for DB &amp;amp; App Subnet UDRs will be&lt;/P&gt;&lt;P&gt;0.0.0.0/0&amp;nbsp; NH 10.1.2.4 or 10.1.2.6?&lt;/P&gt;&lt;P&gt;for 10.1.0.0/16 NH 10.1.2.4 or 10.1.2.6?&lt;/P&gt;&lt;P&gt;Plus I have received two public IP addresses for both the VMs. Since I wanted to configure VPN which Public IP should be configured on VPN Link selection page?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TIA&lt;/P&gt;&lt;P&gt;Blason R&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Oct 2021 07:25:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-IAAS-Routing-doubt-and-S2S-VPN/m-p/130899#M1292</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2021-10-04T07:25:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudguard IAAS Routing doubt and S2S VPN</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-IAAS-Routing-doubt-and-S2S-VPN/m-p/130901#M1293</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;first thing, CP cluster in Azure has these Private IPs:&lt;/P&gt;
&lt;P&gt;Frontend - 1 per GW + VIP&lt;/P&gt;
&lt;P&gt;Backend - 1 per GW (no VIP).&lt;/P&gt;
&lt;P&gt;also you get two LBs:&lt;/P&gt;
&lt;P&gt;1 Frontend (external) - has Public IPs only.&lt;/P&gt;
&lt;P&gt;1 backend (internal) - has internal private IPs only.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;when you route traffic from your peered vNets , you route the default GW to the internal LB Private IP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now regarding the VPN , both GWs get Public IPs that are attached to their frontend IPs interfaces. these are usually used to manage the GWs from a Management Server located outside their environment (On-Premise or other Cloud Vendor).&lt;/P&gt;
&lt;P&gt;The VIP IP address is attached to the Primary Member Frontend Interface. it also has a Public IP attached to it. you use this IP for VPN configuration.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Oct 2021 07:40:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-IAAS-Routing-doubt-and-S2S-VPN/m-p/130901#M1293</guid>
      <dc:creator>Nir_Shamir</dc:creator>
      <dc:date>2021-10-04T07:40:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudguard IAAS Routing doubt and S2S VPN</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-IAAS-Routing-doubt-and-S2S-VPN/m-p/130917#M1294</link>
      <description>&lt;P&gt;Hi Nir,&lt;/P&gt;&lt;P&gt;Thanks for the reply; now regarding public IP do we get VIP as well for public IP adress? and those needs to be defined in Topology as well?&lt;/P&gt;</description>
      <pubDate>Mon, 04 Oct 2021 09:31:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-IAAS-Routing-doubt-and-S2S-VPN/m-p/130917#M1294</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2021-10-04T09:31:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudguard IAAS Routing doubt and S2S VPN</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-IAAS-Routing-doubt-and-S2S-VPN/m-p/130919#M1295</link>
      <description>&lt;P&gt;you have 3 Public IPs:&lt;/P&gt;
&lt;P&gt;1) 1 per GW - to manage the GWs from remote location.&lt;/P&gt;
&lt;P&gt;2) 1 on the VIP - used usually for VPN.&lt;/P&gt;
&lt;P&gt;check the Azure High-Availability admin guide for the configuration:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_IaaS_HighAvailability_for_Azure/Default.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_IaaS_HighAvailability_for_Azure/Default.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;anyway , you don't define the Public IPs on the Topology of the Cluster , only the Private IPs.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_IaaS_HighAvailability_for_Azure/Default.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_IaaS_HighAvailability_for_Azure/Default.htm&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Oct 2021 09:40:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-IAAS-Routing-doubt-and-S2S-VPN/m-p/130919#M1295</guid>
      <dc:creator>Nir_Shamir</dc:creator>
      <dc:date>2021-10-04T09:40:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudguard IAAS Routing doubt and S2S VPN</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-IAAS-Routing-doubt-and-S2S-VPN/m-p/131197#M1296</link>
