<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cloudguard cluster interface configuration in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-cluster-interface-configuration/m-p/216524#M4808</link>
    <description>&lt;P&gt;thanks so much !!!&lt;/P&gt;</description>
    <pubDate>Wed, 05 Jun 2024 13:27:15 GMT</pubDate>
    <dc:creator>Gongya_Yu</dc:creator>
    <dc:date>2024-06-05T13:27:15Z</dc:date>
    <item>
      <title>Cloudguard cluster interface configuration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-cluster-interface-configuration/m-p/216146#M4801</link>
      <description>&lt;P&gt;In the following cluster interface configuration, does eth1 pass the data traffic ?&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CP-cluster-int-conf.PNG" style="width: 823px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26030i2195C5E4926505DE/image-size/large?v=v2&amp;amp;px=999" role="button" title="CP-cluster-int-conf.PNG" alt="CP-cluster-int-conf.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;if I have two route tables, one for eth0 and the other one for eth1. one route table for eth0 with a default route pointing to eni-eth0 and subnet association with 172.16.11.0/24, the other route table for eth1 with a default route pointing to eni-eth1 and subnet association with 172.16.10.0/24. Any issue with this ?&lt;BR /&gt;&lt;BR /&gt;thanks so much !!&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 04:18:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-cluster-interface-configuration/m-p/216146#M4801</guid>
      <dc:creator>Gongya_Yu</dc:creator>
      <dc:date>2024-06-03T04:18:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudguard cluster interface configuration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-cluster-interface-configuration/m-p/216198#M4802</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I could answer better if you may share more details. "Leads To" writes to Azure but ENI is AWS term while in Azure we usually route to load balancer.&amp;nbsp;Some of the configuration also depends on version.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In general, the default route to ENI directs all traffic to be inspected. All traffic directed at your VPC/VNET through the front end subnet will be directed to the solution. For backend, putting ENI as default for internal subnets will ensure EW inspection as well as NS.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 10:50:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-cluster-interface-configuration/m-p/216198#M4802</guid>
      <dc:creator>Amir_Senn</dc:creator>
      <dc:date>2024-06-03T10:50:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudguard cluster interface configuration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-cluster-interface-configuration/m-p/216251#M4803</link>
      <description>&lt;P&gt;I have the following which is very close to our prod.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="eth-int-topology.PNG" style="width: 795px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26050i14F90086D9702B00/image-size/large?v=v2&amp;amp;px=999" role="button" title="eth-int-topology.PNG" alt="eth-int-topology.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="eth-RT.PNG" style="width: 456px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26051i7FFDC4E4F6122654/image-size/large?v=v2&amp;amp;px=999" role="button" title="eth-RT.PNG" alt="eth-RT.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Right now the firewall works as one-armed.&lt;/P&gt;&lt;P&gt;Question 1: if the interface is defined to be sync only, does that interface still pass data traffic ?&lt;BR /&gt;Question 2: when is eth1-RT used ?&amp;nbsp; I am wondering eth1-RT is not used here at all.&lt;BR /&gt;&lt;BR /&gt;thanks a lot !!&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 16:12:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-cluster-interface-configuration/m-p/216251#M4803</guid>
      <dc:creator>Gongya_Yu</dc:creator>
      <dc:date>2024-06-03T16:12:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudguard cluster interface configuration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-cluster-interface-configuration/m-p/216322#M4804</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;yes , sync interfaces also pass data traffic. if they are configured as sync the the connections sync is also passing on those interfaces.&lt;/P&gt;
&lt;P&gt;you routing configuration is not correct. you should only have one default route (towards eth0 GW). You need to delete the other default route because it will cause routing issues (traffic is spread to both interfaces).&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 09:09:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-cluster-interface-configuration/m-p/216322#M4804</guid>
      <dc:creator>Nir_Shamir</dc:creator>
      <dc:date>2024-06-04T09:09:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudguard cluster interface configuration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-cluster-interface-configuration/m-p/216350#M4805</link>
      <description>&lt;P&gt;thanks a million.&lt;/P&gt;&lt;P&gt;This is what I like to confirm.&amp;nbsp;&lt;BR /&gt;Even though we did not get any issue, I still like to confirm the correct way to do.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks again !!&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 12:05:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-cluster-interface-configuration/m-p/216350#M4805</guid>
      <dc:creator>Gongya_Yu</dc:creator>
      <dc:date>2024-06-04T12:05:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudguard cluster interface configuration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-cluster-interface-configuration/m-p/216426#M4806</link>
      <description>&lt;P&gt;One more question to bother, for the cluster, still only one default route is needed ? If default route points to Member A interface for next-hop, what happens if member A fails ?&lt;/P&gt;&lt;P&gt;thanks a lot !!&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 18:21:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-cluster-interface-configuration/m-p/216426#M4806</guid>
      <dc:creator>Gongya_Yu</dc:creator>
      <dc:date>2024-06-04T18:21:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudguard cluster interface configuration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-cluster-interface-configuration/m-p/216451#M4807</link>
      <description>&lt;P&gt;in AWS Cluster the default is pointing to the ACTIVE member of the cluster. when there's a failover happens we push out an API to AWS and change the default route to the new ACTIVE member.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 05:11:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-cluster-interface-configuration/m-p/216451#M4807</guid>
      <dc:creator>Nir_Shamir</dc:creator>
      <dc:date>2024-06-05T05:11:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cloudguard cluster interface configuration</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-cluster-interface-configuration/m-p/216524#M4808</link>
      <description>&lt;P&gt;thanks so much !!!&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 13:27:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloudguard-cluster-interface-configuration/m-p/216524#M4808</guid>
      <dc:creator>Gongya_Yu</dc:creator>
      <dc:date>2024-06-05T13:27:15Z</dc:date>
    </item>
  </channel>
</rss>

