<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Check Point Quantum SD-WAN Best Practices (Deep-Dive): Rule Matching, VPN Link Selection, and Pr in SD-WAN</title>
    <link>https://community.checkpoint.com/t5/SD-WAN/Check-Point-Quantum-SD-WAN-Best-Practices-Deep-Dive-Rule/m-p/270779#M323</link>
    <description>&lt;P&gt;very nice, very useful&lt;/P&gt;</description>
    <pubDate>Fri, 13 Feb 2026 14:12:01 GMT</pubDate>
    <dc:creator>israelfds95</dc:creator>
    <dc:date>2026-02-13T14:12:01Z</dc:date>
    <item>
      <title>Check Point Quantum SD-WAN Best Practices (Deep-Dive): Rule Matching, VPN Link Selection, and Probin</title>
      <link>https://community.checkpoint.com/t5/SD-WAN/Check-Point-Quantum-SD-WAN-Best-Practices-Deep-Dive-Rule/m-p/270731#M319</link>
      <description>&lt;H2&gt;Executive Summary&lt;/H2&gt;&lt;P&gt;Check Point Quantum SD-WAN is policy-driven traffic steering on top of classic routing/VPN. Most “mysterious” outages come from three failure domains:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;VPN Link Selection ambiguity&lt;/STRONG&gt; when SD-WAN is down or when peers are mixed (SD-WAN + non-SD-WAN). (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;SD-WAN rule matching mistakes&lt;/STRONG&gt; where “breakout” rules unintentionally capture VPN or non-Internet traffic, forcing cleartext egress or breaking overlay resiliency. (&lt;A title="Troubleshooting SD-WAN &amp;quot;Overlay&amp;quot;" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Troubleshooting/Troubleshooting-Overlay-VPN.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Probing asymmetry&lt;/STRONG&gt; (ICMP Echo Requests vs Replies) and missing overlay “catch-all” rules that prevent overlay probing and SLA measurement from converging. (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;This article rewrites your draft into a technically rigorous, operations-focused best-practices guide aligned with Check Point’s official behavior and terminology.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;1) VPN Link Selection: design for SD-WAN service failure and mixed communities&lt;/H2&gt;&lt;H3&gt;1.1 Baseline principle&lt;/H3&gt;&lt;P&gt;&lt;STRONG&gt;Always configure IPsec VPN Link Selection in the Security Gateway object&lt;/STRONG&gt;. The rationale is resilience: if SD-WAN services are not running for any reason, the gateway still has deterministic interface selection for Site-to-Site VPN. (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;H3&gt;1.2 What actually happens in different peer combinations&lt;/H3&gt;&lt;P&gt;&lt;STRONG&gt;Case A — SD-WAN ↔ SD-WAN peers in the same VPN community&lt;/STRONG&gt;&lt;BR /&gt;When two or more gateways with SD-WAN enabled participate in the same Site-to-Site VPN community, they automatically initiate tunnels &lt;STRONG&gt;between their SD-WAN interfaces&lt;/STRONG&gt; and interface selection is driven by &lt;STRONG&gt;WAN Link Mapping&lt;/STRONG&gt;, not the classic SmartConsole Link Selection page. (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Case B — SD-WAN ↔ non-SD-WAN peer in the same VPN community&lt;/STRONG&gt;&lt;BR /&gt;If an SD-WAN gateway participates in a VPN community with a gateway &lt;STRONG&gt;without&lt;/STRONG&gt; SD-WAN, the SD-WAN gateway uses the &lt;STRONG&gt;SmartConsole Link Selection&lt;/STRONG&gt; configuration for IPsec VPN. (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;H3&gt;1.3 Practical best practices&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Always populate Link Selection&lt;/STRONG&gt; even if your primary design is SD-WAN-based. It is your “service-down fallback.” (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Standardize &lt;STRONG&gt;WAN Link Mapping&lt;/STRONG&gt; for all SD-WAN members (consistent mapping is critical for predictable tunnel formation among SD-WAN peers). (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;If you are in a transitional environment (some peers SD-WAN, some not), treat Link Selection as a first-class artifact and test failover explicitly.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;2) SD-WAN Policy Rule Matching: prevent breakout from hijacking VPN and non-Internet flows&lt;/H2&gt;&lt;H3&gt;2.1 Core behavior you must internalize&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;The gateway matches the &lt;STRONG&gt;first applicable&lt;/STRONG&gt; SD-WAN Policy rule and &lt;STRONG&gt;stops&lt;/STRONG&gt; processing. (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;SD-WAN breakout-style rules behave similarly to &lt;STRONG&gt;Policy-Based Routing (PBR)&lt;/STRONG&gt;: they can &lt;STRONG&gt;override OS routing&lt;/STRONG&gt;, including directly connected networks, when the rule matches. (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;“Local Breakout routes take precedence over Static routes / Dynamic routes” (especially important when using VTIs / route-based VPN). (&lt;A title="SD-WAN and Route-Based VPN" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Route-Based-VPN.