<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39229#M3774</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am setting this environment up right now. Does the host need to have public temp IP? I am assuming no, correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 06 Mar 2018 17:48:27 GMT</pubDate>
    <dc:creator>Calvin_Nguyen</dc:creator>
    <dc:date>2018-03-06T17:48:27Z</dc:date>
    <item>
      <title>Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39214#M3759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;I've been asked an interesting and, seemingly, trivial question: "How would you protect the hosts in AWS VPC located in a different subnets by inspecting traffic between them?"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I was also assured that presently, AWS did not have a solution to this problem, a&lt;/STRONG&gt;&lt;STRONG&gt;s&amp;nbsp;every routing table you create will contain "local" route, all traffic from all subnets within one VPC will be routed through it.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;To work on this puzzle, this lab environment was provisioned:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="63150" alt="Inter-Subnet-AWS-LAB" class="image-7 jive-image" src="/legacyfs/online/checkpoint/63150_Check Point And AWS Scenarios for CheckMates v01d.png" style="width: 827px; height: 576px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;...and&amp;nbsp;answer to this dilemma is to use static routes &lt;SPAN style="text-decoration: underline;"&gt;in the instances&lt;/SPAN&gt; pointing to the interfaces of the vSEC or cluster, as well as security groups as Sources fro the traffic to the Private Subnets&lt;/STRONG&gt;&lt;STRONG&gt;:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@ip-10-255-255-200 ec2-user]# route&lt;/P&gt;&lt;P&gt;Kernel IP routing table&lt;/P&gt;&lt;P&gt;Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Gateway&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Genmask&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Flags Metric Ref&amp;nbsp;&amp;nbsp;&amp;nbsp; Use Iface&lt;/P&gt;&lt;P&gt;default&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.255.255.193&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; UG&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 eth0&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background: yellow;"&gt;10.255.255.128&amp;nbsp; 10.255.255.201&amp;nbsp; 255.255.255.192&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;UG&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 eth0&lt;/P&gt;&lt;P&gt;10.255.255.192&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.192 U&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 eth0&lt;/P&gt;&lt;P&gt;169.254.169.254 *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 UH&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 eth0&lt;/P&gt;&lt;P&gt;[root@ip-10-255-255-200 ec2-user]#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@ip-10-255-255-150 ec2-user]# route&lt;/P&gt;&lt;P&gt;Kernel IP routing table&lt;/P&gt;&lt;P&gt;Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Gateway&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Genmask&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Flags Metric Ref&amp;nbsp;&amp;nbsp;&amp;nbsp; Use Iface&lt;/P&gt;&lt;P&gt;default&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.255.255.129&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; UG&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 eth0&lt;/P&gt;&lt;P&gt;10.255.255.128&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.192 U&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 eth0&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background: yellow;"&gt;10.255.255.192&amp;nbsp; 10.255.255.140&amp;nbsp; 255.255.255.192&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;UG&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 eth0&lt;/P&gt;&lt;P&gt;169.254.169.254 *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 UH&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 eth0&lt;/P&gt;&lt;P&gt;[root@ip-10-255-255-150 ec2-user]#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;With Firewall Access rules set:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;IMG __jive_id="63097" alt="vSEC_Inter_Subnet_Rules" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63097_vSEC_Inter_Subnet_Rules.png" style="width: 772px; height: 132px;" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;With NAT rules set to:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;IMG __jive_id="63099" alt="vSEC_Inter_Subnet_NAT" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63099_vSEC_Inter_Subnet_NAT.png" style="width: 782px; height: 58px;" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;And was able to see the packet traversing firewall (10.255.255.201 and 10.255.255.140 are its interfaces):&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;IMG __jive_id="63149" alt="Inter-Subnet Packet Log" class="image-6 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63149_AWS_Inter-Subnet_vSEC_Packet.png" style="width: 620px; height: 593px;" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@ip-10-255-255-150 ec2-user]# ssh&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="mailto:ec2-user@10.255.255.200" style="color: #2989c5; text-decoration: none;"&gt;ec2-user@10.255.255.200&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Permission denied (publickey).&lt;/P&gt;&lt;P&gt;[root@ip-10-255-255-150 ec2-user]#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;And here is the tcpdump from the target host:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[root@ip-10-255-255-200 ec2-user]# tcpdump src 10.255.255.150&lt;/P&gt;&lt;P&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;/P&gt;&lt;P&gt;listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes&lt;/P&gt;&lt;P&gt;21:03:53.440273 IP&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="background: yellow;"&gt;10.255.255.150&lt;/SPAN&gt;.60118 &amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="background: yellow;"&gt;10.255.255.200&lt;/SPAN&gt;.ssh: Flags [S], seq 2098326363, win 26883, options [mss 1460,sackOK,TS val 843716 ecr 0,nop,wscale 7], length 0&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #333333;"&gt;&lt;STRONG&gt;With this Security group assigned to both hosts in my demo, the 10.255.255.150 and 10.255.255.200:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;IMG __jive_id="63151" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63151_pastedImage_4.png" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #333333;"&gt;&lt;STRONG&gt;Where sg-e2264391 is the:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;&lt;IMG __jive_id="63152" height="166" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63152_pastedImage_3.png" width="820" /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;&lt;SPAN style="background-color: #ffffff;"&gt;[ec2-user@ip-10-255-255-150 ~]$ date; ssh 10.255.255.200&lt;/SPAN&gt;&lt;BR style="background-color: #ffffff;" /&gt;&lt;SPAN style="background-color: #ffffff;"&gt;Fri Feb 16 13:29:42 UTC 2018&lt;/SPAN&gt;&lt;BR style="background-color: #ffffff;" /&gt;&lt;SPAN style="background-color: #ffffff;"&gt;Permission denied (publickey).&lt;/SPAN&gt;&lt;BR style="background-color: #ffffff;" /&gt;&lt;SPAN style="background-color: #ffffff; border: 0px;"&gt;[ec2-user@ip-10-255-255-150 ~]$ curl&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="http://169.254.169.254/latest/meta-data/security-groups" rel="nofollow" style="color: #6d6e71; background-color: #ffffff; border: 0px; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;http://169.254.169.254/latest/meta-data/security-groups&lt;/A&gt;&lt;BR style="background-color: #ffffff;" /&gt;&lt;SPAN style="color: #339966; background-color: #ffffff; border: 0px;"&gt;TempSG1&lt;/SPAN&gt;&lt;SPAN style="background-color: #ffffff;"&gt;[ec2-user@ip-10-255-255-150 ~]$&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #333333;"&gt;&lt;STRONG&gt;---&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border: 0px;"&gt;[ec2-user@ip-10-255-255-200 ~]$ date; ssh 10.255.255.150&lt;BR /&gt;Fri Feb 16 13:30:04 UTC 2018&lt;BR /&gt;Permission denied (publickey).&lt;/P&gt;&lt;P style="border: 0px;"&gt;&lt;SPAN style="border: 0px; font-weight: inherit;"&gt;[ec2-user@ip-10-255-255-200 ~]$ curl&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="http://169.254.169.254/latest/meta-data/security-groups" rel="nofollow" style="color: #6d6e71; border: 0px; font-weight: inherit; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;http://169.254.169.254/latest/meta-data/security-groups&lt;/A&gt;&lt;BR /&gt;&lt;SPAN style="color: #339966; border: 0px; font-weight: inherit;"&gt;TempSG1&lt;/SPAN&gt;[ec2-user@ip-10-255-255-200 ~]$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;And&amp;nbsp;&lt;SPAN style="font-size: 11.0pt;"&gt;f you really want to be sure that the traffic in question was traversing the firewall and NOT a default VPC router:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt;"&gt;&lt;IMG __jive_id="63103" alt="vSEC_Inter_Subnet_Interface" class="image-4 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63103_vSEC_Inter_Subnet_Interface.png" style="border: 0px; margin: 2px 0px 0px;" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;and&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@ip-10-255-255-200 ec2-user]# ifconfig | grep eth0&lt;/P&gt;&lt;P&gt;eth0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Link encap:Ethernet&amp;nbsp; HWaddr&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="background: lime;"&gt;02:70:96:B0:44:80&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;[root@ip-10-255-255-200 ec2-user]#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[root@ip-10-255-255-200 ec2-user]# tcpdump -tttt -ne host 10.255.255.150&lt;/P&gt;&lt;P&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;/P&gt;&lt;P&gt;listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes&lt;/P&gt;&lt;P&gt;2018-02-15 16:01:28.245759&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="background: yellow;"&gt;02:af:87:e2:04:c6&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="background: lime;"&gt;02:70:96:b0:44:80&lt;/SPAN&gt;, ethertype IPv4 (0x0800), length 74: 10.255.255.150.39480 &amp;gt; 10.255.255.200.ssh: Flags [S], seq 3739857756, win 26883, options [mss 1460,sackOK,TS val 331468 ecr 0,nop,wscale 7], length 0&lt;/P&gt;&lt;P&gt;2018-02-15 16:01:28.245898&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="background: lime;"&gt;02:70:96:b0:44:80&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="background: yellow;"&gt;02:af:87:e2:04:c6&lt;/SPAN&gt;, ethertype IPv4 (0x0800), length 74: 10.255.255.200.ssh &amp;gt; 10.255.255.150.39480: Flags [S.], seq 3645387522, ack 3739857757, win 26847, options [mss 8961,sackOK,TS val 324911 ecr 331468,nop,wscale 7], length 0&lt;/P&gt;&lt;P&gt;2018-02-15 16:01:28.246290 02:af:87:e2:04:c6 &amp;gt; 02:70:96:b0:44:80, ethertype IPv4 (0x0800), length 66: 10.255.255.150.39480 &amp;gt; 10.255.255.200.ssh: Flags [.], ack 1, win 211, options [nop,nop,TS val 331469 ecr 324911], length 0&lt;/P&gt;&lt;P&gt;2018-02-15 16:01:28.246441 02:af:87:e2:04:c6 &amp;gt; 02:70:96:b0:44:80, ethertype IPv4 (0x0800), length 87: 10.255.255.150.39480 &amp;gt; 10.255.255.200.ssh: Flags [P.], seq 1:22, ack 1, win 211, options [nop,nop,TS val 331469 ecr 324911], length 21&lt;/P&gt;&lt;P&gt;2018-02-15 16:01:28.246450 02:70:96:b0:44:80 &amp;gt; 02:af:87:e2:04:c6, ethertype IPv4 (0x0800), length 66: 10.255.255.200.ssh &amp;gt; 10.255.255.150.39480: Flags [.], ack 22, win 210, options [nop,nop,TS val 324912 ecr 331469], length 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The addition of the static routes could be either bootstrapped or included in AMIs, depending on your situation.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;To verify that the instances residing in different subnets will remain isolated in the absence of the static routes, those were removed and we can see that the SSH connection attempt is timing out:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;[ec2-user@ip-10-255-255-150 ~]$ route&lt;BR /&gt;Kernel IP routing table&lt;BR /&gt;Destination Gateway Genmask Flags Metric Ref Use Iface&lt;BR /&gt;default 10.255.255.129 0.0.0.0 UG 0 0 0 eth0&lt;BR /&gt;10.255.255.128 * 255.255.255.192 U 0 0 0 eth0&lt;BR /&gt;169.254.169.254 * 255.255.255.255 UH 0 0 0 eth0&lt;BR /&gt;[ec2-user@ip-10-255-255-150 ~]$ ssh ec2-user@10.255.255.200&lt;BR /&gt;ssh: connect to host 10.255.255.200 port 22: Connection timed out&lt;BR /&gt;[ec2-user@ip-10-255-255-150 ~]$&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;----&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;[ec2-user@ip-10-255-255-200 ~]$ route&lt;BR /&gt;Kernel IP routing table&lt;BR /&gt;Destination Gateway Genmask Flags Metric Ref Use Iface&lt;BR /&gt;default 10.255.255.193 0.0.0.0 UG 0 0 0 eth0&lt;BR /&gt;10.255.255.192 * 255.255.255.192 U 0 0 0 eth0&lt;BR /&gt;169.254.169.254 * 255.255.255.255 UH 0 0 0 eth0&lt;BR /&gt;[ec2-user@ip-10-255-255-200 ~]$ ssh ec2-user@10.255.255.150&lt;BR /&gt;ssh: connect to host 10.255.255.150 port 22: Connection timed out&lt;BR /&gt;[ec2-user@ip-10-255-255-200 ~]$&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;And reinstatement of the static routes results in:&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;/P&gt;&lt;P style="border: 0px;"&gt;[root@ip-10-255-255-150 ec2-user]# nano /etc/sysconfig/network-scripts/route-eth0&lt;BR /&gt;[root@ip-10-255-255-150 ec2-user]# reboot&lt;BR /&gt;[root@ip-10-255-255-150 ec2-user]#&lt;BR /&gt;Broadcast message from ec2-user@ip-10-255-255-150&lt;BR /&gt;(/dev/pts/0) at 16:54 ...&lt;/P&gt;&lt;P style="border: 0px;"&gt;The system is going down for reboot NOW!&lt;BR /&gt;Using username "ec2-user".&lt;BR /&gt;Authenticating with public key "imported-openssh-key"&lt;BR /&gt;Last login: Fri Feb 16 16:42:28 2018 from xx.xx.xxx.98&lt;/P&gt;&lt;P style="border: 0px;"&gt;__| __|_ )&lt;BR /&gt;_| ( / Amazon Linux AMI&lt;BR /&gt;___|\___|___|&lt;/P&gt;&lt;P style="border: 0px;"&gt;&lt;A href="https://aws.amazon.com/amazon-linux-ami/2017.09-release-notes/" rel="nofollow" style="color: #6d6e71; border: 0px; font-weight: inherit; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;https://aws.amazon.com/amazon-linux-ami/2017.09-release-notes/&lt;/A&gt;&lt;BR /&gt;[ec2-user@ip-10-255-255-150 ~]$ ssh ec2-user@10.255.255.200&lt;BR /&gt;Permission denied (publickey).&lt;BR /&gt;[ec2-user@ip-10-255-255-150 ~]$&lt;/P&gt;&lt;P style="border: 0px;"&gt;&lt;/P&gt;&lt;P style="border: 0px;"&gt;&lt;IMG __jive_id="63153" height="619" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63153_pastedImage_5.png" width="636" /&gt;&lt;/P&gt;&lt;P style="border: 0px;"&gt;&lt;/P&gt;&lt;P style="border: 0px;"&gt;and:&lt;/P&gt;&lt;P style="border: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;root@ip-10-255-255-200 ec2-user]# nano /etc/sysconfig/network-scripts/route-eth0&lt;BR /&gt;[root@ip-10-255-255-200 ec2-user]# reboot&lt;BR /&gt;[root@ip-10-255-255-200 ec2-user]#&lt;BR /&gt;Broadcast message from ec2-user@ip-10-255-255-200&lt;BR /&gt;(/dev/pts/0) at 16:55 ...&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;The system is going down for reboot NOW!&lt;BR /&gt;Using username "ec2-user".&lt;BR /&gt;Authenticating with public key "imported-openssh-key"&lt;BR /&gt;Last login: Fri Feb 16 16:42:10 2018 from xx.xx.xxx.98&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;__| __|_ )&lt;BR /&gt;_| ( / Amazon Linux AMI&lt;BR /&gt;___|\___|___|&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;A href="https://aws.amazon.com/amazon-linux-ami/2017.09-release-notes/" rel="nofollow" style="color: #e45785; border: 0px; font-weight: inherit; text-decoration: underline; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;https://aws.amazon.com/amazon-linux-ami/2017.09-release-notes/&lt;/A&gt;&lt;BR /&gt;[ec2-user@ip-10-255-255-200 ~]$ ssh ec2-user@10.255.255.150&lt;BR /&gt;Permission denied (publickey).&lt;BR /&gt;[ec2-user@ip-10-255-255-200 ~]$&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;IMG __jive_id="63154" height="605" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63154_pastedImage_6.png" width="643" /&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;STRONG&gt;This is the Gaia config for the vSEC used in this lab:&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="border: 0px;"&gt;vSEC01&amp;gt; show configuration&lt;BR /&gt;#&lt;BR /&gt;# Configuration of vSEC01&lt;BR /&gt;# Language version: 13.1v1&lt;BR /&gt;#&lt;BR /&gt;# Exported by admin on Thu Feb 15 13:47:33 2018&lt;BR /&gt;#&lt;BR /&gt;set installer policy check-for-updates-period 3&lt;BR /&gt;set installer policy periodically-self-update on&lt;BR /&gt;set installer policy send-cpuse-data off&lt;BR /&gt;set installer policy self-test install-policy off&lt;BR /&gt;set installer policy self-test network-link-up off&lt;BR /&gt;set installer policy self-test start-processes on&lt;BR /&gt;set arp table cache-size 4096&lt;BR /&gt;set arp table validity-timeout 60&lt;BR /&gt;set arp announce 2&lt;BR /&gt;set message banner on&lt;/P&gt;&lt;P style="border: 0px;"&gt;set message motd on&lt;/P&gt;&lt;P style="border: 0px;"&gt;set message caption off&lt;BR /&gt;set core-dump enable&lt;BR /&gt;set core-dump total 1000&lt;BR /&gt;set core-dump per_process 2&lt;BR /&gt;set clienv debug 0&lt;BR /&gt;set clienv echo-cmd off&lt;BR /&gt;set clienv output pretty&lt;BR /&gt;set clienv prompt "%M"&lt;BR /&gt;set clienv rows 24&lt;BR /&gt;set clienv syntax-check off&lt;BR /&gt;set dns primary 10.255.255.2&lt;BR /&gt;set dns secondary 8.8.8.8&lt;BR /&gt;set edition 64-bit&lt;BR /&gt;set expert-password-hash $blablabla&lt;BR /&gt;set format date dd-mmm-yyyy&lt;BR /&gt;set format time 24-hour&lt;BR /&gt;set format netmask Dotted&lt;BR /&gt;set hostname vSEC01&lt;BR /&gt;add allowed-client host any-host&lt;BR /&gt;set web table-refresh-rate 15&lt;BR /&gt;set web session-timeout 30&lt;BR /&gt;set web ssl-port 443&lt;BR /&gt;set web ssl3-enabled off&lt;BR /&gt;set web daemon-enable on&lt;BR /&gt;set inactivity-timeout 10&lt;BR /&gt;set ipv6-state off&lt;BR /&gt;add command api path /bin/api_wrap description "Start, stop, or check status of API server"&lt;BR /&gt;add command tecli path /bin/tecli_start description "Threat Emulation Blade shell"&lt;BR /&gt;set net-access telnet off&lt;BR /&gt;set ntp active on&lt;BR /&gt;set ntp server primary pool.ntp.org version 2&lt;BR /&gt;set user admin shell /bin/bash&lt;BR /&gt;set user admin password-hash $blablabla&lt;BR /&gt;set user monitor shell /etc/cli.sh&lt;BR /&gt;set user monitor password-hash *&lt;BR /&gt;set password-controls min-password-length 6&lt;BR /&gt;set password-controls complexity 2&lt;BR /&gt;set password-controls palindrome-check true&lt;BR /&gt;set password-controls history-checking true&lt;BR /&gt;set password-controls history-length 10&lt;BR /&gt;set password-controls password-expiration never&lt;BR /&gt;set password-controls expiration-warning-days 7&lt;BR /&gt;set password-controls expiration-lockout-days never&lt;BR /&gt;set password-controls force-change-when no&lt;BR /&gt;set password-controls deny-on-nonuse enable false&lt;BR /&gt;set password-controls deny-on-nonuse allowed-days 365&lt;BR /&gt;set password-controls deny-on-fail enable false&lt;BR /&gt;set password-controls deny-on-fail failures-allowed 10&lt;BR /&gt;set password-controls deny-on-fail allow-after 1200&lt;BR /&gt;set aaa tacacs-servers state off&lt;BR /&gt;set aaa radius-servers super-user-uid 96&lt;BR /&gt;set max-path-splits 8&lt;BR /&gt;set tracefile maxnum 10&lt;BR /&gt;set tracefile size 1&lt;BR /&gt;set syslog filename /var/log/messages&lt;BR /&gt;set syslog cplogs off&lt;BR /&gt;set syslog mgmtauditlogs on&lt;BR /&gt;set syslog auditlog permanent&lt;BR /&gt;set timezone America / New_York&lt;BR /&gt;set interface eth0 comments "vSEC01-Ext"&lt;BR /&gt;set interface eth0 link-speed 10G/full&lt;BR /&gt;set interface eth0 state on&lt;BR /&gt;set interface eth0 auto-negotiation on&lt;BR /&gt;set interface eth0 mtu 1500&lt;BR /&gt;set interface eth0 ipv4-address 10.255.255.22 mask-length 26&lt;BR /&gt;set interface eth1 comments "vSEC01-Int"&lt;BR /&gt;set interface eth1 link-speed 10G/full&lt;BR /&gt;set interface eth1 state on&lt;BR /&gt;set interface eth1 auto-negotiation on&lt;BR /&gt;set interface eth1 mtu 1500&lt;BR /&gt;set interface eth1 ipv4-address 10.255.255.201 mask-length 26&lt;BR /&gt;set interface eth2 comments "vSEC01-Proxy"&lt;BR /&gt;set interface eth2 link-speed 10G/full&lt;BR /&gt;set interface eth2 state on&lt;BR /&gt;set interface eth2 auto-negotiation on&lt;BR /&gt;set interface eth2 mtu 1500&lt;BR /&gt;set interface eth2 ipv4-address 