Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
HighTech
Explorer

Checkpoint site to site VPN to Sonicwall (Sonicwall has two ISP links)

Hi Geeks!

Is it possible to have VPN redundancy between Checkpoint and 3rd party gateway having two WAN IPs. I have the following use case (Diagram attached):

  • Checkpoint cluster r81.40 with one ISP link
  • Sonicwall firewall with two ISP links
  • VPN domain based is already established between CP and Sonicwall WAN1 link
  • Sonicwall is configured for VPN redundancy through both WAN links

Is there a way to configure CP to use tunnel through WAN1 as primary and tunnel through WAN2 as secondary link for the VPN ?

Thanks in advance!

0 Kudos
9 Replies
the_rock
Legend
Legend

Thanks for the details explanation, makes it way easier to help @HighTech , fantastic job!

Now, here is my "reckoning" for the lack of a better term lol

So, logically, Im fairly sure you can do this, but you need to make sure link selection is configured properly. So, in your case, since CP has only 1 link, tunnels would always "terminate" on same external IP. Now, technically, since Sonicwall has 2 ISP links, you really would need to have 2 separate VPN tunnels. In that case, Im thinking link selection could look something like below...

Let me know if that makes sense. If not, we can do remote and go through it, if you are allowed to.

Andy

Screenshot_1.png

 

 

0 Kudos
the_rock
Legend
Legend

One other thing I thought of...see, on CP side, you can only really choose the IP of the interoperable object (in this case Sonicwall) by setting the right address in smart console for the object itself, NOT via link selection, thats more for Check Point fw (cluster). Having said that, thats why Im thinking having 2 tunnels would make most sense, to me anyway. But, lets see what other boys and girls have to say 🙂

Andy

0 Kudos
HighTech
Explorer

Hi @the_rock ,

Thanks for your feedback! I am thinking of having two tunnels too (add two gateways aka interoperable devices as sattelite gateways in the same community), it seems so logical. However, in case of the two peer IPs being UP, how will CP know what tunnel to use for the VPN traffic since both gateways have the same encryption domain ?

Thank you.

0 Kudos
the_rock
Legend
Legend

You are 100% right, agree...but, Im thinking it may make more sense to have say 2 separate vpn tunnels, but then one way to do it would be to either disable vpn rule for 2nd tunnel OR take out interoperable object out of 2nd vpn community, so only 1st one would be operational.

But then again, if 1st one fails, failover would not be automatic, as you would need to add interoperable object into 2nd community manually.

Anywho, lets see what others say, hopefully there is better way...

Andy

0 Kudos
HighTech
Explorer

So that means there is no way to have the failover automatic just like other firewalls.. (Cisco ASA, fortigate..)

0 Kudos
the_rock
Legend
Legend

Im not aware of an easy way myself, or any way for that matter, but maybe someone else is...lets see.

Andy

0 Kudos
the_rock
Legend
Legend

Personally, just to get an official statement, might be worth TAC case.

Andy

0 Kudos
Alex-
Leader Leader
Leader

Use Route-based VPN instead of Domain-based VPN for more control.

0 Kudos
the_rock
Legend
Legend

Not sure @Alex- that would change automatic failover scenario @HighTech wants to achieve.

Andy

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events