<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Two ISP's with two appliances 4800 R80.10 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14452#M1034</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are the firewalls in the same location? We connect our ISP's to a switch then you can connect those WAN VLAN's to both the firewall appliances. If your ISP's both only give you one IP you can still use those just as the VIP's then use a different addressing scheme for the physical IP's.&lt;BR /&gt;&lt;BR /&gt;So you can have ISP1 &amp;gt; Switch on vlan 1 &amp;gt; both checkpoints on VLAN 1 and setup physical IP's and a VIP for this vlan then do the same with a different VLAN/IP's for the other ISP connection.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Dec 2018 13:51:20 GMT</pubDate>
    <dc:creator>Aidan_Luby</dc:creator>
    <dc:date>2018-12-14T13:51:20Z</dc:date>
    <item>
      <title>Two ISP's with two appliances 4800 R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14446#M1028</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My scenario is as follows: I have two 4800 appliances and now two different ISPs. Each ISP connects to only 1 gateway. Can I work with both in active / standby? Remembering that each ISP connects to 1 gateway and not both. Does ISP redundancy do this? I would like to leave a working ISP and if it goes offline, the backup goes online. My biggest doubt is that if the main ISP that is in the active gateway falls, there will be a connection to the other ISP in the Firewall standby.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My solution:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- 2 Checkpoint 4800 appliance;&lt;/P&gt;&lt;P&gt;- R80.10 version firewall and managment;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Dec 2018 16:12:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14446#M1028</guid>
      <dc:creator>seginf_jfce</dc:creator>
      <dc:date>2018-12-10T16:12:33Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP's with two appliances 4800 R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14447#M1029</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This exact question came up here:&amp;nbsp;&lt;A href="https://community.checkpoint.com/thread/10663-checkpoint-cluster-failover-query" target="_blank"&gt;https://community.checkpoint.com/thread/10663-checkpoint-cluster-failover-query&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TL;DR: It doesn't work that way.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jun 2019 09:04:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14447#M1029</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-21T09:04:37Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP's with two appliances 4800 R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14448#M1030</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Easy - use HA Cluster and ISP redundancy !&lt;/P&gt;&lt;P&gt;- if the active cluster node fails, standby will take over, keeping the primary ISP&lt;/P&gt;&lt;P&gt;- if primary ISP fails, secondary will take over&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2018 09:17:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14448#M1030</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-12-11T09:17:18Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP's with two appliances 4800 R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14449#M1031</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN lang="en"&gt;Will the ISP redundancy work with the schema that each ISP is physically connected on only 1 appliance?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="en"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="en"&gt;The scenario is:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="en"&gt;Firewall 1 -&amp;gt; ISP 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="en"&gt;Firewall 2 -&amp;gt; ISP 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="en"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="en"&gt;Only 1 port per ISP on 1 firewall and not both ISPs are on both appliances.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="en"&gt;If the active firewall 1 fails, which has ISP 1 connected, will traffic be thrown to Firewall 2, which does not have ISP 1 connected?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2018 17:08:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14449#M1031</guid>
      <dc:creator>seginf_jfce</dc:creator>
      <dc:date>2018-12-11T17:08:31Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP's with two appliances 4800 R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14450#M1032</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, this is not a supported configuration.&lt;/P&gt;&lt;P&gt;Please refer to the thread I linked previously, which discusses this exact issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2018 17:30:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14450#M1032</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-12-11T17:30:00Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP's with two appliances 4800 R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14451#M1033</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN lang="en"&gt;That's what I thought. I have to physically connect the two ISPs on both appliances for redundancy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="en"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="en"&gt;Thanks&amp;nbsp;everyone.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2018 17:38:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14451#M1033</guid>
      <dc:creator>seginf_jfce</dc:creator>
      <dc:date>2018-12-11T17:38:50Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP's with two appliances 4800 R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14452#M1034</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are the firewalls in the same location? We connect our ISP's to a switch then you can connect those WAN VLAN's to both the firewall appliances. If your ISP's both only give you one IP you can still use those just as the VIP's then use a different addressing scheme for the physical IP's.&lt;BR /&gt;&lt;BR /&gt;So you can have ISP1 &amp;gt; Switch on vlan 1 &amp;gt; both checkpoints on VLAN 1 and setup physical IP's and a VIP for this vlan then do the same with a different VLAN/IP's for the other ISP connection.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Dec 2018 13:51:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14452#M1034</guid>
      <dc:creator>Aidan_Luby</dc:creator>
      <dc:date>2018-12-14T13:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP's with two appliances 4800 R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14453#M1035</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Aidan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The topology will look like this: ISP 1, located on DC1, connected to a core switch in VLAN X which in turn will connect to port X of FW1. ISP 2, located on DC2, connected to a core switch on the VLAN Y which in turn will connect to the FW2's X port. These switches are stacked, that is, they are part of the same "unit". In this way, what is the best approach for both ISPs to be connected, whether redundant or active?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewalls in active/standby mode or active/active ?&lt;/P&gt;&lt;P&gt;And about configuration of rules, NATs, static routes ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2019 12:10:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14453#M1035</guid>
      <dc:creator>seginf_jfce</dc:creator>
      <dc:date>2019-01-10T12:10:21Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP's with two appliances 4800 R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14454#M1036</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is an unsupported configuration and ClusterXL will not work. Please explain why you can not use a standard ClusterXL ISP Redundany / LS configuration!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2019 12:27:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14454#M1036</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-01-10T12:27:51Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP's with two appliances 4800 R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14455#M1037</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As I explained above, can I use ISP Redundancy? Isps arrive on each side, connected to VLANs -&amp;gt; FW?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2019 13:24:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14455#M1037</guid>
      <dc:creator>seginf_jfce</dc:creator>
      <dc:date>2019-01-10T13:24:06Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP's with two appliances 4800 R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14456#M1038</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ISP Redundancy requires both ISPs to be reachable from both gateways.&lt;/P&gt;&lt;P&gt;If that is not the case with your configuration, it will not work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2019 16:08:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14456#M1038</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-01-10T16:08:01Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP's with two appliances 4800 R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14457#M1039</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Even every ISP having reach to the other side via switch / vlan? The core stack is interconnected between the DCs via fiber channel.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2019 17:03:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14457#M1039</guid>
      <dc:creator>seginf_jfce</dc:creator>
      <dc:date>2019-01-10T17:03:44Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP's with two appliances 4800 R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14458#M1040</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the switch/VLAN configuration allow both gateways to reach both ISPs, then yes.&lt;/P&gt;&lt;P&gt;A proposed network diagram would be helpful to confirm.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2019 17:20:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14458#M1040</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-01-10T17:20:46Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP's with two appliances 4800 R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14459#M1041</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG alt="Topology" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/76953_P_20190110_150957_1.jpg" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2019 18:12:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14459#M1041</guid>
      <dc:creator>seginf_jfce</dc:creator>
      <dc:date>2019-01-10T18:12:08Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP's with two appliances 4800 R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14460#M1042</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It looks as if that should work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2019 20:26:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14460#M1042</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-01-10T20:26:25Z</dc:date>
    </item>
    <item>
      <title>Re: Two ISP's with two appliances 4800 R80.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14461#M1043</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Be careful when you are thinking what you define as ISP being "offline".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is either problem on physical layer (port&amp;nbsp;goes down for whatever reason) or on protocol layer (default gateway or any other&amp;nbsp;along the path fails). First one it is in fact the best to happen. Second one will require that you monitor certain hosts on the Internet and initiate fail-over should certain criteria is satisfied.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Jan 2019 13:39:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-ISP-s-with-two-appliances-4800-R80-10/m-p/14461#M1043</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2019-01-13T13:39:42Z</dc:date>
    </item>
  </channel>
</rss>

