<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Checkpoint Vsec ClusterXL deployment in Azure with Active/Active - Loadsharing mode in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/63247#M2853</link>
    <description>&lt;P&gt;It's not a good idea to use the actual firewall object in your policy.&amp;nbsp; That's because if Azure scales up or down (and especially down) the objects are no longer valid.&lt;/P&gt;&lt;P&gt;What I did (after setting the Min/Max/Def to 2/2/2) was create secondary FW objects and put those into the policy.&amp;nbsp; The manager complains every push or FW modification because of duplicate objects.&amp;nbsp; But it works.&lt;/P&gt;&lt;P&gt;If you have to host inbound traffic, you should be looking at those setup steps now too.&amp;nbsp; It's an utter pain in the rear.&lt;/P&gt;&lt;P&gt;Probably the coolest thing I've seen is autoprovisioning doing its thing.&amp;nbsp; Azure adds a firewall and autoprovisioning does the rest.&amp;nbsp; Which is super cool, but I lost 2/3rds of the hair on my head getting it all going.&lt;/P&gt;&lt;P&gt;I still need to figure out how to modify autoprovisioning so that it will deploy all of our machine level settings (TZ/passwords/routes/usernames/etc).&lt;/P&gt;&lt;P&gt;Also, you don't need to define a gateway to "install on".&amp;nbsp; That's done in your autoprov script and is taken care of for you automagically.&lt;/P&gt;</description>
    <pubDate>Fri, 20 Sep 2019 11:42:38 GMT</pubDate>
    <dc:creator>Tommy_Forrest</dc:creator>
    <dc:date>2019-09-20T11:42:38Z</dc:date>
    <item>
      <title>Checkpoint Vsec ClusterXL deployment in Azure with Active/Active - Loadsharing mode</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/60393#M2849</link>
      <description>&lt;P&gt;Hi guys ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am looking for a solution to implement Active-Active (Load sharing)&amp;nbsp; clusterXL in Azure , but didn't find any templates&amp;nbsp; . Does checkpoint Vsec in Azure doesnot support this by design , or , What changes it would require to support this config ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2019 14:17:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/60393#M2849</guid>
      <dc:creator>Abhishek_Singh1</dc:creator>
      <dc:date>2019-08-15T14:17:08Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Vsec ClusterXL deployment in Azure with Active/Active - Loadsharing mode</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/60394#M2850</link>
      <description>&lt;P&gt;VMSS is typically the approach used for this in Azure, please see:&lt;BR /&gt;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_VMSS_for_Azure/Default.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_VMSS_for_Azure/Default.htm&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Dec 2021 10:21:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/60394#M2850</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2021-12-19T10:21:55Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Vsec ClusterXL deployment in Azure with Active/Active - Loadsharing mode</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/60425#M2851</link>
      <description>The multicast traffic required for traditional ClusterXL (Load Sharing or otherwise) is not supported by public cloud providers.&lt;BR /&gt;However, you get "active active" deploying as a VMSS, which incorporates load balancers into the design. &lt;BR /&gt;It's not Clustering, which means the scalability is significantly better.</description>
      <pubDate>Thu, 15 Aug 2019 18:50:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/60425#M2851</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-08-15T18:50:34Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Vsec ClusterXL deployment in Azure with Active/Active - Loadsharing mode</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/63224#M2852</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp; ,&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp; for your responses .&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am running a POC to implement the VMSS in Azure to utilize both the gateways .&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe because of the dynamic nature of the Gateways being scaled out/in we cann't use the traditional &lt;STRONG&gt;Gateway object&lt;/STRONG&gt; in the policy rules cells ( Source , destination , Install On) .&amp;nbsp;&lt;/P&gt;&lt;P&gt;Refer attachment for reference on the existing policy .&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;Can you help me out what object I shall use in the standard policy of Firewall management , Stealth rule , MTA specific rules ??&amp;nbsp; -- Is it the dynamic "LocalGateway" object ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also how we manipulate the Gateway specific settings for the VMSS gateways , that we used to do using SMS - editing the GW object properties - like enabling MTA , configuring HTTPS inspection , etc ??&amp;nbsp; -- I mean do we need to change these properties for all the gateways being spinup during scale out event manually ? Or is there any setting approch in the auto-confi provision files to handle this ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Abhishek&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2019 06:39:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/63224#M2852</guid>
      <dc:creator>Abhishek_Singh1</dc:creator>
      <dc:date>2019-09-20T06:39:09Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Vsec ClusterXL deployment in Azure with Active/Active - Loadsharing mode</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/63247#M2853</link>
      <description>&lt;P&gt;It's not a good idea to use the actual firewall object in your policy.&amp;nbsp; That's because if Azure scales up or down (and especially down) the objects are no longer valid.&lt;/P&gt;&lt;P&gt;What I did (after setting the Min/Max/Def to 2/2/2) was create secondary FW objects and put those into the policy.&amp;nbsp; The manager complains every push or FW modification because of duplicate objects.&amp;nbsp; But it works.&lt;/P&gt;&lt;P&gt;If you have to host inbound traffic, you should be looking at those setup steps now too.&amp;nbsp; It's an utter pain in the rear.&lt;/P&gt;&lt;P&gt;Probably the coolest thing I've seen is autoprovisioning doing its thing.&amp;nbsp; Azure adds a firewall and autoprovisioning does the rest.&amp;nbsp; Which is super cool, but I lost 2/3rds of the hair on my head getting it all going.&lt;/P&gt;&lt;P&gt;I still need to figure out how to modify autoprovisioning so that it will deploy all of our machine level settings (TZ/passwords/routes/usernames/etc).&lt;/P&gt;&lt;P&gt;Also, you don't need to define a gateway to "install on".&amp;nbsp; That's done in your autoprov script and is taken care of for you automagically.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2019 11:42:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/63247#M2853</guid>
      <dc:creator>Tommy_Forrest</dc:creator>
      <dc:date>2019-09-20T11:42:38Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Vsec ClusterXL deployment in Azure with Active/Active - Loadsharing mode</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/63262#M2854</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/10886"&gt;@Tommy_Forrest&lt;/a&gt;&amp;nbsp; - so you have created the secondary gateway object after spinning the firewalls from autoprovisioning...&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you faced any issue with using the dynamic object - "LocalGatewayExternal" In policy rules as source / destination??&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;About inbound traffic, we have the usercase of using Checkpoint gateway as MTA, do you have any experience with this regard?? --- hence was my query second part... How we manipilate the gateway objects global properties - blades, https inspection, MTA, etc in&amp;nbsp; gateways being spin-up by VMSS autoprovisioning template.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp; -- can you pls guide me here with any official recommendation(s) ??&amp;nbsp; &amp;nbsp;Or, may be tag some more folks who have an prior experience with VMSS deployment&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2019 14:15:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/63262#M2854</guid>
      <dc:creator>Abhishek_Singh1</dc:creator>
      <dc:date>2019-09-20T14:15:03Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Vsec ClusterXL deployment in Azure with Active/Active - Loadsharing mode</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/63265#M2855</link>
      <description>The dynamic objects LocalGateway or LocalGatewayExternal can safely be used.&lt;BR /&gt;In the past (pre-R80.10), there was a performance penalty to use these objects (not SecureXL friendly) but that issue has since been resolved.&lt;BR /&gt;I would do this over using secondary firewall objects.&lt;BR /&gt;&lt;BR /&gt;As for what blades are enabled as part of the provisioning process, that's actually controlled on the management server.&lt;BR /&gt;See: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk130372" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk130372&lt;/A&gt;</description>
      <pubDate>Fri, 20 Sep 2019 14:26:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/63265#M2855</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-09-20T14:26:47Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Vsec ClusterXL deployment in Azure with Active/Active - Loadsharing mode</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/63548#M2856</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp; &amp;nbsp;.Do we have control on adding specific route, enabling MTA settings with custom specs?? May be in autoprovisioning file, or some sort of script.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2019 11:23:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/63548#M2856</guid>
      <dc:creator>Abhishek_Singh1</dc:creator>
      <dc:date>2019-09-24T11:23:05Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Vsec ClusterXL deployment in Azure with Active/Active - Loadsharing mode</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/63584#M2857</link>
      <description>If it requires setting specific properties on the gateway object and they can be set via the API, there is a way to set those.&lt;BR /&gt;See the SK I specified previously.&lt;BR /&gt;Not sure you need to change routes on the AWS instance as that doesn't really have an effect, given the way VPCs work. &lt;BR /&gt;That said, the gateways are created using an autoprovision.json file that I assume you can modify to do what is required (the user-data section, I believe).</description>
      <pubDate>Tue, 24 Sep 2019 16:09:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/63584#M2857</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-09-24T16:09:24Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Vsec ClusterXL deployment in Azure with Active/Active - Loadsharing mode</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/63747#M2858</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp; for sharing the details . However , I dont see any management API command to manipulate the MTA config&amp;nbsp;&lt;SPAN&gt;( adding mail domain , next hop&amp;nbsp; ) Refer the attachment - Desired setting for MTA.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also , now I am a bit confused between&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;CME (Cloud Management Extension )&amp;nbsp; and&amp;nbsp;Autoprovision Add-On.&amp;nbsp; There is a latest update on &lt;STRONG&gt;23-Sep-2019&lt;/STRONG&gt; to the checkpoint official VMSS deployment guide and it talks about using the CME .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The CME has a limitation of not working in parallel with&amp;nbsp;Autoprovision Add-On . Please refer the attachment -&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_VMSS_for_Azure/Default.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_VMSS_for_Azure/Default.htm&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;SPAN&gt;Do we have any&amp;nbsp;&lt;/SPAN&gt;guidelines what should be used and recommended between these two , whats the advantage/disadvantage of using these respectively &lt;SPAN&gt;(&amp;nbsp;&lt;/SPAN&gt;CME Vs Autoprovision add-on&amp;nbsp;&lt;SPAN&gt;) .&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Dec 2021 10:21:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/63747#M2858</guid>
      <dc:creator>Abhishek_Singh1</dc:creator>
      <dc:date>2021-12-19T10:21:29Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Vsec ClusterXL deployment in Azure with Active/Active - Loadsharing mode</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/63748#M2859</link>
      <description>Based on the screenshot you provided, I assume these are modifications to the gateway object, some of which may not have a specific API exposed to modify.&lt;BR /&gt;They may be doable with Generic Objects, but recommend asking that specific question in the appropriate space: &lt;A href="https://community.checkpoint.com/t5/API-CLI-Discussion-and-Samples/bd-p/codehub" target="_blank"&gt;https://community.checkpoint.com/t5/API-CLI-Discussion-and-Samples/bd-p/codehub&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;My understanding is that CME supersedes the Autoprovision add-on.&lt;BR /&gt;The configuration steps are similar in either case.</description>
      <pubDate>Thu, 26 Sep 2019 14:54:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Checkpoint-Vsec-ClusterXL-deployment-in-Azure-with-Active-Active/m-p/63748#M2859</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-09-26T14:54:43Z</dc:date>
    </item>
  </channel>
</rss>

