{"id":412,"date":"2010-04-08T13:09:28","date_gmt":"2010-04-08T13:09:28","guid":{"rendered":"https:\/\/fir3netwp.gmsrrpobkbd.com\/2010\/04\/08\/creating-a-basic-route-based-vpn-between-2-checkpoint-firewalls\/"},"modified":"2023-02-24T13:07:46","modified_gmt":"2023-02-24T13:07:46","slug":"creating-a-basic-route-based-vpn-between-2-checkpoint-firewalls","status":"publish","type":"post","link":"https:\/\/www.fir3net.com\/Firewalls\/Check-Point\/creating-a-basic-route-based-vpn-between-2-checkpoint-firewalls.html","title":{"rendered":"Create a Basic Route Based VPN between 2 Check Point Firewalls"},"content":{"rendered":"
Within this example we will build a Route Based VPN between 2 SPLAT R65 NGX Check Point Firewalls. Static Routes will used to direct the traffic via the VPN Tunnel Interfaces.<\/p>\n
In this example both Firewalls are managed by the same manager. The gateways are :<\/p>\n
In order to build a route based vpn we need to create VPN Tunnel Interfaces. A VPN Tunnel Interface is a virtual interface on a VPN-1 module, which is associated with an existing VPN tunnel, and is used by IP routing as a point to point interface directly connected to a VPN peer gateway.<\/p>\n
Virtual Tunnel Interfaces (VTI’s)<\/strong><\/span><\/p>\n VTIs can be created only on SPLAT and IPSO (3.9 or above). Though you can only create numbered VTIs within SPLAT. A numbered tunnel interface has a unique IP address assigned to it, while an unnumbered tunnel interface does not. Steps <\/strong><\/span><\/p>\n Create Object<\/strong><\/p>\n Site A<\/strong><\/p>\n Site B<\/strong><\/p>\n General<\/strong><\/p>\n Add Static Routes<\/strong><\/p>\n Additional Notes :<\/em><\/strong><\/p>\n Below shows you the syntax used to create the VTIs :<\/p>\n Additional Resources :<\/strong><\/em><\/p>\n For further information on Route Based Check Point VPNs along with how to create a Route Based VPN between a Cisco device and Check Point device please see here <\/a> <\/p>\n","protected":false},"excerpt":{"rendered":" Within this example we will build a Route Based VPN between 2 SPLAT R65 NGX Check Point Firewalls. Static Routes will used to direct the traffic via the VPN Tunnel Interfaces. In this example both Firewalls are managed by the same manager. The gateways are : Site A – External 192.168.1.1 Inside 10.1.1.1 Site B … Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[],"yoast_head":"\n
\nIn order to create VTI`s you will need to ensure you are running SPLAT Pro. And that the Dynamic Routing feature is enabled. You will also need the nessecary license for this feature.<\/p>\n\n
\n
vpn shell i a n 22.22.22.1 22.22.22.2 SiteB<\/pre>\n<\/li>\n
\n
vpn shell i a n 22.22.22.2 22.22.22.1 SiteA<\/pre>\n<\/li>\n
\n
\n
route add -net 10.1.1.0 netmask 255.255.255.0 dev vt-SiteB ; route --save<\/pre>\n<\/li>\n
route add -net 10.1.2.0 netmask 255.255.255.0 dev vt-SiteA ; route --save<\/pre>\n<\/li>\n<\/ol>\n
[Expert@fw]# vpn shell i a n\r\nUsage: \/interface\/add\/numbered <LocalIP> <RemoteIP> <PeerName> [IfName]\r\n\u00a0 LocalIP\u00a0 - The local IP of the tunnel\r\n\u00a0 RemoteIP - The remote IP of the tunnel\r\n\u00a0 PeerName - The peer to attach to this interface\r\n\u00a0 IfName\u00a0\u00a0 - The name of the interface to be used<\/pre>\n
\n(You will need to login into the Check Point UserCentre prior to accessing this link) <\/em><\/p>\n