- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello, I want to clarify if i created a Site to site VPN Check Point to Azure and my Azure VPN is route based, can I configure the Check Point to use domain based vpn? Will it still work even without vti?
This may help. It explains when you need to use either.
https://support.checkpoint.com/results/sk/sk101275
The subnet-to-subnet is what Azure calls "policy-based VPN" and gateway-to-gateway is what Azure calls "route-based VPN". This should help customers identify what they have on Azure against what they need to configure on the Check Point device.
Hello. I already check that SK, but there is no statement that VTI is needed when configuring route based vpn Check Point - Azure. Does it mean even Azure is in route-based mode, the configuration on Check Point side is the domain based/VPN Community with matching vpn settings and there is no need for VTI?
Yes and no. Yes as in if its domain based on CP side, you dont need VTI, but no as in I highly doubg that would work, if Azure end is route based.
Hello @the_rock. I also check in Azure documentation the configuration if the peer device is Check Point, whether it is Policy Based or Route Based, it redirects me to the same https://support.checkpoint.com/results/sk/sk101275 and based on the SK there is no notes that VTI is needed, the only note is that if the VPN Azure is in route based, the Tunnel Management on CP side should be gateway to gateway.
I get thats what documentation says, but reality is somewhat different.
I built so many of these tunnels and my experience is that setting you mentioned is not overly relevant without VTI for route based tunnel.
Just my experience, but, you are welcome to do it the way you prefer.
See if this post I created last year helps.
Also, wanted to share this with you, as I spent many hours until we found a solution. This was the first option we checked and though customer told me they tried per subnet setting in vpn community, apparently that was not the case for AWS tunnel issue, though it was domain based with no BGP. We verified everything on other side, even tried permanent tunnel option, 0.0.0.0/0 vpn domain, no luck. Once we reverted all and set per subnet, installed policy, all worked fine. Keep in mind and this can definitely be somewhat deceiving to lots of people, tunnel was always showing as up, both phase 1 and 2 were green, but no traffic flowing.
Hey mate,
Were you able to sort this out?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 24 | |
| 20 | |
| 8 | |
| 7 | |
| 6 | |
| 5 | |
| 5 | |
| 5 | |
| 4 | |
| 4 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY