<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPsec Enhanced Mode - tunnel redundancy in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-Enhanced-Mode-tunnel-redundancy/m-p/246998#M48192</link>
    <description>&lt;P&gt;Thanks for that&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/78158"&gt;@marcyn&lt;/a&gt;&amp;nbsp;. I tested this in my R82 lab a little bit last week and I really like the enhanced mode, great addition.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Tue, 22 Apr 2025 12:13:19 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-04-22T12:13:19Z</dc:date>
    <item>
      <title>IPsec Enhanced Mode - tunnel redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-Enhanced-Mode-tunnel-redundancy/m-p/246984#M48189</link>
      <description>&lt;P&gt;Hi CheckMates,&lt;/P&gt;&lt;P&gt;Because I've not found answers to my questions in documentation and community ... I decided to just ask if anyone from you already have any experience with the new enhanced mode for IPSec that was introduced in R82.&lt;/P&gt;&lt;P&gt;What I want to achieve is IPsec redundancy.&lt;/P&gt;&lt;P&gt;With legacy mode I can do it for example that way:&lt;BR /&gt;1) configure ISP Redundancy ... here provide Primary and Backup interfaces and check "Apply settings to VPN traffic" - it will automatically change Link Selection as probing:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30279i1EA01E11CB80722F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="2.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30280i8DB03F070AAB1B81/image-size/medium?v=v2&amp;amp;px=400" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) then I can create two Interoperable Devices in case peer also has two ISPs (1st = Peer's ISP1, 2nd = Peer's ISP2)&lt;BR /&gt;3) and VPN Community object with 3 gateways (Check Point + 2x Interoperable Devices with the same VPN Domain)&lt;BR /&gt;&lt;BR /&gt;With the above configuration everything works as expected - once my Primary ISP will fail new IPSec tunnel is instantly established via Backup ISP.&lt;BR /&gt;Then when Primary ISP will be back online ... I will have two IPSec tunnels unless I will shutdown this one that is already establised via Backup ISP.... and with this Check Point will send traffic via Primary ISP, and will receive response via Backup ISP (a little strange ... but also expected if peer will not switch to this "repaired" Check Point's primary ISP).&lt;BR /&gt;&lt;BR /&gt;So everything is fine... except one minor issue.&lt;BR /&gt;For some reason Check Point is using Main IP for "local ID" in IPsec and not the one from Link Selection.&lt;BR /&gt;So if my Main IP is for example from my management network tunnel will not be established unless&amp;nbsp;I will provide this Main IP in peer's configuration for IPsec. Without ISP Redundancy "local ID" is the same that is selected in "Link selection".&lt;BR /&gt;Probably it can be changed in GuiDbEdit ... but yeah ... it's weak.&lt;BR /&gt;If you don't understood what I meant ... this screenshot should explain it:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="3.png" style="width: 376px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30281i695EEE0347BE70CF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="3.png" alt="3.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Above screenshot shows information from peer's log ... as you can see it receives from Check Point 10.99.99.105 instead of 203.0.113.253.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I decided to check this new enhanced mode.&lt;BR /&gt;I expected that it should work like that:&lt;BR /&gt;1) for Check Point I'm selecting Primary and Backup interface&lt;BR /&gt;2) then I have one Interoperable Device with two IPs (external) and here also one will be Primary, another Backup&lt;BR /&gt;And if everything will be fine they should connect via Primary&amp;lt;-&amp;gt;Primary.&lt;BR /&gt;In case any of ISPs should fail it will be Primary&amp;lt;-&amp;gt;Backup or Backup&amp;lt;-&amp;gt;Primary, or Backup&amp;lt;-&amp;gt;Backup.&lt;BR /&gt;But ... it doesn't work like that...&lt;/P&gt;&lt;P&gt;First issue:&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="4.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30283iB64FF3B386B64278/image-size/medium?v=v2&amp;amp;px=400" role="button" title="4.png" alt="4.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can't have "Auto" for both interfaces ... so I need to select "Next Hop IP Address".&lt;BR /&gt;So ... I selected Next Hop IP Address for one of them ... and it didn't work at all - no IPsec tunnel was established with peer.&lt;BR /&gt;Then after some strugling and troubleshooting I've found that Next Hop IP Address was wrong one.&lt;BR /&gt;For me ... Next Hop in this case = my gateway .... but I had to change it to Peer's IP ! ... so it should be named "Peer's IP"... really strange.&lt;BR /&gt;With that tunnel was established via Primary&amp;lt;-&amp;gt;Primary.&lt;BR /&gt;Then I decided to break connection for this Primary interface.&lt;BR /&gt;I expected that new tunnel sbould be established via Backup interface ... it took like one minute and then it was established between Backup&amp;lt;-&amp;gt;Backup.&lt;BR /&gt;It's not what I expected...&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Do you have some experience with this ?&lt;BR /&gt;Can you show me what I'm doing wrong, what I could do better ?&lt;BR /&gt;How it should be done to achieve the best results ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best&lt;BR /&gt;m.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 13:30:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-Enhanced-Mode-tunnel-redundancy/m-p/246984#M48189</guid>
      <dc:creator>marcyn</dc:creator>
      <dc:date>2025-04-22T13:30:16Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Enhanced Mode - tunnel redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-Enhanced-Mode-tunnel-redundancy/m-p/246997#M48191</link>
      <description>&lt;P&gt;It looks like my previous tests with Enhanced Mode gave wrong results ... I was testing this on HyperV.&lt;/P&gt;&lt;P&gt;Another test but this time on Proxmox gave expected results... in both cases that I wanted to test:&lt;BR /&gt;&lt;BR /&gt;Option 1:&lt;BR /&gt;Two ISPs on Check Point, one ISP on peer:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="6.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30284iA3ABA2676937A298/image-size/medium?v=v2&amp;amp;px=400" role="button" title="6.png" alt="6.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Option 2:&lt;BR /&gt;Two ISPs on Check Point and peer:&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="5.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30285iDDD19DF95481FF99/image-size/medium?v=v2&amp;amp;px=400" role="button" title="5.png" alt="5.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In both cases it worked as expected:&lt;BR /&gt;1) when everything works we have tunnel between ISP1-&amp;gt;ISP1&lt;BR /&gt;2) once ISP1 on Check Point site died tunnel was between ISP2&amp;lt;-&amp;gt;ISP1&lt;BR /&gt;3) once ISP1 on Check Point returned tunnel was back between ISP1&amp;lt;-&amp;gt;ISP1&lt;BR /&gt;4) once ISP1 on peer site died tunnel was between ISP1&amp;lt;-&amp;gt;ISP2&lt;BR /&gt;etc,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;**bleep** HyperV...&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Best&lt;BR /&gt;m.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 12:10:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-Enhanced-Mode-tunnel-redundancy/m-p/246997#M48191</guid>
      <dc:creator>marcyn</dc:creator>
      <dc:date>2025-04-22T12:10:52Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Enhanced Mode - tunnel redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-Enhanced-Mode-tunnel-redundancy/m-p/246998#M48192</link>
      <description>&lt;P&gt;Thanks for that&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/78158"&gt;@marcyn&lt;/a&gt;&amp;nbsp;. I tested this in my R82 lab a little bit last week and I really like the enhanced mode, great addition.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 12:13:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-Enhanced-Mode-tunnel-redundancy/m-p/246998#M48192</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-04-22T12:13:19Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Enhanced Mode - tunnel redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-Enhanced-Mode-tunnel-redundancy/m-p/246999#M48193</link>
      <description>&lt;P&gt;Hi Andy,&lt;BR /&gt;At first I also thought that I will love it ... but because I had this ackward results I lost hope...&lt;/P&gt;&lt;P&gt;... luckily I got it back now &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best&lt;BR /&gt;m.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 12:15:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-Enhanced-Mode-tunnel-redundancy/m-p/246999#M48193</guid>
      <dc:creator>marcyn</dc:creator>
      <dc:date>2025-04-22T12:15:55Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Enhanced Mode - tunnel redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-Enhanced-Mode-tunnel-redundancy/m-p/247000#M48194</link>
      <description>&lt;P&gt;Thats okay, like anything new, takes time to get to like it : - )&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 12:19:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-Enhanced-Mode-tunnel-redundancy/m-p/247000#M48194</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-04-22T12:19:44Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Enhanced Mode - tunnel redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-Enhanced-Mode-tunnel-redundancy/m-p/247005#M48199</link>
      <description>&lt;P&gt;Nice to know the new ISP Redundancy options in R82 worked for you.&lt;BR /&gt;Curious why it wasn't working so well in HyperV...&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 12:50:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-Enhanced-Mode-tunnel-redundancy/m-p/247005#M48199</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-04-22T12:50:35Z</dc:date>
    </item>
  </channel>
</rss>

