<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: BGP advice in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174374#M443</link>
    <description>&lt;P&gt;Unfortunately I'm not using Cisco at the other end, it's ARS - Azure Route Server, which provides very little troubleshooting options.&amp;nbsp;&lt;BR /&gt;I can see the BGP traffic from ARS arriving at Checkpoint, but I cannot see Checkpoint trying to communicate with ARS. So that's why I'm thinking I missed something out on Checkpoint.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 10 Mar 2023 14:29:23 GMT</pubDate>
    <dc:creator>Sandgirl</dc:creator>
    <dc:date>2023-03-10T14:29:23Z</dc:date>
    <item>
      <title>BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174035#M435</link>
      <description>&lt;P&gt;Hi guys,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me start with saying I have very little experience with Checkpoints - only few weeks, so please bear that in mind &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to establish a BGP connectivity between our two Checkpoints in Azure (CloudGuard) and the Azure Route Server (ARS).&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have two setups:&amp;nbsp;&lt;/P&gt;&lt;P&gt;One is the Checkpoint Server Manager and ARS.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The other one is Checkpoint Firewall and ARS.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the first instance, I can see on Checkpoint (CLI) that there is a two way communication: SYN, SYN ACK, ACK (but also F, P and R). But the neighbourhood is not estaliblished - the peers show on Checkpoint SM as either 'active' or 'idle'.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With the second setup, I can only see traffic (in CLI) coming from ARS. Checkpoint does not respond at all. I have set up ASN in the GUI and peers, but there is absolutely no response. Is there any other setting somewhere I need to enable/setup?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Finally, the above setups are just in my lab. When we deploy the solution, the Checkpoints will be behind Azure Load Balancer. Is this supported? I have read somewhere on here that it might not be?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated!&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 13:44:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174035#M435</guid>
      <dc:creator>Sandgirl</dc:creator>
      <dc:date>2023-03-08T13:44:24Z</dc:date>
    </item>
    <item>
      <title>Re: BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174049#M436</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/90869"&gt;@Sandgirl&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;No need to apologize, we are here to help. So, below is good article explaining BGP different statuses:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.ciscopress.com/articles/article.asp?p=2756480&amp;amp;seqNum=4" target="_blank"&gt;https://www.ciscopress.com/articles/article.asp?p=2756480&amp;amp;seqNum=4&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Now, I dont know for certain if BGP is supported when CPs are behind Azure load balancer, so maybe someone else can confirm that for you.&lt;/P&gt;
&lt;P&gt;Now, here are few thing to check if show bgp summary command from clish does not show you established.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-verify BGP settings match on both sides&lt;/P&gt;
&lt;P&gt;-do fw ctl zdebug | grep x.x.x.x (other peer BGP ip address) and see why its getting dropped (if it is)&lt;/P&gt;
&lt;P&gt;-do tcpdump or fw monitor as per below port (BGP)&lt;/P&gt;
&lt;P&gt;tcpdump -nni any host x.x.x.x and port 179 (again, replace with other side peer IP)&lt;/P&gt;
&lt;P&gt;fw monitor -e "accept host(x.x.x.x) and port(179)&lt;/P&gt;
&lt;P&gt;Alternatively, you can also do new version of fw monitor flag&lt;/P&gt;
&lt;P&gt;Idea is this -&amp;gt; fw monitor -F "src ip, src port, dst ip, dst port, protocol" -F "srcip, src port, dst ip, dst port, protocl"&lt;/P&gt;
&lt;P&gt;So, lets say your IP is 1.1.1.1 and dst IP is 2.2.2.2 and port is BGP (179) and protocol can be anything, you can do this&lt;/P&gt;
