- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi, I have a scenario, my MDS and CMA is in Site A and CP Gateway is in Site B.
CP Gateway in B is perimeter firewall(cluster) and VPN is configured on this gateway to connect from site A to B.
A and B are connected over VPN(Internet). There are multiple VPNs from A to B using multiple ISPs.
Until and unless the VPN are up and running, I guess everything is fine.
However, if the primary VPNs fails, I wish the VPN 2 should be up without intervention.
As per my knowledge, to bring another tunnel up, CP gateway need the connectivity to CP-SMS(I guess for CRL check) which in the scenario wont be possible.
How can I achieve this and still able to manage teh CP-gateway in B using the mgmt server in Site A after the primary VPN fails. (I know installing a local SMS in site B is a solution, however thought to check if there is any other option available.
MGMT is MDS(80.10)
SG is R77.30
Regards,
Biju
Normally management traffic is excluded from being sent through the VPN precisely for this reason.
For more discussion on this topic, see the following two threads:
How is the gateway in site B is defined in the SMS?
It's defined as a gateway and installed as a perimeter firewall.
Regards,
Biju Nair
Sent from my iPhone
That much is clear, but what IP address is assigned to the cluster object?
Is it external IP that belongs to one of the ISPs in site B or is it a private IP from one of the site B ranges?
Is this cluster connected to multiple ISPs directly or are there perimeter routers with BGP handling ISP redundancy?
If each cluster member connected to one of the ISPs, are the external interfaces configured as non-clustered/monitored?
Or do you have both ISPs connected to each cluster member and have those configured for ISP redundancy?
Two vlan interfaces(external) are configured under a physical interface with two different public IPs on each cluster member and both are clustered with cluster IP.
Regards,
Biju Nair
Sent from my iPhone
Normally management traffic is excluded from being sent through the VPN precisely for this reason.
For more discussion on this topic, see the following two threads:
Please read the:
ISP Redundancy Script and Additional VPN Considerations in:
One more thing to consider is the IP assigned to the Cluster Object in its "General" properties:
If it is the IP that belongs to one of the ISPs and you do not have a BGP AS advertisements configured for that range, then the cluster cannot be reached by the SMS in case this ISP connection fails.
If you have it configured with RFC1918 IP, than theoretically, your VPN could be reestablished and you should be able to maintain the management capabilities.
Note that in this case, the route for this IP should be added to the gateway on SMS site pointing to your perimeter routers to be perceived as external.
This being said, as Dameon pointed out, management over VPN is not recommended.
I need to onboard site B security HA cluster VPN gateway which was earlier managed by local CMA to Site A MDS-CMA. VPN terminates on same device via public IP, management device access via another interface which private IP. Please advise, Vladimir Yakovlev
Not sure if I am getting a clear picture without desired state topology diagram.
That being said, if I understand it correctly:
1. Your Site B cluster was previously managed via private IP
2. It is now must be managed by the management server located at the same site via this private IP
3. You now are shifting management function to the site A MDS
4. There is a VPN present between Site A and Site B gateways or clusters
5. Both site's gateways or clusters will be managed by the same MDS and, possibly same CMA
The best approach, IMHO, will be to change the management IP of the HA cluster and its members in site B to its public VIP.
Note that this will necessitate the re-establishing SIC with the gateways.
So long as you Encryption Domain in Site B is properly defined and DOES NOT include cluster's public IP, the management traffic between CMA in Site A and the Cluster in Site B will not be going over the VPN, but will be secured by SIC.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
24 | |
15 | |
4 | |
3 | |
3 | |
3 | |
3 | |
3 | |
2 | |
2 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY