<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Should secondary IP addresses assigned to vSEC in AWS be present in topology? in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6638#M4136</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Right, but I'm glad to document the knowledge for others that might have the same question.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 02 Oct 2017 16:27:51 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2017-10-02T16:27:51Z</dc:date>
    <item>
      <title>Should secondary IP addresses assigned to vSEC in AWS be present in topology?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6633#M4131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;AWS requires introduction of secondary IP addresses and EIPs associated with them in order to access servers behind vSEC.&lt;/P&gt;&lt;P&gt;Once address is created and the EIP assigned, the traffic seem to flow through the vSEC,&lt;/P&gt;&lt;P&gt;My question is this:&lt;/P&gt;&lt;P&gt;Should the secondary IP be defined as an alias for the external interface of the vSEC?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Sep 2017 02:10:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6633#M4131</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-09-26T02:10:41Z</dc:date>
    </item>
    <item>
      <title>Re: Should secondary IP addresses assigned to vSEC in AWS be present in topology?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6634#M4132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You do not need an interface alias in Gaia for the secondary IPs.&lt;/P&gt;&lt;P&gt;The secondary IP is not really for the security gateway, but for a device behind the gateway the firewall is doing NAT for.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Sep 2017 05:34:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6634#M4132</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-09-26T05:34:47Z</dc:date>
    </item>
    <item>
      <title>Re: Should secondary IP addresses assigned to vSEC in AWS be present in topology?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6635#M4133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So, not actual secondary IP, nor the assigned EIP should figure anywhere in the Gaia configuration or topology of the vSEC object?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Sep 2017 17:25:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6635#M4133</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-09-29T17:25:37Z</dc:date>
    </item>
    <item>
      <title>Re: Should secondary IP addresses assigned to vSEC in AWS be present in topology?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6636#M4134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Right.&lt;/P&gt;&lt;P&gt;The Elastic IP is associated with a secondary IP of the vSEC instance.&lt;/P&gt;&lt;P&gt;The NAT for this happens before the vSEC instance sees it.&lt;/P&gt;&lt;P&gt;The secondary IP of the vSEC instance only exists in AWS to get the packet to the vSEC instance (think of it like an ARP).&lt;/P&gt;&lt;P&gt;The vSEC instance will receive the packet (sent to secondary IP) and will process it according to the NAT rulebase.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general, the only place an Elastic IP address will ever go is the SmartConsole object IP for either:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;A vSEC gateway that is not in the same VPC as the manager&lt;/LI&gt;&lt;LI&gt;The vSEC manager object if it's in AWS&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The topology/interface configuration doesn't reference elastic IPs at all, neither does the Gaia configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The secondary IP will need to be represented in the Access Policy and NAT rulebase.&lt;/P&gt;&lt;P&gt;It does not need to be configured in Gaia.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Sep 2017 17:46:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6636#M4134</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-09-29T17:46:10Z</dc:date>
    </item>
    <item>
      <title>Re: Should secondary IP addresses assigned to vSEC in AWS be present in topology?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6637#M4135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;I'm just covering all the bases while trying to solve the mystery of disappearing Logical Server in this thread:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/thread/5748-inconsistent-behavior-of-vsec-in-aws" target="_blank"&gt;https://community.checkpoint.com/thread/5748-inconsistent-behavior-of-vsec-in-aws&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jun 2019 08:57:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6637#M4135</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-06-21T08:57:49Z</dc:date>
    </item>
    <item>
      <title>Re: Should secondary IP addresses assigned to vSEC in AWS be present in topology?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6638#M4136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Right, but I'm glad to document the knowledge for others that might have the same question.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Oct 2017 16:27:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6638#M4136</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-10-02T16:27:51Z</dc:date>
    </item>
    <item>
      <title>Re: Should secondary IP addresses assigned to vSEC in AWS be present in topology?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6639#M4137</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A reference architecture sk article would be good, similar to the Azure one. It needs to step through where, when, why for EIP use as none of the guides, even the AWS getting started guide, tackle this subject.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Oct 2017 06:47:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6639#M4137</guid>
      <dc:creator>Iain_Keir1</dc:creator>
      <dc:date>2017-10-12T06:47:13Z</dc:date>
    </item>
    <item>
