- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Hi
On Main site, will have an appliance with two internet connection (two ISP’s), with fixed IP. One Remote sites, (one internet connection with fixed IP), I need to establish a VPN to the main site.
Target is established to one of the ISP’s, if it fails, automatically the tunnel will be established to the other.
We only can do this, using VTI, correct? or is there any other option?
Thanks
So you plan using ISP Load Sharing ? As you wrote, without HA...
Actually, in the VPN site configuration, you can set it to HA. You don't need VTIs. Works very well between 2 SMB appliances.
Are all the sites Check Point appliances?
Hi
All the sites will be checkpoint SMB appliances, but without HA.
So you plan using ISP Load Sharing ? As you wrote, without HA...
Hi
My plan is use ISP Load Sharing on the main site. Remote site's will connect to Main, using vpn. The S2S VPN will be established to Interface in ISP1. If ISP1 fails, need to establish S2S VPN to ISP2.
As far as i can see, the only way to do it is using VTI tunnels. Any other idea ?
No other idea.
"If ISP1 fails, need to establish S2S VPN to ISP2"
That is High Availability. You can use it domain based, no need to use VTIs. Here is what you have to do in the remote sites:
Hi Pedro,
Have you tried this with the main Site being on Load Sharing?
I´m wondering if this wont create confusion if the Tunnel is initiated from the Central Gateway.
He can also use the Load Sharing option.
Or he can set the option "only remote site initiates the connection" when configuring the site in the Main Gateway.

Hi Gabriel,
From the design it seems you want to have 2 Permanent tunnels as redundancy and not have 1 tunnel establish on active Link. I don´t think you can do this over ISP load sharing (but never tried) and the 2 option seems simpler.
For your design I think you need Route based VPN.
I had issues trying to use VTIs for redundancy. It works well on NON-SMB appliances, but how do I set the route as monitored in the little ones?
When Tunnel goes down, the primary route remains UP and we get no traffic.
Then I found out about the HA option, gave up on VTIs and had no more problems for SMB to SMB tunnels.
Hi,
When we did this we used Dynamic routing, so the routes where not advertised if one of the links was down.
At the time I did not find a way to have something like ping probing. However eventually if you route to the VTI interface directly (not the IP but the VTI ID can be selected) it removes the route? To be honest never tried this with static routes.
No, the route remains active no matter what happens. I guess only dynamic routing will work, as you said.
Correct, please refer known limitation: SMB-2668
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 |
Fri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeThu 04 Jun 2026 @ 07:00 PM (IDT)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - AmericaFri 12 Jun 2026 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 47: Continuous Threat Exposure ManagementThu 18 Jun 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point WAF - The Next Generation of AI powered protectionFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY