If the VPN peer is not a Check Point Security Gateway, the VPN may fail, or the third-party device may continue to encrypt traffic to a failed ISP link -> Well, which one is it, fail or work? What is that really based on??
-
Make sure the third-party VPN peer recognizes encrypted traffic from the secondary ISP link as coming from the Check Point
.
-
Change the configuration of ISP Redundancy to not use these Check Point technologies:
-
- Makes sure that uses another option.
-
The options , , and work only on Check Point Security Gateways and Clusters.
If used, the Security Gateway or Cluster Members use one link to connect to the third-party VPN peer.
The link with the highest prefix length and lowest metric is used.