Has anyone had any experience/success with setting up a VPN between
Firewall-1 and Cisco PIX?  I have set up what I think is the correct config
but it's not quite working.

I have set up the configuration below on both firewalls.  When I try pinging
or telneting from a SiteA internal address to a SiteB internal address I get
no response to the command but the following two messages appear on the
Firewall-1 log:

   Action: Key Install
   Source: 192.168.1.1
   Dest:   192.168.2.145
   Desc:   ISAKMP Log: Phase 1 completion. DES/MD5/Pre shared secrets 
                Negotiation Id: 6910150255ebf513-7a3dc6502ae28722

   Action: Key Install
   Source: 192.168.1.1
   Dest:   192.168.2.145
   Desc:   ISAKMP Log: Sent Notification: no proposal chosen <phase2 stage2>

                Negotiation Id: b60dffd6

I can see stuff in the logs on the PIX box that looks like the Phase 1
negotiation, and there is fair bit of stuff following that which I imagine
is the Phase 2 stuff but I can't really make much sense of it.

When I try pinging or telneting in the opposite direction the PIX seems to
just direct the traffic out to the Internet without building a security
association first.

Can anyone help with this?

The config is as follows (IP addresses changed to protect the innocent):

              Site A                                             Site B

           -------------192.168.1.1/24                        -------------
           | FirewallA |------------- Internet ---------------| FirewallB |
           -------------                      192.168.2.145/28-------------
                 |                                                 | 
     10.1.0.0/16 |                                                 |
                 |                                                 |
            ----------                                        10.4.16.0/22
            | Router |
            ----------
                 |
                 |
          Other Subnets:
           10.2.0.0/16
           10.3.0.0/16
           10.4.4.0/22
           10.4.8.0/22
           10.4.12.0/22

FirewallA Config:
-----------------

Firewall-1 4.0 SP4
Windows NT 4.0 SP4

Policy -> Properties -> Encryption:
   ISAKMP Key Renegotiation
      Renegotiate IPSec SAs every 3600 secs
      Renegotiate ISAKMP SAs every 1440 mins

Workstation Object FirewallA:
   Encryption Domain:  10.1.0.0/16
                       10.2.0.0/16
                       10.3.0.0/16
                       10.4.4.0/22
                       10.4.8.0/22
                       10.4.12.0/22
   Encryption Methods Defined:  ISAKMP/OAKLEY
        Encryption Method:     DES
        Hash Method:           MD5
        Authentication Method: Pre-shared key  
                Peer: FirewallB  
                Shared Secret: abcdef

Workstation Object FirewallB:
   Encryption Domain:  10.4.16.0/22
   Encryption Methods Defined:  ISAKMP/OAKLEY
        Encryption Method:     DES
        Hash Method:           MD5
        Authentication Method: Pre-shared key  
                Peer: FirewallA
                Shared Secret: abcdef

Security Rules:
   SiteA   SiteB   Any   Encrypt   Long
   SiteB   SiteA   Any   Encrypt   Long

      Encrypt properties:
         Encryption Schemes:  ISAKMP/OAKLEY
            Transform:             Encryption + Data Integrity (ESP)
            Encryption Algorithm:  DES
            Data Integrity:        MD5
            Allowed Peer Gateway:  FirewallB
            Use Perfect Forward Secrecy selected

NAT Rules:
   SiteA   SiteB   Any   Original   Original   Original
   SiteB   SiteA   Any   Original   Original   Original


FirewallB Config:
-----------------

Cisco PIX 520
S/w Version 5.1(2)

(I've removed config lines that do not contribute to the VPN setup.)

PIX Version 5.1(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
hostname QUiCKSiLVER
names
access-list vpn-acl permit ip 10.4.16.0 255.255.252.0 10.1.0.0 255.255.0.0 
access-list vpn-acl permit ip 10.4.16.0 255.255.252.0 10.2.0.0 255.255.0.0 
access-list vpn-acl permit ip 10.4.16.0 255.255.252.0 10.3.0.0 255.255.0.0 
access-list vpn-acl permit ip 10.4.16.0 255.255.252.0 10.4.4.0 255.255.252.0

access-list vpn-acl permit ip 10.4.16.0 255.255.252.0 10.4.8.0 255.255.252.0

access-list vpn-acl permit ip 10.4.16.0 255.255.252.0 10.4.12.0
255.255.252.0 
ip address outside 192.168.2.145 255.255.255.240
ip address inside 10.4.16.1 255.255.252.0
route outside 0.0.0.0 0.0.0.0 192.168.2.158 1
crypto ipsec transform-set vpn-tfset esp-des esp-md5-hmac 
crypto map vpn-map 10 ipsec-isakmp
crypto map vpn-map 10 match address vpn-acl
crypto map vpn-map 10 set pfs 
crypto map vpn-map 10 set peer 192.168.1.1 
crypto map vpn-map 10 set transform-set vpn-tfset
crypto map vpn-map interface outside
isakmp enable outside
isakmp key abcdef address 192.168.1.1 netmask 255.255.255.255 
isakmp identity hostname
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption des
isakmp policy 20 hash md5
isakmp policy 20 group 1
isakmp policy 20 lifetime 86400


Thanks in advance,

Andrew Cooper


================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to