Hello everyone,
I’m looking for help configuring a Site-to-Site IPsec VPN with BGP between an on-prem environment and an Azure VPN Gateway, using Check Point VSX running R81.20.
🔹 General scenario
Firewall: Check Point VSX – R81.20
Environment: two separate VSX deployments
- Primary site
- Disaster Recovery site
Azure side: Azure VPN Gateway with BGP enabled
VPN type: S2S IPsec + BGP
🔹 VSX details
Each VSX hosts multiple Virtual Systems
The new VPN must be configured inside an existing VS context
In the same VS, there is already another working BGP S2S VPN
That existing BGP VPN was:
- originally created on a non-VSX firewall
- later migrated via CLI, without a full SmartConsole-based configuration
Therefore, I have no direct experience configuring a full BGP VPN natively inside VSX from scratch.
🔹 Objective
Create a new S2S BGP VPN to Azure
Configure it on both Primary and DR VSX sites
Ensure that all traffic prefers the Primary site
DR site must be used only in case of failure
I need guidance on:
- Proper IPsec + BGP configuration on VSX
- Route redistribution and traffic preference
- Avoiding unwanted active/active routing
🔹 Specific questions
I’m looking for a step-by-step guide covering:
IPsec S2S VPN configuration on VSX (SmartConsole and/or CLI)
BGP configuration inside a Virtual System:
- AS numbers
- Correct interfaces (VTI / interface-based VPN)
Best practices for:
- Route redistribution (static ↔ BGP)
- Primary site preference (BGP metrics, AS-PATH, MED, Local Preference, etc.)
Proper handling of:
- Dual tunnels (Primary + DR)
- Clean failover without asymmetric routing
Any VSX-specific limitations or considerations in R81.20
Any real-world examples, official documentation references, or design recommendations would be greatly appreciated.
Thank you in advance!