<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: S2S VPN failover using route based VPN in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-failover-using-route-based-VPN/m-p/211102#M39996</link>
    <description>&lt;P&gt;It means link selection does not matter if we use route based VPN to select the outgoing tunnel ? Am i correct ?&lt;/P&gt;</description>
    <pubDate>Fri, 12 Apr 2024 04:31:18 GMT</pubDate>
    <dc:creator>shantilalSuthar</dc:creator>
    <dc:date>2024-04-12T04:31:18Z</dc:date>
    <item>
      <title>S2S VPN failover using route based VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-failover-using-route-based-VPN/m-p/210982#M39971</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;I have a requirement where i need to create two route-based ipsec tunnels between Checkpoint &amp;amp; third party vendor &amp;amp; there are around 500 clients to which i need to create tunnels in active/backup manner.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kindly suggest how to achieve this.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 06:55:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-failover-using-route-based-VPN/m-p/210982#M39971</guid>
      <dc:creator>shantilalSuthar</dc:creator>
      <dc:date>2024-04-11T06:55:37Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN failover using route based VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-failover-using-route-based-VPN/m-p/211015#M39977</link>
      <description>&lt;P&gt;Hello!&lt;BR /&gt;&lt;BR /&gt;First of all, you'd have to use route-based VPN as you said, instead of a pure policy-based VPN.&lt;BR /&gt;&lt;BR /&gt;So what you do is define two VTI interfaces on the gateway, acting as the logical interfaces for the VPN, and then set up routing based off that, where you also set up which third party gateway it will communicate towards.&lt;/P&gt;&lt;P&gt;If you want to use static routes with IP tracking, or dynamic protocols such as OSPF or BGP is up to you, I would personally recommend dynamic protocol.&lt;/P&gt;&lt;P&gt;See this guide when it comes to the VTIs etc:&lt;BR /&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SitetoSiteVPN_AdminGuide/Topics-VPNSG/Route-Based-VPN.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SitetoSiteVPN_AdminGuide/Topics-VPNSG/Route-Based-VPN.htm&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;As for the VPN itself, you create a policy based VPN as usual, but leave the VPN domains as empty groups, (since the routing will decide what will traverse over the tunnel).&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 10:11:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-failover-using-route-based-VPN/m-p/211015#M39977</guid>
      <dc:creator>Henrik_J</dc:creator>
      <dc:date>2024-04-11T10:11:19Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN failover using route based VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-failover-using-route-based-VPN/m-p/211034#M39979</link>
      <description>&lt;P&gt;Thanks for your suggestions but here my question is, Is it possible to keep two VPN tunnel active on different ISP ?&lt;/P&gt;&lt;P&gt;As i know we can only select single interface in link selection option of IPsec VPN.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 11:31:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-failover-using-route-based-VPN/m-p/211034#M39979</guid>
      <dc:creator>shantilalSuthar</dc:creator>
      <dc:date>2024-04-11T11:31:21Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN failover using route based VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-failover-using-route-based-VPN/m-p/211079#M39986</link>
      <description>&lt;P&gt;I mean, you could technically route your interoperable device IPs out on different ISPs with definitive /32 routes to their public IPs.&lt;/P&gt;&lt;P&gt;Should be possible.&lt;BR /&gt;Then you'd just use the routing in the VTI tunneling to decide which tunnel to use etc.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 17:14:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-failover-using-route-based-VPN/m-p/211079#M39986</guid>
      <dc:creator>Henrik_J</dc:creator>
      <dc:date>2024-04-11T17:14:10Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN failover using route based VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-failover-using-route-based-VPN/m-p/211102#M39996</link>
      <description>&lt;P&gt;It means link selection does not matter if we use route based VPN to select the outgoing tunnel ? Am i correct ?&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 04:31:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-failover-using-route-based-VPN/m-p/211102#M39996</guid>
      <dc:creator>shantilalSuthar</dc:creator>
      <dc:date>2024-04-12T04:31:18Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN failover using route based VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-failover-using-route-based-VPN/m-p/211103#M39997</link>
      <description>&lt;P&gt;From checkpoint end nope it is not possible since you can terminate tunnel only on one ISP. While you can create two tunnels with two ISP for remote end.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 05:26:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-failover-using-route-based-VPN/m-p/211103#M39997</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2024-04-12T05:26:48Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN failover using route based VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-failover-using-route-based-VPN/m-p/211105#M39998</link>
      <description>&lt;P&gt;that is what i was trying to tell. Only one tunnel will be UP at a time right ?? Do we need to use ISP redundancy for auto tunnel failover.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 06:34:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-failover-using-route-based-VPN/m-p/211105#M39998</guid>
      <dc:creator>shantilalSuthar</dc:creator>
      <dc:date>2024-04-12T06:34:38Z</dc:date>
    </item>
  </channel>
</rss>

