<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CloudGuard NVA ingress traffic in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235521#M5107</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I am working on a cloudguard test environment and most of my setup is working. I now come to the point that i want to create a ingress rule and i am using the cme_menu in expert mode. Afer a lot of testing and rebuilding i now finaly have the menu working, I tryed using the postman method but that keeps giving me the 401 error and i am not sure what to fill in the Base64-encoded SICClosed key.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;now i am not sure what to fill in the menu. The menu is "seeing" my external IP address so i can use that to nat traffic to my server. The source IP should be any so i guess i fill in 0.0.0.0/0 ? Do i also need to create a nat rule on the filewall itself with the same ? I&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ingress2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28777i7CB7D618CC9095E5/image-size/large?v=v2&amp;amp;px=999" role="button" title="ingress2.png" alt="ingress2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ingress.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28773iB2D1A37A61CD3F64/image-size/large?v=v2&amp;amp;px=999" role="button" title="ingress.png" alt="ingress.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 12 Dec 2024 15:53:38 GMT</pubDate>
    <dc:creator>Lars_de_Mooy</dc:creator>
    <dc:date>2024-12-12T15:53:38Z</dc:date>
    <item>
      <title>CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235521#M5107</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I am working on a cloudguard test environment and most of my setup is working. I now come to the point that i want to create a ingress rule and i am using the cme_menu in expert mode. Afer a lot of testing and rebuilding i now finaly have the menu working, I tryed using the postman method but that keeps giving me the 401 error and i am not sure what to fill in the Base64-encoded SICClosed key.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;now i am not sure what to fill in the menu. The menu is "seeing" my external IP address so i can use that to nat traffic to my server. The source IP should be any so i guess i fill in 0.0.0.0/0 ? Do i also need to create a nat rule on the filewall itself with the same ? I&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ingress2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28777i7CB7D618CC9095E5/image-size/large?v=v2&amp;amp;px=999" role="button" title="ingress2.png" alt="ingress2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ingress.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28773iB2D1A37A61CD3F64/image-size/large?v=v2&amp;amp;px=999" role="button" title="ingress.png" alt="ingress.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 15:53:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235521#M5107</guid>
      <dc:creator>Lars_de_Mooy</dc:creator>
      <dc:date>2024-12-12T15:53:38Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235526#M5108</link>
      <description>&lt;P&gt;When i install the policy it gives me an error..&lt;/P&gt;&lt;P&gt;I hope someone can help me out here that would be great&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ingress3.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28780i17DD517B26B7703B/image-size/large?v=v2&amp;amp;px=999" role="button" title="ingress3.png" alt="ingress3.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 15:57:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235526#M5108</guid>
      <dc:creator>Lars_de_Mooy</dc:creator>
      <dc:date>2024-12-12T15:57:50Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235530#M5109</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/17659"&gt;@Lars_de_Mooy&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a meeting right now but did you by chance catch the Under the Hood webinar on Tuesday regarding this topic?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.brighttalk.com/webcast/16731/624271" target="_blank"&gt;https://www.brighttalk.com/webcast/16731/624271&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I will check back in with you afterwards.&lt;/P&gt;
&lt;P&gt;BR!&lt;/P&gt;
&lt;P&gt;Jeff&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 16:02:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235530#M5109</guid>
      <dc:creator>Jeff_Engel</dc:creator>
      <dc:date>2024-12-12T16:02:24Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235531#M5110</link>
      <description>&lt;P&gt;Are you using a specific Deployment Guide?&lt;/P&gt;
&lt;P&gt;What version are you using?&lt;/P&gt;
&lt;P&gt;Where is the management server positioned?&lt;/P&gt;
&lt;P&gt;Is this a POC, so you should get in touch with your local Check Point SE or cloud expert?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CME/Content/Topics-CME/Azure_Virtual_WAN.htm?TocPath=Azure%20Virtual%20WAN%7C_____0#Azure_Virtual_WAN" target="_blank"&gt;https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CME/Content/Topics-CME/Azure_Virtual_WAN.htm?TocPath=Azure%20Virtual%20WAN%7C_____0#Azure_Virtual_WAN&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_Network_for_Azure_vWAN/Content/Topics-Azure-vWAN/Introduction.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_Network_for_Azure_vWAN/Content/Topics-Azure-vWAN/Introduction.htm&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 16:02:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235531#M5110</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2024-12-12T16:02:29Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235533#M5111</link>
      <description>&lt;P&gt;Hi Jeff, i found that usefull webinar, and used it for a part of my setup, i did not yet watched it all to the end. I will watch the webinar till the end when ik find some time to do. Hopefully you can point me in the direction i get the feeling all is almost working. I allready have my vnets pointing to the NVA and i see all the trafic in my logs and i can filter the traffic. Now i need the ingress so i can test the solution and create some inbound nat rules and stuff.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 16:09:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235533#M5111</guid>
      <dc:creator>Lars_de_Mooy</dc:creator>
      <dc:date>2024-12-12T16:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235534#M5112</link>
      <description>&lt;P&gt;Hi Don,&lt;/P&gt;&lt;P&gt;For the management i use open server R82, and the NVA GW's i use R81.20. For deplyment i used the guides you posted, and the webinar that Jeff mentioned. All is working almost so i dont think i need the cloud expert for now.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 16:11:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235534#M5112</guid>
      <dc:creator>Lars_de_Mooy</dc:creator>
      <dc:date>2024-12-12T16:11:56Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235539#M5113</link>
      <description>&lt;P&gt;Great.&lt;/P&gt;
&lt;P&gt;You could try to tail the cme.log and look for errors.&lt;/P&gt;
&lt;P&gt;tail -f /var/log/CPcme/cme.log&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It may be too much but since the CME talks to the management server API and then the API goes to the CPM process, you could also tail their enhanced log files.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;tail -F $FWDIR/log/cpm.elg&lt;/P&gt;
&lt;P&gt;tail -F $FWDIR/log/api.elg&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could it be IAM (permissions | roles ) in the Resource Groups?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 16:16:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235539#M5113</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2024-12-12T16:16:28Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235543#M5114</link>
      <description>&lt;P&gt;Great to hear you found the webinar.&amp;nbsp; To answer your NAT question, yes you need a corresponding NAT rule in your security policy.&lt;/P&gt;
&lt;DIV id="tinyMceEditor_2b5c50292f795bJeff_Engel_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="2024-12-12 10_50_51-18.221.124.224-R81.20-SmartConsole.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28781i3C44270C16F5760F/image-size/large?v=v2&amp;amp;px=999" role="button" title="2024-12-12 10_50_51-18.221.124.224-R81.20-SmartConsole.png" alt="2024-12-12 10_50_51-18.221.124.224-R81.20-SmartConsole.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 16:52:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235543#M5114</guid>
      <dc:creator>Jeff_Engel</dc:creator>
      <dc:date>2024-12-12T16:52:25Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235544#M5115</link>
      <description>&lt;P&gt;Maybe the other issue is SMS API remote access (GUI Clients/Trusted Clients) (?)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SecurityManagement_AdminGuide/Content/Topics-SECMG/Managing-Security-through-API.htm?Highlight=management%20api" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SecurityManagement_AdminGuide/Content/Topics-SECMG/Managing-Security-through-API.htm?Highlight=management%20api&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 16:57:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235544#M5115</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2024-12-12T16:57:10Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235563#M5116</link>
      <description>&lt;P&gt;I was able to run the oython script so could that indicate that there is no issue with permissions on the resource group?&lt;/P&gt;&lt;P&gt;I need to dig into the logs thanks for pointing me to it.&lt;/P&gt;&lt;P&gt;I need more understanding on how the solution works and what the CPM CME and API are for could someone share some detailed documentation about it ?&lt;/P&gt;&lt;P&gt;I will dive into it in the morning and watch the webinar&amp;nbsp;&lt;/P&gt;&lt;P&gt;the service cme test is also running without any error&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;python3 /opt/CPcme/features/vWAN/vWAN_automatic_script.py "tenant="&amp;lt;Active-Directory-Tenant-ID&amp;gt;"" "client_id="&amp;lt;Client-ID&amp;gt;"" "client_secret="&amp;lt;Client-Secret&amp;gt;"" "subscription="&amp;lt;Azure-Subscription&amp;gt;"" "managed_app_resource_group_name="&amp;lt;Managed-App-Resource-Group-Name&amp;gt;"" "nva_name="&amp;lt;NVA-name&amp;gt;"" "sic_key="&amp;lt;SIC-key&amp;gt;"" "policy="&amp;lt;Policy-Name&amp;gt;"" "atp="&amp;lt;True/False&amp;gt;""&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 18:52:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235563#M5116</guid>
      <dc:creator>Lars_de_Mooy</dc:creator>
      <dc:date>2024-12-12T18:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235567#M5117</link>
      <description>&lt;P&gt;Cool. I may have been completely off the mark on the IAM front.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Will put some text together for understanding CME and API from my perspective.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 18:51:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235567#M5117</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2024-12-12T18:51:56Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235579#M5118</link>
      <description>&lt;P&gt;The Check Point Security Management Server (SMS) has the Postgres database system running in it.&lt;/P&gt;
&lt;P&gt;Stored inside the Postgres DB are all the Check Point objects, policies and config. Pretty much everything you see in the SmartConsole apart from the logs.&lt;/P&gt;
&lt;P&gt;Customer specific config on top of the out of the box config.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The management API allows customers to bypass the SmartConsole and interact with the Postgres database via the API (for example, using command line).&lt;/P&gt;
&lt;P&gt;That means that they can manually manage objects and rules, or fully automate that via the API.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/latest/APIs/#introduction~v1.9.1%20" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/latest/APIs/#introduction~v1.9.1%20&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since CME is integrate in the SMS and needs to get some configururation, that can be done via the SMS API (but also using the autoprov-cfg command in some cases).&lt;/P&gt;
&lt;P&gt;The autoprov-cfg command is the original command for configuring the CME (if I understand properly).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CME config includes building a controller (at the 36 minute mark in Jeff’s video), which represents the connection/binding with Azure and the subscription.&lt;/P&gt;
&lt;P&gt;In some cases we can run autoprov-cfg show all to see the controller. Meaning that we can see out controller build specifically to plug into Azure.&lt;/P&gt;
&lt;P&gt;More controllers can be built for plugging into AWS and GCP etc.&lt;/P&gt;
&lt;P&gt;One CME, many controllers.&lt;/P&gt;
&lt;P&gt;It’s like the old AD binding.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Through that connection (the controller) the CME can interact with the public cloud.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Going further…&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To understand the history and one of the original purposes of the CME you need to know about cloud scaling solutions.&lt;/P&gt;
&lt;P&gt;Scaling solutions like Azure VMSS (Virtual Machine Scale Sets) and AWS Auto Scaling Groups are at the heart of cloud elasticity.&lt;/P&gt;
&lt;P&gt;You can create a VMSS, which is a group of one or more identically configured VMs (in our case CloudGuard SG VMs) and along with that comes the Azure Load Balancer, which distributes connections amongst the CloudGuard SGs.&lt;/P&gt;
&lt;P&gt;If you deployed, for example, 2 VMSS instances (CloudGuard gateway VMs) and then they get to a point where they are experiencing high CPU usage because of growing traffic load then Azure would detect &amp;nbsp;that and spin up a new identical CloudGuard gateway to help the current ones because they have reached and exceeded a CPU high water mark (80%).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That is the scale out event.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CME (Cloud Management Extension) was developed as a new add-on the SMS, with the objective to interact with the cloud and be able to detect scale out events.&lt;/P&gt;
&lt;P&gt;That is only possible by having the CME talk to the Azure API (yet another API).&lt;/P&gt;
&lt;P&gt;Given the right details the CME can go into the Azure subscription via the API and discover the specially tagged VMSS solution and within there the instances.&lt;/P&gt;
&lt;P&gt;The scale out event brings a new instance, which the CME detect by regularly checking on the VMSS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And so, the main task of the CME was initially (and still valid and important now) is to monitor scaling solutions and whenever a scale out event happens the CME detects that and then update the SMS (via the SMS’s API)&lt;/P&gt;
&lt;P&gt;Working together with the SMS API the CME gets the new Scale set VM (CloudGuard SG) automatically added to the SmartConsole (adding the gateway object into GATEWAYS &amp;amp; SERVERS) which includes getting &amp;nbsp;the trust established between the SMS and the new SG, and then any software blades enabled (like IPS for example) on top of the already enabled FW blade.&lt;/P&gt;
&lt;P&gt;After that the policy install happens, again automatically.&lt;/P&gt;
&lt;P&gt;The CME learns the IP address of the new gateway so that all of that is made possible over the network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The new SG is known to Azure (obviously) and Azure starts to send health probes to the new SG (port 8117 TCP – from IP 168.63.129.16).&lt;/P&gt;
&lt;P&gt;When the new SG is ready and policy install is completed and the SG starts to respond to the health probes then the LB starts to forward traffic to the 3&lt;SUP&gt;rd&lt;/SUP&gt; SG.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Scale in event is all of that in reverse(kind of), and happens after no less than 5 minutes and when the low water mark is reached (60% aggregate CPU across the 3 SGs).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Overview in here is a bit light weight and fluffy/cloudy.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CME/Content/Topics-CME/Overview.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CME/Content/Topics-CME/Overview.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/virtual-machine-scale-sets/overview" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/azure/virtual-machine-scale-sets/overview&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Behind a vWAN solution (the NVA) there is something like a VMSS (I believe it is VMSS but not like the normal VMSS) and the CME is involved in configuration within that solution.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I’m not experienced in the vWAN solution so Jeff can fill in the blanks and correct me if needed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that all makes sense and helps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 20:38:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235579#M5118</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2024-12-12T20:38:08Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235611#M5119</link>
      <description>&lt;P&gt;Hi Don, thanks for your great explaination and all the time that you spended on helping me understand the concepts better. All other comments are also highly apriciated !&lt;/P&gt;&lt;P&gt;I builded the test environment with the below video as a guide and i thougt Jeff referred to this video, i now also read the guides you linked me to.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Cloud-Network-Security/Azure-Virtual-Wan-amp-CloudGuard-NVA-Integration-Workshop/m-p/183312#M268" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Cloud-Network-Security/Azure-Virtual-Wan-amp-CloudGuard-NVA-Integration-Workshop/m-p/183312#M268&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Yesterday i watched Jeffs seminar&amp;nbsp;&amp;nbsp;&lt;A href="https://www.brighttalk.com/webcast/16731/624271" target="_blank" rel="nofollow noopener noreferrer"&gt;https://www.brighttalk.com/webcast/16731/624271&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Now i have a better understanding of howto work with Postman to connect to the SMS API, the seminar is great help for this.&lt;/P&gt;&lt;P&gt;I am now able to connect to the SMS API using postman following the instructions in Jeffs semiar.&lt;/P&gt;&lt;P&gt;Now when i run the postman Post&amp;nbsp;Add Azure vWAN ingress rules the scripts is giving me the&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;"status-code"&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;200 and the request ID&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;But when i do the GET status&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;GET &lt;A target="_blank" rel="noopener"&gt;https://&amp;lt;Management_IP&amp;gt;/web_api/cme-api/status/&amp;lt;request_id&amp;gt;&lt;/A&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;i get&amp;nbsp;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;"details"&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;"Account with id [account id] not found"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;There is one part of Jeffs seminar thats not clear to me and thats the part that covers the POST Add an Azure account.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;for adding the gateways to the management server i used the phyton script and used a account that i created. This is the same account that i now use in the POST&amp;nbsp;Add Azure vWAN ingress rules in postman is that correct ?&lt;/P&gt;&lt;P&gt;This script worked with that account&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;python3 /opt/CPcme/features/vWAN/vWAN_automatic_script.py "tenant="&amp;lt;Active-Directory-Tenant-ID&amp;gt;"" "client_id="&amp;lt;Client-ID&amp;gt;"" "client_secret="&amp;lt;Client-Secret&amp;gt;"" "subscription="&amp;lt;Azure-Subscription&amp;gt;"" "managed_app_resource_group_name="&amp;lt;Managed-App-Resource-Group-Name&amp;gt;"" "nva_name="&amp;lt;NVA-name&amp;gt;"" "sic_key="&amp;lt;SIC-key&amp;gt;"" "policy="&amp;lt;Policy-Name&amp;gt;"" "atp="&amp;lt;True/False&amp;gt;""&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;When i run the&amp;nbsp;autoprov-cfg show all this managed identity is filled in the "client_id" section.&lt;/P&gt;&lt;P&gt;Do i still need to run the&amp;nbsp;&lt;SPAN&gt;POST Add an Azure account that was in the seminar or is that command creating the managed identity i allready used in the python script to add the gateways from azure in my SMS ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When i do run the scipt POST Add an Azure account using the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"application_id" that is the same as i see in&amp;nbsp;autoprov-cfg show all and i used in the pyton script to add the gateways from azur to my SMS&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;it gives me this error&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;"details"&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;"The management does not run in a MDS environment"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;I am really close to the solution now&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Again thanks for the help all end i hope to fix this soon as i realy like the ingress functionality it brings me.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2024 08:03:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235611#M5119</guid>
      <dc:creator>Lars_de_Mooy</dc:creator>
      <dc:date>2024-12-13T08:03:42Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235618#M5120</link>
      <description>&lt;P&gt;Just quickly on this part:&lt;/P&gt;
&lt;P&gt;GET https://&amp;lt;Management_IP&amp;gt;/web_api/cme-api/status/&amp;lt;request_id&amp;gt;&lt;/P&gt;
&lt;P&gt;It might be easier to use the command line (on the management server for some of the api commands, or even all.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example:&lt;/P&gt;
&lt;P&gt;In expert mode run, mgmt_cli -r true&amp;nbsp; cme-api/&amp;lt;cme-api-version&amp;gt;/&amp;lt;cme-command&amp;gt;&lt;/P&gt;
&lt;P&gt;Have a look at the swaggerhub reference&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-r true assumes you are a root user in gaia (admin is) and avoids authentication and is great for quick single operations (not so much for bulk)&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This can be a useful command too:&lt;/P&gt;
&lt;P&gt;service cme test&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/latest/APIs/#cli/cme-api~v2%20" target="_blank"&gt;https://sc1.checkpoint.com/documents/latest/APIs/#cli/cme-api~v2%20&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://app.swaggerhub.com/apis-docs/Check-Point/cme-api/v1.2.2" target="_blank"&gt;https://app.swaggerhub.com/apis-docs/Check-Point/cme-api/v1.2.2&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are you using this section of the guide as a reference?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/iaas/webadminguides/en/cp_cme/content/topics-cme/azure_virtual_wan.htm#Azure_Virtual_WAN" target="_blank"&gt;https://sc1.checkpoint.com/documents/iaas/webadminguides/en/cp_cme/content/topics-cme/azure_virtual_wan.htm#Azure_Virtual_WAN&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2024 09:11:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235618#M5120</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2024-12-13T09:11:10Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235619#M5121</link>
      <description>&lt;P&gt;The test is fine i used that before to test and was all fine.&lt;/P&gt;&lt;P&gt;Again i also added the gateways and all is working except for this last small issue ...&lt;/P&gt;&lt;P&gt;Testing basic configuration structure...&lt;BR /&gt;Testing templates...&lt;BR /&gt;Testing nbtemplate...&lt;BR /&gt;Testing controllers...&lt;BR /&gt;Testing azurecontroller...&lt;/P&gt;&lt;P&gt;provisioned gateways:&lt;/P&gt;&lt;P&gt;Testing management configuration...&lt;BR /&gt;Testing management connectivity...&lt;/P&gt;&lt;P&gt;**********&lt;BR /&gt;Tests finished&lt;BR /&gt;**********&lt;BR /&gt;[Expert@cpms01:0]#&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2024 09:16:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235619#M5121</guid>
      <dc:creator>Lars_de_Mooy</dc:creator>
      <dc:date>2024-12-13T09:16:26Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235629#M5122</link>
      <description>&lt;P&gt;The last link you sended is not working can you provide me the working link please ?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2024 09:52:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235629#M5122</guid>
      <dc:creator>Lars_de_Mooy</dc:creator>
      <dc:date>2024-12-13T09:52:14Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235630#M5123</link>
      <description>&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CME/Content/Topics-CME/Azure_Virtual_WAN.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CME/Content/Topics-CME/Azure_Virtual_WAN.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Here you go.&lt;/P&gt;
&lt;P&gt;The other link only works on my mobile phone browser&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":face_with_rolling_eyes:"&gt;🙄&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What command did you run to get this?&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"details"&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"The management does not run in a MDS environment"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2024 09:56:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235630#M5123</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2024-12-13T09:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235632#M5124</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="add.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28791iEB1DD87C4A84813F/image-size/large?v=v2&amp;amp;px=999" role="button" title="add.png" alt="add.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;https://x.x.x.x/web_api/v1.8/cme-api/v1.2.2/accounts/azure&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The main question is do i still need to do this ?&lt;/P&gt;&lt;P&gt;I am allready capable of adding gateways to the management server using the managed identity and running the python script. Or is this account needed for adding the ingress rule ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;When i try to create te rule with&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://172.211.215.122/web_api/v1.8/cme-api/v1.2.1/azure/virtualWANs/accounts/id" target="_blank" rel="noopener"&gt;https://172.211.215.122/web_api/v1.8/cme-api/v1.2.1/azure/virtualWANs/accounts/id&lt;/A&gt;&amp;nbsp;of the managed identity i see in the "&lt;SPAN&gt;service cme test"&lt;/SPAN&gt;/resourceGroups/mrg-cp-vwan-managed-app-xxxxxxx/inboundRules/xxxxxx&lt;/P&gt;&lt;DIV&gt;&lt;SPAN&gt;But when i do the GET status&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;GET&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A target="_blank" rel="noopener"&gt;https://&amp;lt;Management_IP&amp;gt;/web_api/cme-api/status/&amp;lt;request_id&amp;gt;&lt;/A&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;i get&amp;nbsp;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;"details"&lt;/SPAN&gt;&lt;SPAN&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"Account with id [&lt;A href="https://172.211.215.122/web_api/v1.8/cme-api/v1.2.1/azure/virtualWANs/accounts/id" target="_blank" rel="noopener"&gt;id&lt;/A&gt;&amp;nbsp;of the managed identity i see in the "service cme test"] not found"&lt;/SPAN&gt;&lt;SPAN&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;is that the&amp;nbsp;managed identity i see in the "service cme test" output or do i need a second account...............&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 13 Dec 2024 10:07:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235632#M5124</guid>
      <dc:creator>Lars_de_Mooy</dc:creator>
      <dc:date>2024-12-13T10:07:23Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235636#M5125</link>
      <description>&lt;P&gt;In that documentation they refer to this&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Prerequisites:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;A&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Security Management Server&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Multi-Domain Security Management Server&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;with CME Take 288 and higher, with a valid license.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;An&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CME/Content/Topics-CME/CME_Structure_and_Configurations.htm#Controll" target="_blank" rel="noopener"&gt;Azure account&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;with reader permission for the NVA's&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CME/Content/Topics-CME/Azure_Virtual_WAN.htm?TocPath=Azure%20Virtual%20WAN%7CConfigure%20Ingress%20Rules%20for%20the%20NVA%20with%20CME%20API%20%E2%80%93%20Recommended%7C_____0#resource_group_name" target="_blank" rel="noopener"&gt;Resource Group&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;configured in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;CME&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;configuration.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;When i click on the "&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CME/Content/Topics-CME/CME_Structure_and_Configurations.htm#Controll" target="_blank" rel="noopener"&gt;Azure account&lt;/A&gt;" link i get to the page that explains the account needed&lt;/P&gt;&lt;P&gt;To see the current controllers used by the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Management Server&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;connected to the cloud environments, run:&lt;/P&gt;&lt;TABLE cellspacing="0"&gt;&lt;COLGROUP&gt;&lt;COL /&gt;&lt;/COLGROUP&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;autoprov_cfg show controllers&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;utoprov_cfg show controllers&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="hoho.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28794i37851E4A646E993E/image-size/large?v=v2&amp;amp;px=999" role="button" title="hoho.png" alt="hoho.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The client ID i see here i also use in the&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://172.211.215.122/web_api/v1.8/cme-api/v1.2.1/azure/virtualWANs/accounts/id" target="_blank" rel="noopener nofollow noreferrer"&gt;https://172.211.215.122/web_api/v1.8/cme-api/v1.2.1/azure/virtualWANs/accounts/&lt;/A&gt;client id of the above screenshot&lt;SPAN&gt;/resourceGroups/mrg-cp-vwan-managed-app-xxxxxxx/inboundRules/xxxxxx&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;this gives me&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ahl.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28793i06841FA47093AC71/image-size/large?v=v2&amp;amp;px=999" role="button" title="ahl.png" alt="ahl.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I spended a full week on this so i realy need a success to proceed with my happy life &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2024 10:35:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235636#M5125</guid>
      <dc:creator>Lars_de_Mooy</dc:creator>
      <dc:date>2024-12-13T10:35:37Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard NVA ingress traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235646#M5126</link>
      <description>&lt;P&gt;I managed to create the account like in the webinar now i have this...&lt;/P&gt;&lt;DIV class=""&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="steuk.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28798i08D0852E06C5B31A/image-size/large?v=v2&amp;amp;px=999" role="button" title="steuk.png" alt="steuk.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 13 Dec 2024 11:16:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CloudGuard-NVA-ingress-traffic/m-p/235646#M5126</guid>
      <dc:creator>Lars_de_Mooy</dc:creator>
      <dc:date>2024-12-13T11:16:09Z</dc:date>
    </item>
  </channel>
</rss>

