- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hello, I need to set up a VPN between Router 1 and Check Point 77.30 so that we can access Private Net 2 and Private Net 3 from Private Net 1.
Check Point has access to these networks.
As far as I understand, our only option for this is to set up a classic S2S (Domain-Based VPN).
The Route Based VPN option is out of the question, as 77.30 has limitations and this setting will not work on this version, otherwise we will have to disable CoreXL, which could lead to a denial of service.
Could you please tell me if I understand correctly that this way I can easily set up a VPN by adding the Private Net 2 and Private Net 3 subnets to the encryption domain on Check Point 77.30?
Yes, that is a very old, very not supported version, I don't remember about disabling CoreXL for VTIs back then (it's certainly not a limitation in current versions) but you definitely don't want to be doing that. For domain based VPN, yes the two private nets need to be in the encryption domain.
sk108958 and sk61701 mention that R77.30 and earlier require disabling CoreXL to use VTIs.
And, of course, I echo the sentiments to upgrade to a supported version.
R77.30 has been out of support since September 2019 😉
Time to scrap this firewall , sorry but this is to old. To worry about DoS should be lowest item on the list 😉
Put it this way. Yes, R77.30 is totally unsupported, but way domain-based VPN works with CP has not changed in long time. Mind you, before R80, there was a known thing with Cisco S2S VPN where supernet had to be disabled, since CP would try to send largest possible subnet, though say Cisco would have been expecting to receive /24.
So, as @emmap had correctly mentioned, just ensure right subnets are in corresponding VPN domains and you should be good.
If it fails, make sure to go to Guidbedit and search for valie ike_use_largest_possible_subnet and set it to false, if its set to true.
Hope that helps.
Good luck!
Not sure if these values even exist in guidbedit in R77.30, but you can check.
ike_enable_supernet
ike_p2_enable_supernet_from_R80.20
ike_use_largest_possible_subnets
Could you please tell me if it's possible to set it up so that I can build an L2TP tunnel to a checkpoint with IPSec encryption, i.e. configure Cisco as a client?
Typically the legacy application where we see this is the Windows L2TP client (or Android/iOS) connecting to a Check Point gateway.
As several other Mates have already pointed out, R77.30 has been out of support for many years. I honestly can’t think of any scenario today where it still makes sense to invest time and effort into this version.
So I’m genuinely curious:
Why do you specifically need a solution on R77.30?
From the community’s perspective, the natural first step would normally be to migrate to a supported release and then look at a technical solution on a current platform.
It would help a lot to understand the background or constraints that make R77.30 a requirement here. Once we know that, we can provide more targeted guidance.
Im sure it might be possible, but as everyone else had said, R77.30 is totally obsolete, so to me, it would be pointless to even entertain the idea.
The only reasonable way forward is to remove the obsolete Security Gateway and use a supported version.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 66 | |
| 19 | |
| 13 | |
| 12 | |
| 11 | |
| 10 | |
| 9 | |
| 7 | |
| 7 | |
| 7 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY