<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISP redunancy in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redunancy/m-p/162408#M28872</link>
    <description>&lt;P&gt;The routing table is “global” meaning it applies to every interface.&lt;BR /&gt;ISP Redundancy changes the default behavior for certain traffic.&lt;BR /&gt;With your specific ISP Redundancy configuration, traffic that is sent to the PAT address/ports on ISP2 will be sent out through ISP2.&lt;BR /&gt;Without ISP Redundancy, the reply traffic will follow the default route, which is ISP1.&lt;/P&gt;
&lt;P&gt;But…you’re telling me you’re trying to access the ISP2 PAT address/port from internally?&lt;BR /&gt;That’s a beast of a different color; you’re basically doing hairpin NAT.&lt;BR /&gt;To solve THAT issue, see:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Traffic-flow-in-between-C-to-S-via-Firewall-How/m-p/8466/highlight/true#M13082" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/Traffic-flow-in-between-C-to-S-via-Firewall-How/m-p/8466/highlight/true#M13082&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 17 Nov 2022 23:23:52 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2022-11-17T23:23:52Z</dc:date>
    <item>
      <title>ISP redunancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redunancy/m-p/162196#M28807</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- We are having open server(81.10), where isp redundancy is enabled in load sharing mode.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- interface&amp;nbsp;to access the Internet (first internet provider)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-interface with PAT on 25 and 443 ports (second prvider)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I need to disable ISP redundancy so that users use only one provider to access the Internet, but when I do this, the interface with the PAT stops responding on ports 25 and 443.&amp;nbsp;At the same time, these requests are displayed in the logs with the status accepted&lt;BR /&gt;&lt;BR /&gt;Any ideas what's going on?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2022 05:44:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redunancy/m-p/162196#M28807</guid>
      <dc:creator>YuriyPak93</dc:creator>
      <dc:date>2022-11-16T05:44:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISP redunancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redunancy/m-p/162214#M28812</link>
      <description>&lt;P&gt;This is not clear to me - ISP 2 has an interface with EPS&amp;nbsp;&lt;STRONG&gt;PAT&lt;/STRONG&gt;&lt;SPAN&gt; (Policy Assignment Table) ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2022 12:33:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redunancy/m-p/162214#M28812</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-11-16T12:33:47Z</dc:date>
    </item>
    <item>
      <title>Re: ISP redunancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redunancy/m-p/162251#M28826</link>
      <description>&lt;P&gt;For&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;’s benefit: PAT == Port Address Translation (a specific NAT use case).&lt;/P&gt;
&lt;P&gt;When you say “not work” what is the precise behavior?&lt;BR /&gt;I suspect what you’re running into is an asymmetric routing behavior caused by disabling ISP Redundancy.&lt;BR /&gt;You can verify this by running a tcpdump on the ISP1 interface when you try to access ports 25/443 from ISP2.&lt;/P&gt;
&lt;P&gt;If this is the case, the only solution is to use Policy-Based Routing.&lt;BR /&gt;Specifically, you’d create a policy route that routes traffic from wherever the ultimate destination of 25/443 traffic is to route out ISP2.&lt;BR /&gt;Not sure how this will work with ISP Redundancy, though.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2022 15:32:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redunancy/m-p/162251#M28826</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-11-16T15:32:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISP redunancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redunancy/m-p/162303#M28838</link>
      <description>&lt;P&gt;When i say not work i mean interface with ip address(which i use to mail service) stop answering on icmp and 443 outside with disable isp redundancy.&lt;BR /&gt;&lt;BR /&gt;I mean if i disable isp redundancy users go to internet with default route, but why it's take some effect on different interface?&lt;BR /&gt;&lt;BR /&gt;i use some policy based routing to route from dmz to lan btw&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 04:21:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redunancy/m-p/162303#M28838</guid>
      <dc:creator>YuriyPak93</dc:creator>
      <dc:date>2022-11-17T04:21:24Z</dc:date>
    </item>
    <item>
      <title>Re: ISP redunancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redunancy/m-p/162329#M28857</link>
      <description>&lt;P&gt;Hi, i mean when i disable isp redundancy, my interface with PAT don't answer to icmp and 443 port requests from outside. From inside it answer to icmp without any problem, i didn't get how ISP redundancy affect on icmp request to interface with static ip&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 10:19:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redunancy/m-p/162329#M28857</guid>
      <dc:creator>YuriyPak93</dc:creator>
      <dc:date>2022-11-17T10:19:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISP redunancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redunancy/m-p/162408#M28872</link>
      <description>&lt;P&gt;The routing table is “global” meaning it applies to every interface.&lt;BR /&gt;ISP Redundancy changes the default behavior for certain traffic.&lt;BR /&gt;With your specific ISP Redundancy configuration, traffic that is sent to the PAT address/ports on ISP2 will be sent out through ISP2.&lt;BR /&gt;Without ISP Redundancy, the reply traffic will follow the default route, which is ISP1.&lt;/P&gt;
&lt;P&gt;But…you’re telling me you’re trying to access the ISP2 PAT address/port from internally?&lt;BR /&gt;That’s a beast of a different color; you’re basically doing hairpin NAT.&lt;BR /&gt;To solve THAT issue, see:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Traffic-flow-in-between-C-to-S-via-Firewall-How/m-p/8466/highlight/true#M13082" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/Traffic-flow-in-between-C-to-S-via-Firewall-How/m-p/8466/highlight/true#M13082&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 23:23:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ISP-redunancy/m-p/162408#M28872</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-11-17T23:23:52Z</dc:date>
    </item>
  </channel>
</rss>

