<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AWS - Finally Allow You to Inspect Traffic Between Subnets In a VPC in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/130557#M1464</link>
    <description>&lt;P&gt;Oh ok.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Actually I logged in to usercenter with that account so it took automatically. After posting comment, it was not displaying so finally I replied again with my account.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 29 Sep 2021 12:22:07 GMT</pubDate>
    <dc:creator>Gaurav_Pandya</dc:creator>
    <dc:date>2021-09-29T12:22:07Z</dc:date>
    <item>
      <title>AWS - Finally Allow You to Inspect Traffic Between Subnets In a VPC</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/129267#M1458</link>
      <description>&lt;P&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;Until today, AWS didn't allow to add to a routing table a more specific route than the default VPC local route.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;For example, when the VPC range is&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;10.0.0/16&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;and a subnet has&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;10.0.1.0/24&lt;/CODE&gt;&lt;SPAN&gt;, a route to&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;10.0.1.0/24&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;is more specific than a route to&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;10.0.0/16&lt;/CODE&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;Routing tables no longer have this restriction. Routes in a routing table can have routes more specific than the default local route. You can use such a more specific route to send all traffic to a dedicated virtual appliance to inspect, analyze, or filter all traffic flowing between two subnets (east-west traffic). The route target can be the network interface (ENI) attached to a CloudGuard Gateway, an&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aws.amazon.com/elasticloadbalancing/gateway-load-balancer/" target="_blank" rel="noopener"&gt;AWS Gateway Load Balancer&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(GWLB) endpoint to distribute traffic to multiple appliances for performance or high availability reasons. &lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;It also allows inserting a virtual appliance between a subnet and an&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aws.amazon.com/transit-gateway/" target="_blank" rel="noopener"&gt;AWS Transit Gateway&lt;/A&gt;.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;Check out the bellow simple use case&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;Traffic that is being sent between Subnet QA and Subnet Prod is now inspected by the CloudGuard Gateway.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;This is the most basic use case, you can leverage it and use it in more complex use case where you have multiple VPC, TGW, and Gateway LoadBalnacer.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;Feel free to comment and ask any question.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="AWS Diagram-Copy of AWS DeepDive.drawio.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13686iD490B44CC8D03EF3/image-size/large?v=v2&amp;amp;px=999" role="button" title="AWS Diagram-Copy of AWS DeepDive.drawio.png" alt="AWS Diagram-Copy of AWS DeepDive.drawio.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 10:41:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/129267#M1458</guid>
      <dc:creator>Shay_Levin</dc:creator>
      <dc:date>2021-09-13T10:41:28Z</dc:date>
    </item>
    <item>
      <title>Re: AWS - Finally Allow You to Inspect Traffic Between Subnets In a VPC</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/129324#M1459</link>
      <description>&lt;P&gt;That’s actually great news!&lt;BR /&gt;I remember when we were first working with gateways in AWS and had to work around this limitation.&lt;BR /&gt;This should make for much simpler deployments.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 19:17:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/129324#M1459</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-09-13T19:17:28Z</dc:date>
    </item>
    <item>
      <title>Re: AWS - Finally Allow You to Inspect Traffic Between Subnets In a VPC</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/130528#M1460</link>
      <description>&lt;P&gt;Hi Phoneboy,&lt;/P&gt;
&lt;P&gt;It does help making deployments easier and cost effective, but it certainly seems the "worst" practice from the perspective of the Cloud Native Well-Architected Framework and our own Check Point Secure Blueprint.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not sure why AWS would offer this other than getting rid of the many complaints about their inability to create static routes within the VPC CIDR.&lt;/P&gt;
&lt;P&gt;Azure still offers IP forwarding on Peering and HA port Load Balancers, so I am curious when AWS will decide to "even" the score on that one as well, while offering TGW and GWLB on top.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Sep 2021 09:03:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/130528#M1460</guid>
      <dc:creator>Peter_Griekspoo</dc:creator>
      <dc:date>2021-09-29T09:03:06Z</dc:date>
    </item>
    <item>
      <title>Re: AWS - Finally Allow You to Inspect Traffic Between Subnets In a VPC</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/130533#M1462</link>
      <description>&lt;P&gt;Hi Levin,&lt;/P&gt;
&lt;P&gt;Thanks for sharing this. I have one question, may be this is off topic.&lt;/P&gt;
&lt;P&gt;Cloudguard provides micro segmentation protection independently? or it requires other stuff like NSX to achieve this requirement&lt;/P&gt;</description>
      <pubDate>Wed, 29 Sep 2021 09:31:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/130533#M1462</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2021-09-29T09:31:09Z</dc:date>
    </item>
    <item>
      <title>Re: AWS - Finally Allow You to Inspect Traffic Between Subnets In a VPC</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/130538#M1463</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8251"&gt;@Gaurav_Pandya&lt;/a&gt;, the author's name is Shay, Levin is a surname.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Please do post the same comments from different accounts. I have removed your double-posting comments, to avoid confusion.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 09:10:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/130538#M1463</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-09-30T09:10:36Z</dc:date>
    </item>
    <item>
      <title>Re: AWS - Finally Allow You to Inspect Traffic Between Subnets In a VPC</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/130557#M1464</link>
      <description>&lt;P&gt;Oh ok.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Actually I logged in to usercenter with that account so it took automatically. After posting comment, it was not displaying so finally I replied again with my account.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Sep 2021 12:22:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/130557#M1464</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2021-09-29T12:22:07Z</dc:date>
    </item>
    <item>
      <title>Re: AWS - Finally Allow You to Inspect Traffic Between Subnets In a VPC</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/130585#M1465</link>
      <description>&lt;P&gt;So you don't know the answer then?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Sep 2021 16:34:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/130585#M1465</guid>
      <dc:creator>Daniel_Westlund</dc:creator>
      <dc:date>2021-09-29T16:34:20Z</dc:date>
    </item>
    <item>
      <title>Re: AWS - Finally Allow You to Inspect Traffic Between Subnets In a VPC</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/130599#M1466</link>
      <description>&lt;P&gt;The underlying virtualization system has to provide a mechanism to allow for microsegmentation.&lt;BR /&gt;Without that, there isn't a lot we can do on our own.&lt;BR /&gt;VMware NSX obviously has this, and we integrate with that.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Sep 2021 19:16:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/130599#M1466</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-09-29T19:16:11Z</dc:date>
    </item>
    <item>
      <title>Re: AWS - Finally Allow You to Inspect Traffic Between Subnets In a VPC</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/130632#M1467</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/11671"&gt;@Daniel_Westlund&lt;/a&gt;&amp;nbsp;Here is no need to get personal. My comment was about proper use of this forum. It is my duty as an admin to care about those things.&lt;BR /&gt;&lt;BR /&gt;Dameon a.k.a.&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;has already answered the original&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8251"&gt;@Gaurav_Pandya&lt;/a&gt;'s question. Let me know if I can help you with anything else.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 09:12:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/130632#M1467</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-09-30T09:12:35Z</dc:date>
    </item>
    <item>
      <title>Re: AWS - Finally Allow You to Inspect Traffic Between Subnets In a VPC</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/130651#M1468</link>
      <description>&lt;P&gt;Ok Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 09:31:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-Finally-Allow-You-to-Inspect-Traffic-Between-Subnets-In-a/m-p/130651#M1468</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2021-09-30T09:31:05Z</dc:date>
    </item>
  </channel>
</rss>

