<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Redundant IPSEC VPN with Azure in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundant-IPSEC-VPN-with-Azure/m-p/216629#M41275</link>
    <description>&lt;P&gt;Official documentation:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk176249" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk176249&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk101275" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk101275&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Without VTIs, you'd probably have to configure MEP with DPD using instructions similar to sk101275.&lt;BR /&gt;See:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/MEP.htm" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;R81.20 Site to Site VPN Administration Guide -&amp;nbsp;&lt;STRONG&gt;Multiple&lt;/STRONG&gt;&amp;nbsp;&lt;STRONG&gt;Entry&lt;/STRONG&gt;&amp;nbsp;&lt;STRONG&gt;Point&lt;/STRONG&gt;&amp;nbsp;(&lt;STRONG&gt;MEP&lt;/STRONG&gt;) VPNs&lt;/SPAN&gt;&lt;/A&gt;&lt;BR /&gt;How well that will work is a separate question.&lt;/P&gt;</description>
    <pubDate>Thu, 06 Jun 2024 01:35:52 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2024-06-06T01:35:52Z</dc:date>
    <item>
      <title>Redundant IPSEC VPN with Azure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundant-IPSEC-VPN-with-Azure/m-p/216388#M41238</link>
      <description>&lt;P&gt;I'm looking to setup an IPSEC VPN to Azure, and make use of both of the VPN endpoints in Azure. My security platform is:&lt;/P&gt;&lt;P&gt;Gateway is: Quantum Security Cluster of 2 units (81.10)&lt;/P&gt;&lt;P&gt;What are my options here? Is VTI with BGP the only option or is there a more simple way to achieve this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I found this document below which is pretty good but I need to know how this will work with a cluster. I'm guessing the VTI tunnels will need some special config because they will need to be created on each member of the cluster?&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/BGP-peer-Throught-IPSEC-tunnel/td-p/177032" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/BGP-peer-Throught-IPSEC-tunnel/td-p/177032&lt;/A&gt;&lt;/P&gt;&lt;P&gt;If someone has a guide like above but for a cluster, that would be appreciated. Or if there is a more simple way to achieve this (e.g. multiple IPs in the VPN config, but I think this only works for CP to CP)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 14:29:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundant-IPSEC-VPN-with-Azure/m-p/216388#M41238</guid>
      <dc:creator>velo</dc:creator>
      <dc:date>2024-06-04T14:29:37Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant IPSEC VPN with Azure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundant-IPSEC-VPN-with-Azure/m-p/216629#M41275</link>
      <description>&lt;P&gt;Official documentation:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk176249" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk176249&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk101275" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk101275&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Without VTIs, you'd probably have to configure MEP with DPD using instructions similar to sk101275.&lt;BR /&gt;See:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/MEP.htm" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;R81.20 Site to Site VPN Administration Guide -&amp;nbsp;&lt;STRONG&gt;Multiple&lt;/STRONG&gt;&amp;nbsp;&lt;STRONG&gt;Entry&lt;/STRONG&gt;&amp;nbsp;&lt;STRONG&gt;Point&lt;/STRONG&gt;&amp;nbsp;(&lt;STRONG&gt;MEP&lt;/STRONG&gt;) VPNs&lt;/SPAN&gt;&lt;/A&gt;&lt;BR /&gt;How well that will work is a separate question.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2024 01:35:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundant-IPSEC-VPN-with-Azure/m-p/216629#M41275</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-06T01:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant IPSEC VPN with Azure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundant-IPSEC-VPN-with-Azure/m-p/216664#M41280</link>
      <description>&lt;P&gt;Thank you. It's a nice document but unfortunately doesn't answer my main question. For the tunnel interface section, are you supposed to create those interfaces on both members of the cluster? It doesn't say. Some of the sections of config, e.g. route-map etc it says to do it on FW1 and FW2. But for the VTI section it doesn't tell say.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2024 07:27:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundant-IPSEC-VPN-with-Azure/m-p/216664#M41280</guid>
      <dc:creator>velo</dc:creator>
      <dc:date>2024-06-06T07:27:23Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant IPSEC VPN with Azure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundant-IPSEC-VPN-with-Azure/m-p/216672#M41281</link>
      <description>&lt;P&gt;hi Velo,&lt;/P&gt;
&lt;P&gt;Yes the VTIs need to be configured on both cluster members in Gaia as well as in the topology of the cluster object.&lt;/P&gt;
&lt;P&gt;Make sure the destination matches EXACTLY the object name used in SmartDashboard for the Azure IP(s)&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2024 08:35:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundant-IPSEC-VPN-with-Azure/m-p/216672#M41281</guid>
      <dc:creator>Peter_Lyndley</dc:creator>
      <dc:date>2024-06-06T08:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant IPSEC VPN with Azure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundant-IPSEC-VPN-with-Azure/m-p/221570#M42427</link>
      <description>&lt;P&gt;it won´t let me use the same local address for both virtual tunnel interface 1 and 2.&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;add vpn tunnel 1 type numbered local 100.64.220.1 remote 10.250.0.12 peer vwan01&amp;nbsp;&lt;BR /&gt;add vpn tunnel 2 type numbered local 100.64.220.1 remote 10.250.0.13 peer vwan02&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Mon, 22 Jul 2024 13:48:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Redundant-IPSEC-VPN-with-Azure/m-p/221570#M42427</guid>
      <dc:creator>Martin_Schagerl</dc:creator>
      <dc:date>2024-07-22T13:48:23Z</dc:date>
    </item>
  </channel>
</rss>