10.255.255.140 mask-length 26&lt;BR /&gt;set interface lo state on&lt;BR /&gt;set interface lo ipv4-address 127.0.0.1 mask-length 8&lt;BR /&gt;add host name Simple01-LogicalServer-Web ipv4-address 10.255.255.23&lt;BR /&gt;set inbound-route-filter ospf2 accept-all-ipv4&lt;BR /&gt;set inbound-route-filter rip accept-all-ipv4&lt;BR /&gt;set management interface eth0&lt;BR /&gt;set ospf area backbone on&lt;BR /&gt;set rip update-interval default&lt;BR /&gt;set rip expire-interval default&lt;BR /&gt;set snmp mode default&lt;BR /&gt;set snmp agent off&lt;BR /&gt;set snmp agent-version v3-Only&lt;BR /&gt;set snmp traps trap authorizationError disable&lt;BR /&gt;set snmp traps trap biosFailure disable&lt;BR /&gt;set snmp traps trap coldStart disable&lt;BR /&gt;set snmp traps trap configurationChange disable&lt;BR /&gt;set snmp traps trap configurationSave disable&lt;BR /&gt;set snmp traps trap fanFailure disable&lt;BR /&gt;set snmp traps trap highVoltage disable&lt;BR /&gt;set snmp traps trap linkUpLinkDown disable&lt;BR /&gt;set snmp traps trap lowDiskSpace disable&lt;BR /&gt;set snmp traps trap lowVoltage disable&lt;BR /&gt;set snmp traps trap overTemperature disable&lt;BR /&gt;set snmp traps trap powerSupplyFailure disable&lt;BR /&gt;set snmp traps trap raidVolumeState disable&lt;BR /&gt;set snmp traps trap vrrpv2AuthFailure disable&lt;BR /&gt;set snmp traps trap vrrpv2NewMaster disable&lt;BR /&gt;set snmp traps trap vrrpv3NewMaster disable&lt;BR /&gt;set snmp traps trap vrrpv3ProtoError disable&lt;BR /&gt;set static-route default comment "To Subnet Router"&lt;BR /&gt;set static-route default nexthop gateway address 10.255.255.1 on&lt;BR /&gt;set static-route 10.100.100.0/24 comment "To Subnet Router for Peered VPC CIDR"&lt;BR /&gt;set static-route 10.100.100.0/24 nexthop gateway address 10.255.255.193 on&lt;BR /&gt;set static-route 10.255.255.128/26 comment "To Subnet Router"&lt;BR /&gt;set static-route 10.255.255.128/26 nexthop gateway address 10.255.255.129 on&lt;BR /&gt;set static-route 10.255.255.192/26 comment "To Subnet Router"&lt;BR /&gt;set static-route 10.255.255.192/26 nexthop gateway address 10.255.255.193 on&lt;BR /&gt;vSEC01&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Enjoy&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Feb 2018 17:46:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39214#M3759</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-15T17:46:56Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39215#M3760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's interesting and very nicely demonstrated and if I am asked to do this, I'll now have a way to achieve it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Having said that,&amp;nbsp;some chaps and I are&amp;nbsp;working on the design for an AWS infrastructure with a various 'zones' and Check Point firewalls to provide protection (mainly DLP) between the zones. This is being designed from the ground up with security in mind; security by design as some would call it. We have made the decision that we will have a firewall between the various VPCs while maintaining multiple subnets within a single VPC. In this way, the problem that you have solved will not exist.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I liken&amp;nbsp;the&amp;nbsp;AWS environment to the traditional network model (understanding that there are important and major differences) I see the multiple subnets in a VPC a bit like the multiple VLANs on a network which are routed within layer 3 switches (usually the core) and then the inter-VPC communications to be much like those VLANs which are tagged to the Check Point(s)' multi VLAN (trunked) ports for firewalling and routing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Of course, if inheriting an infrastructure that is already in place and having to firewall between subnets in a VPC then your solution is exactly what we'll need - thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wonder if anyone else has an opinion about which approach they might take when designing this from the ground up?&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Feb 2018 21:09:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39215#M3760</guid>
      <dc:creator>John_Fenoughty</dc:creator>
      <dc:date>2018-02-15T21:09:14Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39216#M3761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you John.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do prefer separation in VPCs and some of the scenarios are described here:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-2301"&gt;vSEC deployment scenarios in AWS&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's just in this case, I was presented by the client with the question of "how would you deal with this unsolvable problem", that AWS professional services were not able to find a solution to.&lt;/P&gt;&lt;P&gt;I tend to take umbrage at the notion of unsolvable problems, hence this post &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Feb 2018 23:08:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39216#M3761</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-15T23:08:38Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39217#M3762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is nothing preventing someone from changing the routes on a given instance to bypass the firewall entirely.&lt;/P&gt;&lt;P&gt;In other words, the segmentation is merely logical, not physical as it would be in a more traditional network.&lt;/P&gt;&lt;P&gt;So, while technically you can do this, it's not necessarily secure.&lt;/P&gt;&lt;P&gt;It's also something that's not likely to work with auto-provisioned instances since they are usually deployed with DHCP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps with a layer of NAT and Network ACLs, you could theoretically set it up so the traffic from one instance can't reach another without going through the firewall.&lt;/P&gt;&lt;P&gt;However, that adds complexity.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In Azure, you can force this sort of segmentation with User-Defined Routes.&lt;/P&gt;&lt;P&gt;Individual instances cannot override them as the routes are basically forced at the network layer.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 04:12:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39217#M3762</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-02-16T04:12:45Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39218#M3763</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should be able to prevent the bypass by using security groups, specifying that only communication between one that the vSEC belongs to and the ones containing instances is permitted.&lt;/P&gt;&lt;P&gt;Even in autoscaling DHCP scenarios, you can still bootstrap the static route allocation to the launch group making enforcement of the routing mandatory.&lt;/P&gt;&lt;P&gt;The challenge, as it was posited to me, was to make it work explicitly without NAT and I was told it was impossible and asked for best possible alternative of securing instances by means of host-based solutions or any other suitable means.&lt;/P&gt;&lt;P&gt;After making this happen, I've done some searches on this subject, but either my queries were poorly formed, or this is the only way it could presently be accomplished in AWS.&lt;/P&gt;&lt;P&gt;Can you verify this, before I start puffing-up and tooting my own, (and by extension, check points') horn?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 04:49:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39218#M3763</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-16T04:49:30Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39219#M3764</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;When we were looking at this years ago, it was not possible to force the traffic flow the way you describe with security groups.&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"&gt;Perhaps this has changed since then, which would be fantastic news for a lot of people.&lt;/SPAN&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P class=""&gt;I'll have to look at this again.&lt;/P&gt;&lt;P class=""&gt;&lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 07:18:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39219#M3764</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-02-16T07:18:38Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39220#M3765</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, unless I am missing something, it looks as it does as advertised.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this Security group assigned to both hosts in my demo, the 10.255.255.150 and 10.255.255.200:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="63135" class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63135_pastedImage_4.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where sg-e2264391 is the:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="63134" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63134_pastedImage_3.png" style="width: 1156px; height: 233px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[ec2-user@ip-10-255-255-150 ~]$ date; ssh 10.255.255.200&lt;BR /&gt;Fri Feb 16 13:29:42 UTC 2018&lt;BR /&gt;Permission denied (publickey).&lt;BR /&gt;&lt;SPAN&gt;[ec2-user@ip-10-255-255-150 ~]$ curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://169.254.169.254/latest/meta-data/security-groups" rel="nofollow"&gt;http://169.254.169.254/latest/meta-data/security-groups&lt;/A&gt;&lt;BR /&gt;&lt;SPAN style="color: #339966;"&gt;TempSG1&lt;/SPAN&gt;[ec2-user@ip-10-255-255-150 ~]$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="63137" class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63137_pastedImage_4.png" style="width: 749px; height: 791px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[ec2-user@ip-10-255-255-200 ~]$ date; ssh 10.255.255.150&lt;BR /&gt;Fri Feb 16 13:30:04 UTC 2018&lt;BR /&gt;Permission denied (publickey).&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[ec2-user@ip-10-255-255-200 ~]$ curl &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://169.254.169.254/latest/meta-data/security-groups" rel="nofollow"&gt;http://169.254.169.254/latest/meta-data/security-groups&lt;/A&gt;&lt;BR /&gt;&lt;SPAN style="color: #339966;"&gt;TempSG1&lt;/SPAN&gt;[ec2-user@ip-10-255-255-200 ~]$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="63138" class="image-5 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63138_pastedImage_5.png" style="width: 745px; height: 715px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hmm... &lt;STRONG&gt;Toot!!!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S. Corrected diagram:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Inter-Network Firewall for AWS VPC" class="image-6 jive-image" src="/legacyfs/online/checkpoint/63142_Check Point And AWS Scenarios for CheckMates v01d.png" style="width: 1324px; height: 925px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 13:35:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39220#M3765</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-16T13:35:19Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39221#M3766</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you revert the routing on the instances back to what AWS does by default, what happens?&lt;/P&gt;&lt;P&gt;If this is working "securely" the traffic would not be permitted (i.e. the security groups in AWS should block it).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 16:22:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39221#M3766</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-02-16T16:22:18Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39222#M3767</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;About to try it.&lt;/P&gt;&lt;P&gt;If my logic is not faulty, and if I am still thinking straight, shouldn't it be dropped unless specifically permitted in SGs attached to the instances?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 16:30:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39222#M3767</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-16T16:30:10Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39223#M3768</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;Toot!, Toot! and one more Toot! for a good measure:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[ec2-user@ip-10-255-255-150 ~]$ route&lt;BR /&gt;Kernel IP routing table&lt;BR /&gt;Destination Gateway Genmask Flags Metric Ref Use Iface&lt;BR /&gt;default 10.255.255.129 0.0.0.0 UG 0 0 0 eth0&lt;BR /&gt;10.255.255.128 * 255.255.255.192 U 0 0 0 eth0&lt;BR /&gt;169.254.169.254 * 255.255.255.255 UH 0 0 0 eth0&lt;BR /&gt;[ec2-user@ip-10-255-255-150 ~]$ ssh ec2-user@10.255.255.200&lt;BR /&gt;ssh: connect to host 10.255.255.200 port 22: Connection timed out&lt;BR /&gt;[ec2-user@ip-10-255-255-150 ~]$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;[ec2-user@ip-10-255-255-200 ~]$ route&lt;BR /&gt;Kernel IP routing table&lt;BR /&gt;Destination Gateway Genmask Flags Metric Ref Use Iface&lt;BR /&gt;default 10.255.255.193 0.0.0.0 UG 0 0 0 eth0&lt;BR /&gt;10.255.255.192 * 255.255.255.192 U 0 0 0 eth0&lt;BR /&gt;169.254.169.254 * 255.255.255.255 UH 0 0 0 eth0&lt;BR /&gt;[ec2-user@ip-10-255-255-200 ~]$ ssh ec2-user@10.255.255.150&lt;BR /&gt;ssh: connect to host 10.255.255.150 port 22: Connection timed out&lt;BR /&gt;[ec2-user@ip-10-255-255-200 ~]$&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 16:47:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39223#M3768</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-16T16:47:13Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39224#M3769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And with static routes reinstated:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[root@ip-10-255-255-150 ec2-user]# nano /etc/sysconfig/network-scripts/route-eth0&lt;BR /&gt;[root@ip-10-255-255-150 ec2-user]# reboot&lt;BR /&gt;[root@ip-10-255-255-150 ec2-user]#&lt;BR /&gt;Broadcast message from ec2-user@ip-10-255-255-150&lt;BR /&gt; (/dev/pts/0) at 16:54 ...&lt;/P&gt;&lt;P&gt;The system is going down for reboot NOW!&lt;BR /&gt;Using username "ec2-user".&lt;BR /&gt;Authenticating with public key "imported-openssh-key"&lt;BR /&gt;Last login: Fri Feb 16 16:42:28 2018 from xx.xx.xxx.98&lt;/P&gt;&lt;P&gt;__| __|_ )&lt;BR /&gt; _| ( / Amazon Linux AMI&lt;BR /&gt; ___|\___|___|&lt;/P&gt;&lt;P&gt;&lt;A href="https://aws.amazon.com/amazon-linux-ami/2017.09-release-notes/"&gt;https://aws.amazon.com/amazon-linux-ami/2017.09-release-notes/&lt;/A&gt;&lt;BR /&gt;[ec2-user@ip-10-255-255-150 ~]$ ssh ec2-user@10.255.255.200&lt;BR /&gt;Permission denied (publickey).&lt;BR /&gt;[ec2-user@ip-10-255-255-150 ~]$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63144_pastedImage_5.png" style="width: 620px; height: 604px;" /&gt;&lt;/P&gt;&lt;P&gt;-----&lt;/P&gt;&lt;P&gt;[root@ip-10-255-255-200 ec2-user]# nano /etc/sysconfig/network-scripts/route-eth0&lt;BR /&gt;[root@ip-10-255-255-200 ec2-user]# reboot&lt;BR /&gt;[root@ip-10-255-255-200 ec2-user]#&lt;BR /&gt;Broadcast message from ec2-user@ip-10-255-255-200&lt;BR /&gt; (/dev/pts/0) at 16:55 ...&lt;/P&gt;&lt;P&gt;The system is going down for reboot NOW!&lt;BR /&gt;Using username "ec2-user".&lt;BR /&gt;Authenticating with public key "imported-openssh-key"&lt;BR /&gt;Last login: Fri Feb 16 16:42:10 2018 from xx.xx.xxx.98&lt;/P&gt;&lt;P&gt;__| __|_ )&lt;BR /&gt; _| ( / Amazon Linux AMI&lt;BR /&gt; ___|\___|___|&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://aws.amazon.com/amazon-linux-ami/2017.09-release-notes/" rel="nofollow"&gt;https://aws.amazon.com/amazon-linux-ami/2017.09-release-notes/&lt;/A&gt;&lt;BR /&gt;[ec2-user@ip-10-255-255-200 ~]$ ssh ec2-user@10.255.255.150&lt;BR /&gt;Permission denied (publickey).