<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CloudGuard Network for AWS Security Cluster R81.20 in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Network-for-AWS-Security-Cluster-R81-20/m-p/180856#M231</link>
    <description>&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;After adding the following NAT rules for each member where the original source is the external private IP, egress works after failover.&lt;/SPAN&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Original Source: member A eth0 IP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Original Destination: Any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Original Services: Any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Translated Source: Original&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Translated Destination: Original&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Translated Services: Original&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Original Source: member B eth0 IP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Original Destination: Any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Original Services: Any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Translated Source: Original&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Translated Destination: Original&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Translated Services: Original&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Regards.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Simon&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 15 May 2023 05:54:01 GMT</pubDate>
    <dc:creator>Simon_Macpherso</dc:creator>
    <dc:date>2023-05-15T05:54:01Z</dc:date>
    <item>
      <title>CloudGuard Network for AWS Security Cluster R81.20</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Network-for-AWS-Security-Cluster-R81-20/m-p/180697#M224</link>
      <description>&lt;P&gt;I have deployed a Check Point CloudGuard Network Security Cluster into an existing VPC on AWS using terraform at &lt;A href="https://github.com/CheckPointSW/CloudGuardIaaS/tree/master/terraform/aws/cluster" target="_blank"&gt;https://github.com/CheckPointSW/CloudGuardIaaS/tree/master/terraform/aws/cluster&lt;/A&gt; and added to Smart Console using the following guide.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CloudGuard_Network_for_AWS_Cluster_DeploymentGuide/Content/Topics-AWS-Cluster-DG/Deploying-a-Check-Point-Cluster-in-AWS.htm?tocpath=Deployment%20Steps%7CStep%203%253A%20Deploying%20the%20Check%20Point%20Security%20Cluster%7C_____0#Step_3__Deploying_the_Check_Point_Security_Cluster" target="_blank"&gt;https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CloudGuard_Network_for_AWS_Cluster_DeploymentGuide/Content/Topics-AWS-Cluster-DG/Deploying-a-Check-Point-Cluster-in-AWS.htm?tocpath=Deployment%20Steps%7CStep%203%253A%20Deploying%20the%20Check%20Point%20Security%20Cluster%7C_____0#Step_3__Deploying_the_Check_Point_Security_Cluster&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;The active gateway does not have an internet access.&lt;/P&gt;
&lt;P&gt;$FWDIR/scripts/aws_ha_test.py script is failing when attempting to connect to ec2.us-west-1.amazonaws.com:443.&lt;/P&gt;
&lt;P&gt;Testing cluster interface configuration...&lt;BR /&gt;Cluster interface configuration tested successfully&lt;/P&gt;
&lt;P&gt;Testing connection to ec2.us-west-1.amazonaws.com:443...&lt;BR /&gt;Traceback (most recent call last):&lt;BR /&gt;File "/opt/CPsuite-R81.20/fw1/scripts/aws_ha_test.py", line 155, in test&lt;BR /&gt;subprocess.check_call(cmd)&lt;BR /&gt;File "/opt/CPsuite-R81.20/fw1/Python/lib/python3.7/subprocess.py", line 363, in check_call&lt;BR /&gt;raise CalledProcessError(retcode, cmd)&lt;BR /&gt;subprocess.CalledProcessError: Command '['nc', '-w', '5', '-z', 'ec2.us-west-1.amazonaws.com', '443']' returned non-zero exit status 1.&lt;BR /&gt;Error:&lt;BR /&gt;Failed to connect to the AWS API endpoint&lt;BR /&gt;Please verify that outgoing connections over TCP port 443 (HTTPS) to the AWS&lt;BR /&gt;endpoint are allowed by the firewall security policy.&lt;BR /&gt;See:&lt;BR /&gt;&lt;A href="http://docs.aws.amazon.com/general/latest/gr/rande.html#vpc_region" target="_blank"&gt;http://docs.aws.amazon.com/general/latest/gr/rande.html#vpc_region&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Simon&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2023 06:06:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Network-for-AWS-Security-Cluster-R81-20/m-p/180697#M224</guid>
      <dc:creator>Simon_Macpherso</dc:creator>
      <dc:date>2023-05-12T06:06:54Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard Network for AWS Security Cluster R81.20</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Network-for-AWS-Security-Cluster-R81-20/m-p/180718#M225</link>
      <description>&lt;P&gt;You wrote: &lt;EM&gt;$FWDIR/scripts/aws_ha_test.py script is failing when attempting to connect to ec2.us-west-1.amazonaws.com:443.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;You know that the connection should be possible, but the script is failing ? These outgoing connections over TCP port 443 (HTTPS) to the AWS endpoint are allowed by the firewall security policy ?&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2023 08:49:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Network-for-AWS-Security-Cluster-R81-20/m-p/180718#M225</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-05-12T08:49:03Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard Network for AWS Security Cluster R81.20</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Network-for-AWS-Security-Cluster-R81-20/m-p/180824#M226</link>
      <description>&lt;P&gt;does the VM has any access to that URL ?&lt;/P&gt;
&lt;P&gt;can you run "curl_cli -v -k "https://&lt;SPAN&gt;ec2.us-west-1.amazonaws.com" and see that it can connect ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 May 2023 07:49:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Network-for-AWS-Security-Cluster-R81-20/m-p/180824#M226</guid>
      <dc:creator>Nir_Shamir</dc:creator>
      <dc:date>2023-05-14T07:49:44Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard Network for AWS Security Cluster R81.20</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Network-for-AWS-Security-Cluster-R81-20/m-p/180840#M227</link>
      <description>&lt;P&gt;&lt;SPAN&gt;curl_cli -v -k "https://&lt;/SPAN&gt;&lt;SPAN&gt;ec2.us-west-1.amazonaws.com" fails to connect&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 14 May 2023 23:30:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Network-for-AWS-Security-Cluster-R81-20/m-p/180840#M227</guid>
      <dc:creator>Simon_Macpherso</dc:creator>
      <dc:date>2023-05-14T23:30:02Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard Network for AWS Security Cluster R81.20</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Network-for-AWS-Security-Cluster-R81-20/m-p/180842#M228</link>
      <description>&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;There is a hide NAT at the bottom of the NAT policy for the public facing subnet to translate all egress traffic from all internal networks to the external private IP allocated as cluster virtual IP for public subnet - interface-0 (external). You can see it in one of the screenshot attached but I have included the details below.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Original Source: All_Internet_Net (10.0.0.0/8)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Original Destination: Any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Original Services: Any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Translated Source: AZR_USW1_VMC_NAT (IP allocated as cluster virtual IP for public subnet - interface-0 (external))&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Translated Destination: Original&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Translated Services: Original&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;When I disable the NAT, connectivity to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A class="cuf-url forceOutputURL" title="" href="https://ec2.us-west-1-amazonaws.com/" target="_blank" rel="noopener noreferrer" data-value="https://ec2.us-west-1-amazonaws.com"&gt;ec2.us-west-1-amazonaws.com&lt;/A&gt;&lt;SPAN class="uiOutputText"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;from both active and standby members succeeds i.e. curl_cli -v -k "&lt;/SPAN&gt;&lt;A class="cuf-url forceOutputURL" title="" href="https://ec2.us-west-1-amazonaws.com/" target="_blank" rel="noopener noreferrer" data-value="https://ec2.us-west-1-amazonaws.com"&gt;https://ec2.us-west-1-amazonaws.com&lt;/A&gt;&lt;SPAN class="uiOutputText"&gt;".&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 00:08:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Network-for-AWS-Security-Cluster-R81-20/m-p/180842#M228</guid>
      <dc:creator>Simon_Macpherso</dc:creator>
      <dc:date>2023-05-15T00:08:04Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard Network for AWS Security Cluster R81.20</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Network-for-AWS-Security-Cluster-R81-20/m-p/180849#M229</link>
      <description>&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;I incorrectly configured the virtual cluster IP and has since been modified to the correct IP allocated from the public subnet by AWS. Re the hide NAT rule, the object used in the translated source field has been updated use the correct virtual cluster IP and the rule has been reenabled. Egress traffic is now working and being translated as configured.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;However, during failing over to the standby member, the route target for 0.0.0.0/0 in the private subnet is not updated to point to the new active member ENI.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="uiOutputText"&gt;The route is only updated when the hide NAT rule is disabled.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 04:07:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Network-for-AWS-Security-Cluster-R81-20/m-p/180849#M229</guid>
      <dc:creator>Simon_Macpherso</dc:creator>
      <dc:date>2023-05-15T04:07:00Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard Network for AWS Security Cluster R81.20</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Network-for-AWS-Security-Cluster-R81-20/m-p/180851#M230</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I have an unrelated question, is a cluster virtual IP required for the private subnet interface? Or is it sufficient to configure the interface strictly as a Sync interface? &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 02:21:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Network-for-AWS-Security-Cluster-R81-20/m-p/180851#M230</guid>
      <dc:creator>Simon_Macpherso</dc:creator>
      <dc:date>2023-05-15T02:21:38Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard Network for AWS Security Cluster R81.20</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Network-for-AWS-Security-Cluster-R81-20/m-p/180856#M231</link>
      <description>&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;After adding the following NAT rules for each member where the original source is the external private IP, egress works after failover.&lt;/SPAN&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Original Source: member A eth0 IP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Original Destination: Any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Original Services: Any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Translated Source: Original&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Translated Destination: Original&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Translated Services: Original&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Original Source: member B eth0 IP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Original Destination: Any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Original Services: Any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Translated Source: Original&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Translated Destination: Original&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Translated Services: Original&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Regards.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;Simon&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 05:54:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Network-for-AWS-Security-Cluster-R81-20/m-p/180856#M231</guid>
      <dc:creator>Simon_Macpherso</dc:creator>
      <dc:date>2023-05-15T05:54:01Z</dc:date>
    </item>
  </channel>
</rss>

