- Products
- Learn
- Local User Groups
- Partners
- More
Call For Papers
Your Expertise, Our Stage
Ink Dragon: A Major Nation-State Campaign
March 11th @ 5pm CET / 12pm EDT
AI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
The Great Exposure Reset
AI Security Masters E4:
Introducing Cyata, Securing the Agentic AI Era
CheckMates Go:
CheckMates Fest
I'm wondering if anyone else has encountered this as it's an issue we've battled from day 1. Our main site has multiple ISPs without BGP, so each ISP has a unique public IP range. Any time we've had an event that caused an ISP failover we've had to completely destroy and reploy our wireguard connector. We've escalated to support and they don't seem to know why this happens.
I remember doing this in PoC and it turned out that server hosting the connector had to have public IP, so once you give it specific one, if there is an ISP failover, it wont work. We ended up giving it 0.0.0.0 and that fixed the issue.
Our connectors are setup as 0.0.0.0 and we are still having the issue. I'd love to move to IPSec, but the lack of support for overlapping subnets is a killer right now.
Yeah, with overlapping domains, I think it would be pointless to even use route based tunnel,with empty groups, as that probably would not solve the issue, regadless if VTIs are numbered or unnumbered, as thats more relevant wfor BGP.
We can't even try route based VPNs since despite asking multiple times have been unsuccessful in getting additional gateway licenses. I think enhanced network would fix our issues, but I can't get access to that either.
Yep, 100% that would fix the issue. I wish I could help you with licensing, but its totally different than regular fw evals. Im fairly familiar with route based tunnels, even built few through SASE itself, but licensing side sadly is not my forte, apologies.
From what I can read I'm not sure it will. We have a checkpoint firewall cluster at the main site with 5 ISP (we are an electric utility and in the middle of nowhere, so we have frequent ISP failures). Of course, without the licensing we can't test. I swear it's starting to feel like checkpoint doesn't actually want us as a customer.
Be free to message me directly and just give me a breakdown of the issue. We deal with awesome guy from SASE team, he is super smart and Im sure he would be able to give some insight.
I've put in a SASE RFE to add a quantum-like community "link selection" feature into the tunnel config. We have the same issue and we use IPSec. Whenever we know that we've had a link transition on the gateway side, we go into SASE and change that tunnel to the secondary link VIP.
From what I can tell that's really the only option. In my opinion for what we are paying overall that is absolutelyunacceptable. It's looking at this point our only option to look at alternatives. It's ashame because Harmony SASE has some really nice features, but those are worthless if you can't keep your on prem resources connected.
I am still waiting on TAM to respond, stand by.
Yep, i agree that it's totally unacceptable considering that on the quantum side, link selection, dead peer, isp redundancy is handled perfectly. Hopefully my RFE will be taken seriously.
I'm not counting on it. So far we've struggled to get our account team or support to understand why this is an issue. So far the answer we've gotten is "it's easy to setup a wireguard connnector". Sure, if you have a team on site 24/7/365. We are a 2 person shop, I don't have someone sitting and waiting for this to break so they build a new connector.
Well, after much back and forth it seems there is no good solution for this with Harmony SASE. I don't I've ever seen a product this limiting.
Please DM me with your support ticket details. What you are describing regarding not getting support or licensing to test alternatives makes no sense to me. Also, configuring the Connector with Endpoint = 0.0.0.0 should fix the issue you're describing, it's a known workaround.
I'll have to get that information tomorrow. Basically we've told that if the public ip the traffic originates from changes it will at minimum require a connector reboot. Which since most of our isp failures happen not during normal business hours requires me to drop what I'm doing and make a site visit. We can typically count on about an issue a month.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 4 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Thu 12 Mar 2026 @ 05:00 PM (CET)
AI Security Masters Session 5: Powering Prevention: The AI Driving Check Point’s ThreatCloudThu 12 Mar 2026 @ 05:00 PM (CET)
AI Security Masters Session 5: Powering Prevention: The AI Driving Check Point’s ThreatCloudTue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERTue 24 Mar 2026 @ 06:00 PM (COT)
San Pedro Sula: Spark Firewall y AI-Powered Security ManagementThu 26 Mar 2026 @ 06:00 PM (COT)
Tegucigalpa: Spark Firewall y AI-Powered Security ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY