VPN Tunnels are secure links between Security Gateways. These Tunnels ensure secure connections between gateways of an organization and remote access clients.
When Tunnels are created and put to use, you can keep track of their normal function, so that possible malfunctions and connectivity problems can be accessed and solved as soon as possible.
To ensure this security level, SmartView Monitor constantly monitor and analyze the status of an organization's Tunnels to recognize malfunctions and connectivity problems. With the use of Tunnel views, you can generate fully detailed reports that include information about the Tunnels that fulfill the specific Tunnel views conditions. With this information you can monitor Tunnel status, the Community with which a Tunnel is associated, the gateways to which the Tunnel is connected, and so on. These are the Tunnel types:
Permanent tunnels are constantly monitored. Therefore, each VPN tunnel in the community can be set as a Permanent tunnel. A log, alert or user defined action can be issued when the VPN tunnel is down.
Permanent tunnels can only be established between Check Point gateways. The configuration of Permanent tunnels takes place on the community level and:
This table shows the possible Tunnel states and their significance to a Permanent or Regular Tunnel.
State |
Permanent Tunnel |
Regular Tunnel |
---|---|---|
Up |
The tunnel works and the data can flow with no problems. |
IDE SA (Phase 1) and IPSEC SA (Phase 2) exist with a peer gateway. |
Destroyed |
The tunnel is destroyed. |
The tunnel is destroyed. |
Up Phase1 |
Irrelevant |
Tunnel initialization is in process and Phase 1 is complete (that is, IKE SA exists with cookies), but there is no Phase 2. |
Down |
There is a tunnel failure. You cannot send and receive data to or from a remote peer. |
Irrelevant. |
Up Init |
The tunnel is initialized. |
Irrelevant. |
Gateway not Responding |
The gateway is not responding. |
The gateway is not responding. |