<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Site2Site in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245053#M12350</link>
    <description>&lt;P&gt;Hi The Rock&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes it is!&lt;/P&gt;</description>
    <pubDate>Fri, 28 Mar 2025 07:25:38 GMT</pubDate>
    <dc:creator>Dido-Master</dc:creator>
    <dc:date>2025-03-28T07:25:38Z</dc:date>
    <item>
      <title>VPN Site2Site</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245024#M12347</link>
      <description>&lt;P&gt;Hello mates!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I got a situation!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cenario:&lt;/P&gt;&lt;P&gt;I have one vpn tunnel site2site configure and operational. I need to configure a redundant (second) vpn tunnel with exactly the same configuration except for the source and destination peer address. The problem is, every time the firewall try to establish the connection, it chooses always the first WAN interface as the source even if the source ip address selection is set to&amp;nbsp; "Automatically chosen according to outgoing interface". I only have one default route configured for the primary link.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What should i accomplish to resolve this problem?!&lt;/P&gt;&lt;P&gt;Hardware in use: Checkpoint Quantum Spark 1590&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 18:41:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245024#M12347</guid>
      <dc:creator>Dido-Master</dc:creator>
      <dc:date>2025-03-27T18:41:29Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site2Site</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245040#M12349</link>
      <description>&lt;P&gt;I assume its locally managed smb with 2 wan links?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 23:48:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245040#M12349</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-27T23:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site2Site</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245053#M12350</link>
      <description>&lt;P&gt;Hi The Rock&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes it is!&lt;/P&gt;</description>
      <pubDate>Fri, 28 Mar 2025 07:25:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245053#M12350</guid>
      <dc:creator>Dido-Master</dc:creator>
      <dc:date>2025-03-28T07:25:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site2Site</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245056#M12351</link>
      <description>&lt;P&gt;Not clear - does it mean even if the first ISP is down, it will not use the second WAN ? What about probing settings?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Mar 2025 08:41:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245056#M12351</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-03-28T08:41:29Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site2Site</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245057#M12352</link>
      <description>&lt;P&gt;Hi G_W&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First: I want to know if it is possible to establish both tunnel up and running according to the cenario i presented.&lt;/P&gt;&lt;P&gt;Secord: If the first condition is possible, how to solve it. Is it necessary to add a new default route for the second link?!&lt;/P&gt;</description>
      <pubDate>Fri, 28 Mar 2025 08:51:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245057#M12352</guid>
      <dc:creator>Dido-Master</dc:creator>
      <dc:date>2025-03-28T08:51:12Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site2Site</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245066#M12354</link>
      <description>&lt;P&gt;Can you send screenshots of how its configured, if possible? Just blur out sensitive data.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 28 Mar 2025 11:13:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245066#M12354</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-28T11:13:33Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site2Site</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245117#M12356</link>
      <description>&lt;P&gt;That's what Automatically Chosen According to Outgoing Interface will do: use the IP address associated with the interface that is used for the "next hop" to reach that address.&lt;BR /&gt;Unless you have a specific route configured for the remote encryption domain, the IP associate with your Default Route (i.e. via WAN1) will be used.&lt;BR /&gt;Or you configure ISP Redundancy.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Mar 2025 21:41:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245117#M12356</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-03-28T21:41:18Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site2Site</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245120#M12357</link>
      <description>&lt;P&gt;Hi PhoneBoy&lt;/P&gt;&lt;P&gt;You're saying that to make both tunnel up and operational i have to configure 2 specific static route instead of depending on the Default route?! 'Cause i already have a specific static route for the second link, but even so, isn't working!&lt;/P&gt;</description>
      <pubDate>Fri, 28 Mar 2025 21:52:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245120#M12357</guid>
      <dc:creator>Dido-Master</dc:creator>
      <dc:date>2025-03-28T21:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site2Site</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245122#M12358</link>
      <description>&lt;P&gt;Sounds like that to me.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 28 Mar 2025 22:02:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245122#M12358</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-28T22:02:16Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site2Site</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245125#M12359</link>
      <description>&lt;P&gt;I was explaining how the feature works.&lt;BR /&gt;Unfortunately, it cannot be used to achieve your goal which, as I understand it, is to create TWO connections to the same encryption domain using different source/destination IPs for both tunnels.&lt;/P&gt;
&lt;P&gt;This requires the use of MEP (Multiple Entry Point), among other things which are not currently supported on locally managed Quantum Spark appliances.&lt;BR /&gt;ISP Redundancy can be used to use different WAN IPs for a given VPN endpoint (requires multiple Internet connections).&lt;/P&gt;</description>
      <pubDate>Fri, 28 Mar 2025 22:25:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245125#M12359</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-03-28T22:25:07Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site2Site</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245141#M12360</link>
      <description>&lt;P&gt;Is the remote peer IP also different? The ip you use to setup the tunnel with?&lt;/P&gt;
&lt;P&gt;Otherwise you have overlap and it will not work.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Mar 2025 15:40:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245141#M12360</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-03-29T15:40:11Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site2Site</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245190#M12361</link>
      <description>&lt;P&gt;Hi Lesley&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes. the remote peer is also different on both tunnels.&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2025 15:09:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-Site2Site/m-p/245190#M12361</guid>
      <dc:creator>Dido-Master</dc:creator>
      <dc:date>2025-03-31T15:09:46Z</dc:date>
    </item>
  </channel>
</rss>

