- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Dear Team,
Please find the below image.
Our requirement is to provide redundancy between MPLS and IPSec VPN.
Please suggest us any usecase so we can achive.
Thanks In Advanced
#Chinmaya Naik
We use OSPF for this exact design. A high-level implementation would be:
1. Have your firewalls advertise a default route and have the MPLS routers advertise your internal networks for each office, be sure to change the metric of the default route advertisement so that one firewall doesn't take the internet for both offices
2. configure a VPN between the firewalls, route-based or domain based, and either define routing for them or define their respective encryption domains
If the MPLS fails the default route from the local firewall will be the only route in the office so traffic will go to the firewall and hit your vpn config
If the internet fails over the default route from the MPLS will come through and all office traffic will take the MPLS until the internet is restored
Do you know this one here: sk56384: How To Create a Redundant, Service-based MPLS/Encrypted Link VPN ?
Thanks Günther W. Albrecht
Yes i already go through this SK 56384 .
So is this working on our scenario.
#Chinmaya Naik
When you have the possibility to have the MPLS routers to build a VPN over the internet to the other location, this would solve your problems. You would need to have a additional external IP on both FW's to be able to statically NAT those to the routers, only allow the routers access to each other and setup the external IP for the other router to route through the local FW to internet. This way both paths can be used and controlled by the router.
Take your drawing and extend the VPN through the 1400 's and attach directly to the routers. So let your routers build the VPN through the FW's and Internet. now you have the MPLS Path and the VPN path between the 2 routers, Routing will then need to be set that the MPLS is the better path and when that fails it will use the VPN path.
It will work if all necessary routes for all networks are available on MPLS routers.
I have one problem - i do just not see any question here...
I AM also facing same issue. according to SK 56384 it providing the load sharing and i just required high availability on MPLS (Clear Text) to IPSEC (Encrypted text). Please help me :).
We use OSPF for this exact design. A high-level implementation would be:
1. Have your firewalls advertise a default route and have the MPLS routers advertise your internal networks for each office, be sure to change the metric of the default route advertisement so that one firewall doesn't take the internet for both offices
2. configure a VPN between the firewalls, route-based or domain based, and either define routing for them or define their respective encryption domains
If the MPLS fails the default route from the local firewall will be the only route in the office so traffic will go to the firewall and hit your vpn config
If the internet fails over the default route from the MPLS will come through and all office traffic will take the MPLS until the internet is restored
Dear SAM,
Thanks For your reply. i understand you are using Dynamic routing and i am using static routing. Please help me to provide the OSPF configuration senior so i can configure the same. Thanks:)
I wont be able to supply config, you should reach out to a partner or checkpoint for help with an actual implementation if you are having problems so they could support any issues that arise
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
12 | |
12 | |
9 | |
7 | |
6 | |
6 | |
5 | |
5 | |
5 | |
5 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY