- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
You can't do it this way.
* Domain based VPNs take precedence over route-based VPNs. If you have multiple communities, (some route-based, some domain-based), *AND* there's a chance of a pair of networks overlapping across the communities, then a domain-based VPN will be attempted.
* You can't have a VPN community with GwA having a VPN domain [with objects] defined, and GwB an empty VPN domain. This won't trigger the route-based VPN domain code.
* Route-based VPNs need to be IKEv2 with Universal Tunnels (One subnet per gateway pair), for best effects (yes you can do it with IKEv1 but it's not as compatible; just avoid it).
* You mention cluster, with BGP, so you'll want to consider:
The static route establishes reachability to the BGP peer loop00 (because the eBGP peer is now 2 hops away).
Using loop00 VIP for eBGP on route-based VPNs is the best way to go. You can then build your routemap policies as needed.
You can even enable BFD (ip-reachability-detection) for the BGP peers; be sure to use "ip-reachability-detection multihop local-address <ip of loop00>" on the BGP configuration. This is because BFD must originate from the BGP peer IP.
Tread carefully with mixing route-based and domain-based VPNs. You'll almost certainly want to use Encryption Domains per Community instead:
* Edit community
* Click on a gateway in the list
* Click the pencil icon (or double-click) to open a new VPN domain window for the gateway
You can choose a new VPN domain group to be active per community. This has some other limitations, but overall it works well.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY