Configuration Steps
Step 1 Create a Microsoft Entra ID and Service Principal
With the Microsoft Entra ID and Service Principal, the Check Point Security Management Server Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. monitors the creation and status of the VMSS, so it can complete the provision of these Security Gateways.
-
Connect to portal.azure.com.
-
Click Microsoft Entra ID.
-
Click +Add > App registration. The Register an application screen opens
-
Create new registration:
-
Select a meaningful Name.
-
Supported account types - Select Accounts in this organizational directory only (Single tenant).
-
Redirect URL - Select Web, and type https://localhost/vmss-name - instead of vmss-name. It can be any name.
-
Click Register. The new application is created.
-
In the new application screen, on the left menu pane click Manage > Certificates and secrets.
-
In the Client Secrets tab, click + New Client Secret.
-
Add the duration for the key.
-
Click Add.
-
Backup the key. You cannot look at the key later. Save it now.
-
After you create the application, write down these values to use in "Configure the Check Point Security Management Server" step.
-
Application ID
client_id
-
Key value
client_secret
-
Tenant ID
directory (tenant) ID
Step 2 Install the Check Point Security Management Server
We recommend you to use Smart-1 Cloud (Check Point's management server as a Service) to manage CloudGuard Network Azure Virtual Machine Scale Sets (VMSS).
Refer to Quantum Smart-1 Cloud Administration Guide > Using the settings > Cloud Management Extension (CME) Configuration for step-by-step instructions for enabling CME in Smart-1 Cloud management.
These steps are required only if you do not have an installed Check Point Security Management Server Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server..
If you already have the Check Point Security Management Server installed, skip to Step 3.
-
Must be Check Point .
-
Must start connections to the CloudGuard Network Security Gateways.
Have to start connections to the Security Management Server. For example, to send logs.
Follow the instructions in the Deploying a Security Management Server in Azure section.
Follow the instructions in the Check Point Installation and Upgrade Guide for your Management Server version.
Step 3: Configure the Check Point Security Management Server
Do these steps to manage the Virtual Machine Scale Sets with the Check Point Security Management Server:
-
Downloading and Installing the Latest CME (Cloud Management Extension) Version of CME.
-
Configuring the Cloud Management Extension (CME) on the Security Management Server
-
Configure the Security Policy Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection. in SmartConsole Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on..
Important - The policy name must be the same as the value that you configure in "Install the Check Point Security Management Server ."
Note - By default, each Check Point Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. and Security Management Server's Gaia Portal Web interface for the Check Point Gaia operating system. is accessible from the internet by browsing to http://<virtual-machine-public-ip>. Restriction of access to the Gaia Check Point security operating system that combines the strengths of both SecurePlatform and IPSO operating systems. Portal is possible by configuring a Network Security Group, or by configuring the Check Point Security Gateway and Management Server settings.
Step 4: Deploy the Check Point VMSS and Assign the Microsoft Entra ID Application
-
Deploy the CloudGuard Network Security - Firewall & Threat Prevention from the Azure Marketplace.
-
Click Get it Now.
-
In Software plan drop-down window, Select CloudGuard Scale Set and click Continue.
-
Click Create.
-
In the Create CloudGuard Scale Set screen that opens, fill in the parameters according to the tables below.
-
Use these parameters in the Basic section
Parameter
Description
Subscription
The Azure subscription, where the VMSS is deployed.
Resource group
The Azure Resource Group, where the VMSS is deployed.
Important - The Resource Group must be empty (must not contain any Azure resources),
Note: Resource group name must not contain reserved words based on: sk40179.
Region
The region, where the VMSS is deployed.
Gateway scale set name
The name of the VMSS resource group.
Authentication type
The option to authenticate either with the public key or with a username and password when establishing SSH connections to the CloudGuard Network Security Gateway
-
Use these parameters in the Check Point VMSS settings section
Parameter
Description
Are you upgrading your CloudGuard VMSS solution?
Defines if this a new deployment, or function of this deployment is to upgrade an existing VMSS deployment.
If this is an upgrade of the CloudGuard VMSS solution, select Yes and follow the VMSS Upgrade procedure.
Initial number of Security Gateways
The minimum number of CloudGuard Network Security Gateways instances in the VMSS.
We recommend a minimum of two.
Maximum number of Security Gateways
The maximum number of CloudGuard Network Security Gateways instances in the VMSS.
Management name
The name of the Security Management Server.
Example:
my-management
See Configuring the Cloud Management Extension (CME) on the Security Management Server
Configuration template name
The name of the configuration template from the CME service.
Example:
my-configuration-template
Administrator email address
The email address of the Administrator responsible for scaling operations, such as the launch of a new gateway, or a gateway termination.
Load Balancer deployment
Defines which Load Balancer to deploy:
-
Standard (External & Internal inspection).
-
External only (Inbound inspection only).
-
Internal only (Outbound & East-West inspection only). For outbound inspection, it is mandatory to deploy an External Load Balancer and, or instance-level public IP addresses.
Deploy the Load Balancers with floating IP
If you select yes, each Load Balancer is deployed with Floating IP enabled.
Default value: no.
Check Point CloudGuard External Load Balancer session persistence
The load balance distribution method for the External Load Balancer - Inbound.
See Configure the distribution mode for Azure Load Balancer.
Check Point CloudGuard Internal Load Balancer session persistence
The load balance distribution method for the Internal Load Balancer - Outbound and East-West.
See Configure the distribution mode for Azure Load Balancer.
Deploy the VMSS with instance level public IP address
If you select yes, each VMSS instance gets its own public IP address.
The Security Management Server can use those IP addresses to manage from the external VNET.
Default value: no.
Important - The value you configure is irreversible.
Deploy the VMSS with Public IP Prefix
If you select yes, the VMSS is deployed with a Public IP Prefix
Create new or existing Public IP Prefix
If you select new, select the IPv4 prefix length
Note:
The VMSS is not allowed to contain more instances than the prefix size
Management interface and IP address
Select which IP address to use as the management interface for the VMSS:
-
Backend NIC's private IP address.
-
Frontend NIC's public IP address - only available if you deploy an Instance Level Public IP (ILPIP) address.
-
Frontend NIC's private IP address.
Private:
Manage the Gateway VMSS with the private IP address of the instance. The Security Management Server must have access to the private IP addresses. For example, to be in the same/peered VNET.
In case you use the frontend NIC, you must add a corresponding rule Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. in the Frontend Route Table: Destination & Next Hop: <The private IP address of the Security Management Server>.
Public:
Manage the Gateway VMSS with the public IP address of the instance.
Note:
Support for private addresses is available with Add-On version 419 and above, and template version 20200303 and above.
Number of Availability Zones to use
Defines the Azure Availability Zones for your VMSS:
-
None - Do not use Azure Availability Zones.
-
1 - Use Azure zonal redundancy.
-
2 - Use Azure two-zones redundancy (zones [1, 2])
-
3 - Use Azure three-zones redundancy (zones [1, 2, 3])
Notes:
-
Only available if you deploy in a supported Azure location.
-
Support for Azure Availability Zones is available with template version 20200303 and above.
DNS Resource Zone ID
Resource Id is the unique, permanent, identifier assigned to each Azure resource. The DNS Zone Resource in its related Properties tab.
DNS Record Set Name
DNS Record that includes a maximum of 20 public IPs of VMSS instances. If a current Record Set is used, all its records are replaced with the VMSS instances' public IPs.
Enable CloudGuard metrics
Enables CloudGuard metrics to allow VMSS instances to send statuses and statistics to the Azure Monitor service.
If the CloudGuard metrics are enabled in the VMSS deployment, then:
-
System Assigned Managed Identity is created and the "Monitoring Metrics Publisher" role is assigned to the VMSS Resource Group.
-
The CloudGuard metrics agent starts to send metrics each minute.
-
The CloudGuard metrics are sent to the Azure Monitor resource immediately after the VMSS deployment is completed.
To show CloudGuard, from the VMSS view, click Monitoring > Metrics > Metric Namespace - "cloudguard".
-
-
Use these parameters in the Check Point CloudGuard Settings
Parameter
Description
Check Point CloudGuard version
Select the Check Point version you want to install.
License type
Select the license type to use:
-
Bring Your Own License
-
Pay As You Go (NGTP)
-
Pay As You Go (NGTX)
Virtual Machine size
The VM size of the Security Gateway
Default shell for the admin user
Select the admin’s default shell.
SIC key
Set the Secure Internal communication one time secret.
Enable Maintenance Mode
A password hash to enable VM maintenance mode
Maintenance Mode password hash
To get a hash string for a password, run this command in the Expert mode:
grub2-mkpasswd-pbkdf2
-
-
Use these parameters in the Network settings section
Parameter
Description
Network setting
A pre-existing Virtual Network Environment of logically connected Virtual Machines. and its subnets, or the name of a new Virtual Network and subnets, where the VMSS is deployed.
Note:
When you use a pre-existing subnet:
-
Make sure no other Virtual Machines are deployed in those subnets
-
Make sure to correctly define user defined routes (UDR) for each subnet (see the Network Diagram section).
-
Make sure that an NSG is associated with the frontend subnet that allows all inbound and outbound TCP and UDP traffic.
Network Security Group
The Network Security Group that you attach to the Vnet.
-
-
Use these parameters in the Tags section
Parameter
Description
Name, Value
Azure tags to attach to the selected resources.
-
-
Go to the Review+create tab, review the information, and click Create.
-
After the deployment is complete, register the Microsoft Entra application and assign a role to the application as described in Register a Microsoft Entra app and create a service principal > Assign a role to the application. Give the VMSS and the VNET a minimum role of Reader.
For more information on Managed identities, see the Azure documentation overview.
Notes:
-
Newly provisioned Security Gateways automatically receive the latest published Security Policy. You have to install the policy on the existing Security Gateways to update their Security Policy.
-
Auto Scaling Security Gateway objects are automatically created and deleted according to the current environment. Therefore, we do not recommend that you use specified objects in rules. In additions, we do not recommend that you manually edit those objects.
-
In case of scale out event, the latest released Check Point image is used to deploy the new Virtual Machine.
-
When you use the template version 20181017 or above:
-
Fast Deployment Images (Blink) with a pre-installed Jumbo Hotfix Accumulator Collection of hotfixes combined into a single package. Acronyms: JHA, JHF, JHFA. is used.
-
In case of scale out event, the newer Virtual Machine uses the latest released Check Point image.
For more information, see these SK articles:
-
-
By default, each Check Point Security Gateway and Security Management Server's Gaia Portal is accessible from the internet at https://<virtual-machine-public-ip>. It is possible to control the access to the Gaia Portal. Configure a Network Security Group or configure the Check Point Gateway and Management Server settings.
Step 5: (Optional): Deploy External Application Gateway
Prerequisites:
-
A domain in your possession.
-
A subnet that can contains only the External Application Gateway in the VMSS's VNET.
To deploy an External Application Gateway:
From the Azure Portal, go to Application gateways > deploy a new Application Gateway.
Use these parameters in the Basics configuration section:
Parameter |
Description |
---|---|
|
Select the VMSS's subscription. |
|
Select the VMSS's resource group. |
|
Select the VMSS' region. |
|
Select Standard V2. |
|
Select Yes. |
|
The minimum number of Application Gateway instances. We recommend a minimum of two instances. |
|
The maximum number of Application Gateway instances. |
|
Select VMSS's VNET. |
|
Select the subnet created for Application Gateway. |
Use these parameters in the Frontends section
Parameter |
Description |
---|---|
|
Select Public. |
To add one Backend pool use these parameters in Backends section:
Select Add a Backend pool.
Parameter |
Description |
---|---|
|
Select VMSS. |
|
Use the CloudGuard Network VMSS deployed in Step 5: (Optional): Deploy External Application Gateway. |
From the Configuration section, click Add a routing rule.
Use these parameters in the Listener section:
Parameter |
Description |
---|---|
|
Select Public. |
|
Select HTTP or HTTPS. If you selected HTTPS, upload the certificate used by your web servers. |
|
The port that the Application Gateway listens to. |
|
Select Multi site. |
*Appears only when selecting Multi site |
DNS CNAME record that is associated to this rule. For example: |
Use these parameters in the Backends targets section:
Parameter |
Description |
---|---|
|
Select Backend pool. |
|
Select the CloudGuard Network VMSS backend's target created in the Backend pool section. |
|
Click Add new and follow the instructions in "Backend settings". |
Use these parameters in the HTTP settings section:
Parameter |
Description |
---|---|
Backend protocol
|
The protocol used by the Application Gateway to forward the traffic to the CloudGuard Network VMSS. Select HTTP or HTTPS. If you select HTTPS, upload the certificate file used by your web servers. |
Backend port
|
The port used by the Application Gateway to forward traffic to the CloudGuard Network VMSS. *You cannot use ports 80, 443, 444, 8082, 8117, and 8880 for forwarded traffic. |
To complete the HTTP settings creation, click Add.
To complete the Routing rule creation, click Add.
Review and create this Application Gateway.
Note – The Application Gateway deployment completes in about 20 minutes or less.
After the Application Gateway deployment is complete, go to the Application Gateway (Overview) > Frontend public IP address > Configuration.
You can access the configuration menu also from Resource group > Public IP Address of the application Gateway > Configuration.
Add a DNS name label and click Save.
Add in your domain a DNS CNAME record to the Application Gateway.
Parameter |
Description |
---|---|
Name
|
The listener's hostname |
Value
|
The Frontend public IP address DNS name label. |
Go to the Application Gateway that was created and navigate to Health probes.
Create a new Health probe.
Use these parameters in the Health probe dialog:
Parameter |
Description |
---|---|
Protocol
|
Select HTTP or HTTPS. |
Pick hostname from the backend HTTP setting
|
Select No. |
|
Enter the hostname that you entered in the "Listener" section. |
|
Select Yes. |
|
Relative path of the probe on the application server. For example: |
|
Use the HTTP settings that you created in the Backend settings section. |
Important - The Health Probe checks the communication up to the application server. Hence, the Backend health tests passes only when the full solution is deployed and configured.
Edit the route table:
-
Add a route from the VMSS Frontends subnet to the Application Gateway subnet.
-
Go the external VMSS subnet by default named "VMSS-Frontend" > Routes > click Add.
-
Name: To-external-application-gateway
-
Address prefix: the address prefix of the external Application Gateway subnet
-
Next hop type: Virtual network
-
-
Click OK.
Add a static route for the VMSS instances:
-
Connect to the command line on the Security Management Server.
-
Log in to the Expert mode.
-
Download the
static_route_config_sh
script from this link. -
Edit
static_route_config_sh
and enter the EXTERNAL_AGW_SUBNET_CIDR and EXTERNAL_VMSS_SUBNET_DEFAULT_GATEWAY values. -
Copy the script to the Management Server, use this name:
$MDS_FWDIR/conf/static_route_config_<CONFIGURATION-TEMPLATE-NAME>.sh
-
Assign the execute permission to the shell script, run:
chmod u+x $MDS_FWDIR/conf/static_route_config_<CONFIGURATION-TEMPLATE-NAME>.sh
-
Make sure there are no syntax mistakes in the shell script, run:
sh -n $MDS_FWDIR/conf/static_route_config_<CONFIGURATION-TEMPLATE-NAME>.sh
-
Configure CME and set the relevant template to use this script, run:
autoprov_cfg set template –tn <CONFIGURATION-TEMPLATE-NAME> –cg $MDS_FWDIR/conf/static_route_config_<CONFIGURATION-TEMPLATE-NAME>.sh
Step 6: (Optional): Deploy Internal Application Gateway
Prerequisite - A subnet that can contain only Internal Application Gateway in the VMSS's VNET. This subnet is different from the one created in step 6.
