<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic HA S2S VPN with two providers in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-S2S-VPN-with-two-providers/m-p/177311#M32491</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Hello!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Can you tell me if it's possible to implement such a scheme, for example: we have 10 VPN S2S tunnels, in link selection, I choose "calculate IP based on network topology" and in this case, our VPN will be built from the interface with the best route. My question is: can I set up routing in such a way that 5 tunnels go through one provider and 5 through another, and specify monitored IPs in these routes? Am I correct in understanding that in case of unavailability of the monitored IPs (the provider is down), the route will change to the other provider and the VPN will be rebuilt on the working one? The task is to manually build VPNs from the required interfaces, but also to ensure fault tolerance in case of problems with the provider.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 04 Apr 2023 22:45:46 GMT</pubDate>
    <dc:creator>Andrey_Gl</dc:creator>
    <dc:date>2023-04-04T22:45:46Z</dc:date>
    <item>
      <title>HA S2S VPN with two providers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-S2S-VPN-with-two-providers/m-p/177311#M32491</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Can you tell me if it's possible to implement such a scheme, for example: we have 10 VPN S2S tunnels, in link selection, I choose "calculate IP based on network topology" and in this case, our VPN will be built from the interface with the best route. My question is: can I set up routing in such a way that 5 tunnels go through one provider and 5 through another, and specify monitored IPs in these routes? Am I correct in understanding that in case of unavailability of the monitored IPs (the provider is down), the route will change to the other provider and the VPN will be rebuilt on the working one? The task is to manually build VPNs from the required interfaces, but also to ensure fault tolerance in case of problems with the provider.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 22:45:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-S2S-VPN-with-two-providers/m-p/177311#M32491</guid>
      <dc:creator>Andrey_Gl</dc:creator>
      <dc:date>2023-04-04T22:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: HA S2S VPN with two providers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-S2S-VPN-with-two-providers/m-p/177706#M32547</link>
      <description>&lt;P&gt;How are you proposing to configure the routing, dynamic or static?&lt;BR /&gt;In any case, this seems feasible, but it would depend on the other side to be configured properly.&lt;/P&gt;</description>
      <pubDate>Sat, 08 Apr 2023 02:04:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-S2S-VPN-with-two-providers/m-p/177706#M32547</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-04-08T02:04:43Z</dc:date>
    </item>
    <item>
      <title>Re: HA S2S VPN with two providers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-S2S-VPN-with-two-providers/m-p/177726#M32551</link>
      <description>&lt;P&gt;Definitely phoneboy makes sense here, it would certianly depend on the other side. You could potentially use below, but not 100% sure it may achieve exactly what you are asking.&lt;/P&gt;
&lt;P&gt;Just as a side not, some people wrongly believe that link selection tab (top section) refers to what CP fw proposes, but thats WRONG. That refers to what other side will see and bottom section is what CP will send.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;DIV id="mc-main-content" role="main"&gt;
&lt;UL class="listbullet"&gt;
&lt;LI class="listbullet"&gt;&lt;STRONG class="bold"&gt;Use probing. Redundancy mode:&lt;/STRONG&gt; - When more than one IP address is available on a Security Gateway for VPN, Link Selection may employ the RDP probing method to determine which link will be used.The RDP probing method is implemented using a proprietary protocol that uses UDP port 259. This protocol is proprietary to Check Point and works only between Check Point entities. (Note that it does not comply with RDP as specified in RFC 908/1151). IP addresses you do not want to be examined (i.e., internal IP addresses) may be removed from the list of IP's to be examined. Once a Security Gateway maps the links' availability, a link selection per connection can be made according to the following redundancy modes:
&lt;UL class="listbullet2"&gt;
&lt;LI class="listbullet2"&gt;&lt;STRONG class="bold"&gt;High Availability &lt;/STRONG&gt;(default setting) - In High Availability mode the VPN tunnel uses the first IP address to respond, or the primary IP address if a primary IP is configured and active. If the chosen IP address stops responding, the connection fails over to another responding IP address. If a primary IP address is configured, the VPN tunnel will stay on the backup IP address until the primary one becomes available again.&lt;/LI&gt;
&lt;LI class="listbullet2"&gt;&lt;STRONG class="bold"&gt;Load Sharing - &lt;/STRONG&gt;In Load Sharing mode the encrypted traffic is distributed among all available links. Every new connection ready for encryption uses the next available link in a round robin manner. When a link becomes unavailable, all of its connections are distributed among the other available links. A link's availability is determined using RDP probing.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/20463i8C7AD5D0CD271A0D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 08 Apr 2023 17:02:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HA-S2S-VPN-with-two-providers/m-p/177726#M32551</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-04-08T17:02:12Z</dc:date>
    </item>
  </channel>
</rss>

