How to Setup VPN in Check Point Firewall – Complete Guide for Site-to-Site and Remote Access VPN
Introduction to Check Point VPN
Check Point VPN provides secure encrypted tunnels for connecting remote sites, branch offices, and remote users to the corporate network. Check Point supports multiple VPN technologies including IPsec for Site-to-Site VPN, Remote Access VPN for mobile users, and SSL VPN (Mobile Access) for clientless access.
This comprehensive guide covers complete VPN configuration in Check Point including Site-to-Site VPN between two Check Point gateways, Site-to-Site VPN with third-party devices, Remote Access VPN using Check Point Endpoint Security VPN client, and SSL VPN (Mobile Access) for browser-based secure access.
VPN Types in Check Point
1. Site-to-Site VPN (Gateway-to-Gateway)
- IPsec VPN: Encrypted tunnel between two security gateways
- Use Case: Connect branch offices, data centers, or partners
- Protocol: IPsec (IKEv1 or IKEv2)
- Always-On: Tunnel remains active continuously
2. Remote Access VPN (Client-to-Gateway)
- IPsec VPN Client: Check Point Endpoint Security VPN client
- Use Case: Remote workers, mobile employees
- Protocol: IPsec with IKEv2
- On-Demand: User initiates connection when needed
3. SSL VPN / Mobile Access
- Browser-Based: No client installation required
- Use Case: Quick access, BYOD, contractors
- Protocol: SSL/TLS (HTTPS)
- Portal Access: Web-based applications
Prerequisites for VPN Configuration
General Prerequisites
- Check Point Security Gateway with valid license
- VPN blade enabled on gateway
- Public IP address(es) for VPN gateway
- Network objects defined for encryption domains
- Proper routing configured
- SmartConsole access to Management Server
Site-to-Site VPN Prerequisites
- Two or more Security Gateways
- Reachability between gateways (ping test)
- Non-overlapping encryption domains
- Shared secret or certificates for authentication
- UDP ports 500 and 4500 allowed (for IKE and NAT-T)
Remote Access VPN Prerequisites
- Remote Access blade enabled
- Office Mode IP pool (for client IP assignment)
- User authentication configured (LDAP, RADIUS, or local)
- DNS and WINS configuration
- VPN client software package
Enable VPN Blade on Gateway
Step 1: Access Gateway Object
- Open SmartConsole
- Navigate to Gateways & Servers
- Double-click your Security Gateway
- Select Network Security tab
Step 2: Enable VPN Blade
- Check "IPsec VPN" checkbox
- Check "Remote Access" (if needed for remote users)
- Check "Mobile Access" (if needed for SSL VPN)
- Click "OK"
- Install policy to activate changes
Site-to-Site VPN Configuration (Check Point to Check Point)
Network Topology
Scenario: Connect HQ and Branch Office
- HQ Gateway: CP-Gateway-HQ (Public IP: 203.0.113.10)
- HQ LAN: 192.168.10.0/24
- Branch Gateway: CP-Gateway-Branch (Public IP: 198.51.100.20)
- Branch LAN: 192.168.20.0/24
Step 1: Define Network Objects
Create Network Objects for Encryption Domains
- Navigate to Object Explorer → Network Objects → Networks
- Click "New Network"
- Create HQ network:
- Name: HQ_LAN
- IPv4 Address: 192.168.10.0
- Subnet Mask: 255.255.255.0
- Create Branch network:
- Name: Branch_LAN
- IPv4 Address: 192.168.20.0
- Subnet Mask: 255.255.255.0
- Click "OK" to save
Step 2: Configure Gateway VPN Properties
HQ Gateway Configuration
- Double-click CP-Gateway-HQ
- Navigate to IPsec VPN tab
- Under VPN Domain, select "Manually defined"
- Click "Select" and choose HQ_LAN
- Click "OK"
Branch Gateway Configuration
- Double-click CP-Gateway-Branch
- Navigate to IPsec VPN tab
- Under VPN Domain, select "Manually defined"
- Click "Select" and choose Branch_LAN
- Click "OK"
Step 3: Create VPN Community
Create Star Community
- Navigate to Gateways & Servers → VPN Communities
- Right-click and select "New VPN Community → Star Community"
- Name: HQ_Branch_VPN
- In Center Gateways, click "Add" and select CP-Gateway-HQ
- In Satellite Gateways, click "Add" and select CP-Gateway-Branch
Configure Encryption
- Navigate to Encryption tab
- Select encryption method:
- Encryption Suite: Custom
- IKE Phase 1:
- Encryption: AES-256
- Hash: SHA-256
- Diffie-Hellman Group: Group 14 or higher
- IKE Phase 2:
- Encryption: AES-256
- Hash: SHA-256
Configure Shared Secret
- Navigate to Shared Secret tab
- Click "Set shared secret per each gateway pair"
- Select gateway pair
- Enter strong shared secret (minimum 12 characters)
- Confirm secret
- Click "OK"
Step 4: Create VPN Access Rules
Allow VPN Traffic in Security Policy
- Navigate to Security Policies → Access Control
- Create new rule:
- Name: HQ to Branch VPN
- Source: HQ_LAN
- Destination: Branch_LAN
- VPN: HQ_Branch_VPN
- Service: Any
- Action: Accept
- Track: Log
- Create reverse rule:
- Source: Branch_LAN
- Destination: HQ_LAN
- VPN: HQ_Branch_VPN
- Action: Accept
Step 5: Install Policy
1. Click "Install Policy" button 2. Select both gateways (CP-Gateway-HQ and CP-Gateway-Branch) 3. Click "Install" 4. Wait for successful installation
Step 6: Verify VPN Tunnel
Check VPN Status on Gateway
# SSH to gateway ssh admin@gateway-ip expert # Check VPN tunnel status vpn tu # Expected output shows tunnel status: # peer IP stat Algorithms # CP-Gateway- 198.51.100.20 up AES-256/SHA256 # View detailed tunnel information vpn tu tlist
Test Connectivity
# From HQ LAN, ping Branch LAN ping 192.168.20.10 # Check VPN logs in SmartConsole # Logs & Monitor → Logs # Filter: VPN
Site-to-Site VPN with Third-Party Device
Scenario: Check Point to Cisco ASA
Requirements:
- Check Point Gateway: 203.0.113.10 (LAN: 192.168.10.0/24)
- Cisco ASA: 198.51.100.50 (LAN: 10.0.0.0/24)
- Pre-shared key authentication
Step 1: Create Interoperable Device
- Navigate to Gateways & Servers
- Click "New → Interoperable Device"
- Configure:
- Name: Cisco-ASA-Remote
- IPv4 Address: 198.51.100.50
- Vendor: Cisco
- Click "OK"
Step 2: Configure VPN Domain for Third-Party
- Double-click Cisco-ASA-Remote
- Navigate to Topology tab
- Click "New → Network"
- Configure remote network:
- Name: Cisco_Remote_LAN
- IPv4: 10.0.0.0/24
Step 3: Create VPN Community with Third-Party
- Create new VPN Community
- Add Check Point gateway as Center
- Add Cisco-ASA-Remote as Satellite
- Configure encryption (match Cisco ASA settings)
- Set shared secret
Step 4: Configure Advanced Settings
# For interoperability, configure: - IKE Version: IKEv1 (unless Cisco supports IKEv2) - Perfect Forward Secrecy (PFS): Enable - Renegotiation: Enable - Dead Peer Detection: Enable
Cisco ASA Configuration Example
crypto ikev1 policy 10 encryption aes-256 authentication pre-share group 14 lifetime 86400 tunnel-group 203.0.113.10 type ipsec-l2l tunnel-group 203.0.113.10 ipsec-attributes ikev1 pre-shared-key YourSecretKey123 access-list VPN_ACL extended permit ip 10.0.0.0 255.255.255.0 192.168.10.0 255.255.255.0 crypto ipsec ikev1 transform-set ESP-AES256-SHA esp-aes-256 esp-sha-hmac crypto map OUTSIDE_MAP 10 match address VPN_ACL crypto map OUTSIDE_MAP 10 set peer 203.0.113.10 crypto map OUTSIDE_MAP 10 set ikev1 transform-set ESP-AES256-SHA crypto map OUTSIDE_MAP interface outside
Remote Access VPN Configuration
Overview
Remote Access VPN allows individual users to connect securely to the corporate network using Check Point Endpoint Security VPN client.
Step 1: Enable Remote Access on Gateway
- Double-click Security Gateway
- Navigate to Remote Access tab
- Check "Support Visitor Mode"
- Configure Office Mode:
- Check "Office Mode - Allow Office Mode"
- Method: Manual (use Pool)
Step 2: Configure Office Mode IP Pool
- In Office Mode section, click "New"
- Configure pool:
- Name: VPN_Client_Pool
- IP Address Range: 10.255.255.1 - 10.255.255.254
- Subnet Mask: 255.255.255.0
- Configure DNS/WINS:
- DNS Servers: 192.168.10.10, 192.168.10.11
- WINS Servers: (if applicable)
Step 3: Configure User Authentication
Option 1: Local User Database
- Navigate to Manage & Settings → Users & Administrators
- Click "New → User"
- Configure user:
- Name: vpn_user1
- Password: Strong password
- Authentication: Check Point Password
- In VPN tab:
- Check "Remote Access"
- Encryption method: IKEv2
Option 2: LDAP/Active Directory
- Navigate to Manage & Settings → Servers & Accounts
- Click "New → LDAP Account Unit"
- Configure:
- Server: ldap.company.com
- Port: 389 (or 636 for LDAPS)
- Base DN: dc=company,dc=com
- Bind DN: Service account credentials
Step 4: Create Remote Access VPN Community
- Navigate to VPN Communities
- Right-click → "New VPN Community → Remote Access"
- Configure:
- Name: Remote_Access_VPN
- Participating Gateways: Add your gateway
- In VPN Clients tab:
- Check "Support authentication by user"
- Select users/groups allowed to connect
Step 5: Configure Access Rules for Remote Users
- Create firewall rule:
- Source: Remote_Access_VPN (community object)
- Destination: Internal networks
- VPN: Remote_Access_VPN
- Service: As needed (or Any)
- Action: Accept
- Track: Log
Step 6: Install Policy
Click "Install Policy" Select gateway Click "Install"
Step 7: Download and Install VPN Client
Download Client from Gateway
- From web browser:
https://[gateway-ip]/clients - Download Check Point Endpoint Security VPN
- Install on client computer
Configure VPN Client
- Launch Check Point Endpoint Security VPN
- Click "New Site"
- Configure:
- Site Name: Company VPN
- Gateway Address: 203.0.113.10
- Authentication: Username/Password
- Click "OK"
Step 8: Connect and Test
- Select site in VPN client
- Click "Connect"
- Enter username and password
- Verify connection status
- Test access to internal resources
# Verify on gateway cpd_admin list # Check active VPN users fw tab -t userc_users -f # View VPN sessions vpn shell > show users
SSL VPN (Mobile Access) Configuration
Overview
Mobile Access provides clientless SSL VPN access through web browser. Users access internal applications via portal without installing VPN client software.
