Solved

PIX Checkpoint VPN Problem

Posted on 2006-11-23
5
1,548 Views
Last Modified: 2013-11-16
hi all,

i am having a strange problem and i have tried doing googling but still not getting any strong answer to overcome the issue.

we have one partner in another country and we are trying to setup VPN Tunnel between us and this partner using PIX 515E and Checkpoint FW NXG on the other side.

configured the Crypto Map and ISAKMP and also with help from lrmoore did the natting and acl. the thing is like this.

Site 1.
crypto ipsec transform-set Partnet2 esp-3des esp-md5-hmac
crypto map transam 20 ipsec-isakmp
crypto map transam 20 match address Partnet2
crypto map transam 20 set peer 192.162.10.92
crypto map transam 20 set transform-set NI
crypto map transam 20 set security-association lifetime seconds 3600 kilobytes 4
crypto map transam interface outside
isakmp enable outside
isakmp key ******** address 192.168.10.92 netmask 255.255.255.255
isakmp identity address
isakmp keepalive 10 30
isakmp nat-traversal 20
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400

access-list Partner2 permit ip host 100.90.72.20 host 172.22.13.25
access-list Partner2 permit ip host 100.90.72.10 host 192.168.7.5
access-list Partner2 permit ip host 192.168.7.5 host 100.90.72.10
access-list Partner2 permit ip host 100.90.72.10 host 172.17.53.5
access-list Partner2_NAT permit ip host 172.20.4.205 host 172.16.7.5
access-list Partner2_NAT permit ip host 172.20.4.205 host 172.17.53.5
access-list Partner2_NAT1 permit ip host 172.20.4.205 host 172.22.13.25

global (outside) 20 100.90.72.10
global (outside) 30 100.90.72.20

nat (inside) 20 access-list NI_NAT 0 0
nat (inside) 30 access-list NI_NAT1 0 0


Site 2. Checkpoint FW NGX

Problem: when we initiate the connection the VPN Tunnel comes up and we can access there servers. but when they try to initiate the connection; i see on pix that  it stops at phase 2 of IPsec.

Question:

for inbound do we need something extra in ACL or simple VPN access-list works for both inbound and outbound. any help would be great, i really need it up
0
Comment
Question by:lomaree
5 Comments
 
LVL 1

Author Comment

by:lomaree
ID: 18010597
hi all,

please i need help here, below is what i see on my debug

IPSEC(validate_transform_proposal): proxy identities not supported

ISAKMP: IPSec policy invalidated proposal
ISAKMP (0): SA not acceptable!
return status is IKMP_ERR_NO_RETRANS
crypto_isakmp_process_block:src:y.y.y.y, dest:x.x.x.x spt:500 dpt:500
ISAKMP: reserved not zero on payload 8!
ISAKMP: malformed payload
0
 
LVL 8

Expert Comment

by:charan_jeetsingh
ID: 18010924
hi there.....

one thing i am sure that this is something to do the the Checkpoint box, cuz we had exactly the same problem. There is one specific option they need to check for that......but i need to get a check on that. In the mean time you can ask them to look out for some trials... dnt do anything on pix...
0
 
LVL 23

Accepted Solution

by:
Tim Holman earned 500 total points
ID: 18020408
This message means the networks defined at both ends don't match.  Verify that the network objects that fall under encryption on the CheckPoint box match with whatever access list you've used for encryption on the PIX.
NGX - PIX VPN setup should pretty much follow the basics in this 4.1 - PIX VPN example:

http://www.cisco.com/warp/public/110/cp-p.html
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
anyconnect password change 2 31
Cisco Supervisor upgrade to 2T 3 46
Not able to route between subnets 8 101
RDP ISR4321 Cisco Router 7 23
If you have an ASA5510 then this sort of thing would be better handled with a CSC Module, however on an ASA5505 thats not an option, and if you want to throw in a quick solution to stop your staff going to facebook during work time, then this is the…
This article assumes you have at least one Cisco ASA or PIX configured with working internet and a non-dynamic, public, address on the outside interface. If you need instructions on how to enable your device for internet, or basic configuration info…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

929 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now