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;2.2 Non-negotiable rule design constraints (Local Breakout and Backhaul)&lt;/H3&gt;&lt;P&gt;In rules with &lt;STRONG&gt;Local Breakout&lt;/STRONG&gt; behavior:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Do not use Any in Destination&lt;/STRONG&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Do not use destination objects that can match &lt;STRONG&gt;non-Internet traffic&lt;/STRONG&gt;, such as:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;inter-VLAN traffic&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;traffic to next-hop gateways&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;DMZ network traffic&lt;BR /&gt;Reason: you can inadvertently send internal/enterprise traffic directly to ISPs in cleartext. (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;In rules with &lt;STRONG&gt;Backhaul&lt;/STRONG&gt; behavior (branch → center → internet):&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Same guidance: avoid Any and avoid objects that may match non-Internet traffic; otherwise you risk mis-steering and unintended internet egress. (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;2.3 Overlay vs Breakout ordering (the rulebase must reflect encryption intent)&lt;/H3&gt;&lt;P&gt;&lt;STRONG&gt;Always place Overlay rules above Local Breakout rules.&lt;/STRONG&gt;&lt;BR /&gt;Why: if VPN traffic matches a breakout rule, SD-WAN can disable encryption by design and route traffic to ISP as cleartext. This failure mode is explicitly documented in troubleshooting guidance. (&lt;A title="Troubleshooting SD-WAN &amp;quot;Overlay&amp;quot;" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Troubleshooting/Troubleshooting-Overlay-VPN.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;H3&gt;2.4 “Do not use the Internet object” — interpret correctly&lt;/H3&gt;&lt;P&gt;Check Point notes that generic “Internet” objects cannot reliably differentiate:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;true Internet traffic,&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Overlay traffic,&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;or cleartext traffic routed via MPLS next hop. (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Instead, prefer the SD-WAN-specific constructs described below (Dynamic Objects / SD-WAN Internet).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;3) Dynamic Objects and version prerequisites: use the right abstraction for “Internet” and “VPN domains”&lt;/H2&gt;&lt;H3&gt;3.1 Why Dynamic Objects matter&lt;/H3&gt;&lt;P&gt;Dynamic Objects were introduced to better represent:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Overlay address spaces&lt;/STRONG&gt; (VPN domains, peers, public subnets inside encryption domains)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Internet ranges&lt;/STRONG&gt;, while excluding reserved ranges and local interface-connected networks (&lt;A title="Configuring SD-WAN Policy" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/SD-WAN-Policy.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;This materially reduces the need for “manual bypass rules” and prevents common misclassification scenarios.&lt;/P&gt;&lt;H3&gt;3.2 What each Dynamic Object means (operationally)&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;My VPN Domain&lt;/STRONG&gt;: represents the local encryption domain and also the external interface used to establish S2S tunnels; it matches traffic between VPN peers (including overlay probing). (&lt;A title="Configuring SD-WAN Policy" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/SD-WAN-Policy.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Peer VPN Domain&lt;/STRONG&gt;: represents the aggregated encryption domain of all SD-WAN VPN peers; also matches traffic between peers (including overlay probing). (&lt;A title="Configuring SD-WAN Policy" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/SD-WAN-Policy.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;SD-WAN Internet&lt;/STRONG&gt;: represents public Internet ranges while excluding reserved ranges and IPs of networks directly connected to the gateway (plus other exclusions documented). (&lt;A title="Configuring SD-WAN Policy" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/SD-WAN-Policy.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;3.3 Version support (don’t guess—validate)&lt;/H3&gt;&lt;P&gt;Dynamic Objects were introduced in later trains/hotfix levels (for example, R81.20 Jumbo Take 79 notes them explicitly). (&lt;A title="R81.20 Jumbo Hotfix Take 79" href="https://sc1.checkpoint.com/documents/Jumbo_HFA/R81.20/R81.20/Take_79.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;BR /&gt;For R82, similar enablement is referenced in Jumbo documentation. (&lt;A title="R82 Jumbo Hotfix Take 14" href="https://sc1.checkpoint.com/documents/Jumbo_HFA/R82/R82.00/Take_14.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Best practice:&lt;/STRONG&gt; treat “Dynamic Objects availability” as a compatibility gate in your rollout checklist.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;4) Rule semantics by behavior type (what the gateway actually does)&lt;/H2&gt;&lt;H3&gt;4.1 Rule with “Overlay” behavior&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;If traffic must be encrypted and the peer is also SD-WAN-enabled: routing is based on the SD-WAN steering behavior. (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;If traffic must be encrypted and the peer is not SD-WAN: routing follows Link Selection configured in SmartConsole. (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;If traffic does not need encryption: traffic follows OS routing table. (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;4.2 Rule with “Local Breakout” behavior&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Ensure Overlay traffic does &lt;STRONG&gt;not&lt;/STRONG&gt; match Local Breakout; otherwise, VPN cannot leverage all VPN Transports/WAN Links to reach the SD-WAN peer (and you risk cleartext routing). (&lt;A title="SD-WAN and Route-Based VPN" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Route-Based-VPN.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Ensure only true outbound Internet traffic matches breakout.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;4.3 Rule with “Backhaul” behavior&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Branch encrypts traffic and sends it to the Center gateway over S2S VPN.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Center then sends that traffic to the Internet as Local Breakout. (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;5) Probing best practices: build SLA measurement that cannot be “accidentally blocked”&lt;/H2&gt;&lt;H3&gt;5.1 Overlay Probing mechanics (what’s measured and how)&lt;/H3&gt;&lt;P&gt;Overlay probing measures SLA over SD-WAN Overlay Transports using &lt;STRONG&gt;ICMP Echo Requests&lt;/STRONG&gt; sent between SD-WAN interfaces on local and remote peers. (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;H3&gt;5.2 The asymmetric reality (and why your policy must account for it)&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;The gateway sends ICMP Echo Requests regardless of SD-WAN Policy rules (it originates probing via the relevant VPN interface).&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;But it receives ICMP Echo Replies &lt;STRONG&gt;based on SD-WAN Policy matching&lt;/STRONG&gt;. (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;That means this asymmetric condition is possible (documented):&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;GW1 sends Echo Requests via ISP1→ISP1 to GW2&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;GW2 replies via ISP2→ISP1 back to GW1 (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Implication:&lt;/STRONG&gt; if your policy doesn’t catch replies correctly (Overlay behavior match), your SLA measurements become unreliable and steering decisions degrade.&lt;/P&gt;&lt;H3&gt;5.3 Best practice: ensure probing matches an Overlay rule&lt;/H3&gt;&lt;P&gt;Check Point’s guidance: probing over overlay must match a rule with &lt;STRONG&gt;Overlay&lt;/STRONG&gt; behavior, including all real IPs of SD-WAN interfaces in Source/Destination (NATed IPs are not required in the common guidance). (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;H3&gt;5.4 Use the Wizard defaults—then harden intentionally&lt;/H3&gt;&lt;P&gt;The SD-WAN Wizard creates default rules using Dynamic Objects (e.g., My VPN Domain / Peer VPN Domain, SD-WAN Internet) to automatically match overlay traffic and probing, reducing manual “special-case” rules. (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;If you do not use the Wizard (manual deployments), Check Point states you must create the required overlay “catch-all / clean up” rule to capture overlay traffic including probing. (&lt;A title="SD-WAN Connection Type - &amp;quot;Overlay&amp;quot;" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/SD-WAN-Connection-Types-Overlay.