<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CloudGuard AWS in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-AWS/m-p/80024#M2424</link>
    <description>&lt;P&gt;are you using the Target Group to the Gateways in a different port than 443, because the GW have a web server inside serving 443, you can also automate the proper rules by tagging the balancer...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for example,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NLB (443) --&amp;gt; TG GW (1443) --&amp;gt; ALB (443) --&amp;gt; TG WebServers (80)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this can be done by adding tags to the Internal LB&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;x-chkp-management : &amp;lt;management-name&amp;gt;&lt;/P&gt;
&lt;P&gt;x-chkp-template : &amp;lt;template-name-for-gw&amp;gt;&lt;/P&gt;
&lt;P&gt;x-chkp-forwarding : https-1443-443&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now my best advise will be use the ALB outside, with that you ensure to present the certificate to your users and decrypt the traffic, with this the GW and Web Server will see clear traffic and use less CPU.&lt;/P&gt;</description>
    <pubDate>Fri, 27 Mar 2020 20:26:43 GMT</pubDate>
    <dc:creator>ChristianCastil</dc:creator>
    <dc:date>2020-03-27T20:26:43Z</dc:date>
    <item>
      <title>CloudGuard AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-AWS/m-p/79257#M2420</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have set up a Cloudguard in AWS in Ingress VPC as below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NLB forwarding by IP Address&lt;/P&gt;&lt;P&gt;NLB -&amp;gt; Cloudguard -&amp;gt; ALB -&amp;gt; servers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently ports open are 80 and 443.&lt;/P&gt;&lt;P&gt;Public users are able to access the webpage by HTTP,&amp;nbsp;but when users tried HTTPS it will reach up to the warning website security certificate page. After clicking "Continue to This Website (not recommended)"&amp;nbsp;the page can't be reach. We are not using https inspection on the Cloudguard.&lt;/P&gt;&lt;P&gt;I have done tcpdump and there is a 2 way traffic from the NLB and the Cloudguard. I have done zdebug drop, there is no drop for this communication as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The AWS team have tried connecting directly for NLB to ALB by passing the Cloudguard and the are able to connect using both HTTP and HTTPS from public.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 04:09:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-AWS/m-p/79257#M2420</guid>
      <dc:creator>Muhammad_Ansour</dc:creator>
      <dc:date>2020-03-23T04:09:20Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-AWS/m-p/79260#M2421</link>
      <description>My question is: what certificate is presented when you get the error?</description>
      <pubDate>Mon, 23 Mar 2020 04:17:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-AWS/m-p/79260#M2421</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-23T04:17:05Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-AWS/m-p/79305#M2422</link>
      <description>&lt;P&gt;It's the domain certificate. I will ask them to create a by pass Cloudguard again and check if the certificate is the same. Is that where you are getting at?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 07:56:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-AWS/m-p/79305#M2422</guid>
      <dc:creator>Muhammad_Ansour</dc:creator>
      <dc:date>2020-03-23T07:56:49Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-AWS/m-p/79312#M2423</link>
      <description>&lt;P&gt;Just to add it shows Certificate(invalid)&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 08:19:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-AWS/m-p/79312#M2423</guid>
      <dc:creator>Muhammad_Ansour</dc:creator>
      <dc:date>2020-03-23T08:19:42Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-AWS/m-p/80024#M2424</link>
      <description>&lt;P&gt;are you using the Target Group to the Gateways in a different port than 443, because the GW have a web server inside serving 443, you can also automate the proper rules by tagging the balancer...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for example,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NLB (443) --&amp;gt; TG GW (1443) --&amp;gt; ALB (443) --&amp;gt; TG WebServers (80)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this can be done by adding tags to the Internal LB&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;x-chkp-management : &amp;lt;management-name&amp;gt;&lt;/P&gt;
&lt;P&gt;x-chkp-template : &amp;lt;template-name-for-gw&amp;gt;&lt;/P&gt;
&lt;P&gt;x-chkp-forwarding : https-1443-443&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now my best advise will be use the ALB outside, with that you ensure to present the certificate to your users and decrypt the traffic, with this the GW and Web Server will see clear traffic and use less CPU.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Mar 2020 20:26:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-AWS/m-p/80024#M2424</guid>
      <dc:creator>ChristianCastil</dc:creator>
      <dc:date>2020-03-27T20:26:43Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-AWS/m-p/80099#M2425</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are using target group 443 and 80.&lt;/P&gt;&lt;P&gt;I haven't make any changes yet, but now I the are drop packets from the command tcpdump icmp and zdebug drop as below:&lt;/P&gt;&lt;P&gt;tcpdump:&lt;/P&gt;&lt;P&gt;.58 = FW external IP&lt;/P&gt;&lt;P&gt;.20 = FW Internal IP to ALB&lt;/P&gt;&lt;P&gt;.168 = ALB IP&lt;/P&gt;&lt;P&gt;15:13:10.923992 In 00:00:00:00:00:00 ethertype IPv4 (0x0800), length 72: xx.xx.xx.58 &amp;gt; xx.xx.xx.20: ICMP xx.xx.xx.168 unreachable - need to frag (mtu 1500), length 36&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;zdebug drop&lt;/P&gt;&lt;P&gt;@;7947254;[cpu_3];[fw4_0];fw_log_drop_ex: Packet proto=6 xx.xx.xx.20:443 -&amp;gt; xx.xx.xx.168:59586 dropped by fwmultik_process_f2p_cookie_inner Reason: fwmultik_f2p_cookie_outbound_and_routing failed;&lt;/P&gt;&lt;P&gt;@;7947264;[cpu_1];[fw4_1];fw_log_drop_ex: Packet proto=6 xx.xx.xx.20:443 -&amp;gt; xx.xx.xx.25:53150 dropped by fwmultik_process_f2p_cookie_inner Reason: fwmultik_f2p_cookie_outbound_and_routing failed;&lt;/P&gt;&lt;P&gt;@;7947270;[cpu_1];[fw4_1];fw_log_drop_ex: Packet proto=6 xx.xx.xx.20:443 -&amp;gt; xx.xx.xx.25:53150 dropped by fwmultik_process_f2p_cookie_inner Reason: fwmultik_f2p_cookie_outbound_and_routing failed;&lt;/P&gt;&lt;P&gt;@;7947271;[cpu_3];[fw4_0];fw_log_drop_ex: Packet proto=6 xx.xx.xx.20:443 -&amp;gt; xx.xx.xx.168:59586 dropped by fwmultik_process_f2p_cookie_inner Reason: fwmultik_f2p_cookie_outbound_and_routing failed;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Mar 2020 07:16:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-AWS/m-p/80099#M2425</guid>
      <dc:creator>Muhammad_Ansour</dc:creator>
      <dc:date>2020-03-29T07:16:36Z</dc:date>
    </item>
  </channel>
</rss>

