<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Routing in Firewall with DirectConnect AWS and IPVPN connections in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Routing-in-Firewall-with-DirectConnect-AWS-and-IPVPN-connections/m-p/239776#M5212</link>
    <description>&lt;P&gt;You already mentioned you are connected to AWS via DirectConnect lines using BGP.&lt;/P&gt;
&lt;P&gt;Why can't you configure the your on-premise hardware that already uses BGP to route traffic to the 2nd site if the 2st one fails using BGP ?&lt;/P&gt;
&lt;P&gt;That's what usually is done (if it's a router of another Firewall).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Usually the Firewalls in the cloud are not being used to do this kind of routing decision, unless you are connecting directly to them via VPN + BGP, and even then the decision is made on the on-premise devices.&lt;/P&gt;</description>
    <pubDate>Tue, 28 Jan 2025 05:18:40 GMT</pubDate>
    <dc:creator>Nir_Shamir</dc:creator>
    <dc:date>2025-01-28T05:18:40Z</dc:date>
    <item>
      <title>Routing in Firewall with DirectConnect AWS and IPVPN connections</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Routing-in-Firewall-with-DirectConnect-AWS-and-IPVPN-connections/m-p/239668#M5206</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Maybe someone can point me in the direction of a solution.&lt;BR /&gt;A customer has two main sites connected to AWS with Direct Connect.&lt;BR /&gt;Routing to AWS is via BGP. (i.e. all the user subnets in the main sites and in the remote sites will access AWS through one of the main sites, with priority given to Site A.)&lt;/P&gt;&lt;P&gt;How can I configure the Checkpoint firewall routing, so that when a Direct Connect connection goes down, users at site A, will access AWS via Site B? The same would apply for remote sites who also will need to go through Site A or Site B to reach AWS.&lt;/P&gt;&lt;P&gt;Since I have no way to configure anything within the IPVPN cloud, we thought to create S2S VPNs. Site A would try to route via DirectConnect, but if it is down, then it will route packets to AWS via S2S VPN to Site B whose DirectConnect connection is still up. And vice versa.&lt;/P&gt;&lt;P&gt;I am not sure how it would work for the remote sites. We could create a S2S VPN to Site A and Site B, but the remote site would need know how to route a packet towards AWS based on priority (Site A has higher priority) and on Site A Direct Connect being up. I am not sure how that would work. Maybe I would need to use some routing protocol over the S2S VPN (or IPVPN) between Site A firewall and Remote Site Firewall to let the remote site know if it is possible to reach AWS through it.&lt;/P&gt;&lt;P&gt;If anyone has any tips for such a solution I would appreciate it.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 08:28:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Routing-in-Firewall-with-DirectConnect-AWS-and-IPVPN-connections/m-p/239668#M5206</guid>
      <dc:creator>Micha</dc:creator>
      <dc:date>2025-01-27T08:28:35Z</dc:date>
    </item>
    <item>
      <title>Re: Routing in Firewall with DirectConnect AWS and IPVPN connections</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Routing-in-Firewall-with-DirectConnect-AWS-and-IPVPN-connections/m-p/239669#M5207</link>
      <description>&lt;P&gt;Can you move this to Cloud network security, &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt; ?&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 10:04:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Routing-in-Firewall-with-DirectConnect-AWS-and-IPVPN-connections/m-p/239669#M5207</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-01-27T10:04:57Z</dc:date>
    </item>
    <item>
      <title>Re: Routing in Firewall with DirectConnect AWS and IPVPN connections</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Routing-in-Firewall-with-DirectConnect-AWS-and-IPVPN-connections/m-p/239752#M5210</link>
      <description>&lt;P&gt;Done&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 23:28:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Routing-in-Firewall-with-DirectConnect-AWS-and-IPVPN-connections/m-p/239752#M5210</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-01-27T23:28:48Z</dc:date>
    </item>
    <item>
      <title>Re: Routing in Firewall with DirectConnect AWS and IPVPN connections</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Routing-in-Firewall-with-DirectConnect-AWS-and-IPVPN-connections/m-p/239776#M5212</link>
      <description>&lt;P&gt;You already mentioned you are connected to AWS via DirectConnect lines using BGP.&lt;/P&gt;
&lt;P&gt;Why can't you configure the your on-premise hardware that already uses BGP to route traffic to the 2nd site if the 2st one fails using BGP ?&lt;/P&gt;
&lt;P&gt;That's what usually is done (if it's a router of another Firewall).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Usually the Firewalls in the cloud are not being used to do this kind of routing decision, unless you are connecting directly to them via VPN + BGP, and even then the decision is made on the on-premise devices.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2025 05:18:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Routing-in-Firewall-with-DirectConnect-AWS-and-IPVPN-connections/m-p/239776#M5212</guid>
      <dc:creator>Nir_Shamir</dc:creator>
      <dc:date>2025-01-28T05:18:40Z</dc:date>
    </item>
  </channel>
</rss>

