<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CloudGuard for AWS - Security Transit VPC Demonstration in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-for-AWS-Security-Transit-VPC-Demonstration/m-p/9804#M3489</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;More Q&amp;amp;A&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;What about the BGP ASN? Should we leave it at the default value?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;Default is just fine (private scope ASN per RFC), unless the organization has a public registered ASN they wish to use.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;It's possible to set more than one vCPU for SecureXL with R80.20?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;You are probably refer to the coupling of 1 NIC to 1 CPU. In R80.20 this should be much better.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Are their plans to support the same automated deployment functionality in other tools such as Terraform?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;Not at the moment.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;AWS limits their VPC VPNs to 1.25 gig bandwidth. Have you seen this limitation become a problem for users since traffic has to traverse to the transit VPC over that to reach another VPC?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;In large scale environments or in case of an especially throughput-intensive spoke VPCs, this could be an issue. The solution we recommend is to deploy a Check Point gateway instead of the managed VPN gateway on the spokes using the new c5 instances, which we will support in the near future.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Does the "automation" you guys are referring to encompass the addition/removal of spoke VPCs?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;Yes, it&amp;nbsp;includes automation for all aspects of maintenance of the IPsec mesh.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Will this connect in the same way as my current network to my Splunk SIEM for monitoring?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;Yes, with Log Exporter. See &lt;A href="https://community.checkpoint.com/message/16349"&gt;Log Exporter guide&lt;/A&gt;‌&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;What is the impact of the route based VPN in AWS on R80.20 on CoreXL and SecureXL?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;Starting with R80.10, IPsec is optimized on multi core setups. Starting with R80.20, it includes SecureXL enhancements for better acceleration. The impact is not significant, and with c5 instances, it will be minimal.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Where is the max number of supported spoke VPC documented?? 35 was just mentioned.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;Technically, there is no limitation in code. Up to 35 spokes is the recommended number of VPCs we've certified with average common throughput requirements.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Does the improvements to the API also encompass all common configuration items within IPSEC VPNs such as DH group for phase 2 as this is not currently supported?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;This is in the roadmap.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Another question related to security, which kind of methods uses to inspect encrypted traffic between the VPN IPsec?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;Since we’re terminating the IPSec tunnel on a Check Point gateway, we can inspect them with deep packet inspection , HTTPS Inspection, IPS, Anti-Bot, Anti-Virus, Application Control, URL Filtering, zero day protection, and more. Essentially every security engine Check Point gateway provides.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Is each gateway in the hub a member of AutoScaling group with 1 instance?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;No, the solution is not deployed as autoscaling group. Autoscaling support will be added in the future (Check Point autoscaling, not referring to AWS standard autoscaling, which does not support IPsec).&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;It's possible to delete Datacenter objects automatically in SmartDashboard after the object was deleted in AWS? How can I find deleted Datacenter objects in SmartDashboard (like unused objects)?&lt;/STRONG&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;&lt;BR /&gt;When you delete the object in AWS, it will be marked as "deleted on server" but it won’t automatically be deleted from the policy. Of course you can delete it manually. The way to identify those objects is to view the info of the datacenter object, which will reflect it is deleted on server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;SK120534 no longer specifies to use conditional matches for traffic to VPC's within firewall policy but sk100726 still states to use conditional matches. Which approach is correct?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;In both SKs, there is explanation how to use the “VPN Directional Match in VPN Column.”&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;The scripts responsible for deployment of the AWS VPC VPN Gateways as well as BGP config are located on the CP management server?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;Yes.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Can datacenter objects be imported from multiple AWS accounts?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;Yes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Can it be done through a single cross account IAM role?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;Yes with sts:AssumeRole permission.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;MDM is not supported yet. Technical Problem or will be considered later?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;MDM on-premise is supported. MDM on AWS is&amp;nbsp;planned.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 30 Oct 2018 15:31:03 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2018-10-30T15:31:03Z</dc:date>
    <item>
      <title>CloudGuard for AWS - Security Transit VPC Demonstration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-for-AWS-Security-Transit-VPC-Demonstration/m-p/9799#M3484</link>
      <description>&lt;P&gt;We've recently released an important milestone in our security solutions for AWS – the automated Security Transit VPC.&lt;/P&gt;
&lt;P&gt;This solution enables our customers to provide a vast array of security use cases to their public (or hybrid) cloud environments, with optimal costs &amp;amp; performance, complete automation and agility at scale.&lt;/P&gt;
&lt;P&gt;With minimal interference and footprint, security admins can now achieve security visibility and advanced threat prevention, all on an IPsec encrypted transitive network.&lt;/P&gt;
&lt;P&gt;In this session, we demonstrate how to deploy the solution, show it in operation, and answer your questions!&lt;/P&gt;
&lt;P&gt;An excerpt of the session is below with the full recording available to CheckMates members:&amp;nbsp;&lt;A href="https://community.checkpoint.com/videos/10692" target="_blank" rel="noopener"&gt;CloudGuard for AWS - Security Transit VPC Demonstration Video&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;div class="lia-vid-container video-embed-center"&gt;&lt;div id="lia-vid-44a29maDE6BNwTiO0zlLFZvwnNOfXBvEw1280h720r819" class="lia-video-brightcove-player-container"&gt;&lt;video-js data-video-id="6065293853001" data-account="6058022097001" data-player="default" data-embed="default" class="vjs-fluid" controls="" data-application-id="" style="width: 100%; height: 100%;"&gt;&lt;/video-js&gt;&lt;/div&gt;&lt;script src="https://players.brightcove.net/6058022097001/default_default/index.min.js"&gt;&lt;/script&gt;&lt;script&gt;(function() {  var wrapper = document.getElementById('lia-vid-44a29maDE6BNwTiO0zlLFZvwnNOfXBvEw1280h720r819');  var videoEl = wrapper ? wrapper.querySelector('video-js') : null;  if (videoEl) {     if (window.videojs) {       window.videojs(videoEl).ready(function() {         this.on('loadedmetadata', function() {           this.el().querySelectorAll('.vjs-load-progress div[data-start]').forEach(function(bar) {             bar.setAttribute('role', 'presentation');             bar.setAttribute('aria-hidden', 'true');           });         });       });     }  }})();&lt;/script&gt;&lt;a class="video-embed-link" href="https://community.checkpoint.com/t5/video/gallerypage/video-id/44a29maDE6BNwTiO0zlLFZvwnNOfXBvE"&gt;(view in My Videos)&lt;/a&gt;&lt;/div&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2019 17:19:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-for-AWS-Security-Transit-VPC-Demonstration/m-p/9799#M3484</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-03-14T17:19:18Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard for AWS - Security Transit VPC Demonstration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-for-AWS-Security-Transit-VPC-Demonstration/m-p/9800#M3485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Folks I just watched the session on AWS and using cloud guard as transit VPC, I have a question what if customer has already deployed transit VPC with CISCO using CSR is there way to create another VPC using checkpoint then connect back into the transit VPC?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2018 17:14:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-for-AWS-Security-Transit-VPC-Demonstration/m-p/9800#M3485</guid>
      <dc:creator>Rahim_Damji</dc:creator>
      <dc:date>2018-10-25T17:14:29Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard for AWS - Security Transit VPC Demonstration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-for-AWS-Security-Transit-VPC-Demonstration/m-p/9801#M3486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Theoretically, you could deploy multiple transit VPCs in parallel (some going through Cisco, some going through Check Point).&lt;/P&gt;&lt;P&gt;Or do you want to chain them together?&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/46317"&gt;Lior Cohen&lt;/A&gt;‌ any thoughts about this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2018 22:24:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-for-AWS-Security-Transit-VPC-Demonstration/m-p/9801#M3486</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-10-26T22:24:52Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard for AWS - Security Transit VPC Demonstration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-for-AWS-Security-Transit-VPC-Demonstration/m-p/9802#M3487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply I would to Chain them as our CSR is already deployed for direct connect in the transit VPC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rd&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Get Outlook for iOS&amp;lt;https://aka.ms/o0ukef&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2018 22:37:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-for-AWS-Security-Transit-VPC-Demonstration/m-p/9802#M3487</guid>
      <dc:creator>Rahim_Damji</dc:creator>
      <dc:date>2018-10-26T22:37:02Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard for AWS - Security Transit VPC Demonstration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-for-AWS-Security-Transit-VPC-Demonstration/m-p/9803#M3488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;Here were some of the other questions asked during the session:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #000000; font-size: 14.6667px;"&gt;Are you going to update SK120534 to show that you need to specifically permit ESP traffic on the AWS Security Groups??&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;Yes, indeed allowing ESP [Custom Protocol | ESP (50) | All ] is required. Generally, we recommend using the more detailed deployment guide instead of the SK - can be found here:&amp;nbsp;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_Transit_VPC_for_AWS/html_frameset.htm" title="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_Transit_VPC_for_AWS/html_frameset.htm"&gt;Transit VPC for AWS R80.10 Deployment Guide&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;&lt;STRONG&gt;The architecture diagram shows the management&amp;nbsp;server in AWS.&amp;nbsp; Can this use an existing on-prem management server?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;On-premise Management server is supported. For R80.10 there is a need to install JHF version 142 or above. For R80.20 the GA supports this. Above this there is a need to install the add-on as described in the deployment guide.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;How fast is the the HA failover, if I understand it correct it is based on the BGP?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;It relies on BGP convergence, which is not deterministic. It typically occurs in 10-20 seconds.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;I&lt;SPAN style="font-size: 14.6667px;"&gt;s transit VPC inspection in AWS unique to Check Point only?&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;T&lt;SPAN style="font-weight: normal; font-size: 14.666666984558105px;"&gt;here are other solutions out there that handle the IPsec mesh and transitive connectivity, however those solutions (Cisco CSR, Aviatrix, to name a leading few) do not provide the essential security function with deep packet inspection and threat prevention.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Is the R8x API going to be updated so that interoperable objects can be created? As these are required for creating VPNs to spoke VPC's through automation tools.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;This is in the roadmap.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Can this be done in Azure and GCP as well?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;The automated solution covers AWS only. Each cloud provider uses different infrastructures and architectures. For example, this approach is not common in Azure as vNET peering (transitive, encrypted, supports service insertion with UDRs) is often a better solution.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Are you going to update SK120534 as the BGP configuration within the SK can create asymmetric routing due to the AWS VPG's creating 2 IPSEC tunnels for each VPC VPN and only accepting externally defined BGP preferences through AS-PATH.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Refer to the deployment guide:&amp;nbsp;&lt;/SPAN&gt;&lt;A class="" href="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_Transit_VPC_for_AWS/html_frameset.htm" style="color: #2989c5; text-decoration: none;" title="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_Transit_VPC_for_AWS/html_frameset.htm"&gt;Transit VPC for AWS R80.10 Deployment Guide&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Oct 2018 16:49:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-for-AWS-Security-Transit-VPC-Demonstration/m-p/9803#M3488</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-10-29T16:49:47Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard for AWS - Security Transit VPC Demonstration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-for-AWS-Security-Transit-VPC-Demonstration/m-p/9804#M3489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;More Q&amp;amp;A&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;What about the BGP ASN? Should we leave it at the default value?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;Default is just fine (private scope ASN per RFC), unless the organization has a public registered ASN they wish to use.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;It's possible to set more than one vCPU for SecureXL with R80.20?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;You are probably refer to the coupling of 1 NIC to 1 CPU. In R80.20 this should be much better.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Are their plans to support the same automated deployment functionality in other tools such as Terraform?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;Not at the moment.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;AWS limits their VPC VPNs to 1.25 gig bandwidth. Have you seen this limitation become a problem for users since traffic has to traverse to the transit VPC over that to reach another VPC?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;In large scale environments or in case of an especially throughput-intensive spoke VPCs, this could be an issue. The solution we recommend is to deploy a Check Point gateway instead of the managed VPN gateway on the spokes using the new c5 instances, which we will support in the near future.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Does the "automation" you guys are referring to encompass the addition/removal of spoke VPCs?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;Yes, it&amp;nbsp;includes automation for all aspects of maintenance of the IPsec mesh.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Will this connect in the same way as my current network to my Splunk SIEM for monitoring?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;Yes, with Log Exporter. See &lt;A href="https://community.checkpoint.com/message/16349"&gt;Log Exporter guide&lt;/A&gt;‌&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;What is the impact of the route based VPN in AWS on R80.20 on CoreXL and SecureXL?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;Starting with R80.10, IPsec is optimized on multi core setups. Starting with R80.20, it includes SecureXL enhancements for better acceleration. The impact is not significant, and with c5 instances, it will be minimal.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Where is the max number of supported spoke VPC documented?? 35 was just mentioned.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;Technically, there is no limitation in code. Up to 35 spokes is the recommended number of VPCs we've certified with average common throughput requirements.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Does the improvements to the API also encompass all common configuration items within IPSEC VPNs such as DH group for phase 2 as this is not currently supported?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;This is in the roadmap.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Another question related to security, which kind of methods uses to inspect encrypted traffic between the VPN IPsec?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;Since we’re terminating the IPSec tunnel on a Check Point gateway, we can inspect them with deep packet inspection , HTTPS Inspection, IPS, Anti-Bot, Anti-Virus, Application Control, URL Filtering, zero day protection, and more. Essentially every security engine Check Point gateway provides.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Is each gateway in the hub a member of AutoScaling group with 1 instance?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;No, the solution is not deployed as autoscaling group. Autoscaling support will be added in the future (Check Point autoscaling, not referring to AWS standard autoscaling, which does not support IPsec).&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;It's possible to delete Datacenter objects automatically in SmartDashboard after the object was deleted in AWS? How can I find deleted Datacenter objects in SmartDashboard (like unused objects)?&lt;/STRONG&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;&lt;BR /&gt;When you delete the object in AWS, it will be marked as "deleted on server" but it won’t automatically be deleted from the policy. Of course you can delete it manually. The way to identify those objects is to view the info of the datacenter object, which will reflect it is deleted on server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;SK120534 no longer specifies to use conditional matches for traffic to VPC's within firewall policy but sk100726 still states to use conditional matches. Which approach is correct?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-weight: normal; font-size: 14.666666984558105px;"&gt;In both SKs, there is explanation how to use the “VPN Directional Match in VPN Column.”&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;The scripts responsible for deployment of the AWS VPC VPN Gateways as well as BGP config are located on the CP management server?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;Yes.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Can datacenter objects be imported from multiple AWS accounts?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;Yes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;Can it be done through a single cross account IAM role?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;Yes with sts:AssumeRole permission.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; color: #000000; font-size: 14.6667px;"&gt;MDM is not supported yet. Technical Problem or will be considered later?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 14.6667px;"&gt;MDM on-premise is supported. MDM on AWS is&amp;nbsp;planned.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Oct 2018 15:31:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-for-AWS-Security-Transit-VPC-Demonstration/m-p/9804#M3489</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-10-30T15:31:03Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard for AWS - Security Transit VPC Demonstration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-for-AWS-Security-Transit-VPC-Demonstration/m-p/9805#M3490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;JHF requirements for Transit VPC solution in CloudGuard for AWS:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;R80.10:&lt;UL&gt;&lt;LI&gt;On AWS MGMT - Only JHF take #142 and above are supported&lt;/LI&gt;&lt;LI&gt;On premise MGMT – Supported only with JHF take #142 and above&lt;/LI&gt;&lt;LI&gt;JHF Take 154 is currently the GA one&lt;/LI&gt;&lt;LI&gt;We are working to update the public &lt;A href="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_Transit_VPC_for_AWS/html_frameset.htm"&gt;Documentation&lt;/A&gt; (with few more updates)&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;R80.20:&lt;UL&gt;&lt;LI&gt;On premise MGMT – supported (just add-on installation)&lt;/LI&gt;&lt;LI&gt;On AWS MGMT – coming soon…&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Nov 2018 23:20:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-for-AWS-Security-Transit-VPC-Demonstration/m-p/9805#M3490</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-20T23:20:25Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard for AWS - Security Transit VPC Demonstration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-for-AWS-Security-Transit-VPC-Demonstration/m-p/9806#M3491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;STRONG style="color: #000000; border: 0px; font-weight: bold; font-size: 14.6667px;"&gt;Multi-Domain Management is now supported in AWS &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;STRONG style="color: #000000; border: 0px; font-weight: bold; font-size: 14.6667px;"&gt;Have a look at sk:&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG style="color: #000000; border: 0px; font-weight: bold; font-size: 14.6667px;"&gt;&lt;A class="link-titled" href="https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk143213" title="https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk143213"&gt;Multi-Domain Management Deployment on AWS&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Feb 2019 12:28:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-for-AWS-Security-Transit-VPC-Demonstration/m-p/9806#M3491</guid>
      <dc:creator>Carlos_Perea</dc:creator>
      <dc:date>2019-02-11T12:28:02Z</dc:date>
    </item>
  </channel>
</rss>