      <title>Re: Should secondary IP addresses assigned to vSEC in AWS be present in topology?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6640#M4138</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not sure if the subject is deserving separate sk or should be incorporated in updated document describing AWS deployment scenarios.&lt;/P&gt;&lt;P&gt;The EIPs are essentially a Static Nat entries of AWS.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You need one assigned to the external interface of each vSEC&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;In case of clustered deployment, additional EIP should be associated with the Secondary IP attached to the active cluster member.&lt;/LI&gt;&lt;LI&gt;Further EIPs are associated with each additional Secondary IP representing either Statically NATed servers behind vSEC/Cluster/ASG, or each AWS Internal Load Balancer object represented by the Logical Server object in Check Point.&lt;/LI&gt;&lt;LI&gt;I'd imagine that if you are employing external ELB, one EIP per such should be assigned as well.&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Oct 2017 13:46:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6640#M4138</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-10-12T13:46:56Z</dc:date>
    </item>
    <item>
      <title>Re: Should secondary IP addresses assigned to vSEC in AWS be present in topology?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6641#M4139</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We offer a number of CloudFormation templates for AWS that can make the initial deployment simple:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk111013&amp;amp;partition=General&amp;amp;product=vSEC" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk111013&amp;amp;partition=General&amp;amp;product=vSEC"&gt;AWS CloudFormation Templates&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This also links to other SKs for specific configurations (autoscaling, clustering).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Oct 2017 14:25:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6641#M4139</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-10-12T14:25:30Z</dc:date>
    </item>
    <item>
      <title>Re: Should secondary IP addresses assigned to vSEC in AWS be present in topology?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6642#M4140</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I actually have a mild objection to the use of the templates from the get-go:&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. They are finicky and require certain pre-requisites not mentioned in deployment scenarios (number of available EIPs in the Region, location of the management server).&lt;/P&gt;&lt;P&gt;2. When stack is utilized, it&amp;nbsp;may roll-back unexpectedly with limited feedback.&lt;/P&gt;&lt;P&gt;3. It deprives us of the ability to step on the rake a few times. The process that is conducive to downing of comprehension and formation of the long-term memory:)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nothing wrong with eventually transitioning to coded deployment, but it pays to have to go through the manual process few times.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just a personal preference.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Oct 2017 14:51:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6642#M4140</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-10-12T14:51:03Z</dc:date>
    </item>
    <item>
      <title>Re: Should secondary IP addresses assigned to vSEC in AWS be present in topology?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6643#M4141</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Totally agree.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SKs linked in the CloudFormation SK tell you how to do stuff manually if you so desire.&lt;/P&gt;&lt;P&gt;Automation is the only way to do a real deployment, thus why we have CloudFormation scripts that make this easy&lt;/P&gt;&lt;P&gt;Twiddling the nerd knobs on your own (or as you said, stepping on the rake) is definitely important.&lt;/P&gt;&lt;P&gt;This will provide a better understanding of what's going on "behind the scenes" and give you some ability to troubleshoot when things go belly-up (as they sometimes do).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I learned quite a lot about the vSEC Controller when I actually stood up the environment demonstrated here:&amp;nbsp;&lt;A href="https://community.checkpoint.com/message/7699-leveraging-the-r8010-api-to-automate-and-streamline-security-operations?sr=search&amp;amp;searchId=439d98e6-d80a-4c61-9fdc-26729851e355&amp;amp;searchIndex=1" target="_blank"&gt;https://community.checkpoint.com/message/7699-leveraging-the-r8010-api-to-automate-and-streamline-security-operations?sr=search&amp;amp;searchId=439d98e6-d80a-4c61-9fdc-26729851e355&amp;amp;searchIndex=1&lt;/A&gt;‌&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jun 2019 08:57:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6643#M4141</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-21T08:57:51Z</dc:date>
    </item>
    <item>
      <title>Re: Should secondary IP addresses assigned to vSEC in AWS be present in topology?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6644#M4142</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Below are few examples of deployment in AWS that I am presently running in my lab. The dual AZ cluster with external ELB and the ASG are not too far away, provided the client(s) is/are interested:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="60088" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60088_pastedImage_1.png" style="width: 620px; height: 434px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60094_pastedImage_2.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60093_pastedImage_1.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Oct 2017 16:17:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/6644#M4142</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2017-10-12T16:17:25Z</dc:date>
    </item>
    <item>
      <title>Re: Should secondary IP addresses assigned to vSEC in AWS be present in topology?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/83615#M4143</link>
      <description>&lt;P&gt;Hi Vladimir,&lt;/P&gt;
&lt;P&gt;I have question for cluster environment. If I attach secondary IP to active member with EIP, in case of failover how it will be diverted to another member.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 13:00:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Should-secondary-IP-addresses-assigned-to-vSEC-in-AWS-be-present/m-p/83615#M4143</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2020-04-29T13:00:51Z</dc:date>
    </item>
  </channel>
</rss>

