<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Both Active and Standby AWS Cloudguard reply to HTTPS probes in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Both-Active-and-Standby-AWS-Cloudguard-reply-to-HTTPS-probes/m-p/263760#M5584</link>
    <description>&lt;P&gt;Hello CheckMates,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I am trying to understand, why Checkpoint CloudGuard standby gateway in AWS is replying to my 443 health probes?&amp;nbsp;&lt;/P&gt;&lt;P&gt;My management portal has been moved from the default port to 9443,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I have tried to configure&amp;nbsp;$FWDIR/boot/modules/fwkern.conf with a&amp;nbsp;cloud_balancer_port=8117 as per&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk181836" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk181836&lt;/A&gt;&amp;nbsp;but it seems like the behavior is different than in Azure. It will actually forward the probes to the endpoint server, and as a regular webserver - it does listen to 443, not 8117.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 27 Nov 2025 12:10:47 GMT</pubDate>
    <dc:creator>reybanger</dc:creator>
    <dc:date>2025-11-27T12:10:47Z</dc:date>
    <item>
      <title>Both Active and Standby AWS Cloudguard reply to HTTPS probes</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Both-Active-and-Standby-AWS-Cloudguard-reply-to-HTTPS-probes/m-p/263760#M5584</link>
      <description>&lt;P&gt;Hello CheckMates,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I am trying to understand, why Checkpoint CloudGuard standby gateway in AWS is replying to my 443 health probes?&amp;nbsp;&lt;/P&gt;&lt;P&gt;My management portal has been moved from the default port to 9443,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I have tried to configure&amp;nbsp;$FWDIR/boot/modules/fwkern.conf with a&amp;nbsp;cloud_balancer_port=8117 as per&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk181836" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk181836&lt;/A&gt;&amp;nbsp;but it seems like the behavior is different than in Azure. It will actually forward the probes to the endpoint server, and as a regular webserver - it does listen to 443, not 8117.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Nov 2025 12:10:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Both-Active-and-Standby-AWS-Cloudguard-reply-to-HTTPS-probes/m-p/263760#M5584</guid>
      <dc:creator>reybanger</dc:creator>
      <dc:date>2025-11-27T12:10:47Z</dc:date>
    </item>
    <item>
      <title>Re: Both Active and Standby AWS Cloudguard reply to HTTPS probes</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Both-Active-and-Standby-AWS-Cloudguard-reply-to-HTTPS-probes/m-p/263763#M5585</link>
      <description>&lt;P&gt;HTTPS port on a standby GW answering probes is a normal situation. HTTPS is open in one of many scenarios, when specific blades, such as RAS VPN, Mobile access, Identity Awareness, and more, are enabled.&lt;BR /&gt;&lt;BR /&gt;Why does it cause an issue for you?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Nov 2025 12:44:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Both-Active-and-Standby-AWS-Cloudguard-reply-to-HTTPS-probes/m-p/263763#M5585</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-11-27T12:44:19Z</dc:date>
    </item>
    <item>
      <title>Re: Both Active and Standby AWS Cloudguard reply to HTTPS probes</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Both-Active-and-Standby-AWS-Cloudguard-reply-to-HTTPS-probes/m-p/263765#M5586</link>
      <description>&lt;P&gt;Thank you for replying. This is basically to avoid session issues or asymmetric traffic. IT would be nice if Checkpoint would work in a similar way like in Azure - where the traffic from LB is forwarded only to active member.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am looking for some options here to point traffic to my backend servers listening on 443 using load balancer in front.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Nov 2025 13:47:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Both-Active-and-Standby-AWS-Cloudguard-reply-to-HTTPS-probes/m-p/263765#M5586</guid>
      <dc:creator>reybanger</dc:creator>
      <dc:date>2025-11-27T13:47:50Z</dc:date>
    </item>
    <item>
      <title>Re: Both Active and Standby AWS Cloudguard reply to HTTPS probes</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Both-Active-and-Standby-AWS-Cloudguard-reply-to-HTTPS-probes/m-p/263870#M5587</link>
      <description>&lt;P&gt;What kind of deployment do you exactly have ?&lt;/P&gt;
&lt;P&gt;from what you wrote it looks like a Cluster HA and with Clusters in AWS we use the “virtual IP” &amp;nbsp;as the destination because it forwards the traffic to the ACTIVE member.&amp;nbsp;&lt;BR /&gt;in AWS we use LB’s only with Autoscale deployments.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Nov 2025 06:07:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Both-Active-and-Standby-AWS-Cloudguard-reply-to-HTTPS-probes/m-p/263870#M5587</guid>
      <dc:creator>Nir_Shamir</dc:creator>
      <dc:date>2025-11-29T06:07:37Z</dc:date>
    </item>
  </channel>
</rss>