To deploy Internal Application Gateway:
From the Azure Portal, go to Application gateways > deploy a new Application Gateway.
Use these parameters in the Basics section:
Parameter |
Description |
---|---|
|
Select the VMSS's subscription. |
|
Select the VMSS's resource group. |
|
Select the VMSS's region. |
|
Select Standard. |
|
We recommend a minimum of two. |
|
Select the VMSS's VNET. |
|
Use the internal Application Gateway subnet. |
Use these parameters in the Frontends section:
Parameter |
Description |
---|---|
|
Select Private. |
Use these parameters in the Backends section:
Add one backend pool for each application type.
Use these parameters to add one backend pool:
Parameter |
Description |
---|---|
Target Type
|
Virtual Machine or VMSS |
Target
|
The web server Virtual Machine or the application web server VMSS. |
From the Configuration section, click Add a routing rule.
Use these parameters in the Listener section:
Parameter |
Description |
---|---|
|
Select Private. |
|
Use the same protocol as the external Application Gateway HTTPS settings. If you selected HTTPS, upload the certificate file used by your web browser. |
|
The port that the Application Gateway listens to. |
|
Select Multi site. |
|
DNS CNAME record that is associated to this rule. For example, |
Use these parameters in the Backends targets section:
Parameter |
Description |
---|---|
|
Select Backend pool. |
|
Select the backend target created in the Backend pool section. |
|
Click Add new and follow the instructions "HTTP Settings". |
|
Click Add multiple targets to create a path-based rule and follow the instructions in "Add Path". |
Use these parameters in the HTTP settings dialog:
Parameter |
Description |
---|---|
|
The protocol used by the Application gateway to forward the traffic to the web servers. Select HTTP or HTTPS. If you selected HTTPS, upload the CERT file used by your web servers. |
|
The port used by the Application gateway to forward traffic to the web servers. |
To complete the HTTP settings, click Add.
Use these parameters in Add a path dialog:
Parameter |
Description |
---|---|
|
The URL suffix that matches this rule. |
|
Use the same HTTP settings created in the HTTPS settings section. |
|
Select the Backend's target created in the Backend pool section. |
To complete a Path-based routing rule, click Add. If it necessary, you can create more Path-based rules.
Review and create this Application Gateway.
Note – The Application Gateway deployment completes in about 20 minutes.
After the Application Gateway deployment is completes, go to Resources and navigate to Health probes.
Use these parameters to create a new Health probe:
Parameter |
Description |
---|---|
|
Select HTTP or HTTPS. |
|
Select No. |
|
Enter the hostname entered in the Listener section. |
|
Select Yes. |
|
Relative path of the probe on the application server. For example: |
|
Use the HTTP settings created in the HTTP settings section. |
This health probe checks traffic up to the application servers. But the Backends health tests passes only when the application servers are deployed.
Cleanup
After the deployment of the Internal and External Application Gateways (steps 6 and 7), go to the VMSS resource group and delete the External Load Balancer object created automatically in step 5. The External Load Balancer is named by default: frontend-lb.
Note - For outbound inspection, use the Internal Load Balancer
Step 7: (Optional) Set Up Traffic Manager External Endpoints
Microsoft Azure Collection of integrated cloud services that developers and IT professionals use to build, deploy, and manage applications through a global network of data centers managed by Microsoft®. Traffic Manager allows you to control how network traffic is distributed to VMSS that run in different regions.
