<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MPLS to IPSEC failover in 80.30 with Cisco ASA as remote end device in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MPLS-to-IPSEC-failover-in-80-30-with-Cisco-ASA-as-remote-end/m-p/60319#M12554</link>
    <description>&lt;P&gt;Ravindra,&lt;/P&gt;&lt;P&gt;Dead Peer Detection is the technology for the remote peer check with third party devices and that's why you need R80.30.&lt;/P&gt;&lt;P&gt;###### snip from R80.30 what's new ############&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;IPsec VPN&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Redundancy for Multiple Entry Points configuration using Dead Peer Detection (DPD) with third party VPN peer&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;######end&amp;nbsp; snip from R80.30 what's new ##########&lt;/P&gt;&lt;P&gt;Wolfgang&lt;/P&gt;</description>
    <pubDate>Wed, 14 Aug 2019 12:40:40 GMT</pubDate>
    <dc:creator>Wolfgang</dc:creator>
    <dc:date>2019-08-14T12:40:40Z</dc:date>
    <item>
      <title>MPLS to IPSEC failover in 80.30 with Cisco ASA as remote end device</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MPLS-to-IPSEC-failover-in-80-30-with-Cisco-ASA-as-remote-end/m-p/60312#M12551</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;I have a scenerio where I want to achieve failover between IPSEC vpn and MPLS traffic terminating on the same remote end Cisco ASA device. MPLS will act as primary and when MPLS link fails, traffic should failover to IPSEC vpn.&lt;/P&gt;&lt;P&gt;Is there any way to achieve this between checkpoint &amp;amp; Cisco ASA. Your suggestions would be highly appreciated.&lt;/P&gt;&lt;P&gt;I heard that there is a feature in R80.30 to achieve this.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ravindra&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2019 12:02:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MPLS-to-IPSEC-failover-in-80-30-with-Cisco-ASA-as-remote-end/m-p/60312#M12551</guid>
      <dc:creator>Ravindra_Yadav</dc:creator>
      <dc:date>2019-08-14T12:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: MPLS to IPSEC failover in 80.30 with Cisco ASA as remote end device</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MPLS-to-IPSEC-failover-in-80-30-with-Cisco-ASA-as-remote-end/m-p/60315#M12552</link>
      <description>&lt;P&gt;Ravindra,&lt;/P&gt;&lt;P&gt;your solution is found in&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk56384" target="_self"&gt;How To Create a Redundant, Service-based MPLS/Encrypted Link VPN&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Wolfgang&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2019 12:19:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MPLS-to-IPSEC-failover-in-80-30-with-Cisco-ASA-as-remote-end/m-p/60315#M12552</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2019-08-14T12:19:53Z</dc:date>
    </item>
    <item>
      <title>Re: MPLS to IPSEC failover in 80.30 with Cisco ASA as remote end device</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MPLS-to-IPSEC-failover-in-80-30-with-Cisco-ASA-as-remote-end/m-p/60317#M12553</link>
      <description>I guess this will work when I have Checkpoint Gateway at both the ends. I have Cisco ASA at the other end.</description>
      <pubDate>Wed, 14 Aug 2019 12:31:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MPLS-to-IPSEC-failover-in-80-30-with-Cisco-ASA-as-remote-end/m-p/60317#M12553</guid>
      <dc:creator>Ravindra_Yadav</dc:creator>
      <dc:date>2019-08-14T12:31:10Z</dc:date>
    </item>
    <item>
      <title>Re: MPLS to IPSEC failover in 80.30 with Cisco ASA as remote end device</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MPLS-to-IPSEC-failover-in-80-30-with-Cisco-ASA-as-remote-end/m-p/60319#M12554</link>
      <description>&lt;P&gt;Ravindra,&lt;/P&gt;&lt;P&gt;Dead Peer Detection is the technology for the remote peer check with third party devices and that's why you need R80.30.&lt;/P&gt;&lt;P&gt;###### snip from R80.30 what's new ############&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;IPsec VPN&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Redundancy for Multiple Entry Points configuration using Dead Peer Detection (DPD) with third party VPN peer&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;######end&amp;nbsp; snip from R80.30 what's new ##########&lt;/P&gt;&lt;P&gt;Wolfgang&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2019 12:40:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MPLS-to-IPSEC-failover-in-80-30-with-Cisco-ASA-as-remote-end/m-p/60319#M12554</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2019-08-14T12:40:40Z</dc:date>
    </item>
  </channel>
</rss>

