Can you please be more specific about exactly when the VPN tunnel drops relative to the timing of the reboot of the standby? In other words, does the tunnel stop working on the active as soon as the standby is dropped and loses link to the switch (less likely), or does the tunnel die at about the time the standby fetches the latest policy and attempts to rejoin the cluster (more likely)?
If the former, that would suggest some kind of network issue, perhaps with STP on the switch or possibly routing table re-convergence. If the latter, I know at one point that a gateway joining a cluster after a reboot would fetch the policy directly from the active member. There was also some extra logic added recently to a cluster policy installation so I'm wondering if the "policy sync" operation when the rebooted member attempts to join may be disrupting your VPN. Questions:
0) IKEv1 or IKEv2? Is this an interoperable VPN between Check Point and some other third-party device, or a homogenous VPN?
1) I assume that reinstalling the policy (a full install, not an accelerated one see sk169096) to the cluster when both members are working does not cause a VPN disruption?
2) Is the checkbox keep_IKE_SAs set under Global Properties...Advanced...Configure...VPN Advanced Properties...VPN IKE Properties? If not all IKE SAs will be cleared upon policy installation, and the early termination of these IKE SAs has been known to hang tunnels, especially in an interoperable scenario. However the IPSEC SAs should be maintained so existing tunnel connectivity should continue to work for up to 60 minutes.
3) Any logs about the VPN failing? Invalid SA? No response from peer? Invalid ID?
Gateway Performance Optimization R81.20 Course
now available at maxpowerfirewalls.com