<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Communicating AWS vSEC with On-Prem SMS and GW in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Communicating-AWS-vSEC-with-On-Prem-SMS-and-GW/m-p/29061#M3459</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk100583" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk100583"&gt;Troubleshooting "SmartCenter behind NAT" issues&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 24 Sep 2018 23:48:49 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2018-09-24T23:48:49Z</dc:date>
    <item>
      <title>Communicating AWS vSEC with On-Prem SMS and GW</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Communicating-AWS-vSEC-with-On-Prem-SMS-and-GW/m-p/29058#M3456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have some queries regarding AWS vsec and on prem communication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. I have added AWS cloudguard (CG) instance on our on-premise SMS through CG public IP address. This has been successfully added and SIC established. Is this the best way to add CG.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. I have configured VPN between on-prem GW and CG. This is not being established due to certificate error as also mentioned in previous update. On further checking the logs of CG, i saw it could not retrieve CRL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. One VPN is being negotiated, does communication to CG Public IP including retrieving CRL go through VPN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. We have seen this that communication to external GW Public IP (which is also peer IP address for VPN) stops working. Is there anyway to exclude this so CG can keep communicating with on prem servers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5. We are unable to see logs from this CG. The reason could be that log servers have local IP address on their object which is not recognised by CG.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would appreciate if&amp;nbsp;somone can advise on what are the best practices around the above queries.&lt;/P&gt;&lt;P&gt;Sajid&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2018 06:00:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Communicating-AWS-vSEC-with-On-Prem-SMS-and-GW/m-p/29058#M3456</guid>
      <dc:creator>Sajid_Abbas</dc:creator>
      <dc:date>2018-09-24T06:00:31Z</dc:date>
    </item>
    <item>
      <title>Re: Communicating AWS vSEC with On-Prem SMS and GW</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Communicating-AWS-vSEC-with-On-Prem-SMS-and-GW/m-p/29059#M3457</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't have any experience with AWS CloudGuard but I do with Azure CloudGuard and your questions are identical to the "fun" I had with that setup.&lt;/P&gt;&lt;P&gt;Can you explain how your on-prem SMS is reacheable from the internet? Is it NAT'ed behind your on-premise gateway?&lt;/P&gt;&lt;P&gt;We also encountered SMS NAT issues and you might need to follow sk66381 and NAT control connections and specify your on-prem gateway as installation target. If you are lucky and have another Check Point gateway managed by this SMS it should be easy.&lt;/P&gt;&lt;P&gt;If not, welcome to the world of dummy management objects to manipulate the conf masters file... let me know if you need more info on that.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2018 08:53:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Communicating-AWS-vSEC-with-On-Prem-SMS-and-GW/m-p/29059#M3457</guid>
      <dc:creator>Jeroen_Demets</dc:creator>
      <dc:date>2018-09-24T08:53:33Z</dc:date>
    </item>
    <item>
      <title>Re: Communicating AWS vSEC with On-Prem SMS and GW</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Communicating-AWS-vSEC-with-On-Prem-SMS-and-GW/m-p/29060#M3458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jeroen,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our on-prem SMS is like you described NAT'd to a single IP behind our on-prem gateway with our on-prem gateway the target.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm seeing that the Cloud GW is sending request to SMS Private IP. So i guess i would have to create a dummy MGMT Object. How does it actually take effect on this particular gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sajid&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2018 22:47:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Communicating-AWS-vSEC-with-On-Prem-SMS-and-GW/m-p/29060#M3458</guid>
      <dc:creator>Sajid_Abbas</dc:creator>
      <dc:date>2018-09-24T22:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: Communicating AWS vSEC with On-Prem SMS and GW</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Communicating-AWS-vSEC-with-On-Prem-SMS-and-GW/m-p/29061#M3459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk100583" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk100583"&gt;Troubleshooting "SmartCenter behind NAT" issues&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2018 23:48:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Communicating-AWS-vSEC-with-On-Prem-SMS-and-GW/m-p/29061#M3459</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-09-24T23:48:49Z</dc:date>