When the Traffic Manager receives a DNS request, it selects an available endpoint in the closest region to return the DNS response.
To set up Traffic Manager External Endpoints:
Step | Instructions |
---|---|
1 |
From the Azure portal, navigate to the Traffic Manager profile created in step 7. |
2 |
In the Traffic Manager profile, select Configuration and enter this information in the required information:
|
3 |
In the Traffic Manager profile, select Endpoints, click Add, and enter this information in the required field:
|
4 |
After creating the Endpoint makes sure the Monitor Status is set to Online. |
5 |
To create morel Endpoints with different DNS Record Sets, do steps 3 and 4 again. |
Step 8: Set Up the External Load Balancer
By default, the template you deploy creates an external (Internet facing) Load Balancer that:
-
Listens on TCP port 80 on the static public IP address of the External Load Balancer.
-
Forwards the traffic it receives to the pool of Check Point CloudGuard Security Gateways on TCP port 8081.
-
Uses TCP health probes on port 8117 to know the health of the Check Point CloudGuard Network Security Gateways.
Notes:
-
You cannot use ports 80, 443, 444, 8082, 8117, and 8880 for forwarded traffic.
-
In addition, you cannot use the ports defined in sk52421 (used by Check Point software), and 32768 – 65535 as defined in sk162619 (FWD daemon listening on multiple random high ports).
-
Do not change the health probes.
-
The Check Point VMSS Resource Group includes a Network Security Group (NSG). By default, the NSG allows all outbound and inbound traffic.
You can configure the Load Balancer to listen on more ports and/or on more public IP addresses. See Load balancing with Multiple front-ends.
For use cases, see these links:
Step 9: Configure Inbound Protection
Step |
Description |
---|---|
1 |
Connect with SmartConsole to your Security Management Server or Multi-Domain Server Dedicated Check Point server that runs Check Point software to host virtual Security Management Servers called Domain Management Servers. Synonym: Multi-Domain Security Management Server. Acronym: MDS.. |
2 |
Create a host object to represent one of these:
You have to do this for each Internal Load Balancer you use to balance your servers. Follow these steps:
|
3 |
Create a new TCP service to represent the External Load Balancer or External Application Gateway configuration. You have to do this for each backend port, such as port 8081. Do these steps:
|
4 |
Create a corresponding Access Control rule for each External Load Balancer with these values: When Floating IP is disabled: When Floating IP is enabled: Note: Create only one LocalGatewayExternal object for each Security Management Server. See Creating Dynamic Objects 'LocalGatewayExternal' and 'LocalGatewayInternal'. |
5 |
Create a NAT rule with these values for each Azure External Load Balancer or External Application Gateway. In the Translated Source column:
When Floating IP is disabled: When Floating IP is enabled: Note - Do not use |
|
This NAT rule:
|
6 |
Publish the session. |
7 |
Install the Access Control Policy on the CloudGuard Security Gateways. |
Note - If HTTPS Inspection Feature on a Security Gateway that inspects traffic encrypted by the Secure Sockets Layer (SSL) protocol for malware or suspicious patterns. Synonym: SSL Inspection. Acronyms: HTTPSI, HTTPSi. is necessary, see Configuring HTTPS Inspection.
Step 10: Configure Outbound and East-West Protection
Configure UDR tables and NAT rules for Southbound-Northbound and East-West traffic protection. See the diagrams of the traffic flows.
You can configure the Check Point VMSS to examine Outbound and East-West traffic across internal subnets.
You can use this to examine and control traffic of different web clients such as
-
Servers and containers that must have software and image updates from repositories located outside the Virtual Network.
-
Virtual desktop environments that run in the Virtual Network and that access the Internet or each other.
-
Servers that send traffic to each other.
