- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi all,
We have a singular DNS name pointing at the public IP of our primary R81.20 Cluster. If this primary clusters' public IP is unavailable, the VPN client re-directs itself to a secondary DR cluster.
But if I understand it correctly, it seems like the secondary address is cached in the client meaning that, when the primary IP is reachable again, the client continues to connect to the secondary cluster gateway until such time as the VPN profile on the users' laptop is deleted and re-created.
Ideally, I would like to have a setup where the endpoint becomes somewhat invisible to the user. If the user connected to the secondary due to the unavailability of the primary, that it would revert back if the primary became availablke again, or if the secondary became unavailable.
Could I implement an active - active setup, where it became pot luck as to which gateway the user connected to ? Would "First to Respond" MEP mode be the way to go ?
Thanks in advance
In the "first to respond" case the client always try to connect to the last known GW, as it will be probed first. You need to configure primary / backup option in MEP settings.
See more details in the Multiple Entry Point (MEP) > Manual MEP admin guide section for RAS VPN
Sounds like thats more site to site VPN mep, if this is for remote access vpn clients, you need to follow below
Best,
Andy
Yes, I found that previously, and that was why I referenced the question of "First to Respond"
I'm looking for guidance on what is the best way to have RA configured in order that the Client profiles will never have to be deleted and re-created, and where either site can be connected to automatically without the need for a user to select between choosing the Primary or Secondary site
It also depends on whether its implicit method or not, meaning whether both gateways have overlapping enc. domains. I will tell you, couple of customers I did this for, we used implicit primary-backup, worked like a charm. Reason was also because they did NOT want their users to see list of gateways they can connect to, which definitely made sense to me. So, if one was to ever fail, people would be able to connect to the other one.
Best,
Andy
Does it sound correct that the Client caches the secondary ip accress in the event of a primary unavailability, and that when the primary returns, that connections continue to the secondary, and the only way that you can reconnect back to the primary is by recreating the profile pointing at the primary ip address
This appears to be the way that our is functioning. If this is so, what can I do to make it so that all always work
Correct. Put it this way...I know this may sound like a stupid comparisino, but its sort of like how you need a browser on windows to open web pages, this is the same philisophy (if you will), client will "fetch" the information from the gateway side, so whatever is configured there, client would have that cashed.
Best,
Andy
So is there any way to set it up where it won't cache (and we need two DNS entries (one for each gateway), or where it will go seamlessly between either at any point ?
You may want to confirm with TAC, but I believe those things can be manipulated in trac ttm file.
Andy
In the "first to respond" case the client always try to connect to the last known GW, as it will be probed first. You need to configure primary / backup option in MEP settings.
See more details in the Multiple Entry Point (MEP) > Manual MEP admin guide section for RAS VPN
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 3 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY