<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inspecting and detecting original source address of TCP NLB inbound traffic in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspecting-and-detecting-original-source-address-of-TCP-NLB/m-p/55504#M2937</link>
    <description>&lt;P&gt;Checked with host object instead of logical server but nothing changes. The IPS does not apply the protections and still appears the LB internal address as a source address in the tracker.&lt;/P&gt;</description>
    <pubDate>Tue, 11 Jun 2019 14:35:35 GMT</pubDate>
    <dc:creator>Alejandro_Ferna</dc:creator>
    <dc:date>2019-06-11T14:35:35Z</dc:date>
    <item>
      <title>Inspecting and detecting original source address of TCP NLB inbound traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspecting-and-detecting-original-source-address-of-TCP-NLB/m-p/55270#M2931</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have a AWS TCP Network Load Balancer with proxy protocol v2 enabled. This LB routes the traffic to a logical server IP with a group of internal web servers. The ports it use are 30080 and 30443, configured as TCP service with HTTP/S protocol but it seems that IPS are not inspecting this traffic.&lt;/P&gt;&lt;P&gt;Futhermore, I can see the real client IP address in the web server's log, so it seems proxy protocol are working, but in the Checkpoint log I only see the internal LB addresses so I can not differentiate between real traffic and LB health check traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I appreciate any kind of suggestion or hint.&lt;/P&gt;&lt;P&gt;Thank you, regards!&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2019 09:00:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspecting-and-detecting-original-source-address-of-TCP-NLB/m-p/55270#M2931</guid>
      <dc:creator>Alejandro_Ferna</dc:creator>
      <dc:date>2019-06-07T09:00:39Z</dc:date>
    </item>
    <item>
      <title>Re: Inspecting and detecting original source address of TCP NLB inbound traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspecting-and-detecting-original-source-address-of-TCP-NLB/m-p/55300#M2932</link>
      <description>&lt;P&gt;For HTTPS, you may have to add server cert to the Check Point:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/1495i49F8FDF32EEC9E14/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;and for HTTP, it should work by default, but just in case it is different in AWS, check the "Non-standard ports" setting here:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/1496i2627E90486B11900/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;and in App Control URLF Advanced Settings.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, take a look at this thread, perhaps it could be helpful for pinning down the real traffic:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/CloudGuard-IaaS/X-Forwarded-Headers-for-Logical-Server-in-vSEC-for-AWS/m-p/7118#M290" target="_blank"&gt;https://community.checkpoint.com/t5/CloudGuard-IaaS/X-Forwarded-Headers-for-Logical-Server-in-vSEC-for-AWS/m-p/7118#M290&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 08 Jun 2019 23:42:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspecting-and-detecting-original-source-address-of-TCP-NLB/m-p/55300#M2932</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-06-08T23:42:00Z</dc:date>
    </item>
    <item>
      <title>Re: Inspecting and detecting original source address of TCP NLB inbound traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspecting-and-detecting-original-source-address-of-TCP-NLB/m-p/55348#M2933</link>
      <description>Your post is missing the link to the relevant thread.</description>
      <pubDate>Sat, 08 Jun 2019 23:30:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspecting-and-detecting-original-source-address-of-TCP-NLB/m-p/55348#M2933</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-08T23:30:13Z</dc:date>
    </item>
    <item>
      <title>Re: Inspecting and detecting original source address of TCP NLB inbound traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspecting-and-detecting-original-source-address-of-TCP-NLB/m-p/55352#M2934</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;, thanks for pointing it out: got one of those errors when pasting into the post, but it allowed the process to complete sans the URL.&lt;/P&gt;</description>
      <pubDate>Sat, 08 Jun 2019 23:43:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspecting-and-detecting-original-source-address-of-TCP-NLB/m-p/55352#M2934</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-06-08T23:43:34Z</dc:date>
    </item>
    <item>
      <title>Re: Inspecting and detecting original source address of TCP NLB inbound traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspecting-and-detecting-original-source-address-of-TCP-NLB/m-p/55356#M2935</link>
      <description>The errors you're talking about seem to be transient in nature. Haven't been able to see it consistently enough to report it...</description>
      <pubDate>Sun, 09 Jun 2019 02:36:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspecting-and-detecting-original-source-address-of-TCP-NLB/m-p/55356#M2935</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-09T02:36:27Z</dc:date>
    </item>
    <item>
      <title>Re: Inspecting and detecting original source address of TCP NLB inbound traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspecting-and-detecting-original-source-address-of-TCP-NLB/m-p/55412#M2936</link>
      <description>&lt;P&gt;Hi Vladimir, thank you for your help.&lt;/P&gt;&lt;P&gt;I ve checked the "non-standard port" setting and it is enabled in both blades.&lt;/P&gt;&lt;P&gt;I'm checking the IPS with this URL that triggers the "web server exposed git repository..." protection:&lt;/P&gt;&lt;P&gt;http://{public-ip}/.git/config&lt;/P&gt;&lt;P&gt;When I put a web server public IP address the IPS works, prevent the connection and creates a log.&lt;/P&gt;&lt;P&gt;When I put the LB public IP address nothing is detected. I can see it in the checkpoint log with the LB internal IP address as a source and the connection reaches the web server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have read the thread as well and confirmed that the proxy protocol are enabled in the LB. The real source IP appears correctly in the web servers behind the logical servers, but in Checkpoint log:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Captura de pantalla 2019-06-10 a las 11.03.57.png" style="width: 333px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/1508iDFF5DF892D803949/image-dimensions/333x211?v=v2" width="333" height="211" role="button" title="Captura de pantalla 2019-06-10 a las 11.03.57.png" alt="Captura de pantalla 2019-06-10 a las 11.03.57.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently, the 10.89.240.23 is a logical server. I will change it for a host object and check if it affects in some way.&lt;/P&gt;&lt;P&gt;I will uptade this thread with the results.&lt;/P&gt;&lt;P&gt;Regards!&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2019 09:33:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspecting-and-detecting-original-source-address-of-TCP-NLB/m-p/55412#M2936</guid>
      <dc:creator>Alejandro_Ferna</dc:creator>
      <dc:date>2019-06-10T09:33:52Z</dc:date>
    </item>
    <item>
      <title>Re: Inspecting and detecting original source address of TCP NLB inbound traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspecting-and-detecting-original-source-address-of-TCP-NLB/m-p/55504#M2937</link>
      <description>&lt;P&gt;Checked with host object instead of logical server but nothing changes. The IPS does not apply the protections and still appears the LB internal address as a source address in the tracker.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 14:35:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspecting-and-detecting-original-source-address-of-TCP-NLB/m-p/55504#M2937</guid>
      <dc:creator>Alejandro_Ferna</dc:creator>
      <dc:date>2019-06-11T14:35:35Z</dc:date>
    </item>
  </channel>
</rss>

