<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Redundancy VPN S2S in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundancy-VPN-S2S/m-p/199866#M37481</link>
    <description>&lt;P&gt;Good morning&lt;/P&gt;&lt;P&gt;I would like a suggestion on how to perform site-to-site VPN redundancy between a checkpoint and fortigate. Both sides have two ISP links, and both must communicate cross-formation in case of failure of the main ISP&lt;/P&gt;&lt;P&gt;Example image attached&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 06 Dec 2023 14:19:12 GMT</pubDate>
    <dc:creator>Icaro_IT</dc:creator>
    <dc:date>2023-12-06T14:19:12Z</dc:date>
    <item>
      <title>Redundancy VPN S2S</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundancy-VPN-S2S/m-p/199866#M37481</link>
      <description>&lt;P&gt;Good morning&lt;/P&gt;&lt;P&gt;I would like a suggestion on how to perform site-to-site VPN redundancy between a checkpoint and fortigate. Both sides have two ISP links, and both must communicate cross-formation in case of failure of the main ISP&lt;/P&gt;&lt;P&gt;Example image attached&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2023 14:19:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundancy-VPN-S2S/m-p/199866#M37481</guid>
      <dc:creator>Icaro_IT</dc:creator>
      <dc:date>2023-12-06T14:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: Redundancy VPN S2S</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundancy-VPN-S2S/m-p/199881#M37485</link>
      <description>&lt;P&gt;I am interested in this topic too.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2023 15:50:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundancy-VPN-S2S/m-p/199881#M37485</guid>
      <dc:creator>starmen2000</dc:creator>
      <dc:date>2023-12-06T15:50:20Z</dc:date>
    </item>
    <item>
      <title>Re: Redundancy VPN S2S</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundancy-VPN-S2S/m-p/199883#M37486</link>
      <description>&lt;P&gt;I will ask one of my colleagues about Fortigate part, but I can tell you this about CP part. Even if you have ISP redundancy enabled, primary isp link failure will NOT automatically guarantee that VPN tunnel will simply continue to work, as Fortigate would never be aware of new IP address.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2023 15:53:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundancy-VPN-S2S/m-p/199883#M37486</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-06T15:53:07Z</dc:date>
    </item>
    <item>
      <title>Re: Redundancy VPN S2S</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundancy-VPN-S2S/m-p/199885#M37488</link>
      <description>&lt;P&gt;both sides know the IP of both ISP&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2023 16:00:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundancy-VPN-S2S/m-p/199885#M37488</guid>
      <dc:creator>Icaro_IT</dc:creator>
      <dc:date>2023-12-06T16:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: Redundancy VPN S2S</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundancy-VPN-S2S/m-p/199886#M37489</link>
      <description>&lt;P&gt;If both ends know about the IPs of both links, then I dont see why it would not work, since in that case, if there is ever a failure, 2nd link would be able to establish a tunnel.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2023 16:02:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundancy-VPN-S2S/m-p/199886#M37489</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-06T16:02:27Z</dc:date>
    </item>
    <item>
      <title>Re: Redundancy VPN S2S</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundancy-VPN-S2S/m-p/199887#M37490</link>
      <description>&lt;P&gt;right, but what is the best way to do this at the checkpoint? based on static route, mode redundancy probe (CP feature), BGP... or just add a start community with two satellites referencing the fortigate side&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2023 16:11:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundancy-VPN-S2S/m-p/199887#M37490</guid>
      <dc:creator>Icaro_IT</dc:creator>
      <dc:date>2023-12-06T16:11:03Z</dc:date>
    </item>
    <item>
      <title>Re: Redundancy VPN S2S</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundancy-VPN-S2S/m-p/199888#M37491</link>
      <description>&lt;P&gt;There way smarter people than I on this forum, so Im sure they will chime in, but logically, I would say 2 satellites for FGT end. Not sure BGP would really make much difference here, as you are not doing say xpress route/VPN failover with Azure (just an example)&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2023 16:15:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundancy-VPN-S2S/m-p/199888#M37491</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-06T16:15:41Z</dc:date>
    </item>
    <item>
      <title>Re: Redundancy VPN S2S</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundancy-VPN-S2S/m-p/200111#M37528</link>
      <description>&lt;P&gt;Route based with static route+priority+ping reachability or bgp+ smaller/bigger announcement (for example announce 192.168.0.0/24 for backup link and announce 192.168.0.0/25 and 192.168.0.128/25 for primary link). Other tips for bgp could be MED or AS-PATH-Prepend.&lt;/P&gt;
&lt;P&gt;You can configure two communities or one with two FGT satellites.&lt;/P&gt;
&lt;P&gt;Make sure ISP redundancy is applied for vpn too&lt;/P&gt;</description>
      <pubDate>Sat, 09 Dec 2023 14:29:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundancy-VPN-S2S/m-p/200111#M37528</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2023-12-09T14:29:41Z</dc:date>
    </item>
  </channel>
</rss>