To configure inspection of the traffic from servers in internal private subnets, you have to route traffic through the Check Point VMSS. Use the Check Point Internal Load Balancer as the Next hop in the private subnet UDR. The Internal Load Balancer then forwards all the traffic to one of the Check Point Security Gateways.
Note - The Internal Load Balancer deploys by default as part of the solution template and is automatically configured. It is configured to listen and forward all TCP or UDP traffic on HA Ports. The Internal Load Balancer gets an automatically assigned name backend-lb
. Probes monitor the health of the Check Point VMSS on the TCP port 8117 from source IP address 168.63.129.16.
Configuring Protection for the VMSS VNET
Step |
Description |
---|---|
1 |
Connect with SmartConsole to your Security Management Server or Multi-Domain Server. |
2 |
Create a Network object that represents the azure VNET:
|
3 |
In SmartConsole, from the left navigation panel, click Security Policies. |
4 |
In the Access Control section, click NAT. |
5 |
Make sure these Automatic NAT rules exist: |
6 |
In the Access Control section, click Policy. |
7 |
Add this explicit Access Control rule: |
8 |
In SmartConsole, install the Access Control Policy. |
9 |
Connect to the Azure portal. |
10 |
Add UDR rules with the Internal Load Balancer private IP as next hop. Do this for each internal private subnet.
|
NAME |
ADDRESS PREFIX |
NEXT HOP |
---|---|---|
to-internal |
10.0.0.0/16 |
10.0.2.4 |
to-internet |
0.0.0.0/0 |
10.0.2.4 |
to-specific-gw |
10.0.2.0/24 |
Virtual Network |
intra-subnet |
10.0.3.0/24 |
Virtual Network |
Note - The Internal Load Balancer private IP address is static. To find it, browse into the Internal Load Balancer named backend-lb
.
For more information, see User Defined Routes.
Configuring Protection for External VNETs
Limitations:
This section is only supported when:
-
The template version is 20180711 or above.
-
The applicable peered VNETs use private address spaces as defined in the RFC 1918 (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16).
-
Global VNET peering is not supported. See Azure requirements and constraints.
Do these steps below for inspection of traffic between a subnet in the peered VNET, and a subnet in the VMSS VNET, or a different peered VNET.
Use case:
Your hub-spoke network topology uses peered VNETs and you want the VMSS, as the hub, to examine the traffic.
Perform these steps for each VNET:
Step |
Description |
---|---|
1 |
Connect with SmartConsole to your Security Management Server or Multi-Domain Server. |
2 |
Create a Network object:
|
3 |
In SmartConsole, from the left navigation panel, click Security Policies. |
4 |
In the Access Control section, click NAT. |
5 |
Make sure these Automatic NAT rules exist: |
6 |
Create a Network Group object to represent the full internal address space:
|
7 |
In the Access Control section, click NAT. |
8 |
Add a Manual NAT rule to skip NAT for internal traffic between VNETs: |
9 |
In the Access Control section, click Policy. |
10 |
Add this explicit Access Control rule to allow outbound access from the full internal address space to the Internet: |
11 |
In SmartConsole, install the Access Control Policy. |
12 |
Connect to the Azure portal. |
13 |
Override automatic UDR rules for each internal private subnet:
Notes:
|
NAME |
ADDRESS PREFIX |
NEXT HOP |
---|---|---|
to-Internet |
0.0.0.0/0 |
10.1.2.4 |
to-internal-current-vnet |
192.168.1.0/16 |
10.1.2.4 |
to-internal-current-subnet |
192.168.3.0/24 |
Virtual Network |
to-internal-subnet#1-in-VMSS-VNET |
10.1.3.0/24 |
10.1.2.4 |
to-internal-subnet#2-in-VMSS-VNET |
10.1.4.0/24 |
10.1.2.4 |
to-internal-specific-VNET#2 |
172.16.1.0 |
10.1.2.4 |