- Products
- Learn
- Local User Groups
- Partners
- More
The Great Exposure Reset
24 February 2026 @ 5pm CET / 11am EST
AI Security Masters E4:
Introducing Cyata - Securing the Agenic AI Era
AI Security Masters E3:
AI-Generated Malware
CheckMates Go:
CheckMates Fest
I have 5 public static IP.
1 IP attach cluster, 2 IP attach each member.
Remaining 2 IP, i would like to use it as IPsec to serve as primary and secondary.
Is it possible? Please advise
Might be able to use Gaia Policy-Based routing...(just a thought)
You can define x2 default routes for ISPA and ISPB, However you still need to define the cluster topology information correctly.
The Policy-Based routing table will also have to be manually defined for each connected network. (bit of a pain if you have a few).
As an example...(I have done this for a customer that wanted a DMZ routed out a specific ISP, so can't see why this would not work in the same manner)
Client A - 10.100.0.0/24 would always route out of ISPA
Client B - 10.200.0.0/24 would always route out of ISPB
regards
Dan
Yeah, this is one of the thing which i want to know, is there anywhere that i can attach these public ip.
Can you tell us what's your use case?
In other words: What are you trying to achieve by having two IPs from the same prefix and same ISP for IPSEC VPNs?
What i want to achieve is, in my environment i have separate entity company.
They are using the same Infra, but the network inside are separated, not communication with each other.
So for this, i would like to also separate the public ip that the user from external point to them.
For example,:
User from company A point to this public ip to access their company resources
User from company B point to a different public ip than company A to access their company resources.
I thought so too.
Just verifying whether is there alternative solution to these as the support is taking long time to assist on troubleshooting.
Might be able to use Gaia Policy-Based routing...(just a thought)
You can define x2 default routes for ISPA and ISPB, However you still need to define the cluster topology information correctly.
The Policy-Based routing table will also have to be manually defined for each connected network. (bit of a pain if you have a few).
As an example...(I have done this for a customer that wanted a DMZ routed out a specific ISP, so can't see why this would not work in the same manner)
Client A - 10.100.0.0/24 would always route out of ISPA
Client B - 10.200.0.0/24 would always route out of ISPB
regards
Dan
Thanks for the sharing.
Will explore on this.
I would have to agree with Phoneboy that if you are wanting to keep them isolated, you would need to utilize VSX. Beyond the issue of IPs/Isolation, how are you planning to authenticate the users (I am assuming remote access based on your "user" verbiage above)? With a single Gateway/cluster, you are not going to be able to use different authentication methods.
Are you planning to use the Mobile Access Blade (i.e. SSL VPN)? Or are you planning to use the Endpoint Client?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 43 | |
| 26 | |
| 14 | |
| 13 | |
| 11 | |
| 8 | |
| 7 | |
| 6 | |
| 6 | |
| 5 |
Tue 24 Feb 2026 @ 10:00 AM (CET)
Latest updates on Quantum Spark including R82 features and Spark Management zero touch - EMEATue 24 Feb 2026 @ 11:00 AM (EST)
Under The Hood: CloudGuard Network Security for Azure Virtual WANTue 24 Feb 2026 @ 10:00 AM (CET)
Latest updates on Quantum Spark including R82 features and Spark Management zero touch - EMEATue 24 Feb 2026 @ 11:00 AM (EST)
Under The Hood: CloudGuard Network Security for Azure Virtual WANThu 26 Feb 2026 @ 05:00 PM (CET)
AI Security Masters Session 4: Introducing Cyata, Securing the Agentic AI EraTue 03 Mar 2026 @ 04:00 PM (CET)
Maestro Masters EMEA: Introduction to Maestro Hyperscale FirewallsFri 06 Mar 2026 @ 08:00 AM (COT)
Check Point R82 Hands‑On Bootcamp – Comunidad DOJO PanamáAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY