<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AWS CloudGuard Monitoring - CloudWatch in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-CloudGuard-Monitoring-CloudWatch/m-p/37581#M3587</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Guys&lt;/P&gt;&lt;P&gt;These is one idea for monitoring your "VPC Security" deployed with CloudGuard devices, use "AWS CloudWatch". Its very simply.&lt;/P&gt;&lt;P&gt;cloudguard&amp;nbsp;vsec aws&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/64454_pastedImage_1.png" style="width: 620px; height: 341px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 10 Apr 2018 12:37:10 GMT</pubDate>
    <dc:creator>Luciano_Miguel</dc:creator>
    <dc:date>2018-04-10T12:37:10Z</dc:date>
    <item>
      <title>AWS CloudGuard Monitoring - CloudWatch</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-CloudGuard-Monitoring-CloudWatch/m-p/37581#M3587</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Guys&lt;/P&gt;&lt;P&gt;These is one idea for monitoring your "VPC Security" deployed with CloudGuard devices, use "AWS CloudWatch". Its very simply.&lt;/P&gt;&lt;P&gt;cloudguard&amp;nbsp;vsec aws&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/64454_pastedImage_1.png" style="width: 620px; height: 341px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2018 12:37:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-CloudGuard-Monitoring-CloudWatch/m-p/37581#M3587</guid>
      <dc:creator>Luciano_Miguel</dc:creator>
      <dc:date>2018-04-10T12:37:10Z</dc:date>
    </item>
    <item>
      <title>Re: AWS CloudGuard Monitoring - CloudWatch</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-CloudGuard-Monitoring-CloudWatch/m-p/37582#M3588</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Luciano,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you mind showing the configuration steps that you've had to go through in order to implement this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There was another discussion earlier regarding logging to CloudWatch:&amp;nbsp;&lt;A _jive_internal="true" class="link-titled" href="https://community.checkpoint.com/message/16943-re-log-exporter-guide?commentID=16943#comment-16943" title="https://community.checkpoint.com/message/16943-re-log-exporter-guide?commentID=16943#comment-16943"&gt;https://community.checkpoint.com/message/16943-re-log-exporter-guide?commentID=16943#comment-16943&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am interested to know what other metrics it is possible to collect and process without parsing the logs from the CloudGuard.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Vladimir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2018 14:10:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-CloudGuard-Monitoring-CloudWatch/m-p/37582#M3588</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-04-10T14:10:02Z</dc:date>
    </item>
    <item>
      <title>Re: AWS CloudGuard Monitoring - CloudWatch</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-CloudGuard-Monitoring-CloudWatch/m-p/37583#M3589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Vladimir sure , I used the vpn metrics available in cloud watch , and CPU of ec2 CloudGuard instances .&lt;/P&gt;&lt;P&gt;These environment have two vpcs Transit and Security with Vpn connection on both sides , see picture . And another vpcs behind the security vpc.&lt;/P&gt;&lt;P&gt;From these dashboard we can see vpn status, CloudGuard health and tunnels traffic .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2018 15:27:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-CloudGuard-Monitoring-CloudWatch/m-p/37583#M3589</guid>
      <dc:creator>Luciano_Miguel</dc:creator>
      <dc:date>2018-04-10T15:27:17Z</dc:date>
    </item>
    <item>
      <title>Re: AWS CloudGuard Monitoring - CloudWatch</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-CloudGuard-Monitoring-CloudWatch/m-p/37584#M3590</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Luciano,&lt;/P&gt;&lt;P&gt;Thank you for replying.&lt;/P&gt;&lt;P&gt;When you are saying "see picture", are you you referring to the original metrics screen or were you planning to include a sketch of a diagram?&lt;/P&gt;&lt;P&gt;Also, please let me know if the "vpn metric available in cloudwatch" requires VPC flow configured to recognize the VPN traffic, or is it capable of doing it naively.&lt;/P&gt;&lt;P&gt;I suspect that the cloudwatch can recognize the VPN traffic, but it should not be able to differentiate between multiple VPN tunnels terminating on the same vSEC gateway without tighter integration with CP APIs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2018 15:38:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-CloudGuard-Monitoring-CloudWatch/m-p/37584#M3590</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-04-10T15:38:56Z</dc:date>
    </item>
    <item>
      <title>Re: AWS CloudGuard Monitoring - CloudWatch</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-CloudGuard-Monitoring-CloudWatch/m-p/37585#M3591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Vladimir,&lt;/P&gt;&lt;P&gt;Let me explain better, I was talk about the first diagram, and my environment is distributed with below:&lt;/P&gt;&lt;P&gt;OnPremises&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;AWS Cloud&lt;/P&gt;&lt;P&gt;MyDatacenter &amp;lt;&amp;gt; Direct Connection Links &amp;lt;&amp;gt; AWS Transit VPC &amp;lt;&amp;gt; AWS Security VPC &amp;lt;&amp;gt; Spoke VPCs&lt;/P&gt;&lt;P&gt;The Dashboard showing the connections VPNs between VPCs:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;AWS Transit VPC &amp;lt;&amp;gt; AWS Security VPC&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;AWS Security VPC &amp;lt;&amp;gt; Spoke VPCs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For this reason we can see the VPNs metrics&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We do not have external VPNs with CloudGuard ex: site to site vpns. But I believe that is possible include to CloudWatch Dashboard, but required&amp;nbsp;the metrics customization or Flow export.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2018 18:38:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-CloudGuard-Monitoring-CloudWatch/m-p/37585#M3591</guid>
      <dc:creator>Luciano_Miguel</dc:creator>
      <dc:date>2018-04-10T18:38:36Z</dc:date>
    </item>
  </channel>
</rss>

