<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dual site / Dual ISP redundant VPN in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Dual-site-Dual-ISP-redundant-VPN/m-p/65376#M2479</link>
    <description>will make this easier.&lt;BR /&gt;&lt;BR /&gt;You posted this in the SMB forum.&lt;BR /&gt;Are you using a 600/700/1200R/1400 for this or different appliances?&lt;BR /&gt;Are you having a pair of gateways for each ISP, one gateway for each ISP, or both gateways connected to both ISPs?&lt;BR /&gt;More details about the environment will definitely help us advise you accordingly.&lt;BR /&gt;&lt;BR /&gt;In general, client systems do not cope well with multiple default routes, which is implied by your diagram.&lt;BR /&gt;Clustering the gateways and configuring both ISPs on both gateways will probably be the best approach.</description>
    <pubDate>Sat, 19 Oct 2019 19:43:12 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2019-10-19T19:43:12Z</dc:date>
    <item>
      <title>Dual site / Dual ISP redundant VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Dual-site-Dual-ISP-redundant-VPN/m-p/65318#M2475</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm new to VPN setups and I need to setup a resilient VPN between ourselves and a 3rd party. We have 2 data centers each with their own ISP link, the 3rd party only has a single data center.&lt;/P&gt;&lt;P&gt;I want to make us of both of our ISPs in an active/active setup for resilience and maintenance windows.&lt;/P&gt;&lt;P&gt;What is the best way to achieve this?&lt;/P&gt;&lt;P&gt;What needs to be done to enable internal users make use of either of our ISP's? How do I deal with a failure of one of our ISP links, is an internal load balancer required that can monitor each link for failure.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VPN topology" style="width: 295px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/2770i8376AB78EFA176D5/image-size/large?v=v2&amp;amp;px=999" role="button" title="vpn.JPG" alt="VPN topology" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;VPN topology&lt;/span&gt;&lt;/span&gt;?&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2019 12:43:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Dual-site-Dual-ISP-redundant-VPN/m-p/65318#M2475</guid>
      <dc:creator>Striker</dc:creator>
      <dc:date>2019-10-18T12:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: Dual site / Dual ISP redundant VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Dual-site-Dual-ISP-redundant-VPN/m-p/65376#M2479</link>
      <description>will make this easier.&lt;BR /&gt;&lt;BR /&gt;You posted this in the SMB forum.&lt;BR /&gt;Are you using a 600/700/1200R/1400 for this or different appliances?&lt;BR /&gt;Are you having a pair of gateways for each ISP, one gateway for each ISP, or both gateways connected to both ISPs?&lt;BR /&gt;More details about the environment will definitely help us advise you accordingly.&lt;BR /&gt;&lt;BR /&gt;In general, client systems do not cope well with multiple default routes, which is implied by your diagram.&lt;BR /&gt;Clustering the gateways and configuring both ISPs on both gateways will probably be the best approach.</description>
      <pubDate>Sat, 19 Oct 2019 19:43:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Dual-site-Dual-ISP-redundant-VPN/m-p/65376#M2479</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-10-19T19:43:12Z</dc:date>
    </item>
  </channel>
</rss>

