<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Policy not matching AWS Data Center Objects in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Policy-not-matching-AWS-Data-Center-Objects/m-p/210349#M4699</link>
    <description>&lt;P&gt;Look in $FWDIR/log/cloud_proxy.elg on the mgmt server - do you see updates being sent to the cluster gw?&lt;/P&gt;</description>
    <pubDate>Wed, 03 Apr 2024 12:21:16 GMT</pubDate>
    <dc:creator>Gil_Sudai</dc:creator>
    <dc:date>2024-04-03T12:21:16Z</dc:date>
    <item>
      <title>Policy not matching AWS Data Center Objects</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Policy-not-matching-AWS-Data-Center-Objects/m-p/210337#M4698</link>
      <description>&lt;P&gt;Hi CheckMates,&lt;/P&gt;&lt;P&gt;I am experiencing an issue where one set of gateways is not matching access rules where AWS DataCenter objects are used but another set of gateways with a separate policy are matching traffic and permitting against AWS DataCenter objects.&lt;/P&gt;&lt;P&gt;I have a AWS deployment where an Cross AZ Cluster, Auto Scaled Gateways and EC2 Manager all reside in separate VPCs and are peered via transit gateway. Identity Awareness is configured as per admin guide yet only one set of gateways (autoscaled) are matching traffic for the objects. The clustered gateways fail to permit traffic where AWS DC objects are used - if i replace the AWS object with a standard address object the traffic is permitted.&lt;/P&gt;&lt;P&gt;Can anyone advise on how I can troubleshoot/debug this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2024 10:52:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Policy-not-matching-AWS-Data-Center-Objects/m-p/210337#M4698</guid>
      <dc:creator>cdav</dc:creator>
      <dc:date>2024-04-03T10:52:32Z</dc:date>
    </item>
    <item>
      <title>Re: Policy not matching AWS Data Center Objects</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Policy-not-matching-AWS-Data-Center-Objects/m-p/210349#M4699</link>
      <description>&lt;P&gt;Look in $FWDIR/log/cloud_proxy.elg on the mgmt server - do you see updates being sent to the cluster gw?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2024 12:21:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Policy-not-matching-AWS-Data-Center-Objects/m-p/210349#M4699</guid>
      <dc:creator>Gil_Sudai</dc:creator>
      <dc:date>2024-04-03T12:21:16Z</dc:date>
    </item>
    <item>
      <title>Re: Policy not matching AWS Data Center Objects</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Policy-not-matching-AWS-Data-Center-Objects/m-p/210361#M4700</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7211"&gt;@Gil_Sudai&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes i can see that it is failing to send the updates to the clusters EIP. Is it possible for these updates to go to the private addresses of the Cross AZ cluster and not the EIP? I do not wish for the communication between manager and gateways to go via the internet.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2024 14:21:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Policy-not-matching-AWS-Data-Center-Objects/m-p/210361#M4700</guid>
      <dc:creator>cdav</dc:creator>
      <dc:date>2024-04-03T14:21:34Z</dc:date>
    </item>
    <item>
      <title>Re: Policy not matching AWS Data Center Objects</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Policy-not-matching-AWS-Data-Center-Objects/m-p/210370#M4701</link>
      <description>&lt;P&gt;what IP address is configured on the Cluster object ? is it the Cluster EIP ?&lt;/P&gt;
&lt;P&gt;updates are send to the GW/Cluster object IP address.&lt;/P&gt;
&lt;P&gt;you can change it , check&amp;nbsp;sk60701&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2024 15:42:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Policy-not-matching-AWS-Data-Center-Objects/m-p/210370#M4701</guid>
      <dc:creator>Nir_Shamir</dc:creator>
      <dc:date>2024-04-03T15:42:23Z</dc:date>
    </item>
    <item>
      <title>Re: Policy not matching AWS Data Center Objects</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Policy-not-matching-AWS-Data-Center-Objects/m-p/210409#M4702</link>
      <description>&lt;P&gt;Yes the IP in the cluster object is the public EIP. Am i able to change it in the database for one or both of the cross-az gateways? I would like this communication to happen privately not via public internet.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2024 07:19:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Policy-not-matching-AWS-Data-Center-Objects/m-p/210409#M4702</guid>
      <dc:creator>cdav</dc:creator>
      <dc:date>2024-04-04T07:19:32Z</dc:date>
    </item>
    <item>
      <title>Re: Policy not matching AWS Data Center Objects</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Policy-not-matching-AWS-Data-Center-Objects/m-p/210417#M4703</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Yes, check :&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_CloudGuard_Controller_AdminGuide/Content/Topics-CGRDG/Configuration-Parameters.htm?Highlight=updateClusterMemberAndNotVip" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_CloudGuard_Controller_AdminGuide/Content/Topics-CGRDG/Configuration-Parameters.htm?Highlight=updateClusterMemberAndNotVip&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;# In version R81.20 with Jumbo HFA Take 26 and higher:&lt;BR /&gt;# Send Data Center updates from the CloudGuard Controller to the main IP address of Active member&lt;BR /&gt;# on the Management Plane instead of the cluster VIP address on the Data Plane&lt;BR /&gt;&lt;SPAN class="SearchHighlight SearchHighlight1"&gt;updateClusterMemberAndNotVip&lt;/SPAN&gt;=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;I&amp;nbsp;think&amp;nbsp;this&amp;nbsp;can&amp;nbsp;help&amp;nbsp;you&amp;nbsp;here&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2024 09:09:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Policy-not-matching-AWS-Data-Center-Objects/m-p/210417#M4703</guid>
      <dc:creator>Nir_Shamir</dc:creator>
      <dc:date>2024-04-04T09:09:30Z</dc:date>
    </item>
    <item>
      <title>Re: Policy not matching AWS Data Center Objects</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Policy-not-matching-AWS-Data-Center-Objects/m-p/210420#M4704</link>
      <description>&lt;P&gt;Which version is your mgmt server?&lt;/P&gt;
&lt;P&gt;If R81.20 , look for&amp;nbsp;PRJ-43926 in&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/Jumbo_HFA/R81.20/R81.20/R81.20-List-of-all-Resolved-Issues.htm?tocpath=_____4" target="_blank"&gt;https://sc1.checkpoint.com/documents/Jumbo_HFA/R81.20/R81.20/R81.20-List-of-all-Resolved-Issues.htm?tocpath=_____4&lt;/A&gt;&amp;nbsp;.&lt;/P&gt;
&lt;P&gt;From take 26 you can update the CloudGuard Controller config option to push the updated to the cluster member and not to the VIP.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2024 09:01:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Policy-not-matching-AWS-Data-Center-Objects/m-p/210420#M4704</guid>
      <dc:creator>Gil_Sudai</dc:creator>
      <dc:date>2024-04-04T09:01:19Z</dc:date>
    </item>
    <item>
      <title>Re: Policy not matching AWS Data Center Objects</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Policy-not-matching-AWS-Data-Center-Objects/m-p/210425#M4705</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1792"&gt;@Nir_Shamir&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7211"&gt;@Gil_Sudai&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you both for you input. I am running R81.20 for management. I will check the above inline with what you've mentioned/referenced and see if I can resolve.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2024 09:30:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Policy-not-matching-AWS-Data-Center-Objects/m-p/210425#M4705</guid>
      <dc:creator>cdav</dc:creator>
      <dc:date>2024-04-04T09:30:48Z</dc:date>
    </item>
    <item>
      <title>Re: Policy not matching AWS Data Center Objects</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Policy-not-matching-AWS-Data-Center-Objects/m-p/210434#M4706</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1792"&gt;@Nir_Shamir&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7211"&gt;@Gil_Sudai&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its working for me now. Added the config line to vsec.conf and upgraded to the jumbo 53 anyway.&lt;/P&gt;&lt;P&gt;Thank you again!&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2024 11:28:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Policy-not-matching-AWS-Data-Center-Objects/m-p/210434#M4706</guid>
      <dc:creator>cdav</dc:creator>
      <dc:date>2024-04-04T11:28:09Z</dc:date>
    </item>
  </channel>
</rss>

