[c-nsp] checkpoint vpn client behind pix 515

Church, Chuck cchurch at netcogov.com
Wed Sep 7 22:20:04 EDT 2005


Unless something changed recently, won't NAT break plain-vanilla IPSec
using AH?  It used to.  Of course if it's wrapped in UDP or TCP (NAT-T),
there's no issue.  But do we know for sure the Checkpoint is using
NAT-T?  Are there any hits on the AH ACL entry?


Chuck Church
Lead Design Engineer
CCIE #8776, MCNE, MCSE
Netco Government Services - Design & Implementation Team
1210 N. Parker Rd.
Greenville, SC 29609
Home office: 864-335-9473
Cell: 864-266-3978
cchurch at netcogov.com
PGP key: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x4371A48D 


-----Original Message-----
From: cisco-nsp-bounces at puck.nether.net
[mailto:cisco-nsp-bounces at puck.nether.net] On Behalf Of Marcus Keane
Sent: Wednesday, September 07, 2005 9:34 PM
To: Ivan Lopez; cisco-nsp at puck.nether.net
Subject: RE: [c-nsp] checkpoint vpn client behind pix 515

I don't know anything about the checkpoint so I've no idea. Does it even
support NAT-T? Without more information, it's impossible to say.
I assume you've done the usual checking of xlates, conns, etc.? If that
all checks out, I'd chase your Checkpoint support.
Marcus

-----Original Message-----
From: Ivan Lopez [mailto:lopez.ia at verizon.net] 
Sent: Thursday, 8 September 2005 3:02 AM
To: Marcus Keane; cisco-nsp at puck.nether.net
Subject: Re: [c-nsp] checkpoint vpn client behind pix 515

I tried  adding port 4500 for udp just as instructed, but I get the same

results.

VPN connection establishes but once connected no traffic passes.

Any ideas?

Thanks!







Marcus Keane wrote:

>No, it's the standard IPSec NAT traversal port. Check out this RFC.
>ftp://ftp.rfc-editor.org/in-notes/rfc3947.txt
>
>Cheers,
>Marcus
>
>
>-----Original Message-----
>From: Ivan Lopez [mailto:ilopez02 at earthlink.net] 
>Sent: Tuesday, 6 September 2005 9:58 AM
>To: Marcus Keane
>Subject: Re: [c-nsp] checkpoint vpn client behind pix 515
>
>Port 4500, is this Checkpoint admin port?
>
>Thanks again,
>-Ivan
>
>
>
>
>
>
>
>Marcus Keane wrote:
>
>  
>
>>If you're doing Nat-T, you'll also need to permit udp 4500 in your
>>access-list.
>>Adding
>>access-list outside_coming_in permit udp host xxx.xxx.xxx.UK host
>>xxx.xxx.xxx.US eq 4500
>>
>>should probably do it.
>>HTH.
>>Marcus
>>
>>-----Original Message-----
>>From: cisco-nsp-bounces at puck.nether.net
>>[mailto:cisco-nsp-bounces at puck.nether.net] On Behalf Of Ivan Lopez
>>Sent: Tuesday, 6 September 2005 7:57 AM
>>To: cisco-nsp at puck.nether.net
>>Subject: [c-nsp] checkpoint vpn client behind pix 515
>>
>>I have customer with a Checkpoint VPN-1 client connecting to it's
>>    
>>
>server
>  
>
>>in the U.K. thru my PIX firewall 6.3.
>>I set up a NAT-static private-public IP address for my customer, 
>>permitting AH, ESP as well udp 500 both inbound and outbound.   
>>Connection establishes but not able to do anything else after that,
not
>>    
>>
>
>  
>
>>able to access any applications, nothing. This is my first Checkpoint 
>>experience, any ideas anyone?  Thanks!
>>
>>
>>
>>access-list vpnacl permit ip host xxx.xxx.xxx.UK  any
>>
>>access-list outside_coming_in permit esp host xxx.xxx.xxx.UK host 
>>xxx.xxx.xxx.US
>>access-list outside_coming_in permit ah host xxx.xxx.xxx.UK host 
>>xxx.xxx.xxx.US
>>access-list outside_coming_in permit udp host xxx.xxx.xxx.UK host 
>>xxx.xxx.xxx.US eq isakmp
>>
>>isakmp nat-traversal 20
>>
>>sysopt connection permit-ipsec
>>
>>
>>
>>
>>_______________________________________________
>>cisco-nsp mailing list  cisco-nsp at puck.nether.net
>>https://puck.nether.net/mailman/listinfo/cisco-nsp
>>archive at http://puck.nether.net/pipermail/cisco-nsp/
>>
>>
>> 
>>
>>    
>>
>
>
>
>
>  
>



_______________________________________________
cisco-nsp mailing list  cisco-nsp at puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/



More information about the cisco-nsp mailing list