&lt;P&gt;fw monitor -F "1.1.1.1,0,2.2.2.2,179,0" -F "2.2.2.2,0,1.1.1.1,179,0"&lt;/P&gt;
&lt;P&gt;We dont really care about source, only destination port.&lt;/P&gt;
&lt;P&gt;Keep in mind all these commands are done in expert mode.&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 15:21:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174049#M436</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-08T15:21:38Z</dc:date>
    </item>
    <item>
      <title>Re: BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174069#M437</link>
      <description>&lt;P&gt;Thank you so much Andy!&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;So I run the&amp;nbsp;&lt;BR /&gt;fw ctl zdebug drop&amp;nbsp;&lt;/P&gt;&lt;P&gt;and I'm getting the following message:&amp;nbsp;&lt;/P&gt;&lt;P&gt;fw_log_drop_ex: Packet proto =6 x.x.x.x:y -&amp;gt; z.z.z.z:179 dropped by fw_send_log_drop Reason: Rulebase drop - DEFAULT POLICY&lt;/P&gt;&lt;P&gt;Where would I find this policy so I can override it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 17:06:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174069#M437</guid>
      <dc:creator>Sandgirl</dc:creator>
      <dc:date>2023-03-08T17:06:02Z</dc:date>
    </item>
    <item>
      <title>Re: BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174118#M438</link>
      <description>&lt;P&gt;Sorry for the late reply, not sure how I missed the email notification, apologies. So to verify right policy, can you run fw stat command on the CP fw? If default policy or default filter is on, that would block everything.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2023 00:27:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174118#M438</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-09T00:27:36Z</dc:date>
    </item>
    <item>
      <title>Re: BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174145#M439</link>
      <description>&lt;P&gt;That means - You need to open the port TCP/179 destined to your firewall. You need to add explicit rule for the same above stealth if you have so. Since activating BGP does not add any implicit rule ensure you add the explicit rule as I said above.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2023 03:08:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174145#M439</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2023-03-09T03:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174179#M440</link>
      <description>&lt;P&gt;DEFAULT POLICY is the name of the policy package applied on your security gateway. It this specific case, it is out-of-the-box policy, which means you did not apply any policy to SG.&lt;/P&gt;
&lt;P&gt;The default policy only allows internal communication with the other parts of your security system, and nothing else.&lt;/P&gt;
&lt;P&gt;Please make sure you initiated SIC between your gateway and management server, and installed a new policy allowing essential communications and BGP to your gateway.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2023 08:20:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174179#M440</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-03-09T08:20:23Z</dc:date>
    </item>
    <item>
      <title>Re: BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174367#M441</link>
      <description>&lt;P&gt;Thank you so much everyone!&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;After a lot of looking around, I have managed to unblock TCP 179 (as well as SSH and ICMP) after implementing the required rules and also turning off address&amp;nbsp; spoofing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can now see the traffic being accepted by the firewall, and I can see SYN, ACK, Push, Finish and Reset. Tcpdump capture shows a flow - but only in one direction, from the ARS to the checkpoint, again I can see SYN, ACK, BGP Open... but then, I can see BGP Notification (which looks like the timeout waiting for the response) and FIN retransmission of FIN and Reset.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So the traffic seems to be getting there, but Checkpoint is still not willing to establish the BGP connection.&amp;nbsp;&lt;/P&gt;&lt;P&gt;As mentioned before, I am trying to set it up with ARS, which only asks for IP and ASN.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I missing some setting on the Checkpoint that I need to enable to get it to work?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2023 13:49:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174367#M441</guid>
