Hi community,
I have carried out a laboratory to test redundant VPNs over BGP, I share with you the topology of my environment and the configurations on the checkpoint side, I hope it helps you.
LAB.
![LAB_TOPLGY.png LAB_TOPLGY.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23224i1EB70BD687FDE47C/image-dimensions/520x356?v=v2)
ASN1 and ASN2 are the remote gateways with which I will set up the VPNs.
OBJECTIVE: The "HOST_LOCAL" connects with the "HOST_REMOTE" through a VPN over BGP with ASN1, if this VPN goes down, there will be a VPN over BGP with ASN2 to reach the "HOST_REMOTE" again, guaranteeing that connectivity is not lost between both hosts using VPNs.
Configuration at the checkpoint.
At the GAIA level, we create a VPN-tunnel interface, where we define the tunnel ID, in this case 1, and we will place the peering IPs that we have defined in the topology, in this case for ASN1 they are those highlighted in green (local 11.11 .11.22 and remote 11.11.11.20)
![VPNT1.png VPNT1.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23221i79B2452D2FC30BBA/image-size/medium?v=v2&px=400)
We repeat the same step for the VPN against ASN2, we will change the peering IPs, as shown in the topology the IPs to use would be the purple ones (local 20.20.20.22 and remote 20.20.20.23), we choose the ID = 2 for this VPN.
![VPNT2.png VPNT2.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23222i71A789C04A725C24/image-dimensions/365x270?v=v2)
Once the VPN-tunnel interfaces have been created, it would look like this.
![VPN_interf.png VPN_interf.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23223i0CFD11E4D0F6A7E4/image-dimensions/559x102?v=v2)
In the Advanced Routing > BGP > Change Global Settings option, configure your Router ID (in my case I assigned the IP of my external interface 3.3.3.254) and your AS number, which in my case I set 65000.
![ID_AS.png ID_AS.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23225i20BB1EFD71723365/image-size/medium?v=v2&px=400)
In the same section of Advanced Routing > BGP, we will add the BGP peers for both VPNS.
![Peer_BGP.png Peer_BGP.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23227i4090302748400BED/image-dimensions/505x111?v=v2)
In the BGP Peer, we must place the remote AS as well as the remote peer with which we create the VPN-tunnel interfaces. Don't forget that we must enable the eBGP Multihop option. We repeat the same for the ASN2 peer
![Peer_BGP_AS65100.png Peer_BGP_AS65100.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23228i9C402A64E300C60D/image-dimensions/430x188?v=v2)
![Peer_BGP_AS65100_1.png Peer_BGP_AS65100_1.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23229i07656BC67391CBD5/image-dimensions/429x177?v=v2)
We will allow all the networks that the remote peer with AS 65100 and 65200 publish to us in the "inbound route filters" option. I am setting the VPN with ASN1 (AS 65100) to be the primary one using the weights (green underline)
![inbound.png inbound.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23230i9A5743E41836B7CC/image-dimensions/566x205?v=v2)
In the "Route Redistribution" section I am publishing my network from eth1 to peers AS65100 and AS65200.
![distribuir.png distribuir.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23231iA779383DEE4777A9/image-dimensions/527x166?v=v2)
Once configured at the GAIA level, we configure at the SMC level.
We created the 2 domains for both VPNs without anything.
![Domain_asn1.png Domain_asn1.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23233iCCC58F187012B68C/image-size/medium?v=v2&px=400)
![Domain_asn2.png Domain_asn2.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23232i1CF7E18DD02243A9/image-size/medium?v=v2&px=400)
We create the "Interoperable Device" with the public IP of the other end, and with the respective domain that we just created. We follow the same sequence for ASN2.
![Peer_ASN1.png Peer_ASN1.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23235i4B7F35FD8B69AC07/image-size/medium?v=v2&px=400)
![Peer_ASN1_1.png Peer_ASN1_1.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23234i4D9A5EF01DB0C05F/image-size/medium?v=v2&px=400)
We create a star community with the following steps, repeat the same process for ASN2
![VPN1_1.png VPN1_1.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23242i9118C78C189FFF6A/image-dimensions/469x318?v=v2)
![VPN1_2.png VPN1_2.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23243i7F60B9C3109376CF/image-dimensions/445x376?v=v2)
![VPN1_3.png VPN1_3.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23244iC73AA524C0861DEE/image-size/medium?v=v2&px=400)
![VPN1_4.png VPN1_4.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23246i977E8FFB54D041F2/image-size/medium?v=v2&px=400)
In this case, I am not using nateo, but if you want to use it, do not enable that option.
![VPN1_5.png VPN1_5.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23245i1B4F2369EBD33699/image-size/medium?v=v2&px=400)
RULE.
![RULE.png RULE.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23247iE16959FFBF2811D0/image-dimensions/763x61?v=v2)
After the configurations on the checkpoint side and the configurations of the remote devices, the BGP neighborhood is established with both peers (ASN1 and ASN2), in this case I have configured that both ASN2 and ASN2 publish the HOST network. REMOTE towards the checkpoint.
![establecido_ASN1.png establecido_ASN1.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23248i2619AB603B4F049D/image-size/medium?v=v2&px=400)
![establecido_ASN2.png establecido_ASN2.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23249iAB0B21CB55D65DC2/image-size/medium?v=v2&px=400)
Networks received and published using BGP.
![Publicación de redes.png Publicación de redes.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23250iEA68BEFFDBC471BB/image-size/medium?v=v2&px=400)
![Redes_received.png Redes_received.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23251i3F5AEEC00ADB8464/image-size/medium?v=v2&px=400)
Routes at the checkpoint.
![show_route.png show_route.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23252i57247C877CECD465/image-dimensions/493x222?v=v2)
VPNs UP.
![UP_ASN1.png UP_ASN1.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23253i6874A846F9A8ABA7/image-size/medium?v=v2&px=400)
![UP_ASN2.png UP_ASN2.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23254i74020C0E7FEC2F4A/image-size/medium?v=v2&px=400)
Connectivity test through VPN_ASN1
![Test_ping_1.png Test_ping_1.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23255i5C1F68F056D40A55/image-size/medium?v=v2&px=400)
![Test_ping.png Test_ping.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23256i74B158BD89DEC8C6/image-dimensions/546x258?v=v2)
Failover test
In the simulated environment, I observed that during the failover 3 ping packets were lost, after which the connection was kept constant by the backup VPN that is with ASN2, the test was performed in reverse and 2 ICMP packets were obtained, and then The connection remained constant. As far as I can tell the setup is functional.
![failover_test_1.png failover_test_1.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23259iC0E7FFF52DFB0F78/image-dimensions/587x239?v=v2)
![failover_test_2.png failover_test_2.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23258i94E523ADDB8C496B/image-dimensions/554x245?v=v2)
![failover_test_3.png failover_test_3.png](https://community.checkpoint.com/t5/image/serverpage/image-id/23260iD02AABA1651F1A25/image-dimensions/445x307?v=v2)
Regards