<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What is up with Disabling Source/Destination check for vSEC in AWS? in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/What-is-up-with-Disabling-Source-Destination-check-for-vSEC-in/m-p/7141#M3973</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Regarding the &lt;A href="http://downloads.checkpoint.com/dc/download.htm?ID=45816"&gt;vSEC Gateway for Amazon Web Services - Getting Started Guide&lt;/A&gt;, this is required to let your Security Gateway route the traffic of your private subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Page 12:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Routing Traffic through the Security Gateway&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;To let the Security Gateway route the traffic of your private subnets, make this change.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;To route traffic through the Security Gateway:&lt;BR /&gt;1. Open the AWS Management Console.&lt;BR /&gt;2. Select Services &amp;gt; EC2 &amp;gt; Instances. &lt;BR /&gt;3. Right-click the vSEC Gateway instance.&lt;BR /&gt;4. Select Networking &amp;gt; Change Source/Destination Check. &lt;BR /&gt;5. Click Yes/Disable.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 04 Oct 2017 18:34:04 GMT</pubDate>
    <dc:creator>Danny</dc:creator>
    <dc:date>2017-10-04T18:34:04Z</dc:date>
    <item>
      <title>What is up with Disabling Source/Destination check for vSEC in AWS?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/What-is-up-with-Disabling-Source-Destination-check-for-vSEC-in/m-p/7140#M3972</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I somewhat understand its necessity in case of the single interface vSEC deployment, but if we are using multiple interfaces, what is the reason for nuking the Source/Destination checks?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Oct 2017 17:46:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/What-is-up-with-Disabling-Source-Destination-check-for-vSEC-in/m-p/7140#M3972</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-10-04T17:46:37Z</dc:date>
    </item>
    <item>
      <title>Re: What is up with Disabling Source/Destination check for vSEC in AWS?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/What-is-up-with-Disabling-Source-Destination-check-for-vSEC-in/m-p/7141#M3973</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Regarding the &lt;A href="http://downloads.checkpoint.com/dc/download.htm?ID=45816"&gt;vSEC Gateway for Amazon Web Services - Getting Started Guide&lt;/A&gt;, this is required to let your Security Gateway route the traffic of your private subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Page 12:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Routing Traffic through the Security Gateway&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;To let the Security Gateway route the traffic of your private subnets, make this change.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;To route traffic through the Security Gateway:&lt;BR /&gt;1. Open the AWS Management Console.&lt;BR /&gt;2. Select Services &amp;gt; EC2 &amp;gt; Instances. &lt;BR /&gt;3. Right-click the vSEC Gateway instance.&lt;BR /&gt;4. Select Networking &amp;gt; Change Source/Destination Check. &lt;BR /&gt;5. Click Yes/Disable.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Oct 2017 18:34:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/What-is-up-with-Disabling-Source-Destination-check-for-vSEC-in/m-p/7141#M3973</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2017-10-04T18:34:04Z</dc:date>
    </item>
    <item>
      <title>Re: What is up with Disabling Source/Destination check for vSEC in AWS?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/What-is-up-with-Disabling-Source-Destination-check-for-vSEC-in/m-p/7142#M3974</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Danny,&lt;/P&gt;&lt;P&gt;I know how to make this work, I am trying to figure out why it is necessary when vSEC is deployed with interfaces corresponding to each subnet in your CIDR.&lt;/P&gt;&lt;P&gt;Since AWS Route tables list your CIDR routing as "Local", it stands to reason that the VPCs router will get the traffic to any interface of vSEC in any subnet of that CIDR.&lt;/P&gt;&lt;P&gt;So what does the Source/Destination check Disabled is actually helping us achieve?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Oct 2017 18:43:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/What-is-up-with-Disabling-Source-Destination-check-for-vSEC-in/m-p/7142#M3974</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-10-04T18:43:13Z</dc:date>
    </item>
    <item>
      <title>Re: What is up with Disabling Source/Destination check for vSEC in AWS?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/What-is-up-with-Disabling-Source-Destination-check-for-vSEC-in/m-p/7143#M3975</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not a vSec expert but according to&amp;nbsp;&lt;A class="link-titled" href="http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_NAT_Instance.html" title="http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_NAT_Instance.html"&gt;NAT Instances - Amazon Virtual Private Cloud&lt;/A&gt;, if we look at Source/Destination Checks, it describes it as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #444444; background-color: #ffffff;"&gt;"Each EC2 instance performs source/destination checks by default. This means that the instance must be the source or destination of any traffic it sends or receives. However, a NAT instance must be able to send and receive traffic when the source or destination is not itself. Therefore, you must disable source/destination checks on the NAT instance."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #444444; background-color: #ffffff;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #444444; background-color: #ffffff;"&gt;Since we want to route the traffic through the vSec gateway, it would not be the source/destination of the traffic, therefore it needs to be disabled.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Oct 2017 21:37:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/What-is-up-with-Disabling-Source-Destination-check-for-vSEC-in/m-p/7143#M3975</guid>
      <dc:creator>Albin_Hakansson</dc:creator>
      <dc:date>2017-10-04T21:37:26Z</dc:date>
    </item>
    <item>
      <title>Re: What is up with Disabling Source/Destination check for vSEC in AWS?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/What-is-up-with-Disabling-Source-Destination-check-for-vSEC-in/m-p/7144#M3976</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you. It's been a while since I've played with AWS so definitely nice to refresh the fundamentals.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Oct 2017 23:05:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/What-is-up-with-Disabling-Source-Destination-check-for-vSEC-in/m-p/7144#M3976</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-10-04T23:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: What is up with Disabling Source/Destination check for vSEC in AWS?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/What-is-up-with-Disabling-Source-Destination-check-for-vSEC-in/m-p/7145#M3977</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The way I describe it is an Anti-Spoofing check for the instance itself.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Oct 2017 18:47:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/What-is-up-with-Disabling-Source-Destination-check-for-vSEC-in/m-p/7145#M3977</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-10-05T18:47:11Z</dc:date>
    </item>
    <item>
      <title>Re: What is up with Disabling Source/Destination check for vSEC in AWS?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/What-is-up-with-Disabling-Source-Destination-check-for-vSEC-in/m-p/7146#M3978</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice. Is there any situation where it may not be recommended to apply this setting on one of the vSEC interfaces?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vlad@eversecgroup.com&lt;/P&gt;&lt;P&gt;+1.973.558.2738&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Oct 2017 19:11:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/What-is-up-with-Disabling-Source-Destination-check-for-vSEC-in/m-p/7146#M3978</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-10-05T19:11:56Z</dc:date>
    </item>
  </channel>
</rss>

