<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CloudGuard IaaS HA BGP Setup with Azure Route Server in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-IaaS-HA-BGP-Setup-with-Azure-Route-Server/m-p/232492#M5041</link>
    <description>&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Does anyone have a working BGP configuration for peering a CloudGuard IaaS HA setup with an Azure Route Server that they could share?&lt;/P&gt;&lt;P&gt;I'm deploying Azure VMware Solution (AVS) in Azure, which requires BGP peering between my CloudGuard IaaS HA setup and an Azure Route Server in the AVS connectivity hub. I believe the solution involves two main components: (1) establishing BGP peering with the Azure Route Server and (2) configuring the route map correctly.&lt;/P&gt;&lt;P&gt;I've reviewed the Advanced Routing Guide and the Deep Dive article &lt;EM&gt;"CloudGuard + Azure Route Server = Easier Security Administration"&lt;/EM&gt;, but I'm still struggling to get the configuration working as needed. I currently have a TAC case open, hoping they might provide additional documentation that lays out a complete solution in one place, but I haven’t found anything comprehensive so far.&lt;/P&gt;&lt;P&gt;Any guidance, or an example configuration, would be greatly appreciated. Thank you!&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Nov 2024 21:18:45 GMT</pubDate>
    <dc:creator>Ave_Joe</dc:creator>
    <dc:date>2024-11-12T21:18:45Z</dc:date>
    <item>
      <title>CloudGuard IaaS HA BGP Setup with Azure Route Server</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-IaaS-HA-BGP-Setup-with-Azure-Route-Server/m-p/232492#M5041</link>
      <description>&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Does anyone have a working BGP configuration for peering a CloudGuard IaaS HA setup with an Azure Route Server that they could share?&lt;/P&gt;&lt;P&gt;I'm deploying Azure VMware Solution (AVS) in Azure, which requires BGP peering between my CloudGuard IaaS HA setup and an Azure Route Server in the AVS connectivity hub. I believe the solution involves two main components: (1) establishing BGP peering with the Azure Route Server and (2) configuring the route map correctly.&lt;/P&gt;&lt;P&gt;I've reviewed the Advanced Routing Guide and the Deep Dive article &lt;EM&gt;"CloudGuard + Azure Route Server = Easier Security Administration"&lt;/EM&gt;, but I'm still struggling to get the configuration working as needed. I currently have a TAC case open, hoping they might provide additional documentation that lays out a complete solution in one place, but I haven’t found anything comprehensive so far.&lt;/P&gt;&lt;P&gt;Any guidance, or an example configuration, would be greatly appreciated. Thank you!&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Nov 2024 21:18:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-IaaS-HA-BGP-Setup-with-Azure-Route-Server/m-p/232492#M5041</guid>
      <dc:creator>Ave_Joe</dc:creator>
      <dc:date>2024-11-12T21:18:45Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard IaaS HA BGP Setup with Azure Route Server</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-IaaS-HA-BGP-Setup-with-Azure-Route-Server/m-p/232513#M5043</link>
      <description>&lt;P&gt;Talked to the one and only&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3402"&gt;@Gustavo_Coronel&lt;/a&gt;&amp;nbsp; and here is what he had to say...we are also more than happy to set up a direct call to discuss further in detail.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I can’t be 100% sure unless I see a diagram.&lt;/P&gt;
&lt;P&gt;BUT… If it is a standard AVS connection using Express Route (and Global Reach to connect the on-prem networks), all you need to do is advertise the CloudGuard ILB IP as the default route into the ARS.&lt;/P&gt;
&lt;P&gt;The screenshot below is from the deep dive&amp;nbsp;CloudGuard + Azure Route Server = Easier Security Administration video and it includes the pertinent (Advertise ILB as next hop for Default Gateway)&amp;nbsp;route map.&lt;/P&gt;
&lt;P&gt;Replace the IPs on the screenshot with the correct ones and make sure the BGP peering with the ARS is established (AND that the ARS has "Branch to Branch” enabled).&lt;/P&gt;
&lt;P&gt;It is on the video.&lt;/P&gt;
&lt;P&gt;If you have a different architecture, then it may be different, but can’t say without looking at a diagram.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Jeff_Engel_0-1731454944071.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28442i64592241804ECE84/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Jeff_Engel_0-1731454944071.png" alt="Jeff_Engel_0-1731454944071.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Nov 2024 23:44:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-IaaS-HA-BGP-Setup-with-Azure-Route-Server/m-p/232513#M5043</guid>
      <dc:creator>Jeff_Engel</dc:creator>
      <dc:date>2024-11-12T23:44:01Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard IaaS HA BGP Setup with Azure Route Server</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-IaaS-HA-BGP-Setup-with-Azure-Route-Server/m-p/232660#M5047</link>
      <description>&lt;P&gt;Hi Jeff:&lt;/P&gt;&lt;P&gt;Here is the a diagram that represents what is trying to be done with BGP in my setup.&amp;nbsp; At this time the only path in and out of Azure is through the Cloud Guard HA gateway currently deployed.&amp;nbsp; An Express Route to the Data Center will be added later. &lt;/P&gt;&lt;P&gt;Take a look.&amp;nbsp; I can add any information that may be missing.&amp;nbsp; If a call makes more sense I am up for it.&lt;/P&gt;&lt;P&gt;Let me know.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure-BGP-Overview.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28456iD1730AC2D53C10F4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Azure-BGP-Overview.png" alt="Azure-BGP-Overview.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Wed, 13 Nov 2024 20:03:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-IaaS-HA-BGP-Setup-with-Azure-Route-Server/m-p/232660#M5047</guid>
      <dc:creator>Ave_Joe</dc:creator>
      <dc:date>2024-11-13T20:03:41Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard IaaS HA BGP Setup with Azure Route Server</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-IaaS-HA-BGP-Setup-with-Azure-Route-Server/m-p/232747#M5050</link>
      <description>&lt;P&gt;Where is the future ExpressRoute coming from OnPrem terminating?&lt;/P&gt;
&lt;P&gt;Hopefully, it will be terminating on the 10.111.0.0/24 VNET. Otherwise, you might be painting yourself into a corner.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If that is the plan, then the &lt;STRONG&gt;peering&lt;/STRONG&gt; between the CloudGuard VNET and the 10.111.0.0/24 VNET must be configured so that the CloudGuard VNET can use the Remote Gateways in 10.111.0.0/24.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If that is indeed the plan, all you need to do is:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Peer the CloudGuard HA members with the ARS in 10.111.0.0/24 using the eth0 interface for each member &amp;nbsp;(DO NOT USE THE VIP and &lt;STRONG&gt;DO NOT USE&lt;/STRONG&gt; eth1. The &lt;U&gt;only&lt;/U&gt; interface in our HA clusters that talks BGP by default is &lt;STRONG&gt;eth0&lt;/STRONG&gt;).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Enable Branch to Branch on the Route Server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Make sure that both members on the CloudGuard cluster have a default route defined on your internal static routes table.&lt;/P&gt;
&lt;P&gt;Create static route tables pointing to the ARS IPs (10.111.0.91/32 and 10.111.0.92/32) and make the next hop the first IP of the FRONTEND subnet.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since we are peering to eth0, we want the BGP reply to go out of eth0.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Make sure your rule base allows BGP traffic (TCP 179) between the ARS and the Cluster members&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sample Clish BGP Configuration:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;set as 65100&lt;SPAN&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt; &amp;nbsp;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&amp;lt;— Pick an unused AS number for the Check Points to use (65100 is an example)&lt;/P&gt;
&lt;P&gt;set router id 10.111.16.7&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&amp;lt;- For an HA cluster the router ID is always the cluster VIP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;set bgp external remote-as 65515 peer 10.111.0.91 on&lt;/P&gt;
&lt;P&gt;set bgp external remote-as 65515 peer 10.111.0.91 multihop on&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;set bgp external remote-as 65515 peer 10.111.0.92 on&lt;/P&gt;
&lt;P&gt;set bgp external remote-as 65515 peer 10.111.0.92 multihop on&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;set routemap bgp_export2ARS id 18 on&lt;/P&gt;
&lt;P&gt;set routemap bgp_export2ARS id 18 allow&lt;/P&gt;
&lt;P&gt;set routemap bgp_export2ARS id 18 match protocol static&lt;/P&gt;
&lt;P&gt;set routemap bgp_export2ARS id 18 match network 0.0.0.0/0 exact&lt;/P&gt;
&lt;P&gt;set routemap bgp_export2ARS id 18 action nexthop ip 10.111.18.250&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;set bgp external remote-as 65515 peer 10.111.0.91 export-routemap&amp;nbsp;bgp_export2ARS&amp;nbsp;preference 3 on&lt;/P&gt;
&lt;P&gt;set bgp external remote-as 65515 peer 10.111.0.92 export-routemap&amp;nbsp;bgp_export2ARS&amp;nbsp;preference 3 on&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;set routemap bgp_importARS id 19 on&lt;/P&gt;
&lt;P&gt;set routemap bgp_importARS id 19 allow&lt;/P&gt;
&lt;P&gt;set routemap bgp_importARS id 19 match neighbor 10.111.0.91 on&lt;/P&gt;
&lt;P&gt;set routemap bgp_importARS id 19 match neighbor 10.111.0.92 on&lt;/P&gt;
&lt;P&gt;set routemap bgp_importARS id 19 match protocol bgp&lt;/P&gt;
&lt;P&gt;set routemap bgp_importARS id 19 action nexthop ip 10.111.18.37 &amp;nbsp;&amp;lt;— The next hop is whatever the first IP of the CloudGuard backend subnet is&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;set bgp external remote-as 65515 import-routemap bgp_importARS preference 2 on&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2024 15:17:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-IaaS-HA-BGP-Setup-with-Azure-Route-Server/m-p/232747#M5050</guid>
      <dc:creator>Jeff_Engel</dc:creator>
      <dc:date>2024-11-14T15:17:38Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard IaaS HA BGP Setup with Azure Route Server</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-IaaS-HA-BGP-Setup-with-Azure-Route-Server/m-p/232916#M5052</link>
      <description>&lt;P&gt;Thanks for the guidance.&amp;nbsp; I missed the static-route step when I attempted this earlier.&amp;nbsp; I have a maintenance window to get BGP operational so I hope it goes well.&lt;/P&gt;&lt;P&gt;&amp;lt;-&lt;/P&gt;&lt;P&gt;Hopefully, it will be terminating on the 10.111.0.0/24 VNET. Otherwise, you might be painting yourself into a corner.&lt;/P&gt;&lt;P&gt;&amp;lt;-&lt;/P&gt;&lt;P&gt;Yes.&amp;nbsp; That is the plan.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2024 17:50:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-IaaS-HA-BGP-Setup-with-Azure-Route-Server/m-p/232916#M5052</guid>
      <dc:creator>Ave_Joe</dc:creator>
      <dc:date>2024-11-15T17:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard IaaS HA BGP Setup with Azure Route Server</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-IaaS-HA-BGP-Setup-with-Azure-Route-Server/m-p/233611#M5091</link>
      <description>&lt;P&gt;I am sharing the process the was followed to get it working.&amp;nbsp; I added 3 steps.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Make sure Propagate routes is disabled on the Frontend subnet.&lt;/LI&gt;&lt;LI&gt;The AVS admin portals subnet does not learn the 0.0.0.0 route so additional route map entries are needed for any (on-premise) networks that the AVS portals need to be accessed from.&lt;/LI&gt;&lt;LI&gt;Need to add static routes on each cluster member in order to advertise the additional route map entries.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Thanks to Christian and Josh for their help getting everything sorted and working.&lt;/P&gt;&lt;P&gt;&amp;lt;------------&lt;/P&gt;&lt;P&gt;&lt;U&gt;Check Point configuration&lt;/U&gt;&lt;/P&gt;&lt;P&gt;1. Check Propagate gateway route setting&lt;BR /&gt;a. Check the Frontend network route table configuration to ensure that "Propagate gateway routes" is set to No.&lt;/P&gt;&lt;P&gt;2. Policy update for BGP traffic.&lt;/P&gt;&lt;P&gt;# &amp;lt;- Make sure your rule base allows BGP traffic (TCP 179) between the ARS and the Cluster members&lt;BR /&gt;# &amp;lt;- create route server objects and create rule&lt;BR /&gt;src: &amp;lt;10.111.0.68&amp;gt; and &amp;lt;10.111.0.69&amp;gt; dst: &amp;lt;10.111.16.7&amp;gt; and &amp;lt;10.111.16.5&amp;gt; and &amp;lt;10.111.16.6&amp;gt; service: &amp;lt;bgp&amp;gt; Action: &amp;lt;allow&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Clish BGP Configuration on both cluster nodes&lt;BR /&gt;3. Add static routes for BGP&lt;BR /&gt;&lt;BR /&gt;# &amp;lt;- Make sure that both members on the CloudGuard cluster have a default route defined on your internal static routes table.&lt;BR /&gt;# &amp;lt;- Create static route tables pointing to the ARS IPs (10.111.0.68/32 and 10.111.0.68/32) and make the next hop the first IP of the FRONTEND subnet (10.111.16.1).&lt;BR /&gt;# &amp;lt;- Since we are peering to eth0, we want the BGP reply to go out of eth0.&lt;BR /&gt;set static-route 10.111.0.68/32 nexthop gateway address 10.111.16.1 on&lt;BR /&gt;set static-route 10.111.0.69/32 nexthop gateway address 10.111.16.1 on&lt;/P&gt;&lt;P&gt;4. Set AS number&lt;BR /&gt;&lt;BR /&gt;# &amp;lt;— Pick an unused AS number for the Check Points to use&lt;BR /&gt;set as 65100&lt;BR /&gt;&lt;BR /&gt;5. Set cluster router ID&lt;BR /&gt;&lt;BR /&gt;# &amp;lt;- For an HA cluster the router ID is always the cluster VIP&lt;BR /&gt;set router id 10.111.16.7&lt;/P&gt;&lt;P&gt;6. Configure BGP to peer with Azure route server&lt;/P&gt;&lt;P&gt;# &amp;lt;- route server IP 1&lt;BR /&gt;set bgp external remote-as 65515 peer 10.111.0.68 on&lt;BR /&gt;set bgp external remote-as 65515 peer 10.111.0.68 multihop on&lt;/P&gt;&lt;P&gt;# &amp;lt;- route server IP 2&lt;BR /&gt;set bgp external remote-as 65515 peer 10.111.0.69 on&lt;BR /&gt;set bgp external remote-as 65515 peer 10.111.0.69 multihop on&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;7. Add BGP route map for 0.0.0.0 and all internal private networks on both Cluster members.&lt;BR /&gt;All internal private networks are needed because the AVS admin portals do not learn the&lt;BR /&gt;0.0.0.0 route as per the documentation.&lt;BR /&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/azure-vmware/architecture-network-design-considerations" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/azure/azure-vmware/architecture-network-design-considerations&lt;/A&gt;&lt;/P&gt;&lt;P&gt;# &amp;lt;- Tells BGP peers that the route to 0 0.0.0.0 and other required networks is 10.111.18.250&lt;BR /&gt;set routemap bgp_export2ARS id 19 on&lt;BR /&gt;set routemap bgp_export2ARS id 19 allow&lt;BR /&gt;set routemap bgp_export2ARS id 19 match protocol static&lt;BR /&gt;set routemap bgp_export2ARS id 19 match network 0.0.0.0/0 exact&lt;BR /&gt;set routemap bgp_exportARS id 19 match network 10.0.0.0/8 exact&lt;BR /&gt;set routemap bgp_exportARS id 19 match network 172.116.0.0/12 exact&lt;/P&gt;&lt;P&gt;# &amp;lt;— The next hop is whatever the IP of the CloudGuard backend LB&lt;BR /&gt;set routemap bgp_export2ARS id 19 action nexthop ip 10.111.18.250&lt;BR /&gt;set bgp external remote-as 65515 peer 10.111.0.68 export-routemap bgp_export2ARS preference 2 on&lt;BR /&gt;set bgp external remote-as 65515 peer 10.111.0.69 export-routemap bgp_export2ARS preference 2 on&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;8. Add BGP route map for getting to learned networks&lt;BR /&gt;&lt;BR /&gt;# &amp;lt;- Tells BGP that the first hop IP of learned networks is first IP of the back subnet&lt;BR /&gt;# &amp;lt;- Needed so traffic to the learned AVS subnets goes out the backend subnet and not the frontend subnet&lt;BR /&gt;set routemap bgp_importARS id 59 on&lt;BR /&gt;set routemap bgp_importARS id 59 allow&lt;BR /&gt;set routemap bgp_importARS id 59 match neighbor 10.111.0.68 on&lt;BR /&gt;set routemap bgp_importARS id 59 match neighbor 10.111.0.69 on&lt;BR /&gt;set routemap bgp_importARS id 59 match protocol bgp&lt;BR /&gt;# &amp;lt;— The next hop is whatever the first IP of the CloudGuard backend subnet is&lt;BR /&gt;set routemap bgp_importARS id 59 action nexthop ip 10.111.18.1&lt;BR /&gt;set bgp external remote-as 65515 import-routemap bgp_importARS preference 3 on&lt;BR /&gt;&lt;BR /&gt;9. Add static routes on each cluster member so the additional advertised routes can be learned by AVS&lt;BR /&gt;&lt;BR /&gt;# &amp;lt;- Set to the first hop of the CloudGuard Frontend subnet&lt;BR /&gt;set static-route 10.0.0.0/8 nexthop gateway address 10.111.16.1 on&lt;BR /&gt;set static-route 172.116.0.0/12 nexthop gateway address 10.111.16.1 on&lt;/P&gt;&lt;P&gt;&lt;U&gt;Azure BGP configuration&lt;/U&gt;&lt;/P&gt;&lt;P&gt;1. Route server configuration&lt;BR /&gt;a. Enable Branch to Branch on the Route Server.&lt;BR /&gt;&lt;BR /&gt;2. Establish BGP with Check Point HA cluster members&lt;BR /&gt;# &amp;lt;- Use the physical IP addresses of each cluster node.&lt;BR /&gt;# &amp;lt;- First cluster node&lt;BR /&gt;Name: nodeHA1 ASN: 65100 IP: 10.111.16.5&lt;BR /&gt;# &amp;lt;- Second cluster node&lt;BR /&gt;Name: nodeHA2 ASN: 65100 IP: 10.111.16.6&lt;/P&gt;</description>
      <pubDate>Sun, 24 Nov 2024 15:27:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-IaaS-HA-BGP-Setup-with-Azure-Route-Server/m-p/233611#M5091</guid>
      <dc:creator>Ave_Joe</dc:creator>
      <dc:date>2024-11-24T15:27:23Z</dc:date>
    </item>
  </channel>
</rss>