&lt;BR /&gt;[ec2-user@ip-10-255-255-200 ~]$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63145_pastedImage_6.png" style="width: 620px; height: 584px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 17:01:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39224#M3769</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-16T17:01:51Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39225#M3770</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That does look promising &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 17:02:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39225#M3770</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-02-16T17:02:15Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39226#M3771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you want me to re-work the document into a more presentable form?&lt;/P&gt;&lt;P&gt;If so, what name would you suggest for it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 17:05:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39226#M3771</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-16T17:05:55Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39227#M3772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It probably wouldn't hurt &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;The existing name is ok.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 18:06:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39227#M3772</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-02-16T18:06:54Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39228#M3773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;While you get points for extreme cleverness, I will add a couple of caveats to this approach beyond what was already discussed:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Not sure this will work with a clustered gateway unless you also include scripts to monitor the "next hop" and adjust in case a cluster member fails. This is because, unlike traditional physical clusters, there is no cluster IP address with clusters in AWS (due to limitations in AWS).&lt;/LI&gt;&lt;LI&gt;It does require NICs in the relevant subnets (which kinda goes against the SDN philosophy and may also limit you to certain, larger, instance sizes).&lt;/LI&gt;&lt;/UL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 24 Feb 2018 00:34:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39228#M3773</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-02-24T00:34:33Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39229#M3774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am setting this environment up right now. Does the host need to have public temp IP? I am assuming no, correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Mar 2018 17:48:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39229#M3774</guid>
      <dc:creator>Calvin_Nguyen</dc:creator>
      <dc:date>2018-03-06T17:48:27Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39230#M3775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are talking about EC2 instances, they do not have to have public IPs.&lt;/P&gt;&lt;P&gt;The reason for those in my lab was to gain the remote access to them bypassing vSEC for simplicity and to avoid a lockout should I bork something in the policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Mar 2018 17:52:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39230#M3775</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-03-06T17:52:53Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39231#M3776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Got it. What is the purpose of the 169.254.169.254 address in the route table?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Mar 2018 19:38:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39231#M3776</guid>
      <dc:creator>Calvin_Nguyen</dc:creator>
      <dc:date>2018-03-06T19:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39232#M3777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's the AWS' metadata lookup IP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Mar 2018 19:43:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39232#M3777</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-03-06T19:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of Inter-Subnet traffic in AWS VPC using CloudGuard</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39233#M3778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the big issue that i would have is that the routing is now back in the hands of the sysadmin... if they modify the routing they could bypass the gw no?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Mar 2018 20:32:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Inspection-of-Inter-Subnet-traffic-in-AWS-VPC-using-CloudGuard/m-p/39233#M3778</guid>
      <dc:creator>Hugh_McGauran</dc:creator>
      <dc:date>2018-03-06T20:32:50Z</dc:date>
    </item>
  </channel>
</rss>

