For IKEv2, this behavior is by design.
Check Point gateways always send the main IP address of the gateway as the IKE ID.
Note: By default IKEv2 uses the main IP as ID, but since R80.10 it can be changed to FQDN/DN as well (important for Azure integration).
Some third party VPN peers will not allow an IKE ID that is an IP address to differ from the IP address that the VPN terminates on.
See sk33822 - Site-to-Site VPN connection between Check Point VPN-1 and third-party gateways fails with (AUTHENTICATION-FAILED) error for a possible work-around when this is encountered.
For IKEv1:
In SmartConsole, open the Security Gateway object -> IPSec VPN > Link Selection.
Selecting the "Selected address from topology table:" or "Statically NATed IP:" option will affect the IPv4 address used as the IKE ID in Main Mode Packet 5.
Note: Starting from R80.30, Check Point gateways no longer use the main IP address of the gateway as IKE ID. This is true when using IKEV2, and when link selection is configured to use another interface than the main IP (which is the default).
Using "DNS Resolving" or "Link probing" in "Link selection" with IKEv2, will result in the gateway using its main IP as IKE ID.”
sk173048 describes a hotfix for an issue that was found in the new mechanism.