<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Two VPN Tunnels in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-VPN-Tunnels/m-p/248717#M48615</link>
    <description>&lt;P&gt;You can't define two tunnels to the same destination.&lt;BR /&gt;Link Selection should allow for "failing over" between the connection methods, possibly using (Dynamic) routing.&lt;BR /&gt;R82 has both enhanced Link Selection and link monitoring and might be required to make this work.&lt;/P&gt;</description>
    <pubDate>Mon, 12 May 2025 19:44:22 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2025-05-12T19:44:22Z</dc:date>
    <item>
      <title>Two VPN Tunnels</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-VPN-Tunnels/m-p/248548#M48563</link>
      <description>&lt;P&gt;I'm looking for some pointers please.&amp;nbsp; I've read through various posts on here about two VPN tunnels but I haven't found anything yet that addresses my scenario.&lt;/P&gt;&lt;P&gt;GW-A on Site 1.&amp;nbsp;&lt;/P&gt;&lt;P&gt;GW-B on site 2.&lt;/P&gt;&lt;P&gt;Managed by the same SmartCenter.&amp;nbsp; Gateways are 3600's.&amp;nbsp; Everything is R81.20 T99&lt;/P&gt;&lt;P&gt;GW-A on site 1 is connected to an ADSL line with a static IP.&lt;/P&gt;&lt;P&gt;GW-B on site 2 is a cluster.&amp;nbsp; Using business Starlink (with a single static IP).&amp;nbsp; This plugs into a Cisco C1111 which picks up the Starlink public IP.&amp;nbsp; The LAN side of the C1111 is RFC1918 via a switch in order to connect both cluster members.&amp;nbsp; The C1111 port forwards everything to the cluster's RFC1918 IP.&amp;nbsp; Default Gateway on the cluster is the LAN side of the C1111.&amp;nbsp; Internet works a treat.&lt;/P&gt;&lt;P&gt;I created a VPN between the sites using VTI.&amp;nbsp; In order to do this I had to set the IPsec "link selection" to use the statically natted IP - the Starlink public IP.&amp;nbsp; That VPN works a treat.&lt;/P&gt;&lt;P&gt;Now we've just got a point-to-point circuit installed - layer 2.&amp;nbsp; So GW-A and GW-B are now joined on different interfaces.&amp;nbsp; GW-A is .1, GW-B is .254 on the same subnet.&amp;nbsp; This works a treat.&lt;/P&gt;&lt;P&gt;I need to VPN between the gateways over the P2P circuit as the primary VPN, and have the Starlink route as a secondary/backup VPN.&amp;nbsp; I'm struggling.&lt;/P&gt;&lt;P&gt;Each VPN on its own works fine, but I can't figure out how to get both up at the same time.&lt;/P&gt;&lt;P&gt;I see a couple of problems I'm struggling to overcome (there may be more?!).&amp;nbsp; In no particular order:&lt;/P&gt;&lt;P&gt;1)&amp;nbsp; I can't create a second VTI in Gaia because the "peer name" is already in use on the first VTI.&lt;/P&gt;&lt;P&gt;2)&amp;nbsp; In order to get the P2P VPN up I need to remove the Starlink IP from Link Selection.&lt;/P&gt;&lt;P&gt;3)&amp;nbsp; If I create interoperable devices for the P2P interfaces and use those names for the VTI, and put them in a community, the logs then fill up with "VTI 'vpnt12' failed to attach: Peer object name not found".&lt;/P&gt;&lt;P&gt;Diagram below to illustrate.&amp;nbsp; The P2P circuit has Telco kit at each end but it's layer 2 so I didn't show the Telco kit on the diagram.&lt;/P&gt;&lt;P&gt;Does anyone know if there's a way to achieve this?&amp;nbsp; Or do I have to forget the idea of a backup VPN via Starlink?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VPN Example.jpg" style="width: 767px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30445iE0415C8BB37DC91B/image-size/large?v=v2&amp;amp;px=999" role="button" title="VPN Example.jpg" alt="VPN Example.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 May 2025 11:14:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-VPN-Tunnels/m-p/248548#M48563</guid>
      <dc:creator>madu1</dc:creator>
      <dc:date>2025-05-10T11:14:22Z</dc:date>
    </item>
    <item>
      <title>Re: Two VPN Tunnels</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-VPN-Tunnels/m-p/248549#M48564</link>
      <description>&lt;P&gt;Reading all you had said (great explanation btw), logically, at least in my opinion, the only way to have another VTI work in this case would be to have separate interoperable object, as it will never let you use the same one already referenced in another interface.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 10 May 2025 11:32:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-VPN-Tunnels/m-p/248549#M48564</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-10T11:32:14Z</dc:date>
    </item>
    <item>
      <title>Re: Two VPN Tunnels</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-VPN-Tunnels/m-p/248560#M48565</link>
      <description>&lt;P&gt;Hi Andy,&lt;/P&gt;&lt;P&gt;Yeah I tried separate interoperable devices but that didn't play nicely...&amp;nbsp; The logs have lot and lots of this (interestingly for both VTI's - 2 and 12, which puzzles me):&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled.jpg" style="width: 385px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30447i4B8BD2C7B8CB9154/image-size/large?v=v2&amp;amp;px=999" role="button" title="Untitled.jpg" alt="Untitled.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I reckon it'd be doable in a different way if both peer IPs were interfaces on GW-B instead of it being behind a NAT device&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":face_with_rolling_eyes:"&gt;🙄&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 10 May 2025 16:27:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-VPN-Tunnels/m-p/248560#M48565</guid>
      <dc:creator>madu1</dc:creator>
      <dc:date>2025-05-10T16:27:37Z</dc:date>
    </item>
    <item>
      <title>Re: Two VPN Tunnels</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-VPN-Tunnels/m-p/248561#M48566</link>
      <description>&lt;P&gt;Yea...what I attached and pointed to, it HAS TO&amp;nbsp; match with exact name of interoperable object, even upper case matters.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 10 May 2025 16:33:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-VPN-Tunnels/m-p/248561#M48566</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-10T16:33:47Z</dc:date>
    </item>
    <item>
      <title>Re: Two VPN Tunnels</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-VPN-Tunnels/m-p/248585#M48569</link>
      <description>&lt;P&gt;If you want both tunnels up I think R82 is the only solution... i think...&lt;/P&gt;</description>
      <pubDate>Sun, 11 May 2025 12:39:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-VPN-Tunnels/m-p/248585#M48569</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2025-05-11T12:39:47Z</dc:date>
    </item>
    <item>
      <title>Re: Two VPN Tunnels</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-VPN-Tunnels/m-p/248587#M48570</link>
      <description>&lt;P&gt;Personally, I could not find workaround for this in my R82 lab, but maybe someone can prove me wrong.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sun, 11 May 2025 13:50:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-VPN-Tunnels/m-p/248587#M48570</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-11T13:50:32Z</dc:date>
    </item>
    <item>
      <title>Re: Two VPN Tunnels</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-VPN-Tunnels/m-p/248717#M48615</link>
      <description>&lt;P&gt;You can't define two tunnels to the same destination.&lt;BR /&gt;Link Selection should allow for "failing over" between the connection methods, possibly using (Dynamic) routing.&lt;BR /&gt;R82 has both enhanced Link Selection and link monitoring and might be required to make this work.&lt;/P&gt;</description>
      <pubDate>Mon, 12 May 2025 19:44:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Two-VPN-Tunnels/m-p/248717#M48615</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-05-12T19:44:22Z</dc:date>
    </item>
  </channel>
</rss>

