<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site-to-Site BGP VPN to Azure on Check Point VSX (R81.20) – step-by-step guidance needed in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265954#M52393</link>
    <description>&lt;P&gt;Let me look for it, Im sure I have something.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 24 Dec 2025 00:35:38 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-12-24T00:35:38Z</dc:date>
    <item>
      <title>Site-to-Site BGP VPN to Azure on Check Point VSX (R81.20) – step-by-step guidance needed</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265938#M52386</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;I’m looking for help configuring a Site-to-Site IPsec VPN with BGP between an on-prem environment and an Azure VPN Gateway, using Check Point VSX running R81.20.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":small_blue_diamond:"&gt;🔹&lt;/span&gt; General scenario&lt;/P&gt;&lt;P&gt;Firewall: Check Point VSX – R81.20&lt;/P&gt;&lt;P&gt;Environment: two separate VSX deployments&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Primary site&lt;/LI&gt;&lt;LI&gt;Disaster Recovery site&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Azure side: Azure VPN Gateway with BGP enabled&lt;/P&gt;&lt;P&gt;VPN type: S2S IPsec + BGP&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":small_blue_diamond:"&gt;🔹&lt;/span&gt; VSX details&lt;/P&gt;&lt;P&gt;Each VSX hosts multiple Virtual Systems&lt;/P&gt;&lt;P&gt;The new VPN must be configured inside an existing VS context&lt;/P&gt;&lt;P&gt;In the same VS, there is already another working BGP S2S VPN&lt;/P&gt;&lt;P&gt;That existing BGP VPN was:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;originally created on a non-VSX firewall&lt;/LI&gt;&lt;LI&gt;later migrated via CLI, without a full SmartConsole-based configuration&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Therefore, I have no direct experience configuring a full BGP VPN natively inside VSX from scratch.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":small_blue_diamond:"&gt;🔹&lt;/span&gt; Objective&lt;/P&gt;&lt;P&gt;Create a new S2S BGP VPN to Azure&lt;/P&gt;&lt;P&gt;Configure it on both Primary and DR VSX sites&lt;/P&gt;&lt;P&gt;Ensure that all traffic prefers the Primary site&lt;/P&gt;&lt;P&gt;DR site must be used only in case of failure&lt;/P&gt;&lt;P&gt;I need guidance on:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Proper IPsec + BGP configuration on VSX&lt;/LI&gt;&lt;LI&gt;Route redistribution and traffic preference&lt;/LI&gt;&lt;LI&gt;Avoiding unwanted active/active routing&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":small_blue_diamond:"&gt;🔹&lt;/span&gt; Specific questions&lt;/P&gt;&lt;P&gt;I’m looking for a step-by-step guide covering:&lt;/P&gt;&lt;P&gt;IPsec S2S VPN configuration on VSX (SmartConsole and/or CLI)&lt;/P&gt;&lt;P&gt;BGP configuration inside a Virtual System:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;AS numbers&lt;/LI&gt;&lt;LI&gt;Correct interfaces (VTI / interface-based VPN)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Best practices for:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Route redistribution (static ↔ BGP)&lt;/LI&gt;&lt;LI&gt;Primary site preference (BGP metrics, AS-PATH, MED, Local Preference, etc.)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Proper handling of:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Dual tunnels (Primary + DR)&lt;/LI&gt;&lt;LI&gt;Clean failover without asymmetric routing&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Any VSX-specific limitations or considerations in R81.20&lt;/P&gt;&lt;P&gt;Any real-world examples, official documentation references, or design recommendations would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thank you in advance!&lt;/P&gt;</description>
      <pubDate>Tue, 23 Dec 2025 16:43:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265938#M52386</guid>
      <dc:creator>Tub92</dc:creator>
      <dc:date>2025-12-23T16:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site BGP VPN to Azure on Check Point VSX (R81.20) – step-by-step guidance needed</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265954#M52393</link>
