<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filter VNET Peering traffic in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Filter-VNET-Peering-traffic/m-p/168053#M587</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;what you need to do is to add a UDR in the peered subnet (the one that is peered to the GW vNet) and forward the traffic that you need inspected to the GW IP (if its a single GW) or the Internal-LB IP (if it's a cluster or VMSS).&lt;/P&gt;
&lt;P&gt;the peered subnet can reach that IP because of the peering and will route the traffic directly to the GWs via the peering connection.&lt;/P&gt;</description>
    <pubDate>Tue, 17 Jan 2023 11:45:03 GMT</pubDate>
    <dc:creator>Nir_Shamir</dc:creator>
    <dc:date>2023-01-17T11:45:03Z</dc:date>
    <item>
      <title>Filter VNET Peering traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Filter-VNET-Peering-traffic/m-p/168047#M586</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are setting up some VNET Peerings between multiple subscription&lt;/P&gt;&lt;P&gt;VNET Peering are UP and connected however we are not able to filter traffic coming from these VNET (Peered) via the CloudGuard GW&lt;/P&gt;&lt;P&gt;When working with local subnet we jut change the UDR to use CloudGuard as a Gateway however that feature is not availbale with the VNET Peering.&lt;/P&gt;&lt;P&gt;Do we need to implement a Transit GW ?&lt;/P&gt;&lt;P&gt;Is there any documentation / support on this setup ?&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2023 11:31:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Filter-VNET-Peering-traffic/m-p/168047#M586</guid>
      <dc:creator>CP-NDA</dc:creator>
      <dc:date>2023-01-17T11:31:33Z</dc:date>
    </item>
    <item>
      <title>Re: Filter VNET Peering traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Filter-VNET-Peering-traffic/m-p/168053#M587</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;what you need to do is to add a UDR in the peered subnet (the one that is peered to the GW vNet) and forward the traffic that you need inspected to the GW IP (if its a single GW) or the Internal-LB IP (if it's a cluster or VMSS).&lt;/P&gt;
&lt;P&gt;the peered subnet can reach that IP because of the peering and will route the traffic directly to the GWs via the peering connection.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2023 11:45:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Filter-VNET-Peering-traffic/m-p/168053#M587</guid>
      <dc:creator>Nir_Shamir</dc:creator>
      <dc:date>2023-01-17T11:45:03Z</dc:date>
    </item>
    <item>
      <title>Re: Filter VNET Peering traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Filter-VNET-Peering-traffic/m-p/168055#M588</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1792"&gt;@Nir_Shamir&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will do the test but in terms of security we are not managing the second tenant. So if the UDR is changed that means they will have full access to our VNET?&lt;/P&gt;&lt;P&gt;How can we control that setting ?&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2023 11:47:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Filter-VNET-Peering-traffic/m-p/168055#M588</guid>
      <dc:creator>CP-NDA</dc:creator>
      <dc:date>2023-01-17T11:47:24Z</dc:date>
    </item>
    <item>
      <title>Re: Filter VNET Peering traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Filter-VNET-Peering-traffic/m-p/168056#M589</link>
      <description>&lt;P&gt;you can deploy NSGs on your Subnets.&lt;/P&gt;
&lt;P&gt;Also if you Subnets have UDRs to have the return traffic go through the Firewall then even if they don't do the UDR on their end they might reach your resources directly but the return traffic will go through the Firewall which will drop those connections as Out Of State and they won't be able to reach them or open any connections to them.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2023 12:02:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Filter-VNET-Peering-traffic/m-p/168056#M589</guid>
      <dc:creator>Nir_Shamir</dc:creator>
      <dc:date>2023-01-17T12:02:44Z</dc:date>
    </item>
    <item>
      <title>Re: Filter VNET Peering traffic</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Filter-VNET-Peering-traffic/m-p/168058#M590</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1792"&gt;@Nir_Shamir&lt;/a&gt;&amp;nbsp; Indeed we've been able to validate the Out of state during our tests but I though that it would be possible to have a more secure and best solution. the traffic should not hit the machines even if they change the UDR&lt;/P&gt;&lt;P&gt;I will check with NSG to only allow connection to CloudGuard from the remote tenant&lt;/P&gt;&lt;P&gt;Thank you !&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2023 12:18:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Filter-VNET-Peering-traffic/m-p/168058#M590</guid>
      <dc:creator>CP-NDA</dc:creator>
      <dc:date>2023-01-17T12:18:02Z</dc:date>
    </item>
  </channel>
</rss>

