<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AWS VPN Redundancy in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AWS-VPN-Redundancy/m-p/98117#M7622</link>
    <description>&lt;P&gt;At the on-premise side you will always use the VIP that is assigned to the cluster, so at your end you already have a auto failover. At the AWS end they normally give you 2 IP's to build a tunnel against.&lt;/P&gt;
&lt;P&gt;If you look at &lt;A href="https://community.checkpoint.com/t5/General-Topics/Route-Based-VPN/m-p/34463" target="_self"&gt;this post&lt;/A&gt;, it contains a template and instructions for configuring the dual VPN to AWS.&lt;/P&gt;</description>
    <pubDate>Sat, 03 Oct 2020 07:24:19 GMT</pubDate>
    <dc:creator>Maarten_Sjouw</dc:creator>
    <dc:date>2020-10-03T07:24:19Z</dc:date>
    <item>
      <title>AWS VPN Redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AWS-VPN-Redundancy/m-p/97778#M7591</link>
      <description>&lt;P&gt;Hi. I've been asked a question about setting up a VPN between our office and AWS but was hoping for some clarification as this is new to me. On-prem we use a FW cluster with a primary/backup external IP and because of this it's been suggested that we setup two tunnels between office and AWS, one using the backup IP and the other using the primary IP. If one fails then it would auto failover to the other.&lt;/P&gt;&lt;P&gt;I've had a read of&amp;nbsp;&lt;SPAN&gt;sk100726 - do we have to use VTIs or can this be done with static routing? That's assuming that a failover VPN tunnel can be created. As I said, I've not done this before so am grateful for any help with this.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 09:43:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AWS-VPN-Redundancy/m-p/97778#M7591</guid>
      <dc:creator>Wyman</dc:creator>
      <dc:date>2020-09-29T09:43:44Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VPN Redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AWS-VPN-Redundancy/m-p/98022#M7612</link>
      <description>&lt;P&gt;If you're terminating with the AWS VPN endpoint (as opposed to a Check Point Gateway in AWS), then VTI (i.e. route-based VPNs) is generally the way to go here.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Oct 2020 16:18:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AWS-VPN-Redundancy/m-p/98022#M7612</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-10-01T16:18:42Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VPN Redundancy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AWS-VPN-Redundancy/m-p/98117#M7622</link>
      <description>&lt;P&gt;At the on-premise side you will always use the VIP that is assigned to the cluster, so at your end you already have a auto failover. At the AWS end they normally give you 2 IP's to build a tunnel against.&lt;/P&gt;
&lt;P&gt;If you look at &lt;A href="https://community.checkpoint.com/t5/General-Topics/Route-Based-VPN/m-p/34463" target="_self"&gt;this post&lt;/A&gt;, it contains a template and instructions for configuring the dual VPN to AWS.&lt;/P&gt;</description>
      <pubDate>Sat, 03 Oct 2020 07:24:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AWS-VPN-Redundancy/m-p/98117#M7622</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-10-03T07:24:19Z</dc:date>
    </item>
  </channel>
</rss>

