- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi guys,
currently we have two locations with two CheckPoint lcuster on each side. There is MPLS between them and we would like to create a route based VPN as a backup to the MPLS.
So far we have configured empty VPN domains, gateways (cluster) objects on each side, VPN community on each side, we created virtual tunnel interfaces for each gw and for clusters. We set priority for MPLS 1 and priority for VTI tunnel as 8.
after we installed the policy on remote site, checkPoint started IKE communication and started putting all communication into the non existing route based VPN tunnel.
The question is, why did CheckPoint started sending all traffic to the non existing VPN tunnel even though VTI had lowest route priority possible.
We reverted changes and everything is working now.
I think this is the SK you need:
Hi,thanks. I will give it a try and will update you ASAP
Maybe check with TAC to see what the options are?
Response from TAC:
After reviewing case details, it seems like configuration and setup issue. Just to clarify something on the issue, In TAC we are break/fix only and do not help in configuration. As per case description, nothing seems to be broken on the environment, the best people we have available to help you with your issue will be the Professional Services. In order for design and configuration it needs to be with Professional Services, Diamond, or an SE.
This SK looks really good, except. We are NATed behind a perimeter router. There is no way to specify NATed IP if we go with "Use probing, link redundancy mode"
Hi,
what do you mean by non existing?
you say that the GW has routed the traffic through the VTI, and not through the MPLS? did you verify that with packet capture? did you saw that the active route is indeed through the mpls? (show route clish command / 'route -n' in expert)
did you verify to have empty vpn domain configured on both sides?
in route based VPN, only the routes can "send the traffic to the vpn peer", so it must be something in the routes, unless you left domain based configuration which routed the traffic. (fw tab -t vpn_routing -u -f)
Hi, we configured empty VPN domains on both sides. We added route to the routing table mpls priority 1 and vpn route priority 8.
We installed policy on one side only and it tried to initiate tunnel, IKE without any luck since other side did not have policy installed yet. And it started routing traffic through VTI but as long as tunnel was not up it dropped all traffic.
Is it understandable?
Yes i understand what you wrote.
however, there is no reason for traffic to be routed towards VTI, unless the route table say so.
i would doublecheck it.
if it's still not working, maybe open TAC to run kernel debug in order to investigate the routing decision.
p.s if you don't mind encrypt over the mpls as well, and if both VPN peers are managed by the same Security management, you can try our Quantum SD-WAN in order to create overlay network over both mpls & Internet lines.
Thanks
We immediately needed to return to previous revision, as our bussiness requires remote system to be accessible all the time. We did not have time to troubleshoot. We are going to try this SK How To Create a Redundant, Service-based MPLS/Encrypted Link VPN (checkpoint.com) but unfortunatelly there is not NAT settings, since we are behind perimeter router that is NATing our communication we would need to configure thid NATed IP and tell VPN that what is it's public IP.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
15 | |
12 | |
8 | |
6 | |
6 | |
6 | |
5 | |
5 | |
4 | |
3 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY