<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CloudGuard R80.30 and ESX in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-R80-30-and-ESX/m-p/63600#M2739</link>
    <description>&lt;P&gt;Gerard,&lt;/P&gt;&lt;P&gt;sk126952 states for CloudGuard for &lt;STRONG&gt;NSX&lt;/STRONG&gt;, especially for NSX. There is no need to add additional interfaces to this VM.&lt;/P&gt;&lt;P&gt;As I understand your writing, you want to run a gateway virtualized on ESX. This is no problem and using tagged VLANs is too no problem. Did you enabled your portgroup on ESX for VLAN trunking and allowed your needed VLANs?&lt;/P&gt;&lt;P&gt;Wolfgang&lt;/P&gt;</description>
    <pubDate>Tue, 24 Sep 2019 20:03:30 GMT</pubDate>
    <dc:creator>Wolfgang</dc:creator>
    <dc:date>2019-09-24T20:03:30Z</dc:date>
    <item>
      <title>CloudGuard R80.30 and ESX</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-R80-30-and-ESX/m-p/63573#M2738</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;A query as it relates to vlan tagging in CloudGuard R80.30 in an ESX environment. There is a limitation in ESX of 10 NIC per virtual machine. I have been trying to do VLAN tagging on the CloudGuard vm, however the traffic does not appear to reach the virtual network.&lt;/P&gt;&lt;P&gt;Looking through Secure Knowledge, we have identified a&amp;nbsp; for a known limitation in CloudGuard on ESX all the way to R80.10, the ID is '00525805', the sk that we located this in was 'sk126952'.&lt;/P&gt;&lt;P&gt;Is this still a known&amp;nbsp; limitation in R80.30.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2019 14:42:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-R80-30-and-ESX/m-p/63573#M2738</guid>
      <dc:creator>Gerard_O_Connor</dc:creator>
      <dc:date>2019-09-24T14:42:49Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard R80.30 and ESX</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-R80-30-and-ESX/m-p/63600#M2739</link>
      <description>&lt;P&gt;Gerard,&lt;/P&gt;&lt;P&gt;sk126952 states for CloudGuard for &lt;STRONG&gt;NSX&lt;/STRONG&gt;, especially for NSX. There is no need to add additional interfaces to this VM.&lt;/P&gt;&lt;P&gt;As I understand your writing, you want to run a gateway virtualized on ESX. This is no problem and using tagged VLANs is too no problem. Did you enabled your portgroup on ESX for VLAN trunking and allowed your needed VLANs?&lt;/P&gt;&lt;P&gt;Wolfgang&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2019 20:03:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-R80-30-and-ESX/m-p/63600#M2739</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2019-09-24T20:03:30Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard R80.30 and ESX</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-R80-30-and-ESX/m-p/63899#M2740</link>
      <description>I believe the limitation is with ESX, not us.&lt;BR /&gt;We can definitely support more in physical security gateways, which runs largely the same code.</description>
      <pubDate>Sat, 28 Sep 2019 22:54:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-R80-30-and-ESX/m-p/63899#M2740</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-09-28T22:54:08Z</dc:date>
    </item>
  </channel>
</rss>

