Hi, hard situation. Low cost, not so beautiful, but certificate based VPN can be the solution.
Page 40:
Digital User Certificates
Digital Certificates are the most recommended and manageable method for authentication.
Both parties present certificates as a means of proving their identity. Both parties verify that the
peer's certificate is valid (i.e. that it was signed by a known and trusted CA, and that the
certificate has not expired or been revoked).
Digital certificates are issued either by Check Point's Internal Certificate Authority or third-party
PKI solutions. Check Point's ICA is tightly integrated with VPN and is the easiest way to
configure a Remote Access VPN. The ICA can issue certificates both to Security Gateways
(automatically) and to remote users (generated or initiated).
Generate digital certificates easily in SmartConsole > Security Policies > Access Tools >
Client Certificates.
https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/C...
----------------
\m/_(>_<)_\m/