<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ZScaler GRE to CP Cluster in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ZScaler-GRE-to-CP-Cluster/m-p/197017#M36764</link>
    <description>&lt;P&gt;Hello Raj,&lt;/P&gt;&lt;P&gt;For one of my customer i configured GRE tunnels with 2 tunnels, even if in GRE tunnel configuration you specified local address of gateway, active member will replace it by cluster VIP in GRE tunnel establishment and to encapsulate traffic.&lt;BR /&gt;&lt;BR /&gt;So you can use the same local address for differents tunnels, that's what i did and it works.&lt;BR /&gt;&lt;BR /&gt;Also i disagree the configurations steps regarding network topology, here is what i configured :&lt;BR /&gt;&lt;BR /&gt;As Zscaler do not provide enough IP address i used the IP provided for my node as cluster VIP in topology. As local address in tunnel i used another IP address.&lt;BR /&gt;I declared the VIP as scopelocal route as explained in&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk32073" target="_blank"&gt;Configuring Cluster Addresses on Different Subnets (checkpoint.com)&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I attach GRE tunnel configuration, scopelocal routes and the topology configured&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GRE conf.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23040i777BB152A9CBC4DD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="GRE conf.png" alt="GRE conf.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
    <pubDate>Fri, 03 Nov 2023 10:40:47 GMT</pubDate>
    <dc:creator>Guerric_LM</dc:creator>
    <dc:date>2023-11-03T10:40:47Z</dc:date>
    <item>
      <title>ZScaler GRE to CP Cluster</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ZScaler-GRE-to-CP-Cluster/m-p/185360#M34095</link>
      <description>&lt;P&gt;See attachment for solution.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jun 2023 20:44:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ZScaler-GRE-to-CP-Cluster/m-p/185360#M34095</guid>
      <dc:creator>Nathan_Ressel</dc:creator>
      <dc:date>2023-06-30T20:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: ZScaler GRE to CP Cluster</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ZScaler-GRE-to-CP-Cluster/m-p/186048#M34239</link>
      <description>&lt;P&gt;Hi Nathan,&lt;/P&gt;&lt;P&gt;Thanks for providing the solution in the attached cluster guide.&amp;nbsp; I have a few questions -&amp;nbsp;&lt;/P&gt;&lt;P&gt;If a cluster is setup in an active/standby HA configuration, there is a single external VIP.&amp;nbsp; This is used to provision the Zscaler GRE tunnel.&amp;nbsp; &amp;nbsp;Zscaler provides a /29 subnet to be used for the GRE tunnel configuration for 2 tunnels.&amp;nbsp; This does not provide a configuration for 4 tunnels.&lt;/P&gt;&lt;P&gt;As mentioned in the guide, it mentions 2 separate tunnel configurations.&amp;nbsp; Please advise if 2 public IPs were utilized on the firewall cluster.&amp;nbsp; This is not clearly noted.&lt;/P&gt;&lt;P&gt;Also, can you share a screenshot of the SmartConsole Network Management window showing the interface configuration?&lt;/P&gt;&lt;P&gt;If the same GRE configuration is mirrored onto both firewalls, what issues would that present as only a single firewall will be active at any given time.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 15:42:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ZScaler-GRE-to-CP-Cluster/m-p/186048#M34239</guid>
      <dc:creator>Raj_Khatri</dc:creator>
      <dc:date>2023-07-10T15:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: ZScaler GRE to CP Cluster</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ZScaler-GRE-to-CP-Cluster/m-p/197017#M36764</link>
      <description>&lt;P&gt;Hello Raj,&lt;/P&gt;&lt;P&gt;For one of my customer i configured GRE tunnels with 2 tunnels, even if in GRE tunnel configuration you specified local address of gateway, active member will replace it by cluster VIP in GRE tunnel establishment and to encapsulate traffic.&lt;BR /&gt;&lt;BR /&gt;So you can use the same local address for differents tunnels, that's what i did and it works.&lt;BR /&gt;&lt;BR /&gt;Also i disagree the configurations steps regarding network topology, here is what i configured :&lt;BR /&gt;&lt;BR /&gt;As Zscaler do not provide enough IP address i used the IP provided for my node as cluster VIP in topology. As local address in tunnel i used another IP address.&lt;BR /&gt;I declared the VIP as scopelocal route as explained in&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk32073" target="_blank"&gt;Configuring Cluster Addresses on Different Subnets (checkpoint.com)&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I attach GRE tunnel configuration, scopelocal routes and the topology configured&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GRE conf.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23040i777BB152A9CBC4DD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="GRE conf.png" alt="GRE conf.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Fri, 03 Nov 2023 10:40:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ZScaler-GRE-to-CP-Cluster/m-p/197017#M36764</guid>
      <dc:creator>Guerric_LM</dc:creator>
      <dc:date>2023-11-03T10:40:47Z</dc:date>
    </item>
    <item>
      <title>Re: ZScaler GRE to CP Cluster</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ZScaler-GRE-to-CP-Cluster/m-p/222622#M42679</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/20916"&gt;@Guerric_LM&lt;/a&gt;&amp;nbsp; could you please share the total configuration steps with screenshot&lt;/P&gt;</description>
      <pubDate>Sat, 03 Aug 2024 07:32:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ZScaler-GRE-to-CP-Cluster/m-p/222622#M42679</guid>
      <dc:creator>MaheshCheck</dc:creator>
      <dc:date>2024-08-03T07:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: ZScaler GRE to CP Cluster</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ZScaler-GRE-to-CP-Cluster/m-p/224456#M43134</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;i could not provide it, it's customer configuration.&lt;BR /&gt;But with the 1st post and mine you should be able to configure it.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2024 07:53:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ZScaler-GRE-to-CP-Cluster/m-p/224456#M43134</guid>
      <dc:creator>Guerric_LM</dc:creator>
      <dc:date>2024-08-26T07:53:00Z</dc:date>
    </item>
    <item>
      <title>Re: ZScaler GRE to CP Cluster</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ZScaler-GRE-to-CP-Cluster/m-p/228046#M43871</link>
      <description>&lt;P&gt;Maybe this will help:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check Point Cluster -- GRE with Zscaler:&lt;/P&gt;&lt;P&gt;During creation of tunnel in Zscaler you will get following info:&lt;/P&gt;&lt;P&gt;(just examples without real data)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Zscaler public pool: 1.1.1.1 and 2.2.2.2 ( t basing on location they recomend which dc should be used )&lt;/P&gt;&lt;P&gt;Zscaler Internal GRE pool: 172.25.0.0/29 ( you can choose from avaliable /29 pools)&amp;nbsp; = it means that you have x2 /30 = 172.25.0.0/30 &amp;amp; 172.25.0.4/30&lt;/P&gt;&lt;P&gt;Basing on above :&lt;/P&gt;&lt;P&gt;primary_fw-vip_internal_peer - 172.25.0.1 ( 1st usable host)&lt;/P&gt;&lt;P&gt;primary_zscaler_internal_peer- 172.25.0.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;secondary_fw-vip_internal_peer - 172.25.0.5 ( 1st usable host)&lt;/P&gt;&lt;P&gt;secondary_zscaler_internal_peer - 172.25.0.6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our fw data:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;e.g&lt;/P&gt;&lt;P&gt;Fw public pool: fw-01 - 100.100.100.2 , fw-02 -100.100.100.3 , fw-vip - 100.100.100.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;gre1_local_fw01_address &amp;amp; gre1_local_fw02_address&amp;nbsp;&amp;nbsp; - different subnet than delivered by Zscaler, only local significance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;e.g 192.168.0.1/30 &amp;amp; 192.168.0.2/30&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;gre2_local_fw01_address &amp;amp; gre2_local_fw02_address -&amp;nbsp; different subnet than delivered by Zscaler, only local significance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;e.g 192.168.0.5/30 &amp;amp; 192.168.0.6/30&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fw-01&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;add gre id 1 local &amp;lt;pubic_fw-01_ip = 100.100.100.2 &amp;gt; remote &amp;lt;primary_public_zscaler = 1.1.1.1&amp;gt; ttl 255 ip &amp;lt;gre1_local_fw01_address = 192.168.0.1&amp;gt; mask 30 peer &amp;lt;primary_zscaler_internal_peer = 172.25.0.2 &amp;gt;&lt;/P&gt;&lt;P&gt;set interface gre1 comments "Primary GRE to Zscaler"&lt;/P&gt;&lt;P&gt;set interface gre1 state on&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;add gre id 2 local &amp;lt;pubic_fw-01_ip = 100.100.100.2&amp;gt; remote&amp;nbsp; &amp;lt;secondary_public_zscaler = 2.2.2.2 &amp;gt; ttl 255 ip &amp;lt;gre2_local_fw01_address = 192.168.0.5&amp;gt; mask 30 peer &amp;lt;secondary_zscaler_internal_peer = 172.25.0.6&amp;gt;&lt;/P&gt;&lt;P&gt;set interface gre2 comments "Secondary GRE to Zscaler"&lt;/P&gt;&lt;P&gt;set interface gre2 state on&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fw-02&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;add gre id 1 local &amp;lt;pubic_fw-02_ip = 100.100.100.3&amp;gt; remote &amp;lt;primary_public_zscaler = 1.1.1.1&amp;gt; ttl 255 ip &amp;lt;gre1_local_fw02_address = 192.168.0.2&amp;gt; mask 30 peer &amp;lt;primary_zscaler_internal_peer = 172.25.0.2&amp;gt;&lt;/P&gt;&lt;P&gt;set interface gre1 comments "Primary GRE to Zscaler"&lt;/P&gt;&lt;P&gt;set interface gre1 state on&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;add gre id 2 local &amp;lt;pubic_fw-02_ip = 100.100.100.3&amp;gt; remote&amp;nbsp; &amp;lt;secondary_public_zscaler = 2.2.2.2&amp;gt; ttl 255 ip &amp;lt;gre2_local_fw02_address = 192.168.0.6&amp;gt; mask 30 peer &amp;lt;secondary_zscaler_internal_peer = 172.25.0.6&amp;gt;&lt;/P&gt;&lt;P&gt;set interface gre2 comments "Secondary GRE to Zscaler"&lt;/P&gt;&lt;P&gt;set interface gre2 state on&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;set static-route &amp;lt;primary_zscaler_internal_peer_range/30 = 172.25.0.0/30&amp;gt; nexthop gateway logical gre1 on&lt;/P&gt;&lt;P&gt;set static-route &amp;lt;primary_zscaler_internal_peer_range/30= 172.25.0.0/30&amp;gt; scopelocal on&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;set static-route &amp;lt;secondary_zscaler_internal_peer_range/30 = 172.25.0.4/30&amp;gt; nexthop gateway logical gre2 on&lt;/P&gt;&lt;P&gt;set static-route &amp;lt;secondary_zscaler_internal_peer_range/30 = 172.25.0.4/30&amp;gt; scopelocal on&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Scope Local&lt;/P&gt;&lt;P&gt;Use this setting on a Cluster Member when the cluster virtual IPv4 address is in a different subnet than the IPv4 address of a physical interface. Now the Cluster Member can accept static routes on the subnet of the cluster virtual IPv4 address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;set ip-reachability-detection ping address &amp;lt;primary_public_zscaler = 1.1.1.1&amp;gt; enable-ping on&lt;/P&gt;&lt;P&gt;set ip-reachability-detection ping address &amp;lt;secondary_public_zscaler= 2.2.2.2&amp;gt; enable-ping on&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;set pbr table GRETable static-route default nexthop gateway address &amp;lt;primary_zscaler_internal_peer = 172.25.0.2&amp;gt; priority 1&lt;/P&gt;&lt;P&gt;set pbr table GRETable static-route default nexthop gateway address &amp;lt;primary_zscaler_internal_peer = 172.25.0.2&amp;gt; monitored-ip &amp;lt;primary_public_zscaler = 1.1.1.1&amp;gt; on&lt;/P&gt;&lt;P&gt;set pbr table GRETable static-route default nexthop gateway address &amp;lt;primary_zscaler_internal_peer = 172.25.0.2&amp;gt; monitored-ip-option fail-any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;set pbr table GRETable static-route default nexthop gateway address &amp;lt;secondary_zscaler_internal_peer = 172.25.0.6&amp;gt; priority 2&lt;/P&gt;&lt;P&gt;set pbr table GRETable static-route default nexthop gateway address &amp;lt;secondary_zscaler_internal_peer = 172.25.0.6&amp;gt; monitored-ip &amp;lt;secondary_public_zscaler = 2.2.2.2&amp;gt; on&lt;/P&gt;&lt;P&gt;set pbr table GRETable static-route default nexthop gateway address &amp;lt;secondary_zscaler_internal_peer = 172.25.0.6&amp;gt; monitored-ip-option fail-any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Get topology:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled picture.png" style="width: 609px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27808iF88C0287EF87D7F3/image-size/large?v=v2&amp;amp;px=999" role="button" title="Untitled picture.png" alt="Untitled picture.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;Nat:&lt;/P&gt;&lt;P&gt;From fw-01_public = 100.100.100.2 and fw-02_public = 100.100.100.3 do a source nat 100.100.100.1 toward zscaler 1.1.1.1 &amp;amp; 2.2.2.2&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 12:35:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ZScaler-GRE-to-CP-Cluster/m-p/228046#M43871</guid>
      <dc:creator>KamilZet</dc:creator>
      <dc:date>2024-09-26T12:35:35Z</dc:date>
    </item>
  </channel>
</rss>

