<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Stealth Rule In Azure VSec Policy in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Stealth-Rule-In-Azure-VSec-Policy/m-p/7425#M3991</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Dameon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had had a look at these articles prior to posting here, but didn't find a satisfactory answer. Correct me if I'm wrong, but it seems to me that to allow HTTPS traffic to a web app protected by the firewall you need to do the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Publish a public IP in Azure (say 52.51.50.49) which accepts traffic on port 443&lt;/LI&gt;&lt;LI&gt;Setup a UDR which forwards traffic received at 52.51.50.49 on port 443 to the external IP of the CP Instance (say 10.50.1.10) on a different port say 8081&lt;/LI&gt;&lt;LI&gt;On the CP Instance you must then have a rule that allows any traffic to 10.50.1.10 on port 8081&lt;/LI&gt;&lt;LI&gt;Then have a NAT rule which translates the packet to HTTPS&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I correct with the above steps?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so, is it safe to have an "any" rule like this to the external IP of your gateway?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 13 Oct 2017 07:36:22 GMT</pubDate>
    <dc:creator>John_Colfer</dc:creator>
    <dc:date>2017-10-13T07:36:22Z</dc:date>
    <item>
      <title>Stealth Rule In Azure VSec Policy</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Stealth-Rule-In-Azure-VSec-Policy/m-p/7423#M3989</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gang&lt;/P&gt;&lt;P&gt;I deployed an Azure Vsec Cluster and followed the SKs etc and it's and running fine. I'm starting to build out the policy and have run up against a problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Normally I would have the stealth rule as the 2nd or third rule, but when I try to allow nated traffic through to resources on the inside, it is getting dropped by the stealth rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;For Example:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Number: 2774078&lt;BR /&gt;Date: 12Oct2017&lt;BR /&gt;Time: 13:10:55&lt;BR /&gt;Interface: eth0&lt;BR /&gt;Origin: 52.169.50.242&lt;BR /&gt;Type: Log&lt;BR /&gt;Action: Drop&lt;BR /&gt;Service: TCP-8088 (8088)&lt;BR /&gt;Source Port: 54326&lt;BR /&gt;Source: ext_host_95.44.141.143 (95.44.141.143)&lt;BR /&gt;Destination: azure-external-int-fw1 (10.10.50.10)&lt;BR /&gt;Protocol: tcp&lt;BR /&gt;Rule: 3&lt;BR /&gt;Rule UID: {4DC1865D-5CF9-4D2A-8B84-7CF435A7BAAE}&lt;BR /&gt;Rule Name: Stealth&lt;BR /&gt;Current Rule Number: 4-wr-dub-azure1-pol&lt;BR /&gt;Information: inzone: External&lt;BR /&gt; outzone: External&lt;BR /&gt;Product: Security Gateway/Management&lt;BR /&gt;Product Family: Network&lt;BR /&gt;Policy Info: Policy Name: wr-dub-azure1-pol&lt;BR /&gt; Created at: Tue Oct 10 10:43:16 2017&lt;BR /&gt; Installed from: irb-dub-mgmt1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I need to put the rule which allows this traffic above the Stealth Rule?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will this mean, that when I publish an App for the internet will I have an any rule above the Stealth Rule?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had a look for best practices regarding building out policies in Azure, but could find very little.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could somebody please inform me of the best way to build out a fw policy in CP Azure cluster.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Oct 2017 13:04:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Stealth-Rule-In-Azure-VSec-Policy/m-p/7423#M3989</guid>
      <dc:creator>John_Colfer</dc:creator>
      <dc:date>2017-10-12T13:04:23Z</dc:date>
    </item>
    <item>
      <title>Re: Stealth Rule In Azure VSec Policy</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Stealth-Rule-In-Azure-VSec-Policy/m-p/7424#M3990</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you're protecting public websites in Azure, traffic isn't being routed through the vSEC gateway, but is being "proxied" in a way.&lt;/P&gt;&lt;P&gt;This means traffic must terminate on the vSEC instance--traffic a regular stealth rule will block.&lt;/P&gt;&lt;P&gt;You have to account for this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general, you might want to look at the reference architecture articles linked here: &lt;A href="https://community.checkpoint.com/message/6026-reference-architecture-for-vsec-public-cloud?sr=search&amp;amp;searchId=fb7ed289-2812-4a76-86b7-54113d75d9fc&amp;amp;searchIndex=1" target="_blank"&gt;https://community.checkpoint.com/message/6026-reference-architecture-for-vsec-public-cloud?sr=search&amp;amp;searchId=fb7ed289-2812-4a76-86b7-54113d75d9fc&amp;amp;searchIndex=1&lt;/A&gt;‌&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jun 2019 08:58:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Stealth-Rule-In-Azure-VSec-Policy/m-p/7424#M3990</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-21T08:58:48Z</dc:date>
    </item>
    <item>
      <title>Re: Stealth Rule In Azure VSec Policy</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Stealth-Rule-In-Azure-VSec-Policy/m-p/7425#M3991</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Dameon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had had a look at these articles prior to posting here, but didn't find a satisfactory answer. Correct me if I'm wrong, but it seems to me that to allow HTTPS traffic to a web app protected by the firewall you need to do the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Publish a public IP in Azure (say 52.51.50.49) which accepts traffic on port 443&lt;/LI&gt;&lt;LI&gt;Setup a UDR which forwards traffic received at 52.51.50.49 on port 443 to the external IP of the CP Instance (say 10.50.1.10) on a different port say 8081&lt;/LI&gt;&lt;LI&gt;On the CP Instance you must then have a rule that allows any traffic to 10.50.1.10 on port 8081&lt;/LI&gt;&lt;LI&gt;Then have a NAT rule which translates the packet to HTTPS&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I correct with the above steps?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so, is it safe to have an "any" rule like this to the external IP of your gateway?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Oct 2017 07:36:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Stealth-Rule-In-Azure-VSec-Policy/m-p/7425#M3991</guid>
      <dc:creator>John_Colfer</dc:creator>
      <dc:date>2017-10-13T07:36:22Z</dc:date>
    </item>
    <item>
      <title>Re: Stealth Rule In Azure VSec Policy</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Stealth-Rule-In-Azure-VSec-Policy/m-p/7426#M3992</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That all&amp;nbsp;looks correct.&lt;/P&gt;&lt;P&gt;"Any" is fine in this case.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Oct 2017 17:04:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Stealth-Rule-In-Azure-VSec-Policy/m-p/7426#M3992</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-10-13T17:04:15Z</dc:date>
    </item>
  </channel>
</rss>

