SD-WAN Configuration for DAIP Security Gateways
This section describes SD-WAN " " configuration for Security Gateways with a Dynamically Assigned IP Address (DAIP).
For frequently asked questions about DAIP, see sk167473.
SD-WAN Requirements for DAIP Security Gateways
SD-WAN Security Gateway |
Supported Versions |
---|---|
Security Gateways that run Gaia OS |
R81.20 Jumbo Hotfix Accumulator, Take 43 and higher. |
Quantum Spark Appliances |
R81.10.10 and higher. |
SD-WAN Support for DAIP Security Gateways
-
SD-WAN supports DAIP Security Gateways in a Star VPN Community or a Mesh VPN Community:
-
Supports a VPN tunnel when one VPN peer is a Security Gateway with a Dynamically Assigned IP Address (DAIP) and another VPN peer is a Security Gateway with a Static IP address.
-
Supports a VPN tunnel when all VPN peers are Security Gateways with a Dynamically Assigned IP Address (DAIP).
SD-WAN supports this configuration only if the corresponding SD-WAN interfaces on all VPN peers receive their IP addresses dynamically and connect to the Internet directly (not through a NAT device).
-
-
SD-WAN supports Security Gateways with different IP configuration on their SD-WAN interfaces - an SD-WAN interface with a Dynamically Assigned IP Address (DAIP), and other SD-WAN interfaces with a Static IP address.
-
Quantum Spark appliances can have one or more DAIP SD-WAN interfaces.
-
-
SD-WAN supports automatic renewal of VPN tunnels on DAIP SD-WAN interfaces:
-
A VPN tunnel recovers automatically after an IP address changes on a DAIP interface that participates in this VPN tunnel:
[Security Gateway] (DAIP SD-WAN interface) --- [VPN Tunnel]
-
A VPN tunnel recovers automatically after an IP address changes on an IP NAT device in front of an SD-WAN interface that participates in this VPN tunnel:
[Security Gateway] (SD-WAN interface) (Dynamic IP NAT Device) --- [VPN Tunnel]
-
SD-WAN Known Limitations for DAIP Security Gateways
-
Security Gateway object in SmartConsole must be configured as "Dynamic address" (on the General Properties page).
Note - It is not supported to change this setting in an existing Security Gateway object.
You must delete it and create a new object.
-
IKE negotiation:
-
If each DAIP Security Gateway in a VPN Community uses a DAIP SD-WAN interface without a dynamic IP NAT device in front of it, then each VPN peer can initiate the IKE negotiation.
[Security Gateway 1] (DAIP SD-WAN interface 1) <===> [VPN Tunnel] <===> (DAIP SD-WAN interface 2) [Security Gateway 2]
-
If a Security Gateway in a VPN Community has a dynamic IP NAT device in front it, then this DAIP Security Gateway can only be the IKE-initiator for this VPN tunnel (cannot be the IKE-responder).
[Security Gateway 1] (SD-WAN interface 1) (Dynamic IP NAT Device) ===> [VPN Tunnel] ===> (SD-WAN interface 2) [Security Gateway 2]
-
-
Configuration where a dynamic IP NAT device is connected in front of each SD-WAN Security Gateway is not supported (CGNAT-to-CGNAT):
[Security Gateway 1] (SD-WAN interface 1) (Dynamic IP NAT Device 1) <===>
<===> [VPN Tunnel] <===>
<===> (Dynamic IP NAT Device 2) (SD-WAN interface 2) [Security Gateway 2]
-
After an IP address changes on an IP NAT device in front of an SD-WAN interface that participates in a VPN tunnel, it takes approximately 5 minutes for the VPN tunnel to negotiate again:
[Security Gateway] (SD-WAN interface) (Dynamic IP NAT Device) <===> [VPN Tunnel] <===>
-
DNS resolving is not supported for DAIP Security Gateways.
-
For a Branch Security Gateway that is configured as a DAIP Security Gateway and performs "Backhaul" through the Center Security Gateway (see Routing Preference "Backhaul Only"):
You must make sure that the Branch Security Gateway has a direct Internet access. When the IP address changes on the Branch Security Gateway, and its VPN tunnels go down, the Center Security Gateway and other VPN peers must be able to get the new IP address of the Branch Security Gateway.
You must configure the SD-WAN Policy to match connections that the Branch Security Gateway creates (local connections) to a Steering Behavior configured as "Local Breakout Only" (see Routing Preference "Local Breakout Only") or "Prioritize Local Breakout" (see Routing Preference "Prioritize Local Breakout").
SD-WAN Configuration for DAIP Security Gateways
|
Important - Schedule a maintenance window. |
Part 1 - On a Security Gateway, configure the DAIP settings
Follow the applicable procedure.

|
Note - This applies only to a new Security Gateway, on which you can run the Gaia First Time Configuration Wizard. |
-
During the Gaia First Time Configuration Wizard, in the Dynamically Assigned IP window, you must select Yes.
Refer to the Gaia Administration Guide for your version > Chapter "Configuring Gaia for the First Time" > Section "Running the First Time Configuration Wizard in Gaia Portal".
-
Install the required R81.20 Jumbo Hotfix Accumulator.
-
Follow Step 3 - Configuration on Security Gateways > section "Part 2 - Configuration of SD-WAN interfaces on the Security Gateway" > subsection "Procedure for a Security Gateway that runs Gaia OS".
In Gaia Portal, on the SD-WAN tab of the interface settings, select:
-
Use as SD-WAN interface.
-
Directly accessible.
-

|
Note - This applies to a Security Gateway that was not configured as DAIP in the Gaia First Time Configuration Wizard. |
|
Best Practice - Collect the Gaia Backup. Refer to the Gaia Administration Guide for your version > Chapter "Maintenance" > Section "System Backup". |
-
Connect to the command line on the Security Gateway.
-
Log in to the Expert mode.
-
Configure this Security Gateway as DAIP:
cpprod_util FwSetDAG 1
-
In Gaia Portal, configure each applicable interface as an SD-WAN interface:
Note - For the applicable Gaia Clish commands, see Step 3 - Configuration on Security Gateways > section "Part 2 - Configuration of SD-WAN interfaces on the Security Gateway" > subsection "Procedure for a Security Gateway that runs Gaia OS".
-
In the Network Management section, click the Network Interfaces page.
-
Select and edit each SD-WAN interface.
-
On the SD-WAN tab of the interface settings, select:
-
Use as SD-WAN interface.
-
Directly accessible.
-
-
Click OK.
-
-
If you already configured a Security Gateway object in SmartConsole for this Security Gateway, then reset SIC on the Security Gateway.
Procedure
Best Practice - Perform this step over a direct connection to the Security Gateway - through the console port, or LOM Card (if it is installed).
Note - For the complete procedure, see sk65764. In this step, you reset SIC only on the Security Gateway. In Part 2 below, you reset SIC in SmartConsole in the Security Gateway object.
-
Run:
cpconfig
-
Enter the number of the option "Secure Internal Communication".
-
Confirm that you wish to re-initialize the communication.
-
Enter the new activation key.
You must enter this key later in SmartConsole in the Security Gateway object (in Part 2 below).
-
Exit from the Check Point Configuration Tool.
-
The Security Gateway stops and starts all Check Point processes.
Warning - If you are connected over SSH, your session may disconnect.
-

|
Note - For the complete procedure, see Step 3 - Configuration on Security Gateways > section "Part 2 - Configuration of SD-WAN interfaces on the Security Gateway" > subsection "Procedure for Quantum Spark Appliance that runs Gaia Embedded OS" > subsection "Configuration of a Quantum Spark Appliance in the WebUI". |
-
Connect to the WebUI.
-
From the left tree, click Device.
-
In the middle pane, expand the section Network and click Internet.
-
Select and edit the Internet connection.
-
At the top, click the Configuration tab:
-
Expand the section Internet Configuration.
-
In the Type field, select the applicable option :
-
If this interface gets its IP address dynamically, then select DHCP.
-
If this interface has a static IP address, then select Static IP.
-
-
-
Click Save.
-
If you already configured a Security Gateway object in SmartConsole for this Quantum Spark appliance, then reset SIC on the appliance.
Procedure
Note - For the complete procedure, see sk65764. In this step, you reset SIC only on the appliance. In Part 2 below, you reset SIC in SmartConsole in the Security Gateway object.
-
Connect to the WebUI.
-
From the left tree, click Home.
-
In the middle pane, expand the section Overview and click Security Management.
-
In the Security Management Server section, click Advanced.
-
Click Reinitialize Trusted Communication.
-
A warning message appears.
-
Click Yes.
-
The appliance unloads the central policy and applies only the local policy.
-
Part 2 - In SmartConsole, configure the Security Gateway Object
Follow the applicable procedure.
|
Note - If you already configured a Security Gateway object in SmartConsole, then you must reset SIC in this object, delete it, and then create a new object. |

-
Back up the current management database on the Management Server:
-
Connect with SmartConsole to the applicable Security Management Server or Domain Management Server that manages this Security Gateway.
-
From the left navigation panel, click Gateways & Servers.
-
Double-click the existing Security Gateway object.
-
Reset the Secure Internal Communication (SIC) between the Management Server and this Security Gateway:
Note - For the complete procedure, see sk65764. In this step, you reset SIC in the Security Gateway object.
-
Near the Secure Internal Communication field, click Communication.
-
In the Certificate state field, click Reset and click Yes to confirm.
Click OK.
-
Click OK.
-
-
Click OK.
-
Right-click the Security Gateway > click Delete.

-
Connect with SmartConsole to the applicable Security Management Server or Domain Management Server that should manage this Security Gateway.
-
From the left navigation panel, click Gateways & Servers.
-
From the top toolbar, click the New (
) > Gateway.
-
In the Check Point Security Gateway Creation window, click Classic Mode.
-
In the Name field, enter the applicable name for this Security Gateway object.
-
Select Dynamic Address.
Note - You must select this checkbox in these cases:
-
The SD-WAN interface receives its IP address dynamically (from a DHCP server, from a PPPoE provider).
-
The SD-WAN interface has a static IP address, but this IP address can change from time to time.
-
The SD-WAN interface has a static IP address that does not change, but connects to a NAT device that in turn receives its IP address dynamically.
-
-
Establish the Secure Internal Communication (SIC) between the Management Server and this Security Gateway:
-
Near the Secure Internal Communication field, click Communication.
-
In the Platform field, select Open server / Appliance.
-
Enter the same Activation Key you entered:
-
During the Gaia First Time Configuration Wizard on a new Security Gateway.
-
When you reset SIC on an existing Security Gateway.
-
-
Click Initialize.
-
Click OK.
-
-
In the Platform section, select the correct options.
-
Enable the applicable Software Blades (refer to the list of SD-WAN limitations).
-
On the Network Management page, configure interfaces:
-
Click Get Interfaces > Get Interfaces With Topology > click Close.
-
Select and edit each interface.
-
In each DAIP interface, in the General section, select Dynamic IP.
-
Click OK.
-
-
Click OK.

-
Connect with SmartConsole to the applicable Security Management Server or Domain Management Server that should manage this Security Gateway.
-
From the left navigation panel, click Gateways & Servers.
-
From the top toolbar, click the New (
) > Gateway.
-
In the Check Point Security Gateway Creation window, click Classic Mode.
-
In the Name field, enter the applicable name for this Security Gateway object.
-
Select Dynamic Address.
-
In the Platform section, select the correct options.
-
Establish the Secure Internal Communication (SIC) between the Management Server and this Security Gateway:
-
Near the Secure Internal Communication field, click Communication.
-
In the Platform field, select Small Office Appliance.
-
In the Authentication section:
-
Select Initiate trusted communication securely by using a one-time password.
-
Enter a one-time password (SIC activation key).
-
-
In the Trusted Communication Initiation section:
-
Select Initiate trusted communication automatically when the Gateway connects to the Security Management server for the first time.
-
In the field Identify appliance according to, select the applicable option and enter the required value.
-
-
Click OK.
-
-
Enable the applicable Software Blades (refer to the list of SD-WAN limitations).
-
On the Topology page, configure each DAIP interface:
-
In the Security Blades section, select Manually defined on the Security Management server, based on the below Topology Table.
-
In the Topology Table section, select the interface and click Edit.
-
In the Security and VPN Blades Topology section, select External (leads out to the Internet).
-
In the IP settings section, select Dynamic IP.
-
Click OK.
-
In the Security Blades section, if needed, select Automatically calculated by the gateway, based on the gateway's Routing Table.
-
-
Click OK.
Part 3 - In SmartConsole, configure the Access Control Policy

If it is necessary to use "Access Control rule:
" probing, then configure the requiredFor Security Gateways with a Dynamically Assigned IP Address (DAIP):
-
Configure this Access Control rule:
Note - The object "
LocalMachine_All_Interfaces
" is enforced only on DAIP Security Gateways. -
Install the Access Control policy only on the DAIP Security Gateways.
For Security Gateways that are VPN peers with DAIP Security Gateways:
-
Configure this Access Control rule:
-
Install the Access Control policy only on the Center Security Gateway.
Part 4 - In Infinity Portal, configure the SD-WAN Policy

If it is necessary to use "SD-WAN rules:
" probing, then configure these-
Log in to Check Point Infinity Portal.
-
Click the top left > in the section Quantum, click SD-WAN.
-
From the top toolbar, create the applicable new rules.
Option 1 - Configure a specific rule for " " Probing
For Security Gateways with a Dynamically Assigned IP Address (DAIP):
Note - The object "
LocalMachine_All_Interfaces
" is enforced only on DAIP Security Gateways.For Security Gateways that are VPN peers with DAIP Security Gateways:
-
From the top toolbar, click Publish to save the changes.
-
From the top toolbar, click Enforce to apply the changes.
In the popup window that opens, click Publish & Enforce Policy.
SD-WAN Troubleshooting for DAIP Security Gateways

You can use these CLI commands on the local Security Gateway to monitor if it learns the new IP address of a DAIP VPN peer: