<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Tunnel between ClusterXL and AWS in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Tunnel-between-ClusterXL-and-AWS/m-p/219679#M42005</link>
    <description>&lt;P&gt;You should configure both VTIs on both cluster members, with tunnel IP per member and a VIP. Details are in the VPN admin guide.&lt;/P&gt;</description>
    <pubDate>Thu, 04 Jul 2024 08:03:30 GMT</pubDate>
    <dc:creator>emmap</dc:creator>
    <dc:date>2024-07-04T08:03:30Z</dc:date>
    <item>
      <title>VPN Tunnel between ClusterXL and AWS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Tunnel-between-ClusterXL-and-AWS/m-p/219675#M42003</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I have a basic question about establishing Site to Site between Checkpoint cluster and AWS VPC.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Until now, the deployment was a single gateway and i have two tunnels with numbered VTI according to AWS guide. We've recently switched to ClusterXL deployment, and I'm unsure about how to adjust the tunnel configurations to ensure functionality after a fail over.&lt;/P&gt;&lt;P&gt;Should i remove one VTI from the primary and set it on the secondary? should i configure both VTIs in both gateways with other IP addresses and make the VTI address the VIP?&lt;/P&gt;&lt;P&gt;i will appreciate any help with this subject.&lt;/P&gt;&lt;P&gt;Thank you in advance,&lt;BR /&gt;Yossi.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jul 2024 07:43:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Tunnel-between-ClusterXL-and-AWS/m-p/219675#M42003</guid>
      <dc:creator>gm446</dc:creator>
      <dc:date>2024-07-04T07:43:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Tunnel between ClusterXL and AWS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Tunnel-between-ClusterXL-and-AWS/m-p/219679#M42005</link>
      <description>&lt;P&gt;You should configure both VTIs on both cluster members, with tunnel IP per member and a VIP. Details are in the VPN admin guide.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jul 2024 08:03:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Tunnel-between-ClusterXL-and-AWS/m-p/219679#M42005</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-07-04T08:03:30Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Tunnel between ClusterXL and AWS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Tunnel-between-ClusterXL-and-AWS/m-p/219692#M42008</link>
      <description>&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jul 2024 10:14:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Tunnel-between-ClusterXL-and-AWS/m-p/219692#M42008</guid>
      <dc:creator>gm446</dc:creator>
      <dc:date>2024-07-04T10:14:10Z</dc:date>
    </item>
  </channel>
</rss>

