VPN with External VPN Gateways

Configuring Site to Site VPN with External VPN Gateways Using Certificates

This section applies to typical configurations of a VPN with External Security Gateways, and assumes that the peers work with certificates.

If this is not the case, see Configuring Site to Site VPN with External VPN Gateways Using Pre-Shared Secret.

To configure Site to Site VPNClosed An encrypted tunnel between two or more Security Gateways. Synonym: Site-to-Site VPN. Contractions: S2S VPN, S-to-S VPN. with an externally managed VPN peer, you and the peer administrator must choose the same Certificate Authority (CA) for communication between the two VPN peers.

Even if each of the peer VPN Gateways uses a Check Point Internal CA (ICAClosed Internal Certificate Authority. A component on Check Point Management Server that issues certificates for authentication.), if they are not managed by the same Security Management ServerClosed Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. then their ICAs are different.

Example - A Check Point Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. located at a headquarters office and a peer Check Point Security Gateway located at a branch office are managed separately. Each peer Security Gateway uses a different Check Point ICA and has different parameters for encryption. The administrators of the two networks must agree on a CA for communication between the two peers.

Note - Configuring a VPN with PKI and certificates is more secure than with pre-shared secrets.

Configuring Site to Site VPN with External VPN Gateways Using Pre-Shared Secret

Administrators of the peer VPN Security Gateways must coordinate with each other and agree on all details. The administrators must manually supply details such as the IP address and the VPN domain topology. These details cannot be detected automatically.

There are many possible scenarios for VPN with external Security Gateways. The next procedure is meant for typical cases and assumes that the peers work with pre-shared secrets. If the peers do not work with pre-shared secrets, see Configuring a VPN with External Security Gateways Using Certificates".

Note - It is more secure to configure a VPN with public key infrastructure (PKI) and certificates than with pre-shared secrets.