<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Client Support on CloudGuard in VMSS  - EA in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-Client-Support-on-CloudGuard-in-VMSS-EA/m-p/89691#M2082</link>
    <description>&lt;P&gt;How will this look in a quasi-hybrid deployment?&lt;/P&gt;&lt;P&gt;Let me explain.&lt;/P&gt;&lt;P&gt;Let's say you currently have an on-premises VPN solution using a couple Check Point gateways. But to support rapid scaling, specially during this pandemic times, could you mount the Remote Access VPN service in Azure and have it route the trusted traffic to the gateways on-premises, all this with out having any other other VM hosted in Azure.&lt;/P&gt;&lt;P&gt;This way users will just connect to the VPN through Azure and we can forget on adding additional gateways on-premise.&lt;/P&gt;&lt;P&gt;Do you have a cost sample? Azure vs On-Premise?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
    <pubDate>Wed, 24 Jun 2020 13:50:37 GMT</pubDate>
    <dc:creator>David_Ulloa</dc:creator>
    <dc:date>2020-06-24T13:50:37Z</dc:date>
    <item>
      <title>VPN Client Support on CloudGuard in VMSS  - EA</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-Client-Support-on-CloudGuard-in-VMSS-EA/m-p/89390#M2079</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="cloudguard (1).gif" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/6923i096797B46EB5847D/image-size/large?v=v2&amp;amp;px=999" role="button" title="cloudguard (1).gif" alt="cloudguard (1).gif" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;Hi All,&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;I’m thrilled to share with you that we are going to release an EA version that will support VPN Client connections to CloudGuard for Azure in a Virtual Machine Scale Set topology.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;From now on, we are going to support with our VMSS not just Inbound, Outbound, and East/West traffic but also VPN Client connections.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;No need to pay anymore for unused licenses and compute resources, pay only for what you use, and always be flexible and dynamic to support any demand for traffic.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;And not just that, you now have the option to move your VPN client termination to the Cloud and route all the traffic to the on-premise networks over a single VPN connection or ExpressRoute.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;Let your CloudGuard VMSS do all the hard work of VPN termination, authentication, and traffic threat prevention inspection on the Cloud instead of investing in upgrading on-premises hardware that needs to support traffic spikes and future growth.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;Both windows mobile VPN client and EndPoint VPN client are supported.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;My offer to you:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;The first five customers that will drop me an email with a request to take part in this Early Availability will get direct support of our RnD team and would also get for free 3-month license for their autoscale deployment.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;My Email is: &lt;A href="mailto:shayl@checkpoint.com" target="_blank" rel="noopener"&gt;shayl@checkpoint.com&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;** Stay tuned, VPN Client support on AWS Auto Scaling, is on the way ….&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;Thanks&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;Shay Levin&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jun 2020 06:54:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-Client-Support-on-CloudGuard-in-VMSS-EA/m-p/89390#M2079</guid>
      <dc:creator>Shay_Levin</dc:creator>
      <dc:date>2020-06-26T06:54:58Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Client Support on CloudGuard in VMSS  - EA</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-Client-Support-on-CloudGuard-in-VMSS-EA/m-p/89478#M2080</link>
      <description>&lt;P&gt;Shay,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It was my understanding that VMSS did not support inbound/outbound VPN traffic, as well, and therefore, an HA cluster or single gateway was required for site-to-site VPN connections.&amp;nbsp; Is that not accurate?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2020 21:12:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-Client-Support-on-CloudGuard-in-VMSS-EA/m-p/89478#M2080</guid>
      <dc:creator>bogletree</dc:creator>
      <dc:date>2020-06-22T21:12:52Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Client Support on CloudGuard in VMSS  - EA</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-Client-Support-on-CloudGuard-in-VMSS-EA/m-p/89516#M2081</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;CloudGuard for Azure on Autoscale Deployment does not support Site 2 Site VPN, all the other types of traffic ( Inbound, outbound and East/West and from now on also&amp;nbsp; VPN Client Access)&amp;nbsp; are supported.&lt;/P&gt;
&lt;P&gt;For Site 2 Site VPN you will need to use CloudGuard Cluster or a Single Gateway deployment.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jun 2020 07:04:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-Client-Support-on-CloudGuard-in-VMSS-EA/m-p/89516#M2081</guid>
      <dc:creator>Shay_Levin</dc:creator>
      <dc:date>2020-06-23T07:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Client Support on CloudGuard in VMSS  - EA</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-Client-Support-on-CloudGuard-in-VMSS-EA/m-p/89691#M2082</link>
      <description>&lt;P&gt;How will this look in a quasi-hybrid deployment?&lt;/P&gt;&lt;P&gt;Let me explain.&lt;/P&gt;&lt;P&gt;Let's say you currently have an on-premises VPN solution using a couple Check Point gateways. But to support rapid scaling, specially during this pandemic times, could you mount the Remote Access VPN service in Azure and have it route the trusted traffic to the gateways on-premises, all this with out having any other other VM hosted in Azure.&lt;/P&gt;&lt;P&gt;This way users will just connect to the VPN through Azure and we can forget on adding additional gateways on-premise.&lt;/P&gt;&lt;P&gt;Do you have a cost sample? Azure vs On-Premise?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jun 2020 13:50:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-Client-Support-on-CloudGuard-in-VMSS-EA/m-p/89691#M2082</guid>
      <dc:creator>David_Ulloa</dc:creator>
      <dc:date>2020-06-24T13:50:37Z</dc:date>
    </item>
  </channel>
</rss>