      <description>&lt;P&gt;Hey Guys,&lt;/P&gt;&lt;P&gt;I am still confused on Inbound NAT rule by disassociating public IP from one vm to External LB. I have setup whose outbound flow is working fine however I am having issues with Inbound NAT. This is cluster deployment&lt;/P&gt;&lt;P&gt;My vnet is 10.2.0.0/16&lt;/P&gt;&lt;P&gt;Web Subnet is 10.2.2.0/24 and web server IP is 10.2.2.4&lt;/P&gt;&lt;P&gt;Public IP associated was 20.30.40.50; now I have disassociated the public IP and then as per SKU I could not attach to LB hence I decided to go with new public IP.&lt;/P&gt;&lt;P&gt;Now while adding Inbound NAT rule in Azure portal&lt;/P&gt;&lt;P&gt;Front End new Public IP is 13.82.65.188&lt;/P&gt;&lt;P&gt;Service : HTTP&lt;/P&gt;&lt;P&gt;Port: 80&lt;/P&gt;&lt;P&gt;What will be my Target virtual machine? cpcluster1 or cpcluster2?&lt;/P&gt;&lt;P&gt;What will be my member-ip ? cluster VIP or member-ip1 or member-ip2&lt;/P&gt;&lt;P&gt;Target port I am sending at 9944 [ This would go to Check Point]&lt;/P&gt;&lt;P&gt;***********&lt;/P&gt;&lt;P&gt;Then on Check Point&lt;/P&gt;&lt;P&gt;Osource = Any&lt;/P&gt;&lt;P&gt;Odst =? [Its not accepting cluster object] [&lt;/P&gt;&lt;P&gt;OService = 9944&lt;/P&gt;&lt;P&gt;Xsource = original&lt;/P&gt;&lt;P&gt;xlate Dst = 10.2.2.4 [web server IP]&lt;/P&gt;&lt;P&gt;xlate port = 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is what error I am getting on portal&lt;/P&gt;&lt;P&gt;Gateway: cpazurecluster&lt;BR /&gt;Policy: Standard&lt;BR /&gt;Status: Failed&lt;BR /&gt;- Invalid Object 'cpazurecluster' in Original Dst of Address Translation Rule 2. The valid objects are: host, gateway, network, address range and router.&lt;BR /&gt;- Policy verification failed.&lt;BR /&gt;--------------------------------------------------------------------------------&lt;/P&gt;</description>
      <pubDate>Thu, 07 Oct 2021 04:18:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-IAAS-Routing-doubt-and-S2S-VPN/m-p/131197#M1296</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2021-10-07T04:18:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudguard IAAS Routing doubt and S2S VPN</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-IAAS-Routing-doubt-and-S2S-VPN/m-p/131204#M1297</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Check the admin guide from " Configure NAT Rules"&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_IaaS_HighAvailability_for_Azure/Content/Topics-Azure-HA/Workflow-for-Setting-Up-a-High-Availability-Cluster-in-Azure.htm?tocpath=Workflow%20for%20Setting%20Up%20a%20High%20Availability%20Cluster%20in%20Azure%7C_____6#Step_6__Configure_NAT_Rules" target="_blank"&gt;https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_IaaS_HighAvailability_for_Azure/Content/Topics-Azure-HA/Workflow-for-Setting-Up-a-High-Availability-Cluster-in-Azure.htm?tocpath=Workflow%20for%20Setting%20Up%20a%20High%20Availability%20Cluster%20in%20Azure%7C_____6#Step_6__Configure_NAT_Rules&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this will explain the NAT and the load balancer configuration.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Oct 2021 06:22:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-IAAS-Routing-doubt-and-S2S-VPN/m-p/131204#M1297</guid>
      <dc:creator>Nir_Shamir</dc:creator>
      <dc:date>2021-10-07T06:22:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudguard IAAS Routing doubt and S2S VPN</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-IAAS-Routing-doubt-and-S2S-VPN/m-p/131292#M1298</link>
      <description>&lt;P&gt;Hi, Blason,&lt;/P&gt;
&lt;P&gt;I would use Load Balancing Rules (instead of a Inbound NAT Rule). If you enable "Floating IP (direct server return)", which is disabled per default, the LB will not NAT the Destination IP. In this case you will see the Public IP on the Firewall and you can do the NAT accordingly. That´s more&amp;nbsp;straightforward in my opinion.&lt;/P&gt;
&lt;P&gt;If using a Standard LB, please make sure to have a Network Security Group which&amp;nbsp;has to allow &amp;nbsp;the traffic (this is not necessary if you use a Basic LB which is sufficient and allows the traffic per default).&lt;/P&gt;</description>
      <pubDate>Thu, 07 Oct 2021 13:17:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-IAAS-Routing-doubt-and-S2S-VPN/m-p/131292#M1298</guid>
      <dc:creator>Matthias_Haas</dc:creator>
      <dc:date>2021-10-07T13:17:45Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudguard IAAS Routing doubt and S2S VPN</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-IAAS-Routing-doubt-and-S2S-VPN/m-p/132585#M1299</link>
      <description>&lt;P&gt;Hi Blason,  &lt;/P&gt;&lt;P&gt;in cpnat.jpg - for NAT Rule - use attached NAT rule (Create Dynamic Object)&lt;BR /&gt;in webnet.jpg - for Network IP Configuration - use cluster-vip (not member IP) - attached &amp;amp; LoadBalancing Rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards, Prabu&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 06:42:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-IAAS-Routing-doubt-and-S2S-VPN/m-p/132585#M1299</guid>
      <dc:creator>Prabulingam_N1</dc:creator>
      <dc:date>2021-10-26T06:42:04Z</dc:date>
    </item>
  </channel>
</rss>

