- CheckMates
- :
- Products
- :
- CloudMates Products
- :
- Cloud Network Security
- :
- Discussion
- :
- Cloudguard HA with Loadbalancer
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Cloudguard HA with Loadbalancer
Hi All,
I am having issues with my test lab, same config was working previously.
Cloudguard deployed in HA with Frontend and backend Loadbalancer.
Version R81.20 for both Mgmt and Cluster
Frontend subnet: 10.0.0.0/24
FW-1 10.0.0.4 FW-2 10.0.0.5 Frontend VIP: 10.0.0.6
Backend subnet: 10.0.1.0/24
FW-1 10.0.1.5 FW-2 10.0.1.6 Backend LB: 10.0.1.4
Prod Subnet: 10.1.0.0/24
Webserver IP 10.1.0.4
NO Public IP attached.
Prod Route : Picture attached
NAT rules attached
Access Rules attached
AntiSpoofing off on both internal and external interface
FLB Load balancing rules configured and enable with Floating IP (attached)
VNET peering setup and firewall can ping backend host and also able to ssh from firewall to backend host.
Issue:
same deployment previously worked traffic coming on FrontLB public IP natted to internal (backend server 10.1.0.4).
something has recently changed on Azure Level and its to do with routing dont know what. but traffic from outside to internal/backend host is not reachable.
TCPDUMP:
Traffic coming from home Public IP going to FLB public IP can be seen on Eth0 and on Eth1, no traffic arrive on Backend host.
TCPDUMP on Backend host:
traffic going out from Host to internet can be seen on firewall logs and Firewall Eth1
backend can access Internet and tracroute shows going via active firewall.
have tried everything can be possible and here to ask help, best would be someone to do the lab and can see the behaviour.
Thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
any thoughts?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Have you checked if any applicable Azure NSG has changed and verified that it allows the traffic flow?
Might otherwise be faster to consult TAC via a remote session if you suspect the actual firewall...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Chris,
NSG allow traffic, I have also created an Any Any rule for both direction.