<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure vWAN integration on a 1550 appliance in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Azure-vWAN-integration-on-a-1550-appliance/m-p/161453#M7711</link>
    <description>&lt;P&gt;A TAC case at Checkpoint Support shows that only one VPN tunnel interface is supported on the SMB1500 gateway. Not the default redundant/dual tunnel supported by Azure vWAN.&lt;BR /&gt;The dual tunnel configuration will be supported by the SMB1500 gateway in the future, but no ETA is currently available for it.&lt;/P&gt;</description>
    <pubDate>Mon, 07 Nov 2022 14:54:26 GMT</pubDate>
    <dc:creator>--Jay--</dc:creator>
    <dc:date>2022-11-07T14:54:26Z</dc:date>
    <item>
      <title>Azure vWAN integration on a 1550 appliance</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Azure-vWAN-integration-on-a-1550-appliance/m-p/160554#M7653</link>
      <description>&lt;P&gt;hi All !&lt;BR /&gt;&lt;BR /&gt;Folling the logic in this guide ...&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk176249" target="_blank" rel="noopener"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk176249&lt;/A&gt;&lt;BR /&gt;I was able to succesfully create multiple Azure vWAN integrations on Checkpoint 3200 Appliance.&lt;BR /&gt;&lt;BR /&gt;Redundant tunnel interfaces , following the Azure vWAN setup, are created wthout issue in the 3200 in CLI, as detailed in the aforementioned guide.&lt;BR /&gt;&lt;STRONG&gt;add vpn tunnel 1 type numbered local 100.64.220.1 remote 10.250.0.12 peer vwan01&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;add vpn tunnel 2 type numbered local 100.64.220.1 remote 10.250.0.13 peer vwan02&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;The issue at hand&amp;nbsp; on a&amp;nbsp; Checkpoint 1550 Applicance, is with this redundant setup of vpn tunnel interfaces.&lt;BR /&gt;When creating the 2nd vpn tunnel interface , an error is yielded:&lt;BR /&gt;"Could not set interface ipv4-address: IP address is in the subnet of an existing network"&lt;BR /&gt;&lt;BR /&gt;Troubleshooting shows that the vpn tunnel interface already created (IP 100.64.220.1&amp;nbsp; in the example) is causing th error.&lt;BR /&gt;&lt;BR /&gt;Am I missing a prerequisite here?&lt;BR /&gt;A difference between 3200 and 1550 ?&lt;BR /&gt;A BGP condition missing?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2022 09:24:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Azure-vWAN-integration-on-a-1550-appliance/m-p/160554#M7653</guid>
      <dc:creator>--Jay--</dc:creator>
      <dc:date>2022-10-27T09:24:45Z</dc:date>
    </item>
    <item>
      <title>Re: Azure vWAN integration on a 1550 appliance</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Azure-vWAN-integration-on-a-1550-appliance/m-p/160599#M7654</link>
      <description>&lt;P&gt;Which firmware version is the 1500 deployed with?&lt;/P&gt;
&lt;P&gt;I would consult TAC further with&amp;nbsp;&lt;SPAN&gt;sk111840 as a reference.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2022 15:50:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Azure-vWAN-integration-on-a-1550-appliance/m-p/160599#M7654</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-10-27T15:50:53Z</dc:date>
    </item>
    <item>
      <title>Re: Azure vWAN integration on a 1550 appliance</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Azure-vWAN-integration-on-a-1550-appliance/m-p/160606#M7656</link>
      <description>&lt;P&gt;The 1550 "fw ver" command output...&lt;BR /&gt;"This is Check Point's 1550 Appliance R81.10.00 - Build 506"&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2022 17:04:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Azure-vWAN-integration-on-a-1550-appliance/m-p/160606#M7656</guid>
      <dc:creator>--Jay--</dc:creator>
      <dc:date>2022-10-27T17:04:16Z</dc:date>
    </item>
    <item>
      <title>Re: Azure vWAN integration on a 1550 appliance</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Azure-vWAN-integration-on-a-1550-appliance/m-p/161453#M7711</link>
      <description>&lt;P&gt;A TAC case at Checkpoint Support shows that only one VPN tunnel interface is supported on the SMB1500 gateway. Not the default redundant/dual tunnel supported by Azure vWAN.&lt;BR /&gt;The dual tunnel configuration will be supported by the SMB1500 gateway in the future, but no ETA is currently available for it.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Nov 2022 14:54:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Azure-vWAN-integration-on-a-1550-appliance/m-p/161453#M7711</guid>
      <dc:creator>--Jay--</dc:creator>
      <dc:date>2022-11-07T14:54:26Z</dc:date>
    </item>
  </channel>
</rss>

