<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cloudgaard Azure and Remote Access in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudgaard-Azure-and-Remote-Access/m-p/55004#M2923</link>
    <description>&lt;P&gt;Have a look into this document :&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk109360&amp;amp;partition=General&amp;amp;product=CloudGuard" target="_blank"&gt;sk109360: Check Point Reference Architecture for &lt;STRONG&gt;Azure&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 04 Jun 2019 11:59:20 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2019-06-04T11:59:20Z</dc:date>
    <item>
      <title>Cloudgaard Azure and Remote Access</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudgaard-Azure-and-Remote-Access/m-p/54688#M2922</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to setup a Remote Access VPN (Check Point Mobile on Windows) on Azure.&lt;/P&gt;&lt;P&gt;This Azure Gateway is connected to another Check Point Gateway with a Site-to-Site VPN. This communication is working fine&lt;/P&gt;&lt;P&gt;The Mobile VPN Client are able to connect but no traffic is reaching the Azure Firewall (tcpdump / fw monitor). The VPN setup is not configured to route all traffic to the gateway so only the remote access community shoud be reachable. I can see that the Endpoint receive the route correctly (route print) but when trying to reach the gateway no traffic is detected.&lt;/P&gt;&lt;P&gt;I guess there is an issue with the UDR on Azure but I don't know how the VPN subnet needs to be defined:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Do we need to define the VPN subnet on Azure Subnet ?&lt;/LI&gt;&lt;LI&gt;If we need to define the subnet to Azure what route should we defined on this subnet ?&lt;/LI&gt;&lt;LI&gt;Do we need to route the traffic to Frontend or Backend interface&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Any help will be appreciated&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Nicolas&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2019 20:14:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudgaard-Azure-and-Remote-Access/m-p/54688#M2922</guid>
      <dc:creator>CP-NDA</dc:creator>
      <dc:date>2019-05-29T20:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudgaard Azure and Remote Access</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudgaard-Azure-and-Remote-Access/m-p/55004#M2923</link>
      <description>&lt;P&gt;Have a look into this document :&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk109360&amp;amp;partition=General&amp;amp;product=CloudGuard" target="_blank"&gt;sk109360: Check Point Reference Architecture for &lt;STRONG&gt;Azure&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2019 11:59:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudgaard-Azure-and-Remote-Access/m-p/55004#M2923</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-06-04T11:59:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudgaard Azure and Remote Access</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudgaard-Azure-and-Remote-Access/m-p/55006#M2924</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I already read this document but without finding any interesting info. UDR are already defined for the return trafic&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Nicolas&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2019 12:10:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudgaard-Azure-and-Remote-Access/m-p/55006#M2924</guid>
      <dc:creator>CP-NDA</dc:creator>
      <dc:date>2019-06-04T12:10:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudgaard Azure and Remote Access</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudgaard-Azure-and-Remote-Access/m-p/55109#M2925</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;Nicolas,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The problems sounds like the UDR's are not configured properly to point to the Azure gateway.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In an Azure Check Point deployment no VM's should be local to the gateway. This means you will require a VPN subnet in your Vnet (Or another backend subnet) where the VPN client will reside.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Answers to your questions&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Do we need to define the VPN subnet on Azure Subnet ?
&lt;UL&gt;
&lt;LI&gt;Yes you require this&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;If we need to define the subnet to Azure what route should we defined on this subnet ?
&lt;UL&gt;
&lt;LI&gt;Route definitions&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Route #1&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Route Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;Web/App/VPN&amp;gt;-Subnet-Local&lt;/P&gt;
&lt;P&gt;Address prefixes&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Web/App/VPN subnet (Example- 10.7.4.0/24)&lt;/P&gt;
&lt;P&gt;Net Hop Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Virtual Network&lt;/P&gt;
&lt;P&gt;Next Hop Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Leave Blank&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Route #2&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Route Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;Web/App/VPN&amp;gt;-To-Other-Subnets&lt;/P&gt;
&lt;P&gt;Address prefix&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Your vNet network (Example- 10.7.0.0/16)&lt;/P&gt;
&lt;P&gt;Net Hop Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Virtual appliance&lt;/P&gt;
&lt;P&gt;Next Hop Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; eth1 Ip of the firewall appliance (example 10.7.1.4)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Route #3&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Route Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;Web/App/VPN&amp;gt;-Subnet-Default-&amp;lt;Username&amp;gt;&lt;/P&gt;
&lt;P&gt;Address prefix&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0/0&lt;/P&gt;
&lt;P&gt;Net Hop Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Virtual appliance&lt;/P&gt;
&lt;P&gt;Next Hop Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; eth1 Ip of the firewall appliance (example 10.7.1.4)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Route needed on the Gateway&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;You need to setup the Check Point Gateway to send all vNet traffic to the &lt;STRONG&gt;Backend&lt;/STRONG&gt; Azure Gateway address. This will be the first IP of the &lt;STRONG&gt;Backend&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Example: Your VNET network is 10.x.0.0/16 the Azure “Router” IP is 10.x.1.1)&lt;/P&gt;
&lt;P&gt;SSH to your Firewall VM and add the following route in Clish.&lt;/P&gt;
&lt;P&gt;Command:&lt;/P&gt;
&lt;P&gt;clish -c 'set static-route VIRTUAL-NETWORK-PREFIX nexthop gateway address ETH1-ROUTER on' -s&lt;/P&gt;
&lt;P&gt;clish -c 'save config'&lt;/P&gt;
&lt;P&gt;Where:&lt;/P&gt;
&lt;P&gt;VIRTUAL-NETWORK-PREFIX is the prefix of the entire virtual network (e.g. 10.x.0.0/16)&lt;/P&gt;
&lt;P&gt;ETH1-ROUTER is the first unicast IP address on the subnet to which eth1 is connected (e.g. 10x.1.1)&lt;/P&gt;
&lt;P&gt;For example: clish -c 'set static-route 10.x.0.0/16 nexthop gateway address 10.x.1.1 on' –s&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Do we need to route the traffic to Frontend or Backend interface
&lt;UL&gt;
&lt;LI&gt;Backend subnet&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can also confirm where the effective route is going on the Mobile Client. This can be done in the Azure portal&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Go under the VM in question&lt;/LI&gt;
&lt;LI&gt;Make sure the system is turned on. Otherwise the routes will not be properly displayed&lt;/LI&gt;
&lt;LI&gt;Go under &lt;STRONG&gt;Networking&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Select the Attached Network interface&lt;/LI&gt;
&lt;LI&gt;Under the attached network interface select &lt;STRONG&gt;Effective routes&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Select the &lt;STRONG&gt;Download&lt;/STRONG&gt; of the effective routes.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 525px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/1464iD21B73903BB37341/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Open the Downloaded route list and confirm the routes are what you may be expecting.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 650px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/1465iD903B0635FC93D0F/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you ,&lt;/P&gt;
&lt;P&gt;Dan Morris, Technology Leader, Ottawa Technical Assistance Center&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2019 15:39:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudgaard-Azure-and-Remote-Access/m-p/55109#M2925</guid>
      <dc:creator>Dan_Morris</dc:creator>
      <dc:date>2019-06-05T15:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudgaard Azure and Remote Access</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudgaard-Azure-and-Remote-Access/m-p/109081#M2926</link>
      <description>&lt;P&gt;Hi Nicolas,&lt;/P&gt;&lt;P&gt;did you ever figure this one out? I'm exactly in the same situation.&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Francis&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jan 2021 19:16:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudgaard-Azure-and-Remote-Access/m-p/109081#M2926</guid>
      <dc:creator>flachance</dc:creator>
      <dc:date>2021-01-27T19:16:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudgaard Azure and Remote Access</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudgaard-Azure-and-Remote-Access/m-p/109082#M2927</link>
      <description>&lt;P&gt;Yes, you've to turn on a feature on azure interface to allow other networks that defined on the interface. Just turn on ip forwarding and it should be ok&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jan 2021 19:28:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudgaard-Azure-and-Remote-Access/m-p/109082#M2927</guid>
      <dc:creator>CP-NDA</dc:creator>
      <dc:date>2021-01-27T19:28:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudgaard Azure and Remote Access</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudgaard-Azure-and-Remote-Access/m-p/109083#M2928</link>
      <description>&lt;P&gt;Hi Nicolas,&lt;/P&gt;&lt;P&gt;thanks for the quick response. Which interface are we talking about? IP forwarding is already enabled on the Gateways Interfaces.&lt;/P&gt;&lt;P&gt;Did you end up having to create a subnet in Azure for your VPN clients range?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jan 2021 19:50:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudgaard-Azure-and-Remote-Access/m-p/109083#M2928</guid>
      <dc:creator>flachance</dc:creator>
      <dc:date>2021-01-27T19:50:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudgaard Azure and Remote Access</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudgaard-Azure-and-Remote-Access/m-p/109182#M2929</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Sorry it was not the case on my side. I had to enabled IP forwarding and only configure the default route to have a working setup&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2021 13:58:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudgaard-Azure-and-Remote-Access/m-p/109182#M2929</guid>
      <dc:creator>CP-NDA</dc:creator>
      <dc:date>2021-01-28T13:58:48Z</dc:date>
    </item>
  </channel>
</rss>