    </item>
    <item>
      <title>Re: Communicating AWS vSEC with On-Prem SMS and GW</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Communicating-AWS-vSEC-with-On-Prem-SMS-and-GW/m-p/29062#M3460</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jeroen and Dameon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the assistance. I got that bit working with dummy Management IP addresses and Static NAT configs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN seems to be coming up from one end i.e. on Smartview Monitor vsec GW shows tunnel up however on-prem shows down. On checking tcpdumps and fw monitor outputs, the vsec gateway shows the local ip address of on-prem for vpn peer and sends back tunnel management.test traffic encrypted through the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't think it should be this complex in getting VPNs up. Something configured wrong here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I checked link selection addresses on both GW and it showed public IP addresses&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sajid&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Sep 2018 02:58:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Communicating-AWS-vSEC-with-On-Prem-SMS-and-GW/m-p/29062#M3460</guid>
      <dc:creator>Sajid_Abbas</dc:creator>
      <dc:date>2018-09-27T02:58:39Z</dc:date>
    </item>
    <item>
      <title>Re: Communicating AWS vSEC with On-Prem SMS and GW</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Communicating-AWS-vSEC-with-On-Prem-SMS-and-GW/m-p/29063#M3461</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was hoping someone with AWS experience would have replied by now. I only have experience with Azure and there Link Selection on the vSEC gateway has to be set to its local external IP (a private IP). Azure then NATs this to a public routable IP. The reference architecture guide (&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;sk109360) &lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;mentions this. So maybe for AWS you need to change it from public IP to private IP and have AWS do some NAT magic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;You say the vsec gw shows the local ip of on-prem. Is your on-prem gateway nat'ed then? It doesn't have an internet routable IP on its WAN interface?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Jeroen&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2018 14:15:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Communicating-AWS-vSEC-with-On-Prem-SMS-and-GW/m-p/29063#M3461</guid>
      <dc:creator>Jeroen_Demets</dc:creator>
      <dc:date>2018-09-28T14:15:20Z</dc:date>
    </item>
    <item>
      <title>Re: Communicating AWS vSEC with On-Prem SMS and GW</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Communicating-AWS-vSEC-with-On-Prem-SMS-and-GW/m-p/29064#M3462</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jeroen,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried changing Link selection IP address to the Private as well as public IP address provided by AWS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our on-prem gateway has a direct Public IP address on its interface which is the address used to form VPN peering. However, this IP address does not show up on vsec GW as peer.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sajid&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Oct 2018 21:24:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Communicating-AWS-vSEC-with-On-Prem-SMS-and-GW/m-p/29064#M3462</guid>
      <dc:creator>Sajid_Abbas</dc:creator>
      <dc:date>2018-10-01T21:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: Communicating AWS vSEC with On-Prem SMS and GW</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Communicating-AWS-vSEC-with-On-Prem-SMS-and-GW/m-p/29065#M3463</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Got this sorted. There was conflict in tunnel test method which didnt bring the VPN up.&lt;/P&gt;&lt;P&gt;Also changed some anti-spoofing setting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Oct 2018 00:17:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Communicating-AWS-vSEC-with-On-Prem-SMS-and-GW/m-p/29065#M3463</guid>
      <dc:creator>Sajid_Abbas</dc:creator>
      <dc:date>2018-10-09T00:17:33Z</dc:date>
    </item>
    <item>
      <title>Re: Communicating AWS vSEC with On-Prem SMS and GW</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Communicating-AWS-vSEC-with-On-Prem-SMS-and-GW/m-p/29066#M3464</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tnx for your feedback, glad you got it working.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Oct 2018 12:52:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Communicating-AWS-vSEC-with-On-Prem-SMS-and-GW/m-p/29066#M3464</guid>
      <dc:creator>Jeroen_Demets</dc:creator>
      <dc:date>2018-10-12T12:52:09Z</dc:date>
    </item>
  </channel>
</rss>

