<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R81.10 Single Gateway Azure deployment in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Single-Gateway-Azure-deployment/m-p/157618#M975</link>
    <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I found the issue - deployment guide related - at step 5.&amp;nbsp;&lt;SPAN&gt;Edited ETH1(internal) in order to be aware of my VNET&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_0-1663668252541.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17821iF5D5D035215B8F91/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_0-1663668252541.png" alt="andreibo_0-1663668252541.png" /&gt;&lt;/span&gt;&amp;nbsp;I missed the fact that eth0 remained Undefined.&lt;/P&gt;&lt;P&gt;FIX: Edited eth0 and set it to "Internet(External)".&lt;/P&gt;&lt;P&gt;NAT to webserver is working now.&lt;/P&gt;&lt;P&gt;New situation I am facing now: internet access for VMs is not working.&lt;/P&gt;&lt;P&gt;1. UDR (route table) points all subnet traffic to internal nic ETH1 of the gateway.&lt;/P&gt;&lt;P&gt;2. All traffic is allowed on gateway&lt;/P&gt;&lt;P&gt;3. Seen that there is a difference in standard deployment from Marketplace, between "Single Gateway" and "Single Gateway - Standalone" and that is for the Standalone deployment there are Route tables both for Frontend and Backend subnets. The Internet access for VMs is still not working by default on none of them.&lt;/P&gt;&lt;P&gt;Troubleshooting is not an option as I want to reach straight deployment documentation so that our partners to have the confidence in deploying without any surprises.&lt;/P&gt;&lt;P&gt;Please, help me find the missing steps and then to have here a deployment doc head to toe.&lt;/P&gt;&lt;P&gt;Best wishes,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Andrei&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;LATER UPDATE&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Internet access from subnets VMs solved as soon as I created the subnet object and set it as Hide behind gateway.&lt;/P&gt;&lt;P&gt;If some one of you is aware of an existing working full documentation here for this deployment, please share it here. Otherwise, I will post a full documentation in the next 2 days.&lt;/P&gt;&lt;P&gt;Best wishes,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Andrei&lt;/P&gt;</description>
    <pubDate>Thu, 22 Sep 2022 14:49:30 GMT</pubDate>
    <dc:creator>ABosinceanu</dc:creator>
    <dc:date>2022-09-22T14:49:30Z</dc:date>
    <item>
      <title>R81.10 Single Gateway Azure deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Single-Gateway-Azure-deployment/m-p/156205#M970</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Testing the CG Network Single Gateway deployment in Azure.&lt;/P&gt;&lt;P&gt;Started following documentation "&lt;SPAN&gt;CloudGuard Network Security for Azure Demo Guide&lt;/SPAN&gt;".&lt;/P&gt;&lt;P&gt;Setup:&lt;BR /&gt;1. Single Gateway - Standalone&lt;/P&gt;&lt;P&gt;2. Webserver&lt;/P&gt;&lt;P&gt;Configured UDRs to point webserver traffic to Security Gateway Backend IP(for VNET, internet, and subnet)&lt;/P&gt;&lt;P&gt;Configured NAT for webserver like in the documentation....what &amp;lt;&amp;lt;http&amp;gt;&amp;gt; req come on Security Gateway Frontend private IP is translated to Webserver.&lt;/P&gt;&lt;P&gt;Created allow policy from accessing webserver from internet.&lt;/P&gt;&lt;P&gt;Facing the following issue:&lt;/P&gt;&lt;P&gt;--&amp;gt; webserver does not reach the internet&lt;/P&gt;&lt;P&gt;--&amp;gt; I cannot access the webserver from internet&lt;/P&gt;&lt;P&gt;--&amp;gt; I see logs in the SMS both ways(from internet to SG and from webserver to internet) accepted, but neither way the goal communication is not started.&lt;/P&gt;&lt;P&gt;Is there any Single Gateway R81.10 Azure Deployment guide that I can follow to understand what I am missing here?&lt;/P&gt;&lt;P&gt;Any ideea about what is missing in the above setup?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;A&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2022 13:13:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Single-Gateway-Azure-deployment/m-p/156205#M970</guid>
      <dc:creator>ABosinceanu</dc:creator>
      <dc:date>2022-09-01T13:13:09Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 Single Gateway Azure deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Single-Gateway-Azure-deployment/m-p/156242#M971</link>
      <description>&lt;P&gt;The precise steps (with screenshots) you've taken would be helpful.&lt;/P&gt;
