<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SMB and ISP Redundancy in HA mode in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-and-ISP-Redundancy-in-HA-mode/m-p/176601#M8641</link>
    <description>&lt;P&gt;Thanks for the answer.&lt;/P&gt;&lt;P&gt;Well... following what I read I am true. For ISPR in HA mode:&lt;/P&gt;&lt;P&gt;- Checkbox related to Defaut route has to be checked (not cleared) for both ISP (because I want use this route as defaut route...);&lt;/P&gt;&lt;P&gt;- Assign priority 1 to ISP1 route (within the Internet connection tab);&lt;/P&gt;&lt;P&gt;- Assigne priority 2 to ISP2 route (within the Internet connection tab);&lt;/P&gt;&lt;P&gt;Let the probe and monitoring work.&lt;/P&gt;&lt;P&gt;Another question: with non-SMB devices ISPR has to use different probed host for each ISP (and are configured using dashboard). For SMB, do I also have to use different probed ip ?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Wed, 29 Mar 2023 14:13:41 GMT</pubDate>
    <dc:creator>BikeMan</dc:creator>
    <dc:date>2023-03-29T14:13:41Z</dc:date>
    <item>
      <title>SMB and ISP Redundancy in HA mode</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-and-ISP-Redundancy-in-HA-mode/m-p/176555#M8638</link>
      <description>&lt;P&gt;Hello allo,&lt;/P&gt;&lt;P&gt;I have a small question about ISPR on SMB (1500 running last os version) centrally managed.&lt;/P&gt;&lt;P&gt;SMB are working in cluster and working fine.&lt;/P&gt;&lt;P&gt;If I want to used ISPR I see in the relevant doc that it is required to uncheck box "Use as default route".&lt;/P&gt;&lt;P&gt;But If I want to use ISPR in HA mode, I think I have to keep this box checked for both ISP and set a different priority for each ISP.&lt;/P&gt;&lt;P&gt;I have tested by unchecking, but in this case I am losing the default route.&lt;/P&gt;&lt;P&gt;Is it the right way to configure ISPR in HA mode ?&lt;/P&gt;&lt;P&gt;And I guess in the NAT layer I have to use automatic NAT behind the cluster (as usual).&lt;/P&gt;&lt;P&gt;Sorry for asking, but I have no lab and test is currently not available...&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 11:39:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-and-ISP-Redundancy-in-HA-mode/m-p/176555#M8638</guid>
      <dc:creator>BikeMan</dc:creator>
      <dc:date>2023-03-29T11:39:42Z</dc:date>
    </item>
    <item>
      <title>Re: SMB and ISP Redundancy in HA mode</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-and-ISP-Redundancy-in-HA-mode/m-p/176564#M8640</link>
      <description>&lt;P&gt;Not true:&lt;/P&gt;
&lt;DIV class="page" title="Page 102"&gt;
&lt;DIV class="layoutArea"&gt;
&lt;DIV class="column"&gt;
&lt;P&gt;&lt;EM&gt;Clear the Route traffic through this connection by default &lt;/EM&gt;&lt;SPAN&gt;&lt;EM&gt;checkbox when you do not want this Internet connection used as a default route for this gateway. The connection is used by the device only if specific, usually service-based, routing rules are defined for it. This is commonly used when you have a connection that is used for dedicated traffic. When you clear this option, this connection does not participate in High Availability or Load Balancing.&lt;/EM&gt; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;So you should not uncheck box "Use as default route"!&lt;/P&gt;
&lt;DIV class="page" title="Page 102"&gt;
&lt;DIV class="layoutArea"&gt;
&lt;DIV class="column"&gt;
&lt;P&gt;&lt;EM&gt;If the gateway's global hide NAT is turned on in the Access Policy &amp;gt; NAT page, you can disable NAT&amp;nbsp; &lt;/EM&gt;&lt;SPAN&gt;&lt;EM&gt;settings for specified internet connections.&lt;/EM&gt; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;You can use Access Policy NAT setting.&lt;BR /&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 29 Mar 2023 12:02:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-and-ISP-Redundancy-in-HA-mode/m-p/176564#M8640</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-03-29T12:02:24Z</dc:date>
    </item>
    <item>
      <title>Re: SMB and ISP Redundancy in HA mode</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-and-ISP-Redundancy-in-HA-mode/m-p/176601#M8641</link>
