- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hello all,
I have a question with regards to the local encryption domains on CheckPoint firewalls.
I'm trying to setup a backup connectivity (site-to-site VPN) with one of our satellite offices which has a single MPLS circuit (other sites have dual MPLS links), unfortunately I'm having some issues due to the fact the CheckPoint firewall can only have a single set of local encryption domains associated with the local gateway.
Is it possible to create a new object (CheckPoint cluster or perhaps Interoperable Device with the same IP address as the existing one), link it with a different Encryption_Domain group and use that object for a new VPN Community?
Thanks,
Dom
Thank you for your answer.
Is it possible to clone or replicate the existing CheckPoint gateway with a different name and assign a different encryption domain to it?
Hello @PhoneBoy,
is there any progress regarding this functionality?
I have similar business need for this. We have full mesh VPN domain based setup but on one location we need few subnets to be able to communicate to two different locations -
1. rest of full mesh VPN peers to private address space
2. to specific IPSec tunnel which ends on cloud provider platform (src:few subnets dst:public IP range). Rest of local subnets should communicate to same public IP range via default gateway and not via IPSec tunnel.
Is it possible to achieve it? I am 100 % sure, that with Cisco ASA I would be able to get this done, but I am little bit lost if this is possible on checkpoint.
Thank you for your time.
R77.30 is way out of support. R80.40 GWs support VPN domains per community.
Thanks Maarten,
The MPLS router isn't directly connected to the Internet and does't have cryptographic IOS therefore I won't be able to use it as the tunnel termination point.
I would like to utilize the CheckPoint firewalls we have.
I'm very surprised that such a massive vendor like CheckPoint doesn't have such a basic functionality...
That the router is not connected to the Internet is only very good. However the inside of the FW will have a connection to the router. As far as I know for GRE you do not need a crypto image.
As said you build a IP Sec tunnel between both CP's and on top of that you build a GRE tunnel between both routers. Now let the Dynamic routing take care of the rest.
Another option is to build a Route based VPN, where you create a Virtual tunnel interface on both CP's and you let Dynamic routing take care of the rest.
Thank you Maarten
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 8 | |
| 8 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 2 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY