<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MEP configuration hints for failover P2P VPN to non-Check Point Gateway. in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MEP-configuration-hints-for-failover-P2P-VPN-to-non-Check-Point/m-p/245999#M47948</link>
    <description>&lt;P&gt;Where the management being down is an issue is validating the CRL as part of the VPN (assuming you're using ICA certificates).&lt;BR /&gt;There may be other issues, but that's one that came to mind.&lt;/P&gt;</description>
    <pubDate>Tue, 08 Apr 2025 17:46:02 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2025-04-08T17:46:02Z</dc:date>
    <item>
      <title>MEP configuration hints for failover P2P VPN to non-Check Point Gateway.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MEP-configuration-hints-for-failover-P2P-VPN-to-non-Check-Point/m-p/245961#M47930</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;pointed me to MEP.&amp;nbsp; So, I have started reading the documentation.&amp;nbsp; Wanted to ask if anyone has set this up and can provide hints or issues encountered.&lt;/P&gt;&lt;P&gt;All our Check Point devices are R82 JHF12.&lt;/P&gt;&lt;P&gt;We have several small satellite sites that use CP 3200's that currently have P2P VPN connections to our 5800 in the Corporate Datacenter (Hub &amp;amp; Spoke).&amp;nbsp; The satellite sites use public Spectrum / FiOS connections, and each site has Static public IP.&amp;nbsp; No routing protocols are run on these CP 3200s.&amp;nbsp; All CP GWs are centrally managed from our virtualized CP Mgt server in the Corp datacenter.&lt;/P&gt;&lt;P&gt;We are setting up a DRaaS site with our service provider.&amp;nbsp; &amp;nbsp;The Service Provider uses Fortinet FW (presume its virtual appliance and don't know much else about it yet).&lt;/P&gt;&lt;P&gt;So, the scenario is if the Corp Datacenter is "down", these CP 3200 satellite sites need to failover their P2P VPN connection to the DRaaS / Fortinet Firewall until the Corp Datacenter is back online and then fail back.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Side note I need to study is since the CP Mgt server is in our Corp Datacenter -- which will be unavailable during a Disaster -- is if this would pose a problem with these CP 3200s?&amp;nbsp; Also, we do NOT use any CP end-user VPN clients -- we transitioned to Cloudflare's Zerotrust for secure device access from PCs not on any corporate networks.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TIA&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2025 11:43:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MEP-configuration-hints-for-failover-P2P-VPN-to-non-Check-Point/m-p/245961#M47930</guid>
      <dc:creator>Perry_McGrew</dc:creator>
      <dc:date>2025-04-08T11:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: MEP configuration hints for failover P2P VPN to non-Check Point Gateway.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MEP-configuration-hints-for-failover-P2P-VPN-to-non-Check-Point/m-p/245999#M47948</link>
      <description>&lt;P&gt;Where the management being down is an issue is validating the CRL as part of the VPN (assuming you're using ICA certificates).&lt;BR /&gt;There may be other issues, but that's one that came to mind.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2025 17:46:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MEP-configuration-hints-for-failover-P2P-VPN-to-non-Check-Point/m-p/245999#M47948</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-04-08T17:46:02Z</dc:date>
    </item>
    <item>
      <title>Re: MEP configuration hints for failover P2P VPN to non-Check Point Gateway.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MEP-configuration-hints-for-failover-P2P-VPN-to-non-Check-Point/m-p/251786#M49280</link>
      <description>&lt;P&gt;Slogging thru the setup.&amp;nbsp; &amp;nbsp;Defined the Fortigate as interoperable device.... added it as center GW to each remote Site VPN Community,&amp;nbsp; Set the manual MEP Priority list (Datacenter 1st Priority, Fortigate as 2nd Priority).&lt;/P&gt;&lt;P&gt;2 things still not clear.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- No VPN Domain defined on the Fortigate as the current VPN domain defined behind the Datacenter 5800 would be up behind the Fortigate in the event that Datacenter was down.&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Phase 1 / Phase 2 definitions on the satellite 3200s.&amp;nbsp; Can the IKE SAs be different to the 2 center GWs?&amp;nbsp; &amp;nbsp;I'd like to use SHA256 for the Data Integrity to the Fortigate vs the legacy SHA1 defined to the corporate Datacenter.&amp;nbsp; &amp;nbsp;I have looked at the "Override Encryption Settings for Externally Managed Gateways"&amp;nbsp; &amp;nbsp;It allows me to set the Fortigate Phase 1 to AES-256 / SHA256.&amp;nbsp; For Phase 2, I can set it to AES-GCM-256 but it will not allow me to choose Phase 2 Data Integrity (greyed out showing SHA384).&amp;nbsp; PFS is NOT used anywhere,&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jun 2025 15:18:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MEP-configuration-hints-for-failover-P2P-VPN-to-non-Check-Point/m-p/251786#M49280</guid>
      <dc:creator>Perry_McGrew</dc:creator>
      <dc:date>2025-06-23T15:18:58Z</dc:date>
    </item>
  </channel>
</rss>

