<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Secondary Management Server over VPN in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-Management-Server-over-VPN/m-p/34363#M88237</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If there is a possibility to use NAT for the 2 servers and forget the VPN, I would go that way, the point there is that the traffic is already encrypted.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 19 Feb 2019 10:16:38 GMT</pubDate>
    <dc:creator>Maarten_Sjouw</dc:creator>
    <dc:date>2019-02-19T10:16:38Z</dc:date>
    <item>
      <title>Secondary Management Server over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-Management-Server-over-VPN/m-p/34360#M88234</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a new secondary management server at a different site and have been asked to try and get it working over the VPN tunnels between sites.&amp;nbsp; The problem is that the primary mgmt in site 1 and secondary in site 2 do not communicate correctly over the VPN as its my understanding that the control connections between them hit the implied rules first so the traffic does not get encrypted (allow control connection is switched on the Primary).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Getting them working on&amp;nbsp;sk39740 did not work either and we ended up losing connectivity to the GWs are site 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any advice on whether the VPN option is&amp;nbsp;possible and would be welcome.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;J&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Feb 2019 08:40:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-Management-Server-over-VPN/m-p/34360#M88234</guid>
      <dc:creator>Jon_Dyke</dc:creator>
      <dc:date>2019-02-19T08:40:16Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary Management Server over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-Management-Server-over-VPN/m-p/34361#M88235</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When the tunnels are built on Check Point gateways managed by these management servers, this is correct. You cannot run management traffic over a tunnel that is managed by the same management server, think about it, when something fails on that tunnel, how will you be able to correct it?&lt;/P&gt;&lt;P&gt;For Management HA the ports used could be excluded from the Implied rules but the point is that 2 of these ports are also used in the communication between management and gateway.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ports are 18221, 18211 and 18192 and the latter 2 are also used between GW and management.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Feb 2019 09:23:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-Management-Server-over-VPN/m-p/34361#M88235</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-02-19T09:23:13Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary Management Server over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-Management-Server-over-VPN/m-p/34362#M88236</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Probably helps if I explain a bit more.&amp;nbsp; We have 3 sites with 2 GW's in each.&amp;nbsp; There is a mesh VPN between them.&amp;nbsp; Up to now we have had 1 mgmt server at 1 site but have now purchased a secondary mgmt server (to run in HA) for BCP purposes.&amp;nbsp; The secondary is there for BCP only - we would only ever use it if we lost the primary site and needed to push policy to Site2 and Site3 (our production and DR site).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understand its best practice to do this using&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;sk39740 - but was curious if this was achievable - it seems it would be very tricky if the same ports are used for mgmt and GW.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;We will take another look at&amp;nbsp;&lt;SPAN&gt;sk39740 - but to be honest this was not proving easy either but&amp;nbsp; we will persist with this&amp;nbsp; approach.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;J&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Feb 2019 09:55:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-Management-Server-over-VPN/m-p/34362#M88236</guid>
      <dc:creator>Jon_Dyke</dc:creator>
      <dc:date>2019-02-19T09:55:41Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary Management Server over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-Management-Server-over-VPN/m-p/34363#M88237</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If there is a possibility to use NAT for the 2 servers and forget the VPN, I would go that way, the point there is that the traffic is already encrypted.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Feb 2019 10:16:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-Management-Server-over-VPN/m-p/34363#M88237</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-02-19T10:16:38Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary Management Server over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-Management-Server-over-VPN/m-p/34364#M88238</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't want to go there.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/thread/6209-managing-a-gateway-over-vpn" target="_blank"&gt;https://community.checkpoint.com/thread/6209-managing-a-gateway-over-vpn&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jun 2019 09:20:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-Management-Server-over-VPN/m-p/34364#M88238</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-21T09:20:22Z</dc:date>
    </item>
  </channel>
</rss>