      <description>&lt;P&gt;Let me look for it, Im sure I have something.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Dec 2025 00:35:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265954#M52393</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-24T00:35:38Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site BGP VPN to Azure on Check Point VSX (R81.20) – step-by-step guidance needed</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265955#M52394</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/137342"&gt;@Tub92&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See if this helps. Btw, I do have bunch of screenshots and doc for P81 BGP setup, but cant send it, as it has client confidential info (sorry), but happy to answer any questions you may have.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Route-based-VPN-tunnel-to-Azure/m-p/206179/emcs_t/S2h8ZW1haWx8dG9waWNfc3Vic2NyaXB0aW9ufExTTjlYV1FXMUlGQVNMfDIwNjE3OXxTVUJTQ1JJUFRJT05TfGhL#M38950" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Security-Gateways/Route-based-VPN-tunnel-to-Azure/m-p/206179/emcs_t/S2h8ZW1haWx8dG9waWNfc3Vic2NyaXB0aW9ufExTTjlYV1FXMUlGQVNMfDIwNjE3OXxTVUJTQ1JJUFRJT05TfGhL#M38950&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Dec 2025 01:28:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265955#M52394</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-24T01:28:45Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site BGP VPN to Azure on Check Point VSX (R81.20) – step-by-step guidance needed</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265961#M52395</link>
      <description>&lt;P&gt;Note the ask is for VSX which differs in configuring the VTI portion etc, for example:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/td-p/215791" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Security-Gateways/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/td-p/215791&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Dec 2025 08:37:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265961#M52395</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-12-24T08:37:52Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site BGP VPN to Azure on Check Point VSX (R81.20) – step-by-step guidance needed</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265965#M52396</link>
      <description>&lt;P class=""&gt;&lt;SPAN&gt;Thank you for your responses.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;I can confirm that I cannot follow the first configuration approach, as it needs to be performed within a VSX environment. I have reviewed the documentation related to the &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;vsx_provisioning_tool&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, but I still have a few concerns.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;On the management server, I have both VSX environments connected (production and DR). However, the VS IDs are different between the two environments. For this reason, I am hesitant to use the provisioning tool, as I am concerned it might apply unintended configurations to different VS instances.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is it possible to perform this configuration directly from the CLI on each individual gateway? This approach would allow me to be as precise and controlled as possible.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Dec 2025 09:28:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265965#M52396</guid>
      <dc:creator>Tub92</dc:creator>
      <dc:date>2025-12-24T09:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site BGP VPN to Azure on Check Point VSX (R81.20) – step-by-step guidance needed</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265973#M52402</link>
      <description>&lt;P&gt;The naming convention used in the example is likely throwing you off, refer to the admin guide e.g.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_CLI_ReferenceGuide/Topics-CLIG/VSXG/vsx_provisioning_tool-Adding-VPN-Tunnel-Interface-to-Virtual-Device.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_CLI_ReferenceGuide/Topics-CLIG/VSXG/vsx_provisioning_tool-Adding-VPN-Tunnel-Interface-to-Virtual-Device.htm&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Dec 2025 12:56:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265973#M52402</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-12-24T12:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site BGP VPN to Azure on Check Point VSX (R81.20) – step-by-step guidance needed</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265976#M52405</link>
      <description>&lt;P&gt;Never really tried it from cli, but Im sure it is possible. You would just need to run add vpn tunnel commands.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Dec 2025 13:10:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265976#M52405</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-24T13:10:05Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site BGP VPN to Azure on Check Point VSX (R81.20) – step-by-step guidance needed</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265987#M52408</link>
      <description>&lt;P&gt;I also believe that it should be sufficient to run the &lt;STRONG&gt;add vpn tunnel&lt;/STRONG&gt; commands on each node and then save the configuration. I will try to proceed this way.&lt;/P&gt;&lt;P&gt;In your opinion, is it also necessary to &lt;STRONG&gt;retrieve the interfaces without topology from SmartConsole&lt;/STRONG&gt;, or is this not required in this scenario?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Dec 2025 18:04:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265987#M52408</guid>
      <dc:creator>Tub92</dc:creator>
      <dc:date>2025-12-24T18:04:14Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site BGP VPN to Azure on Check Point VSX (R81.20) – step-by-step guidance needed</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265988#M52409</link>
      <description>&lt;P&gt;Personally, I always do that. Its good practise, just to be 100% sure there are no issues/misconfigs.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Dec 2025 18:06:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265988#M52409</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-24T18:06:16Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site BGP VPN to Azure on Check Point VSX (R81.20) – step-by-step guidance needed</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265989#M52410</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/137342"&gt;@Tub92&lt;/a&gt;&amp;nbsp;Personally and again, this is just my own opinion, does not matter its something everyone should be doing, but I ALWAYS found best setting for topology is define network by routes option, as if network changes, its auto updated, just make sure you have correct routing and I also assign needed security zone as well.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Dec 2025 18:13:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265989#M52410</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-24T18:13:03Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site BGP VPN to Azure on Check Point VSX (R81.20) – step-by-step guidance needed</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265991#M52411</link>
      <description>&lt;P&gt;Example from my lab. For VTI, PLEASE make sure that interoperable object name matches with what you put in interface settings, otherwise, even if one letter is missed or its upper instead of lower case, it will never work. By default, anti spoofing is always disabled on those interfaces, which is totally fine.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32538i92BE6145DEEFF91E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Wed, 24 Dec 2025 18:23:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265991#M52411</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-24T18:23:14Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site BGP VPN to Azure on Check Point VSX (R81.20) – step-by-step guidance needed</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265999#M52412</link>
      <description>&lt;P&gt;I logged into one client's clustered master fw and below is what config for VTI would look like in clish. I also attached web UI config as well:&lt;/P&gt;
&lt;P&gt;show interface vpnt9&lt;BR /&gt;state on&lt;BR /&gt;mac-addr Not configured&lt;BR /&gt;type vpnt&lt;BR /&gt;link-state not available&lt;BR /&gt;mtu 1500&lt;BR /&gt;auto-negotiation off&lt;BR /&gt;speed N/A&lt;BR /&gt;ipv6-autoconfig Not configured&lt;BR /&gt;monitor-mode Not configured&lt;BR /&gt;duplex N/A&lt;BR /&gt;link-speed Not configured&lt;BR /&gt;comments onprem-sase trunnel&lt;BR /&gt;vpn-tunnel-id 9&lt;BR /&gt;vpn-peer Vancouver-pop-1&lt;BR /&gt;vpn-local-address 169.254.255.11&lt;BR /&gt;vpn-remote-address 169.254.255.9&lt;BR /&gt;ipv4-address Not Configured&lt;BR /&gt;ipv6-address Not Configured&lt;BR /&gt;ipv6-local-link-address Not Configured&lt;/P&gt;
&lt;P&gt;Statistics:&lt;BR /&gt;TX bytes:183 packets:3 errors:0 dropped:0 overruns:0 carrier:0&lt;BR /&gt;RX bytes:0 packets:0 errors:0 dropped:0 overruns:0 frame:0&lt;/P&gt;
&lt;P&gt;SD-WAN: Not Configured&lt;/P&gt;
&lt;P&gt;Here is the key. Say remote side (Azure) is 169.254.1.50&lt;/P&gt;
&lt;P&gt;one fw can be 169.254.1.51&lt;/P&gt;
&lt;P&gt;2nd 169.254.1.52 and VIP can be .53, as long as its NOT used on remote side, super important.&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32541i3849811FE029A82C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Dec 2025 19:21:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-BGP-VPN-to-Azure-on-Check-Point-VSX-R81-20-step-by/m-p/265999#M52412</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-24T19:21:18Z</dc:date>
    </item>
  </channel>
</rss>

