<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Failover Issue with AWS deployment in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/62613#M2690</link>
    <description>&lt;P&gt;I would involve TAC here - AWS is only poorly documented and does change so quickly...&lt;/P&gt;</description>
    <pubDate>Thu, 12 Sep 2019 14:18:50 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2019-09-12T14:18:50Z</dc:date>
    <item>
      <title>Failover Issue with AWS deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/61985#M2684</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have deployed Firewall in AWS in HA.&lt;/P&gt;&lt;P&gt;We have multiplease server configure in Static nat which is accessible from out side.&lt;/P&gt;&lt;P&gt;we deployed firewall in cluster, we add virtual IP as secondary IP in Active Firewall interface and other multiple IPs which used for Static NAT.&lt;/P&gt;&lt;P&gt;where my PRI IP:- 172.31.24.120, SEC IP :- 172.31.24.130 and vertual IP is :- 172.31.24.110&lt;/P&gt;&lt;P&gt;We add the route for all subnet in AWS through the active firewall Network Interface. (172.31.24.120 secondary IP 172.31.24.110)&lt;/P&gt;&lt;P&gt;Traffic is passing through the active firewall and everything is working fine.&lt;/P&gt;&lt;P&gt;when we failover the traffic from Active to Standby. after few minuted all secondary Ip is mapped with Standby Firewall network interface.&lt;/P&gt;&lt;P&gt;But route is not changed.&lt;/P&gt;&lt;P&gt;When we check the traceroute, traffic is goint through Active firewall interface 172.31.24.120. it should go through the Virtual IP (172.31.24.110)&lt;/P&gt;&lt;P&gt;Thats why our traffic is not working.&lt;/P&gt;&lt;P&gt;when we change the route manually and add the Standby Firewall Network Interface traffic started working.&lt;/P&gt;&lt;P&gt;and checked the Traceroute, it is going through the Virtual IP (172.31.24.110)&lt;/P&gt;&lt;P&gt;Please someone help me to resolve the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2019 20:21:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/61985#M2684</guid>
      <dc:creator>Abhishek_Kumar1</dc:creator>
      <dc:date>2019-09-05T20:21:01Z</dc:date>
    </item>
    <item>
      <title>Re: Failover Issue with AWS deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/62335#M2685</link>
      <description>What version/build of gateway?&lt;BR /&gt;Did you deploy this as part of a CloudFormation script that we've provided or done this manually?&lt;BR /&gt;In general, the routes should fail over if you've deployed per the instructions: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104418" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104418&lt;/A&gt;</description>
      <pubDate>Mon, 09 Sep 2019 22:27:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/62335#M2685</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-09-09T22:27:11Z</dc:date>
    </item>
    <item>
      <title>Re: Failover Issue with AWS deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/62371#M2686</link>
      <description>We are using R80.20 version, and we deployed manually.&lt;BR /&gt;Problem is my secondary IP mapped with standby IP while failover the traffic.&lt;BR /&gt;But only routing table is not updating after failover.&lt;BR /&gt;thats why traffic is not shifted to standby FW.&lt;BR /&gt;We are rebuilding the firewalls with new Version R80.30 then we will verify the Failover. if any face any issue let you know.</description>
      <pubDate>Tue, 10 Sep 2019 10:07:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/62371#M2686</guid>
      <dc:creator>Abhishek_Kumar1</dc:creator>
      <dc:date>2019-09-10T10:07:28Z</dc:date>
    </item>
    <item>
      <title>Re: Failover Issue with AWS deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/62494#M2687</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;We upgrade the Firewall in R80.30,&lt;/P&gt;&lt;P&gt;Our network interface is not updating after failover, i aws routing table.&lt;/P&gt;&lt;P&gt;I am pasting python script output below, please suggest,&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@N-MUILPRODCFW01:0]# $FWDIR/scripts/aws_ha_test.py&lt;BR /&gt;Set operation succeeded&lt;/P&gt;&lt;P&gt;Testing if DNS is configured...&lt;BR /&gt;Primary DNS server is: 172.31.23.5&lt;/P&gt;&lt;P&gt;Testing if DNS is working...&lt;BR /&gt;DNS resolving test was successful&lt;/P&gt;&lt;P&gt;Testing metadata connectivity...&lt;BR /&gt;Region : eu-west-1&lt;BR /&gt;VPC : vpc-c56d8ba1&lt;BR /&gt;Domain : amazonaws.com&lt;/P&gt;&lt;P&gt;Testing for IAM role...&lt;BR /&gt;Role: Checkpoint_Cluster_R80&lt;/P&gt;&lt;P&gt;Testing for IAM credentials...&lt;BR /&gt;IAM credentials retrieved successfully&lt;/P&gt;&lt;P&gt;Testing cluster interface configuration...&lt;BR /&gt;Cluster interface configuration tested successfully&lt;/P&gt;&lt;P&gt;Testing connection to ec2.eu-west-1.amazonaws.com:443...&lt;BR /&gt;The connection was opened successfully&lt;/P&gt;&lt;P&gt;Comparing the system clock to AWS&lt;BR /&gt;Time difference is 0:00:00.799726&lt;BR /&gt;The system clock is synchronized&lt;/P&gt;&lt;P&gt;Testing AWS interface configuration...&lt;/P&gt;&lt;P&gt;All tests were successful!&lt;BR /&gt;[Expert@N-MUILPRODCFW01:0]#&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 15:12:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/62494#M2687</guid>
      <dc:creator>Abhishek_Kumar1</dc:creator>
      <dc:date>2019-09-11T15:12:29Z</dc:date>
    </item>
    <item>
      <title>Re: Failover Issue with AWS deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/62525#M2688</link>
      <description>How are you checking the routing table?&lt;BR /&gt;You won't necessarily see it on the OS of the gateways, but reflected in AWS.&lt;BR /&gt;Suspect the issue is with your IAM role, particularly if you set it up manually versus using a CloudFormation script to do it.</description>
      <pubDate>Thu, 12 Sep 2019 00:23:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/62525#M2688</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-09-12T00:23:08Z</dc:date>
    </item>
    <item>
      <title>Re: Failover Issue with AWS deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/62576#M2689</link>
      <description>&lt;P&gt;&lt;STRONG&gt;routing checking on AWS only, and i already verified the IAM role as well.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;not find any issue with IAM role its create as per SK104418&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;For your visibility i am pasting you IAM role Policy details below.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;{&lt;BR /&gt;"Version": "2012-10-17",&lt;BR /&gt;"Statement": [&lt;BR /&gt;{&lt;BR /&gt;"Action": [&lt;BR /&gt;"ec2:DescribeRouteTables",&lt;BR /&gt;"ec2:ReplaceRoute",&lt;BR /&gt;"ec2:AssignPrivateIpAddresses",&lt;BR /&gt;"ec2:DescribeNetworkInterfaces",&lt;BR /&gt;"ec2:CreateRoute"&lt;BR /&gt;],&lt;BR /&gt;"Effect": "Allow",&lt;BR /&gt;"Resource": "*"&lt;BR /&gt;}&lt;BR /&gt;]&lt;BR /&gt;}&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2019 10:17:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/62576#M2689</guid>
      <dc:creator>Abhishek_Kumar1</dc:creator>
      <dc:date>2019-09-12T10:17:50Z</dc:date>
    </item>
    <item>
      <title>Re: Failover Issue with AWS deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/62613#M2690</link>
      <description>&lt;P&gt;I would involve TAC here - AWS is only poorly documented and does change so quickly...&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2019 14:18:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/62613#M2690</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-09-12T14:18:50Z</dc:date>
    </item>
    <item>
      <title>Re: Failover Issue with AWS deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/62633#M2691</link>
      <description>&lt;P&gt;Thanks for your update,&lt;/P&gt;&lt;P&gt;We already engage TAC on this let see if they can provide us solution for the same.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2019 14:59:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/62633#M2691</guid>
      <dc:creator>Abhishek_Kumar1</dc:creator>
      <dc:date>2019-09-12T14:59:03Z</dc:date>
    </item>
    <item>
      <title>Re: Failover Issue with AWS deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/62642#M2692</link>
      <description>&lt;P&gt;We already open a case for R77.30 with same issue.&lt;/P&gt;&lt;P&gt;They are working on last few months, but not able to provide us solution.&lt;/P&gt;&lt;P&gt;now when we raise a new case they are asking, this is new deployment so we are not going to help you.&lt;/P&gt;&lt;P&gt;Could you please provide you any solution for that?&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2019 16:31:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/62642#M2692</guid>
      <dc:creator>Abhishek_Kumar1</dc:creator>
      <dc:date>2019-09-12T16:31:10Z</dc:date>
    </item>
    <item>
      <title>Re: Failover Issue with AWS deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/62658#M2693</link>
      <description>The solution is not to use R77.30, as it is End of Support as of this month.&lt;BR /&gt;You should be using the most recent release (R80.30) in public cloud.&lt;BR /&gt;I believe we will be delisting R80.20 from the various marketplaces in the near future.</description>
      <pubDate>Thu, 12 Sep 2019 18:47:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/62658#M2693</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-09-12T18:47:37Z</dc:date>
    </item>
    <item>
      <title>Re: Failover Issue with AWS deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/90183#M2694</link>
      <description>&lt;P&gt;we have a same the problem yet...but still not been resolved now....&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jun 2020 15:21:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Failover-Issue-with-AWS-deployment/m-p/90183#M2694</guid>
      <dc:creator>Bill_wang</dc:creator>
      <dc:date>2020-06-30T15:21:19Z</dc:date>
    </item>
  </channel>
</rss>

