Enhanced Link Selection

Overview of Enhanced Link Selection

Enhanced Link Selection improves interoperability by enabling the configuration of multiple external interfaces for VPN connections. This feature supports redundancy and Load Sharing without relying on Check Point's proprietary VPN Link Selection protocol (RDP). It enhances compatibility with third-party and cloud-based Site-to-Site (S2S) IPsec vendors, overcoming limitations of previous configurations.

Configuration Steps for Enhanced Link Selection

The steps are used to configure enhanced link selection with the use of standard tunnels within a Site to Site VPN Star of Meshed community. Specifically, this configuration is meant to set up and manage VPN connections between multiple Security Gateways to ensure secure communication and efficient traffic management across different network interfaces.

Best Practice - If a Security Gateway participates in several VPN Communities, then we recommend to configure the required interfaces for the Enhanced Link Selection.

You can configure the required interfaces in these ways (you can always override the current configuration):

Scenario

Recommended Configuration

In all VPN Communities, it is necessary to use the same interfaces on this Security Gateway.

Select the required interfaces in the Security Gateway object > IPsec VPN section > Enhanced Link Selection page > Interfaces section.

When you add this Security Gateway object in the VPN CommunityClosed A named collection of VPN domains, each protected by a VPN gateway. objects, the configured Security Gateway interfaces are selected automatically.

  1. In most of these VPN Communities, it is necessary to use the same interfaces on this Security Gateway.

  2. In some of these VPN Communities, it is necessary to use specific interfaces on this Security Gateway.

  1. Select the required interfaces in the Security Gateway object > IPsec VPN section > Enhanced Link Selection page > Interfaces section.

    When you add this Security Gateway object in the VPN Community objects, the configured Security Gateway interfaces are selected automatically.

  2. In the applicable VPN Community objects, in the Security Gateway object, override the default configuration to select the required interfaces.

In different VPN Communities is necessary to use different interfaces on this Security Gateway. In each VPN Community object, in the Security Gateway object, override the default configuration to select the required interfaces.

To configure Enhanced Link Selection within a Site to Site VPN Star or Meshed community, follow these steps in SmartConsole:

  1. Create a VPN Community.

    Create a Star VPN Community or a Meshed VPN Community object.

    See Getting Started with Site to Site VPN.

    Note - If you edit an existing VPN Community object, then on the Gateways page, in the Link Selection Mode, make sure to select Enhanced (Recommended).

  2. Add the required Security Gateways to the VPN Community.

    • In a Meshed VPN Community, on the Gateways page, add the required Security Gateways in the section Participating Gateways.

    • In a Star VPN Community, on the Gateways page, add the required Security Gateways in the sections Center Gateways and Satellite Gateways.

    By default, when you add a Security Gateway to a VPN Community, it uses the interfaces based on the Security Gateway object configuration.

  1. Configure Peer Gateways.

    Repeat the configuration process for other Security Gateways in this VPN Community.

  2. Verify Interface Availability.

    1. The Security Gateway uses Dead Peer Detection (DPD) to monitor the status of the interface.

    2. Ensure that DPD packets are being sent and received correctly to maintain the active status of the tunnel.

      The Enhanced Link Selection uses DPD through IKE messages for tunnel resolution, and all Gateway vendors support this feature. DPD also serves to maintain tunnel activity continuously. But this is not its primary purpose, as a permanent tunnel can always be activated for that function. You can monitor the IKE session, including DPD activity, with the "ikeview" tool.

  3. Handle Failover.

    1. Ensure the VPN connection can survive link failovers by automatically switching to backup tunnels.

      Monitor the external interfaces, preferably with the "fw monitor" tool. Alternatively, you can use "tcpdump" tool to identify the source of the ESP data during link failover.

      Note - There may be a brief downtime during the transition of the VPN tunnel to the Backup interface.

    2. Verify the failover functionality by monitoring DPD responses and IPsec tunnel renegotiation.

      Verify that during failover, there is no DPD response on the failed Active tunnel. A new tunnel (IKE session) should establish with the backup peer IP address.