<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cloud Guard for Azure - LocalGatewayInternal dynamic object for hide NAT in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloud-Guard-for-Azure-LocalGatewayInternal-dynamic-object-for/m-p/276925#M6215</link>
    <description>&lt;P&gt;Hello, i would like to use a Hide NAT feature on an Azure Cloud Guard VMSS. NAT will be done on one arm, eth0 only instances, which pass the traffic to/fom private IP's only, (Hide NAT will hide certain 10.0.0.0 private ranges behind another private IP). No internet access is involved. Load balancer is present in front of VMSS.&lt;/P&gt;&lt;P&gt;This works when i'm using a gateway object in NAT rule as translated source (actual gateway IP), but i guess this will not work well after scale out, as other instances created after scale out will not translate properly using this rule. I would like to use a dynamic object pointing to gateway private eth0 IP in NAT rule. I've created and tried to use LocalGatewayInternal dynamic object, as described in:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_VMSS_for_Azure/Content/Topics-Azure-VMSS/Configuration.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_VMSS_for_Azure/Content/Topics-Azure-VMSS/Configuration.htm&lt;/A&gt;&amp;nbsp;,&amp;nbsp; but the traffic hitting NAT rule using this object is being dropped because of unresolved dynamic object, so it does not seem to work. Is there already exising, properly resolved dynamic object which could help in this case?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Wojtek&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 14 May 2026 11:00:15 GMT</pubDate>
    <dc:creator>Wojciech140811</dc:creator>
    <dc:date>2026-05-14T11:00:15Z</dc:date>
    <item>
      <title>Cloud Guard for Azure - LocalGatewayInternal dynamic object for hide NAT</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloud-Guard-for-Azure-LocalGatewayInternal-dynamic-object-for/m-p/276925#M6215</link>
      <description>&lt;P&gt;Hello, i would like to use a Hide NAT feature on an Azure Cloud Guard VMSS. NAT will be done on one arm, eth0 only instances, which pass the traffic to/fom private IP's only, (Hide NAT will hide certain 10.0.0.0 private ranges behind another private IP). No internet access is involved. Load balancer is present in front of VMSS.&lt;/P&gt;&lt;P&gt;This works when i'm using a gateway object in NAT rule as translated source (actual gateway IP), but i guess this will not work well after scale out, as other instances created after scale out will not translate properly using this rule. I would like to use a dynamic object pointing to gateway private eth0 IP in NAT rule. I've created and tried to use LocalGatewayInternal dynamic object, as described in:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_VMSS_for_Azure/Content/Topics-Azure-VMSS/Configuration.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_VMSS_for_Azure/Content/Topics-Azure-VMSS/Configuration.htm&lt;/A&gt;&amp;nbsp;,&amp;nbsp; but the traffic hitting NAT rule using this object is being dropped because of unresolved dynamic object, so it does not seem to work. Is there already exising, properly resolved dynamic object which could help in this case?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Wojtek&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2026 11:00:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloud-Guard-for-Azure-LocalGatewayInternal-dynamic-object-for/m-p/276925#M6215</guid>
      <dc:creator>Wojciech140811</dc:creator>
      <dc:date>2026-05-14T11:00:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cloud Guard for Azure - LocalGatewayInternal dynamic object for hide NAT</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Cloud-Guard-for-Azure-LocalGatewayInternal-dynamic-object-for/m-p/276968#M6217</link>
      <description>&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;Hi Wojtek,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;The steps you would like to perform are very close, but a few adjustments are needed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;Architecturally, you need to adjust the interface where the traffic is received and sent. The setup you are attempting is very common, but it requires a slight modification. All non-Internet-bound traffic should be received and sent through &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;eth1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, not &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;eth0&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;. The general rule of thumb is:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL data-spread="false"&gt;
&lt;LI&gt;&lt;SPAN&gt;East-West traffic should always use &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;eth1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; (in VMSS and HA deployments in Azure)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Egress and Ingress traffic (to/from the Internet) should always use &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;eth0&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; (in VMSS and HA deployments in Azure)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;The Load Balancer deployed by the ARM template on the frontend (&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;eth0&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;) is an external-facing Load Balancer. The backend (&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;eth1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;) Load Balancer is a Standard Internal Load Balancer that forwards traffic to the active members.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;You should expect the traffic flow to work as follows:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;Internal Host SRC → UDR to the Internal LB behind eth1 of the firewall → One of the active members → Hide NAT behind eth1 (as desired) → Internal Host DST&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;In VMSS deployments, the required Dynamic Objects for this setup should already exist. These are configured during gateway provisioning using CME. The following objects are pushed automatically:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL data-spread="false"&gt;
&lt;LI&gt;&lt;CODE dir="ltr"&gt;&lt;SPAN&gt;LocalGatewayExternal&lt;/SPAN&gt;&lt;/CODE&gt;&lt;SPAN&gt; → Translates to eth0&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;CODE dir="ltr"&gt;&lt;SPAN&gt;LocalGatewayInternal&lt;/SPAN&gt;&lt;/CODE&gt;&lt;SPAN&gt; → Translates to eth1&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;You can confirm this by running the following command on the gateways:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE dir="ltr"&gt;&lt;CODE dir="ltr"&gt;&lt;SPAN&gt;dynamic_objects -l&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;To summarize the required changes for your setup:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL start="1" data-spread="false"&gt;
&lt;LI&gt;&lt;SPAN&gt;Ensure the UDR points traffic to the Internal Load Balancer behind &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;eth1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Configure the Hide NAT rule to use a&amp;nbsp; Dynamic object called&amp;nbsp;&lt;/SPAN&gt;&lt;CODE dir="ltr"&gt;&lt;SPAN&gt;LocalGatewayInternal&lt;/SPAN&gt;&lt;/CODE&gt;&amp;nbsp;(Name must match 100%)&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Keep &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;eth0&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; dedicated only for Internet ingress/egress traffic&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Verify the Dynamic Objects on the gateways using &lt;/SPAN&gt;&lt;CODE dir="ltr"&gt;&lt;SPAN&gt;dynamic_objects -l&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Confirm that &lt;/SPAN&gt;&lt;CODE dir="ltr"&gt;&lt;SPAN&gt;LocalGatewayInternal&lt;/SPAN&gt;&lt;/CODE&gt;&lt;SPAN&gt; is matching between the Smart Center and Gateway by running the command&amp;nbsp;&amp;nbsp;&lt;CODE dir="ltr"&gt;dynamic_objects -c&lt;/CODE&gt;&amp;nbsp;on the gateway&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;This should provide the behavior you are expecting.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Best regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Dan Morris&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;|&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;Cloud Security Architect – Cloud Security R&amp;amp;D&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2026 12:55:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Cloud-Guard-for-Azure-LocalGatewayInternal-dynamic-object-for/m-p/276968#M6217</guid>
      <dc:creator>Dan_Morris</dc:creator>
      <dc:date>2026-05-15T12:55:49Z</dc:date>
    </item>
  </channel>
</rss>