&lt;P&gt;In terms of troubleshooting: have you done any packet captures on the gateway to see if the traffic is even traversing it? (e.g. with tcpdump or fw monitor)&lt;BR /&gt;That will help determine where the issue might be.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2022 15:45:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Single-Gateway-Azure-deployment/m-p/156242#M971</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-09-01T15:45:01Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 Single Gateway Azure deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Single-Gateway-Azure-deployment/m-p/156481#M972</link>
      <description>&lt;P&gt;Azure Deployment performed steps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Deployed Security Gateway – single gateway à Standalone – R81.10, BYOL.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_0-1662363863080.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17675i5D836784AEFFDB30/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_0-1662363863080.png" alt="andreibo_0-1662363863080.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;This very deployment has created The VNET (vnet01 - 10.0.0.0/16) the resource Group in WestEurope (RG) and the SG required subnets (Frontend &amp;amp; Backend)&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_1-1662363863082.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17676i73BC0DBFDB5B4FD8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_1-1662363863082.png" alt="andreibo_1-1662363863082.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;Subnet “servers” has been created in order to host the linux webserver required for testing.&lt;/LI&gt;&lt;LI&gt;Created required UDR&amp;amp;routes(myVNETroutes) in order to guide webserver traffic to gateway &amp;amp; linked the UDR to the “servers” subnet&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_2-1662363863082.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17677i2A8178AF70DDA89C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_2-1662363863082.png" alt="andreibo_2-1662363863082.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_3-1662363863083.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17678iD92160D02B70BF03/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_3-1662363863083.png" alt="andreibo_3-1662363863083.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_4-1662363863084.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17680iC74E3A82C863FFAC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_4-1662363863084.png" alt="andreibo_4-1662363863084.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;Disabled Anti-Spoofing on both NICs of the SG&lt;/LI&gt;&lt;LI&gt;Edited ETH1(internal) in order to be aware of my VNET&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_5-1662363863084.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17679i17B3DD6514D459EC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_5-1662363863084.png" alt="andreibo_5-1662363863084.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;I edited the cleanup rule and set it to allow any any allow&amp;amp;log, pushed the policy – this is just a POC environment for Azure deployment of CHKP CG Network&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_6-1662363863085.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17681i1D57F70C7BC5FD49/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_6-1662363863085.png" alt="andreibo_6-1662363863085.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;Inserted new NAT config in order to translate any http requests incoming to eth0 to my webserver&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_7-1662363863087.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17682iD36C18E8FA67D94A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_7-1662363863087.png" alt="andreibo_7-1662363863087.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Published &amp;amp; Pushed policy.&lt;/LI&gt;&lt;LI&gt;From browser, if accessing my public IP with http :// in front, I receive timeout but in the logs I see the following&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_8-1662363863094.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17683i17F4C1004A03FC73/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_8-1662363863094.png" alt="andreibo_8-1662363863094.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;removed my public IP for privacy.&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;The ICMP request from webserver to 8.8.8.8 reaches the GS. Also the http request from my laptop reaches the SG.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Command: Tcpdump -nni eth0 port 80&lt;UL&gt;&lt;LI&gt;Result&amp;nbsp;: 07:59:53.834148 IP myPublicIP.59992 &amp;gt; 10.0.2.4.80: Flags [S], seq 1959054956, win 64240, options [mss 64694,nop,wscale 8,nop,nop,sackOK], length 0&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Command: tcpdump -nni eth1&lt;UL&gt;&lt;LI&gt;Result: 08:03:50.896602 IP 10.0.2.4 &amp;gt; 8.8.8.8: ICMP echo request, id 24563, seq 1, length 64&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_9-1662365621929.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17685iD3284ACF539F13E9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_9-1662365621929.png" alt="andreibo_9-1662365621929.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_10-1662365621930.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17686i1F403D1E3E22D212/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_10-1662365621930.png" alt="andreibo_10-1662365621930.png" /&gt;&lt;/span&gt;&lt;UL&gt;&lt;LI&gt;Cpinfo -y all&lt;UL&gt;&lt;LI&gt;This is Check Point CPinfo Build 914000215 for GAIA&lt;/LI&gt;&lt;LI&gt;FW1 build number:&lt;/LI&gt;&lt;LI&gt;This is Check Point Security Management Server R81.10 - Build 220&lt;/LI&gt;&lt;LI&gt;This is Check Point's software version R81.10 - Build 883&lt;/LI&gt;&lt;LI&gt;kernel: R81.10 - Build 793&lt;/LI&gt;&lt;LI&gt;BUNDLE_DANA_AUTOUPDATE&amp;nbsp; Take:&amp;nbsp; 116&lt;/LI&gt;&lt;LI&gt;BUNDLE_CPSDC_AUTOUPDATE Take:&amp;nbsp; 21&lt;/LI&gt;&lt;LI&gt;BUNDLE_PUBLIC_CLOUD_CA_BUNDLE_AUTOUPDATE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Take:&amp;nbsp; 18&lt;/LI&gt;&lt;LI&gt;BUNDLE_NGM_DOCTOR_AUTOUPDATE&amp;nbsp;&amp;nbsp;&amp;nbsp; Take:&amp;nbsp; 15&lt;/LI&gt;&lt;LI&gt;BUNDLE_GENERAL_AUTOUPDATE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Take:&amp;nbsp; 12&lt;/LI&gt;&lt;LI&gt;BUNDLE_CORE_FILE_UPLOADER_AUTOUPDATE&amp;nbsp;&amp;nbsp;&amp;nbsp; Take:&amp;nbsp; 17&lt;/LI&gt;&lt;LI&gt;BUNDLE_INFRA_AUTOUPDATE Take:&amp;nbsp; 55&lt;/LI&gt;&lt;LI&gt;BUNDLE_DEP_INSTALLER_AUTOUPDATE Take:&amp;nbsp; 23&lt;/LI&gt;&lt;LI&gt;BUNDLE_CME_AUTOUPDATE&amp;nbsp;&amp;nbsp; Take:&amp;nbsp; 205&lt;/LI&gt;&lt;LI&gt;BUNDLE_DC_CONTENT_AUTOUPDATE&amp;nbsp;&amp;nbsp;&amp;nbsp; Take:&amp;nbsp; 15&lt;/LI&gt;&lt;LI&gt;BUNDLE_GOT_MGMT_AUTOUPDATE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Take:&amp;nbsp; 101&lt;/LI&gt;&lt;LI&gt;BUNDLE_DC_INFRA_AUTOUPDATE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Take:&amp;nbsp; 30&lt;/LI&gt;&lt;LI&gt;BUNDLE_WEBCONSOLE_AUTOUPDATE&amp;nbsp;&amp;nbsp;&amp;nbsp; Take:&amp;nbsp; 43&lt;/LI&gt;&lt;LI&gt;BUNDLE_HCP_AUTOUPDATE&amp;nbsp;&amp;nbsp; Take:&amp;nbsp; 57&lt;/LI&gt;&lt;LI&gt;BUNDLE_GOT_TPCONF_MGMT_AUTOUPDATE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Take:&amp;nbsp; 36&lt;/LI&gt;&lt;LI&gt;BUNDLE_GOT_TPCONF_AUTOUPDATE&amp;nbsp;&amp;nbsp;&amp;nbsp; Take:&amp;nbsp; 107&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Mon, 05 Sep 2022 08:21:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Single-Gateway-Azure-deployment/m-p/156481#M972</guid>
      <dc:creator>ABosinceanu</dc:creator>
      <dc:date>2022-09-05T08:21:33Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 Single Gateway Azure deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Single-Gateway-Azure-deployment/m-p/156674#M973</link>
      <description>&lt;P&gt;it maybe an issue with the routing, since the Check Point is deployed with 2 NIC by default, the route tables in the Operating System needs to be aware how to use the ETH0 for External and ETH1 for Internal, this is because the interfaces are now like trunks or needs to know other Subnets/vNET by the next hop (the router inside the Subnet), this hop is always the first host of each subnet, so when you edit the UDR, are editing this router, but not the Machine and if we remember the Networking 101 where all the collision domains that are different require a router.&lt;/P&gt;
&lt;P&gt;Looking at your screenshots, I can say the OS need this route.&lt;/P&gt;
&lt;P&gt;set static-route 10.0.0.0/8 nexthop gateway address 10.0.1.1 on&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PD: are you not seeing SYN errors or Stateful Inspection drops?&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2022 16:50:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Single-Gateway-Azure-deployment/m-p/156674#M973</guid>
      <dc:creator>ChristianCastil</dc:creator>
