- Products
- Learn
- Local User Groups
- Partners
- More
The Great Exposure Reset
24 February 2026 @ 5pm CET / 11am EST
AI Security Masters E4:
Introducing Cyata - Securing the Agenic AI Era
AI Security Masters E3:
AI-Generated Malware
CheckMates Go:
CheckMates Fest
Hi There,
I'd like to setup checkpoint IPSEC VPN (Active/Standby) with 2 Cisco routers via 2 different links. Although these are Internal links, we've configured IPSEC for encryption and the interface addresses would be Internal.
I've attached the topology for better visualization.
Can we have IPSEC tunnel from CP to 2 different links? Please let me know.
Considering the original poster is asking about this for internal links, I don't think ISPR is the right answer here.
You'll probably need the Enhanced Link Selection features in R82 to do this properly.
https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_SitetoSiteVPN_AdminGuide/Content/T...
Hello,
What is your GW and Management version?
Thanks
Thanks for your reply. MDS is running in R82 and firewalls are in R81.20
Peer devices are Cisco routers configured on domain-based VPN using "match address <ACL>" under crypto-map.
You can implement this sk for your environment;
https://support.checkpoint.com/results/sk/sk184489
If you want to use domain based VPN, I can provide different method.
Thank you
I will take a screenshot of how one of our clients has this configured for link selection and share it.
Hi @the_rock
Many thanks for sharing the info. Can you please help to share the SK for domain-based VPN, so I don't miss any steps.😊
Not sure if there is an sk or not for domain based.
Hi @PhoneBoy
Need your help please.
In the meantime, maybe worth checking with TAC as well.
This is the closest one I could find.
https://support.checkpoint.com/results/sk/sk53980
Mind you, even sk @TurgutKaplanogl provided is probably relevant for domain based vpn tunnels, except you just need to modify vpn domains to proper ones, rather than empty group.
Considering the original poster is asking about this for internal links, I don't think ISPR is the right answer here.
You'll probably need the Enhanced Link Selection features in R82 to do this properly.
https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_SitetoSiteVPN_AdminGuide/Content/T...
Hi @PhoneBoy
Many thanks for sharing it.
Yup, they're MPLS/private links and we're using IPSEC (Domain-based) VPN for better security. CP would be having the Internal IP addresses.
I don't see any SK article and below are the high-level steps. Can you please let me know if I miss anything?
1. Navigate to FW object and add both the Internal IP address which are connected to the private links
2. Create a Star VPN community
Center Gateway: Check Point ClusterXL.
Satellite Gateways: Both Cisco routers (define as interoperable devices).
3. VPN routing:
In the VPN community, set VPN Routing to "To center, or through the center to other satellites."
4. Go to Enhanced Link selection and select the Interfaces
5. Configure VPN domain, security policy as needed.
Also, can you pls let me know if DPD is enabled by default
Verify Interface Availability.
The Security Gateway uses Dead Peer Detection (DPD) to monitor the status of the interface.
Ensure that DPD packets are being sent and received correctly to maintain the active status of the tunnel
At a high level, that looks correct.
For new installs, DPD should be enabled by default: https://support.checkpoint.com/results/sk/sk108600
Those steps look logical. I will say, sometimes, I end up putting interoperable object as center gateways if things dont work. Not often, but something to keep in mind.
Hi @PhoneBoy
Thanks for your help. May I request you to ask the relevant teams to prepare a SK relating to this?😊
Thank again.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 28 | |
| 16 | |
| 10 | |
| 9 | |
| 7 | |
| 7 | |
| 6 | |
| 6 | |
| 5 | |
| 3 |
Tue 24 Feb 2026 @ 10:00 AM (CET)
Latest updates on Quantum Spark including R82 features and Spark Management zero touch - EMEATue 24 Feb 2026 @ 11:00 AM (EST)
Under The Hood: CloudGuard Network Security for Azure Virtual WANTue 24 Feb 2026 @ 10:00 AM (CET)
Latest updates on Quantum Spark including R82 features and Spark Management zero touch - EMEATue 24 Feb 2026 @ 11:00 AM (EST)
Under The Hood: CloudGuard Network Security for Azure Virtual WANThu 26 Feb 2026 @ 05:00 PM (CET)
AI Security Masters Session 4: Introducing Cyata, Securing the Agentic AI EraTue 03 Mar 2026 @ 04:00 PM (CET)
Maestro Masters EMEA: Introduction to Maestro Hyperscale FirewallsFri 06 Mar 2026 @ 08:00 AM (COT)
Check Point R82 Hands‑On Bootcamp – Comunidad DOJO PanamáAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY