- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
I have 5 public static IP.
1 IP attach cluster, 2 IP attach each member.
Remaining 2 IP, i would like to use it as IPsec to serve as primary and secondary.
Is it possible? Please advise
Might be able to use Gaia Policy-Based routing...(just a thought)
You can define x2 default routes for ISPA and ISPB, However you still need to define the cluster topology information correctly.
The Policy-Based routing table will also have to be manually defined for each connected network. (bit of a pain if you have a few).
As an example...(I have done this for a customer that wanted a DMZ routed out a specific ISP, so can't see why this would not work in the same manner)
Client A - 10.100.0.0/24 would always route out of ISPA
Client B - 10.200.0.0/24 would always route out of ISPB
regards
Dan
Yeah, this is one of the thing which i want to know, is there anywhere that i can attach these public ip.
Can you tell us what's your use case?
In other words: What are you trying to achieve by having two IPs from the same prefix and same ISP for IPSEC VPNs?
What i want to achieve is, in my environment i have separate entity company.
They are using the same Infra, but the network inside are separated, not communication with each other.
So for this, i would like to also separate the public ip that the user from external point to them.
For example,:
User from company A point to this public ip to access their company resources
User from company B point to a different public ip than company A to access their company resources.
I thought so too.
Just verifying whether is there alternative solution to these as the support is taking long time to assist on troubleshooting.
Might be able to use Gaia Policy-Based routing...(just a thought)
You can define x2 default routes for ISPA and ISPB, However you still need to define the cluster topology information correctly.
The Policy-Based routing table will also have to be manually defined for each connected network. (bit of a pain if you have a few).
As an example...(I have done this for a customer that wanted a DMZ routed out a specific ISP, so can't see why this would not work in the same manner)
Client A - 10.100.0.0/24 would always route out of ISPA
Client B - 10.200.0.0/24 would always route out of ISPB
regards
Dan
Thanks for the sharing.
Will explore on this.
I would have to agree with Phoneboy that if you are wanting to keep them isolated, you would need to utilize VSX. Beyond the issue of IPs/Isolation, how are you planning to authenticate the users (I am assuming remote access based on your "user" verbiage above)? With a single Gateway/cluster, you are not going to be able to use different authentication methods.
Are you planning to use the Mobile Access Blade (i.e. SSL VPN)? Or are you planning to use the Endpoint Client?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 19 | |
| 16 | |
| 7 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 4 | |
| 4 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY