<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IA Rule not matching with PDP &amp;amp; PEP on Maestro in Hyperscale Firewall (Maestro)</title>
    <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/IA-Rule-not-matching-with-PDP-amp-PEP-on-Maestro/m-p/168922#M1387</link>
    <description>&lt;P&gt;I believe the need for a separate gateway to perform IA functions for a Maestro Security Group is a consequence of the Single Management Object (SMO) approach to management, and I don't see how you will able to work around that.&amp;nbsp; I also assume you&amp;nbsp; are familiar with&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk175587&amp;amp;partition=Advanced&amp;amp;product=Quantum" target="_blank"&gt;sk175587: Identity Based Access Control and Threat Prevention - Design Guidelines - Quantum Maestro&lt;/A&gt;.&lt;/P&gt;</description>
    <pubDate>Tue, 24 Jan 2023 12:41:33 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2023-01-24T12:41:33Z</dc:date>
    <item>
      <title>IA Rule not matching with PDP &amp; PEP on Maestro</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/IA-Rule-not-matching-with-PDP-amp-PEP-on-Maestro/m-p/168904#M1386</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We migrated a traditionnal cluster to a Maestro infra last weekend. R81.10 T81&lt;/P&gt;&lt;P&gt;Everything worked as expected but after a while some IA Rule stop matching on one of the member. Identity is acquired via Identity Agent. Users connect to PDP which is the Security Group running in Maestro&lt;/P&gt;&lt;P&gt;In the logs the same trafic is accepter on Member 1_2 but dropped on Member 1_1.&lt;/P&gt;&lt;P&gt;"pdp monitor ip x.x.x.x" returns the correct Roles on both members but rules is not matched. If we change source by IP everything is ok.&lt;/P&gt;&lt;P&gt;I know that Seucurity Group are not the best way to do PDP but in this sutuation we don't have other GW to play taht role. Also it's never metionned that it's not supported (only not recommended in the Maesto limitations SK)&lt;/P&gt;&lt;P&gt;Do you have any idea of what could be the cause ? Any similar problem on your side ?&lt;/P&gt;&lt;P&gt;TAC is already involved but has not provided relevant info right now.&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 11:54:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/IA-Rule-not-matching-with-PDP-amp-PEP-on-Maestro/m-p/168904#M1386</guid>
      <dc:creator>CP-NDA</dc:creator>
      <dc:date>2023-01-24T11:54:26Z</dc:date>
    </item>
    <item>
      <title>Re: IA Rule not matching with PDP &amp; PEP on Maestro</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/IA-Rule-not-matching-with-PDP-amp-PEP-on-Maestro/m-p/168922#M1387</link>
      <description>&lt;P&gt;I believe the need for a separate gateway to perform IA functions for a Maestro Security Group is a consequence of the Single Management Object (SMO) approach to management, and I don't see how you will able to work around that.&amp;nbsp; I also assume you&amp;nbsp; are familiar with&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk175587&amp;amp;partition=Advanced&amp;amp;product=Quantum" target="_blank"&gt;sk175587: Identity Based Access Control and Threat Prevention - Design Guidelines - Quantum Maestro&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 12:41:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/IA-Rule-not-matching-with-PDP-amp-PEP-on-Maestro/m-p/168922#M1387</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-01-24T12:41:33Z</dc:date>
    </item>
    <item>
      <title>Re: IA Rule not matching with PDP &amp; PEP on Maestro</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/IA-Rule-not-matching-with-PDP-amp-PEP-on-Maestro/m-p/168923#M1388</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the reply&lt;/P&gt;&lt;P&gt;Yes we are familiar with this SK&lt;/P&gt;&lt;P&gt;Unfortunately we don't have the option to do PDP outside SG... If it's a clear limitation I wondering why it's not clearly mentionned that we should not implement this. Also this should be reported in Maestro limitations SK don't you think ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 12:43:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/IA-Rule-not-matching-with-PDP-amp-PEP-on-Maestro/m-p/168923#M1388</guid>
      <dc:creator>CP-NDA</dc:creator>
      <dc:date>2023-01-24T12:43:44Z</dc:date>
    </item>
    <item>
      <title>Re: IA Rule not matching with PDP &amp; PEP on Maestro</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/IA-Rule-not-matching-with-PDP-amp-PEP-on-Maestro/m-p/168930#M1390</link>
      <description>&lt;P&gt;Support suggested to use this exception for IA trafic&lt;/P&gt;&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_Maestro_AdminGuide/Topics-Maestro-AG/Forwarding-specific-inbound-connections-to-SMO.htm?Highlight=Forwarding%20specific%20inbound%20connections%20to%20the%20SMO%20Security%20Group%20Member" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_Maestro_AdminGuide/Topics-Maestro-AG/Forwarding-specific-inbound-connections-to-SMO.htm?Highlight=Forwarding%20specific%20inbound%20connections%20to%20the%20SMO%20Security%20Group%20Member&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 12:53:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/IA-Rule-not-matching-with-PDP-amp-PEP-on-Maestro/m-p/168930#M1390</guid>
      <dc:creator>CP-NDA</dc:creator>
      <dc:date>2023-01-24T12:53:28Z</dc:date>
    </item>
    <item>
      <title>Re: IA Rule not matching with PDP &amp; PEP on Maestro</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/IA-Rule-not-matching-with-PDP-amp-PEP-on-Maestro/m-p/168938#M1391</link>
      <description>&lt;P&gt;Right to keep the distribution algorithm from messing with the IA traffic and ensuring symmetry by always sending it to the SMO, makes sense.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 13:34:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/IA-Rule-not-matching-with-PDP-amp-PEP-on-Maestro/m-p/168938#M1391</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-01-24T13:34:24Z</dc:date>
    </item>
    <item>
      <title>Re: IA Rule not matching with PDP &amp; PEP on Maestro</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/IA-Rule-not-matching-with-PDP-amp-PEP-on-Maestro/m-p/168951#M1392</link>
      <description>&lt;P&gt;Seems to be a good idea but I don't know if trafic for IA is considered as a local connection&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can configure the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A class="" href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_Maestro_AdminGuide/Topics-Maestro-AG/Forwarding-specific-inbound-connections-to-SMO.htm?Highlight=Forwarding%20specific%20inbound%20connections%20to%20the%20SMO%20Security%20Group%20Member#" target="_blank" rel="noopener"&gt;&lt;SPAN class=""&gt;Security&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Group&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to forward&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;specific&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;inbound&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;connections&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;SMO&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Security&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Group&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Member&lt;/SPAN&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;TABLE cellspacing="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN class=""&gt;Important:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;This command supports only IPv4&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;connections&lt;/SPAN&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;This command does not support local&amp;nbsp;&lt;SPAN class=""&gt;connections&lt;/SPAN&gt;.&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;In&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A class="" href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_Maestro_AdminGuide/Topics-Maestro-AG/Forwarding-specific-inbound-connections-to-SMO.htm?Highlight=Forwarding%20specific%20inbound%20connections%20to%20the%20SMO%20Security%20Group%20Member#" target="_blank" rel="noopener"&gt;VSX&amp;nbsp;&lt;/A&gt;m&lt;/SPAN&gt;&lt;SPAN&gt;ode, you must run this command in the context of the applicable&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual System&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;This command supports a maximum of 15 exceptions&lt;/P&gt;&lt;P&gt;(in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;VSX&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;mode, this limit is global for all&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Virtual Systems&lt;/SPAN&gt;).&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;These exceptions are saved in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;$FWDIR/tmp/tmp_exception_entries.txt&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;file (IPv4 addresses are converted to a special format).&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Tue, 24 Jan 2023 14:14:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/IA-Rule-not-matching-with-PDP-amp-PEP-on-Maestro/m-p/168951#M1392</guid>
      <dc:creator>CP-NDA</dc:creator>
      <dc:date>2023-01-24T14:14:38Z</dc:date>
    </item>
    <item>
      <title>Re: IA Rule not matching with PDP &amp; PEP on Maestro</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/IA-Rule-not-matching-with-PDP-amp-PEP-on-Maestro/m-p/169068#M1397</link>
      <description>&lt;P&gt;just out of curiosity could you elaborate on what seems to be the issue here?&lt;BR /&gt;For my understanding..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you do pep show user all you see the relevant user in both modules?&lt;/P&gt;&lt;P&gt;Is it not marked down as service account by any chance?&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2023 10:01:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/IA-Rule-not-matching-with-PDP-amp-PEP-on-Maestro/m-p/169068#M1397</guid>
      <dc:creator>Machine_Head</dc:creator>
      <dc:date>2023-01-25T10:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: IA Rule not matching with PDP &amp; PEP on Maestro</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/IA-Rule-not-matching-with-PDP-amp-PEP-on-Maestro/m-p/169809#M1412</link>
      <description>&lt;P&gt;Please see the solution found with R&amp;amp;D&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk180561" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk180561&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2023 16:01:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/IA-Rule-not-matching-with-PDP-amp-PEP-on-Maestro/m-p/169809#M1412</guid>
      <dc:creator>CP-NDA</dc:creator>
      <dc:date>2023-01-31T16:01:24Z</dc:date>
    </item>
    <item>
      <title>Re: IA Rule not matching with PDP &amp; PEP on Maestro</title>
      <link>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/IA-Rule-not-matching-with-PDP-amp-PEP-on-Maestro/m-p/169811#M1413</link>
      <description>&lt;P&gt;Very interesting. And well written sk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2023 16:07:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Hyperscale-Firewall-Maestro/IA-Rule-not-matching-with-PDP-amp-PEP-on-Maestro/m-p/169811#M1413</guid>
      <dc:creator>Machine_Head</dc:creator>
      <dc:date>2023-01-31T16:07:30Z</dc:date>
    </item>
  </channel>
</rss>

