- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Does Checkpoint support only Tunnel mode VPN only or we can use Transport mode as well for IPSEC...?
can we switch between them?
Any documentation can we get it on this to get the clarity with example...?
Pretty sure Check Point does not support Transport Mode (which is essentially AH only) and never has. Transport Mode only provides the Integrity (SHA1/MD5/SHA256) and Authenticity (digital signatures) elements of the CIA model, while ESP adds in the Confidentiality piece (3DES/AES-XXX) along with the tunneling/encapsulation functionality. All modern VPNs use ESP, but VPNs with Verizon corporate still call for the use of Transport Mode for some reason.
In the old days on other vendors it was possible to use just AH in transport mode without ESP. This provided Integrity & Authenticity for the payload/data portion of an IP packet only with no encryption; the packet headers would be left intact and the entire packet would not be tunneled. This would save on encryption overhead when CPUs were much slower than they are today however good ol' Moore's Law has rendered this concern mostly moot.
Inevitably I would be asked for an example during a Check Point class about why in the heck you wouldn't want to encrypt the packet with ESP and achieve confidentiality; the best example I could come up with were real-time stock quotes. You sure as heck don't want someone to spoof them or tamper with them and as a result have your computer-based trading go awry, but you don't especially care if a man in the middle can see the quotes since they are more or less public information. Read the Wikipedia article about Knight Capital for a graphic description of how a prominent high frequency trading firm was essentially bankrupted in the space of 45 minutes by automated trading errors.
--
My book "Max Power: Check Point Firewall Performance Optimization"
now available via http://maxpowerfirewalls.com.
Are You sure about it.
How would You explain situation when IPSec SA is set to NULL for IKE Phase 2?
Sincerely
PT
Setting the Phase 2 Encryption to NULL does not cause Transport Mode to be used, it simply disables encryption of traffic traversing the VPN tunnel. The entire original packet is still tunneled by ESP and digitally signed.
Transport mode encrypts just the payload of the original packet and leaves the original packet header intact with no tunneling.
There are references to "Transport Mode" scattered throughout the Check Point VPN documentation, but they refer to supporting Transport Mode for Remote Access via L2TP and also GRE. Transport Mode is not supported for site-to-site VPN.
--
My book "Max Power: Check Point Firewall Performance Optimization"
now available via http://maxpowerfirewalls.com.
Sorry Tim, I was thinking about enforcing AH only mode in Tunnel Mode. I was thinking this would disable ESP and leave only AH part of IPSec.
@Tim Hall
I have a issue on transport Mode via GRE. Toplogy is:
peer 1 ------- checkpoint ---- VPN ---- cisco ASA ----- peer2
Peer 1 and Peer 2 has GRE VPN connection. Checkpoint with ASA firewall connected NAT-T Site2Site vpn.
Both peer routers are connecting. But GRE tunnel doesn't work.
Is it possible to connect gre tunnel?
Pretty sure GRE inside an IPSec tunnel is supported, although I can't recall ever setting one up. Is the Check Point side a cluster? If so could this be your issue: sk90060: GRE tunnel stops working inside a Site-to-Site VPN tunnel established with Check Point clus...
--
Second Edition of my "Max Power" Firewall Book
Now Available at http://www.maxpowerfirewalls.com
Thank you,
Checkpoint Side is cluster. Packets were coming in clear text and checkpoint dropping it.
We tried without VPN. Checkpoint has direct connected ASA and we created static route. Certainly, both peers are can connect each other.
peer 1 ------- checkpoint ---- Direct Optic Link(without VPN) ---- cisco ASA ----- peer2
It hasn't dropp log, but still couldn't establish.
I don't think this is the case, the part of the SK you are quoting is describing the theoretical elements of IPSec, not what can actually be configured. There is no way to set an IPSec tunnel to use Transport mode that I can find, and Tunnel mode is the default. I'd love to be proven wrong...
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
12 | |
12 | |
9 | |
7 | |
6 | |
6 | |
5 | |
5 | |
5 | |
5 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY