<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure VMSS - Gaia Certificates in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-Gaia-Certificates/m-p/81063#M2447</link>
    <description>&lt;P&gt;There's no official API to change the gateway object platform portal port.&lt;BR /&gt;However, it can probably be done with the generic-object API.&lt;BR /&gt;That said, it does not appear to be simple.&lt;BR /&gt;Hoping&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/37502"&gt;@Omer_Kleinstern&lt;/a&gt;&amp;nbsp;has an idea how to accomplish this.&lt;/P&gt;</description>
    <pubDate>Tue, 07 Apr 2020 04:55:04 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2020-04-07T04:55:04Z</dc:date>
    <item>
      <title>Azure VMSS - Gaia Certificates</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-Gaia-Certificates/m-p/80948#M2446</link>
      <description>&lt;P&gt;In Azure we use a VMSS with several FW Instances and we would like to configure the scale up and scale down process completely automatically.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For this we use the autoprov-cfg script (-cg) and add a configuration file with all necessary routes etc. for the FW Instances:&lt;/P&gt;&lt;P&gt;It looks more or less like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="java"&gt;#!/bin/bash
#
. /tmp/.CPprofile.sh
#
# clish
clish -c 'add host name host.test.org ipv4-address 10.30.10.58'
clish -c 'add host name hist2.tes.org ipv4-address 10.30.10.59'
clish -c 'set static-route 4.4.0.0/16 nexthop gateway address 10.26.0.241 on'
clish -c 'set ntp active on'
clish -c 'set ntp server primary 10.30.0.248 version 1'
clish -c 'set ntp server secondary 10.30.0.249 version 1'
clish -c 'add syslog log-remote-address 10.30.0.205 level all'
clish -c 'set expert-password-hash $1234567890'
clish -c 'save config'
#
#
# SecureXL Fast Access
echo "SAP" | fw ctl fast_accel add 1.1.1.1/32 10.10.10.10/32 50000 6
fw ctl fast_accel enable
#
#
# fw ctl set
fw ctl set int fw_reuse_established_conn 3299
#
#
# fwkern.conf
echo "fw_reuse_established_conn=3299" &amp;gt;&amp;gt; $FWDIR/boot/modules/fwkern.conf
#
#
# change sshd
sed -i 's/ChallengeResponseAuthentication yes/ChallengeResponseAuthentication no/g' /etc/ssh/sshd_config
service sshd restart
#
#
# change Gaia WebUI SSLCipher
cp /web/templates/httpd-ssl.conf.templ /web/templates/httpd-ssl.conf.templ.ORIGINAL
chmod -v u+w /web/templates/httpd-ssl.conf.templ
sed -i 's/SSLCipherSuite HIGH:!RC4:!LOW:!EXP:!aNULL:!SSLv2:!MD5/SSLCipherSuite ECDHE-RSA-AES256-SHA384:AES256-SHA256:!ADH:!EXP:RSA:+HIGH:+MEDIUM:!MD5:!LOW:!NULL:!SSLv2:!eNULL:!aNULL:!RC4:!SHA1:!3DES/g' /web/templates/httpd-ssl.conf.templ
sed -i 's/SSLProtocol -ALL {ifcmp = $httpd:ssl3_enabled 1}+{else}-{endif}SSLv3 +TLSv1 +TLSv1.1 +TLSv1.2/SSLProtocol -ALL {ifcmp = $httpd:ssl3_enabled 1}+{else}-{endif}SSLv3 +TLSv1.1 +TLSv1.2/g' /web/templates/httpd-ssl.conf.templ
chmod -v u-w /web/templates/httpd-ssl.conf.templ
#&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Problem:&lt;/P&gt;&lt;P&gt;The Gaia Web Certificate contains all VMSS DNS Names and IP Addresses as Subject Alternate Name and we would like to roll it out using the same script which is shown above.&amp;nbsp;&lt;/P&gt;&lt;P&gt;But the Multi Portal is active and the sk95064 doesn't work (change certificate files in /web/conf). The only option would be to change the Portal Port to 4434 for example.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can we somehow change the WebUI Gaia Port using CLI? "set web ssl-port 4434" is not an option, because it will be overwritten by a policy push.&lt;/P&gt;&lt;P&gt;Therefore we need a command like "mgmt_cli" or something else which is able to change the Portal Port from 443 to 4434. &lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Apr 2020 11:42:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-Gaia-Certificates/m-p/80948#M2446</guid>
      <dc:creator>Soeren_Rothe</dc:creator>
      <dc:date>2020-04-06T11:42:30Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VMSS - Gaia Certificates</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-Gaia-Certificates/m-p/81063#M2447</link>
      <description>&lt;P&gt;There's no official API to change the gateway object platform portal port.&lt;BR /&gt;However, it can probably be done with the generic-object API.&lt;BR /&gt;That said, it does not appear to be simple.&lt;BR /&gt;Hoping&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/37502"&gt;@Omer_Kleinstern&lt;/a&gt;&amp;nbsp;has an idea how to accomplish this.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 04:55:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-Gaia-Certificates/m-p/81063#M2447</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-04-07T04:55:04Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VMSS - Gaia Certificates</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-Gaia-Certificates/m-p/81106#M2448</link>
