- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Dear Team,
First question
As i checked in Zscaler Official Website they have given list which is supported Firewall device for IPSEC Tunnel so checkpoint Device not in list ,(So my first question is why checkpoint is not supportable device to build tunnel with Zscaler ) (For GRE I know that checkpoint is not supported this feature)
Secondly ,
My requirement is matching which given diagram which is not exact customer digram but its scenario found from zscaler , So, In My Client environment
GRE Tunnels from the Border Router to the ZENs
Second Diagram JPG
https://help.zscaler.com/zia/gre-deployment-scenarios
ISP ---> ROuter --->IPS (IN L2 Mode)-->SwitchL2-->Checkpoint Device ----> LAN SWICH AND OTHER USERS
In this requirement If Zscaler is making GRE WIth CISCO ROuter RIght so how can i pass traffic to GRE Tunnel Without NAT , Becuase From Router to CP WAN PUblic LAN Pool we are using .and presently i have configured Hide nat to forward traffic of private pool towards Internet (By router)
(Zscaler need to give reporting with Original LAN IP so they want without nat traffic)
So, i dont know if i will disable NAT so traffic will go to router side or not , and If it s done then as per standard i am doing right thing or not can you please suggest me , because outside firewall if we are publishing our local LAN it will be security bridge right .
SO What will be feasible suggestion.
Another option we are thinking is (First option which i mentioned that IPSEC Tunnel between CP to Zscaler) But in this case we need to forward only 80 and 443 port traffic so is not possible becuase as i know PBR is not supported with service based traffic forwarding
Our device in R80.10 and latest one so there is no limitation with update.
Regards,
Harmesh
There are two supported configurations for connecting with Zscaler:
This requires the versions specified in the SKs.
The above is not relevant on the SMB appliances running Embedded Gaia and an RFE via your local Check Point office will likely be necessary.
I use a VPN tunnel for many customers for ZScaler proxy:
1) Add an VPN tunnel to ZScaler and add all internet addresses ( 0.0.0.1-223.255,255,255 and exclude privat networks)
2) Exclude your private and other used networks via crypt.def and no vpn traffic rules.
Here the sk86582 to no vpn trffic rules:
Excluding subnets in encryption domain from accessing a specific VPN community
HeikoAnkenbrand, what kinds of device(s) are you terminating the VPN tunnel on and how is performance? We have tested on 1100, 1400 and 4200 with 77.20, 77.30 and 80.20 with poor performance.
Hi HeikoAnkenbrand,
Can you help to explain in more details how to successfully create the tunnel to zscaler proxy?
Here's the environment for your reference.
Example of current configuration
CheckPoint 4800 with existing 3 tunnels to AWS and azure
CheckPoint firewall VPN domain ( 172.16.0.0/16 , 172.18.0.0/16 172.19.1.0/24, 172.24.0.0/16)
before migrating few server subnet to zscaler proxy via ipsec tunnel, we want to test using one IP address only. (172.18.215.10).
what is the step to create the vpn community( mostly the vpn domain for checkpoint fw since we already have vpn domain defined), interoperable device, etc
thanks in advance
Hello Sir,
Could you please more steps and guidance in order to implement such setup ?
Thanks!
There are two supported configurations for connecting with Zscaler:
This requires the versions specified in the SKs.
The above is not relevant on the SMB appliances running Embedded Gaia and an RFE via your local Check Point office will likely be necessary.
First of all, I would like to thank you for sharing this, it's very informative!
I still have some questions here and wonder if you could help:
Thank you in advance!
We have GRE tunnels setup and working by following sk175385. However, the SK only shows how to create a policy rule using HTTP (80) / TCP (Step 8e). What is the best way to route all ports over the GRE tunnel instead of creating a rule for each port and protocol?
If you're routing to Zscaler, they only look at HTTP/HTTPS (as I recall), which is why the SK lists that step.
You should be able to uncheck Service Port and/or Protocol in that step to allow all ports and/or protocols.
The Zscaler engineer we worked with also mentioned that GRE tunnel method should pass traffic more than just http/https; So if we don't specify any port and protocol, it will just pass all right?
If we already have restriction on outbound traffic, do we then still need to configure firewall rule to allow any> any for Zscaler destination?
Zscaler looks at all ports and protocols, not just HTTP/HTTPS. I guess the SK shows those services as that is the most common traffic that is normally sent. I presume a policy rule based on interface or source network can be used instead of service ports/protocols to match on (sk100500) which should theoretically send all traffic over the GRE tunnel.
Hello Heiko, can you post an example of how you did this exclusion in r80.20? ("Exclude your private and other used networks via crypt.def and no vpn traffic rules.")
We need to do similar but are not in a position to upgrade as yet.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
12 | |
7 | |
6 | |
6 | |
6 | |
6 | |
5 | |
3 | |
3 |
Fri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY