<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure VPN with BGP (ClusterXL and 2 VPN Tunnels) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/221634#M42438</link>
    <description>&lt;P&gt;In my experience, vpnt are different and routemap with local preference and as-path-prepend, to force egress and ingress traffic accordly, are your friend to avoid asimmetric routing&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No experience with sk you provided&lt;/P&gt;</description>
    <pubDate>Mon, 22 Jul 2024 21:40:48 GMT</pubDate>
    <dc:creator>CheckPointerXL</dc:creator>
    <dc:date>2024-07-22T21:40:48Z</dc:date>
    <item>
      <title>Azure VPN with BGP (ClusterXL and 2 VPN Tunnels)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/220758#M42248</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;Can sombody help with ClusterXL, BGP VPN tunnel to Azure configuration.&lt;/P&gt;&lt;P&gt;I try to follow&amp;nbsp;&lt;SPAN&gt;sk176249&lt;/SPAN&gt;&amp;nbsp;guide but there is strange thing in configuroration about Cluster HA and two interfaces vpnt.&lt;/P&gt;&lt;P&gt;Interface vpnt1 and vpnt2&amp;nbsp; use that same virtual address (10.250.0.1) is it normal and should I configure it like this:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vpnt.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26791iBDBF60BBF1ACB059/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vpnt.png" alt="vpnt.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;I get confused because below is something different in routing cli and it looks like vpnt1 and vpnt2 has diffrent VIP configured:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vpnt_2.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26793i43566B3AF3996591/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vpnt_2.png" alt="vpnt_2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;Could you someone help me and specify what ip should be define where:&lt;/P&gt;&lt;P&gt;router-id: a.a.a.a&lt;/P&gt;&lt;P&gt;fw01 vpnt1: b.b.b.b&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;fw02 vpnt1: d.d.d.d&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;VIP vpnt1: f.f.f.f&lt;/P&gt;&lt;P&gt;fw01 vpnt2: c.c.c.c&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;fw02 vpnt2: e.e.e.e&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; VIP vpnt2: g.g.g.g&lt;/P&gt;&lt;P&gt;Maybe someone know is there in CheckPoint BGP configuration like in cisco update-source:&lt;/P&gt;&lt;P&gt;interface Loopback 11&lt;BR /&gt;ip address 100.64.200.1 255.255.255.255&lt;BR /&gt;exit&lt;/P&gt;&lt;P&gt;router bgp 65521&lt;BR /&gt;bgp log-neighbor-changes&lt;BR /&gt;neighbor 10.250.0.12 remote-as 65515&lt;BR /&gt;neighbor 10.250.0.12 ebgp-multihop 255&lt;BR /&gt;neighbor 10.250.0.12 update-source loopback 11&lt;/P&gt;&lt;P&gt;neighbor 10.250.0.13 remote-as 65515&lt;BR /&gt;neighbor 10.250.0.13 ebgp-multihop 255&lt;BR /&gt;neighbor 10.250.0.13 update-source loopback 11&lt;/P&gt;&lt;P&gt;I'll be grateful for any clarification.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 10:14:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/220758#M42248</guid>
      <dc:creator>Rafal_N</dc:creator>
      <dc:date>2024-07-15T10:14:27Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VPN with BGP (ClusterXL and 2 VPN Tunnels)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/220780#M42253</link>
      <description>&lt;P&gt;Wait, that does not make sense...how can they be using same IP address? If VTI us numbered, then you assign the IP yourself and if its UNNUMBERED, then you can "tie" it to any given interface, so say if its tied to eth0, then it will have exact same IP as that interface, which is totally fine.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I always found that when it comes to BGP, you should be using unnumbered vti's.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 13:13:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/220780#M42253</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-07-15T13:13:09Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VPN with BGP (ClusterXL and 2 VPN Tunnels)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/220799#M42258</link>
      <description>&lt;P&gt;Thanks, Andy. I will try that as it is in the deployment phase. However, all SK guides and Azure download configurations mention something about VTI IP addresses.&lt;/P&gt;&lt;P&gt;What is your practice? Do you configure Unnumbered VTI based on a loopback interface, or do you connect to an external interface and use it as the peer in Azure?&lt;/P&gt;&lt;P&gt;Any other thoughts? &lt;STRONG&gt;Has anyone followed this guide with clustering and HA successfully?&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 14:40:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/220799#M42258</guid>
      <dc:creator>Rafal_N</dc:creator>
      <dc:date>2024-07-15T14:40:59Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VPN with BGP (ClusterXL and 2 VPN Tunnels)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/220800#M42259</link>
      <description>&lt;P&gt;I never followed any guides for it. I just discovered it by doing extensive testing with my colleague and we got it working with VPN tunnel from CP cluster to Azure (route based) and BGP (using unnumbered VTIs)&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 14:45:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/220800#M42259</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-07-15T14:45:12Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VPN with BGP (ClusterXL and 2 VPN Tunnels)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/220801#M42260</link>
      <description>&lt;P&gt;See if below helps, if not, we can do remote later if free (and allowed to)&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Route-Based-VPN-with-Static-Rouing/m-p/205256/emcs_t/S2h8ZW1haWx8dG9waWNfc3Vic2NyaXB0aW9ufExTQjZMWFlNTFBRMlBBfDIwNTI1NnxTVUJTQ1JJUFRJT05TfGhL#M38713" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/Route-Based-VPN-with-Static-Rouing/m-p/205256/emcs_t/S2h8ZW1haWx8dG9waWNfc3Vic2NyaXB0aW9ufExTQjZMWFlNTFBRMlBBfDIwNTI1NnxTVUJTQ1JJUFRJT05TfGhL#M38713&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 14:47:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/220801#M42260</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-07-15T14:47:44Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VPN with BGP (ClusterXL and 2 VPN Tunnels)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/220961#M42304</link>
      <description>&lt;P&gt;How it's deal with asymetric routing?? Does it bother if we send traffic vpnt1 and recived vpnt2?? Or do we should not care about that as far as it connected to external Interface?&lt;/P&gt;&lt;P&gt;fw monitor:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Outgoing traffic&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;[vs_0][fw_2] eth2:I[44]: onprem.ip -&amp;gt; azure.ip (ICMP) len=60 id=53255 ICMP: type=8 code=0 echo request id=1 seq=5699&lt;BR /&gt;[vs_0][fw_2] &lt;STRONG&gt;vpnt1:o&lt;/STRONG&gt;[44]: onprem.ip -&amp;gt; azure.ip (ICMP) len=60 id=53255 ICMP: type=8 code=0 echo request id=1 seq=5699&lt;BR /&gt;[vs_0][fw_2] vpnt1:O[44]: onprem.ip -&amp;gt; azure.ip (ICMP) len=60 id=53255 ICMP: type=8 code=0 echo request id=1 seq=5699&lt;BR /&gt;[vs_0][fw_2] &lt;STRONG&gt;vpnt1:Oe&lt;/STRONG&gt;[44]: onprem.ip -&amp;gt; azure.ip (ICMP) len=60 id=53255 ICMP: type=8 code=0 echo request id=1 seq=5699&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Incomming traffic:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[vs_0][fw_2] eth1:i[44]: azure.ip -&amp;gt; onprem.ip (ICMP) len=60 id=37463 ICMP: type=0 code=0 echo reply id=1 seq=5699&lt;BR /&gt;[vs_0][fw_2] &lt;STRONG&gt;vpnt2:I[44]&lt;/STRONG&gt;: azure.ip -&amp;gt; onprem.ip (ICMP) len=60 id=37463 ICMP: type=0 code=0 echo reply id=1 seq=5699&lt;BR /&gt;[vs_0][fw_2] eth2:o[44]: azure.ip -&amp;gt; onprem.ip (ICMP) len=60 id=37463 ICMP: type=0 code=0 echo reply id=1 seq=5699&lt;BR /&gt;[vs_0][fw_2] eth2:O[44]: azure.ip -&amp;gt; onprem.ip (ICMP) len=60 id=37463 ICMP: type=0 code=0 echo reply id=1 seq=5699&lt;/P&gt;&lt;P&gt;I was trying to force Azure infrastructure to use as_path to choose prefered path but still without success and stil fighting with that using sk103047 and&amp;nbsp;&lt;/P&gt;&lt;P&gt;(IV-3) Configuration of BGP AS PATH Prepend&lt;/P&gt;&lt;P&gt;Any&amp;nbsp; practice with that?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 13:30:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/220961#M42304</guid>
      <dc:creator>Rafal_N</dc:creator>
      <dc:date>2024-07-16T13:30:43Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VPN with BGP (ClusterXL and 2 VPN Tunnels)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/220962#M42305</link>
      <description>&lt;P&gt;You need to make sure routes are correct, that is the KEY here. So say Azure side is 10.20.30.0/24, just make a route that say if thats destination, send through appropriate VTI,&lt;/P&gt;
&lt;P&gt;Dont worry about that unnumbered vti config, make sure that anti spoofing is DISABLED, thats important.&lt;/P&gt;
&lt;P&gt;Lets do remote if you are not clear.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 13:32:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/220962#M42305</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-07-16T13:32:35Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VPN with BGP (ClusterXL and 2 VPN Tunnels)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/221147#M42347</link>
      <description>&lt;P&gt;Still trying to get deep understanding in Azure VPN with BGP.&lt;/P&gt;&lt;P&gt;Can anyone confirm whether in the topology that Microsoft calls "&lt;STRONG&gt;Active-active VPN gateways&lt;/STRONG&gt;" we can steer which VPN tunnel is utilized using AS PATH? Or is it by definition active/active, meaning we can't avoid utilizing both tunnels simultaneously and probably we have to deal with asymetric routing?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="active-active.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26842iE2539CA7CBA4A3E7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="active-active.png" alt="active-active.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;MS article about different topologies:&lt;/P&gt;&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-highlyavailable#activeactiveonprem" target="_blank"&gt;https://learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-highlyavailable#activeactiveonprem&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My findings:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Because the Azure gateway instances are in active-active configuration, the traffic from your Azure virtual network to your on-premises network will be routed through both tunnels simultaneously, even if your on-premises VPN device might favor one tunnel over the other.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;However, according to the Microsoft FAQ about BGP:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Yes, Azure VPN gateway honors AS Path prepending to help make routing decisions when BGP is enabled. A shorter AS Path is preferred in BGP path selection.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 06:47:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/221147#M42347</guid>
      <dc:creator>Rafal_N</dc:creator>
      <dc:date>2024-07-18T06:47:47Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VPN with BGP (ClusterXL and 2 VPN Tunnels)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/221634#M42438</link>
      <description>&lt;P&gt;In my experience, vpnt are different and routemap with local preference and as-path-prepend, to force egress and ingress traffic accordly, are your friend to avoid asimmetric routing&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No experience with sk you provided&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2024 21:40:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/221634#M42438</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2024-07-22T21:40:48Z</dc:date>
    </item>
    <item>
      <title>Re: Azure VPN with BGP (ClusterXL and 2 VPN Tunnels)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/221675#M42447</link>
      <description>&lt;P&gt;Agree 100%&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2024 11:20:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-VPN-with-BGP-ClusterXL-and-2-VPN-Tunnels/m-p/221675#M42447</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-07-23T11:20:08Z</dc:date>
    </item>
  </channel>
</rss>

