- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello all,
I have a question with regards to the local encryption domains on CheckPoint firewalls.
I'm trying to setup a backup connectivity (site-to-site VPN) with one of our satellite offices which has a single MPLS circuit (other sites have dual MPLS links), unfortunately I'm having some issues due to the fact the CheckPoint firewall can only have a single set of local encryption domains associated with the local gateway.
Is it possible to create a new object (CheckPoint cluster or perhaps Interoperable Device with the same IP address as the existing one), link it with a different Encryption_Domain group and use that object for a new VPN Community?
Thanks,
Dom
Thank you for your answer.
Is it possible to clone or replicate the existing CheckPoint gateway with a different name and assign a different encryption domain to it?
Hello @PhoneBoy,
is there any progress regarding this functionality?
I have similar business need for this. We have full mesh VPN domain based setup but on one location we need few subnets to be able to communicate to two different locations -
1. rest of full mesh VPN peers to private address space
2. to specific IPSec tunnel which ends on cloud provider platform (src:few subnets dst:public IP range). Rest of local subnets should communicate to same public IP range via default gateway and not via IPSec tunnel.
Is it possible to achieve it? I am 100 % sure, that with Cisco ASA I would be able to get this done, but I am little bit lost if this is possible on checkpoint.
Thank you for your time.
R77.30 is way out of support. R80.40 GWs support VPN domains per community.
Thanks Maarten,
The MPLS router isn't directly connected to the Internet and does't have cryptographic IOS therefore I won't be able to use it as the tunnel termination point.
I would like to utilize the CheckPoint firewalls we have.
I'm very surprised that such a massive vendor like CheckPoint doesn't have such a basic functionality...
That the router is not connected to the Internet is only very good. However the inside of the FW will have a connection to the router. As far as I know for GRE you do not need a crypto image.
As said you build a IP Sec tunnel between both CP's and on top of that you build a GRE tunnel between both routers. Now let the Dynamic routing take care of the rest.
Another option is to build a Route based VPN, where you create a Virtual tunnel interface on both CP's and you let Dynamic routing take care of the rest.
Thank you Maarten
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 37 | |
| 19 | |
| 9 | |
| 7 | |
| 7 | |
| 5 | |
| 5 | |
| 4 | |
| 3 | |
| 3 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY