<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260186#M51032</link>
    <description>&lt;P&gt;Sure! I have the static routes set up in GAIA for both gateways like this:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31746i545AC5A76F24A72D/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As far as the guide is concerned, I had a guide that AWS sent me via a text file, but I also looked at several threads on here when something didn't quite make sense in their guide. In the end I got the tunnels up, it's just the redundancy aspect of it is not working.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 17 Oct 2025 17:48:08 GMT</pubDate>
    <dc:creator>dgrenfell</dc:creator>
    <dc:date>2025-10-17T17:48:08Z</dc:date>
    <item>
      <title>Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260133#M51019</link>
      <description>&lt;P&gt;I have 2 site-site VPN tunnels going out to AWS, but I can't seem to force a failover to make sure redundancy is working. We have a cluster of 2 19100 appliances, so I know redundancy would work if we lost a gateway, but for some reason the steps I have taken to force a failover for the tunnels doesn't seem to work. I have performed the following:&lt;/P&gt;&lt;P&gt;- Logged into GAIA and disabled the vti interface (vpnt2 in this case) and pushed policy&lt;/P&gt;&lt;P&gt;- When logged into the active gateway and looking at the tunnel list, I still see the tunnel associated with the vti interface I had disabled still showing connected&lt;/P&gt;&lt;P&gt;- After deleting the SA's for the gateway on the AWS end of this tunnel, it still showed connected, no matter how many times I performed those actions&lt;/P&gt;&lt;P&gt;The vendor on the AWS end said the tunnel never went down, and they were seeing traffic flowing in and out of their server, so that attempt was a bust. I then got CP on a conference call with us and the ONLY way we could get it to "fail over" was to remove the gateway that is associated with the vti from the community. However, the same symptoms were still present (i.e the tunnel still showing connected, etc), but it was when the tunnel negotiation timer ran out that it FINALLY showed disconnected (after pushing policy the AWS side finally went down, but it took approximately 60ish seconds). When we ran fw monitor, we saw that traffic on our end was still trying to send things out the tunnel that was apparently down, so it just broke things, and we had to revert back.&lt;/P&gt;&lt;P&gt;TLDR: Am I missing something here?&lt;/P&gt;&lt;P&gt;Here is my configuration:&lt;/P&gt;&lt;P&gt;- Cluster of 2 19100 CheckPoint appliances running R81.20 with JHF 76&lt;/P&gt;&lt;P&gt;- 2 vti interfaces pointing to their respective AWS gateways, using addressing provided by AWS&lt;/P&gt;&lt;P&gt;- A star community consisting of our cluster as the satellite gateway and the 2 AWS gateways as the center&lt;/P&gt;&lt;P&gt;- Both AWS gateways set with empty groups to facilitate the routed based configuration (instructions provided by AWS and CP TAC)&lt;/P&gt;&lt;P&gt;- Static routes set on both vti's using a priority of 1 and 2 for each gateway (1 being the primary tunnel and 2 being the secondary) so the gateways know which vti to "prefer" to send traffic out&lt;/P&gt;&lt;P&gt;- Directional rules set up in Smart Console to allow the traffic that is to be accepted&lt;/P&gt;&lt;P&gt;The site-site VPN IS working, I just can't seem to perform a forced fail over to go from one tunnel to the other.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any thoughts? Am I missing anything? Let me know if I need to show or explain anything further. Thanks all!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2025 22:54:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260133#M51019</guid>
      <dc:creator>dgrenfell</dc:creator>
      <dc:date>2025-10-16T22:54:28Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260147#M51024</link>
      <description>&lt;P&gt;Can you describe further how are the static routes configured, was there a particular guide which you followed?&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2025 09:45:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260147#M51024</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-10-17T09:45:33Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260165#M51027</link>
      <description>&lt;P&gt;Do you have simple diagram?&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2025 11:43:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260165#M51027</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-17T11:43:03Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260166#M51028</link>
      <description>&lt;P&gt;I had done this with Azure, but I suspect would be similar on AWS.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2025 11:43:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260166#M51028</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-17T11:43:49Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260186#M51032</link>
      <description>&lt;P&gt;Sure! I have the static routes set up in GAIA for both gateways like this:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31746i545AC5A76F24A72D/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As far as the guide is concerned, I had a guide that AWS sent me via a text file, but I also looked at several threads on here when something didn't quite make sense in their guide. In the end I got the tunnels up, it's just the redundancy aspect of it is not working.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2025 17:48:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260186#M51032</guid>
      <dc:creator>dgrenfell</dc:creator>
      <dc:date>2025-10-17T17:48:08Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260188#M51033</link>
      <description>&lt;P&gt;I do actually. I scrubbed all private information, but here is the basic diagram of how it flows. We have 2 ISP routers that connect out to the outside world, with the firewall cluster having a VIP between the two routers. The firewall cluster shares 2 vti's with AWS and the traffic gets encrypted within our network, sent through the vti and then out one of the ISP routers (whichever has the better path through BGP at the time). We don't have any dynamic routing on the firewall cluster, as that's all handled at the ISP routers, thus the reason for the static routes.&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="image2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31747i80DF1D9495E12A93/image-size/large?v=v2&amp;amp;px=999" role="button" title="image2.png" alt="image2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2025 18:00:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260188#M51033</guid>
      <dc:creator>dgrenfell</dc:creator>
      <dc:date>2025-10-17T18:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260189#M51034</link>
      <description>&lt;P&gt;I have a tunnel with Azure for another vendor, it's not redundant, but man it was SO much easier to set up and has never had any issues, unlike this one with AWS. I might need to have you share some pointers on how you got that to work with Azure so I can see if the same can be applied here with AWS.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2025 18:03:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260189#M51034</guid>
      <dc:creator>dgrenfell</dc:creator>
      <dc:date>2025-10-17T18:03:13Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260195#M51036</link>
      <description>&lt;P&gt;There are some differences, yes!&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2025 18:26:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260195#M51036</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-17T18:26:43Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260217#M51039</link>
      <description>&lt;P&gt;You don't appear to be using the ping/monitor option...&lt;/P&gt;
&lt;P&gt;What does the active routing table look like when the VTI is disabled?&lt;/P&gt;</description>
      <pubDate>Sat, 18 Oct 2025 00:12:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260217#M51039</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-10-18T00:12:45Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260222#M51040</link>
      <description>&lt;P&gt;Thanks mate! Let me see if I can try lab this up when back from vacation.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Oct 2025 12:08:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260222#M51040</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-18T12:08:42Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260386#M51060</link>
      <description>&lt;P&gt;You likely will need Dead Peer Detection enabled which is configured via Permanent Tunnels and a GUIDBedit configuration. &amp;nbsp; It's in the R81.20 Site to Site VPN admin guide, page 138-140.&lt;/P&gt;
&lt;P&gt;You have much older Jumbo HFA than is current, and Jumbo HFA 89 includes a fix for DPD, and each Jumbo since 76 has numerous VPN-related fixes that may be of interest to you.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/Jumbo_HFA/R81.20/R81.20/R81.20-List-of-all-Resolved-Issues.htm?tocpath=_____4" target="_blank"&gt;https://sc1.checkpoint.com/documents/Jumbo_HFA/R81.20/R81.20/R81.20-List-of-all-Resolved-Issues.htm?tocpath=_____4&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2025 20:34:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260386#M51060</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2025-10-20T20:34:01Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260398#M51064</link>
      <description>&lt;P&gt;I believe DPD is auto enabled when you check permanent tunnel option in vpn community object.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 01:02:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260398#M51064</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-21T01:02:51Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260486#M51082</link>
      <description>&lt;P&gt;Hey Duane! I do have DPD enabled, and verified it in the GUIDBedit tool, but yes, I realize we're on an older HFA - we rolled back because we ran into an issue with R82.10 that basically corrupting our database to the point we couldn't push policy to our cluster; even CP had issues helping us, so we just reverted back to an old snap shot. I'll have to defer to my colleagues on that, as it's a bit of a touchy subject right now.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 18:19:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260486#M51082</guid>
      <dc:creator>dgrenfell</dc:creator>
      <dc:date>2025-10-21T18:19:04Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260487#M51083</link>
      <description>&lt;P&gt;Yep, you are correct sir.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 17:44:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260487#M51083</guid>
      <dc:creator>dgrenfell</dc:creator>
      <dc:date>2025-10-21T17:44:37Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260488#M51084</link>
      <description>&lt;P&gt;Sounds good sir! I have another call with CP today, so I'll see what we find out. I'll update this thread if I have any new information afterward.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 17:46:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260488#M51084</guid>
      <dc:creator>dgrenfell</dc:creator>
      <dc:date>2025-10-21T17:46:04Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260489#M51085</link>
      <description>&lt;P&gt;Appreciated!&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 17:48:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260489#M51085</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-21T17:48:26Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260490#M51086</link>
      <description>&lt;P&gt;Hey Chris, I see what you mean. Will that ping/monitor option do anything in this situation? Also, the route table looks as I expect it would and shows the available vti as the route to AWS.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 18:03:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260490#M51086</guid>
      <dc:creator>dgrenfell</dc:creator>
      <dc:date>2025-10-21T18:03:06Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260493#M51087</link>
      <description>&lt;P&gt;Yikes, I've been there. &amp;nbsp;I'm surprised TAC couldn't give you an answer. &amp;nbsp;There's a curious fix in Jumbo HFA 84 that smells a little bit like what you're describing. &amp;nbsp;Subsequent HFAs have dozens and dozens of fixes for management and some database issues, too.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/Jumbo_HFA/R81.20/R81.20/Take_84.htm?tocpath=Previously%20Released%20Takes%7C_____13" target="_blank"&gt;https://sc1.checkpoint.com/documents/Jumbo_HFA/R81.20/R81.20/Take_84.htm?tocpath=Previously%20Released%20Takes%7C_____13&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;You can generally run the gateways and management server on different HFAs (depending on what features you're trying to enable; some require parity). &amp;nbsp;If this is strictly a gateway issue (and sounds like it is), you can apply a more recent HFA there to see if it helps resolve the issue. &amp;nbsp;Hopefully you can get an opportunity to try a more recent HFA on the management server soon!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 18:35:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260493#M51087</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2025-10-21T18:35:20Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260494#M51088</link>
      <description>&lt;P&gt;FWIW, I always install latest jumbos, seems pretty safe to do so lately, at least in my opinion.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 18:38:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260494#M51088</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-21T18:38:29Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone been able to have redundant VPN tunnels with AWS using vti's?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260496#M51089</link>
      <description>&lt;P&gt;Yup, we're running the gateways on R81.20 and the SMS on R82.10, but you're right, it was just a gateway issue, but oddly enough, it worked for 6 months and then BAM! Nope! Had the same thing happen on a different cluster we had, but strangely we were able to resolve it with a reboot of the cluster (the same fix didn't help with our Enterprise cluster unfortunately). Since I work in local government, things run a bit slower here, so we'll see where we go with the HFA situation. Thanks for the links and input, I appreciate it sir!&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 18:41:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-been-able-to-have-redundant-VPN-tunnels-with-AWS/m-p/260496#M51089</guid>
      <dc:creator>dgrenfell</dc:creator>
      <dc:date>2025-10-21T18:41:40Z</dc:date>
    </item>
  </channel>
</rss>

