<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Announce networks behind remote peer VPN to Virtual Network Gateway. Azure in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Announce-networks-behind-remote-peer-VPN-to-Virtual-Network/m-p/66400#M2585</link>
    <description>&lt;P&gt;Are you aiming to have a IPSEC tunnel across Express Route?&lt;/P&gt;&lt;P&gt;Or are you trying to stand up a tunnel across the internet to your CloudGuard gateways for backup?&lt;/P&gt;&lt;P&gt;Or are you trying to stand up tunnels to your CloudGuard gateways from external internet peers and you need internal resources to go across ER to your CloudGuard gateway and then out to the internet?&lt;/P&gt;</description>
    <pubDate>Fri, 01 Nov 2019 13:34:55 GMT</pubDate>
    <dc:creator>Tommy_Forrest</dc:creator>
    <dc:date>2019-11-01T13:34:55Z</dc:date>
    <item>
      <title>Announce networks behind remote peer VPN to Virtual Network Gateway. Azure</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Announce-networks-behind-remote-peer-VPN-to-Virtual-Network/m-p/66381#M2584</link>
      <description>&lt;P&gt;Hello Everybody&lt;/P&gt;&lt;P&gt;I have the following request,&lt;/P&gt;&lt;P&gt;We have an environment on Azure (R80.20 Cluster) and access to On-premises networks through ExpressRoute. We' configuring a tunnel VPN using VTIs with 3rd Party (Cisco). So,&amp;nbsp;&amp;nbsp;I would like to know if possible to announce the networks behind remote peer VPN, for example (10.236.150.128/27) on my virtual network gateway in order to announce it on the BGP to on-premises networks.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you so much for your attention and comments&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Everest&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2019 19:06:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Announce-networks-behind-remote-peer-VPN-to-Virtual-Network/m-p/66381#M2584</guid>
      <dc:creator>Everest_Aponte</dc:creator>
      <dc:date>2019-10-31T19:06:02Z</dc:date>
    </item>
    <item>
      <title>Re: Announce networks behind remote peer VPN to Virtual Network Gateway. Azure</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Announce-networks-behind-remote-peer-VPN-to-Virtual-Network/m-p/66400#M2585</link>
      <description>&lt;P&gt;Are you aiming to have a IPSEC tunnel across Express Route?&lt;/P&gt;&lt;P&gt;Or are you trying to stand up a tunnel across the internet to your CloudGuard gateways for backup?&lt;/P&gt;&lt;P&gt;Or are you trying to stand up tunnels to your CloudGuard gateways from external internet peers and you need internal resources to go across ER to your CloudGuard gateway and then out to the internet?&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2019 13:34:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Announce-networks-behind-remote-peer-VPN-to-Virtual-Network/m-p/66400#M2585</guid>
      <dc:creator>Tommy_Forrest</dc:creator>
      <dc:date>2019-11-01T13:34:55Z</dc:date>
    </item>
    <item>
      <title>Re: Announce networks behind remote peer VPN to Virtual Network Gateway. Azure</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Announce-networks-behind-remote-peer-VPN-to-Virtual-Network/m-p/66404#M2586</link>
      <description>&lt;P&gt;Hello Tommy&lt;/P&gt;&lt;P&gt;Thanks for your contact&lt;/P&gt;&lt;P&gt;Basically, We're configuring a Site to Site VPN with a Customer.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Site to Site VPN based VTIs&lt;/P&gt;&lt;P&gt;Peer Remote (Customer) ------------INTERNET --------------- Peer CheckPoint on AZURE&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Enviroment Azure&lt;/P&gt;&lt;P&gt;Peer CheckPoint on AZURE --------------ER-------------- ON-Premises&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Network Remote Peer: 10.236.150.128/29&amp;nbsp;&lt;/P&gt;&lt;P&gt;Network Peer CheckPoint on Azure: 10.236.1.0/24&lt;/P&gt;&lt;P&gt;Network ON Premises: 10.0.0.0/8&amp;nbsp;&lt;/P&gt;&lt;P&gt;The flow of Traffic: Bidirectional between 10.236.150.128/29 (remote peer network) and 10.0.0.0/8 (OnPremises network)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, This traffic has to go across the Express Route, We need to announce these VPNs networks so that Virtual Gateway.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you so much&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Everest&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2019 18:36:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Announce-networks-behind-remote-peer-VPN-to-Virtual-Network/m-p/66404#M2586</guid>
      <dc:creator>Everest_Aponte</dc:creator>
      <dc:date>2019-11-01T18:36:54Z</dc:date>
    </item>
    <item>
      <title>Re: Announce networks behind remote peer VPN to Virtual Network Gateway. Azure</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Announce-networks-behind-remote-peer-VPN-to-Virtual-Network/m-p/66468#M2587</link>
      <description>&lt;P&gt;Hi &lt;SPAN&gt;Everest,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I am not sure if this is working and I can not test it in my Azure environment as I do not have a ER running, but may be it´s worth trying:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;You could add the&amp;nbsp;&lt;SPAN&gt;remote peer network as additional Address space on the VNET, where your Checkpoint GW is&amp;nbsp; deployed:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Unbenannt.png" style="width: 482px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/2941iBB18A8FBE9C711AC/image-dimensions/482x300?v=v2" width="482" height="300" role="button" title="Unbenannt.png" alt="Unbenannt.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This should cause BGP to propagate that network to OnPrem.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In addition you may have to modify your UDRs, so that the&amp;nbsp;remote peer network is actually routed to the Checkpoint GW (you should already have such UDRs I guess)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Matthias&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Mon, 04 Nov 2019 07:26:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Announce-networks-behind-remote-peer-VPN-to-Virtual-Network/m-p/66468#M2587</guid>
      <dc:creator>Matthias_Haas</dc:creator>
      <dc:date>2019-11-04T07:26:10Z</dc:date>
    </item>
  </channel>
</rss>

