- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi All,
I have a scenario with two non-clustered gateways providing remote access VPN, managed by the same SMS and sharing an encryption domain, in different locations connected to same DC. The intention is to provide Remote Access to users if the Primary gateway goes down for whatever reason.
Typically I would use MEP to accomplish this, but in this instance it's not feasible (smaller pipe at DR, licensed to only cater for VIP users, certain subset of users must connect to DR always etc.). We also cannot use Secondary Connect for a couple of reasons and the end user is hard set on the ability to manually select Prod or DR gateway.
Due to end-users being distributed and not all centrally managed I want to avoid touching client config files where possible.
Based on my research the best way to accomplish this would be to:
1. Disable MEP
Set the following command to true in DBedit:
desktop_disable_mep
2. Disable Secondary Connect on both Prod and DR Gateways
edit $FWDIR/conf/trac_client_1.ttm and set the :default value of enable_secondary_connect to false.
3. Publish changes and push policy.
Would appreciate any feedback as to whether I am missing something simple, or just if anyone else has attempted the same?
Thanks,
Ruan
I've configured something similar twice, so your plan should work. If you're feeling brave you could also try to create 2 different ttm-files with different mep backup gateways, see here:
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
I strongly believe modifying .ttm file would be best option here, but not 100% positive of the settings needed. Maybe confirm with TAC to be 100% sure.
Thanks for the responses thus far.
I've done some further experimenting in my lab. I've enable Implicit Primary-Backup MEP and the behaviour was as follows:
All good thus far. Next step was to disable secondary connect in the trac_client_1.ttm file. Initially had a couple of issues due to bracket spacing (seems the parser is incredibly finicky, despite the vpn check_ttm command saying the file is OK). The following was observed:
This was unexpected, as MEP and Secondary Connect are two seperate things. I know Secondary Connect leverages MEP, but there is no dependency on Secondary Connect from MEP's side. I don't know if this is expected behaviour?
Next step was to disable MEP by setting desktop_disable_mep to true via GUIDBEdit (strange that SK suggests GUIDBEdit when this also lives in the GUI?). Observations:
So to summarise - to achieve most of my goal, based on my testing I only have to edit $FWDIR/conf/trac_client_1.ttm and set the :default value of enable_secondary_connect to false.
Unfortunately I will not be able to have the primary and secondary sites to be automatically created based on topology, as the only way this happens is with Secondary Connect enabled. Again, not sure if this is expected behaviour as it seems to me this should be done when MEP is enabled?
P.S. Testing was done on R81 Take 25
Hello
i had a similar lab (using R80.40),
For VPN reasons you have to include both Gateway in RemoteAccess community, i found that i couldnt connect to the GWs (web and ssh) from vpn clients, just until i removed one of the GWs from the community i could connect again.
i dont know if this is expected behaviour too
😕
Yes both gateways definitely needs to be in the RemoteAccess community. I've destroyed my lab, but don't recall having any issues. If I had to guess I'd say that perhaps your gateways were included in your encryption domain?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 12 | |
| 10 | |
| 9 | |
| 8 | |
| 6 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 1 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY