- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
I have 5 public static IP.
1 IP attach cluster, 2 IP attach each member.
Remaining 2 IP, i would like to use it as IPsec to serve as primary and secondary.
Is it possible? Please advise
Might be able to use Gaia Policy-Based routing...(just a thought)
You can define x2 default routes for ISPA and ISPB, However you still need to define the cluster topology information correctly.
The Policy-Based routing table will also have to be manually defined for each connected network. (bit of a pain if you have a few).
As an example...(I have done this for a customer that wanted a DMZ routed out a specific ISP, so can't see why this would not work in the same manner)
Client A - 10.100.0.0/24 would always route out of ISPA
Client B - 10.200.0.0/24 would always route out of ISPB
regards
Dan
Yeah, this is one of the thing which i want to know, is there anywhere that i can attach these public ip.
Can you tell us what's your use case?
In other words: What are you trying to achieve by having two IPs from the same prefix and same ISP for IPSEC VPNs?
What i want to achieve is, in my environment i have separate entity company.
They are using the same Infra, but the network inside are separated, not communication with each other.
So for this, i would like to also separate the public ip that the user from external point to them.
For example,:
User from company A point to this public ip to access their company resources
User from company B point to a different public ip than company A to access their company resources.
I thought so too.
Just verifying whether is there alternative solution to these as the support is taking long time to assist on troubleshooting.
Might be able to use Gaia Policy-Based routing...(just a thought)
You can define x2 default routes for ISPA and ISPB, However you still need to define the cluster topology information correctly.
The Policy-Based routing table will also have to be manually defined for each connected network. (bit of a pain if you have a few).
As an example...(I have done this for a customer that wanted a DMZ routed out a specific ISP, so can't see why this would not work in the same manner)
Client A - 10.100.0.0/24 would always route out of ISPA
Client B - 10.200.0.0/24 would always route out of ISPB
regards
Dan
Thanks for the sharing.
Will explore on this.
I would have to agree with Phoneboy that if you are wanting to keep them isolated, you would need to utilize VSX. Beyond the issue of IPs/Isolation, how are you planning to authenticate the users (I am assuming remote access based on your "user" verbiage above)? With a single Gateway/cluster, you are not going to be able to use different authentication methods.
Are you planning to use the Mobile Access Blade (i.e. SSL VPN)? Or are you planning to use the Endpoint Client?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 25 | |
| 12 | |
| 9 | |
| 7 | |
| 6 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 3 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY