<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Please suggest if this is a recommended way? in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Please-suggest-if-this-is-a-recommended-way/m-p/257765#M5484</link>
    <description>&lt;P&gt;Excellent query...also curious to see what best way is.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Fri, 19 Sep 2025 16:02:15 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-09-19T16:02:15Z</dc:date>
    <item>
      <title>Please suggest if this is a recommended way?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Please-suggest-if-this-is-a-recommended-way/m-p/257708#M5479</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;I have a situation as described below where a customer is transitioning to the SAP S4 RISE platform, which is a SaaS-based solution from SAP. This platform is hosted on Azure, and we have CGNS implemented within our tenant. Peering has been established between the two tenants to facilitate communication. According to SAP, they do not permit NONRFC1918 addresses, which are public IP addresses; therefore, we have been instructed to perform source NAT for all incoming traffic on the CheckPoint Firewall.&lt;/P&gt;
&lt;P&gt;Given that in Azure CGNS we have both FLB and BLB, it is necessary to configure port forwarding rules on the FLB, followed by NAT on the firewall. In this scenario, our objective is to achieve the following:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;OS : INTERNET
OD : LocalGatewayExternal
OP: 5678 (Forwarded by LB) 
XS : 10.10.20.6
XD : 10.10.10.100
XP: 443&lt;/LI-CODE&gt;
&lt;P&gt;Currently, I identify two issues.&lt;/P&gt;
&lt;P&gt;First, I must implement inbound HTTPS interception; otherwise, we will be unable to capture any attacks.&lt;/P&gt;
&lt;P&gt;Secondly, since the Azure backend interface does not possess any VIP (AFAIK), I believe we will need to NAT the traffic behind a physical IP. Alternatively, is there another option? Or can I use any other IP which will failover as well in case of firewall failover?&lt;/P&gt;
&lt;P&gt;In the event of a failover, I am curious about how the connection would function if I am NATing it behind a physical IP. Furthermore, since SAP does not permit non-RFC1918 subnets, I am uncertain about how outbound traffic will be transmitted initiated from S4 RISE hosts. I am quite confident that it cannot.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please suggest&lt;/P&gt;</description>
      <pubDate>Fri, 19 Sep 2025 06:57:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Please-suggest-if-this-is-a-recommended-way/m-p/257708#M5479</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2025-09-19T06:57:21Z</dc:date>
    </item>
    <item>
      <title>Re: Please suggest if this is a recommended way?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Please-suggest-if-this-is-a-recommended-way/m-p/257765#M5484</link>
      <description>&lt;P&gt;Excellent query...also curious to see what best way is.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 19 Sep 2025 16:02:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Please-suggest-if-this-is-a-recommended-way/m-p/257765#M5484</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-09-19T16:02:15Z</dc:date>
    </item>
    <item>
      <title>Re: Please suggest if this is a recommended way?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Please-suggest-if-this-is-a-recommended-way/m-p/257966#M5488</link>
      <description>&lt;P&gt;No one replied so definitely this is not a ideal way - i believe routing it through ALB or WAF seems to be a ideal way or at least to have a reverse proxy&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2025 07:41:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Please-suggest-if-this-is-a-recommended-way/m-p/257966#M5488</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2025-09-23T07:41:07Z</dc:date>
    </item>
    <item>
      <title>Re: Please suggest if this is a recommended way?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Please-suggest-if-this-is-a-recommended-way/m-p/257970#M5489</link>
      <description>&lt;P&gt;Not sure if TAC could assist with that question?&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2025 10:51:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Please-suggest-if-this-is-a-recommended-way/m-p/257970#M5489</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-09-23T10:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: Please suggest if this is a recommended way?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Please-suggest-if-this-is-a-recommended-way/m-p/257979#M5492</link>
      <description>&lt;P&gt;SAP and CGNS are high level topics not many people have to cope with. Informative SR# with TAC is suggested, maybe CP Professional Services could help here ?&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2025 11:43:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Please-suggest-if-this-is-a-recommended-way/m-p/257979#M5492</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-09-23T11:43:42Z</dc:date>
    </item>
    <item>
      <title>Re: Please suggest if this is a recommended way?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Please-suggest-if-this-is-a-recommended-way/m-p/257982#M5493</link>
      <description>&lt;P&gt;Yes sir, very good advice!&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2025 11:51:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Please-suggest-if-this-is-a-recommended-way/m-p/257982#M5493</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-09-23T11:51:46Z</dc:date>
    </item>
    <item>
      <title>Re: Please suggest if this is a recommended way?</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Please-suggest-if-this-is-a-recommended-way/m-p/258480#M5510</link>
      <description>&lt;P&gt;Well I achieved it using DynamicObject. Just like LocalGateway External I created LocalGatewayInternal with Primary firewall Internal IP on primary firewall and secondary LAN ip on seconday firewall. Then used that object in NAT rule base and that resolved the issue.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Sep 2025 17:17:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Please-suggest-if-this-is-a-recommended-way/m-p/258480#M5510</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2025-09-29T17:17:19Z</dc:date>
    </item>
  </channel>
</rss>

