<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Which VPN need to Choose to setup with Cloud based Proxy vendors in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Which-VPN-need-to-Choose-to-setup-with-Cloud-based-Proxy-vendors/m-p/73989#M11833</link>
    <description>&lt;P&gt;&lt;A href="https://support.symantec.com/us/en/article.tech253914.html" target="_blank"&gt;https://support.symantec.com/us/en/article.tech253914.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;When vendors want you to do this then they typically publish a document on how to achieve what they ask.&lt;/P&gt;&lt;P&gt;This is from the Symantec Site about how to configure.&lt;/P&gt;&lt;P&gt;Whilst it is for R77.30, configuring VPN's really hasn't changed much, so this is till useful in terms of what to configure.&lt;/P&gt;&lt;P&gt;Please note that says to create Permanent VPN Tunnels and to enable DPD, Dead Peer Detection which is done via the GUIdbedit tool.&lt;/P&gt;&lt;P&gt;This doc refers to a Policy or Domain based VPN so this should answer your question.&lt;/P&gt;</description>
    <pubDate>Mon, 03 Feb 2020 07:28:59 GMT</pubDate>
    <dc:creator>mdjmcnally</dc:creator>
    <dc:date>2020-02-03T07:28:59Z</dc:date>
    <item>
      <title>Which VPN need to Choose to setup with Cloud based Proxy vendors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Which-VPN-need-to-Choose-to-setup-with-Cloud-based-Proxy-vendors/m-p/73853#M11828</link>
      <description>&lt;P&gt;Hi everyone,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to setup 2 VPNs (Primary &amp;amp; Secondary) with my CP to Cloud based Proxy vendor, now I want to know which type of VPN I need to setup between peers, either policy based or route based.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to forward all Internet traffic to this VPN tunnel so it can be proxied by the cloud based proxy solution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I setup policy based VPN, how traffic will be shifted to secondary VPN if my primary tunnel goes down..&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jan 2020 09:13:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Which-VPN-need-to-Choose-to-setup-with-Cloud-based-Proxy-vendors/m-p/73853#M11828</guid>
      <dc:creator>Upen0003</dc:creator>
      <dc:date>2020-01-31T09:13:51Z</dc:date>
    </item>
    <item>
      <title>Re: Which VPN need to Choose to setup with Cloud based Proxy vendors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Which-VPN-need-to-Choose-to-setup-with-Cloud-based-Proxy-vendors/m-p/73912#M11829</link>
      <description>Without knowing what vendor we're talking about, what instructions they provide, and your gateway version/JHF level, it's impossible to provide accurate advice here.&lt;BR /&gt;But, in general, DPD is an industry-standard mechanism that can be used for failover purposes.</description>
      <pubDate>Sat, 01 Feb 2020 00:49:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Which-VPN-need-to-Choose-to-setup-with-Cloud-based-Proxy-vendors/m-p/73912#M11829</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-02-01T00:49:01Z</dc:date>
    </item>
    <item>
      <title>Re: Which VPN need to Choose to setup with Cloud based Proxy vendors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Which-VPN-need-to-Choose-to-setup-with-Cloud-based-Proxy-vendors/m-p/73915#M11830</link>
      <description>&lt;P&gt;The tunnels won't be GRE that much is for certain.&lt;/P&gt;
&lt;P&gt;Is their a specific reason you need the 3rd party proxy rather than leverage the capabilities of your Check Point?&lt;/P&gt;</description>
      <pubDate>Sat, 01 Feb 2020 03:06:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Which-VPN-need-to-Choose-to-setup-with-Cloud-based-Proxy-vendors/m-p/73915#M11830</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2020-02-01T03:06:54Z</dc:date>
    </item>
    <item>
      <title>Re: Which VPN need to Choose to setup with Cloud based Proxy vendors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Which-VPN-need-to-Choose-to-setup-with-Cloud-based-Proxy-vendors/m-p/73926#M11831</link>
      <description>&lt;P&gt;Have you considered &lt;A href="https://community.checkpoint.com/t5/SD-WAN/SD-WAN-Security-Techtalk-Video-and-Slides/td-p/61901/jump-to/first-unread-message" target="_self"&gt;CloudGuard Connect&lt;/A&gt;, letting you unify your on-prem and cloud policies under a single management and achieving a consistent NSS-certified high level of security?&lt;/P&gt;
&lt;DIV id="tinyMceEditorTomer_Sole_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cloudguard-connect-onboarding.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4303i59FD1852A4453F8D/image-size/large?v=v2&amp;amp;px=999" role="button" title="cloudguard-connect-onboarding.png" alt="cloudguard-connect-onboarding.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Feb 2020 06:12:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Which-VPN-need-to-Choose-to-setup-with-Cloud-based-Proxy-vendors/m-p/73926#M11831</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2020-02-01T06:12:53Z</dc:date>
    </item>
    <item>
      <title>Re: Which VPN need to Choose to setup with Cloud based Proxy vendors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Which-VPN-need-to-Choose-to-setup-with-Cloud-based-Proxy-vendors/m-p/73975#M11832</link>
      <description>&lt;P&gt;vendor is Symantec and they said forward all your internet traffic to me via VPN, they will proxied the traffic and forward that to internet post NAT..&lt;/P&gt;&lt;P&gt;I am using R80.10 and want to know if I configure policy based VPN then how my GW will start using backup tunnel in case primary tunnel goes down.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if I use route based tunnel in that case I need to create a tunnel interface and set the default route to that VTI..&lt;/P&gt;&lt;P&gt;want to confirm which type of VPN will be good to have in this situation.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Feb 2020 12:21:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Which-VPN-need-to-Choose-to-setup-with-Cloud-based-Proxy-vendors/m-p/73975#M11832</guid>
      <dc:creator>upendras</dc:creator>
      <dc:date>2020-02-02T12:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: Which VPN need to Choose to setup with Cloud based Proxy vendors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Which-VPN-need-to-Choose-to-setup-with-Cloud-based-Proxy-vendors/m-p/73989#M11833</link>
      <description>&lt;P&gt;&lt;A href="https://support.symantec.com/us/en/article.tech253914.html" target="_blank"&gt;https://support.symantec.com/us/en/article.tech253914.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;When vendors want you to do this then they typically publish a document on how to achieve what they ask.&lt;/P&gt;&lt;P&gt;This is from the Symantec Site about how to configure.&lt;/P&gt;&lt;P&gt;Whilst it is for R77.30, configuring VPN's really hasn't changed much, so this is till useful in terms of what to configure.&lt;/P&gt;&lt;P&gt;Please note that says to create Permanent VPN Tunnels and to enable DPD, Dead Peer Detection which is done via the GUIdbedit tool.&lt;/P&gt;&lt;P&gt;This doc refers to a Policy or Domain based VPN so this should answer your question.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Feb 2020 07:28:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Which-VPN-need-to-Choose-to-setup-with-Cloud-based-Proxy-vendors/m-p/73989#M11833</guid>
      <dc:creator>mdjmcnally</dc:creator>
      <dc:date>2020-02-03T07:28:59Z</dc:date>
    </item>
  </channel>
</rss>

