- CheckMates
- :
- Products
- :
- Quantum
- :
- Management
- :
- Can i create two IPsec vpn tunnel with same Peer I...
Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×
Sign in with your Check Point UserCenter/PartnerMap account to access more great content and get a chance to win some Apple AirPods! If you don't have an account, create one now for free!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Can i create two IPsec vpn tunnel with same Peer IP
I have Domain based IPsec VPN tunnel from my checkpoint firewall to Cisco ASA but we need another VPN tunnel for testing purpose with same vendor but Third party vendor has provided the same Peer IP which we have used in our 1st tunnel.
Can we create another tunnel with same Peer IP on checkpoint ?? Because when i am creating Interoperable device then its showing this device is already exist.
Kindly help on this.
2 Replies
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
hi, I understand that you have a vpn with a cisco ASA already raised you already have the objects and the community.
what you want to do is another vpn with the same ip in another firewall that is not the cisco ASA
1.-You already have the objects with the ip chkp and interoperable. (CISCO)
2.- You already have the community.
3.- You already have the domains.
4.- You already have the rules of the vpn
you do not need to modify anything if use the same ip, but for your test something sounds wrong in the routing part you can not have two firewalls with the same public ip, you would present an ip conflict, and this could make you have asymetric routing etc etc.
if you have another public ip you can create the interoperable object and raise your vpn of tests.
Greetings.
what you want to do is another vpn with the same ip in another firewall that is not the cisco ASA
1.-You already have the objects with the ip chkp and interoperable. (CISCO)
2.- You already have the community.
3.- You already have the domains.
4.- You already have the rules of the vpn
you do not need to modify anything if use the same ip, but for your test something sounds wrong in the routing part you can not have two firewalls with the same public ip, you would present an ip conflict, and this could make you have asymetric routing etc etc.
if you have another public ip you can create the interoperable object and raise your vpn of tests.
Greetings.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello,
I believe you could achieve the intended result by configuring a route-based VPN.
Have a look at sk31012 for more information.
I hope this helps.
