<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Newly deployed AWS Security Gateway installs policy but times out on SMS in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225800#M4950</link>
    <description>&lt;P&gt;Hello Amir,&lt;BR /&gt;&lt;BR /&gt;Thank you very much for the comments, these previews of future versions are appreciated to comment to our customers about new developments.&lt;/P&gt;&lt;P&gt;Greetings to all!&lt;/P&gt;</description>
    <pubDate>Thu, 05 Sep 2024 15:40:28 GMT</pubDate>
    <dc:creator>israelsc</dc:creator>
    <dc:date>2024-09-05T15:40:28Z</dc:date>
    <item>
      <title>Newly deployed AWS Security Gateway installs policy but times out on SMS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225710#M4939</link>
      <description>&lt;P&gt;Hello everyone,&lt;BR /&gt;I hope you are doing well.&lt;/P&gt;&lt;P&gt;Yesterday we deployed a Security Gateway on AWS for one of our customers.&lt;BR /&gt;We complete the configuration (hostname, DNS, NTP, etc) and configured a new policy package for the firewall.&lt;/P&gt;&lt;P&gt;When we installed the policy, we monitored with “fw stat” on the firewall and observed that the policy was installed, but on the SmartConsole side we got a policy installation error.&lt;/P&gt;&lt;P&gt;In the firewall, we observe that the policy is installed:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fw.png" style="width: 502px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27503i8722BC0BA68F33A7/image-dimensions/502x108?v=v2" width="502" height="108" role="button" title="fw.png" alt="fw.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;In the SMS we see the following error when the policy installation timeout is reached:&lt;/P&gt;&lt;P&gt;Gateway: AWS-Gateway&lt;BR /&gt;Policy: Policy-package&lt;BR /&gt;Status: Failed&lt;BR /&gt;- Installation failed. Reason: Due to a timeout value of 600000 (millisecond) (port=18191) (IP=x.x.x.x), Security Management Server aborted the connection with the peer.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sms.png" style="width: 884px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27505iBAE66946723AB525/image-dimensions/884x451?v=v2" width="884" height="451" role="button" title="sms.png" alt="sms.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;We found the following SK but it only mentions that there may be a slow connection between the SMS and Firewall and therefore the timeout&lt;BR /&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk138172" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk138172&lt;/A&gt;&lt;/P&gt;&lt;P&gt;But this is strange, because it is a firewall that we just implemented yesterday and we have not been able to register with the Management Server. And also, it is outbound with IGW from AWS, which makes us almost rule out that it is a network speed issue.&lt;/P&gt;&lt;P&gt;Security Gateway has the latest JHF: JHF GA Take 156&lt;BR /&gt;Management Server has JHF: JHF GA Take 129&lt;/P&gt;&lt;P&gt;I have tried to reset SIC but I get the same result.&lt;/P&gt;&lt;P&gt;What else can I do?&lt;BR /&gt;Would it be worth to align the JHF version between SMS and FW?&lt;BR /&gt;What else can we check?&lt;/P&gt;&lt;P&gt;Greetings to all!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; &lt;/P&gt;</description>
      <pubDate>Wed, 04 Sep 2024 21:03:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225710#M4939</guid>
      <dc:creator>israelsc</dc:creator>
      <dc:date>2024-09-04T21:03:26Z</dc:date>
    </item>
    <item>
      <title>Re: Newly deployed AWS Security Gateway installs policy but times out on SMS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225711#M4940</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/57441"&gt;@israelsc&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Where is your Security Management deployed?&amp;nbsp; It is likely that there is an NSG blocking or that your Mgmt is behind NAT which we need to account for.&lt;/P&gt;
&lt;P&gt;Best Regards!&lt;/P&gt;
&lt;P&gt;Jeff&lt;/P&gt;</description>
      <pubDate>Wed, 04 Sep 2024 21:19:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225711#M4940</guid>
      <dc:creator>Jeff_Engel</dc:creator>
      <dc:date>2024-09-04T21:19:03Z</dc:date>
    </item>
    <item>
      <title>Re: Newly deployed AWS Security Gateway installs policy but times out on SMS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225713#M4941</link>
      <description>&lt;P&gt;Hello Jeff!&lt;BR /&gt;&lt;BR /&gt;SMS is deployed on AWS as well&lt;BR /&gt;The IP that appears in SmartConsole for the SMS object, is the private IP of the Public subnet of that VPC.&lt;BR /&gt;and we reach that SMS by SmartConsole through the public IP that is managed in AWS and linked to that private IP.&lt;BR /&gt;In the SMS object in SmartConsole, there is no NAT configuration for that private IP &amp;lt;=&amp;gt; Public IP relationship.&lt;/P&gt;&lt;P&gt;It is worth mentioning that, the SMS is in a VPC in one AWS Account and the firewall is in another VPC in another AWS Account.&lt;/P&gt;&lt;P&gt;The firewall has its own Public IP and reaches the SMS through the public IP of the SMS.&lt;/P&gt;&lt;P&gt;On the Check Point side is there anything else I can check?&lt;BR /&gt;I comment because the customer is the one who has access to AWS and would have to ask him to check the NGS, although I do not think it is necessary because, there are already other AutoScaling GW also from AWS managed by this same SMS and these firewalls if they work well, the problem is only with this new firewall.&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Sep 2024 21:37:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225713#M4941</guid>
      <dc:creator>israelsc</dc:creator>
      <dc:date>2024-09-04T21:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: Newly deployed AWS Security Gateway installs policy but times out on SMS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225720#M4942</link>
      <description>&lt;P&gt;Couple of basic questions that might help pinpoint the issue.&amp;nbsp; Are you getting logs from the firewalls?&amp;nbsp; I assume no?&lt;/P&gt;
&lt;P&gt;The working Autoscaling GWs are likely also in a separate VPC than the new GW?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 01:25:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225720#M4942</guid>
      <dc:creator>Jeff_Engel</dc:creator>
      <dc:date>2024-09-05T01:25:55Z</dc:date>
    </item>
    <item>
      <title>Re: Newly deployed AWS Security Gateway installs policy but times out on SMS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225723#M4943</link>
      <description>&lt;P&gt;Hello Jeff,&lt;/P&gt;&lt;P&gt;We only received logs from the AutoScaling GWs, they are working correctly since their deployment.&lt;BR /&gt;We do not receive logs from the new AWS Single Security Gateway (the new firewall).&lt;/P&gt;&lt;P&gt;The Autoscaling GWs and the SMS are in the same VPC.&lt;BR /&gt;In fact we use this CFT template to deploy those appliances:&lt;BR /&gt;&amp;gt;&amp;gt;"AWS CloudFormation Templates - &lt;A href="https://support.checkpoint.com/results/sk/sk111013" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk111013&lt;/A&gt;"&lt;BR /&gt;&amp;gt;&amp;gt;Section: CloudGuard Network for AWS Auto Scale Group&lt;BR /&gt;&amp;gt;&amp;gt; Deploys an Auto Scaling group of Security Gateways into an existing VPC.&lt;BR /&gt;&amp;gt;&amp;gt; Launc Stack: &lt;A href="https://console.aws.amazon.com/cloudformation/home#/stacks/create/review?templateURL=https://cgi-cfts.s3.amazonaws.com/autoscale/autoscale.yaml&amp;amp;stackName=Check-Point-Security-Gateway-AutoScaling" target="_blank"&gt;https://console.aws.amazon.com/cloudformation/home#/stacks/create/review?templateURL=https://cgi-cfts.s3.amazonaws.com/autoscale/autoscale.yaml&amp;amp;stackName=Check-Point-Security-Gateway-AutoScaling&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Regards!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;For the simple AWS Security Gateway, we use the CFT:&lt;BR /&gt;&amp;gt;&amp;gt; Section: CloudGuard Network for AWS Single Gateway&lt;BR /&gt;&amp;gt;&amp;gt; Deploys a Security Gateway into an existing VPC.&lt;BR /&gt;&amp;gt;&amp;gt; Launch Stack: &lt;A href="https://console.aws.amazon.com/cloudformation/home#/stacks/create/review?templateURL=https://cgi-cfts.s3.amazonaws.com/gateway/gateway.yaml&amp;amp;stackName=Check-Point-Gateway" target="_blank"&gt;https://console.aws.amazon.com/cloudformation/home#/stacks/create/review?templateURL=https://cgi-cfts.s3.amazonaws.com/gateway/gateway.yaml&amp;amp;stackName=Check-Point-Gateway&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This is why:&lt;BR /&gt;-SMS and AutoScaling GWs are in one VPC.&lt;BR /&gt;-Firewall is in another VPC&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 01:36:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225723#M4943</guid>
      <dc:creator>israelsc</dc:creator>
      <dc:date>2024-09-05T01:36:02Z</dc:date>
    </item>
    <item>
      <title>Re: Newly deployed AWS Security Gateway installs policy but times out on SMS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225726#M4944</link>
      <description>&lt;P&gt;I cant say I had ever seen scenario like that, whether be on prem mgmt, cloud one, Azure or AWS, its first one for me. Personally, I would make sure there is communication between mgmt/gateway, because its strange SIC issue comes up, yet from command line, as you showed, fw stat indicates updated policy.&lt;/P&gt;
&lt;P&gt;Just wondering, can you make full bidirectional rule for mgmt/gw access for any service and try apply that policy see what happens?&lt;/P&gt;
&lt;P&gt;Something like src : gw + mgmt, dst - same as src, service any, accept, log&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 02:32:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225726#M4944</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-09-05T02:32:49Z</dc:date>
    </item>
    <item>
      <title>Re: Newly deployed AWS Security Gateway installs policy but times out on SMS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225729#M4945</link>
      <description>&lt;P&gt;Ok, I have similar setup in one of my labs.&amp;nbsp; The new firewall must have an allow all NSG for inbound and outbound traffic since we are trusting it to be a proper firewall anyway.&amp;nbsp; Secondly, you need to create a dummy Check Point Host object (I usually call it Mgmt-Logger) , enable Logging &amp;amp; Status on it, and set it's IP address to be the Public IP address aliased to your Security Mgmt server.&lt;/P&gt;
&lt;P&gt;Then, for that new GW you need to edit its Logs properties to point at this dummy object so that logs and alerts can make it back to Security Management.&lt;/P&gt;
&lt;P&gt;Hope that makes some sense.&amp;nbsp; I can provide screenshots if needed.&lt;/P&gt;
&lt;P&gt;BR!&lt;/P&gt;
&lt;P&gt;Jeff&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 03:45:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225729#M4945</guid>
      <dc:creator>Jeff_Engel</dc:creator>
      <dc:date>2024-09-05T03:45:33Z</dc:date>
    </item>
    <item>
      <title>Re: Newly deployed AWS Security Gateway installs policy but times out on SMS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225730#M4946</link>
      <description>&lt;P&gt;Hi Jeff,&lt;BR /&gt;Sounds good to try.&lt;/P&gt;&lt;P&gt;It would be very helpful if you could help me to share the AWS NSG settings and the checkpoint configuration regarding the dummy object.&lt;BR /&gt;&lt;BR /&gt;I would appreciate it very much&lt;BR /&gt;Best regards.!&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 04:06:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225730#M4946</guid>
      <dc:creator>israelsc</dc:creator>
      <dc:date>2024-09-05T04:06:31Z</dc:date>
    </item>
    <item>
      <title>Re: Newly deployed AWS Security Gateway installs policy but times out on SMS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225734#M4947</link>
      <description>&lt;P&gt;Here are the Check Point dummy object configurations for logging and return communications to Security Mgmt...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="2024-09-04 23_11_08-Check Point Host - Mgmt-Logger.png" style="width: 756px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27507iE8BAB632A71E847A/image-size/large?v=v2&amp;amp;px=999" role="button" title="2024-09-04 23_11_08-Check Point Host - Mgmt-Logger.png" alt="2024-09-04 23_11_08-Check Point Host - Mgmt-Logger.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="2024-09-04 23_13_07-Check Point Gateway - GW.png" style="width: 759px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27506i8EE4EA55E69F55D7/image-size/large?v=v2&amp;amp;px=999" role="button" title="2024-09-04 23_13_07-Check Point Gateway - GW.png" alt="2024-09-04 23_13_07-Check Point Gateway - GW.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A security group should exist that is exclusive to the GW as it is wide open like this...not a great screenshot but I think you will understand.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="2024-09-04 23_24_22-Instance details _ EC2 _ us-east-1.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27508i5877B334FEE96AB9/image-size/large?v=v2&amp;amp;px=999" role="button" title="2024-09-04 23_24_22-Instance details _ EC2 _ us-east-1.png" alt="2024-09-04 23_24_22-Instance details _ EC2 _ us-east-1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 04:28:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225734#M4947</guid>
      <dc:creator>Jeff_Engel</dc:creator>
      <dc:date>2024-09-05T04:28:50Z</dc:date>
    </item>
    <item>
      <title>Re: Newly deployed AWS Security Gateway installs policy but times out on SMS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225735#M4948</link>
      <description>&lt;P&gt;Hi Jeff, that's the solution!&lt;/P&gt;&lt;P&gt;I created the dummy object as you said and I see that now I can install policies without problems and also, the firewall is already showed correctly in the SMS.&lt;/P&gt;&lt;P&gt;Thank you very much for your help!&lt;BR /&gt;Best regards.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 05:00:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225735#M4948</guid>
      <dc:creator>israelsc</dc:creator>
      <dc:date>2024-09-05T05:00:06Z</dc:date>
    </item>
    <item>
      <title>Re: Newly deployed AWS Security Gateway installs policy but times out on SMS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225745#M4949</link>
      <description>&lt;P&gt;On the upcoming version we'll have a new feature called MGMT behind NAT that will add new options for defining NAT IPs that is very suitable for AWS gateways. Main issue is that if not all component on the same VPC, you might have a situation that some of the resources need to communicate with private IP and some with public IP.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 08:33:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225745#M4949</guid>
      <dc:creator>Amir_Senn</dc:creator>
      <dc:date>2024-09-05T08:33:02Z</dc:date>
    </item>
    <item>
      <title>Re: Newly deployed AWS Security Gateway installs policy but times out on SMS</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225800#M4950</link>
      <description>&lt;P&gt;Hello Amir,&lt;BR /&gt;&lt;BR /&gt;Thank you very much for the comments, these previews of future versions are appreciated to comment to our customers about new developments.&lt;/P&gt;&lt;P&gt;Greetings to all!&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 15:40:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Newly-deployed-AWS-Security-Gateway-installs-policy-but-times/m-p/225800#M4950</guid>
      <dc:creator>israelsc</dc:creator>
      <dc:date>2024-09-05T15:40:28Z</dc:date>
    </item>
  </channel>
</rss>

