<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RA to a topology with 2xCP clusters in the same VPN domain in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/RA-to-a-topology-with-2xCP-clusters-in-the-same-VPN-domain/m-p/145370#M7004</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have the following situation. The customer has 2 Data centers with a pair of gateways in each forming 2 clusters (R80.30 JHF 237, one is kernel 2.16, the other 3.10) managed by the same CP management (also R80.30 but not sure the HF). Both clusters face Internet from different ISPs and has different VPN pools and receives the same security policy.&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 650px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15902iAAC83464DC6A5E26/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The customer's demand is their workers to use cluster1 as their RA cluster and cluster2 to be used for mobile access portal for their end clients' access.&amp;nbsp; Of course when one of the clusters fails all will use the healthy one and the infrastructure in both DCs must be accessible.&lt;/P&gt;&lt;P&gt;Right now we are testing the following: vpn client is connecting to cluster2 but in the Smart Monitor we see connected to cluster2's IP, received an IP from the&amp;nbsp;&amp;nbsp;cluster2's pool, but in Gateway&amp;nbsp; -&amp;nbsp;cluster1. Using vpn tu in cli we see the customer's IP (from cluster2's pool) in both clusters. When doing test traffic we see it entering in cluster1 (doesn't matter the client is connected to cluster2), reaching the destination device, but trying to exit via&amp;nbsp;cluster2 and of course it's dropped because of an asymmetric route.&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the infrastructure there is no dynamic routing. Right now there are configured static routes for the cluster1's and&amp;nbsp;cluster2's pools to point to the respected device.&lt;/P&gt;&lt;P&gt;Cant' find any documentation explaining why the vpn connects to cluster2 but the traffic arrives at cluster1. MEP and Secondary connect are not configured.&lt;/P&gt;&lt;P&gt;Is this an expected behavior? Should we split the common policy in two for every cluster? We are aware of that if we change the static route in the internal infrastructure to point to only one of the clusters all will work but this is not the goal here.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
    <pubDate>Mon, 04 Apr 2022 13:25:05 GMT</pubDate>
    <dc:creator>MartinTzvetanov</dc:creator>
    <dc:date>2022-04-04T13:25:05Z</dc:date>
    <item>
      <title>RA to a topology with 2xCP clusters in the same VPN domain</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/RA-to-a-topology-with-2xCP-clusters-in-the-same-VPN-domain/m-p/145370#M7004</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have the following situation. The customer has 2 Data centers with a pair of gateways in each forming 2 clusters (R80.30 JHF 237, one is kernel 2.16, the other 3.10) managed by the same CP management (also R80.30 but not sure the HF). Both clusters face Internet from different ISPs and has different VPN pools and receives the same security policy.&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 650px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15902iAAC83464DC6A5E26/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The customer's demand is their workers to use cluster1 as their RA cluster and cluster2 to be used for mobile access portal for their end clients' access.&amp;nbsp; Of course when one of the clusters fails all will use the healthy one and the infrastructure in both DCs must be accessible.&lt;/P&gt;&lt;P&gt;Right now we are testing the following: vpn client is connecting to cluster2 but in the Smart Monitor we see connected to cluster2's IP, received an IP from the&amp;nbsp;&amp;nbsp;cluster2's pool, but in Gateway&amp;nbsp; -&amp;nbsp;cluster1. Using vpn tu in cli we see the customer's IP (from cluster2's pool) in both clusters. When doing test traffic we see it entering in cluster1 (doesn't matter the client is connected to cluster2), reaching the destination device, but trying to exit via&amp;nbsp;cluster2 and of course it's dropped because of an asymmetric route.&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the infrastructure there is no dynamic routing. Right now there are configured static routes for the cluster1's and&amp;nbsp;cluster2's pools to point to the respected device.&lt;/P&gt;&lt;P&gt;Cant' find any documentation explaining why the vpn connects to cluster2 but the traffic arrives at cluster1. MEP and Secondary connect are not configured.&lt;/P&gt;&lt;P&gt;Is this an expected behavior? Should we split the common policy in two for every cluster? We are aware of that if we change the static route in the internal infrastructure to point to only one of the clusters all will work but this is not the goal here.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2022 13:25:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/RA-to-a-topology-with-2xCP-clusters-in-the-same-VPN-domain/m-p/145370#M7004</guid>
      <dc:creator>MartinTzvetanov</dc:creator>
      <dc:date>2022-04-04T13:25:05Z</dc:date>
    </item>
    <item>
      <title>Re: RA to a topology with 2xCP clusters in the same VPN domain</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/RA-to-a-topology-with-2xCP-clusters-in-the-same-VPN-domain/m-p/145386#M7005</link>
      <description>&lt;P&gt;Is it possible backup gateway option is enabled in global properties under vpn advanced?&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2022 14:19:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/RA-to-a-topology-with-2xCP-clusters-in-the-same-VPN-domain/m-p/145386#M7005</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-04-04T14:19:05Z</dc:date>
    </item>
    <item>
      <title>Re: RA to a topology with 2xCP clusters in the same VPN domain</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/RA-to-a-topology-with-2xCP-clusters-in-the-same-VPN-domain/m-p/145410#M7006</link>
      <description>&lt;P&gt;Hey Martin,&lt;/P&gt;
&lt;P&gt;The behavior sounds like secondary connect.&amp;nbsp; Just want to clarify - you said MEP and SC are not configured - do you mean you left everything on defaults or did you specifically disable them, because there are a couple of steps to take if you want it disabled (edit&amp;nbsp;&lt;STRONG&gt;$FWDIR/conf/trac_client_1.ttm&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;and set the :default value of enable_secondary_connect to&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;false&lt;/STRONG&gt;&lt;SPAN&gt;.)&lt;/SPAN&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2022 16:03:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/RA-to-a-topology-with-2xCP-clusters-in-the-same-VPN-domain/m-p/145410#M7006</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2022-04-04T16:03:55Z</dc:date>
    </item>
    <item>
      <title>Re: RA to a topology with 2xCP clusters in the same VPN domain</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/RA-to-a-topology-with-2xCP-clusters-in-the-same-VPN-domain/m-p/145451#M7007</link>
      <description>&lt;P&gt;Everything is by default, nothing explicitly disabled editing this file&lt;/P&gt;</description>
      <pubDate>Tue, 05 Apr 2022 06:15:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/RA-to-a-topology-with-2xCP-clusters-in-the-same-VPN-domain/m-p/145451#M7007</guid>
      <dc:creator>MartinTzvetanov</dc:creator>
      <dc:date>2022-04-05T06:15:45Z</dc:date>
    </item>
    <item>
      <title>Re: RA to a topology with 2xCP clusters in the same VPN domain</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/RA-to-a-topology-with-2xCP-clusters-in-the-same-VPN-domain/m-p/145582#M7008</link>
      <description>&lt;P&gt;Following this SK&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk78180&amp;amp;partition=Advanced&amp;amp;product=Endpoint" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk78180&amp;amp;partition=Advanced&amp;amp;product=Endpoint&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I got the first symptom.&lt;/P&gt;&lt;P&gt;Following the SK the problem is solved.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2022 09:12:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/RA-to-a-topology-with-2xCP-clusters-in-the-same-VPN-domain/m-p/145582#M7008</guid>
      <dc:creator>MartinTzvetanov</dc:creator>
      <dc:date>2022-04-06T09:12:08Z</dc:date>
    </item>
  </channel>
</rss>

