- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hello everyone,
I’m looking for help configuring a Site-to-Site IPsec VPN with BGP between an on-prem environment and an Azure VPN Gateway, using Check Point VSX running R81.20.
🔹 General scenario
Firewall: Check Point VSX – R81.20
Environment: two separate VSX deployments
Azure side: Azure VPN Gateway with BGP enabled
VPN type: S2S IPsec + BGP
🔹 VSX details
Each VSX hosts multiple Virtual Systems
The new VPN must be configured inside an existing VS context
In the same VS, there is already another working BGP S2S VPN
That existing BGP VPN was:
Therefore, I have no direct experience configuring a full BGP VPN natively inside VSX from scratch.
🔹 Objective
Create a new S2S BGP VPN to Azure
Configure it on both Primary and DR VSX sites
Ensure that all traffic prefers the Primary site
DR site must be used only in case of failure
I need guidance on:
🔹 Specific questions
I’m looking for a step-by-step guide covering:
IPsec S2S VPN configuration on VSX (SmartConsole and/or CLI)
BGP configuration inside a Virtual System:
Best practices for:
Proper handling of:
Any VSX-specific limitations or considerations in R81.20
Any real-world examples, official documentation references, or design recommendations would be greatly appreciated.
Thank you in advance!
Let me look for it, Im sure I have something.
See if this helps. Btw, I do have bunch of screenshots and doc for P81 BGP setup, but cant send it, as it has client confidential info (sorry), but happy to answer any questions you may have.
Note the ask is for VSX which differs in configuring the VTI portion etc, for example:
Thank you for your responses.
I can confirm that I cannot follow the first configuration approach, as it needs to be performed within a VSX environment. I have reviewed the documentation related to the vsx_provisioning_tool, but I still have a few concerns.
On the management server, I have both VSX environments connected (production and DR). However, the VS IDs are different between the two environments. For this reason, I am hesitant to use the provisioning tool, as I am concerned it might apply unintended configurations to different VS instances.
Is it possible to perform this configuration directly from the CLI on each individual gateway? This approach would allow me to be as precise and controlled as possible.
The naming convention used in the example is likely throwing you off, refer to the admin guide e.g.
Never really tried it from cli, but Im sure it is possible. You would just need to run add vpn tunnel commands.
I also believe that it should be sufficient to run the add vpn tunnel commands on each node and then save the configuration. I will try to proceed this way.
In your opinion, is it also necessary to retrieve the interfaces without topology from SmartConsole, or is this not required in this scenario?
Personally, I always do that. Its good practise, just to be 100% sure there are no issues/misconfigs.
@Tub92 Personally and again, this is just my own opinion, does not matter its something everyone should be doing, but I ALWAYS found best setting for topology is define network by routes option, as if network changes, its auto updated, just make sure you have correct routing and I also assign needed security zone as well.
Example from my lab. For VTI, PLEASE make sure that interoperable object name matches with what you put in interface settings, otherwise, even if one letter is missed or its upper instead of lower case, it will never work. By default, anti spoofing is always disabled on those interfaces, which is totally fine.
I logged into one client's clustered master fw and below is what config for VTI would look like in clish. I also attached web UI config as well:
show interface vpnt9
state on
mac-addr Not configured
type vpnt
link-state not available
mtu 1500
auto-negotiation off
speed N/A
ipv6-autoconfig Not configured
monitor-mode Not configured
duplex N/A
link-speed Not configured
comments onprem-sase trunnel
vpn-tunnel-id 9
vpn-peer Vancouver-pop-1
vpn-local-address 169.254.255.11
vpn-remote-address 169.254.255.9
ipv4-address Not Configured
ipv6-address Not Configured
ipv6-local-link-address Not Configured
Statistics:
TX bytes:183 packets:3 errors:0 dropped:0 overruns:0 carrier:0
RX bytes:0 packets:0 errors:0 dropped:0 overruns:0 frame:0
SD-WAN: Not Configured
Here is the key. Say remote side (Azure) is 169.254.1.50
one fw can be 169.254.1.51
2nd 169.254.1.52 and VIP can be .53, as long as its NOT used on remote side, super important.
HTH
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 66 | |
| 19 | |
| 13 | |
| 12 | |
| 11 | |
| 9 | |
| 9 | |
| 7 | |
| 7 | |
| 7 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY