<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Deploy AWS Cross-AZ Cluster without Public Addresses/EIPs in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Deploy-AWS-Cross-AZ-Cluster-without-Public-Addresses-EIPs/m-p/198712#M4420</link>
    <description>&lt;P&gt;Hi CheckMates,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can I deploy a cross az cluster without the public addresses. The template from CheckPoint deploys with public connectivity and this isn't necessarily a requirement for my use case as it would only be serving east/west/south traffic. I am thinking the EIP used for cluster address could be configured as any ENI and that SmartConsole does not require it for any critical functionality? Appreciate i might be corrected there &lt;span class="lia-unicode-emoji" title=":grinning_face_with_sweat:"&gt;😅&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Ideally the template I create would include 2 public and 2 private subnets for ingress/egress and sync. The ENIs in public subnet wont have associated public addresses (or could use 4 private subnets). Outbound connectivity can be routed via a NAT gateway in the same VPC or via transit gateway to my outbound VPC and NATed&lt;/P&gt;&lt;P&gt;Any help/advice will be greatly appreciated.&lt;/P&gt;&lt;P&gt;C&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 22 Nov 2023 22:27:48 GMT</pubDate>
    <dc:creator>cdav</dc:creator>
    <dc:date>2023-11-22T22:27:48Z</dc:date>
    <item>
      <title>Deploy AWS Cross-AZ Cluster without Public Addresses/EIPs</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Deploy-AWS-Cross-AZ-Cluster-without-Public-Addresses-EIPs/m-p/198712#M4420</link>
      <description>&lt;P&gt;Hi CheckMates,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can I deploy a cross az cluster without the public addresses. The template from CheckPoint deploys with public connectivity and this isn't necessarily a requirement for my use case as it would only be serving east/west/south traffic. I am thinking the EIP used for cluster address could be configured as any ENI and that SmartConsole does not require it for any critical functionality? Appreciate i might be corrected there &lt;span class="lia-unicode-emoji" title=":grinning_face_with_sweat:"&gt;😅&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Ideally the template I create would include 2 public and 2 private subnets for ingress/egress and sync. The ENIs in public subnet wont have associated public addresses (or could use 4 private subnets). Outbound connectivity can be routed via a NAT gateway in the same VPC or via transit gateway to my outbound VPC and NATed&lt;/P&gt;&lt;P&gt;Any help/advice will be greatly appreciated.&lt;/P&gt;&lt;P&gt;C&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 22:27:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Deploy-AWS-Cross-AZ-Cluster-without-Public-Addresses-EIPs/m-p/198712#M4420</guid>
      <dc:creator>cdav</dc:creator>
      <dc:date>2023-11-22T22:27:48Z</dc:date>
    </item>
    <item>
      <title>Re: Deploy AWS Cross-AZ Cluster without Public Addresses/EIPs</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Deploy-AWS-Cross-AZ-Cluster-without-Public-Addresses-EIPs/m-p/198720#M4421</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;1. Cross az cluster will not work without public VIP.&lt;/P&gt;
&lt;P&gt;2. With singe az cluster you have the option to use public or private.&lt;/P&gt;
&lt;P&gt;3. If a VPN is unnecessary, I recommend using VMSS GWLB.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2023 11:54:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Deploy-AWS-Cross-AZ-Cluster-without-Public-Addresses-EIPs/m-p/198720#M4421</guid>
      <dc:creator>Shay_Levin</dc:creator>
      <dc:date>2023-11-23T11:54:27Z</dc:date>
    </item>
    <item>
      <title>Re: Deploy AWS Cross-AZ Cluster without Public Addresses/EIPs</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Deploy-AWS-Cross-AZ-Cluster-without-Public-Addresses-EIPs/m-p/198721#M4422</link>
      <description>&lt;P&gt;Could there be future developments to negate this requirement? Would be nice to not have to provision public endpoints when they're not required.&lt;/P&gt;&lt;P&gt;I have deployed a GWLB cluster to manage egress traffic - these are currently deployed with public addresses as its deployed from template but again in the process of creating my own. Assuming these can be deployed without the public addresses?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for confirming.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2023 08:15:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Deploy-AWS-Cross-AZ-Cluster-without-Public-Addresses-EIPs/m-p/198721#M4422</guid>
      <dc:creator>cdav</dc:creator>
      <dc:date>2023-11-23T08:15:12Z</dc:date>
    </item>
    <item>
      <title>Re: Deploy AWS Cross-AZ Cluster without Public Addresses/EIPs</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Deploy-AWS-Cross-AZ-Cluster-without-Public-Addresses-EIPs/m-p/198726#M4423</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/37333"&gt;@cdav&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cross AZ Cluster members located in different Availability Zones, hence in different subnets. &lt;/P&gt;
&lt;DIV id="tinyMceEditor_3ce36385f53d95Roman_Kats_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cross AZ subnets.jpg" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23388i677427B48751C284/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Cross AZ subnets.jpg" alt="Cross AZ subnets.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Using private IPs only means the Cluster IP (VIP) has to be part of the subnets range belongs to both cluster members. Since subnets ranges of cluster members are completely different , there is no way to define Cluster IP.&lt;BR /&gt;They way&amp;nbsp; it can be achieved is to associate Elastic IP with private IP of active cluster member and move it to another member in case of failover.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The GWLB solution can be deployed without elastic IPs, this option is available in our CFT and Terraform templates.&lt;BR /&gt;The GWLB solution supports East-West and North-South traffic flows&lt;BR /&gt;For more details refer to:&lt;BR /&gt;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_Network_for_AWS_Gateway_Load_Balancer_ASG/Default.htm" target="_blank" rel="noopener"&gt;CloudGuard Network for AWS Gateway Load Balancer Auto Scale Group Deployment Guide&lt;/A&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri;"&gt;GWLB Workshop&amp;nbsp; -&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://unrivaled-melba-1a81a6.netlify.app/" target="_blank"&gt;https://unrivaled-melba-1a81a6.netlify.app/&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2023 08:39:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Deploy-AWS-Cross-AZ-Cluster-without-Public-Addresses-EIPs/m-p/198726#M4423</guid>
      <dc:creator>Roman_Kats</dc:creator>
      <dc:date>2023-11-23T08:39:55Z</dc:date>
    </item>
    <item>
      <title>Re: Deploy AWS Cross-AZ Cluster without Public Addresses/EIPs</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Deploy-AWS-Cross-AZ-Cluster-without-Public-Addresses-EIPs/m-p/198729#M4424</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/6318"&gt;@Roman_Kats&lt;/a&gt;&amp;nbsp;thank you for the above!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes i understand the point regarding gateways being in different azs/subnets. Are you saying there is a way to achieve to private clustering? My understanding would be:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;deploy cluster members with interfaces in&amp;nbsp; "public" subnet but no associated public address.&lt;/LI&gt;&lt;LI&gt;create addtional eni and map to active members public eni&lt;/LI&gt;&lt;LI&gt;in the event of failover construct a method for moving the eni to new active members eni&lt;/LI&gt;&lt;LI&gt;still leave the "private/internal" interfaces for SYNC.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;C&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2023 09:19:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Deploy-AWS-Cross-AZ-Cluster-without-Public-Addresses-EIPs/m-p/198729#M4424</guid>
      <dc:creator>cdav</dc:creator>
      <dc:date>2023-11-23T09:19:57Z</dc:date>
    </item>
    <item>
      <title>Re: Deploy AWS Cross-AZ Cluster without Public Addresses/EIPs</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Deploy-AWS-Cross-AZ-Cluster-without-Public-Addresses-EIPs/m-p/198805#M4425</link>
      <description>&lt;P&gt;completely misunderstood your response. Can see this isnt achievable.&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2023 23:20:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Deploy-AWS-Cross-AZ-Cluster-without-Public-Addresses-EIPs/m-p/198805#M4425</guid>
      <dc:creator>cdav</dc:creator>
      <dc:date>2023-11-23T23:20:52Z</dc:date>
    </item>
  </channel>
</rss>

