<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote Access VPN with Seven Links in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/275237#M14445</link>
    <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;We're seeing the same issue and have already identified the root cause: asymmetric routing.&lt;/P&gt;&lt;P&gt;During the Remote Access connection process, the SYN packet comes in through the VPN interface, while the SYN-ACK is routed out via the default internet interface.&lt;/P&gt;&lt;P&gt;We are currently working with support, but haven't been able to resolve it yet.&lt;/P&gt;&lt;P&gt;Applying sk32229 does not address this issue.&lt;/P&gt;&lt;P&gt;If anyone manages to resolve it, please update this case.&lt;/P&gt;&lt;P&gt;Good luck.&lt;/P&gt;</description>
    <pubDate>Fri, 10 Apr 2026 01:53:48 GMT</pubDate>
    <dc:creator>Rodrigo_Silva</dc:creator>
    <dc:date>2026-04-10T01:53:48Z</dc:date>
    <item>
      <title>Remote Access VPN with Seven Links</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/274959#M14439</link>
      <description>&lt;P&gt;HI Mr,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My customer has this topology :&lt;/P&gt;
&lt;P&gt;Smartconsole 700s running R82&lt;/P&gt;
&lt;P&gt;Two Sgw 9100 on clusterXL HA deployment running R81.20.&lt;/P&gt;
&lt;P&gt;Well, he has 7 Wan with private IP links behind broadband Routers (those routers configured with pppoe session with ISP)&lt;/P&gt;
&lt;P&gt;The first two Wan are used for navigation and publishing some internet services vecises such website and mailing.&lt;/P&gt;
&lt;P&gt;I have deactivated mobile access blade due to conflict port 443 on some devices such ISP broadband router which have closed firmware.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have configured link selection in smart console and also in GuiDBTool, but still facing some issues and instability, when I saw whireshark, PC witch E88 client shows That it is connected to sgw and move on to look for another attempt with private sgw main ip address..&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With capsule android, I have no problem except when I change the sgw IP address it doesn't want to get up the tunnel.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is the any solution to meet the requirements for the customer to share the seven Wans among all vpn users?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 14:19:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/274959#M14439</guid>
      <dc:creator>mohammed1987</dc:creator>
      <dc:date>2026-04-07T14:19:25Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN with Seven Links</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/274995#M14440</link>
      <description>&lt;P&gt;Since you responded to a very old thread, I decided to create a new thread for your question.&lt;BR /&gt;I also removed your attachment as it's not clear how it relates to the problem you've described and it appears to contain potentially sensitive information.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"PC witch E88 client shows That it is connected to sgw and move on to look for another attempt with private sgw main ip address." how precisely are you doing this?&lt;BR /&gt;Also what precise version of client?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;"W&lt;SPAN&gt;hen I change the sgw IP address" what precisely are you doing here?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Not sure you can "load balance" remote access over multiple WANs as it has to terminate on the gateway itself.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 14:30:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/274995#M14440</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-04-07T14:30:54Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN with Seven Links</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/275059#M14443</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Well I'm running E88.30 build 986105506.&lt;/P&gt;&lt;P&gt;On the client site, the server name filled is MyIP:18544 - - let say 196.195.194.193:18443&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sgw 9100 in clusterXL HA configuration with R81.20&lt;/P&gt;&lt;P&gt;Smart1 700s with R82&lt;/P&gt;&lt;P&gt;On smartconsole :&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ipsec VPN blade is activated&amp;nbsp;&lt;/P&gt;&lt;P&gt;Visitor mode listening on 18443.&lt;/P&gt;&lt;P&gt;I have configured link Selection for remote access only as mentioned on R82 remote access vpn administration guide, with probing loadsharing&lt;/P&gt;&lt;P&gt;When I activate the VPN client and doing some wireshark capture I see That the client re initiate tunnel to sgw with its main IP address which is internal&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it is clear&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 09:00:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/275059#M14443</guid>
      <dc:creator>mohammed1987</dc:creator>
      <dc:date>2026-04-08T09:00:24Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN with Seven Links</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/275114#M14444</link>
      <description>&lt;P&gt;Sounds like you didn't follow all the steps in:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk32229" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk32229&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;You may need to delete and re-add the site after applying these changes.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 15:09:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/275114#M14444</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-04-08T15:09:59Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN with Seven Links</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/275237#M14445</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;We're seeing the same issue and have already identified the root cause: asymmetric routing.&lt;/P&gt;&lt;P&gt;During the Remote Access connection process, the SYN packet comes in through the VPN interface, while the SYN-ACK is routed out via the default internet interface.&lt;/P&gt;&lt;P&gt;We are currently working with support, but haven't been able to resolve it yet.&lt;/P&gt;&lt;P&gt;Applying sk32229 does not address this issue.&lt;/P&gt;&lt;P&gt;If anyone manages to resolve it, please update this case.&lt;/P&gt;&lt;P&gt;Good luck.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Apr 2026 01:53:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/275237#M14445</guid>
      <dc:creator>Rodrigo_Silva</dc:creator>
      <dc:date>2026-04-10T01:53:48Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN with Seven Links</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/275238#M14446</link>
      <description>&lt;P&gt;When the default route points to the Remote Access VPN interface, the connection works normally.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Apr 2026 01:58:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/275238#M14446</guid>
      <dc:creator>Rodrigo_Silva</dc:creator>
      <dc:date>2026-04-10T01:58:14Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN with Seven Links</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/275285#M14447</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I think this is the expected behavior. Traffic from gateway to the user public IP address will always use routing table to decide outgoing interface. So use default route interface for remote access vpn is mandatory. On this post someone created a script which automatically creates static routes for vpn clients using secondary internet connection, and every nigth the script deletes the routes.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-to-configure-VPN-Remote-Access-on-non-default-Internet-Link/m-p/81991" target="_blank"&gt;How to configure VPN Remote Access on non-default ... - Check Point CheckMates&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Apr 2026 14:44:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/275285#M14447</guid>
      <dc:creator>RS_Daniel</dc:creator>
      <dc:date>2026-04-10T14:44:10Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN with Seven Links</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/275311#M14448</link>
      <description>&lt;P&gt;Hi Mr,&lt;/P&gt;&lt;P&gt;as mentionned by silva, the&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk32229" rel="noopener noreferrer" target="_blank"&gt;sk32229&lt;/A&gt;&amp;nbsp;doesn't resolve the issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;let have a brief of what is installed on the customer side :&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Smart1 base 700S&lt;/P&gt;&lt;P&gt;- 2 quantum 9100 in clusterXL HA configuration Mode : LAN port 172.16.4.0/22 and the Main IP address 172.16.7.254. DMZ 10.100.0.254/24 web services, 7 WANs interfaces 10.10.x.254/24 x from 11 to 17, each WAN is behind broadband isp router with static IP public let say 1.1.x.254, with port forwarding configured for 500/4500/18443(Visitor mode)&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;P&gt;- Mobile access blade is deactivated due to conflict forwarding port 443 used by the SGW and broadband ISP routers which are running with isp proper firmware.&amp;nbsp;&lt;/P&gt;&lt;P&gt;- IPSec blade activated and configured with the first WAN&amp;nbsp; for VPN Site to Site connection&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Identity Awarness blade activated&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-&amp;nbsp;Selection for remote access only with this parameters (Configuring Link Selection for Remote Access Only conf Admin Guide ) withDatabase Tool (GuiDBEdit Tool) :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; apply_resolving_mechanism_to_SR = False&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ip_resolution_mechanism =&amp;nbsp;ongoingProb&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; interface_resolving_ha_primary_if : 10.10.11.254 / 1.1.11.254 ( i have tried both private and public) even in LAB environnement&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;use_interface_IP = False&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;available_VPN_IP_list :&amp;nbsp;( i have tried both private and public) even in LAB environnement&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.10.11.254 / 1.1.11.254&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.10.12.254 / 1.1.12.254&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.10.13.254 / 1.1.13.254&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;........................................&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;........................................&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.10.17.254 / 1.1.17.254&lt;/P&gt;&lt;P&gt;- On the windows machine for remote access CP VPN Client E88.3 and E89.10 (i have tried them both)&lt;/P&gt;&lt;P&gt;when i lunch wireshard and i start the capture :&amp;nbsp;&lt;/P&gt;&lt;P&gt;- client configured with one of the seven WAN IP, let say&amp;nbsp; 10.10.13.254 / 1.1.13.254 for the initial call, all is running good and i get access to resources granted.&amp;nbsp;&lt;/P&gt;&lt;P&gt;- on gaia portal, when i make the related interface down let say WAN3, i loose connectivity on the client side et the VPN client try de reconnect but what i see in wireshark capture, the VPN client try to connect de the main IP address 172.16.7.254 which is private, and the tunnel never come back up.&lt;/P&gt;&lt;P&gt;the customer has 500 remote users and need to load share VPN access to the SGW.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Apr 2026 22:21:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/275311#M14448</guid>
      <dc:creator>mohammed1987</dc:creator>
      <dc:date>2026-04-11T22:21:17Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN with Seven Links</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/275365#M14449</link>
      <description>&lt;P&gt;As I understand it, the "Load Sharing" only works on initial connection.&lt;BR /&gt;If an existing connection fails (e.g. because the WAN went down), you might have to reconnect.&lt;BR /&gt;However, I would confirm this with TAC.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 17:14:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/275365#M14449</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-04-13T17:14:06Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN with Seven Links</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/276000#M14466</link>
      <description>&lt;P&gt;The support team informed us that it is not possible to configure Remote Access VPN on a link that is not the default route.&lt;/P&gt;&lt;P&gt;They updated (after we opened the case) SK165777 to reflect this information.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;"Note:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;If you have multiple External interfaces, Remote Access VPN and Office Mode network must be routed to the interface with the Default route."&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;In any case, I have submitted an RFE requesting this functionality.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;If possible, please do the same. The more requests there are, the higher the chance that it will be considered.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 14:37:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-Seven-Links/m-p/276000#M14466</guid>
      <dc:creator>Rodrigo_Silva</dc:creator>
      <dc:date>2026-04-23T14:37:49Z</dc:date>
    </item>
  </channel>
</rss>

