<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Redundant VPN Tunnel in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13521#M317</link>
    <description>&lt;P&gt;No other idea.&lt;/P&gt;</description>
    <pubDate>Sun, 19 Mar 2023 09:26:13 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2023-03-19T09:26:13Z</dc:date>
    <item>
      <title>Redundant VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13515#M311</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;On Main site, will have an appliance with two internet connection (two ISP’s), with fixed IP. One Remote sites, (one internet connection with fixed IP), I need to establish a VPN to the main site.&lt;/P&gt;&lt;P&gt;Target is established to one of the ISP’s, if it fails, automatically the tunnel will be established to the other.&lt;/P&gt;&lt;P&gt;We only can do this, using VTI, correct? or is there any other option?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2018 00:54:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13515#M311</guid>
      <dc:creator>GabsOliv</dc:creator>
      <dc:date>2018-12-06T00:54:36Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13516#M312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually, in the VPN site configuration, you can set it to HA. You don't need VTIs. Works very well between 2 SMB appliances.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are all the sites Check Point appliances?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2018 02:22:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13516#M312</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2018-12-06T02:22:26Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13517#M313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;All the sites will be checkpoint SMB appliances, but without HA.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2018 09:06:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13517#M313</guid>
      <dc:creator>GabsOliv</dc:creator>
      <dc:date>2018-12-06T09:06:06Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13518#M314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG alt="Network diagram" class="image-1 jive-image j-img-centered j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/76241_example.png" style="display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2018 09:07:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13518#M314</guid>
      <dc:creator>GabsOliv</dc:creator>
      <dc:date>2018-12-06T09:07:14Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13519#M315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So you plan using ISP Load Sharing ? As you wrote, &lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;without&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;HA...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2018 11:37:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13519#M315</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-12-06T11:37:46Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13520#M316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;My plan is use ISP Load Sharing on the main site. Remote site's will connect to Main, using vpn. The S2S VPN will be established to Interface in ISP1. If ISP1 fails, need to establish S2S VPN to ISP2.&lt;/P&gt;&lt;P&gt;As far as i can see, the only way to do it is using VTI tunnels. Any other idea ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2018 11:42:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13520#M316</guid>
      <dc:creator>GabsOliv</dc:creator>
      <dc:date>2018-12-06T11:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13521#M317</link>
      <description>&lt;P&gt;No other idea.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Mar 2023 09:26:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13521#M317</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-03-19T09:26:13Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13522#M318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;If ISP1 fails, need to establish S2S VPN to ISP2"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;That is High Availability. You can use it domain based, no need to use VTIs. Here is what you have to do in the remote sites:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/76245_VPN-HA.PNG" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2018 13:04:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13522#M318</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2018-12-06T13:04:25Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13523#M319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pedro,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried this with the main Site being on Load Sharing?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I´m&amp;nbsp;wondering if this wont create confusion if the Tunnel is initiated from the Central Gateway.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2018 13:12:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13523#M319</guid>
      <dc:creator>Ricardo_Gros</dc:creator>
      <dc:date>2018-12-06T13:12:54Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13524#M320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;He can also use the Load Sharing option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or he can set the option "only remote site initiates the connection" when configuring the site in the Main Gateway.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2018 13:30:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13524#M320</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2018-12-06T13:30:50Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13525#M321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gabriel,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;From the design it seems you want to have 2 Permanent tunnels as redundancy and not have 1 tunnel establish on active Link.&amp;nbsp; I don´t think you can do this over ISP load sharing (but never tried) and the 2 option seems simpler.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For your design I think you need Route based VPN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2018 13:30:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13525#M321</guid>
      <dc:creator>Ricardo_Gros</dc:creator>
      <dc:date>2018-12-06T13:30:53Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13526#M322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had issues trying to use VTIs for redundancy. It works well on&amp;nbsp;NON-SMB appliances, but how do I set the route as monitored in the little ones?&lt;/P&gt;&lt;P&gt;When Tunnel goes down, the primary route&amp;nbsp;remains UP and we get no traffic.&lt;/P&gt;&lt;P&gt;Then I found out about the HA option, gave up on VTIs and had no more problems for SMB to SMB tunnels.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2018 16:52:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13526#M322</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2018-12-06T16:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13527#M323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;When we did this we used Dynamic routing, so the routes where not advertised if one of the links was down.&amp;nbsp;&lt;/P&gt;&lt;P&gt;At the time I did not find a way to have something like ping probing. However eventually if you route to the VTI interface directly (not the IP but the VTI ID can be selected) it removes the route? To be honest never tried this with static routes.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Dec 2018 08:00:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13527#M323</guid>
      <dc:creator>Ricardo_Gros</dc:creator>
      <dc:date>2018-12-07T08:00:53Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13528#M324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, the route&amp;nbsp;remains active no matter what happens. I guess only dynamic routing will work, as you said.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Dec 2018 16:15:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/13528#M324</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2018-12-07T16:15:59Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/175214#M8513</link>
      <description>&lt;P&gt;Correct, please refer known limitation:&amp;nbsp;&lt;SPAN&gt;SMB-2668&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 12:17:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Redundant-VPN-Tunnel/m-p/175214#M8513</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-03-17T12:17:30Z</dc:date>
    </item>
  </channel>
</rss>

