Site-to-Site VPN connects two or more locations securely over the internet using encrypted tunnels. Check Point's IPsec VPN implementation provides enterprise-grade security with flexible configuration options. This guide walks you through setting up VPN connections between Check Point Security Gateways.
Prerequisites
Before you begin, ensure you have:
- Two or more Security Gateways with IPsec VPN Software Blade available
- SmartConsole access with permissions to modify VPN settings
- Trusted Communication (SIC) established between all gateways and Management Server
- Network documentation including:
- Gateway external IP addresses
- Internal networks (VPN domains) at each site
- Required encryption and authentication settings
- Firewall rules allowing IKE (UDP 500, 4500) and ESP (IP protocol 50) traffic
Understanding VPN Components
| Component | Description |
|---|---|
| VPN Domain | Networks and IP addresses included in the VPN tunnel |
| VPN Community | Defines which gateways participate in VPN connections |
| Encryption Domain | Same as VPN Domain - the protected networks behind each gateway |
| Phase 1 (IKE) | Initial key exchange to establish secure channel |
| Phase 2 (IPsec) | Negotiates encryption for actual data traffic |
Step 1: Enable the IPsec VPN Software Blade
Enable VPN on each participating gateway:
- Open SmartConsole and connect to your Management Server
- Navigate to Gateways & Servers in the left panel
- Double-click the Security Gateway object to open its properties
- In the General Properties tab, locate Network Security
- Check the box for IPsec VPN
- Click OK to save the gateway configuration
- Repeat for all gateways that will participate in VPN
- Click Publish to save changes
Note: You must publish and install policy after enabling blades for changes to take effect.
Step 2: Configure VPN Domains
The VPN Domain defines which networks are accessible through the VPN tunnel. Configure this for each gateway:
Automatic VPN Domain
By default, Check Point includes all networks considered "internal" to the gateway:
- Double-click the Security Gateway object
- Navigate to Network Management > VPN Domain
- Select All IP Addresses behind Gateway based on Topology
- Click OK
User-Defined VPN Domain
For more control over which networks are included:
- Double-click the Security Gateway object
- Navigate to Network Management > VPN Domain
- Select User defined
- Click the ... button to select objects
- Add specific Network or Group objects that should be accessible via VPN
- Click OK to save
Creating a VPN Domain Group
For complex environments with multiple networks:
- Go to Objects menu > New > Group > Simple Group
- Name it descriptively (e.g., "Site_A_VPN_Domain")
- Add all network objects that should be in the VPN domain
- Click OK
- Assign this group as the gateway's VPN Domain
Step 3: Create a VPN Community
VPN Communities define which gateways can establish VPN tunnels with each other:
- Navigate to Security Policies in the left panel
- In the Access Tools section on the right, click VPN Communities
- Click New and select your community type:
- Star Community - Hub-and-spoke topology
- Mesh Community - All-to-all connectivity
Configuring a Star Community
- Enter a Name for the community (e.g., "Corporate_VPN")
- On the Gateways page:
- Center Gateways: Click Add and select your hub/headquarters gateway(s)
- Check Mesh center gateways if you have multiple center gateways that should communicate directly
- Satellite Gateways: Click Add and select branch office gateways
- Configure other settings as needed (covered in following steps)
- Click OK to save
Configuring a Mesh Community
- Enter a Name for the community
- On the Gateways page:
- Click Add and select all participating gateways
- All gateways in a mesh can communicate directly with each other
- Configure encryption and other settings
- Click OK to save
Step 4: Configure Encryption Settings
From the VPN Community properties, select Encryption in the navigation tree:
Encryption Method
| Option | Description | Recommendation |
|---|---|---|
| IKEv2 Only | Modern, more secure protocol | Recommended for new deployments |
| IKEv1 for IPv4 | Legacy protocol, widely compatible | Use when required for compatibility |
| IKEv2 Preferred | Falls back to IKEv1 if needed | Good for mixed environments |
Encryption Suite
Select a pre-defined suite or configure custom settings:
| Suite | Encryption | Authentication | DH Group |
|---|---|---|---|
| Suite-B GCM-256 | AES-256 GCM | SHA-384 | Group 20 (384-bit ECP) |
| Suite-B GCM-128 | AES-128 GCM | SHA-256 | Group 19 (256-bit ECP) |
| VPN B | AES-256 | SHA-256 | Group 5 (1536-bit MODP) |
| VPN A | AES-128 | SHA-1 | Group 2 (1024-bit MODP) |
| Custom | Configure individually | Configure individually | Configure individually |
Security Note: Use Suite-B GCM-256 or Suite-B GCM-128 for new deployments. Avoid SHA-1 and Group 2 for production environments.
Custom Encryption Settings
For Custom encryption, configure Phase 1 and Phase 2 separately:
Phase 1 (IKE SA):
- Encryption: AES-256
- Data Integrity: SHA-256 or SHA-384
- Diffie-Hellman Group: Group 14 (2048-bit) or higher
Phase 2 (IPsec SA):
- Encryption: AES-256 GCM or AES-256
- Data Integrity: SHA-256 (not needed for GCM)
Step 5: Configure Authentication
From the VPN Community properties, select Shared Secret or Certificate Authentication:
Pre-Shared Secret Authentication
-
Select the Shared Secret page in the community properties
-
Choose an authentication method:
- Use only Shared Secret - Simple but less secure
- Certificate or Shared Secret - Fallback option
-
Configure the shared secret:
- Select the gateway pair
- Click Edit or double-click the entry
- Enter a strong Shared Secret (minimum 16 characters, mix of letters, numbers, symbols)
- Confirm the secret
- Click OK
Certificate-Based Authentication
For enhanced security, use certificates:
- Ensure each gateway has a valid certificate from a trusted CA
- In the VPN Community, select Certificate Authentication options
- Configure certificate validation settings
Step 6: Configure Tunnel Features
Permanent Tunnels
Keep tunnels active even without traffic:
- In VPN Community properties, go to Tunnel Management
- Enable Permanent Tunnels
- Configure tunnel keep-alive settings
Dead Peer Detection (DPD)
Detect failed tunnels automatically:
- Enable Dead Peer Detection (DPD)
- Configure detection intervals:
- Tunnel Idle Time before DPD: How long to wait before checking (default: 30 seconds)
- DPD Retry Interval: Time between probes (default: 10 seconds)
- DPD Retry Count: Number of failed probes before declaring tunnel dead (default: 3)
Step 7: Configure Access Control Rules
Create rules to allow traffic through the VPN tunnel:
Accept All Encrypted Traffic (Simple)
- In the VPN Community properties, go to Encrypted Traffic
- Enable Accept all encrypted traffic
- This creates an implicit rule allowing all traffic within the community
Granular Access Control (Recommended)
For more control, create explicit rules:
-
Go to Security Policies > Access Control > Policy
-
Add a new rule:
- Name: "Allow VPN Traffic - Site A to Site B"
- Source: [Site A VPN Domain objects]
- Destination: [Site B VPN Domain objects]
- VPN: [Your VPN Community]
- Services: [Specific services or Any]
- Action: Accept
- Track: Log
-
Create reciprocal rules for return traffic if needed
Step 8: Install the Policy
After completing VPN configuration:
- Click Publish to save all changes
- Click Install Policy
- Select the Access Control policy
- Select all gateways participating in the VPN
- Click Install
- Monitor the installation in the Tasks panel
Step 9: Verify VPN Connectivity
Check Logs in SmartConsole
- Go to Logs & Monitor in SmartConsole
- Look for these log types:
- Key Install - Indicates successful Phase 1/Phase 2 negotiation
- Encrypt - Traffic being encrypted and sent through tunnel
- Decrypt - Traffic being received and decrypted
Monitor VPN Tunnels
- In SmartConsole, go to Logs & Monitor
- Select the Tunnels or VPN view
- Verify tunnels show as Active
Command-Line Verification
SSH to the Security Gateway and run:
# View tunnel status
vpn tunnelutil
# Or use the interactive menu
vpn tu
# View all active tunnels
vpn tu tlist
# Debug specific tunnel
vpn debug trunc
vpn debug on TDERROR_ALL_ALL
Test Traffic Flow
From a host behind one gateway, ping a host behind the other gateway:
ping <remote_internal_ip>
Check logs to confirm traffic is being encrypted/decrypted.
Troubleshooting Common Issues
Tunnel Not Establishing
Symptoms: No Key Install logs, tunnel shows as down.
Solutions:
- Verify IKE ports are open:
- UDP 500 (IKE)
- UDP 4500 (NAT-T)
- IP Protocol 50 (ESP)
- Check that encryption settings match on both sides
- Verify pre-shared secrets are identical
- Confirm gateway external IP addresses are correct
- Check for NAT between gateways
Tunnel Establishes but No Traffic Flows
Symptoms: Key Install logs present, but no Encrypt/Decrypt logs.
Solutions:
- Verify VPN domains are correctly defined on both sides
- Check access control rules allow the traffic
- Confirm source/destination are within the VPN domains
- Check routing tables on gateways
Intermittent Tunnel Drops
Symptoms: Tunnel works then fails periodically.
Solutions:
- Check for DPD failures in logs
- Verify network stability between sites
- Increase DPD timeout values
- Check for conflicting NAT rules
- Verify no rekeying issues (check Phase 2 lifetime settings)
Phase 1 Failures
Symptoms: Log shows "IKE Phase 1 failed" errors.
Solutions:
- Verify both sides use the same IKE version
- Check encryption and DH group settings match
- Confirm authentication method matches (PSK vs. certificate)
- Verify pre-shared secret is identical on both sides
VPN Configuration Reference
Recommended Settings for New Deployments
| Setting | Recommended Value |
|---|---|
| IKE Version | IKEv2 |
| Encryption Suite | Suite-B GCM-256 |
| DH Group | Group 19 or 20 (ECP) |
| Authentication | Certificates |
| Perfect Forward Secrecy | Enabled |
| Dead Peer Detection | Enabled |
Ports and Protocols Required
| Protocol | Port | Direction | Description |
|---|---|---|---|
| UDP | 500 | Bidirectional | IKE negotiation |
| UDP | 4500 | Bidirectional | IKE NAT traversal |
| ESP | Protocol 50 | Bidirectional | Encrypted data |
Next Steps
After establishing basic site-to-site VPN:
- Add More Sites - Expand your VPN community with additional gateways
- Configure Backup Links - Set up redundant VPN paths for high availability
- Implement Certificate Authentication - Enhance security with PKI
- Monitor VPN Performance - Use SmartView Monitor for tunnel statistics
- Configure Remote Access VPN - Enable secure access for mobile users
Additional Resources
- Check Point R81 Site-to-Site VPN Admin Guide
- VPN Configuration Best Practices
- Check Point CheckMates Community
Need expert help with Check Point VPN configuration? Inventive HQ provides comprehensive VPN implementation services, from initial setup to multi-site mesh deployments. Contact us for a free consultation.