<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote Access with multiple external interfaces - topology download in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122371#M8373</link>
    <description>&lt;P&gt;Yes, please let us know what they say, Im very curious. Honestly, cant say I ever seen this issue in R80.40 version.&lt;/P&gt;</description>
    <pubDate>Mon, 28 Jun 2021 14:48:30 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2021-06-28T14:48:30Z</dc:date>
    <item>
      <title>Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122107#M8360</link>
      <description>&lt;P&gt;Yep, yet another post about Remote Access VPN with multiple external interfaces. &amp;nbsp;No, not ISP redundancy. &amp;nbsp;Yes, I did the Link Selection; &amp;nbsp;Yes, I did the checkbox in the Office Mode section; Yes, I read the VPN guide documentation; Yes, I did the SK digging, reading, Check Mates posts, and even put it in a VM test, R80.30 with JHF 236. &amp;nbsp;Yes, it actually works for *IPsec and NAT-T* packets.&lt;/P&gt;&lt;P&gt;However, the problem is port 443 for site update and topology download. &amp;nbsp;That part doesn't work. The client starts to connect, VPN debug gets all the way to Main Mode packet 4, but fails at the XAuth step. &amp;nbsp;Yes I have the user defined, in the right group, and when I set the gateway default route to face back to my client, it fully connects just fine.&lt;/P&gt;&lt;P&gt;Topology-wise, I have eth0 as my "internal network", eth1 is my regular default gateway out, and eth2 is my "other" external interface (without the default route). &amp;nbsp; I'm trying to connect to the 2nd external interface on eth2. The breakdown is when eth1 is default gateway. &amp;nbsp;The firewall is writing packets with source IP of eth2 (my connecting interface, which is the interface I chose in Link Selection "use this IP from the topology table". &amp;nbsp;I tried the GUIDBedit hacks, but that didn't work either.&amp;nbsp;&lt;/P&gt;&lt;P&gt;When the client makes TCP SYN connection to firewall at eth2 on port 443, the gateway replies out eth1 (with eth2's IP as source) back to the client with TCP SYN-ACK.&lt;/P&gt;&lt;P&gt;So I did a nasty stupid thing, and put in a Linux VM as a Test, made it a router back to my client (yep it's stupid, and yes I got martians, but I disabled the rp_filter on it, and yes it's asymmetric routing, but packets got back to my client, albeit very circular; i don't care, it worked). &amp;nbsp; Client now gets the TCP SYN-ACK, replies with TCP ACK, and topology gets downloaded, and client authenticates.&lt;/P&gt;&lt;P&gt;From that point onward, connections to the VPN domain are just IPsec NAT-T. &amp;nbsp;THIS part works correctly; the firewall gets inbound IPsec NAT-T connection on eth2, it responds on eth2 (the fw ctl zdebug is spooky, too; it's writing packets on eth2 to the next-hop MAC address that sent the packet originally; even tho the default gateway is eth1! nice trick!).&lt;/P&gt;&lt;P&gt;For site-to-site IPsec VPN, everything would work normally and correctly from the start; none of the above is a problem. &amp;nbsp;However, it's a problem for Remote Access VPN. &amp;nbsp;Without doing ISP redundancy (ick; this config is going to be applied later to an HA cluster), I can't see how this is going to work. &amp;nbsp;I tried the probing methods, too, and those didn't work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone ever gotten this to work? &amp;nbsp;The key here is the default gateway is NOT the interface on which connections would terminate. &amp;nbsp;Again, the issue is with port 443 topo/xauth, not IPsec.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 19:47:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122107#M8360</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2021-06-24T19:47:53Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122113#M8361</link>
      <description>&lt;P&gt;So is there a route back to your client on the gateway through eth2?&lt;BR /&gt;Or is it on the same subnet?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 20:16:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122113#M8361</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-06-24T20:16:10Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122117#M8362</link>
      <description>&lt;P&gt;No, not anymore, and it normally wouldn't be (the client reach the gateway through normal routing). &amp;nbsp;The gateway *could* reach the client back on eth2 (and it does for IPsec and NAT-T packets, by writing a packet with destination MAC address of the host that sent it). &amp;nbsp;Normally you'd think "well, silly-goose, that's your problem" (and normally I'd agree). &amp;nbsp;For a real-live gateway with multiple external interfaces (and no dynamic routing), one static default gateway (out eth1), the other external interface won't have a default route (because.... default, by definition). &amp;nbsp;This 2nd external interface is where VPN connections will terminate.&lt;/P&gt;&lt;P&gt;But again, it works for IPsec and NAT-T. The new packet on the wire is the MAC of the ingress next-hop that sent the frame (I even see this MAC address tracked in the zdebug with "-m VPN + all"; that's really clever!)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here, the host Hades is *my* local LAN router, not the Check Point firewall (eth2 just happens to be the same). &amp;nbsp;10.0.3.236 is my client. &amp;nbsp;10.233.31.80 is the firewall's eth2. &amp;nbsp; &amp;nbsp;Hades eth2 MAC addr ends in "b0:4b". &amp;nbsp;Hades is between my client and the firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[root@hades ~]# ifconfig eth2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;eth2: flags=4163&amp;lt;UP,BROADCAST,RUNNING,MULTICAST&amp;gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;mtu 1500&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;inet 10.233.31.30&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;netmask 255.255.255.0&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;broadcast 10.233.31.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;ether 00:0c:29:18:b0:4b&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;txqueuelen 1000&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;(Ethernet)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[root@hades ~]# tcpdump -nni eth2 host 10.0.3.236 -e&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;listening on eth2, link-type EN10MB (Ethernet), capture size 65535 bytes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;15:01:27.652944 00:0c:29:18:b0:4b &amp;gt; 00:0c:29:7a:76:63, ethertype IPv4 (0x0800), length 118: 10.0.3.236.54508 &amp;gt; 10.233.31.80.4500: UDP-encap: ESP(spi=0x1120e857,seq=0x31), length 76&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;15:01:27.677150 00:0c:29:7a:76:63 &amp;gt; 00:0c:29:18:b0:4b, ethertype IPv4 (0x0800), length 118: 10.233.31.80.4500 &amp;gt; 10.0.3.236.54508: UDP-encap: ESP(spi=0x59f1983d,seq=0x23), length 76&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When it came to topology and xauth... crickets (well, as far as "doing the right thing" is concerned): [this was earlier in the day, hence the time difference]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[det@hades ~]$ sudo tcpdump -nni eth2 host 10.0.3.236&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;listening on eth2, link-type EN10MB (Ethernet), capture size 65535 bytes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;10:46:08.183726 IP 10.0.3.236.49674 &amp;gt; 10.233.31.80.443: Flags [S], seq 3336228268, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 875756382 ecr 0,sackOK,eol], length 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;10:46:12.186856 IP 10.0.3.236.49674 &amp;gt; 10.233.31.80.443: Flags [S], seq 3336228268, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 875760382 ecr 0,sackOK,eol], length 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;10:46:12.957761 IP 10.0.3.236.49676 &amp;gt; 10.233.31.80.443: Flags [S], seq 2415593851, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 875761152 ecr 0,sackOK,eol], length 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;gt;&amp;gt;&amp;gt; here is where i noticed that NAT-T was actually working from the beginning:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;10:46:12.960337 IP 10.0.3.236.55873 &amp;gt; 10.233.31.80.4500: NONESP-encap: isakmp:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;10:46:12.977206 IP 10.233.31.80.4500 &amp;gt; 10.0.3.236.55873: NONESP-encap: isakmp:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; but more crickets for XAuth/topology:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;10:46:13.031651 IP 10.0.3.236.49676 &amp;gt; 10.233.31.80.443: Flags [S], seq 2415593851, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 875761223 ecr 0,sackOK,eol], length 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;10:46:13.066552 IP 10.0.3.236.49676 &amp;gt; 10.233.31.80.443: Flags [S], seq 2415593851, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 875761253 ecr 0,sackOK,eol], length 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;10:46:13.099089 IP 10.0.3.236.49676 &amp;gt; 10.233.31.80.443: Flags [S], seq 2415593851, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 875761283 ecr 0,sackOK,eol], length 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;10:46:13.128996 IP 10.0.3.236.49676 &amp;gt; 10.233.31.80.443: Flags [S], seq 2415593851, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 875761313 ecr 0,sackOK,eol], length 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;10:46:18.587032 IP 10.0.3.236.64964 &amp;gt; 10.233.31.80.4500: NONESP-encap: isakmp: child_sa&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;#67[IVR]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;10:46:18.588131 IP 10.233.31.80.4500 &amp;gt; 10.0.3.236.64964: NONESP-encap: isakmp:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;10:46:20.250705 IP 10.0.3.236.64964 &amp;gt; 10.233.31.80.4500: NONESP-encap: isakmp: phase 1 I ident&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;10:46:20.252367 IP 10.233.31.80.4500 &amp;gt; 10.0.3.236.64964: NONESP-encap: isakmp: phase 1 R ident&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;10:46:20.252995 IP 10.0.3.236.49674 &amp;gt; 10.233.31.80.443: Flags [S], seq 3336228268, win 65535, options [mss 1460,nop,wscale 5,nop,nop,TS val 875768383 ecr 0,sackOK,eol], length 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;10:46:20.259071 IP 10.0.3.236.64964 &amp;gt; 10.233.31.80.4500: NONESP-encap: isakmp: phase 1 I ident&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;10:46:20.306897 IP 10.233.31.80.4500 &amp;gt; 10.0.3.236.64964: NONESP-encap: isakmp: phase 1 R ident&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;(of course ISAKMP couldn't get far because xauth never completed...)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sooooo, das boog?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 20:35:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122117#M8362</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2021-06-24T20:35:39Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122118#M8363</link>
      <description>&lt;P&gt;Ok, now I get it.&amp;nbsp;&lt;BR /&gt;Might be a bug, might also be intended behavior.&lt;BR /&gt;Probably requires a TAC case to be sure.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 20:40:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122118#M8363</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-06-24T20:40:55Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122212#M8364</link>
      <description>&lt;P&gt;Aww boo &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I opened a case for it. &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I read through the "-m VPN + all" debug again and I see another section where, for NAT-T, it does the force-reroute of the packet out the Link Selection non-default interface (correctly). &amp;nbsp;However, there's nothing close to that for the port 443 packets. &amp;nbsp;I'm guessing those packets are handed off to the FW worker instance for authentication, etc. &amp;nbsp;I ran a kdebug of "-m fw" and see where it's choosing to write packets per the routing table (even though I have that option set to "reply from same interface").&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So..., case open, debug info sent along with it. Now I wait. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jun 2021 16:32:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122212#M8364</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2021-06-25T16:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122240#M8365</link>
      <description>&lt;P&gt;Ok, just an idea...what does it show if you run ip route get and then IP address you are want to check on the firewall itself?&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 01:35:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122240#M8365</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-06-26T01:35:04Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122336#M8366</link>
      <description>&lt;P&gt;Since which JHF did you start observing this issue? I'm pretty sure I hit the same issue trying to patch to 236 on clusters with multiple external interfaces, but didn't have enough time to dig into the traffic.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 08:44:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122336#M8366</guid>
      <dc:creator>MartinTzvetanov</dc:creator>
      <dc:date>2021-06-28T08:44:05Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122360#M8367</link>
      <description>&lt;P&gt;I see the addresses in the output (I presume this is what you mean):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;local 10.233.31.80 dev lo&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;src 10.233.31.80&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;cache &amp;lt;local&amp;gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;mtu 16436 advmss 16396 hoplimit 64&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;No that IP is not on the Loopback device; I believe the route entry here just means to accept and process connections to that address (and any others locally-connected).&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 13:29:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122360#M8367</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2021-06-28T13:29:41Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122362#M8368</link>
      <description>&lt;P&gt;I haven't tried this configuration on an earlier version. &amp;nbsp;I was on R80.30 JHF 228 and it didn't work; updated to R80.30 JHF 236 and still didn't work. &amp;nbsp;I have a TAC case open and I'm going to follow-up on that either this afternoon or tomorrow (time-permitting).&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 13:35:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122362#M8368</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2021-06-28T13:35:34Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122367#M8369</link>
      <description>&lt;P&gt;In my situation it was working with 191 and after patch to 228 or 236 it broke.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 14:24:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122367#M8369</guid>
      <dc:creator>MartinTzvetanov</dc:creator>
      <dc:date>2021-06-28T14:24:28Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122368#M8370</link>
      <description>&lt;P&gt;Oh wow, that's "exciting". &amp;nbsp;I only had "strong belief" from earlier versions (e.g.: R77.30, i mean) that it worked "correctly", even tho I never independently verified and monitored it. &amp;nbsp;I also knew it worked with ISP Redundancy enabled, but admittedly I never closely monitored the exact path. &amp;nbsp;Way-back-when in R75.40, I also had it working and tested failover/outages, but that also was with ISP Redundancy. &amp;nbsp;So for me, this specific configuration is wholly-untested, I admit. &amp;nbsp;Good to know that you had it working in JHF 191, too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to test it with R80.20 this week; it's on my short-list for the week now, so I'll find out in a few days when I fire up a VM.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 14:37:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122368#M8370</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2021-06-28T14:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122369#M8371</link>
      <description>&lt;P&gt;I don't have ISP redundancy, but have 2 ISPs and BGP routing and total 10 external interfaces.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 14:43:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122369#M8371</guid>
      <dc:creator>MartinTzvetanov</dc:creator>
      <dc:date>2021-06-28T14:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122370#M8372</link>
      <description>&lt;P&gt;Sounds similar to what I have here, except not 10 ext. interfaces. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &amp;nbsp;Only 2 here, but also no ISP redundancy involved. &amp;nbsp;I'll update the thread with what I find. &amp;nbsp;My TAC case is now "assigned" to someone, so I'm waiting on that person to review and write back.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 14:46:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122370#M8372</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2021-06-28T14:46:02Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122371#M8373</link>
      <description>&lt;P&gt;Yes, please let us know what they say, Im very curious. Honestly, cant say I ever seen this issue in R80.40 version.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 14:48:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122371#M8373</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-06-28T14:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122420#M8374</link>
      <description>&lt;P&gt;I got an R80.20 VM with JHF 183 [matching a customer's install right now]. &amp;nbsp;This version works as I initially described, which is "it doesn't work without asymmetric routing". &amp;nbsp;&lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt; &amp;nbsp; I'm going to step through JHF 187 next, then 190 after that to see if either of those work.&lt;/P&gt;&lt;P&gt;After that, I'll look into updating to R80.30 with the JHF 191 to see if it works there, to match what you said [Martin].&lt;/P&gt;&lt;P&gt;As for my TAC case, today was crickets (but I also was busy myself elsewhere and did't have a good opportunity to call in). &amp;nbsp;My "need" from TAC right now, tho, is to review the info and ask within about what is needed to make this capability work correctly (versus a phone call to re-state everything, which is annoying).&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jun 2021 01:55:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122420#M8374</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2021-06-29T01:55:07Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122437#M8375</link>
      <description>&lt;P&gt;My customer's scenario has been working since R75.x until R80.30 JHF 236. It's obvious that it's related to the topology and something else specific but now sure if I could have the opportunity to dig in it.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jun 2021 06:28:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122437#M8375</guid>
      <dc:creator>MartinTzvetanov</dc:creator>
      <dc:date>2021-06-29T06:28:27Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122509#M8376</link>
      <description>&lt;P&gt;Yeah R75-ish is when I last actively used this myself. &amp;nbsp;I just had an interesting effect as I was slowly adjusting the knobs. &amp;nbsp;I turned the gateway into "probing method" for everything (see screenshot). &amp;nbsp;In CLISH, I had the interfaces in their natural state (main address having the default route, not the Link Selection interface). &amp;nbsp;I connected the client [yeah still asymmetric routing here] to update topology. After that, the client immediately rolled over to Visitor Mode only (no IPsec, no NAT-T; just TCP 443 only), and the client changed its own configuration to be that of Main Address in the gateway properties! NOT one of the Link Selection external interfaces... whoa... wicked.&lt;/P&gt;&lt;P&gt;I then downed the "Main Address" interface [with the default route on it], but the client did not roll back over to the Link Selection interface. &amp;nbsp;It's stubbornly only connecting to the Main Address, completely ignoring Link Selection and probing. &amp;nbsp; So it still doesn't behave as it should. &amp;nbsp;&lt;/P&gt;&lt;P&gt;*For Me*, this is what I want; to be able to "move" the clients to a new Main Address without pushing out new client configurations. &amp;nbsp;Regardless, Link Selection still isn't working.&lt;/P&gt;&lt;P&gt;I'll keep poking before updating HFAs. &amp;nbsp;I want to get an idea of how this is behaving before changing conditions. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jun 2021 14:13:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122509#M8376</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2021-06-29T14:13:17Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122520#M8377</link>
      <description>&lt;P&gt;Well now.... here in R80.20 JHF 187/188 is the same broken behavior as JHF 183. &amp;nbsp;Jumbo 190 things changed slightly, but still not correct.&lt;/P&gt;&lt;P&gt;Now, when it's all probing method, the client does NAT-T to the gateway on the Main Address interface instead of Visitor Mode. &amp;nbsp;That much is slightly better. &amp;nbsp;Regardless, the client never rolls over to a Link Selection interface. &amp;nbsp;I even went through GUIDBedit a bit, as in&amp;nbsp;&lt;SPAN&gt;sk32229, but that didn't change anything. &amp;nbsp;TAC also came back with that same SK, but it doesn't seem to have any effect in any way.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Other than NAT-T instead of Visitor Mode, the remaining behavior is still the same broken behavior. &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'll try R80.20 JHF 202 (ongoing take) just for fun, but then I'll take it to R80.30 &amp;lt; JHF 191 to see how that goes.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jun 2021 18:04:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122520#M8377</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2021-06-29T18:04:05Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122531#M8378</link>
      <description>&lt;P&gt;Hello folks,&lt;/P&gt;
&lt;P&gt;I read this post and maybe I don‘t understand, but the described behaviour looks normal to me. Let me explain…&lt;/P&gt;
&lt;P&gt;If a client connects to your gateway to the IP address of eth2 the answering packet will be routed back via the default route or via a specific route for the client IP. If the default route is going through eth1 then this is normal behaviour.&amp;nbsp;&lt;BR /&gt;The solution for this is ISP redundancy, with this feature enabled an answer packet is routed back through the same incoming interface.&lt;/P&gt;
&lt;P&gt;That‘s my understanding. Now the VPN part…. You can follow link selection for VPN and define every available interface as destination and the choice of the route back and source IP needs to be configured. Normally these apply to remote access VPN.&lt;/P&gt;
&lt;P&gt;Sometimes you want to have different settings for site2site and remote access vpn. This can be enabled via GUIdbedit following&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_RemoteAccessVPN_AdminGuide/Topics-VPNRG/VPN-Routing-Remote-Access.htm?Highlight=ip_resolution_mechanism" target="_blank" rel="noopener"&gt;Link Selection for Remote Clients&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Set „&lt;CODE&gt;apply_resolving_mechanism_to_SR“&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;to false and wi&lt;/SPAN&gt;th the setting of „&lt;SPAN&gt;ip_resolution_mechanism“ you can define all your needed interfaces.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Don‘t forget to set&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options" style="font-family: inherit; -webkit-tap-highlight-color: transparent; -webkit-text-size-adjust: 100%;"&gt;„Support connectivity enhancement for&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options" style="font-family: inherit; -webkit-tap-highlight-color: transparent; -webkit-text-size-adjust: 100%;"&gt;gateways with multiple external interface“ in the office mode section.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jun 2021 19:56:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122531#M8378</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2021-06-29T19:56:58Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access with multiple external interfaces - topology download</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122532#M8379</link>
      <description>&lt;P&gt;The problem is that the gateway isn't responding to XAUTH and topology downloads on any interface except either A) the main address (such as when probing method is used, as I just found), or B) asymmetrically with combination of a Link Selection interface and the non-LS interface with default route. &amp;nbsp;NAT-T traffic is being emitted correctly on the Link Selection interface with disregard to the default route (and this is the expected and desired behavior; link-level re-writing of packets). &amp;nbsp;Instead, the gateway is writing packets out the default route interface, yet with the source IP of the chosen Link Selection interface. &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt; &amp;nbsp;That's worse; it fools you into thinking "it works" until you down the default-route interface (with the Main address). &amp;nbsp;Then it doesn't work at all, unless you have a floating static route active.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The correct behavior is that the gateway should only respond to the connection in and out of the chosen Link Selection interface and it shouldn't need ISP redundancy to do it (although ISP Redundancy does lean on probing and the cpisp_update script to override the default route). &amp;nbsp;This worked before R80; both Martin and I had it working.&amp;nbsp;&lt;/P&gt;&lt;P&gt;That SK appears to have no effect now, either. &amp;nbsp;I just went through it with several values in GUIDBedit and none of them made the client work as expected.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jun 2021 20:12:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-with-multiple-external-interfaces-topology/m-p/122532#M8379</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2021-06-29T20:12:48Z</dc:date>
    </item>
  </channel>
</rss>

