Legacy Link Selection

Best Practice - Starting in R82, use Enhanced Link Selection.

Overview of Legacy Link Selection

Link Selection is a method to define which interface is used for incoming and outgoing VPN traffic as well as the best possible path for the traffic.

With the Legacy Link Selection, the administrator can choose which IP addresses are used for VPN traffic on each Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources..

Configuration settings for Remote Access VPNClosed An encrypted tunnel between remote access clients (such as Endpoint Security VPN) and a Security Gateway. clients can be configured together or separately from the Site-to-Site configuration.

Configuring Legacy Link Selection

Note - When a local Security Gateway performs a successful IKE negotiation with a VPN peer Security Gateway, that VPN peer uses the local Security Gateway's IP address as the destination IP address for the next IPsec traffic and IKE negotiations that it initiates.

This does not apply if you selected "Using probing. Link redundancy mode".

Legacy Link Selection Examples

Link Selection can be used in many environments.

This section describes various scenarios and how the Legacy Link Selection should be configured in each scenario.

Distributing VPN Traffic Between VPN Peers

Depending on your configuration, there are many ways to distribute VPN traffic between the local Security Gateway and its VPN peers, between available VPN links on the local Security Gateway.

Service-Based Legacy Link Selection

For configuration steps, refer to sk56384 to configure the required settings in the Security Gateway object, and on the Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. in the $FWDIR/conf/vpn_service_based_routing.conf file.

Trusted Links

On Demand Links (ODL)

Legacy Link Selection and ISP Redundancy

ISP Redundancy enables reliable Internet connectivity by allowing a single or clustered Security Gateway to connect to the Internet via redundant ISP connections.

ISP Redundancy offers two modes of operation:

  • Load Sharing mode

  • Primary/Backup mode

Legacy Link Selection with non-Check Point Devices