<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure based Vsec R80.10 Cluster - Secondary node issue in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17178#M3603</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Got the fixed Script. Due to changes in the API permissions on Azure, new script need to be loaded on both the Cluster Members.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the Inbound NAT rules need to be pointed at Active Member's private IP and not the Cluster VIP.&lt;/P&gt;&lt;P&gt;Following the above, 2 NAT rules need to be implemented in Dashboard which receive the traffic on Member Ip's of both Cluster Member (when either of them are active) and not the Cluster VIP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 28 Apr 2018 19:41:15 GMT</pubDate>
    <dc:creator>Nikhil_Deshmukh</dc:creator>
    <dc:date>2018-04-28T19:41:15Z</dc:date>
    <item>
      <title>Azure based Vsec R80.10 Cluster - Secondary node issue</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17167#M3592</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, I have deployed an R80.10 Checkpoint Cluster into Microsoft Azure. Cluster XL is working (active/standby) and I can manage and push policies to both cluster nodes (inbound connectivity ok)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However when running the azure test script to check connectivity to Azure to make UDR and cluster IP changes the secondary node can't resolve DNS. Primary node works fine. If I try and ping 8.8.8.8 for example, I get no response as if the node has no outbound Internet connectivity not just a DNS issue. This is very odd because I can manage the cluster nodes and cluster XL is working but because the secondary node has no outbound connectivity failover is not working and also it can't contact checkpoint.com to get its contracts status so its complaining about licensing. Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Output from the secondary node below which is unsuccessful.&lt;BR /&gt;[Expert@vsec-node-2]# $FWDIR/scripts/azure_ha_test.py&lt;BR /&gt;Image version is: ogu_GAR1-289&lt;BR /&gt;Reading configuration file...&lt;BR /&gt;Testing if DNS is configured...&lt;BR /&gt;&amp;nbsp;- Primary DNS server is: 8.8.8.8&lt;BR /&gt;Testing if DNS is working...&lt;BR /&gt;Error:&lt;BR /&gt;Failed to resolve login.windows.net&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;[Expert@vsec-node-2]# ping 8.8.8.8&lt;BR /&gt;PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.&lt;/P&gt;&lt;P&gt;--- 8.8.8.8 ping statistics ---&lt;BR /&gt;3 packets transmitted, 0 received, 100% packet loss, time 2001ms&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Apr 2018 11:57:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17167#M3592</guid>
      <dc:creator>Alex_Fray</dc:creator>
      <dc:date>2018-04-20T11:57:37Z</dc:date>
    </item>
    <item>
      <title>Re: Azure based Vsec R80.10 Cluster - Secondary node issue</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17168#M3593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For anyone else who experiences this issue. The cause was that the secondary node was natting its own traffic behind the cluster IP address. The Cluster IP was assigned to the Primary node so assymetric routing was occurring.&lt;/P&gt;&lt;P&gt;The solution was a "no nat" rule on both vsec nodes so that traffic originating from itself is not hidden behind the cluster IP address but behind its own public IP address. I've not had to do this on my R77.30 vsecs so looks like a missing step from the R80.10 vsec guide. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Apr 2018 07:33:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17168#M3593</guid>
      <dc:creator>Alex_Fray</dc:creator>
      <dc:date>2018-04-23T07:33:40Z</dc:date>
    </item>
    <item>
      <title>Re: Azure based Vsec R80.10 Cluster - Secondary node issue</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17169#M3594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi:&lt;/P&gt;&lt;P&gt;How much time does failover take? SK says under 2 minutes but I think that's too long .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Apr 2018 12:49:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17169#M3594</guid>
      <dc:creator>Neville_Kuo</dc:creator>
      <dc:date>2018-04-23T12:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: Azure based Vsec R80.10 Cluster - Secondary node issue</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17170#M3595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately failover is around 2 minutes.&lt;/P&gt;&lt;P&gt;ClusterXL fails over in seconds but the API calls to Azure to change routes and Cluster IP take their time. UDRs change pretty quickly in fairness&amp;nbsp;but the disassociation of the cluster IP from the primary node and association to secondary node is the main delay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Apr 2018 15:37:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17170#M3595</guid>
      <dc:creator>Alex_Fray</dc:creator>
      <dc:date>2018-04-23T15:37:16Z</dc:date>
    </item>
    <item>
      <title>Re: Azure based Vsec R80.10 Cluster - Secondary node issue</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17171#M3596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think that's too slow for mission critical services, I would rather suggest our customer use higher level vm size for check point.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Apr 2018 15:40:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17171#M3596</guid>
      <dc:creator>Neville_Kuo</dc:creator>
      <dc:date>2018-04-23T15:40:37Z</dc:date>
    </item>
    <item>
      <title>Re: Azure based Vsec R80.10 Cluster - Secondary node issue</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17172#M3597</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have observed that even after 30-40 mins the&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;disassociation of the cluster IP from the primary node and association to secondary node&lt;SPAN&gt;&amp;nbsp;is not happening&amp;nbsp;post Fail-Over.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Th Cluster Testing Script $FWDIR/scripts/azure_ha_test.py, Result in All tests were successful!&lt;/P&gt;&lt;P&gt;Everything as in:-&lt;/P&gt;&lt;P&gt;1. DNS&lt;/P&gt;&lt;P&gt;2.&amp;nbsp;&lt;SPAN&gt;login.windows.net:443&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;3. Interfaces&lt;/P&gt;&lt;P&gt;4.&amp;nbsp;C&lt;SPAN&gt;redentials&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;5. Route Tables&lt;/P&gt;&lt;P&gt;6. Load Balancers&lt;/P&gt;&lt;P&gt;7.&amp;nbsp;Azure interface configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any Suggestions??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Apr 2018 06:17:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17172#M3597</guid>
      <dc:creator>Nikhil_Deshmukh</dc:creator>
      <dc:date>2018-04-26T06:17:35Z</dc:date>
    </item>
    <item>
      <title>Re: Azure based Vsec R80.10 Cluster - Secondary node issue</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17173#M3598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What Checkpoint version are you running? Have you run the test script on both nodes? I've only had failover/failback issues on R77.30 Azure based clusters, not had enough time with R80.10 yet. Typically this was because I had modified the inbound NAT rules&amp;nbsp;on the Azure load balancer to include additional services such as SNMP which bizarrely seem to cause an issue or another Azure admin had restricted Public IPs at the subscription level so I couldn't associate the public IP to the secondary node.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can manually associate the IP once it has disassociated. Not ideal but if you've got a 30-40 min&amp;nbsp;outage and need to restore service it is possible.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Apr 2018 07:10:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17173#M3598</guid>
      <dc:creator>Alex_Fray</dc:creator>
      <dc:date>2018-04-26T07:10:03Z</dc:date>
    </item>
    <item>
      <title>Re: Azure based Vsec R80.10 Cluster - Secondary node issue</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17174#M3599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Checkpoint R80.10.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;The Cluster Testing Script $FWDIR/scripts/azure_ha_test.py, Result in All tests were successful! on both&amp;nbsp;nodes.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;The Inbound NAT Rules are not getting updated and &lt;SPAN&gt;the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="border: 0px;"&gt;disassociation of the cluster IP from the primary node and association to secondary node&lt;SPAN style="border: 0px; font-weight: inherit;"&gt;&amp;nbsp;is not happening&amp;nbsp;post Fail-Over.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Apr 2018 07:44:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17174#M3599</guid>
