<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Check Point Cloud FW on AWS in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Check-Point-Cloud-FW-on-AWS/m-p/202599#M4539</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/73681"&gt;@tropicanaslim&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The recommended solution for E/W and N/S is Gateway Load Balancer Autoscaling.&lt;BR /&gt;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_Network_for_AWS_Gateway_Load_Balancer_ASG/Default.htm" target="_blank"&gt;Admin guide: https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_Network_for_AWS_Gateway_Load_Balancer_ASG/Default.htm&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;Workshop:&lt;/P&gt;
&lt;P lang="x-none"&gt;&lt;A href="https://unrivaled-melba-1a81a6.netlify.app/" target="_blank"&gt;https://unrivaled-melba-1a81a6.netlify.app/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;In case Site to Site VPN is required the Cross AZ Cluster should be added to architecture.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P lang="x-none"&gt;Roman&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 09 Jan 2024 13:17:15 GMT</pubDate>
    <dc:creator>Roman_Kats</dc:creator>
    <dc:date>2024-01-09T13:17:15Z</dc:date>
    <item>
      <title>Check Point Cloud FW on AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Check-Point-Cloud-FW-on-AWS/m-p/202452#M4523</link>
      <description>&lt;P&gt;Hi Checkmates,&lt;/P&gt;&lt;P&gt;We are currently redesigning cloud security adoption on AWS, especially in the area of ​​network security.&lt;/P&gt;&lt;P&gt;From the &lt;A href="https://support.checkpoint.com/results/sk/sk111013" target="_self"&gt;architecture blueprint owned by Check Point&lt;/A&gt; and adapting it to the internal design, we see that there are 2 potential designs that we can use:&lt;BR /&gt;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_Network_for_AWS_Gateway_Load_Balancer_ASG/Content/Topics-AWS-GWLB-ASG-DG/Introduction.htm" target="_self"&gt;CloudGuard Network for AWS Auto Scale Group with Transit Gateway&lt;/A&gt; and &lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_for_AWS_Cross_AZ_Cluster/Content/Topics-AWS-CrossAZ-Cluster-DG/Deployment-Steps-CrossAZ-Cluster.htm?tocpath=Deploying%20CloudGuard%20Network%20Cross%20AZ%20Cluster%20in%20AWS%7C_____0#Deploying_CloudGuard_Network_Cross_AZ_Cluster_in_AWS" target="_self"&gt;CloudGuard Network for AWS Cross Availability Zone Cluster with Transit Gateway&lt;/A&gt;, because we use TGW to connect from Direct Connect and 2 VPCs.&lt;/P&gt;&lt;P&gt;After reading the admin guide, I am still unsure which of the two designs above is suitable for our needs.&lt;/P&gt;&lt;P&gt;Do you guys have any suggestions from Checkmates regarding which design is suitable for us? and what is the difference between the two?&lt;/P&gt;&lt;P&gt;Our situation :&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;TGW enable&lt;/LI&gt;&lt;LI&gt;Traffic from DX&lt;/LI&gt;&lt;LI&gt;2 VPCs&lt;/LI&gt;&lt;LI&gt;Access from internal and external (public)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2024 12:54:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Check-Point-Cloud-FW-on-AWS/m-p/202452#M4523</guid>
      <dc:creator>tropicanaslim</dc:creator>
      <dc:date>2024-01-08T12:54:13Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Cloud FW on AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Check-Point-Cloud-FW-on-AWS/m-p/202466#M4524</link>
      <description>&lt;P&gt;The main difference between Cross-AZ Cluster and AutoScale is VPN.&lt;/P&gt;
&lt;P&gt;If you require the CloudGuard Gateways to act as a VPN termination device, then Cross-AZ Cluster is the way to go.&lt;/P&gt;
&lt;P&gt;Otherwise, the AutoScale solution would be recommended.&lt;BR /&gt;&lt;BR /&gt;For a comparison of Public Cloud solutions, please see&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk178668" target="_self"&gt;sk178668&lt;/A&gt;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2024 13:48:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Check-Point-Cloud-FW-on-AWS/m-p/202466#M4524</guid>
      <dc:creator>avivs</dc:creator>
      <dc:date>2024-01-08T13:48:02Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Cloud FW on AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Check-Point-Cloud-FW-on-AWS/m-p/202482#M4526</link>
      <description>&lt;P&gt;More details about your specific requirements and what you're trying to achieve might help.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2024 14:20:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Check-Point-Cloud-FW-on-AWS/m-p/202482#M4526</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-01-08T14:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Cloud FW on AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Check-Point-Cloud-FW-on-AWS/m-p/202574#M4537</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/37680"&gt;@avivs&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thank you for the answer and suggestions..&amp;nbsp;CMIIW, means both can be used to protect N/S and E/S traffic, right? and the most obvious difference is only from the VPN side?&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 07:23:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Check-Point-Cloud-FW-on-AWS/m-p/202574#M4537</guid>
      <dc:creator>tropicanaslim</dc:creator>
      <dc:date>2024-01-09T07:23:59Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Cloud FW on AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Check-Point-Cloud-FW-on-AWS/m-p/202575#M4538</link>
      <description>&lt;P&gt;Hi PhoneBoy,&lt;/P&gt;&lt;P&gt;Sorry if my question is not clear enough. The goals is protecting for E/W and N/S traffic&amp;nbsp;that passes through the transit gateway from public, internal via DX.&lt;/P&gt;&lt;P&gt;I see there are 2 suitable solutions as per my post, but I'm looking for which option is the best.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 07:26:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Check-Point-Cloud-FW-on-AWS/m-p/202575#M4538</guid>
      <dc:creator>tropicanaslim</dc:creator>
      <dc:date>2024-01-09T07:26:14Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Cloud FW on AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Check-Point-Cloud-FW-on-AWS/m-p/202599#M4539</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/73681"&gt;@tropicanaslim&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The recommended solution for E/W and N/S is Gateway Load Balancer Autoscaling.&lt;BR /&gt;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_Network_for_AWS_Gateway_Load_Balancer_ASG/Default.htm" target="_blank"&gt;Admin guide: https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_Network_for_AWS_Gateway_Load_Balancer_ASG/Default.htm&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;Workshop:&lt;/P&gt;
&lt;P lang="x-none"&gt;&lt;A href="https://unrivaled-melba-1a81a6.netlify.app/" target="_blank"&gt;https://unrivaled-melba-1a81a6.netlify.app/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;In case Site to Site VPN is required the Cross AZ Cluster should be added to architecture.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P lang="x-none"&gt;Roman&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 13:17:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Check-Point-Cloud-FW-on-AWS/m-p/202599#M4539</guid>
      <dc:creator>Roman_Kats</dc:creator>
      <dc:date>2024-01-09T13:17:15Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Cloud FW on AWS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Check-Point-Cloud-FW-on-AWS/m-p/203983#M4561</link>
      <description>&lt;P&gt;In place of the unrivaled melba link above please use this one &amp;gt;&amp;nbsp;&lt;A href="https://checkpoint.awsworkshop.io/" target="_self"&gt;https://checkpoint.awsworkshop.io/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/73681"&gt;@tropicanaslim&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 16:23:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Check-Point-Cloud-FW-on-AWS/m-p/203983#M4561</guid>
      <dc:creator>Jeff_Engel</dc:creator>
      <dc:date>2024-01-23T16:23:04Z</dc:date>
    </item>
  </channel>
</rss>

