- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Dear CheckMates,
I have a customer who is going to use Cisco SDA with VXLAN for deployment of new greenfield sites (this is already decided).
They wish to use the SGT provided in the VXLAN headers to be able to create policies in their R81.20 Security Gateways.
We are currently investigating how to get this working by trying to install the Check Point Identity Collector and integrating it with the Cisco ISE. This is proving to be harder than expected. I will open a dedicated topic on that subject if our latest attempts fail.
In the meantime, I was wondering if there was any way to use the VXLAN capabilities of the R81.20 SG directly without having to get an IDC involved?
All ideas/suggestions are welcomed.
Andrew
I do not think SGT/TrustSec is working without IDC.
You need the IDC to learn the SGTs mapped to the IP address.
You need CloudGuard to learn what SGTs are configured on the ISE (via SmartConsole DataCenter Object).
Then you can create Access Roles based on the SGT and use it in the Policy.
About the Cisco SDA+VXLAN part. Funnily enough I also have sort of this in mind to connect specific sites to the HQ via VXLAN.
Short explanation:
New Site connected via MPLS to the HQ.
Main Objective: minimize hardware usage on the site.
Idea: create a VXLAN between the site switch (Cisco Catalyst 9500) and the HQ Check Point. VXLAN terminates on the HQ Check Point and based on the SGTs the sites devices are allowed to access the HQ LAN.
I do not know if this is even possible.
What is the specific objective of your customer?
My customer is looking to deploy a greenfield site using all the fancy SDA possibilities provided by the Cisco SDA solution and the network(s) will be routed through the Checkpoint R81.20 SG to the WAN.
Very simple network:-
Rest of the World ---WAN -- CKP SG -- DMZ -- SDA network
So all the SDA elements are behind the DMZ interface and the only other interface in use is a Management interface (at this time). The future plan is to run this in ClusterXL mode.
I think maybe simple network diagram with objectives would help us, for sure.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 19 | |
| 17 | |
| 14 | |
| 8 | |
| 7 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY