<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to configure main and secondary VPN's from checkpointFW to one ASA in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-configure-main-and-secondary-VPN-s-from-checkpointFW-to/m-p/126314#M5497</link>
    <description>&lt;P&gt;Also to me more understandable, i want to do something like&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/security-vpn/216709-configure-failover-for-ipsec-site-to-sit.html" target="_self"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/security-vpn/216709-configure-failover-for-ipsec-site-to-sit.html&lt;/A&gt;&amp;nbsp; but with two Checkpoint and one Cisco ASA instead of two Cisco FTD and one Cisco ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards.&lt;/P&gt;</description>
    <pubDate>Wed, 11 Aug 2021 07:24:01 GMT</pubDate>
    <dc:creator>torrefacto</dc:creator>
    <dc:date>2021-08-11T07:24:01Z</dc:date>
    <item>
      <title>How to configure main and secondary VPN's from checkpointFW to one ASA</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-configure-main-and-secondary-VPN-s-from-checkpointFW-to/m-p/126278#M5494</link>
      <description>&lt;DIV class="lia-quilt-row lia-quilt-row-message-subject"&gt;&lt;DIV class="lia-quilt-column lia-quilt-column-24 lia-quilt-column-single lia-quilt-column-message-subject-content"&gt;&lt;DIV class="lia-quilt-column-alley lia-quilt-column-alley-single"&gt;&lt;DIV class="topic-subject-wrapper"&gt;&lt;DIV class="lia-message-subject lia-component-message-view-widget-subject"&gt;&lt;DIV class="MessageSubject"&gt;&lt;DIV class="lia-message-subject"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="lia-quilt-row lia-quilt-row-message-body"&gt;&lt;DIV class="lia-quilt-column lia-quilt-column-24 lia-quilt-column-single lia-quilt-column-message-body-content"&gt;&lt;DIV class="lia-quilt-column-alley lia-quilt-column-alley-single"&gt;&lt;DIV class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;&lt;DIV class="lia-message-body-content"&gt;&lt;P&gt;How to configure two different VPNs (one primary and one secondary) to the Cisco ASA of a partner company, each one from a different ISP?&lt;/P&gt;&lt;P&gt;The idea is to have the maximum possible redundancy in case of loss of an ISP, VPN downtime....etc... to be able to continue working.&lt;/P&gt;&lt;P&gt;How could I configure the checkpoints for this? is it necessary to change the routes? and the Nateo?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyway, I am opened to whatever topology alternative.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I attached my topology proposal&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 10 Aug 2021 18:27:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-configure-main-and-secondary-VPN-s-from-checkpointFW-to/m-p/126278#M5494</guid>
      <dc:creator>torrefacto</dc:creator>
      <dc:date>2021-08-10T18:27:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure main and secondary VPN's from checkpointFW to one ASA</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-configure-main-and-secondary-VPN-s-from-checkpointFW-to/m-p/126283#M5495</link>
      <description>&lt;P&gt;A couple of questions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;How are the 1570s managed in this case?&lt;/LI&gt;
&lt;LI&gt;The diagram seems to indicate the two ISP links are terminating on an external router off the WAN interface, is that correct?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Aug 2021 21:24:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-configure-main-and-secondary-VPN-s-from-checkpointFW-to/m-p/126283#M5495</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-10T21:24:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure main and secondary VPN's from checkpointFW to one ASA</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-configure-main-and-secondary-VPN-s-from-checkpointFW-to/m-p/126312#M5496</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;1 - They are master - Standby (ClusterXL)&lt;/P&gt;&lt;P&gt;2 - Yes, they are connected in level 3 switch the two ISP's routers. My Idea is (but i could be wrong) to have redundant VPN to the Cisco ASA in whatever situation. If the ISP1 router is down or the other one is down.&lt;/P&gt;&lt;P&gt;Kind regards.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 07:11:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-configure-main-and-secondary-VPN-s-from-checkpointFW-to/m-p/126312#M5496</guid>
      <dc:creator>torrefacto</dc:creator>
      <dc:date>2021-08-11T07:11:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure main and secondary VPN's from checkpointFW to one ASA</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-configure-main-and-secondary-VPN-s-from-checkpointFW-to/m-p/126314#M5497</link>
      <description>&lt;P&gt;Also to me more understandable, i want to do something like&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/security-vpn/216709-configure-failover-for-ipsec-site-to-sit.html" target="_self"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/security-vpn/216709-configure-failover-for-ipsec-site-to-sit.html&lt;/A&gt;&amp;nbsp; but with two Checkpoint and one Cisco ASA instead of two Cisco FTD and one Cisco ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 07:24:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-configure-main-and-secondary-VPN-s-from-checkpointFW-to/m-p/126314#M5497</guid>
      <dc:creator>torrefacto</dc:creator>
      <dc:date>2021-08-11T07:24:01Z</dc:date>
    </item>
  </channel>
</rss>