      <dc:creator>Nikhil_Deshmukh</dc:creator>
      <dc:date>2018-04-26T07:44:45Z</dc:date>
    </item>
    <item>
      <title>Re: Azure based Vsec R80.10 Cluster - Secondary node issue</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17175#M3600</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have done some troubleshooting ass follows:-&lt;/P&gt;&lt;P&gt;1. Removed all LB Inbound NAT Rules and did fail-over.&lt;/P&gt;&lt;P&gt;Result:- &lt;STRONG&gt;Success !!&lt;/STRONG&gt; UDR's getting updated and points at M2 as next hop. Cluster VIP gets diassociate from M1 and Associates to M2 automatically.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Added 1 Inbound NAT Rule on LB. and did fail-over.&lt;/P&gt;&lt;P&gt;Result:- &lt;STRONG&gt;Failure&lt;/STRONG&gt;&amp;nbsp;!!, &lt;SPAN&gt;UDR's getting updated and points at M2 as next hop.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Cluster VIP does not move to M2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;On Azure we can see activity log:-&lt;/STRONG&gt;&lt;/P&gt;&lt;UL data-bind="foreach: data.properties()" style="color: #252525; background-color: #ffffff; font-weight: 400; font-size: 12px;"&gt;&lt;LI class="" data-bind="visible: value" style="font-weight: inherit; font-size: 12px; padding: 10px 0px 0px;"&gt;&lt;DIV class="" style="font-weight: inherit; font-size: 12px;"&gt;&lt;DIV class="" data-bind="text: name" style="color: #6c7074; font-weight: inherit; font-size: 12px;"&gt;Operation name&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="" style="font-weight: inherit; font-size: 12px;"&gt;&lt;DIV class="" data-bind="text: value" style="font-weight: inherit; font-size: 12px;"&gt;Write NetworkInterfaces &lt;STRONG&gt;FAILED &lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://community.checkpoint.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt;&lt;/STRONG&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI class="" data-bind="visible: value" style="font-weight: inherit; font-size: 12px; padding: 10px 0px 0px;"&gt;&lt;DIV class="" style="font-weight: inherit; font-size: 12px;"&gt;&lt;DIV class="" data-bind="text: name" style="color: #6c7074; font-weight: inherit; font-size: 12px;"&gt;Time stamp&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="" style="font-weight: inherit; font-size: 12px;"&gt;&lt;DIV class="" data-bind="text: value" style="font-weight: inherit; font-size: 12px;"&gt;Fri Apr 27 2018 13:08:43 GMT+0530 (India Standard Time)&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI class="" data-bind="visible: value" style="font-weight: inherit; font-size: 12px; padding: 10px 0px 0px;"&gt;&lt;DIV class="" style="font-weight: inherit; font-size: 12px;"&gt;&lt;DIV class="" data-bind="text: name" style="color: #6c7074; font-weight: inherit; font-size: 12px;"&gt;Event initiated by&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="" style="font-weight: inherit; font-size: 12px;"&gt;&lt;DIV class="" data-bind="text: value" style="font-weight: inherit; font-size: 12px;"&gt;check-point-cluster-ha-failover&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI class="" data-bind="visible: value" style="font-weight: inherit; font-size: 12px; padding: 10px 0px 0px;"&gt;&lt;DIV class="" style="font-weight: inherit; font-size: 12px;"&gt;&lt;DIV class="" data-bind="text: name" style="color: #6c7074; font-weight: inherit; font-size: 12px;"&gt;Error code&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="" style="font-weight: inherit; font-size: 12px;"&gt;&lt;DIV class="" data-bind="text: value" style="font-weight: inherit; font-size: 12px;"&gt;InvalidResourceReference&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI class="" data-bind="visible: value" style="font-weight: inherit; font-size: 12px; padding: 10px 0px 0px;"&gt;&lt;DIV class="" style="font-weight: inherit; font-size: 12px;"&gt;&lt;DIV class="" data-bind="text: name" style="color: #6c7074; font-weight: inherit; font-size: 12px;"&gt;Message&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="" style="font-weight: inherit; font-size: 12px;"&gt;&lt;DIV class="" data-bind="text: value" style="font-weight: inherit; font-size: 12px;"&gt;Resource /subscriptions/d3e8c785-de15-4ba5-8afb-953e277061a2/resourceGroups/CPClust_RG/providers/Microsoft.Network/networkInterfaces/CPClust1-eth0/ipConfigurations/cluster-vip referenced by resource /subscriptions/d3e8c785-de15-4ba5-8afb-953e277061a2/resourceGroups/CPClust_RG/providers/Microsoft.Network/virtualNetworks/VNET01/subnets/Frontend was not found. Please make sure that the referenced resource exists, and that both resources are in the same region.&lt;/DIV&gt;&lt;DIV class="" data-bind="text: value" style="font-weight: inherit; font-size: 12px;"&gt; &lt;/DIV&gt;&lt;DIV class="" data-bind="text: value" style="font-weight: inherit; font-size: 12px;"&gt; &lt;/DIV&gt;&lt;DIV class="" data-bind="text: value" style="font-weight: inherit; font-size: 12px;"&gt; &lt;/DIV&gt;&lt;DIV class="" data-bind="text: value" style="font-weight: inherit; font-size: 12px;"&gt; &lt;/DIV&gt;&lt;DIV data-bind="text: value"&gt;&lt;SPAN style="font-size: 15px;"&gt;ANY1 has encountered such error. I'm facing the same in 2 deployments.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Apr 2018 07:42:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17175#M3600</guid>
      <dc:creator>Nikhil_Deshmukh</dc:creator>
      <dc:date>2018-04-27T07:42:21Z</dc:date>
    </item>
    <item>
      <title>Re: Azure based Vsec R80.10 Cluster - Secondary node issue</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17176#M3601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is a new &lt;SPAN style="font-size: 10.5pt; color: black; background: white;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk125435&amp;amp;partition=Advanced&amp;amp;product=CloudGuard"&gt;sk125435&lt;/A&gt;&lt;/SPAN&gt; for this problem. It says that a new template will be published in a week or so.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;There is a workaround that can be done today with a fixed azure_had.py that can be requested from TAC.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;Arnfinn&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Apr 2018 23:19:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17176#M3601</guid>
      <dc:creator>Arnfinn_Strand</dc:creator>
      <dc:date>2018-04-27T23:19:38Z</dc:date>
    </item>
    <item>
      <title>Re: Azure based Vsec R80.10 Cluster - Secondary node issue</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17177#M3602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks &lt;A href="https://community.checkpoint.com/migrated-users/44122"&gt;Arnfinn Strand&lt;/A&gt;‌ &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Checking with the TAC. But there's a little delay from them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any source of the fixed azure_ha.py script ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Apr 2018 07:32:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17177#M3602</guid>
      <dc:creator>Nikhil_Deshmukh</dc:creator>
      <dc:date>2018-04-28T07:32:30Z</dc:date>
    </item>
    <item>
      <title>Re: Azure based Vsec R80.10 Cluster - Secondary node issue</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17178#M3603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Got the fixed Script. Due to changes in the API permissions on Azure, new script need to be loaded on both the Cluster Members.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the Inbound NAT rules need to be pointed at Active Member's private IP and not the Cluster VIP.&lt;/P&gt;&lt;P&gt;Following the above, 2 NAT rules need to be implemented in Dashboard which receive the traffic on Member Ip's of both Cluster Member (when either of them are active) and not the Cluster VIP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Apr 2018 19:41:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17178#M3603</guid>
      <dc:creator>Nikhil_Deshmukh</dc:creator>
      <dc:date>2018-04-28T19:41:15Z</dc:date>
    </item>
    <item>
      <title>Re: Azure based Vsec R80.10 Cluster - Secondary node issue</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17179#M3604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Only source I know is TAC. Sorry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Apr 2018 19:56:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Azure-based-Vsec-R80-10-Cluster-Secondary-node-issue/m-p/17179#M3604</guid>
      <dc:creator>Arnfinn_Strand</dc:creator>
      <dc:date>2018-04-28T19:56:41Z</dc:date>
    </item>
  </channel>
</rss>

