This guide walks you through the process to configure the Check Point security gateway for integration with the Google Cloud VPN. This information is provided as an example only. Please note that this guide is not meant to be a comprehensive overview of IPsec and assumes basic familiarity with the IPsec protocol.
Environment overview
The equipment used in the creation of this guide is as follows:
- Vendor: Check Point
- Model: Check Point vSec
- Software Release: R80.10
Topology
The topology outlined by this guide is a basic site-to-site IPsec VPN tunnel configuration using the referenced device:

Before you begin
Prerequisities
To use a Check Point security gateway with Cloud VPN make sure the following prerequisites have been met:
- The Check Point Security Gateway is online and functioning with no faults detected.
- There is root access to the Check Point Security Gateway.
- There is at least one configured and verified functional internal interface.
- There is one configured and verified functional external interface.
IPsec parameters
The following parameters and values are used in the Gateway’s IPSec configuration for the purpose of this guide. Cloud VPN supports extensive list of ciphers that can be used per your security policies.
These are the Cipher configuration settings for IKE phase 1 and phase 2 that are used in this guide.
Configuring policy-based IPsec VPN
Below is a sample environment to walk you through set up of policy based VPN. Make sure to replace the IP addresses in the sample environment with your own IP addresses.
Cloud VPN
Check Point
Configuration - GCP
Configuring Cloud VPN
To configure Cloud VPN: 1. In the Google Cloud Platform Console, select Networking > Create VPN connection.
-
Click CREATE VPN CONNECTION.
-
Populate the fields for the gateway and tunnel as shown in the following table and click Create:

Configuring a static route
- In Google Cloud Platform Console, go to Routes > Create Route.
- Enter the parameters as shown in the following table and click Create.

Note: Add ingress firewall rules to allow inbound network traffic as per your security policy.
Configuration - Check Point Security Gateway
To create an Interoperable Device for Cloud VPN on the Check Point SmartConsole:
Step 1. Open SmartConsole > New > More > Network Object > More > Interoperable Device.
Step 2. Configure the IP address associated with Cloud VPN peer (external IP).
Step 3. Go to General Properties > Topology and manually add Google cloud IP addresses.

Step 4. Create a star community.
- Open SmartConsole > Security Policies > Access Tools > VPN Communities.
- Click Star Community. The New Star Community window opens.
- Enter an Object Name for the VPN Community.
- In the Center Gateways area, click the plus sign to add a Check Point Security Gateway object for the center of the community.
- In the Satellite Gateways area, click the plus sign to add the GCP gateway object.

Step 5. Configure these ciphers for IKEv1.
Go to Encryption and change the Phase 1 and Phase 2 properties according what is specified in the Cipher configuration settings on page 3.
Note: Make sure you select Perfect Forward Secrecy (Phase 2). This example refers to IKEv1. You can also use IKEv2 in this scenario.

Step 6. Go to the Advanced tab and modify the Renegotiation Time.
- IKE for Phase 1: 610 minutes
- IKE for Phase 2: 10,800 seconds

Step 7. Configure the Access Control Rule Base and Install policy.
For more information, see the R80.10 Site To Site VPN Administration Guide.
Configuring a route-based IPsec VPN Tunnel
Below is a sample environment to walk you through set up of route based VPN. Make sure to replace the IP addresses in the sample environment with your own IP addresses.
Google Cloud Platform
Check Point
Configuration - GCP
With route based VPN both static and dynamic routing can be used. This example will use dynamic routing. Cloud Router is used to establish BGP sessions between the 2 peers.
Configuring cloud router
Step 1: In Google Cloud Platform Console, select Networking > Cloud Routers > Create Router.
Step 2: Enter the parameters as shown in the following table and click Create.

Configuring Cloud VPN
Step 1: In Google Cloud Platform Console, select Networking > Interconnect > VPN > CREATE VPN CONNECTION.
Step 2: Enter the parameters as shown in the following table for the Google Compute Engine VPN gateway:

Step 3: Enter the parameters as shown in the following table for the tunnel:

Step 4: Enter the parameters as shown in the following table for the BGP peering:
Click Save and Continue to complete.

Note: – Add ingress firewall rules to allow inbound network traffic as per your security policy.
Configuration - Check Point Security Gateway
Create an interoperable device for Cloud VPN on the Check Point SmartConsole.
Step 1. Open SmartConsole > New > More > Network Object > More > Interoperable Device.
Step 2. Configure the IP address associated with Cloud VPN peer (external IP).

