<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Unexpected new behavior of the AWS vSEC in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Unexpected-new-behavior-of-the-AWS-vSEC/m-p/7735#M4008</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not sure if anyone have seen this, but building AWS vSEC cluster today, I am seeing this:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="EIP assigned as an Alias to the external interface of the AWS vSEC" class="image-1 jive-image j-img-original" src="/legacyfs/online/checkpoint/60190_2017-10-19 15_01_30-Gaia - Opera.png" style="width: 620px; height: 312px;" /&gt;&lt;/P&gt;&lt;P&gt;Nope, it was not defined manually.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additionally, when failing over from active to standby members, secondary IPs are no longer moving to the new active member:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60194_pastedImage_2.png" style="width: 620px; height: 704px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5 minutes later:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60195_pastedImage_3.png" style="width: 620px; height: 115px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It may be a coincident, but the Check Point SE working on one of my previous cases (&lt;A href="https://community.checkpoint.com/thread/5748"&gt;Inconsistent behavior of vSEC in AWS &lt;/A&gt;&amp;nbsp;) was able to repeatedly reproduce the issue last week. but can no longer do so today.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If someone can get an update from CP about any changes that may have transpired in the past week, please let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Vladimir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 19 Oct 2017 21:41:18 GMT</pubDate>
    <dc:creator>Vladimir</dc:creator>
    <dc:date>2017-10-19T21:41:18Z</dc:date>
    <item>
      <title>Unexpected new behavior of the AWS vSEC</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Unexpected-new-behavior-of-the-AWS-vSEC/m-p/7735#M4008</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not sure if anyone have seen this, but building AWS vSEC cluster today, I am seeing this:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="EIP assigned as an Alias to the external interface of the AWS vSEC" class="image-1 jive-image j-img-original" src="/legacyfs/online/checkpoint/60190_2017-10-19 15_01_30-Gaia - Opera.png" style="width: 620px; height: 312px;" /&gt;&lt;/P&gt;&lt;P&gt;Nope, it was not defined manually.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additionally, when failing over from active to standby members, secondary IPs are no longer moving to the new active member:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60194_pastedImage_2.png" style="width: 620px; height: 704px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5 minutes later:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60195_pastedImage_3.png" style="width: 620px; height: 115px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It may be a coincident, but the Check Point SE working on one of my previous cases (&lt;A href="https://community.checkpoint.com/thread/5748"&gt;Inconsistent behavior of vSEC in AWS &lt;/A&gt;&amp;nbsp;) was able to repeatedly reproduce the issue last week. but can no longer do so today.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If someone can get an update from CP about any changes that may have transpired in the past week, please let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Vladimir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Oct 2017 21:41:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Unexpected-new-behavior-of-the-AWS-vSEC/m-p/7735#M4008</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-10-19T21:41:18Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected new behavior of the AWS vSEC</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Unexpected-new-behavior-of-the-AWS-vSEC/m-p/7736#M4009</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For those looking at this thread:&lt;/P&gt;&lt;P&gt;The issue was replicated by TAC and forwarded to R&amp;amp;D.&lt;/P&gt;&lt;H2 class="" style="color: #333333; background-color: #ffffff; font-weight: bold; text-decoration: none; font-size: 22px; padding: 10px 0px 0px 10px;"&gt;Service Request # 1-9861861391&lt;/H2&gt;&lt;P&gt;I'll update the thread when I'll get anything from them.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Oct 2017 14:32:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Unexpected-new-behavior-of-the-AWS-vSEC/m-p/7736#M4009</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-10-26T14:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected new behavior of the AWS vSEC</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Unexpected-new-behavior-of-the-AWS-vSEC/m-p/7737#M4010</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 30px;"&gt;&lt;STRONG&gt;Confirmed bug in the current release of the vSEC AMI (ogu-13-233.raw).&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From Check Point:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have found the issue with the failover within WAS for version ogu-13-233.raw.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@gw-addef0:0]# cat /etc/in-aws&lt;/P&gt;&lt;P&gt;ogu-13-233.raw&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The fix is to vi the files listed below and add the "shell=True" to lines 373 and 376 on the aws_had.py file and lines 40 and 43 on the aws_ha_test.py file&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To get the line numbers, after you run the vi &amp;lt;file_name&amp;gt; and are in vi, enter the : and set number &amp;lt;enter&amp;gt; and the lines numbers will show.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;$FWDIR/scripts/aws_had.py&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 371&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; if proxy_address != '' and proxy_port.isdigit():&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 372&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conf['proxy'] = proxy_address + ':' + proxy_port&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 373&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; subprocess.call('fw ctl set int fw_os_proxy_port ' + proxy_port, shell=True)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 374&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; else:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 375&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conf['proxy'] = None&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 376&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; subprocess.call('fw ctl set int fw_os_proxy_port 0', shell=True)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;$FWDIR/scripts/aws_ha_test.py&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 38 if proxy_address != '' and proxy_port.isdigit():&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 39&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; HTTP_PROXY = proxy_address + ':' + proxy_port&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 40&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; subprocess.call('fw ctl set int fw_os_proxy_port ' + proxy_port, shell=True)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 41 else:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 42&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; HTTP_PROXY = None&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 43&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; subprocess.call('fw ctl set int fw_os_proxy_port 0', shell=True)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let me know if you have any questions.&lt;/P&gt;&lt;P&gt;I beleive R&amp;amp;D will provide a new image to AWS, but in the meantime, this is the workaround for this image and we will publish an SK.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After modifying the files, you will need to run the following command to reconfigure the files:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Expert@HostName]# $FWDIR/Python/bin/python $FWDIR/scripts/aws_ha_cli.py reconf&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reboot vSEC for changes to take effect.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Oct 2017 00:50:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Unexpected-new-behavior-of-the-AWS-vSEC/m-p/7737#M4010</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-10-27T00:50:16Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected new behavior of the AWS vSEC</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Unexpected-new-behavior-of-the-AWS-vSEC/m-p/7738#M4011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check Point pulled the problematic AMI and had it replaced.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From Check Point:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;We have removed that image from AWS (take-013.233).&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;There was a new image released on Oct. 31 - take-013.240.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-------------------------------------------&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Nov 2017 20:07:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Unexpected-new-behavior-of-the-AWS-vSEC/m-p/7738#M4011</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-11-02T20:07:00Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected new behavior of the AWS vSEC</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Unexpected-new-behavior-of-the-AWS-vSEC/m-p/7739#M4012</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;More issues with &lt;STRONG&gt;AMI take-013.233. &lt;/STRONG&gt;The recent &lt;SPAN style="font-size: 11.0pt;"&gt;sk121885&lt;/SPAN&gt; addresses the vSEC controller but does not fix the aws_had.py script on the gateway.&amp;nbsp;&amp;nbsp; If you enable debugging for this process you will see failover cannot work due to CURL cert validation failures.&amp;nbsp; My workaround was to add -k to line 53.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cmd = ['curl_cli', '-s', '-f', '-g', '-k', '-L']&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Jan 2018 19:13:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Unexpected-new-behavior-of-the-AWS-vSEC/m-p/7739#M4012</guid>
      <dc:creator>Joe_DeMichele</dc:creator>
      <dc:date>2018-01-04T19:13:04Z</dc:date>
    </item>
  </channel>
</rss>

