<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Add routes to Azure Scale Set in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/75811#M2560</link>
    <description>Ultimately, in IaaS settings, the routing is controlled by the underlying 'aaS' platform (in this case Azure).&lt;BR /&gt;There are some routes on the instance but the most you can influence there is what interface the traffic might go out.&lt;BR /&gt;Where it goes from there is controlled by Azure, fundamentally.</description>
    <pubDate>Thu, 20 Feb 2020 01:34:24 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2020-02-20T01:34:24Z</dc:date>
    <item>
      <title>Add routes to Azure Scale Set</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/75810#M2559</link>
      <description>&lt;P&gt;We have a scale set that was created in Azure. Unfortunately I do not have access to Azure. How are routes added to the scale set? Through the Gaia gui or via the Azure interface?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2020 01:02:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/75810#M2559</guid>
      <dc:creator>J_Saun</dc:creator>
      <dc:date>2020-02-20T01:02:06Z</dc:date>
    </item>
    <item>
      <title>Re: Add routes to Azure Scale Set</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/75811#M2560</link>
      <description>Ultimately, in IaaS settings, the routing is controlled by the underlying 'aaS' platform (in this case Azure).&lt;BR /&gt;There are some routes on the instance but the most you can influence there is what interface the traffic might go out.&lt;BR /&gt;Where it goes from there is controlled by Azure, fundamentally.</description>
      <pubDate>Thu, 20 Feb 2020 01:34:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/75811#M2560</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-02-20T01:34:24Z</dc:date>
    </item>
    <item>
      <title>Re: Add routes to Azure Scale Set</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/75812#M2561</link>
      <description>&lt;P&gt;Ok. Right now I have a large route (10.0.0.0/8) on the scale set pointing to the internal load balancer. That should be carved up and have some of the 10.x.x.x (lets say 10.1.1.0/24) pointing towards the internal load balancer and some (10.30.1.0/24) pointing to the external load balancer. Would this routing need to be updated in Azure?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2020 01:39:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/75812#M2561</guid>
      <dc:creator>J_Saun</dc:creator>
      <dc:date>2020-02-20T01:39:36Z</dc:date>
    </item>
    <item>
      <title>Re: Add routes to Azure Scale Set</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/75814#M2562</link>
      <description>Yes, these are done as User Defined Routes in Azure.&lt;BR /&gt;Refer to: &lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_VMSS_for_Azure/Content/Topics/Overview.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_VMSS_for_Azure/Content/Topics/Overview.htm&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 20 Feb 2020 02:26:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/75814#M2562</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-02-20T02:26:32Z</dc:date>
    </item>
    <item>
      <title>Re: Add routes to Azure Scale Set</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/75825#M2563</link>
      <description>&lt;P&gt;by&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;lt;Right now I have a large route (10.0.0.0/8) on the scale set pointing to the internal load balancer&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;do you mean the route on a ScaleSet Checkpoint&amp;nbsp; member?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If so, the next hop should be the first IP of the internal subnet (where eth1 is connected to) and not the internal loadbalancer IP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;With the latest ScaleSet template Checkpoint is adding at least four routes&amp;nbsp; per default:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- rfc1918 IPs (10/8,172.16/12, 192.168/16) pointing to the first IP of the internal network (eth1)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- default route pointing to the first IP of the external network (eth0)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;That is ok and in most cases you do not have to make any modifications&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another story is to get the traffic to the scale set&lt;/P&gt;&lt;P&gt;In this case you need UDRs which have the VIP of the internal loadbalancer as the next hop. This is done completely in Azure.&lt;/P&gt;&lt;P&gt;How such a UDR looks like depends on how your VNET and subnet are designed,&amp;nbsp;what&amp;nbsp; Peerings you have and which traffic you´d like to forward to the scaleset&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2020 05:56:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/75825#M2563</guid>
      <dc:creator>Matthias_Haas</dc:creator>
      <dc:date>2020-02-20T05:56:38Z</dc:date>
    </item>
    <item>
      <title>Re: Add routes to Azure Scale Set</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/75831#M2564</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/13578"&gt;@J_Saun&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You must set multiple routes on the Check Point cluster gateway and routes in azure.&lt;/P&gt;
&lt;P&gt;You may need to adjust your networks accordingly&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;(1.1.1.1) frontend-lb&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;lt;&amp;gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; check point gateway&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;lt;&amp;gt;&amp;nbsp; &amp;nbsp;backend-lb (10.0.1.4)&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;lt;&amp;gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; example network 10.0.2.0/24&lt;/P&gt;
&lt;P&gt;azure network controler 10.0.0.1&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;azure network controler 10.0.1.1&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check Point gateway:&lt;/P&gt;
&lt;P&gt;0.0.0.0/0 to your external network 10.0.0.1&lt;/P&gt;
&lt;P&gt;10.0.0.0/8 to your internal network 10.0.1.1&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Azure routing UDR example for a network 10.0.2.0/24 behind the gateway:&lt;/P&gt;
&lt;P&gt;0.0.0.0/0 virual appliance 10.0.1.4 (IP address of the backend-lb)&lt;/P&gt;
&lt;P&gt;10.0.0.0/8 virtual appliance 10.0.1.4 (IP address of the backend-lb)&lt;/P&gt;
&lt;P&gt;10.0.2.0/24 virtual network (your example 10.0.2.0/24 network)&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2020 13:13:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/75831#M2564</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-02-20T13:13:25Z</dc:date>
    </item>
    <item>
      <title>Re: Add routes to Azure Scale Set</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/75867#M2565</link>
      <description>&lt;P&gt;Thanks for all of the replies. Do I leave the default routes that were added (the large RFC1918's) and just add my user defined routes (UDR's) in Azure? Will the more discrete UDR's be used first?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2020 12:11:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/75867#M2565</guid>
      <dc:creator>J_Saun</dc:creator>
      <dc:date>2020-02-20T12:11:35Z</dc:date>
    </item>
    <item>
      <title>Re: Add routes to Azure Scale Set</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/75943#M2566</link>
      <description>UDRs work on the same principle routes on a traditional PC or router work: the most explicit route (with the highest priority) wins.</description>
      <pubDate>Thu, 20 Feb 2020 20:57:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/75943#M2566</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-02-20T20:57:56Z</dc:date>
    </item>
    <item>
      <title>Re: Add routes to Azure Scale Set</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/76034#M2567</link>
      <description>&lt;P&gt;Before I add UDR's I wanted to validate something. Please reference the attached drawing (Note - address space depicted in the diag is not actual but mimics the setup we have),&lt;/P&gt;&lt;P&gt;My Scale set route table currently looks like this:&lt;/P&gt;&lt;P&gt;Default points to 10.70.80.1&lt;/P&gt;&lt;P&gt;10.0.0.0/8 points to 10.200.200.10&lt;/P&gt;&lt;P&gt;172.16.0.0/12 points to 10.200.200.10&lt;/P&gt;&lt;P&gt;192.168.0.0/16 points to 10.200.200.10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As you can see in the diag the External Load Balancer has an Internet IP on it (52.200.100.9) yet my default route points to a host on the external network 10.70.80.0/24. The Azure team says that 10.70.80.1 is an IP owned by Microsoft Azure.&lt;/P&gt;&lt;P&gt;Shouldn't my default route point to 52.200.100.9?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2020 00:41:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/76034#M2567</guid>
      <dc:creator>J_Saun</dc:creator>
      <dc:date>2020-02-22T00:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: Add routes to Azure Scale Set</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/76083#M2568</link>
      <description>&lt;P&gt;Not sure why this has been accepted as a solution. Checkpoint support said 'you dont add routes on the firewalls, you add them in Azure as UDR's' but did not detail WHERE to add them in Azure. Do we add them on the load balancers or the firewall?&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2020 21:48:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/76083#M2568</guid>
      <dc:creator>J_Saun</dc:creator>
      <dc:date>2020-02-22T21:48:24Z</dc:date>
    </item>
    <item>
      <title>Re: Add routes to Azure Scale Set</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/76087#M2569</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/13578"&gt;@J_Saun&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You must set routes on the check point in direction of the internal Azure network. If the support wrote something else it is wrong.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Load Balancer:&lt;/STRONG&gt; On the Load Balancer you have to set no routes and you can't.&amp;nbsp;Only for incoming NAT from the Internet, load balancer rules must be set on the frontend-lb.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Firewall:&lt;/STRONG&gt; Set routes to internal network.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Azure:&lt;/STRONG&gt; Set UDR on internal networks to backend-lb IP and set 0.0.0.0/0 (default route) on internal networks to backend-lb IP&amp;nbsp;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Here an cutout from&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110194" target="_self"&gt;sk110194 - Deploying a Check Point Cluster in Microsoft Azure&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;CUT&amp;gt;&amp;gt;&amp;gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;H2 id="Setting up routes on the cluster members to the Internal subnets"&gt;Setting up routes on the cluster members to the Internal subnets&lt;/H2&gt;
&lt;DIV&gt;&lt;BR /&gt;
&lt;DIV id="Toggle_routes_on_cluster_members"&gt;
&lt;P&gt;SSH into each of the cluster members and add the following route:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;clish -c 'set static-route VIRTUAL-NETWORK-PREFIX nexthop gateway address ETH1-ROUTER on' -s&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Where:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;EM&gt;VIRTUAL-NETWORK-PREFIX&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is the prefix of the entire virtual network (e.g. 10.0.0.0/16)&lt;/LI&gt;
&lt;LI&gt;&lt;EM&gt;ETH1-ROUTER&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is the first unicast IP address on the subnet to which eth1 is connected (e.g. 10.0.2.1)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For example:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;clish -c 'set static-route 10.0.0.0/16 nexthop gateway address 10.0.2.1 on' -s&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If the virtual network is comprised of several non-contiguous address prefixes, repeat the above for each prefix.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;&amp;lt;&amp;lt;&amp;lt;CUT&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2020 22:30:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/76087#M2569</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-02-22T22:30:14Z</dc:date>
    </item>
    <item>
      <title>Re: Add routes to Azure Scale Set</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/76092#M2570</link>
      <description>&lt;P&gt;Ok. But this is a scale set, currently running at 2 instances (to a maximum scale of 8). If I modify the routes on these 2 instances will those routes get automatically propagated to the additional scale set instances once they come online?&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2020 23:52:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/76092#M2570</guid>
      <dc:creator>J_Saun</dc:creator>
      <dc:date>2020-02-22T23:52:30Z</dc:date>
    </item>
    <item>
      <title>Re: Add routes to Azure Scale Set</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/76111#M2571</link>
      <description>&lt;P&gt;this section of the SK is outdated/no longer necessary:&lt;/P&gt;&lt;P&gt;&amp;lt;Setting up routes on the cluster members to the Internal subnets&lt;/P&gt;&lt;P&gt;With the latest ScaleSet template routes for the RFC1918 IP ranges&amp;nbsp; are added per default, no modification is necessary.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2020 09:24:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/76111#M2571</guid>
      <dc:creator>Matthias_Haas</dc:creator>
      <dc:date>2020-02-23T09:24:20Z</dc:date>
    </item>
    <item>
      <title>Re: Add routes to Azure Scale Set</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/76119#M2572</link>
      <description>&lt;P&gt;Thanks. I do see those RFC1918 routes on the scale set in the Gaia gui.&lt;/P&gt;&lt;P&gt;We have a need to route to an RFC1918 address outside (externally) through the expressroute gateway to an on prem environment which I why I am asking how to configure UDR's. I just realized that I failed to mention this in my original post. My apologies.&lt;/P&gt;&lt;P&gt;Right now when I try to go form the manager to this external RFC1918 address, it hit's the scale set and then returns right back out the same interface in which it came in so I need tell them Azure team where to put this RFC1918 route (scale set or load balancer or both)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2020 13:47:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/76119#M2572</guid>
      <dc:creator>J_Saun</dc:creator>
      <dc:date>2020-02-23T13:47:33Z</dc:date>
    </item>
    <item>
      <title>Re: Add routes to Azure Scale Set</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/76120#M2573</link>
      <description>&lt;P&gt;you need two UDRs:&lt;/P&gt;&lt;P&gt;one for the subnet in which your manager is located:&lt;/P&gt;&lt;P&gt;external rfc1918 network -&amp;gt;(next hop)&amp;nbsp; internal LB VIP&lt;/P&gt;&lt;P&gt;I guess you already do have this in place as the packet is reaching the scale set.&lt;/P&gt;&lt;P&gt;Second UDR is for the subnet in which your expressroute gateway is located (called GatewaySubnet) :&lt;/P&gt;&lt;P&gt;manager Subnet -&amp;gt; (next hop) internal LB VIP&lt;/P&gt;&lt;P&gt;You do not need a UDR for the subnet(s) in which the scalest is deployed.&lt;/P&gt;&lt;P&gt;Is is normal that only the internal interface (eth1) is used, it´s like a&amp;nbsp; OneArmed setup.&lt;/P&gt;&lt;P&gt;So the packet flows looks like this:&lt;/P&gt;&lt;P&gt;manager ---&amp;gt;VIP LB--- (eth1)--&amp;gt; scaleset member --(eth1) --&amp;gt; express router ----&amp;gt; destination&lt;/P&gt;&lt;P&gt;destination ----&amp;gt; express router ---&amp;gt; VIP LB ---(eth1) --&amp;gt;&amp;nbsp; same scaleset member --(eth1)--&amp;gt; manager&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2020 14:14:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/76120#M2573</guid>
      <dc:creator>Matthias_Haas</dc:creator>
      <dc:date>2020-02-23T14:14:29Z</dc:date>
    </item>
    <item>
      <title>Re: Add routes to Azure Scale Set</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/76124#M2574</link>
      <description>&lt;P&gt;Thanks. I've updated the diagram to reflect what I think needs to be done based on your reply.&lt;/P&gt;&lt;P&gt;Summary:&lt;/P&gt;&lt;P&gt;- Add a UDR in the External Network vNet - DEST=10.20.30.0/24 - Next Hop=Express Route GW&lt;/P&gt;&lt;P&gt;- Add a UDR in the External Network vNet - Dest=10.90.80.0/24 - Next Hop=10.200.200.10 (Internal LB VIP)&lt;/P&gt;&lt;P&gt;Does this look correct?&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2020 17:16:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Add-routes-to-Azure-Scale-Set/m-p/76124#M2574</guid>
      <dc:creator>J_Saun</dc:creator>
      <dc:date>2020-02-23T17:16:58Z</dc:date>
    </item>
  </channel>
</rss>

