- Products
- Learn
- Local User Groups
- Partners
- More
The State of Ransomware Q1 2026
Key Trends and Their Impact
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Hi all,
We want to set up a site-to-site VPN connection between the Check Point cluster and the Cisco Secure Access Cloud.
Unfortunately, on the Cisco platform, you must specify either one remote email identifier or two remote public IP addresses.
At the Check Point, I only have one public IP available for the tunnel, the public cluster IP.
Unfortunately, route-based VPN is not an option either, as Check Point only provides one public IP address, but Cisco Cloud requires two.
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SitetoSiteVPN_AdminGuide/Topics-VP...
Best regards.
Michael
You can configure the gateway to use an email address as the Tunnel ID: https://support.checkpoint.com/results/sk/sk182890
Hey Michael,
I am not familiar with that side of Cisco, but I fnd it very odd it would require 2 IP addresses. Do you have any document stating that or screenshot you can attach from their end?
Good morning Andy,
Attached is the documentation from Cisco.
The issue is the Tunnel-ID.
Cisco requires either an EMail-Address or a primary and secondary IP-Address
Best regards.
Michael
Wait a second. To me, logically, though I could be mistaken, it would imply they are referring to REDUNDANT tunnels, not if its just a single one. Can you please verify that with them?
Yes, seems that Cisco wants to establish a second redundant tunnel but to a different public IP and there's no way around.
I tried to configure a route-based-VPN-Tunnel like described in sk100726 (Site-2-Site-VPN with AWS) but was informed, that on Cisco site a secondary remote public IP is needed.
I had a remote session with the VPN-partner and there's no way to bypass this bloody second public remote IP-Address.
But, if you are able to talk to someone in Cisco support, can you verify this with them? It absolutely makes no logical sense this would be needed for single tunnel.
@Michael_Menen
We're looking at setting up a connection to Cisco Secure Access in the near future and we're just wondering if you did get any feedback from support whether they are likely to change this requirement of Primary/Secondary tunnels.
Thinking we'll have to use a second public IP on the Check Point side just to satisfy Cisco
You can configure the gateway to use an email address as the Tunnel ID: https://support.checkpoint.com/results/sk/sk182890
Interesting, never knew that was possible.
I didn't either until I searched SK. 🙂
I have a hard time believing one of biggest geniuses I know, aka Phoneboy, did not know that...just saying 🙂
If I never ran across it before...how would I know it? 😜
Thank you very much for the SK.
As far as i understand the sk certificate authentication is required between the VPN gateways.
I'm not sure if the Cisco Secure Access Cloud is supporting certicicate authentication for VPNs.
Additional to that I have to renew the IPsec VPN certificate on the Check Point gateways and reboot the firewalls.
After that the "Certificate Subject Alternative Name" will be provided in any VPN-Tunnel (for than 30 are configured at the moment).
Ufffff......not sure if the customer will like that.
I will get in cpontact with the customer and Cisco.
Thanks!
Maybe not optimal, but given the circumstances, most likely best option.
Unless they're all in the same mesh VPN community, you don't have to change all the other VPNs to certificate-based auth.
Hi Michael, did you get this working? did the email address as the Tunnel ID thing work ?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 34 | |
| 10 | |
| 10 | |
| 10 | |
| 10 | |
| 8 | |
| 7 | |
| 6 | |
| 6 | |
| 6 |
Tue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceWed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactThu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY