<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: X-Forwarded Headers for Logical Server in vSEC for AWS in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/X-Forwarded-Headers-for-Logical-Server-in-vSEC-for-AWS/m-p/7119#M3965</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have the same question.&lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/grin.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 18 Jan 2019 07:40:41 GMT</pubDate>
    <dc:creator>Haichao_Xie</dc:creator>
    <dc:date>2019-01-18T07:40:41Z</dc:date>
    <item>
      <title>X-Forwarded Headers for Logical Server in vSEC for AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/X-Forwarded-Headers-for-Logical-Server-in-vSEC-for-AWS/m-p/7118#M3964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am interested to know if there is a way to enable vSEC to apply the&amp;nbsp;X-Forwarded Headers to traffic destined for Logical Server objects and, subsequently, to ELB, so that the target servers could identify the origin IP of the client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise, servers identify ELBs as origins for all sessions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Vladimir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Oct 2017 16:26:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/X-Forwarded-Headers-for-Logical-Server-in-vSEC-for-AWS/m-p/7118#M3964</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-10-04T16:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: X-Forwarded Headers for Logical Server in vSEC for AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/X-Forwarded-Headers-for-Logical-Server-in-vSEC-for-AWS/m-p/7119#M3965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have the same question.&lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/grin.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2019 07:40:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/X-Forwarded-Headers-for-Logical-Server-in-vSEC-for-AWS/m-p/7119#M3965</guid>
      <dc:creator>Haichao_Xie</dc:creator>
      <dc:date>2019-01-18T07:40:41Z</dc:date>
    </item>
    <item>
      <title>Re: X-Forwarded Headers for Logical Server in vSEC for AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/X-Forwarded-Headers-for-Logical-Server-in-vSEC-for-AWS/m-p/7120#M3966</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is discussed in this SK:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112575" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112575"&gt;CloudGuard Auto Scaling for AWS&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;The connections arriving at the Security Gateways have a source IP address belonging to the proxy ELB rather than the web client.&lt;/SPAN&gt;&lt;BR style="color: #000000; background-color: #ffffff; font-size: 14px;" /&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Because the ELB is acting as a TCP proxy and not as an HTTP proxy, no "X-Forwarded-For" HTTP header is present to identify and log the original client.&lt;/SPAN&gt;&lt;BR style="color: #000000; background-color: #ffffff; font-size: 14px;" /&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Instead, the ELB is set up by the CloudFormation Template to add a Proxy Protocol header.&lt;/SPAN&gt;&lt;BR style="color: #000000; background-color: #ffffff; font-size: 14px;" /&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;This allows the Security Gateways to log the original client address.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My guess is if you set up the ELB correctly, it should add the appropriate header (thus we can use it).&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2019 22:39:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/X-Forwarded-Headers-for-Logical-Server-in-vSEC-for-AWS/m-p/7120#M3966</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-01-18T22:39:02Z</dc:date>
    </item>
    <item>
      <title>Re: X-Forwarded Headers for Logical Server in vSEC for AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/X-Forwarded-Headers-for-Logical-Server-in-vSEC-for-AWS/m-p/7121#M3967</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What I am reading in the section you are quoting is that there is a way to set it up, but it is alluding to a CloudFormation template.&lt;/P&gt;&lt;P&gt;Is there a breakdown of the configuration used by said template that will allow us to replicate same in the ELBs or a template for the ELB on its own with the proxy protocol header function added?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2019 23:18:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/X-Forwarded-Headers-for-Logical-Server-in-vSEC-for-AWS/m-p/7121#M3967</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-01-18T23:18:28Z</dc:date>
    </item>
    <item>
      <title>Re: X-Forwarded Headers for Logical Server in vSEC for AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/X-Forwarded-Headers-for-Logical-Server-in-vSEC-for-AWS/m-p/7122#M3968</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When in doubt, &lt;A href="https://s3.amazonaws.com/CloudFormationTemplate/autoscale.json"&gt;read the CloudFormation Script&lt;/A&gt;, which is just JSON.&lt;/P&gt;&lt;P&gt;Guessing this is the relevant bit:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;/P&gt;"Policies": [&lt;BR /&gt; {&lt;BR /&gt; "PolicyName": "EnableProxyProtocol",&lt;BR /&gt; "PolicyType": "ProxyProtocolPolicyType",&lt;BR /&gt; "Attributes": [&lt;BR /&gt; {&lt;BR /&gt; "Name": "ProxyProtocol",&lt;BR /&gt; "Value": "true"&lt;BR /&gt; }&lt;BR /&gt; ],&lt;BR /&gt; "InstancePorts": [&lt;BR /&gt; {&lt;BR /&gt; "Ref": "ELBPort"&lt;BR /&gt; }&lt;BR /&gt; ]&lt;BR /&gt; }&lt;BR /&gt; ],&lt;/BLOCKQUOTE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2019 23:27:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/X-Forwarded-Headers-for-Logical-Server-in-vSEC-for-AWS/m-p/7122#M3968</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-01-18T23:27:36Z</dc:date>
    </item>
    <item>
      <title>Re: X-Forwarded Headers for Logical Server in vSEC for AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/X-Forwarded-Headers-for-Logical-Server-in-vSEC-for-AWS/m-p/7123#M3969</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Got to try it some times soon.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jan 2019 14:31:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/X-Forwarded-Headers-for-Logical-Server-in-vSEC-for-AWS/m-p/7123#M3969</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-01-19T14:31:04Z</dc:date>
    </item>
    <item>
      <title>Re: X-Forwarded Headers for Logical Server in vSEC for AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/X-Forwarded-Headers-for-Logical-Server-in-vSEC-for-AWS/m-p/56980#M3971</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;XFF support is currently in the pipeline - my best guess is that it will probably be added in a future R80.30 JHF or possibly in R80.40.&lt;/P&gt;
&lt;P&gt;Not sure exactly when, but it's coming.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Yonatan&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jun 2019 18:25:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/X-Forwarded-Headers-for-Logical-Server-in-vSEC-for-AWS/m-p/56980#M3971</guid>
      <dc:creator>Yonatan_Philip</dc:creator>
      <dc:date>2019-06-28T18:25:02Z</dc:date>
    </item>
  </channel>
</rss>