      <description>&lt;P&gt;&lt;SPAN&gt;An official API to change the gateway object platform portal port is in&amp;nbsp;development and&amp;nbsp;planned for the next release.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Unfortunately, it cannot be done&amp;nbsp;with the generic-object API.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 09:25:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-Gaia-Certificates/m-p/81106#M2448</guid>
      <dc:creator>Omer_Kleinstern</dc:creator>
      <dc:date>2020-04-07T09:25:33Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VMSS - Gaia Certificates</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-Gaia-Certificates/m-p/81113#M2449</link>
      <description>why don't you simply drop all https traffic to gateway and allow just certain source ip's?</description>
      <pubDate>Tue, 07 Apr 2020 11:30:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-Gaia-Certificates/m-p/81113#M2449</guid>
      <dc:creator>Martin_Valenta</dc:creator>
      <dc:date>2020-04-07T11:30:59Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VMSS - Gaia Certificates</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-Gaia-Certificates/m-p/81136#M2450</link>
      <description>Thanks. Do you think there is something available using dbebit?</description>
      <pubDate>Tue, 07 Apr 2020 13:26:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-Gaia-Certificates/m-p/81136#M2450</guid>
      <dc:creator>Soeren_Rothe</dc:creator>
      <dc:date>2020-04-07T13:26:02Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VMSS - Gaia Certificates</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-Gaia-Certificates/m-p/81137#M2451</link>
      <description>This is because of PCI regulation. This option is not allowed. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;</description>
      <pubDate>Tue, 07 Apr 2020 13:27:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-Gaia-Certificates/m-p/81137#M2451</guid>
      <dc:creator>Soeren_Rothe</dc:creator>
      <dc:date>2020-04-07T13:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VMSS - Gaia Certificates</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-Gaia-Certificates/m-p/81195#M2452</link>
      <description>Looks like something like the following might work:&lt;BR /&gt;&lt;BR /&gt;modify network_objects gw_object portals:0:main_url https://your-ip:4434&lt;BR /&gt;&lt;BR /&gt;You will need to verify in objects_5_0.C that the platform portal is listed first in the portals stanza.&lt;BR /&gt;It was in my case, but I'm not sure that's universally true or not.</description>
      <pubDate>Tue, 07 Apr 2020 19:57:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-Gaia-Certificates/m-p/81195#M2452</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-04-07T19:57:37Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VMSS - Gaia Certificates</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-Gaia-Certificates/m-p/81290#M2453</link>
      <description>&lt;P&gt;Hello Omer,&lt;/P&gt;&lt;P&gt;same challenge here, see &lt;A href="https://community.checkpoint.com/t5/API-CLI-Discussion-and-Samples/Generic-API-List-Index/m-p/81217/highlight/false#M4688" target="_blank"&gt;https://community.checkpoint.com/t5/API-CLI-Discussion-and-Samples/Generic-API-List-Index/m-p/81217/highlight/false#M4688&lt;/A&gt;&lt;/P&gt;&lt;P&gt;when will that new release come out that implements that imho very basic feature in the API?&lt;/P&gt;&lt;P&gt;Regards, Christian Riede&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 09:30:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-Gaia-Certificates/m-p/81290#M2453</guid>
      <dc:creator>Christian_Riede</dc:creator>
      <dc:date>2020-04-08T09:30:03Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VMSS - Gaia Certificates</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-Gaia-Certificates/m-p/81311#M2455</link>
      <description>&lt;P&gt;Looks good, my colleague&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8807"&gt;@Matthias_Haas&lt;/a&gt;&amp;nbsp;tried it and it seems to work fine &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="javascript"&gt;dbedit&amp;gt; modify network_objects gwr8030v2 portals:0:main_url https://10.0.0.1:4455

dbedit&amp;gt; quit -update_all
network_objects::gwr8030v2 Updated Successfully

[Expert@mngr8030:0]#&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 11:13:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-Gaia-Certificates/m-p/81311#M2455</guid>
      <dc:creator>Soeren_Rothe</dc:creator>
      <dc:date>2020-04-08T11:13:46Z</dc:date>
    </item>
  </channel>
</rss>

