<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.10 Management - R77.30 Gateway as VPN Endpoint in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/R80-10-Management-R77-30-Gateway-as-VPN-Endpoint/m-p/3110#M4289</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Note that tcpdump should still show the communication on TCP port 257 if Implied Rules are impacting the communication.&lt;/P&gt;&lt;P&gt;It sounds like the&amp;nbsp;Security Groups in AWS are blocking communication here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Jun 2017 02:47:39 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2017-06-28T02:47:39Z</dc:date>
    <item>
      <title>R80.10 Management - R77.30 Gateway as VPN Endpoint</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/R80-10-Management-R77-30-Gateway-as-VPN-Endpoint/m-p/3109#M4288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Currently have a star VPN configuration between On Prem and AWS.&amp;nbsp; (Two firewalls on prem, two firewalls in AWS).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Prior to a policy push with R80.10 management, I was able to collect logs from the AWS appliances over the VPN tunnel that was built.&amp;nbsp; Now, after pushing policy from an R80.10 Management server, I'm no longer able to send logs from the AWS gateways to the on prem management server.&amp;nbsp; Connectivity to the gateways in AWS is fine (can still push policy / reach devices behind the gateways)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A netstat shows the gateway in AWS attempting to connect to the proper logging server:&lt;/P&gt;&lt;P&gt;tcp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 10.0.0.1:55388&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.1:257&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SYN_SENT&amp;nbsp;&amp;nbsp;&amp;nbsp; 4487/fwd&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am able to successfully connect to 192.168.0.1 from the gateway (via ping or telnet tests):&lt;/P&gt;&lt;P&gt;[Expert@FW1:0]# ping 192.168.0.1&lt;/P&gt;&lt;P&gt;PING 192.168.0.1 (192.168.0.1) 56(84) bytes of data.&lt;/P&gt;&lt;P&gt;64 bytes from 192.168.0.1: icmp_seq=1 ttl=58 time=34.3 ms&lt;/P&gt;&lt;P&gt;64 bytes from 192.168.0.1: icmp_seq=2 ttl=58 time=28.4 ms&lt;/P&gt;&lt;P&gt;64 bytes from 192.168.0.1: icmp_seq=3 ttl=58 time=28.7 ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@FW1:0]# telnet 192.168.0.1 443&lt;/P&gt;&lt;P&gt;Trying 192.168.0.1...&lt;/P&gt;&lt;P&gt;Connected to 192.168.0.1.&lt;/P&gt;&lt;P&gt;Escape character is '^]'.&lt;/P&gt;&lt;P&gt;^]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, when I attempt to telnet directly to port 257, the telnet test times out:&lt;/P&gt;&lt;P&gt;[Expert@FW1:0]# telnet 192.168.0.1 257&lt;/P&gt;&lt;P&gt;Trying 192.168.0.1...&lt;/P&gt;&lt;P&gt;telnet: connect to address 192.168.0.1: Connection timed out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My assumption is that the implied rules for Logging are taking precedence and the logging traffic is not making it to the explicit rule in policy that allows and encrypts the traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Apr 2017 14:55:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/R80-10-Management-R77-30-Gateway-as-VPN-Endpoint/m-p/3109#M4288</guid>
      <dc:creator>Kyle_S</dc:creator>
      <dc:date>2017-04-02T14:55:45Z</dc:date>
    </item>
    <item>
      <title>Re: R80.10 Management - R77.30 Gateway as VPN Endpoint</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/R80-10-Management-R77-30-Gateway-as-VPN-Endpoint/m-p/3110#M4289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Note that tcpdump should still show the communication on TCP port 257 if Implied Rules are impacting the communication.&lt;/P&gt;&lt;P&gt;It sounds like the&amp;nbsp;Security Groups in AWS are blocking communication here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jun 2017 02:47:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/R80-10-Management-R77-30-Gateway-as-VPN-Endpoint/m-p/3110#M4289</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-06-28T02:47:39Z</dc:date>
    </item>
  </channel>
</rss>