Step 1: Enable Mobile Access Blade
- Double-click Security Gateway
- Navigate to Mobile Access tab
- Check "Mobile Access"
- Configure Portal Settings:
- Portal URL: https://vpn.company.com
- Certificate: Upload SSL certificate
Step 2: Configure SSL Certificate
Upload SSL Certificate
- In Mobile Access settings, click "Certificate"
- Select "Import Certificate"
- Upload:
- Certificate file (.pem or .crt)
- Private key file
- CA certificate (if needed)
Or Use Internal CA
# Generate certificate request cpca_client create_cert -n vpn.company.com -o certificate.p12 # Import to gateway
Step 3: Configure Applications
Create Application for Web Access
- Navigate to Applications in Mobile Access settings
- Click "New → Web Application"
- Configure:
- Name: Internal_Web_Portal
- URL: http://intranet.company.local
- Target Servers: Internal web server IPs
Create Application for RDP Access
- Click "New → Windows Application"
- Configure:
- Name: Remote_Desktop
- Application: RDP
- Target Servers: RDP server IPs/names
Step 4: Configure User Access
- In Mobile Access settings, navigate to Users tab
- Click "Add"
- Select users or groups
- Assign applications to users
- Configure access permissions
Step 5: Configure Authentication
- Navigate to Authentication tab
- Select authentication method:
- Check Point Password
- LDAP/Active Directory
- RADIUS
- SecurID
- Configure Multi-Factor Authentication (optional)
Step 6: Configure Portal Customization
- Navigate to Portal tab
- Customize:
- Company logo
- Welcome message
- Colors and theme
- Portal layout
Step 7: Install Policy
Click "Install Policy" Select gateway with Mobile Access Click "Install" Wait for completion
Step 8: Access Mobile Access Portal
- Open web browser
- Navigate to:
https://vpn.company.com - Accept certificate (if self-signed)
- Enter credentials
- Access published applications from portal
Verify Mobile Access Sessions
# SSH to gateway ssh admin@gateway-ip expert # Check Mobile Access status cpca_client lscert -kind ICA # View active sessions fw tab -t ma_users -f # Monitor Mobile Access logs tail -f /var/log/messages | grep -i mobile
Advanced VPN Configuration
Enable IKEv2 for Better Performance
- Edit VPN Community
- Navigate to Advanced Settings → IKE
- Select "Support IKEv2"
- Configure IKEv2 options:
- Enable Aggressive Mode
- Configure authentication method
Configure VPN Performance Optimization
Enable Link Selection
# For multiple ISP connections 1. Navigate to gateway object 2. Topology → Link Selection 3. Configure primary and backup links 4. Set link priorities
Enable SecureXL for VPN
# SSH to gateway ssh admin@gateway-ip expert # Check SecureXL status fwaccel stat # Enable VPN acceleration vpn_acceleration # Verify fwaccel stats
Configure Dead Peer Detection (DPD)
- Edit VPN Community
- Navigate to Advanced → Advanced Settings
- Enable "Use Dead Peer Detection"
- Configure:
- DPD Interval: 30 seconds
- Retry count: 3
Configure Perfect Forward Secrecy (PFS)
- In VPN Community Encryption settings
- Check "Enable Perfect Forward Secrecy"
- Select Diffie-Hellman group (Group 14 or higher recommended)
Configure NAT Traversal (NAT-T)
# Automatically enabled for gateways behind NAT # Verify NAT-T configuration: 1. Gateway object → NAT tab 2. Enable "Gateway is behind NAT" 3. Configure NAT IP address 4. NAT-T uses UDP port 4500
VPN Troubleshooting
Common VPN Issues and Solutions
Issue 1: VPN Tunnel Not Establishing
Check:
# Verify gateway reachability ping [remote-gateway-ip] # Check IKE Phase 1 vpn debug on TDERROR_ALL_ALL=5 vpn debug trunc # Verify shared secret matches # Check encryption settings match on both sides # Stop debug vpn debug off
Common Causes:
- Incorrect shared secret
- Mismatched encryption settings
- Firewall blocking UDP 500/4500
- Incorrect VPN domain configuration
Issue 2: Tunnel Established but No Traffic
Check:
# Verify encryption domains fw ctl zdebug + drop | grep vpn # Check routing netstat -rn # Verify firewall rules allow VPN traffic fw tab -t connections -f | grep [remote-ip] # Check NAT exemption rules
Solutions:
- Add firewall rule allowing traffic through VPN
- Configure NAT exemption (No-NAT rule)
- Verify routing for encryption domain
- Check proxy ARP settings
Issue 3: Remote Access Users Cannot Connect
Check:
# Verify Office Mode pool fw tab -t om_assigned_pools -f # Check user authentication fw tab -t userc_users -f # Review IKE logs vpn debug ikeon tail -f $FWDIR/log/ike.elg # Check license cplic print
Common Causes:
- Office Mode IP pool exhausted
- Incorrect user credentials
- VPN blade not licensed
- Client version incompatibility
Issue 4: Mobile Access Portal Not Loading
Check:
# Verify Mobile Access processes cpwd_admin list | grep -i mobile # Check SSL certificate cpca_client lscert # Review Mobile Access logs tail -f /var/log/maint # Test portal connectivity curl -k https://[gateway-ip]
VPN Debug Commands
# Enable IKE debug vpn debug on TDERROR_ALL_ALL=5 # View IKE debug output vpn debug trunc # Enable IPsec debug fw ctl zdebug + vpn # View VPN kernel debug fw ctl debug -buf 32000 fw ctl kdebug -T -f > /var/log/vpn_debug.txt # Stop all debugs vpn debug off fw ctl zdebug - fw ctl debug 0
VPN Monitoring Commands
# View all VPN tunnels vpn tu # Detailed tunnel information vpn tu tlist # Show Security Associations (SA) vpn shell > show ipsec all # Check VPN statistics cpstat vpn # Monitor real-time VPN traffic fw monitor -e "accept vpn;" # View VPN users vpn shell > show users
VPN Performance Optimization
1. Enable Hardware Acceleration
# Check acceleration status vpn_acceleration # Enable VPN acceleration fwaccel on # Verify fwaccel stat fwaccel stats -s
2. Optimize Encryption Settings
- Use AES-GCM for better performance (combines encryption and authentication)
- Enable hardware crypto if available
- Use IKEv2 instead of IKEv1
- Configure appropriate key lifetimes
3. Configure Tunnel Compression
- Edit VPN Community
- Navigate to Advanced → VPN Options
- Enable "Enable Compression"
- Select compression method (LZS recommended)
4. Optimize Office Mode Pool
# Size pool appropriately # Monitor pool usage fw tab -t om_assigned_pools -s # If pool exhausted, expand range
5. Enable Concurrent Connections
# Allow multiple VPN connections from same user # Gateway object → Remote Access # Enable "Allow multiple concurrent connections"
VPN High Availability
VPN with ClusterXL
For high availability, deploy VPN on ClusterXL cluster:
Cluster VPN Configuration
- Configure ClusterXL cluster (Active/Standby or Load Sharing)
- Enable VPN on cluster object (not individual members)
- Configure VPN domain on cluster object
- Create VPN community using cluster object
- Install policy on cluster
VPN State Synchronization
# Verify state synchronization cphaprob state cphaprob syncstat # Check VPN synchronization vpn shell > show ha state
Backup Gateway Configuration
- Configure backup gateway in VPN community
- Set priority for primary gateway
- Enable automatic failover
- Configure identical encryption settings
VPN Security Best Practices
Encryption Best Practices
- Use Strong Encryption: AES-256 minimum
- Use Strong Hash: SHA-256 or SHA-384
- Diffie-Hellman: Group 14 (2048-bit) minimum
- Avoid Weak Algorithms: No DES, 3DES, MD5
- Enable PFS: Perfect Forward Secrecy for additional security
- Use IKEv2: More secure than IKEv1
Authentication Best Practices
- Strong Pre-Shared Keys: Minimum 20 characters, complex
- Use Certificates: For large deployments
- Multi-Factor Authentication: Enable for remote access VPN
- Regular Key Rotation: Change pre-shared keys periodically
- User Account Management: Disable unused accounts
Monitoring and Logging
- Enable logging for all VPN connections
- Monitor VPN tunnel status regularly
- Alert on VPN tunnel failures
- Review VPN logs for anomalies
- Track user VPN sessions
- Monitor Office Mode pool usage
Access Control
- Implement least privilege access
- Restrict VPN access to required networks only
- Use granular firewall rules for VPN traffic
- Implement split tunneling controls
- Configure idle timeout for remote access users
Maintenance Best Practices
- Keep gateways updated with latest hotfixes
- Regular VPN client updates for remote users
- Test VPN failover scenarios
- Backup VPN configurations
- Document VPN topology and settings
- Regular security audits of VPN configuration
VPN Configuration Checklist
Site-to-Site VPN Checklist
- ☐ VPN blade enabled on both gateways
- ☐ Network objects created for encryption domains
- ☐ VPN domains configured on gateway objects
- ☐ VPN community created (Star or Meshed)
- ☐ Encryption settings configured and match both sides
- ☐ Shared secret configured (or certificates)
- ☐ Firewall rules allow VPN traffic
- ☐ NAT exemption rules configured
- ☐ Routing configured for encryption domains
- ☐ Policy installed on both gateways
- ☐ VPN tunnel status verified (vpn tu)
- ☐ Traffic test successful
Remote Access VPN Checklist
- ☐ Remote Access blade enabled
- ☐ Office Mode pool configured
- ☐ DNS/WINS servers configured
- ☐ User authentication configured (local/LDAP/RADIUS)
- ☐ VPN users created with Remote Access permission
- ☐ Remote Access VPN community created
- ☐ Firewall rules allow remote access traffic
- ☐ Policy installed
- ☐ VPN client downloaded and installed
- ☐ Client site configured
- ☐ Test connection successful
- ☐ Access to internal resources verified
Mobile Access (SSL VPN) Checklist
- ☐ Mobile Access blade enabled
- ☐ SSL certificate configured
- ☐ Portal URL configured
- ☐ Applications published (Web, RDP, etc.)
- ☐ Users/groups assigned to applications
- ☐ Authentication method configured
- ☐ Portal customized (optional)
- ☐ Policy installed
- ☐ Portal accessible from browser
- ☐ User login successful
- ☐ Applications accessible through portal
Quick Reference - VPN Commands
# VPN Tunnel Status vpn tu # List all tunnels vpn tu tlist # Detailed tunnel info vpn shell # VPN shell # VPN Debug vpn debug on TDERROR_ALL_ALL=5 # Enable IKE debug vpn debug trunc # View debug output vpn debug off # Stop debug fw ctl zdebug + vpn # IPsec debug # VPN Statistics cpstat vpn # VPN statistics fw tab -t userc_users -f # Active VPN users fw tab -t om_assigned_pools -f # Office Mode pool # VPN Monitoring fw monitor -e "accept vpn;" # Monitor VPN traffic tail -f $FWDIR/log/ike.elg # IKE logs # Mobile Access fw tab -t ma_users -f # Mobile Access users cpwd_admin list | grep mobile # Mobile Access process # Cluster VPN cphaprob state # Cluster status cphaprob syncstat # Sync status
Conclusion
Check Point VPN provides comprehensive secure connectivity solutions for both site-to-site and remote access scenarios. Whether connecting branch offices with IPsec Site-to-Site VPN, enabling remote workers with IPsec Remote Access VPN, or providing clientless access through Mobile Access SSL VPN, Check Point offers flexible, secure, and scalable VPN solutions.
Proper VPN configuration requires careful planning of encryption domains, appropriate encryption settings, strong authentication mechanisms, and comprehensive firewall rules. By following the step-by-step procedures in this guide, you can successfully implement secure VPN connectivity while maintaining high performance and reliability.
Regular monitoring, proper troubleshooting procedures, and adherence to security best practices ensure that your Check Point VPN infrastructure provides secure, reliable connectivity for your organization. Always use strong encryption, enable logging, implement multi-factor authentication for remote users, and keep your VPN infrastructure updated with the latest security patches.
Remember that VPN security is only as strong as its weakest link—use strong encryption algorithms, complex pre-shared keys or certificates, implement proper access controls, and regularly audit your VPN configuration to maintain a secure remote connectivity solution.