- CheckMates
- :
- Products
- :
- CloudMates Products
- :
- Cloud Network Security
- :
- Discussion
- :
- Should secondary IP addresses assigned to vSEC in ...
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Should secondary IP addresses assigned to vSEC in AWS be present in topology?
AWS requires introduction of secondary IP addresses and EIPs associated with them in order to access servers behind vSEC.
Once address is created and the EIP assigned, the traffic seem to flow through the vSEC,
My question is this:
Should the secondary IP be defined as an alias for the external interface of the vSEC?
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Right.
The Elastic IP is associated with a secondary IP of the vSEC instance.
The NAT for this happens before the vSEC instance sees it.
The secondary IP of the vSEC instance only exists in AWS to get the packet to the vSEC instance (think of it like an ARP).
The vSEC instance will receive the packet (sent to secondary IP) and will process it according to the NAT rulebase.
In general, the only place an Elastic IP address will ever go is the SmartConsole object IP for either:
- A vSEC gateway that is not in the same VPC as the manager
- The vSEC manager object if it's in AWS
The topology/interface configuration doesn't reference elastic IPs at all, neither does the Gaia configuration.
The secondary IP will need to be represented in the Access Policy and NAT rulebase.
It does not need to be configured in Gaia.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You do not need an interface alias in Gaia for the secondary IPs.
The secondary IP is not really for the security gateway, but for a device behind the gateway the firewall is doing NAT for.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
So, not actual secondary IP, nor the assigned EIP should figure anywhere in the Gaia configuration or topology of the vSEC object?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Right.
The Elastic IP is associated with a secondary IP of the vSEC instance.
The NAT for this happens before the vSEC instance sees it.
The secondary IP of the vSEC instance only exists in AWS to get the packet to the vSEC instance (think of it like an ARP).
The vSEC instance will receive the packet (sent to secondary IP) and will process it according to the NAT rulebase.
In general, the only place an Elastic IP address will ever go is the SmartConsole object IP for either:
- A vSEC gateway that is not in the same VPC as the manager
- The vSEC manager object if it's in AWS
The topology/interface configuration doesn't reference elastic IPs at all, neither does the Gaia configuration.
The secondary IP will need to be represented in the Access Policy and NAT rulebase.
It does not need to be configured in Gaia.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thank you.
I'm just covering all the bases while trying to solve the mystery of disappearing Logical Server in this thread:
https://community.checkpoint.com/thread/5748-inconsistent-behavior-of-vsec-in-aws
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Right, but I'm glad to document the knowledge for others that might have the same question.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
A reference architecture sk article would be good, similar to the Azure one. It needs to step through where, when, why for EIP use as none of the guides, even the AWS getting started guide, tackle this subject.
CISSP
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I am not sure if the subject is deserving separate sk or should be incorporated in updated document describing AWS deployment scenarios.
The EIPs are essentially a Static Nat entries of AWS.
- You need one assigned to the external interface of each vSEC
- In case of clustered deployment, additional EIP should be associated with the Secondary IP attached to the active cluster member.
- Further EIPs are associated with each additional Secondary IP representing either Statically NATed servers behind vSEC/Cluster/ASG, or each AWS Internal Load Balancer object represented by the Logical Server object in Check Point.
- I'd imagine that if you are employing external ELB, one EIP per such should be assigned as well.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Vladimir,
I have question for cluster environment. If I attach secondary IP to active member with EIP, in case of failover how it will be diverted to another member.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
We offer a number of CloudFormation templates for AWS that can make the initial deployment simple: AWS CloudFormation Templates
This also links to other SKs for specific configurations (autoscaling, clustering).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I actually have a mild objection to the use of the templates from the get-go:
1. They are finicky and require certain pre-requisites not mentioned in deployment scenarios (number of available EIPs in the Region, location of the management server).
2. When stack is utilized, it may roll-back unexpectedly with limited feedback.
3. It deprives us of the ability to step on the rake a few times. The process that is conducive to downing of comprehension and formation of the long-term memory:)
Nothing wrong with eventually transitioning to coded deployment, but it pays to have to go through the manual process few times.
Just a personal preference.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Totally agree.
The SKs linked in the CloudFormation SK tell you how to do stuff manually if you so desire.
Automation is the only way to do a real deployment, thus why we have CloudFormation scripts that make this easy
Twiddling the nerd knobs on your own (or as you said, stepping on the rake) is definitely important.
This will provide a better understanding of what's going on "behind the scenes" and give you some ability to troubleshoot when things go belly-up (as they sometimes do).
I learned quite a lot about the vSEC Controller when I actually stood up the environment demonstrated here: https://community.checkpoint.com/message/7699-leveraging-the-r8010-api-to-automate-and-streamline-se...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Below are few examples of deployment in AWS that I am presently running in my lab. The dual AZ cluster with external ELB and the ASG are not too far away, provided the client(s) is/are interested: