<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VSEC AWS traffic to/from local subnet in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/VSEC-AWS-traffic-to-from-local-subnet/m-p/6197#M4090</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My question is certainly easy to answer, but I cannot find the answer myself. I am not a starter with VSEC, and also not in AWS, but nevertheless it seems to be a newbee question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what we have: We have a VSEC installed in an AWS VPC. The VPC has several subnets. VSEC has interfaces in two of them:&lt;/P&gt;&lt;P&gt;- one public subnet - route table has the default route to the IGW - this is VSECs eth0&lt;/P&gt;&lt;P&gt;- on private subnet - route table has the default route to the ENI of the VSEC in this subnet -&amp;nbsp; this is VSECs eth1&lt;/P&gt;&lt;P&gt;All Security Groups and all NACLs allow any traffic.&lt;/P&gt;&lt;P&gt;VSECs setting for Source/Destination Check is "disabled".&lt;/P&gt;&lt;P&gt;VSEC is connected to our corporate network using VPN, which is running well. We can reach the VSECs IP-address in the private subnet from on-premise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We additionally have an EC2 instance in the private subnet running an AWS Linux.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We try to reach this EC2 from on-premise without success. We see the packets run from on-premise via VSEC, which allows the traffic, and also see the traffic leaving VSEC on the correct interface eth1. But we do never see reply packets from EC2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We also try to reach on-premis from EC2. Here we never see any packet arriving at the VSEC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Connecting from VSEC to EC2 directly and vice versa is working well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anybody have any ideas what I can check additionally?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance. Matthias Hoppe&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 11 Sep 2017 11:54:38 GMT</pubDate>
    <dc:creator>Matthias_Hoppe</dc:creator>
    <dc:date>2017-09-11T11:54:38Z</dc:date>
    <item>
      <title>VSEC AWS traffic to/from local subnet</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/VSEC-AWS-traffic-to-from-local-subnet/m-p/6197#M4090</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My question is certainly easy to answer, but I cannot find the answer myself. I am not a starter with VSEC, and also not in AWS, but nevertheless it seems to be a newbee question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what we have: We have a VSEC installed in an AWS VPC. The VPC has several subnets. VSEC has interfaces in two of them:&lt;/P&gt;&lt;P&gt;- one public subnet - route table has the default route to the IGW - this is VSECs eth0&lt;/P&gt;&lt;P&gt;- on private subnet - route table has the default route to the ENI of the VSEC in this subnet -&amp;nbsp; this is VSECs eth1&lt;/P&gt;&lt;P&gt;All Security Groups and all NACLs allow any traffic.&lt;/P&gt;&lt;P&gt;VSECs setting for Source/Destination Check is "disabled".&lt;/P&gt;&lt;P&gt;VSEC is connected to our corporate network using VPN, which is running well. We can reach the VSECs IP-address in the private subnet from on-premise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We additionally have an EC2 instance in the private subnet running an AWS Linux.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We try to reach this EC2 from on-premise without success. We see the packets run from on-premise via VSEC, which allows the traffic, and also see the traffic leaving VSEC on the correct interface eth1. But we do never see reply packets from EC2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We also try to reach on-premis from EC2. Here we never see any packet arriving at the VSEC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Connecting from VSEC to EC2 directly and vice versa is working well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anybody have any ideas what I can check additionally?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance. Matthias Hoppe&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Sep 2017 11:54:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/VSEC-AWS-traffic-to-from-local-subnet/m-p/6197#M4090</guid>
      <dc:creator>Matthias_Hoppe</dc:creator>
      <dc:date>2017-09-11T11:54:38Z</dc:date>
    </item>
    <item>
      <title>Re: VSEC AWS traffic to/from local subnet</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/VSEC-AWS-traffic-to-from-local-subnet/m-p/6198#M4091</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.5pt; color: #3d3d3d;"&gt;Hi!, Please verify the route table associated with&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.5pt; color: #333333; background: white;"&gt;&lt;SPAN&gt;private subnet running an AWS Linux, from where you are trying to reach on&amp;nbsp;on-premise network.&lt;/SPAN&gt; On-premise network should be pointed towards vSec eth1 interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Sep 2017 08:12:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/VSEC-AWS-traffic-to-from-local-subnet/m-p/6198#M4091</guid>
      <dc:creator>Naveen_Kumar</dc:creator>
      <dc:date>2017-09-12T08:12:02Z</dc:date>
    </item>
    <item>
      <title>Re: VSEC AWS traffic to/from local subnet</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/VSEC-AWS-traffic-to-from-local-subnet/m-p/6199#M4092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Naveen, thank you for your valuable answer. I think I already mentioned, that the route table is correct ("on private subnet - route table has the default route to the ENI of the VSEC in this subnet -&amp;nbsp; this is VSECs eth1")&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Sep 2017 07:52:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/VSEC-AWS-traffic-to-from-local-subnet/m-p/6199#M4092</guid>
      <dc:creator>Matthias_Hoppe</dc:creator>
      <dc:date>2017-09-13T07:52:12Z</dc:date>
    </item>
    <item>
      <title>Re: VSEC AWS traffic to/from local subnet</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/VSEC-AWS-traffic-to-from-local-subnet/m-p/6200#M4093</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys, just yesterday late afternoon, I found the solution. I was not aware that "Source/Destination Check" cat be set not only for the EC2 but also for every single ENI on that EC2. And for the second interface (eth1) it was set to "True". Having disabled this, everything worked perfectly well.&lt;/P&gt;&lt;P&gt;Sorry for having bothered you with this question. I assumed that there was only one tiny setting missing but could not find it for some time...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Sep 2017 07:56:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/VSEC-AWS-traffic-to-from-local-subnet/m-p/6200#M4093</guid>
      <dc:creator>Matthias_Hoppe</dc:creator>
      <dc:date>2017-09-13T07:56:04Z</dc:date>
    </item>
  </channel>
</rss>

