Configuring SD-WAN Device

After you create the site at Check Point Harmony Connect, on this site you must configure your branch office to route traffic through Harmony Connect.

Check Point creates the back-end architecture for tunneling the traffic from the branch device to the Internet.

Notes:

  • To enhance the service reliability, we recommend you to create and use two tunnels.

  • If you use IPsec tunnels, Check Point provides the tunnel addresses as FQDN domains. If your branch device supports configuration of the tunnels as IP addresses, and not as FQDN domains, Check Point strongly recommends to send a notification to Check Point Support about your configuration. For more information about how to open a support ticket for Harmony Connect, see sk154712.

To configure your branch device:

  1. On the site thumbnail, click the Configure branch device button.

    The Instructions window opens.

  2. From the top field, select your SD-WAN branch office device.

  3. Follow the instructions on the screen to get the IPsec configuration properties, pre-shared key, tunnel addresses, and the traffic routes.

  4. Click Close.

Configuring Cradlepoint on the SD-WAN Device

Refer to the Cradlepoint SD-WAN Help for additional information.

To configure Cradlepoint on your SD-WAN Device, perform these steps:

  1. Log into your Cradlepoint NetCloud.

  2. Create and configure two Check Point IPSec Tunnels and route the traffic through the tunnels. See Creating the First IPSec Tunnel.

  3. Test your configuration. See Creating the Second IPSec Tunnel.

Creating the First IPSec Tunnel

To prevent cyberattacks and enforce the Check Point access control, traffic from subnets will be tunneled through Check Point Network Security as a Service. You must create two IPSec tunnels for redundancy. The changes are applied immediately.

Note - Tunnel Name must be an alias for this tunnel. In this case, the names are Check-Point-IPSec1 and Check-Point-IPSec2.

Locate your device and connect to its local management user interface.

Testing the First Tunnel Configuration

To test the Harmony Connect first tunnel configuration, you must check its activity on your branch office device. You can do it from the Cradlepoint web management and / or from the Check Point Infinity Portal.

Creating the Second IPSec Tunnel

Check Point provides 2 IPsec tunnels for the redundancy.

The changes are applied immediately.

Note - Tunnel Name must be an alias for this tunnel. In this case, the names are Check-Point-IPSec1 and Check-Point-IPSec2.

Locate your device and connect to its local management user interface.

Now you can monitor the Cybersecurity Events on the Check Point Infinity Portal. See Monitoring Cybersecurity Events.