      <dc:creator>Sandgirl</dc:creator>
      <dc:date>2023-03-10T13:49:40Z</dc:date>
    </item>
    <item>
      <title>Re: BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174370#M442</link>
      <description>&lt;P&gt;K, so something is not matching with the other side for sure. What do they see on Cisco side?&lt;/P&gt;
&lt;P&gt;Can you send us output of below commands from clish? Please blur out any sensitive info.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;From expert mode, just type clich and then run following commands (one by one)&lt;/P&gt;
&lt;P&gt;show bgp errors&lt;/P&gt;
&lt;P&gt;show bgp groups&lt;/P&gt;
&lt;P&gt;show bgp memory&lt;/P&gt;
&lt;P&gt;show bgp paths&lt;/P&gt;
&lt;P&gt;show bgp peer&lt;/P&gt;
&lt;P&gt;show bgp peers&lt;/P&gt;
&lt;P&gt;show bgp routemap&lt;/P&gt;
&lt;P&gt;show bgp stats&lt;/P&gt;
&lt;P&gt;show bgp summary&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2023 14:10:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174370#M442</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-10T14:10:46Z</dc:date>
    </item>
    <item>
      <title>Re: BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174374#M443</link>
      <description>&lt;P&gt;Unfortunately I'm not using Cisco at the other end, it's ARS - Azure Route Server, which provides very little troubleshooting options.&amp;nbsp;&lt;BR /&gt;I can see the BGP traffic from ARS arriving at Checkpoint, but I cannot see Checkpoint trying to communicate with ARS. So that's why I'm thinking I missed something out on Checkpoint.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2023 14:29:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174374#M443</guid>
      <dc:creator>Sandgirl</dc:creator>
      <dc:date>2023-03-10T14:29:23Z</dc:date>
    </item>
    <item>
      <title>Re: BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174376#M444</link>
      <description>&lt;P&gt;Sorry&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/90869"&gt;@Sandgirl&lt;/a&gt;&amp;nbsp;, I guess I cant spell properly...lol. I read ASR, so I assumed it was Cisco ASR, my bad, apologies. Ok, so if thats the case, yea, I know, Azure in general does not sadly provide many troubleshooting options at all. Can you actually run fw monitor -F flag I gave in my first response? Also, run ip r g command and then simply put IP address you are trying to reach, so we can confirm the routing part (example ip r g 8.8.8.8)&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2023 14:36:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174376#M444</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-10T14:36:22Z</dc:date>
    </item>
    <item>
      <title>Re: BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174391#M445</link>
      <description>&lt;P&gt;The fw -F command didn't return anything.&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip r g command helped - the traffic is going via the other interface, so once I change the settings on both ends, I can now see the traffic going both ways... although it's still failing... the connection is timing out on Checkpoint end it seems, the ARS sends a message that its Hold time has expired... Or am I reading this wrong?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2023 16:12:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174391#M445</guid>
      <dc:creator>Sandgirl</dc:creator>
      <dc:date>2023-03-10T16:12:32Z</dc:date>
    </item>
    <item>
      <title>Re: BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174392#M446</link>
      <description>&lt;P&gt;If you check my very first response on your post, I gave an example of fw monitor -F command.&lt;/P&gt;
&lt;P&gt;idea is this:&lt;/P&gt;
&lt;P&gt;fw monitor -F "srcip,srcport,dstip,dstport,protocol" -F "srcip,srcport,dstip,dstport,protocol"&lt;/P&gt;
&lt;P&gt;(just an example -&amp;gt; fw monitor -F "1.1.1.1,0,2.2.2.2,179,0" -F "2.2.2.2,0,1.1.1.1,179,0"&lt;/P&gt;
&lt;P&gt;I really think that capture would help us here.&lt;/P&gt;
&lt;P&gt;Andy&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2023 16:16:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174392#M446</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-10T16:16:41Z</dc:date>
    </item>
    <item>
      <title>Re: BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174517#M447</link>
      <description>&lt;P&gt;Hi Andy,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I run the fw monitor command for few minutes and this is what it returned:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[vs_0][ppak_0] eth1:i[40]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=40 id=27946&lt;BR /&gt;TCP: 64818 -&amp;gt; 179 ..R.A. seq=a532c7d3 ack=2ef94736&lt;BR /&gt;[vs_0][fw_0] eth1:i[40]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=40 id=27946&lt;BR /&gt;TCP: 64818 -&amp;gt; 179 ..R.A. seq=a532c7d3 ack=2ef94736&lt;BR /&gt;[vs_0][fw_0] eth1:I[40]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=40 id=27946&lt;BR /&gt;TCP: 64818 -&amp;gt; 179 ..R.A. seq=a532c7d3 ack=2ef94736&lt;BR /&gt;[vs_0][ppak_0] eth1:i[44]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=61 id=27947&lt;BR /&gt;TCP: 64938 -&amp;gt; 179 ...PA. seq=cce9b89b ack=80f42139&lt;BR /&gt;[vs_0][fw_1] eth1:i[44]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=61 id=27947&lt;BR /&gt;TCP: 64938 -&amp;gt; 179 ...PA. seq=cce9b89b ack=80f42139&lt;BR /&gt;[vs_0][fw_1] eth1:I[44]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=61 id=27947&lt;BR /&gt;TCP: 64938 -&amp;gt; 179 ...PA. seq=cce9b89b ack=80f42139&lt;BR /&gt;[vs_0][ppak_0] eth1:i[40]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=40 id=27948&lt;BR /&gt;TCP: 64938 -&amp;gt; 179 F...A. seq=cce9b8b0 ack=80f42139&lt;BR /&gt;[vs_0][fw_1] eth1:i[40]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=40 id=27948&lt;BR /&gt;TCP: 64938 -&amp;gt; 179 F...A. seq=cce9b8b0 ack=80f42139&lt;BR /&gt;[vs_0][fw_1] eth1:I[40]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=40 id=27948&lt;BR /&gt;TCP: 64938 -&amp;gt; 179 F...A. seq=cce9b8b0 ack=80f42139&lt;BR /&gt;[vs_0][ppak_0] eth1:i[40]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=40 id=27949&lt;BR /&gt;TCP: 64938 -&amp;gt; 179 F...A. seq=cce9b8b0 ack=80f42139&lt;BR /&gt;[vs_0][fw_1] eth1:i[40]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=40 id=27949&lt;BR /&gt;TCP: 64938 -&amp;gt; 179 F...A. seq=cce9b8b0 ack=80f42139&lt;BR /&gt;[vs_0][fw_1] eth1:I[40]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=40 id=27949&lt;BR /&gt;TCP: 64938 -&amp;gt; 179 F...A. seq=cce9b8b0 ack=80f42139&lt;BR /&gt;[vs_0][ppak_0] eth1:i[44]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=52 id=27950&lt;BR /&gt;TCP: 65059 -&amp;gt; 179 .S.... seq=f24889d5 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth1:i[44]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=52 id=27950&lt;BR /&gt;TCP: 65059 -&amp;gt; 179 .S.... seq=f24889d5 ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth1:I[44]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=52 id=27950&lt;BR /&gt;TCP: 65059 -&amp;gt; 179 .S.... seq=f24889d5 ack=00000000&lt;BR /&gt;[vs_0][ppak_0] eth1:i[40]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=40 id=27951&lt;BR /&gt;TCP: 65059 -&amp;gt; 179 ....A. seq=f24889d6 ack=6ecba4fd&lt;BR /&gt;[vs_0][fw_0] eth1:i[40]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=40 id=27951&lt;BR /&gt;TCP: 65059 -&amp;gt; 179 ....A. seq=f24889d6 ack=6ecba4fd&lt;BR /&gt;[vs_0][fw_0] eth1:I[40]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=40 id=27951&lt;BR /&gt;TCP: 65059 -&amp;gt; 179 ....A. seq=f24889d6 ack=6ecba4fd&lt;BR /&gt;[vs_0][ppak_0] eth1:i[44]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=91 id=27952&lt;BR /&gt;TCP: 65059 -&amp;gt; 179 ...PA. seq=f24889d6 ack=6ecba4fd&lt;BR /&gt;[vs_0][fw_0] eth1:i[44]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=91 id=27952&lt;BR /&gt;TCP: 65059 -&amp;gt; 179 ...PA. seq=f24889d6 ack=6ecba4fd&lt;BR /&gt;[vs_0][fw_0] eth1:I[44]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=91 id=27952&lt;BR /&gt;TCP: 65059 -&amp;gt; 179 ...PA. seq=f24889d6 ack=6ecba4fd&lt;BR /&gt;[vs_0][ppak_0] eth1:i[40]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=40 id=27953&lt;BR /&gt;TCP: 64938 -&amp;gt; 179 ..R.A. seq=cce9b8b1 ack=80f42139&lt;BR /&gt;[vs_0][fw_1] eth1:i[40]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=40 id=27953&lt;BR /&gt;TCP: 64938 -&amp;gt; 179 ..R.A. seq=cce9b8b1 ack=80f42139&lt;BR /&gt;[vs_0][fw_1] eth1:I[40]: 10.0.4.4 -&amp;gt; 10.6.1.4 (TCP) len=40 id=27953&lt;BR /&gt;TCP: 64938 -&amp;gt; 179 ..R.A. seq=cce9b8b1 ack=80f42139&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 10:13:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174517#M447</guid>
      <dc:creator>Sandgirl</dc:creator>
      <dc:date>2023-03-13T10:13:01Z</dc:date>
    </item>
    <item>
      <title>Re: BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174520#M449</link>
      <description>&lt;P&gt;For some reason I cannot reply to this comment with the output from the fw monitor...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 10:31:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174520#M449</guid>
      <dc:creator>Sandgirl</dc:creator>
      <dc:date>2023-03-13T10:31:39Z</dc:date>
    </item>
    <item>
      <title>Re: BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174521#M450</link>
      <description>&lt;P&gt;Hi Andy,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've attached the output from fwmonitor as the text file - hopefully it will update this time.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 10:33:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174521#M450</guid>
      <dc:creator>Sandgirl</dc:creator>
      <dc:date>2023-03-13T10:33:30Z</dc:date>
    </item>
    <item>
      <title>Re: BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174525#M451</link>
      <description>&lt;P&gt;When I've done the capture not limiting port to 179, I got another capture.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've uploaded the second capture.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 10:55:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174525#M451</guid>
      <dc:creator>Sandgirl</dc:creator>
      <dc:date>2023-03-13T10:55:04Z</dc:date>
    </item>
    <item>
      <title>Re: BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174537#M452</link>
      <description>&lt;P&gt;Thanks! That helped a lot! Although I'm still not able to establish BGP session between peers &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 11:29:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174537#M452</guid>
      <dc:creator>Sandgirl</dc:creator>
      <dc:date>2023-03-13T11:29:50Z</dc:date>
    </item>
    <item>
      <title>Re: BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174563#M453</link>
      <description>&lt;P&gt;Small favor&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/90869"&gt;@Sandgirl&lt;/a&gt;&amp;nbsp;...I need to know your local CP ip address, as well as remote side. Also, can you send the actual pcap file, rather than txt, as I would like to examine it in wireshark. Please send me offline message or blur out any sensitive info.&lt;/P&gt;
&lt;P&gt;Cheers.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 13:23:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174563#M453</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-13T13:23:18Z</dc:date>
    </item>
    <item>
      <title>Re: BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174581#M454</link>
      <description>&lt;P&gt;I've attached the capture. It's my lab environment.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 14:16:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174581#M454</guid>
      <dc:creator>Sandgirl</dc:creator>
      <dc:date>2023-03-13T14:16:31Z</dc:date>
    </item>
    <item>
      <title>Re: BGP advice</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174582#M455</link>
      <description>&lt;P&gt;Thanks! Can you also please tell us the IP addresses involved (CP and other side)?&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 14:17:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/BGP-advice/m-p/174582#M455</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-13T14:17:51Z</dc:date>
    </item>
  </channel>
</rss>

