<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure VMSS R80.30 issue in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-R80-30-issue/m-p/65547#M2771</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Our VMSS solution does not support handling E-W traffic via eth0. The External Load Balancer is connected to eth0 and the Internal Load Balancer is connected to eth1 and used for internal traffic.&lt;/P&gt;
&lt;P&gt;Since internal E-W traffic's next-hop should be the ILB's frontend IP, traffic will enter the Check Point GWs on eth1.&lt;/P&gt;
&lt;P&gt;In addition, using eth1 and Azure's internal load balancer (with HA ports) for E-W traffic allows forwarding E-W traffic without doing Source NAT.&lt;/P&gt;
&lt;P&gt;I suggest to reconsider the architecture. If the problem is subnet address spaces you can consider redeploying the VMSS solution and switching the subnets of the VMSS frontend and backend.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Dmitry&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 22 Oct 2019 09:32:29 GMT</pubDate>
    <dc:creator>Dmitry_Gorn</dc:creator>
    <dc:date>2019-10-22T09:32:29Z</dc:date>
    <item>
      <title>Azure VMSS R80.30 issue</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-R80-30-issue/m-p/64877#M2766</link>
      <description>&lt;P&gt;Hi Mates,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have deployed the VMSS solution with custom blades and everything looks fine from management, gateway, policy perspective.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the day of actual cutover of traffic from traditional cluster to the VMSS Lb, it failed really bad &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The traffic we are testing is EAST - West, with no NAT needed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;On investigation, I could see the the initial traffic reaching the destination sever and response coming to my VMSS gateway... But for some reason the response / reply is not reaching the source machine.&amp;nbsp;&lt;/P&gt;&lt;P&gt;( and I know it's not lb persistence issue, since added persistence with client up &amp;amp;port -&amp;gt; all the traffic is passing thru one gateway)&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have checked all the routing, NSG, etc --- everything is pretty much same, since we are just changing the routes to point to the new vmss lb, instead of old cluster lb ...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can see that eth0 - in vmss instance has ipforwarding as false in Azure ,&amp;nbsp; also eth1 doesnot has the default NSG attached... Is this correct??&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone faced same issue?? Do let me know if I am missing something in the VMSS deployment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tx,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Abhishek&lt;/P&gt;</description>
      <pubDate>Sat, 12 Oct 2019 14:01:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-R80-30-issue/m-p/64877#M2766</guid>
      <dc:creator>Abhishek_Singh1</dc:creator>
      <dc:date>2019-10-12T14:01:52Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VMSS R80.30 issue</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-R80-30-issue/m-p/64890#M2767</link>
      <description>&lt;P&gt;Just an update, since un the template I could see etho - is false for ip-forwarding in Azure VMSS setting.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I changed the routing to exit from eth1 instead and it worked.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone from Checkpoint development team can confirm is the setting for eth0 is the standard going forward, if not how can I change that in Azure VMSS, since changing the route will be an design change for our organization, we will be interested in getting the routing working thru eth0 preferrably.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tx,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Abhishek&lt;/P&gt;</description>
      <pubDate>Sun, 13 Oct 2019 09:04:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-R80-30-issue/m-p/64890#M2767</guid>
      <dc:creator>Abhishek_Singh1</dc:creator>
      <dc:date>2019-10-13T09:04:00Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VMSS R80.30 issue</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-R80-30-issue/m-p/65098#M2768</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;According to our VMSS deployment guide, our architecture is based on the fact that East/West traffic inspection is done through ETH1 only.&lt;/P&gt;
&lt;P&gt;Please note that Internal Load Balancer should be connected to ETH1 of the scale set and all customer’s back end application and VNEts should point to this ILB via UDR&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2019 12:15:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-R80-30-issue/m-p/65098#M2768</guid>
      <dc:creator>Daniel_Goldenst</dc:creator>
      <dc:date>2019-10-16T12:15:34Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VMSS R80.30 issue</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-R80-30-issue/m-p/65433#M2769</link>
      <description>Yes , I have seen that in deployment guide . But for some reason , in our environment eth0 is also used to connect to internal VNETs .&lt;BR /&gt;&lt;BR /&gt;Is there any work-around / tweak we can make use of may be in Azure / Checkpoint to make it work ??&lt;BR /&gt;&lt;BR /&gt;From the pcaps run on the VMSS gateways , I could see any traffic exiting from eth0 , is picked up by the external LB -- by default . Is there a way to change is behavior ??</description>
      <pubDate>Mon, 21 Oct 2019 10:42:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-R80-30-issue/m-p/65433#M2769</guid>
      <dc:creator>Abhishek_Singh1</dc:creator>
      <dc:date>2019-10-21T10:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VMSS R80.30 issue</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-R80-30-issue/m-p/65441#M2770</link>
      <description>&lt;P&gt;what does the Routing on your FW look like ?&lt;/P&gt;&lt;P&gt;Make sure to have a route for the VNETs/Azure network with the first IP of the subnet, eth1 is connected to, as the gateway&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2019 11:34:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-R80-30-issue/m-p/65441#M2770</guid>
      <dc:creator>Matthias_Haas</dc:creator>
      <dc:date>2019-10-21T11:34:17Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VMSS R80.30 issue</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-R80-30-issue/m-p/65547#M2771</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Our VMSS solution does not support handling E-W traffic via eth0. The External Load Balancer is connected to eth0 and the Internal Load Balancer is connected to eth1 and used for internal traffic.&lt;/P&gt;
&lt;P&gt;Since internal E-W traffic's next-hop should be the ILB's frontend IP, traffic will enter the Check Point GWs on eth1.&lt;/P&gt;
&lt;P&gt;In addition, using eth1 and Azure's internal load balancer (with HA ports) for E-W traffic allows forwarding E-W traffic without doing Source NAT.&lt;/P&gt;
&lt;P&gt;I suggest to reconsider the architecture. If the problem is subnet address spaces you can consider redeploying the VMSS solution and switching the subnets of the VMSS frontend and backend.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Dmitry&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2019 09:32:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-VMSS-R80-30-issue/m-p/65547#M2771</guid>
      <dc:creator>Dmitry_Gorn</dc:creator>
      <dc:date>2019-10-22T09:32:29Z</dc:date>
    </item>
  </channel>
</rss>