      <dc:date>2022-09-06T16:50:57Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 Single Gateway Azure deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Single-Gateway-Azure-deployment/m-p/156686#M974</link>
      <description>&lt;P data-unlink="true"&gt;I agree with &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/4995"&gt;@ChristianCastil&lt;/a&gt;. It is probably a routing issue. Does the CP GW know about the "&lt;STRONG&gt;servers&lt;/STRONG&gt;' network? &lt;STRONG&gt;10.0.2.0/24&lt;/STRONG&gt;? Maybe you just need to add this network into the GW routing table?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://yourgwip" target="_blank"&gt;https://yourgwip&lt;/A&gt;&amp;nbsp;-&amp;gt; Network Management -&amp;gt; IPv4 Static Routes&lt;/P&gt;
&lt;P data-unlink="true"&gt;or&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;SSH -&amp;gt; "show route"&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2022 17:49:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Single-Gateway-Azure-deployment/m-p/156686#M974</guid>
      <dc:creator>Bryan-Smith</dc:creator>
      <dc:date>2022-09-06T17:49:04Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 Single Gateway Azure deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Single-Gateway-Azure-deployment/m-p/157618#M975</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I found the issue - deployment guide related - at step 5.&amp;nbsp;&lt;SPAN&gt;Edited ETH1(internal) in order to be aware of my VNET&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_0-1663668252541.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17821iF5D5D035215B8F91/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_0-1663668252541.png" alt="andreibo_0-1663668252541.png" /&gt;&lt;/span&gt;&amp;nbsp;I missed the fact that eth0 remained Undefined.&lt;/P&gt;&lt;P&gt;FIX: Edited eth0 and set it to "Internet(External)".&lt;/P&gt;&lt;P&gt;NAT to webserver is working now.&lt;/P&gt;&lt;P&gt;New situation I am facing now: internet access for VMs is not working.&lt;/P&gt;&lt;P&gt;1. UDR (route table) points all subnet traffic to internal nic ETH1 of the gateway.&lt;/P&gt;&lt;P&gt;2. All traffic is allowed on gateway&lt;/P&gt;&lt;P&gt;3. Seen that there is a difference in standard deployment from Marketplace, between "Single Gateway" and "Single Gateway - Standalone" and that is for the Standalone deployment there are Route tables both for Frontend and Backend subnets. The Internet access for VMs is still not working by default on none of them.&lt;/P&gt;&lt;P&gt;Troubleshooting is not an option as I want to reach straight deployment documentation so that our partners to have the confidence in deploying without any surprises.&lt;/P&gt;&lt;P&gt;Please, help me find the missing steps and then to have here a deployment doc head to toe.&lt;/P&gt;&lt;P&gt;Best wishes,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Andrei&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;LATER UPDATE&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Internet access from subnets VMs solved as soon as I created the subnet object and set it as Hide behind gateway.&lt;/P&gt;&lt;P&gt;If some one of you is aware of an existing working full documentation here for this deployment, please share it here. Otherwise, I will post a full documentation in the next 2 days.&lt;/P&gt;&lt;P&gt;Best wishes,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Andrei&lt;/P&gt;</description>
      <pubDate>Thu, 22 Sep 2022 14:49:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Single-Gateway-Azure-deployment/m-p/157618#M975</guid>
      <dc:creator>ABosinceanu</dc:creator>
      <dc:date>2022-09-22T14:49:30Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 Single Gateway Azure deployment</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Single-Gateway-Azure-deployment/m-p/158745#M976</link>
      <description>&lt;P&gt;Come back with the full &lt;STRONG&gt;Azure Deployment Guide for Single Gateway + Security Management Server&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;Doc in Word, not yet been able to make it nice but is Step By Step deployment guide for anyone.&lt;/P&gt;&lt;P&gt;Hope you enjoy it and if requested, I will repost it in several weeks a bit more mice.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2022 14:22:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Single-Gateway-Azure-deployment/m-p/158745#M976</guid>
      <dc:creator>ABosinceanu</dc:creator>
      <dc:date>2022-10-04T14:22:25Z</dc:date>
    </item>
  </channel>
</rss>

