<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Second ISP in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241982#M47006</link>
    <description>&lt;P&gt;Yes it has outbound user traffic (internet browsing)&amp;nbsp; Won't this be taken care of my a second default route? Can you clarify what you mean?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2025 22:59:43 GMT</pubDate>
    <dc:creator>velo</dc:creator>
    <dc:date>2025-02-21T22:59:43Z</dc:date>
    <item>
      <title>Second ISP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241961#M47002</link>
      <description>&lt;P&gt;I have a pair of 6200s that I want to add a second ISP. It has a couple of VPNs configured on it to other Checkpoints I manage. My plan is this:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Under the default route there is the option to add multiple next hops with with different priority. I will make the primary as priority as 1 and the backup as 10. I will choose to monitor the default gateway of each next hop.&lt;/LI&gt;&lt;LI&gt;Setup Link Selection with probing under IPSEC&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Any issues seen with this?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 18:30:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241961#M47002</guid>
      <dc:creator>velo</dc:creator>
      <dc:date>2025-02-21T18:30:44Z</dc:date>
    </item>
    <item>
      <title>Re: Second ISP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241979#M47005</link>
      <description>&lt;P&gt;Does this gateway have any user traffic?&lt;BR /&gt;Possible you may need ISP Redundancy here.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 22:17:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241979#M47005</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-02-21T22:17:05Z</dc:date>
    </item>
    <item>
      <title>Re: Second ISP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241982#M47006</link>
      <description>&lt;P&gt;Yes it has outbound user traffic (internet browsing)&amp;nbsp; Won't this be taken care of my a second default route? Can you clarify what you mean?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 22:59:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241982#M47006</guid>
      <dc:creator>velo</dc:creator>
      <dc:date>2025-02-21T22:59:43Z</dc:date>
    </item>
    <item>
      <title>Re: Second ISP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241983#M47007</link>
      <description>&lt;P&gt;How many external IPs? Or to be precise, how many external interfaces?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 23:04:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241983#M47007</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-02-21T23:04:05Z</dc:date>
    </item>
    <item>
      <title>Re: Second ISP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241984#M47008</link>
      <description>&lt;P&gt;If you have user traffic, you'll likely have to deal with NAT (HIDE NAT in particular).&lt;BR /&gt;As NAT rules in SmartConsole cannot be made "per-ISP" (different NAT for different ISP), you need to use ISP Redundancy or Quantum SD-WAN.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 23:30:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241984#M47008</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-02-21T23:30:02Z</dc:date>
    </item>
    <item>
      <title>Re: Second ISP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241985#M47009</link>
      <description>&lt;P&gt;Hey Andy&lt;/P&gt;&lt;P&gt;Just two. I have one now and am adding a second one.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 23:36:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241985#M47009</guid>
      <dc:creator>velo</dc:creator>
      <dc:date>2025-02-21T23:36:22Z</dc:date>
    </item>
    <item>
      <title>Re: Second ISP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241986#M47010</link>
      <description>&lt;P&gt;In that case, you may need ISP redundancy.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 23:50:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241986#M47010</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-02-21T23:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: Second ISP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241987#M47011</link>
      <description>&lt;P&gt;Thanks. What is the section about "&lt;SPAN&gt;Configure the&amp;nbsp;&lt;/SPAN&gt;Cluster&lt;SPAN&gt;&amp;nbsp;to be the DNS server" That makes no sense to me.. Seems like it's not relevant.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;To configure this on SMB firewalls is very easy, you just setup IPSEC link selection for VPNs, and NAT etc just work fine.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 23:51:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241987#M47011</guid>
      <dc:creator>velo</dc:creator>
      <dc:date>2025-02-21T23:51:46Z</dc:date>
    </item>
    <item>
      <title>Re: Second ISP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241989#M47012</link>
      <description>&lt;P&gt;Thanks, I'm reading the docs. The DNS part doesn't make sense but I don't think that's relevant to my setup. I will see if I can lab it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you explain what I will need to do for outbound NATs? If I have the box ticked under "NAT" to hide internal networks behind Gateway, will this take care of all outbound NAT when there is a failover?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2025 00:00:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241989#M47012</guid>
      <dc:creator>velo</dc:creator>
      <dc:date>2025-02-22T00:00:47Z</dc:date>
    </item>
    <item>
      <title>Re: Second ISP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241991#M47013</link>
      <description>&lt;P&gt;Yes, either you can do it that way or with manual nat, whichever works.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2025 01:10:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/241991#M47013</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-02-22T01:10:12Z</dc:date>
    </item>
    <item>
      <title>Re: Second ISP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/242041#M47023</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;let's put things in order.&lt;BR /&gt;&lt;BR /&gt;if you want to work as "legacy", you can set two default routes with different priorities and monitoring as you said, For VPN configure the Link selection with HA. and you good to go.&lt;BR /&gt;&lt;BR /&gt;Legacy, because for internet traffic you will have a failover only once the 'IP Reachability detection' monitored target is DOWN or once your DG will stop responding to ping, and you can work only in Active/Standby mode by this.&lt;BR /&gt;&lt;BR /&gt;if you want to get little more advanced method, you can use ISP Redundancy which provide you the ability to use Load Sharing between the lines for outbound internet, with a couple more features.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;and if you want to get the best out of your multiple lines you can consider Quantum SD-WAN, in which you can benefit from specific steering abilities Per app/DSCP/User/updatable object, etc. advanced SLA configurations, application steering, (soon - Application level QOS), different custom NAT Per ISP configured in a user friendly way. seamless failover in VPN Traffic to another SD-WAN enabled Gateways, and much more.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For any method you choose, 'Hide behind GW' should work.&lt;BR /&gt;if you need custom Hide to Static NAT Per ISP, you can implement it via ISP Redundancy (not very user friendly way), or via the Quantum SD-WAN Rules in Infinity portal.&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2025 10:03:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/242041#M47023</guid>
      <dc:creator>AmirArama</dc:creator>
      <dc:date>2025-02-23T10:03:38Z</dc:date>
    </item>
    <item>
      <title>Re: Second ISP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/242322#M47064</link>
      <description>&lt;P&gt;Thanks a lot for the detailed response. In the end I ended up using a second default route next hop, combined with&amp;nbsp;&lt;SPAN&gt;IP Reachability Detection. I think setup the Link Monitoring under IPSEC. I also have the box ticked under NAT to hide behind Gateway. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Everything worked great an as expected.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 22:34:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/242322#M47064</guid>
      <dc:creator>velo</dc:creator>
      <dc:date>2025-02-25T22:34:35Z</dc:date>
    </item>
    <item>
      <title>Re: Second ISP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/242323#M47065</link>
      <description>&lt;P&gt;Great job! btw, just be careful with NAT setting, as it is global. if you wish to nat certain networks, do it from the net object itself and make sure disable nat is unchecked within community.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 22:40:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/242323#M47065</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-02-25T22:40:32Z</dc:date>
    </item>
    <item>
      <title>Re: Second ISP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/242324#M47066</link>
      <description>&lt;P&gt;Thanks! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Yep, understood. Lucky this site is quite straightforward.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 22:42:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/242324#M47066</guid>
      <dc:creator>velo</dc:creator>
      <dc:date>2025-02-25T22:42:19Z</dc:date>
    </item>
    <item>
      <title>Re: Second ISP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/242325#M47067</link>
      <description>&lt;P&gt;Great! Anywho, just something below to keep in mind &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;Disable NAT Inside the VPN Community&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Even if NAT is configured it is possible to disable NAT inside the VPN community. If NAT is disabled, when a host behind a community member opens a connection with another host behind a community member, the original IP addresses are used. Other connections use the translated address.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 22:52:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Second-ISP/m-p/242325#M47067</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-02-25T22:52:38Z</dc:date>
    </item>
  </channel>
</rss>

