Solved

PIX Checkpoint VPN Problem

Posted on 2006-11-23
5
1,550 Views
Last Modified: 2013-11-16
hi all,

i am having a strange problem and i have tried doing googling but still not getting any strong answer to overcome the issue.

we have one partner in another country and we are trying to setup VPN Tunnel between us and this partner using PIX 515E and Checkpoint FW NXG on the other side.

configured the Crypto Map and ISAKMP and also with help from lrmoore did the natting and acl. the thing is like this.

Site 1.
crypto ipsec transform-set Partnet2 esp-3des esp-md5-hmac
crypto map transam 20 ipsec-isakmp
crypto map transam 20 match address Partnet2
crypto map transam 20 set peer 192.162.10.92
crypto map transam 20 set transform-set NI
crypto map transam 20 set security-association lifetime seconds 3600 kilobytes 4
crypto map transam interface outside
isakmp enable outside
isakmp key ******** address 192.168.10.92 netmask 255.255.255.255
isakmp identity address
isakmp keepalive 10 30
isakmp nat-traversal 20
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400

access-list Partner2 permit ip host 100.90.72.20 host 172.22.13.25
access-list Partner2 permit ip host 100.90.72.10 host 192.168.7.5
access-list Partner2 permit ip host 192.168.7.5 host 100.90.72.10
access-list Partner2 permit ip host 100.90.72.10 host 172.17.53.5
access-list Partner2_NAT permit ip host 172.20.4.205 host 172.16.7.5
access-list Partner2_NAT permit ip host 172.20.4.205 host 172.17.53.5
access-list Partner2_NAT1 permit ip host 172.20.4.205 host 172.22.13.25

global (outside) 20 100.90.72.10
global (outside) 30 100.90.72.20

nat (inside) 20 access-list NI_NAT 0 0
nat (inside) 30 access-list NI_NAT1 0 0


Site 2. Checkpoint FW NGX

Problem: when we initiate the connection the VPN Tunnel comes up and we can access there servers. but when they try to initiate the connection; i see on pix that  it stops at phase 2 of IPsec.

Question:

for inbound do we need something extra in ACL or simple VPN access-list works for both inbound and outbound. any help would be great, i really need it up
0
Comment
Question by:lomaree
5 Comments
 
LVL 1

Author Comment

by:lomaree
ID: 18010597
hi all,

please i need help here, below is what i see on my debug

IPSEC(validate_transform_proposal): proxy identities not supported

ISAKMP: IPSec policy invalidated proposal
ISAKMP (0): SA not acceptable!
return status is IKMP_ERR_NO_RETRANS
crypto_isakmp_process_block:src:y.y.y.y, dest:x.x.x.x spt:500 dpt:500
ISAKMP: reserved not zero on payload 8!
ISAKMP: malformed payload
0
 
LVL 8

Expert Comment

by:charan_jeetsingh
ID: 18010924
hi there.....

one thing i am sure that this is something to do the the Checkpoint box, cuz we had exactly the same problem. There is one specific option they need to check for that......but i need to get a check on that. In the mean time you can ask them to look out for some trials... dnt do anything on pix...
0
 
LVL 23

Accepted Solution

by:
Tim Holman earned 500 total points
ID: 18020408
This message means the networks defined at both ends don't match.  Verify that the network objects that fall under encryption on the CheckPoint box match with whatever access list you've used for encryption on the PIX.
NGX - PIX VPN setup should pretty much follow the basics in this 4.1 - PIX VPN example:

http://www.cisco.com/warp/public/110/cp-p.html
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
clear arp 1 29
CISCO Smartnet agreement 5 36
Unmanaged Switches for Optimized Network Speeds 7 39
Guest Wi-Fi Time out 3 21
When I upgraded my ASA 8.2 to 8.3, I realized that my nonat statement was failing!   The log showed the following error:     %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows It was caused by the config upgrade, because t…
From Cisco ASA version 8.3, the Network Address Translation (NAT) configuration has been completely redesigned and it may be helpful to have the syntax configuration for both at a glance. You may as well want to read official Cisco published AS…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question