Step 3. To force Route-based VPN to take priority, create a dummy (empty) group and assign it to the VPN domain.
- Go to Topology, in the VPN Domain section. Select Manually defined.
- Click the right to select the desired object.
- Click New > Group > Simple Group.
- Enter an Object Name, click OK. Do NOT assign any objects to this group.

Step 4. In clish
, create a VPN Tunnel Interface (VTI).*

***When connecting to a Check Point Cluster, use "dummy" IP addresses when creating the VTI interfaces, and used the single IP provided by GCP as the VIP for that specific VTI interface***
Write the Remote peer name, exactly as it is written in the gateway object in SmartConsole.
add vpn tunnel [1-99] type numbered local { TUN-INSIDE- CP } remote { TUN-INSIDE- GCP } peer { Interoperable GVC object name in SmartConsole }
Example:
add vpn tunnel 10 type numbered local 169.254.0.2 remote 169.254.0.1 peer Google_Cloud
Step 5. Edit the Topology.
- Open SmartConsole > Gateways & Servers.
- Select the Check Point Security Gateway and double-click.
- From General Properties > Network Management > Get Interfaces.
-
The VTIs show in the topology. Note: The Edit Topology window lists the members of a VTI on the same line if these criteria match:
-
Remote peer name
- Remote IP address
-
Interface name
-
Configure the VTI VIP in the Topology tab. Click OK.
- From VPN Domain, select Manually Defined > Empty_Group.


Step 6. Create a star community.
- Open SmartConsole > Security Policies > Access Tools > VPN Communities.
- Click Star Community.
- Enter an Object Name for the VPN Community.
- In the Center Gateways area, click the plus sign to add a Check Point Security Gateway object for the center of the community.
- In the Satellite Gateways area, click the plus sign to add the GCP gateway object.

Step 7. Configure these ciphers for IKEv2.
Go to Encryption and change the Phase 1 and Phase 2 properties according what is specified within the Cipher configuration settings on page 3) Note: You must select Perfect Forward Secrecy (Phase 2).
This example refers to IKEv2 specifically. You can also use IKEv1 in this scenario.

Step 8. Go to the Advanced tab. You can modify the more advanced settings for Phase 1 Phase 2 there.

Step 9. Setup for BGP Deployment.
Virtual tunnel interface and initial BGP Setup
Connect with SSH to your Security Gateway. If you are using the none default shell, change to clish. Run: clish
Run the commands below replacing variables surrounded by { } with your values:
set AS {CP Security Gateway - ASN}
set bgp external remote-as { GCP-ASN } on
set bgp external remote-as { GCP-ASN } peer { TUN-INSIDE- GCP } on
set bgp external remote-as { GCP-ASN } peer { TUN-INSIDE- GCP } as-override on
set bgp external remote-as { GCP-ASN } peer { TUN-INSIDE- GCP } holdtime 30
set bgp external remote-as { GCP-ASN } peer { TUN-INSIDE- GCP } keepalive 10
set inbound-route-filter bgp-policy 512 based-on- as as { GCP-ASN } on
set inbound-route-filter bgp-policy 512 accept-all- ipv4
set route-redistribution to bgp-as { GCP-ASN } from interface {Redistributed from specific interface } on
Example:
set as 65002
set bgp external remote-as 65000 on
set bgp external remote-as 65000 peer 169.254.0.1 on
set bgp external remote-as 65000 peer 169.254.0.1 as-override on
set bgp external remote-as 65000 peer 169.254.0.1 holdtime 30
set bgp external remote-as 65000 peer 169.254.0.1 keepalive 10
set inbound-route-filter bgp-policy 512 based-on-as as 65000 on
set inbound-route-filter bgp-policy 512 accept-all-ipv4
set route-redistribution to bgp-as 65000 from interface eth1 on
#Limitation found when using a Check Point Cluster and using route-redistribution.
When the BGP routes were being shared to the peer using route-redistribution - the "dummy" VTI IP was used and were not accepted.
To Resolve this: use routemaps to export the routes - this method uses the VIP IP, which is accepted & expected by the GCP peer.
Step 10. Configure Directional Rules for Route-Based Scenario.
- Open SmartConsole > Global Properties > VPN > Advanced.
- Select Enable VPN Directional Match in VPN Column.

Note: This is not relevant for a Policy Based scenario.
-
Add these directional match rules in the VPN column for every firewall rule related to VPN traffic:
Internal_clear > Google Cloud VPN community name (VPN_Community)
Google Cloud VPN community name > Google Cloud VPN community name
(VPN_Community) Google Cloud VPN community name (VPN_Community) > Internal_clear
Step 11. Install policy.
For more information, see the R80.10 Site To Site VPN Administration Guide.
This information is also available at Google Cloud Platform Community tutorials .