      <description>&lt;P&gt;Thanks for the answer.&lt;/P&gt;&lt;P&gt;Well... following what I read I am true. For ISPR in HA mode:&lt;/P&gt;&lt;P&gt;- Checkbox related to Defaut route has to be checked (not cleared) for both ISP (because I want use this route as defaut route...);&lt;/P&gt;&lt;P&gt;- Assign priority 1 to ISP1 route (within the Internet connection tab);&lt;/P&gt;&lt;P&gt;- Assigne priority 2 to ISP2 route (within the Internet connection tab);&lt;/P&gt;&lt;P&gt;Let the probe and monitoring work.&lt;/P&gt;&lt;P&gt;Another question: with non-SMB devices ISPR has to use different probed host for each ISP (and are configured using dashboard). For SMB, do I also have to use different probed ip ?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 14:13:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-and-ISP-Redundancy-in-HA-mode/m-p/176601#M8641</guid>
      <dc:creator>BikeMan</dc:creator>
      <dc:date>2023-03-29T14:13:41Z</dc:date>
    </item>
    <item>
      <title>Re: SMB and ISP Redundancy in HA mode</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-and-ISP-Redundancy-in-HA-mode/m-p/176606#M8642</link>
      <description>&lt;P&gt;As every ISP would have a different IP this is always needed. With SMB R81.10.0x, most things work like with GAiA appliances...&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 14:21:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-and-ISP-Redundancy-in-HA-mode/m-p/176606#M8642</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-03-29T14:21:41Z</dc:date>
    </item>
    <item>
      <title>Re: SMB and ISP Redundancy in HA mode</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-and-ISP-Redundancy-in-HA-mode/m-p/176625#M8643</link>
      <description>&lt;P&gt;ok, thanks. Will try and coma back if fails.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 15:53:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-and-ISP-Redundancy-in-HA-mode/m-p/176625#M8643</guid>
      <dc:creator>BikeMan</dc:creator>
      <dc:date>2023-03-29T15:53:13Z</dc:date>
    </item>
    <item>
      <title>Re: SMB and ISP Redundancy in HA mode</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-and-ISP-Redundancy-in-HA-mode/m-p/179056#M8832</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Back about this topic.&lt;/P&gt;&lt;P&gt;The probing is configured with 2 different ip. But when ISP2 is probing (ping), it is NATted with primary ISP so ISP2 is always down...&lt;/P&gt;&lt;P&gt;NAT rule is the 0, so may be I have missed something, but what ???&lt;/P&gt;&lt;P&gt;Current running version: 81.10&lt;/P&gt;&lt;P&gt;Any idea ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 09:53:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-and-ISP-Redundancy-in-HA-mode/m-p/179056#M8832</guid>
      <dc:creator>BikeMan</dc:creator>
      <dc:date>2023-04-25T09:53:43Z</dc:date>
    </item>
    <item>
      <title>Re: SMB and ISP Redundancy in HA mode</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-and-ISP-Redundancy-in-HA-mode/m-p/179063#M8834</link>
      <description>&lt;P&gt;How do you expect it should be ? You selected Primary/Backup, so Primary is always used until probing Primary fails ! That is the nature of HA ISP Redundancy...&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 10:46:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-and-ISP-Redundancy-in-HA-mode/m-p/179063#M8834</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-04-25T10:46:45Z</dc:date>
    </item>
    <item>
      <title>Re: SMB and ISP Redundancy in HA mode</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-and-ISP-Redundancy-in-HA-mode/m-p/179065#M8835</link>
      <description>&lt;P&gt;Not at all.&lt;/P&gt;&lt;P&gt;Both ISP1 and ISP2 are using their own ip to probe a remote host. Both link are monitored in the same time.&lt;/P&gt;&lt;P&gt;Found my issue: ISP2 interface was not defined as External....&lt;/P&gt;&lt;P&gt;So now each ISP circuit is monitoring its circuit.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 11:08:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-and-ISP-Redundancy-in-HA-mode/m-p/179065#M8835</guid>
      <dc:creator>BikeMan</dc:creator>
      <dc:date>2023-04-25T11:08:35Z</dc:date>
    </item>
    <item>
      <title>Re: SMB and ISP Redundancy in HA mode</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-and-ISP-Redundancy-in-HA-mode/m-p/179078#M8836</link>
      <description>&lt;P&gt;Yes, you are correct - probing runs on both ISPs. Sorry for the wrong info...&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 12:00:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-and-ISP-Redundancy-in-HA-mode/m-p/179078#M8836</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-04-25T12:00:20Z</dc:date>
    </item>
  </channel>
</rss>

