<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ideas needed in CheckPointCG-VMSS in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Ideas-needed-in-CheckPointCG-VMSS/m-p/101367#M1838</link>
    <description>&lt;P&gt;Dear CheckMates,&lt;/P&gt;&lt;P&gt;I need some idea on attached Topology to achieve. Anyone can help me on this please.&lt;/P&gt;&lt;P&gt;1) Had spinned CheckPoint-CG VMSS in Azure.&lt;BR /&gt;2) Placed WebServer in Backend and Outgoing Internet traffic thru VMSS works fine.&lt;BR /&gt;3) Inbound traffic to Webserver thru VMSS also works fine with FrontendLB configured.&lt;BR /&gt;4) Since VMSS cannot support Site-to-Site VPN, we used Azure VirtualNetworkGW placed in VMSS VNet (New GatewaySubnet for AzureVPN)&lt;BR /&gt;5) Site Connection between Azure NativeVPNGW &amp;amp; 3rd Party got created fine &amp;amp; Connected Status&lt;BR /&gt;6) Used VPN Route based in Azure (not BGP) in "Connections" in Azure Portal&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;7) Requirement is:&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; a) Traffic from Peer-side to reach AzureVPNGW thru S2S-Tunnel.&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; b) Then AzureVPNGW should forward this traffic to VMSS for Inspection.&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; c) After Inspection, VMSS should in-turn route the traffic to Internal WebServer.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; d) Inbound is&amp;nbsp; &amp;nbsp; (Traffic from PeerSide =&amp;gt;&amp;gt;&amp;gt; S2S =&amp;gt;&amp;gt;&amp;gt; AzureVPNGW =&amp;gt;&amp;gt;&amp;gt; VMSS =&amp;gt;&amp;gt;&amp;gt; WebServer)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; e) Outbound is (Traffic From WebServer =&amp;gt;&amp;gt;&amp;gt; VMSS =&amp;gt;&amp;gt;&amp;gt; AzureVPNGW =&amp;gt;&amp;gt;&amp;gt; S2S =&amp;gt;&amp;gt;&amp;gt; PeerSide)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; f) When packet from PeerServer leaves their localGW, it got encrypted&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; g) But don't see this packet in VMSS (Unable to check in AzureVPNGW)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; h) But Webserver sends reply packets towards VMSS for this Inbounded traffic.&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; i) Looks like AzureVPNGW routes the Inbound traffic directly to WebServer and not to VMSS for inspection.&lt;/P&gt;&lt;P&gt;I unable to configure any separate routes in AzureVPNGW towards VMSS as both are part of same VNet&lt;/P&gt;&lt;P&gt;Either way traffic not reaching each other.&lt;/P&gt;&lt;P&gt;Any ideas on how can I achieve this.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CG-VMSS" style="width: 668px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/8803iECAEC513E14C0698/image-size/large?v=v2&amp;amp;px=999" role="button" title="VMSS.PNG" alt="CG-VMSS" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;CG-VMSS&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards, Prabu&lt;/P&gt;</description>
    <pubDate>Sat, 07 Nov 2020 13:53:52 GMT</pubDate>
    <dc:creator>Prabulingam_N1</dc:creator>
    <dc:date>2020-11-07T13:53:52Z</dc:date>
    <item>
      <title>Ideas needed in CheckPointCG-VMSS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Ideas-needed-in-CheckPointCG-VMSS/m-p/101367#M1838</link>
      <description>&lt;P&gt;Dear CheckMates,&lt;/P&gt;&lt;P&gt;I need some idea on attached Topology to achieve. Anyone can help me on this please.&lt;/P&gt;&lt;P&gt;1) Had spinned CheckPoint-CG VMSS in Azure.&lt;BR /&gt;2) Placed WebServer in Backend and Outgoing Internet traffic thru VMSS works fine.&lt;BR /&gt;3) Inbound traffic to Webserver thru VMSS also works fine with FrontendLB configured.&lt;BR /&gt;4) Since VMSS cannot support Site-to-Site VPN, we used Azure VirtualNetworkGW placed in VMSS VNet (New GatewaySubnet for AzureVPN)&lt;BR /&gt;5) Site Connection between Azure NativeVPNGW &amp;amp; 3rd Party got created fine &amp;amp; Connected Status&lt;BR /&gt;6) Used VPN Route based in Azure (not BGP) in "Connections" in Azure Portal&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;7) Requirement is:&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; a) Traffic from Peer-side to reach AzureVPNGW thru S2S-Tunnel.&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; b) Then AzureVPNGW should forward this traffic to VMSS for Inspection.&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; c) After Inspection, VMSS should in-turn route the traffic to Internal WebServer.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; d) Inbound is&amp;nbsp; &amp;nbsp; (Traffic from PeerSide =&amp;gt;&amp;gt;&amp;gt; S2S =&amp;gt;&amp;gt;&amp;gt; AzureVPNGW =&amp;gt;&amp;gt;&amp;gt; VMSS =&amp;gt;&amp;gt;&amp;gt; WebServer)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; e) Outbound is (Traffic From WebServer =&amp;gt;&amp;gt;&amp;gt; VMSS =&amp;gt;&amp;gt;&amp;gt; AzureVPNGW =&amp;gt;&amp;gt;&amp;gt; S2S =&amp;gt;&amp;gt;&amp;gt; PeerSide)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; f) When packet from PeerServer leaves their localGW, it got encrypted&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; g) But don't see this packet in VMSS (Unable to check in AzureVPNGW)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; h) But Webserver sends reply packets towards VMSS for this Inbounded traffic.&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; i) Looks like AzureVPNGW routes the Inbound traffic directly to WebServer and not to VMSS for inspection.&lt;/P&gt;&lt;P&gt;I unable to configure any separate routes in AzureVPNGW towards VMSS as both are part of same VNet&lt;/P&gt;&lt;P&gt;Either way traffic not reaching each other.&lt;/P&gt;&lt;P&gt;Any ideas on how can I achieve this.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CG-VMSS" style="width: 668px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/8803iECAEC513E14C0698/image-size/large?v=v2&amp;amp;px=999" role="button" title="VMSS.PNG" alt="CG-VMSS" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;CG-VMSS&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards, Prabu&lt;/P&gt;</description>
      <pubDate>Sat, 07 Nov 2020 13:53:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Ideas-needed-in-CheckPointCG-VMSS/m-p/101367#M1838</guid>
      <dc:creator>Prabulingam_N1</dc:creator>
      <dc:date>2020-11-07T13:53:52Z</dc:date>
    </item>
    <item>
      <title>Re: Ideas needed in CheckPointCG-VMSS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Ideas-needed-in-CheckPointCG-VMSS/m-p/110711#M1839</link>
      <description>&lt;P&gt;Hi Prabu,&lt;/P&gt;&lt;P&gt;did you try to define a UDR (User Defined Route) attached to your Azure VPN Gateway subnet, to route traffic for your WebServer to your VMSS ?&lt;/P&gt;&lt;P&gt;something like name=To_WebServer_via_VMSS, address prefix = 192.168.40.100/32, next hop = CG-VMSS&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Raphael&lt;/P&gt;</description>
      <pubDate>Sat, 13 Feb 2021 03:59:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Ideas-needed-in-CheckPointCG-VMSS/m-p/110711#M1839</guid>
      <dc:creator>Raphael_Precigo</dc:creator>
      <dc:date>2021-02-13T03:59:14Z</dc:date>
    </item>
    <item>
      <title>Re: Ideas needed in CheckPointCG-VMSS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Ideas-needed-in-CheckPointCG-VMSS/m-p/110715#M1840</link>
      <description>&lt;P&gt;Hi Prabu,&lt;/P&gt;&lt;P&gt;We can use UDR apply to the Azure Gateway subnet to route traffic to the VMSS for inspection, but pay attention, you should have:&lt;/P&gt;&lt;P&gt;To_WebServer, address prefix = 192.168.40.100/32, next hop: ILB of the VMSS as mentioned by Raphael&lt;/P&gt;&lt;P&gt;Hope help you&lt;/P&gt;&lt;P&gt;Kiet&lt;/P&gt;</description>
      <pubDate>Sat, 13 Feb 2021 06:50:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Ideas-needed-in-CheckPointCG-VMSS/m-p/110715#M1840</guid>
      <dc:creator>kietnguyen1011</dc:creator>
      <dc:date>2021-02-13T06:50:05Z</dc:date>
    </item>
  </channel>
</rss>

