- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
I have 5 public static IP.
1 IP attach cluster, 2 IP attach each member.
Remaining 2 IP, i would like to use it as IPsec to serve as primary and secondary.
Is it possible? Please advise
Might be able to use Gaia Policy-Based routing...(just a thought)
You can define x2 default routes for ISPA and ISPB, However you still need to define the cluster topology information correctly.
The Policy-Based routing table will also have to be manually defined for each connected network. (bit of a pain if you have a few).
As an example...(I have done this for a customer that wanted a DMZ routed out a specific ISP, so can't see why this would not work in the same manner)
Client A - 10.100.0.0/24 would always route out of ISPA
Client B - 10.200.0.0/24 would always route out of ISPB
regards
Dan
Yeah, this is one of the thing which i want to know, is there anywhere that i can attach these public ip.
Can you tell us what's your use case?
In other words: What are you trying to achieve by having two IPs from the same prefix and same ISP for IPSEC VPNs?
What i want to achieve is, in my environment i have separate entity company.
They are using the same Infra, but the network inside are separated, not communication with each other.
So for this, i would like to also separate the public ip that the user from external point to them.
For example,:
User from company A point to this public ip to access their company resources
User from company B point to a different public ip than company A to access their company resources.
I thought so too.
Just verifying whether is there alternative solution to these as the support is taking long time to assist on troubleshooting.
Might be able to use Gaia Policy-Based routing...(just a thought)
You can define x2 default routes for ISPA and ISPB, However you still need to define the cluster topology information correctly.
The Policy-Based routing table will also have to be manually defined for each connected network. (bit of a pain if you have a few).
As an example...(I have done this for a customer that wanted a DMZ routed out a specific ISP, so can't see why this would not work in the same manner)
Client A - 10.100.0.0/24 would always route out of ISPA
Client B - 10.200.0.0/24 would always route out of ISPB
regards
Dan
Thanks for the sharing.
Will explore on this.
I would have to agree with Phoneboy that if you are wanting to keep them isolated, you would need to utilize VSX. Beyond the issue of IPs/Isolation, how are you planning to authenticate the users (I am assuming remote access based on your "user" verbiage above)? With a single Gateway/cluster, you are not going to be able to use different authentication methods.
Are you planning to use the Mobile Access Blade (i.e. SSL VPN)? Or are you planning to use the Endpoint Client?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 77 | |
| 33 | |
| 14 | |
| 14 | |
| 14 | |
| 12 | |
| 11 | |
| 9 | |
| 8 | |
| 7 |
Tue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY