VPN with a Virtual Gateway in a Cloud

This section describes Site to Site VPNClosed An encrypted tunnel between two or more Security Gateways. Synonym: Site-to-Site VPN. Contractions: S2S VPN, S-to-S VPN. Tunnel between an on-premises VPN Gateway and a Virtual Gateway in a Cloud.

You can configure a Site to Site VPN tunnel between an on-premises Check Point Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. and a Virtual Gateway in a Virtual Private Cloud.

R82 supports this feature only for:

  • Amazon Web Services (AWS)

  • Microsoft Azure

Configuration Flow for Site to Site VPN Tunnels with a Cloud

  1. An Administrator configures the required settings in SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. - configures a new Site to Site VPN Tunnel, or deletes an existing Site to Site VPN Tunnel.

  2. An Administrator installs the Security PolicyClosed Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection. on the on-premises VPN Gateway / VPN ClusterClosed Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. automatically.

  3. In addition to the Security Policy, the Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. creates the required one-time configuration instructions (VTI, Dynamic Routing) for the on-premises VPN Gateway / VPN Cluster Members.

  4. The Management Server sends the Security Policy and the one-time configuration instructions to the on-premises VPN Gateway / VPN Cluster Members

  5. The on-premises VPN Gateway / VPN Cluster Members install the Security Policy.

  6. The on-premises VPN Gateway / VPN Cluster Members run the one-time configuration instructions (VTI, Dynamic Routing).

  7. The Management Server deletes these one-time configuration instructions (VTI, Dynamic Routing) from its database.

Prerequisites for Site to Site VPN Tunnels with a Cloud

  1. Publish the SmartConsole session.

  2. Install the applicable Security Policies on the on-premises VPN Gateway / VPN Cluster, for which you plan to configure (or remove) the Site to Site VPN Tunnel with a Virtual Gateway in a Cloud.

Limitations of Site to Site VPN Tunnels with a Cloud

Important Notes for Site to Site VPN Tunnels with a Cloud

  • When you configure a new Site to Site VPN Tunnel or delete an existing one, you must not configure other settings or objects that the procedures below do not mention explicitly.

    If you must make other configuration changes, you must do them before or after the procedures below.

  • If the configuration of a new Site to Site VPN Tunnel does not work, then delete the current configuration, install the Security Policy, and configure the required settings again.

  • If it is necessary to change the configuration of an existing Site to Site VPN Tunnel (for example, select a different Virtual Gateway in the cloud), then delete the current configuration, install the Security Policy, and configure the required settings.

  • If it is necessary to revert to a Database Revision on the Management Server, you must make sure the Site to Site VPN Tunnel configuration in that Database Revision matches the Site to Site VPN Tunnel configuration on the on-premises VPN Gateway / VPN Cluster Members.

    For information about Database Revision, see the R82 Security Management Administration Guide > Chapter "Preferences and Management Settings" > Section "Database Revisions".

    You must follow the applicable scenario:

    Important - If you do the revert procedure incorrectly or it fails, the Site to Site VPN Tunnel configuration on Security Gateway and Management Server does not match anymore. Contact Check Point Support and refer to sk179691.

Configuring a New Site to Site VPN Tunnel with a Cloud

Removing an Existing Site to Site VPN Tunnels with a Cloud

  1. In SmartConsole, delete the applicable configuration from the Virtual Gateway or the on-premises Check Point Security Gateway.

  2. Publish the SmartConsole session.

  3. Install the Access Control Policy on the Check Point Security Gateway.

Monitoring Site to Site VPN with Cloud

Starting from R82, use automated synchronization for your cloud and on-premises environments with Check Point's advanced self-healing solution. Through continuous monitoring, it autonomously detects changes and seamlessly applies them, which provides optimal functionality for your Site to Site VPN tunnels.

  • When changes are applied to encryption settings within the cloud environment (such as AWS, Azure, and Google Workspace), they seamlessly synchronize with the corresponding configurations on the on-premises infrastructure. For these adjustments to become operational, the on-premises administrator is required to install the relevant policies. An informative notification is displayed in the SmartConsole interface, alerting the administrator to this requirement. In addition, these alterations are duly documented in the system logs for reference and auditing purposes.

  • Changes to BGP (Border Gateway Protocol) and routing configurations enacted in the cloud environment are automatically propagated to the corresponding setups on the on-premises infrastructure. However, the implementation of these changes is contingent upon the installation of the requisite policies. Administrators are immediately notified of this requirement through popup messages. Furthermore, comprehensive logging mechanisms document these adjustments for traceability and analysis purposes.

  • When a Site to Site VPN tunnel is deleted in the cloud infrastructure, the corresponding tunnel on the on-premises side is automatically removed, subject to pending policy installation. Administrators are immediately alerted to this event through a pop-up notifications and comprehensive logging records are generated. Similarly, should the Site to Site VPN tunnel be re-established within the cloud environment, the corresponding tunnel on the on-premises infrastructure is automatically reinstated. This is provided that both the cloud VPN peer and the on-premises Security Gateway remain within the same VPN Community.