<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AWS, GWLB vs. FTP in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GWLB-vs-FTP/m-p/169931#M601</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We have the same issue. Our setup is very similar, 4 Gateways in an ASG sitting behind a GWLB. This behaviour is due to the fact that the firewalls do not share session details, we confirmed by looking at our on-prem devices that are setup in HA pairs.&lt;/P&gt;&lt;P&gt;Our first instinct was to ask the App team to move off FTP, but they said that would take a while and it also involves infrastructure changes in the DC. Meanwhile the end customer is suffering is not getting their files...&lt;/P&gt;&lt;P&gt;Our solution was to implement this &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk33760" target="_self"&gt;sk33760&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The app transfers 2000 files give or take a few. So we went up to allowing 500 pending connections and the problem is gone. We have not observed any performance issues.&lt;/P&gt;&lt;P&gt;The setting applies to the whole domain and cannot be applied to a set of firewalls.&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;</description>
    <pubDate>Wed, 01 Feb 2023 14:23:00 GMT</pubDate>
    <dc:creator>Jihed</dc:creator>
    <dc:date>2023-02-01T14:23:00Z</dc:date>
    <item>
      <title>AWS, GWLB vs. FTP</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GWLB-vs-FTP/m-p/168626#M593</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Recently I set up an environment in AWS for a customer, utilizing the cloudformation templates available at:&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk111013" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk111013&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I did the top one, autoscaling group, conmmfigured for gateway loadbalancers.&lt;/P&gt;
&lt;P&gt;Everything is working fine, except a&amp;nbsp; FTP connection. The FTP is doing a couple (data and controll) of connections, and the first one goes over one of the firewalls, but then the other connection moves over to the other firewall...and we are unable to get the connection up.&lt;/P&gt;
&lt;P&gt;Have anyone else had this issue, and is there some workaround - both "dirty" and proper ? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 21 Jan 2023 10:32:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GWLB-vs-FTP/m-p/168626#M593</guid>
      <dc:creator>vinceneil666</dc:creator>
      <dc:date>2023-01-21T10:32:03Z</dc:date>
    </item>
    <item>
      <title>Re: AWS, GWLB vs. FTP</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GWLB-vs-FTP/m-p/168636#M594</link>
      <description>&lt;P&gt;Curious why FTP and not scp/sftp.&lt;BR /&gt;Is it active mode FTP or passive?&lt;/P&gt;</description>
      <pubDate>Sat, 21 Jan 2023 16:13:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GWLB-vs-FTP/m-p/168636#M594</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-01-21T16:13:13Z</dc:date>
    </item>
    <item>
      <title>Re: AWS, GWLB vs. FTP</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GWLB-vs-FTP/m-p/169277#M595</link>
      <description>&lt;P&gt;This is some legacy stuff, we have migrated tons of services and this FTP stuff is something that will be gone within the year/ next year - so they have decided on not working on changing it..its towards a 3rd party, and will trigger to much work. At least, that's what have been decided &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Passive FTP&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 12:59:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GWLB-vs-FTP/m-p/169277#M595</guid>
      <dc:creator>vinceneil666</dc:creator>
      <dc:date>2023-01-26T12:59:58Z</dc:date>
    </item>
    <item>
      <title>Re: AWS, GWLB vs. FTP</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GWLB-vs-FTP/m-p/169372#M596</link>
      <description>&lt;P&gt;I got word back from TAC on this, and it is verified to be an design limitation - it will not work on this setup. So pretty much the only option is to have it changed to SCP.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 08:17:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GWLB-vs-FTP/m-p/169372#M596</guid>
      <dc:creator>vinceneil666</dc:creator>
      <dc:date>2023-01-27T08:17:57Z</dc:date>
    </item>
    <item>
      <title>Re: AWS, GWLB vs. FTP</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GWLB-vs-FTP/m-p/169396#M597</link>
      <description>&lt;P&gt;Just create another rule for return traffic &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 10:25:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GWLB-vs-FTP/m-p/169396#M597</guid>
      <dc:creator>Machine_Head</dc:creator>
      <dc:date>2023-01-27T10:25:44Z</dc:date>
    </item>
    <item>
      <title>Re: AWS, GWLB vs. FTP</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GWLB-vs-FTP/m-p/169449#M598</link>
      <description>&lt;P&gt;FTP in particular communicates an IP address and port as part of the command, even in Passive mode.&lt;BR /&gt;I suspect this is not getting translated somewhere along the way, which will definitely cause FTP to fail.&lt;BR /&gt;scp/sftp is definitely much simpler in this regard since it's a single TCP connection.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 17:59:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GWLB-vs-FTP/m-p/169449#M598</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-01-27T17:59:30Z</dc:date>
    </item>
    <item>
      <title>Re: AWS, GWLB vs. FTP</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GWLB-vs-FTP/m-p/169802#M599</link>
      <description>&lt;P&gt;well, not very elegant, isn't it?&lt;/P&gt;
&lt;P&gt;I see a trouble here as companies also moving legacy stuff in the cloud too.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2023 15:37:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GWLB-vs-FTP/m-p/169802#M599</guid>
      <dc:creator>abihsot__</dc:creator>
      <dc:date>2023-01-31T15:37:57Z</dc:date>
    </item>
    <item>
      <title>Re: AWS, GWLB vs. FTP</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GWLB-vs-FTP/m-p/169803#M600</link>
      <description>&lt;P&gt;unrelated to FTP issue, does healtcheck (tcp/8117) is successful for your gateways? Not sure what I did wrong, but on my side it is "unhealthy", however it seems working fine.&lt;/P&gt;
&lt;P&gt;EC2 -&amp;gt; Load Balancing -&amp;gt; Target Groups -&amp;gt; "Targets" tab&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2023 15:41:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GWLB-vs-FTP/m-p/169803#M600</guid>
      <dc:creator>abihsot__</dc:creator>
      <dc:date>2023-01-31T15:41:28Z</dc:date>
    </item>
    <item>
      <title>Re: AWS, GWLB vs. FTP</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GWLB-vs-FTP/m-p/169931#M601</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We have the same issue. Our setup is very similar, 4 Gateways in an ASG sitting behind a GWLB. This behaviour is due to the fact that the firewalls do not share session details, we confirmed by looking at our on-prem devices that are setup in HA pairs.&lt;/P&gt;&lt;P&gt;Our first instinct was to ask the App team to move off FTP, but they said that would take a while and it also involves infrastructure changes in the DC. Meanwhile the end customer is suffering is not getting their files...&lt;/P&gt;&lt;P&gt;Our solution was to implement this &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk33760" target="_self"&gt;sk33760&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The app transfers 2000 files give or take a few. So we went up to allowing 500 pending connections and the problem is gone. We have not observed any performance issues.&lt;/P&gt;&lt;P&gt;The setting applies to the whole domain and cannot be applied to a set of firewalls.&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2023 14:23:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/AWS-GWLB-vs-FTP/m-p/169931#M601</guid>
      <dc:creator>Jihed</dc:creator>
      <dc:date>2023-02-01T14:23:00Z</dc:date>
    </item>
  </channel>
</rss>

