<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall Management Traffic via Cluster VIP in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Firewall-Management-Traffic-via-Cluster-VIP/m-p/247289#M41339</link>
    <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;Hide behind cluster IP is default behaviour and the NO-NAT rule will not help. You have to edit table.def if you want the appliances behave differently.&lt;BR /&gt;&lt;BR /&gt;I mostly use it for traffic like DNS, RADIUS or SecureID. Most of the time this was OK for the standby member to get updates.&lt;BR /&gt;&lt;BR /&gt;You can check with a curl_cli from the standby member&lt;BR /&gt;&lt;BR /&gt;#curl_cli -v -k &lt;A href="https://updates.checkpoint.com" target="_blank"&gt;https://updates.checkpoint.com&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Martijn&lt;/P&gt;</description>
    <pubDate>Fri, 25 Apr 2025 07:00:56 GMT</pubDate>
    <dc:creator>Martijn</dc:creator>
    <dc:date>2025-04-25T07:00:56Z</dc:date>
    <item>
      <title>Firewall Management Traffic via Cluster VIP</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-Management-Traffic-via-Cluster-VIP/m-p/245948#M41095</link>
      <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;We've checkpoint firewalls running in a 'staging' phase configured to support on R81.20 Take 98. When the firewall is trying to initiate a connection from the Management interface (Syslog/Authentication server), observed that it's getting changed to the Cluster VIP IP address.&lt;/P&gt;&lt;P&gt;This is applicable for both the firewalls running in&amp;nbsp;Active/standby and this causes issues with the authentication server as the VIP IP isn't part of the device admin in Radius server.&lt;/P&gt;&lt;P&gt;I don't have any Hide NAT configured to support this configuration.&lt;/P&gt;&lt;P&gt;Can someone please assist on this matter? Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2025 10:32:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-Management-Traffic-via-Cluster-VIP/m-p/245948#M41095</guid>
      <dc:creator>SriNarasimha005</dc:creator>
      <dc:date>2025-04-08T10:32:57Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Management Traffic via Cluster VIP</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-Management-Traffic-via-Cluster-VIP/m-p/245959#M41096</link>
      <description>&lt;P&gt;Open a SR# with CP TAC to get this resolved asap! Your post does not help at all to suggest anything...&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2025 11:27:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-Management-Traffic-via-Cluster-VIP/m-p/245959#M41096</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-04-08T11:27:32Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Management Traffic via Cluster VIP</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-Management-Traffic-via-Cluster-VIP/m-p/245964#M41097</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;Please check&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk31832" target="_blank"&gt;sk31832 - How to prevent a ClusterXL or VRRP Cluster hiding its own traffic behind its Virtual IP address&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;On the management server make changes to $FWDIR/lib/table.def and push policy.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Martijn&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2025 12:43:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-Management-Traffic-via-Cluster-VIP/m-p/245964#M41097</guid>
      <dc:creator>Martijn</dc:creator>
      <dc:date>2025-04-08T12:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Management Traffic via Cluster VIP</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-Management-Traffic-via-Cluster-VIP/m-p/247280#M41337</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3058"&gt;@Martijn&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apologies for the late reply.&lt;/P&gt;&lt;P&gt;From the given SK article, I believe it's a default behaviour for the standby firewall to hide behind the VIP when connections are initiated from the member itself.&lt;/P&gt;&lt;P&gt;Also, as given in the provided SK article, it's been suggested not to add 443 as it might negatively impact the VPN tunnel initiation.&lt;/P&gt;&lt;P&gt;With that said, I assume that&amp;nbsp;&lt;SPAN&gt;standby Firewall be able to reach the Internet/CP portal for AV updates via active firewall which is holding the VIP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is my understanding correct..?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Note: I've placed a NO-NAT rule from the firewall to the destination which didn't resolve this issue.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2025 06:24:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-Management-Traffic-via-Cluster-VIP/m-p/247280#M41337</guid>
      <dc:creator>SriNarasimha005</dc:creator>
      <dc:date>2025-04-25T06:24:37Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Management Traffic via Cluster VIP</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-Management-Traffic-via-Cluster-VIP/m-p/247289#M41339</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;Hide behind cluster IP is default behaviour and the NO-NAT rule will not help. You have to edit table.def if you want the appliances behave differently.&lt;BR /&gt;&lt;BR /&gt;I mostly use it for traffic like DNS, RADIUS or SecureID. Most of the time this was OK for the standby member to get updates.&lt;BR /&gt;&lt;BR /&gt;You can check with a curl_cli from the standby member&lt;BR /&gt;&lt;BR /&gt;#curl_cli -v -k &lt;A href="https://updates.checkpoint.com" target="_blank"&gt;https://updates.checkpoint.com&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Martijn&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2025 07:00:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-Management-Traffic-via-Cluster-VIP/m-p/247289#M41339</guid>
      <dc:creator>Martijn</dc:creator>
      <dc:date>2025-04-25T07:00:56Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Management Traffic via Cluster VIP</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Firewall-Management-Traffic-via-Cluster-VIP/m-p/247291#M41340</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;As checked in the given SK article, I believe this is configured using specific ports (DNS, Radius) which is applicable for all the firewalls hosted in that CMA.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no_hide_services_ports = { &amp;lt;PORT_1,PROTOCOL_1&amp;gt;, &amp;lt;PORT_2,PROTOCOL_2&amp;gt;, ..., &amp;lt;PORT_N,PROTOCOL_N&amp;gt; };&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Is there anyway we can restrict/modify the file only for specific firewalls?&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2025 07:19:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Firewall-Management-Traffic-via-Cluster-VIP/m-p/247291#M41340</guid>
      <dc:creator>SriNarasimha005</dc:creator>
      <dc:date>2025-04-25T07:19:09Z</dc:date>
    </item>
  </channel>
</rss>

