<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CloudGuard Azure with Express Route connectivity in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Azure-with-Express-Route-connectivity/m-p/21821#M3394</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Matthias and thanks for your swift reply...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apparently VPN VNGs and Express Route VNGs are treated differently in Azure when it comes to using them as next hop for a User Defined Route&lt;/P&gt;&lt;P&gt;And yes, the Express Route gateway should inject te routes for the On-Premise networks, otherwise the customer's Azure VMs couldn't communicate through the Express Route. (As mentioned before, they have not created any UDRs and routing works based on the the routes having "default" as source, being them System / Azure created or BGP / ExpressRuoute created.&lt;/P&gt;&lt;P&gt;(not a very fortunate term "default" used by Microsoft when describing the source of a route in the routing table associated with a subnet... Anyone comming from a "normal" networking environment will think "default" equals 0.0.0.0//0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Valeriu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 23 Aug 2018 13:35:08 GMT</pubDate>
    <dc:creator>Valeriu_Cioara</dc:creator>
    <dc:date>2018-08-23T13:35:08Z</dc:date>
    <item>
      <title>CloudGuard Azure with Express Route connectivity</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Azure-with-Express-Route-connectivity/m-p/21818#M3391</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;Hi CheckMates gurus&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;I have to design and implement a CloudGuard Azure cluster for one of my customers and I am struggling to solve what seems like an impossible task, so I'm asking for your help, maybe someone had this problem already and there is no point for me re-inventing the wheel. (Or maybe I don't fully understand how Azure works and in fact there is no problem). Here are the details:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt; - &lt;/SPAN&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;Customer has an Azure environment up and running, with 6 vNets deployed in the UK South region and communicating one to the other via vNet peering. There are between 2 and 10 subnets defined in each vNet &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt; - &lt;/SPAN&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;They have also an On-premise deployment, in a hosted environment, linked to Azure via a 1 Gb ExpressRoute link (going to 2Gb early next year)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt; - &lt;/SPAN&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;Traffic between the On-premise systems and the Azure vNets is controlled via a 5800 cluster deployed in the hosted environment.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt; - &lt;/SPAN&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;As far as I know, they have not yet implemented any User Defined Routes, relying only on the systems default routes and the routes injected in the vNets by the Express Route Virtual Network Gateway&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt; - &lt;/SPAN&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;Security in the Azure environment is configured for most of the subnets via Network Security Groups.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt; - &lt;/SPAN&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;I am supposed to deploy an Azure CloudGuard cluster to control outbound traffic between some of the subnets (initially two, one in a Production vNet and one in a Development vNet) and the Internet. As per the training material and the various SKs dealing with the Azure CloudGuard deployment, this can be achieved by creating UDRs for those subnets, with a 0.0.0.0/0 default route forcing the traffic through the cluster.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;And here is where the problem appears, as by doing this I assume (right , wrong, I don't know) that I will kill the traffic from those subnets to the On-premise systems &amp;nbsp;through the ExpressRoute circuit. As per Microsoft &lt;STRONG&gt;Virtual network traffic routing&lt;/STRONG&gt; article:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12.0pt;"&gt;“If multiple routes contain the same address prefix, Azure selects the route type, based on the following priority:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG style="font-size: 12.0pt;"&gt;User-defined route&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG style="font-size: 12.0pt;"&gt;BGP route&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG style="font-size: 12.0pt;"&gt;System route”&lt;/STRONG&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;so the 0.0.0.0/0 route in the UDR will have precedence.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;Initially I thought that I can solve this problem by adding some more specific routes for the On-premise networks in the UDRs and have the Express Route gateway configured as next hop, but again, according to the same Microsoft article, this is not allowed:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;“&lt;/SPAN&gt;You cannot specify a virtual network gateway created as type &lt;/STRONG&gt;&lt;STRONG&gt;ExpressRoute&lt;/STRONG&gt;&lt;STRONG&gt; in a user-defined route because with ExpressRoute, you must use &lt;A href="https://docs.microsoft.com/en-us/azure/virtual-network/virtual-networks-udr-overview#border-gateway-protocol-routes"&gt;BGP&lt;/A&gt; for custom routes.”&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;So my question is how can I have an Azure subnet send all Internet-bound traffic to the CloudGuard cluster, while continuing to send traffic destined to the On-premise networks via the Express Route link?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;I found an SK article - &lt;/SPAN&gt;&lt;STRONG&gt;sk110993 Securing ExpressRoute traffic in Microsoft Azure&lt;/STRONG&gt; – that is somehow related to this customer environment, but implementing it would mean that &lt;STRONG&gt;all traffic &lt;/STRONG&gt;&amp;nbsp;between the particular Azure subnets having a UDR table defined and the On-premise networks will be have to traverse the CloudGuard cluster and will be “firewalled” twice (as mentioned above, there is already cluster in the hosting datacentre controlling traffic to Azure)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you know is there is any other solution to this conundrum? Would having the CloudGuard cluster peered via BGP with the ExpressRoute &lt;SPAN style="font-size: 12.0pt;"&gt;Virtual Network Gateway eliminate the need for UDRs (but how can you force traffic to the CloudGuard cluster without having a 0.0.0.0/0 route added to an UDR?)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;Or even after adding the 0.0.0.0/0 route via the UDR, more speciffic routes injected by the Express Route virtual network gateway will still be present in the routing table associated with that subnet and in fact there is no issue to worry about? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;I would very much appreciate some ideas / thoughts about this, as I need to give the customer an update on the progress of my design fairly soon…&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;Thanks and best regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;Valeriu&amp;nbsp; &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2018 12:54:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Azure-with-Express-Route-connectivity/m-p/21818#M3391</guid>
      <dc:creator>Valeriu_Cioara</dc:creator>
      <dc:date>2018-08-23T12:54:34Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard Azure with Express Route connectivity</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Azure-with-Express-Route-connectivity/m-p/21819#M3392</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;SPAN style="font-size: 12pt;"&gt;Valeriu&amp;nbsp;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;do you have a VM in one of the subnet you´d like to change the default route ? If so, you can check the effective route on the NIC of this VM. Check if you have specifc routes for the On Prem networks (injected by the Express Route). if so, you could change the default route via UDR and the traffic to the On&amp;nbsp;Prem networks is still routed via the Express Route.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;We did a on Prem Connection via a MS VPN gateway, and&amp;nbsp;in this case the VPN gateway has injected the On Prem networks, not sure if a Express Route connection is doing the same.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Matthias&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2018 13:21:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Azure-with-Express-Route-connectivity/m-p/21819#M3392</guid>
      <dc:creator>Matthias_Haas</dc:creator>
      <dc:date>2018-08-23T13:21:33Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard Azure with Express Route connectivity</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Azure-with-Express-Route-connectivity/m-p/21820#M3393</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Me again... I think I got it, after deploying a Cloud Guard cluster in Azure and going through the troubleshooting steps...&lt;/P&gt;&lt;P&gt;The key words in the first statement quoted from the Microsoft article are "&lt;STRONG style="font-size: 12.0pt;"&gt;the same address prefix"...&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;So the 0.0.0.0/0 route in the UDR pointing to the primary CloudGuard cluster internal interface will actually "kill " and make invalid the system default route - 0.0.0.0/0 next hop Internet - generated when the sunet has been created... All other routes - BGP, vNet peering - will remain in place, will remain active and traffic for the On-premise networks will continue to use the Express Route path...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;False alarm...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Valeriu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2018 13:22:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Azure-with-Express-Route-connectivity/m-p/21820#M3393</guid>
      <dc:creator>Valeriu_Cioara</dc:creator>
      <dc:date>2018-08-23T13:22:54Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard Azure with Express Route connectivity</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Azure-with-Express-Route-connectivity/m-p/21821#M3394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Matthias and thanks for your swift reply...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apparently VPN VNGs and Express Route VNGs are treated differently in Azure when it comes to using them as next hop for a User Defined Route&lt;/P&gt;&lt;P&gt;And yes, the Express Route gateway should inject te routes for the On-Premise networks, otherwise the customer's Azure VMs couldn't communicate through the Express Route. (As mentioned before, they have not created any UDRs and routing works based on the the routes having "default" as source, being them System / Azure created or BGP / ExpressRuoute created.&lt;/P&gt;&lt;P&gt;(not a very fortunate term "default" used by Microsoft when describing the source of a route in the routing table associated with a subnet... Anyone comming from a "normal" networking environment will think "default" equals 0.0.0.0//0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Valeriu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2018 13:35:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Azure-with-Express-Route-connectivity/m-p/21821#M3394</guid>
      <dc:creator>Valeriu_Cioara</dc:creator>
      <dc:date>2018-08-23T13:35:08Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard Azure with Express Route connectivity</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Azure-with-Express-Route-connectivity/m-p/141785#M3395</link>
      <description>&lt;P&gt;Interesting, I am about to do the opposite, I want it to be firewalled twice, and am curious as to the setup required for the routing to work properly.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Feb 2022 14:06:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Azure-with-Express-Route-connectivity/m-p/141785#M3395</guid>
      <dc:creator>Ted_Serreyn</dc:creator>
      <dc:date>2022-02-17T14:06:27Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard Azure with Express Route connectivity</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Azure-with-Express-Route-connectivity/m-p/141786#M3396</link>
      <description>&lt;P&gt;so what does the routing look like from the following perspectives:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;local network onsite that uses expressroute&lt;/P&gt;&lt;P&gt;azure vNet&lt;/P&gt;&lt;P&gt;in particular I am interested if the traffic traverses the azure / on premise firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Feb 2022 14:08:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-Azure-with-Express-Route-connectivity/m-p/141786#M3396</guid>
      <dc:creator>Ted_Serreyn</dc:creator>
      <dc:date>2022-02-17T14:08:50Z</dc:date>
    </item>
  </channel>
</rss>

