<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN redundancy (site-to-site) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-redundancy-site-to-site/m-p/160712#M28376</link>
    <description>&lt;P&gt;Thanks. H&lt;SPAN&gt;ave you seen a vti deployment at hub sites for more than 50 branches? All are internally managed Check Point. Multi-point VTI is not supported, is that right?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 28 Oct 2022 23:39:41 GMT</pubDate>
    <dc:creator>Heather_Lewis</dc:creator>
    <dc:date>2022-10-28T23:39:41Z</dc:date>
    <item>
      <title>VPN redundancy (site-to-site)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-redundancy-site-to-site/m-p/160504#M28321</link>
      <description>&lt;P&gt;For an environment with two geographically diverse hub sites with in excess of 50 internal VPNs, do you prefer MEP or VTI with dynamic routing?&lt;/P&gt;</description>
      <pubDate>Wed, 26 Oct 2022 21:58:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-redundancy-site-to-site/m-p/160504#M28321</guid>
      <dc:creator>Heather_Lewis</dc:creator>
      <dc:date>2022-10-26T21:58:25Z</dc:date>
    </item>
    <item>
      <title>Re: VPN redundancy (site-to-site)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-redundancy-site-to-site/m-p/160708#M28375</link>
      <description>&lt;P&gt;VTI will likely be required if any of the VPN endpoints aren't Check Point devices.&amp;nbsp;&lt;BR /&gt;Otherwise, it's likely a horses for courses argument as to which one is better.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2022 22:35:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-redundancy-site-to-site/m-p/160708#M28375</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-10-28T22:35:29Z</dc:date>
    </item>
    <item>
      <title>Re: VPN redundancy (site-to-site)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-redundancy-site-to-site/m-p/160712#M28376</link>
      <description>&lt;P&gt;Thanks. H&lt;SPAN&gt;ave you seen a vti deployment at hub sites for more than 50 branches? All are internally managed Check Point. Multi-point VTI is not supported, is that right?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2022 23:39:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-redundancy-site-to-site/m-p/160712#M28376</guid>
      <dc:creator>Heather_Lewis</dc:creator>
      <dc:date>2022-10-28T23:39:41Z</dc:date>
    </item>
    <item>
      <title>Re: VPN redundancy (site-to-site)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-redundancy-site-to-site/m-p/160858#M28392</link>
      <description>&lt;P&gt;Correct, no multipoint. &amp;nbsp;However, you can do unnumbered VTIs and with BGP routing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Topology:&lt;/P&gt;
&lt;P&gt;# eth0 = external, internet&lt;/P&gt;
&lt;P&gt;# eth1 = internal, interior network&lt;/P&gt;
&lt;P&gt;# remote peer's eth1 interior interface is 192.168.100.1&lt;/P&gt;
&lt;P&gt;# this local gateway's eth1 interior interface is 192.168.200.1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Create an unnumbered VTI:&lt;/P&gt;
&lt;P&gt;add vpn tunnel 100 type unnumbered peer remote_peer dev eth1 &amp;nbsp;#eth1 of local gateway for proxy interface&lt;/P&gt;
&lt;P&gt;# (repeat for other peers; Ansible and/or Gaia API run-script can be your frie&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. Add static route to remote BGP peer across VTI&lt;/P&gt;
&lt;P&gt;set static-route 192.168.100.1/32 nexthop gateway logical vpt100 on &amp;nbsp;# VTIs are point-to-point after all&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. Configure eBGP with multihop&lt;/P&gt;
&lt;P&gt;set bgp external-as 65001 on&lt;/P&gt;
&lt;P&gt;set bgp external-as 65001 peer 192.168.100.1 on&lt;/P&gt;
&lt;P&gt;set bgp external-as 65001 peer 192.168.100.1 multihop on &amp;nbsp;#multihop for eBGP since VTI route is a second hop to the interior&lt;/P&gt;
&lt;P&gt;4. Verify&lt;/P&gt;
&lt;P&gt;show bgp peers&lt;/P&gt;
&lt;P&gt;# 192.168.100.1 &amp;nbsp;will become Established&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can add BFD as well with "set bgp external-as 65001 peer 192.168.100.1 ip-reachability-detection on"&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've done this a few times myself. &amp;nbsp;This is also documented in&amp;nbsp;sk138192. &amp;nbsp;The SK is good, but it requires very careful reading. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; It's a lot of (really good) info!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Oct 2022 16:35:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-redundancy-site-to-site/m-p/160858#M28392</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2022-10-31T16:35:44Z</dc:date>
    </item>
    <item>
      <title>Re: VPN redundancy (site-to-site)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-redundancy-site-to-site/m-p/161494#M28584</link>
      <description>&lt;P&gt;What's multipoint vti?&lt;/P&gt;</description>
      <pubDate>Mon, 07 Nov 2022 22:11:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-redundancy-site-to-site/m-p/161494#M28584</guid>
      <dc:creator>Greg_Harewood</dc:creator>
      <dc:date>2022-11-07T22:11:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPN redundancy (site-to-site)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-redundancy-site-to-site/m-p/161495#M28585</link>
      <description>&lt;P&gt;I have an opinion on this in concept. &amp;nbsp;VTIs can become surprisingly hard to manage. &amp;nbsp;They always ought to be more functional. &amp;nbsp;But CP make MEP communities so EASY that you'd better have something you expect to gain from VTIs to offset the pain. &amp;nbsp;THere is a lot you CAN gain.... all that routing integration with other links, other vendors, local networks... more future proof in some ways. &amp;nbsp;But SO much extra work if you don't need it.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Nov 2022 22:16:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-redundancy-site-to-site/m-p/161495#M28585</guid>
      <dc:creator>Greg_Harewood</dc:creator>
      <dc:date>2022-11-07T22:16:36Z</dc:date>
    </item>
    <item>
      <title>Re: VPN redundancy (site-to-site)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-redundancy-site-to-site/m-p/161583#M28615</link>
      <description>&lt;P&gt;As you noted, this is for route advertisements between sites, (including support with 3rd party devices now that everyone does VTI and IKEv2 with Universal Traffic Selectors). &amp;nbsp;You can use unnumbered VTIs and proxy off an internal interface (or loopback) and avoid subnet allocation management. You could also use the 169.254.1.0/24 subnet if you needed a numbered VTI (this is what Amazon AWS uses).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As for the "work", once you get the first one done, especially for unnumbered VTIs, you can either add more with Ansible or your own API script. &amp;nbsp;It's largely a one-and-done, copy/paste/paste/paste, implementation. &amp;nbsp;Routing policies with BGP route-maps gives you extensive control of traffic engineering. &amp;nbsp;Lots of good reasons.&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 14:18:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-redundancy-site-to-site/m-p/161583#M28615</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2022-11-08T14:18:25Z</dc:date>
    </item>
  </channel>
</rss>

