<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSec tunnel setup with ISP Redundancy at SMB appliance in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSec-tunnel-setup-with-ISP-Redundancy-at-SMB-appliance/m-p/190003#M9370</link>
    <description>&lt;P&gt;If you have two wan interfaces which is tunneling to HO-site, you do not need to do any special configuration for tunnel failover. Because only one active default route with WAN link which has low priority will establish to HO-site. When current WAN link is failed, another&amp;nbsp;default route with WAN link which has high priority WAN link will be active and tunnel will go with it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(i'm just checkpoint SMB admin, not specialist)&lt;/P&gt;</description>
    <pubDate>Mon, 21 Aug 2023 15:31:17 GMT</pubDate>
    <dc:creator>CheckCheckM</dc:creator>
    <dc:date>2023-08-21T15:31:17Z</dc:date>
    <item>
      <title>IPSec tunnel setup with ISP Redundancy at SMB appliance</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSec-tunnel-setup-with-ISP-Redundancy-at-SMB-appliance/m-p/168639#M8094</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;Remote site, will have an appliance with one ISP. My sites has (two ISP at HA appliances), Target is to establish a VPN to the remote site using two ISP links from my side for redundancy.&lt;/P&gt;&lt;P&gt;if one isp fails from my site, automatically the tunnel will be established to the remote using another isp link.&lt;/P&gt;&lt;P&gt;i did not get any options exception from ha/loadbalancing connection type for remote site. Actually, i need to specify my site ISP links.&lt;/P&gt;&lt;P&gt;is there any options to setup? Thanks.&lt;/P&gt;</description>
      <pubDate>Sat, 21 Jan 2023 17:33:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSec-tunnel-setup-with-ISP-Redundancy-at-SMB-appliance/m-p/168639#M8094</guid>
      <dc:creator>CheckCheckM</dc:creator>
      <dc:date>2023-01-21T17:33:15Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel setup with ISP Redundancy at SMB appliance</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSec-tunnel-setup-with-ISP-Redundancy-at-SMB-appliance/m-p/168650#M8095</link>
      <description>&lt;P&gt;It doesn't create two tunnels (one with each ISP Link) but it will establish with whatever ISP is active.&lt;/P&gt;</description>
      <pubDate>Sun, 22 Jan 2023 04:12:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSec-tunnel-setup-with-ISP-Redundancy-at-SMB-appliance/m-p/168650#M8095</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-01-22T04:12:58Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel setup with ISP Redundancy at SMB appliance</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSec-tunnel-setup-with-ISP-Redundancy-at-SMB-appliance/m-p/168653#M8096</link>
      <description>&lt;P&gt;Hello&amp;nbsp; &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp; you mean two internet ports will not working simultaneously?&lt;/P&gt;&lt;P&gt;SMB appliance has two internet ports, so i'm planning to use these two ports as one for user internet access and another one for ipsec tunnel.&amp;nbsp; thanks.&lt;/P&gt;</description>
      <pubDate>Sun, 22 Jan 2023 05:40:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSec-tunnel-setup-with-ISP-Redundancy-at-SMB-appliance/m-p/168653#M8096</guid>
      <dc:creator>CheckCheckM</dc:creator>
      <dc:date>2023-01-22T05:40:47Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel setup with ISP Redundancy at SMB appliance</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSec-tunnel-setup-with-ISP-Redundancy-at-SMB-appliance/m-p/168656#M8097</link>
      <description>&lt;P&gt;As you have different routable IPs from the ISPs, i would do HA ISP redundancy using 2 VPNs:&lt;/P&gt;
&lt;P&gt;- ISP 1 with IP 1 is the default ISP for all traffic&lt;/P&gt;
&lt;P&gt;- IP 1 builds VPN tunnel 1 to remote site&lt;/P&gt;
&lt;P&gt;- ISP 2 with IP 2 is the HA ISP&lt;/P&gt;
&lt;P&gt;- IP 2 builds VPN tunnel 2 to remote site&lt;/P&gt;
&lt;P&gt;- only VPN 1 goes up !&lt;/P&gt;
&lt;P&gt;This is the working config, until connection monitoring finds that ISP 1 is down:&lt;/P&gt;
&lt;P&gt;- if ISP 1 goes down, VPN tunnel 1 goes down&lt;/P&gt;
&lt;P&gt;- ISP 2 goes active, and now VPN tunnel 2 comes up&lt;/P&gt;
&lt;P&gt;Routing works as both VPN tunnels can not be up together...&lt;/P&gt;</description>
      <pubDate>Sun, 22 Jan 2023 08:30:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSec-tunnel-setup-with-ISP-Redundancy-at-SMB-appliance/m-p/168656#M8097</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-01-22T08:30:01Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel setup with ISP Redundancy at SMB appliance</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSec-tunnel-setup-with-ISP-Redundancy-at-SMB-appliance/m-p/168775#M8105</link>
      <description>&lt;P&gt;Yes, you can load balance between the two connections.&lt;BR /&gt;The only way I can see possibly forcing all traffic to the second ISP would be to have explicit routes defined for the remote encryption domain to go through the second ISP's nexthop only.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jan 2023 16:35:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSec-tunnel-setup-with-ISP-Redundancy-at-SMB-appliance/m-p/168775#M8105</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-01-23T16:35:17Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel setup with ISP Redundancy at SMB appliance</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSec-tunnel-setup-with-ISP-Redundancy-at-SMB-appliance/m-p/189907#M9363</link>
      <description>&lt;P&gt;But in that case, how the line change from vpn1 to vpn2 automatically, if vpn1 is down? How can I configure it? On smartconsole or on webui of SMB?&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 22:48:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSec-tunnel-setup-with-ISP-Redundancy-at-SMB-appliance/m-p/189907#M9363</guid>
      <dc:creator>starmen2000</dc:creator>
      <dc:date>2023-08-18T22:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel setup with ISP Redundancy at SMB appliance</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSec-tunnel-setup-with-ISP-Redundancy-at-SMB-appliance/m-p/189916#M9364</link>
      <description>&lt;P&gt;is your vpn remote site is different? or same remote site with different source WAN links? scenario pls. SMB is limitation based on scenario as my experience.&lt;/P&gt;</description>
      <pubDate>Sat, 19 Aug 2023 13:38:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSec-tunnel-setup-with-ISP-Redundancy-at-SMB-appliance/m-p/189916#M9364</guid>
      <dc:creator>CheckCheckM</dc:creator>
      <dc:date>2023-08-19T13:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel setup with ISP Redundancy at SMB appliance</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSec-tunnel-setup-with-ISP-Redundancy-at-SMB-appliance/m-p/189948#M9366</link>
      <description>&lt;P&gt;It is wan site with 2 different wan interfaces. Both of interfaces are going to establish site to Site vpn with headquarter. If one wan interface goes down (vpn1 is down), traffic is going through vpn2 ( wan Interface 2).&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 00:42:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSec-tunnel-setup-with-ISP-Redundancy-at-SMB-appliance/m-p/189948#M9366</guid>
      <dc:creator>starmen2000</dc:creator>
      <dc:date>2023-08-21T00:42:42Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel setup with ISP Redundancy at SMB appliance</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSec-tunnel-setup-with-ISP-Redundancy-at-SMB-appliance/m-p/190003#M9370</link>
      <description>&lt;P&gt;If you have two wan interfaces which is tunneling to HO-site, you do not need to do any special configuration for tunnel failover. Because only one active default route with WAN link which has low priority will establish to HO-site. When current WAN link is failed, another&amp;nbsp;default route with WAN link which has high priority WAN link will be active and tunnel will go with it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(i'm just checkpoint SMB admin, not specialist)&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 15:31:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSec-tunnel-setup-with-ISP-Redundancy-at-SMB-appliance/m-p/190003#M9370</guid>
      <dc:creator>CheckCheckM</dc:creator>
      <dc:date>2023-08-21T15:31:17Z</dc:date>
    </item>
  </channel>
</rss>