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;6) Operational checklist (what to validate before go-live)&lt;/H2&gt;&lt;H3&gt;VPN / Link Selection&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Link Selection configured in each gateway object (fallback when SD-WAN service is down). (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;WAN Link Mapping consistent across SD-WAN peers. (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;SD-WAN Policy hygiene&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Overlay rules above Breakout rules. (&lt;A title="Troubleshooting SD-WAN &amp;quot;Overlay&amp;quot;" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Troubleshooting/Troubleshooting-Overlay-VPN.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;No Any Destination in Breakout/Backhaul rules; destinations must be Internet-scoped. (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Prefer Dynamic Objects (My VPN Domain / Peer VPN Domain / SD-WAN Internet) when supported. (&lt;A title="Configuring SD-WAN Policy" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/SD-WAN-Policy.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;Probing and SLA integrity&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Ensure overlay probing traffic is matched by Overlay behavior rules (especially replies). (&lt;A title="SD-WAN Best Practices" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Best-Practices.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;If using route-based VPN / VTIs, explicitly avoid breakout matching for traffic that should be encrypted (breakout takes precedence over routes). (&lt;A title="SD-WAN and Route-Based VPN" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Route-Based-VPN.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2&gt;7) Troubleshooting signals that confirm misclassification&lt;/H2&gt;&lt;P&gt;If you see behavior like “VPN traffic goes cleartext” or “overlay SLA looks wrong,” Check Point documents kernel debug patterns and root cause: traffic is matching a Local Breakout rule which disables VPN encryption. (&lt;A title="Troubleshooting SD-WAN &amp;quot;Overlay&amp;quot;" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Quantum-SD-WAN-Admin-Guide/Content/Topics-SD-WAN/Troubleshooting/Troubleshooting-Overlay-VPN.htm?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;sc1.checkpoint.com&lt;/A&gt;)&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 11:21:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SD-WAN/Check-Point-Quantum-SD-WAN-Best-Practices-Deep-Dive-Rule/m-p/270731#M319</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-02-13T11:21:26Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Quantum SD-WAN Best Practices (Deep-Dive): Rule Matching, VPN Link Selection, and Pr</title>
      <link>https://community.checkpoint.com/t5/SD-WAN/Check-Point-Quantum-SD-WAN-Best-Practices-Deep-Dive-Rule/m-p/270742#M320</link>
      <description>&lt;P&gt;Another great one!&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 13:07:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SD-WAN/Check-Point-Quantum-SD-WAN-Best-Practices-Deep-Dive-Rule/m-p/270742#M320</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-13T13:07:01Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Quantum SD-WAN Best Practices (Deep-Dive): Rule Matching, VPN Link Selection, and Pr</title>
      <link>https://community.checkpoint.com/t5/SD-WAN/Check-Point-Quantum-SD-WAN-Best-Practices-Deep-Dive-Rule/m-p/270771#M321</link>
      <description>&lt;P&gt;Thank's&amp;nbsp; Andy&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 13:56:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SD-WAN/Check-Point-Quantum-SD-WAN-Best-Practices-Deep-Dive-Rule/m-p/270771#M321</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-02-13T13:56:00Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Quantum SD-WAN Best Practices (Deep-Dive): Rule Matching, VPN Link Selection, and Pr</title>
      <link>https://community.checkpoint.com/t5/SD-WAN/Check-Point-Quantum-SD-WAN-Best-Practices-Deep-Dive-Rule/m-p/270773#M322</link>
      <description>&lt;P&gt;Keep 'em coming!&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 14:00:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SD-WAN/Check-Point-Quantum-SD-WAN-Best-Practices-Deep-Dive-Rule/m-p/270773#M322</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-13T14:00:38Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point Quantum SD-WAN Best Practices (Deep-Dive): Rule Matching, VPN Link Selection, and Pr</title>
      <link>https://community.checkpoint.com/t5/SD-WAN/Check-Point-Quantum-SD-WAN-Best-Practices-Deep-Dive-Rule/m-p/270779#M323</link>
      <description>&lt;P&gt;very nice, very useful&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 14:12:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SD-WAN/Check-Point-Quantum-SD-WAN-Best-Practices-Deep-Dive-Rule/m-p/270779#M323</guid>
      <dc:creator>israelfds95</dc:creator>
      <dc:date>2026-02-13T14:12:01Z</dc:date>
    </item>
  </channel>
</rss>

