<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 1200R High availability SSL VPN Routing between primary and secondary in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/1200R-High-availability-SSL-VPN-Routing-between-primary-and/m-p/117125#M16521</link>
    <description>&lt;P&gt;Pretty sure this is working as expected. You cannot terminate SSL VPN on a standby member and expect it to work. On the LAN side, all traffic goes to active member only.&lt;BR /&gt;&lt;BR /&gt;I would suggest some DNS script that would stick SSL VPN GW FQND to active member only, then you could go by name and not IP, ending up on Active only.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I also believe this connectivity on ISP side not supported. You need to configure two ISP links on each box and use ISP redundancy&lt;/P&gt;</description>
    <pubDate>Wed, 28 Apr 2021 07:59:19 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2021-04-28T07:59:19Z</dc:date>
    <item>
      <title>1200R High availability SSL VPN Routing between primary and secondary</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/1200R-High-availability-SSL-VPN-Routing-between-primary-and/m-p/117116#M16518</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have been running into issues with a deployment of a remote access vpn on two Checkpoing 1200R Devices.&amp;nbsp; The below mudmap gives you an idea of our setup. Two firewalls externally attached to two different ISPs with static addresses&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="mudmap.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11548iB875CF71F7B699F5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="mudmap.png" alt="mudmap.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issues i am&amp;nbsp; running into is:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;finding the SSL webpage very often fails to "upgrade" the connection into a VPN connection even with valid credentials using a known working configuration and the only solution is to retry until it works, this is our biggest issue as this is a remote industrial site and having highly available remote access is critical.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;If FW1 is Primary and Active, connecting to the SSL vpn via FW2 static ip will succeed but will not route traffic back from the local LAN (same situation for FW1 when FW2 is Active)&lt;/LI&gt;&lt;LI&gt;We are using Active directory for VPN authentication and have two domain controllers onsite. The appliance local management configuration interface only allows for one domain controller to be setup. Therefore if we have a failure of the primary DC we lose vpn connectivity.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 06:12:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/1200R-High-availability-SSL-VPN-Routing-between-primary-and/m-p/117116#M16518</guid>
      <dc:creator>kyle</dc:creator>
      <dc:date>2021-04-28T06:12:18Z</dc:date>
    </item>
    <item>
      <title>Re: 1200R High availability SSL VPN Routing between primary and secondary</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/1200R-High-availability-SSL-VPN-Routing-between-primary-and/m-p/117125#M16521</link>
      <description>&lt;P&gt;Pretty sure this is working as expected. You cannot terminate SSL VPN on a standby member and expect it to work. On the LAN side, all traffic goes to active member only.&lt;BR /&gt;&lt;BR /&gt;I would suggest some DNS script that would stick SSL VPN GW FQND to active member only, then you could go by name and not IP, ending up on Active only.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I also believe this connectivity on ISP side not supported. You need to configure two ISP links on each box and use ISP redundancy&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 07:59:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/1200R-High-availability-SSL-VPN-Routing-between-primary-and/m-p/117125#M16521</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-04-28T07:59:19Z</dc:date>
    </item>
  </channel>
</rss>

