Re: [FW-1] Setup of Remote VPN on R75+

2012-10-21 Thread Nathan Hawkins
I upgraded from R75.20 to R75.40 and it has fixed several issues. I also 
modified my remote access rule to Any / Any / RemoteAccess / Any / accept / Log 
/ FW with all of that I am now able to connect via SecureRemote however the 
address I want assigned is not the address that gets assigned. I want 
172.30.254.0/24 assigned and I'm getting 192.168.0.0 assigned. If I specify my 
internal DHCP server I'm not even able to connect...

So...what does anyone think I need to do to fix that?

-Original Message-
From: Mailing list for discussion of Firewall-1 
[mailto:FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Gary Scott
Sent: Friday, September 28, 2012 11:33 AM
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

E7x securemote will also try and use https on the initil connection, if this is 
blocked then it will use IKE. You didn't specify what client option of E7x you 
were installing, assumed it was endpoint security, securemote has inherent 
short falls that make it undesirable for use in several common environments. 
Securemote would require the VPN blade license. None the less, you ruled out a 
problem with SSL when using the R60 client, if you are using the FW's external 
IP for everything (every port?) then you are stepping on ports it needs to have 
open for certain features to work, check out sk52421 and sk62692. In general 
its is not a good idea to use the FW's external IP for static port NAT, if you 
do you have to be careful on what ports you use and what feature you have 
enabled.




From: Nathan Hawkins na...@thfcom.com
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Sent: Friday, September 28, 2012 11:36 AM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

Ok, no the FW I'm working on is not licensed for that.

-Original Message-
From: Mailing list for discussion of Firewall-1 
[mailto:FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio Alvarez
Sent: Friday, September 28, 2012 10:12 AM
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

SNX stands for SSL Network Extender.

It is a feature that allows to establish SSL VPNs through a portal hosted in 
the gateway, but it does encapsule an IPSec tunnel within SSL, which allows to 
have the features of SSL VPN (without having to previously install a VPN Client 
on each user's laptop) and the flexibility of a regular IPSec VPN, which allows 
access to any client/server application and not just web-able applications, 
as happens with regular SSL solutions.

SNX does require extra licensing, it used to be a feature by itself, but it is 
now considered part of the Mobile Access Blade.

On Fri, Sep 28, 2012 at 9:03 AM, Nathan Hawkins na...@thfcom.com wrote:

 No, Visitor mode is NOT required as per that guide and a few others
 I've read (please refer to the note about SecuRemote). Anyway,
 everything is set according to the documentation (including that
 guide). Yes, I'm using the FW's external IP for everything (including
 HTTP/S). I've disabled the NAT for every test... No special license is
 required for SecuRemote... I have recently tried the R60 version of
 SecuRemote/Client and it does not connect. I'm not sure what SNX is?

 Any other ideas?

 -Original Message-
 From: Mailing list for discussion of Firewall-1 [mailto:
 FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Gary Scott
 Sent: Thursday, September 27, 2012 10:25 AM
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 Visitor mode is required to be enabled on the gateway for the E75.20
 client to work, check the admin guide specific for this client,
 CP_E75.20_Remote_Access_Clients_Admin_Guide.pdf. To be clear, are you
 using the FW's external IP for port NAT for http/https?, if so then
 this needs to be disabled. Disabling http/https NAT for any other
 external IP's you have I don't think this would have any bearing on
 this, not something I would consider doingthat would be just
 crazy. Do you have the proper license in place? I would try a 32 bit
 SC R60 client just to make sure basic IPSEC VPN/office mode/etc.. were
 functioning properly, you could also enable SNX, if licensed for it, and 
 check if you can https through a browser.



 
 From: Nathan Hawkins na...@thfcom.com
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Sent: Thursday, September 27, 2012 8:23 AM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 Well...the R60 client wont work on the machines I support because they
 are all 64 bit and the R60 client is 32 bit only. Whenever someone has
 something to suggest trying I disable all NATing for HTTP/S to the web
 servers, because so far I have yet to make the VPN client even create
 the site let alone work... I guess I'll switch to simplified mode when
 it presents itself as the better way to go. So far it has

Re: [FW-1] Setup of Remote VPN on R75+

2012-09-28 Thread Nathan Hawkins
No, Visitor mode is NOT required as per that guide and a few others I've read 
(please refer to the note about SecuRemote). Anyway, everything is set 
according to the documentation (including that guide). Yes, I'm using the FW's 
external IP for everything (including HTTP/S). I've disabled the NAT for every 
test... No special license is required for SecuRemote... I have recently tried 
the R60 version of SecuRemote/Client and it does not connect. I'm not sure what 
SNX is?

Any other ideas?

-Original Message-
From: Mailing list for discussion of Firewall-1 
[mailto:FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Gary Scott
Sent: Thursday, September 27, 2012 10:25 AM
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

Visitor mode is required to be enabled on the gateway for the E75.20 client to 
work, check the admin guide specific for this client, 
CP_E75.20_Remote_Access_Clients_Admin_Guide.pdf. To be clear, are you using the 
FW's external IP for port NAT for http/https?, if so then this needs to be 
disabled. Disabling http/https NAT for any other external IP's you have I don't 
think this would have any bearing on this, not something I would consider 
doingthat would be just crazy. Do you have the proper license in place? I 
would try a 32 bit SC R60 client just to make sure basic IPSEC VPN/office 
mode/etc.. were functioning properly, you could also enable SNX, if licensed 
for it, and check if you can https through a browser.




From: Nathan Hawkins na...@thfcom.com
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Sent: Thursday, September 27, 2012 8:23 AM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

Well...the R60 client wont work on the machines I support because they are all 
64 bit and the R60 client is 32 bit only. Whenever someone has something to 
suggest trying I disable all NATing for HTTP/S to the web servers, because so 
far I have yet to make the VPN client even create the site let alone work... I 
guess I'll switch to simplified mode when it presents itself as the better way 
to go. So far it has not.

Any suggestions as to what to try next?

-Original Message-
From: Mailing list for discussion of Firewall-1 
[mailto:FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Gary Scott
Sent: Wednesday, September 26, 2012 8:27 PM
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

The E7x clients do operate a bit differently than the older R60 IPSEC client, I 
think the initial https connection from the client are for auth purposes, a 
change from the older hybrid mode auth. Even though no longer supported can you 
connect with the R60 client?, unless using visitor mode it will do native IPSEC 
with no SSL? Make sure your 443 port is not being stepped on by anything else, 
also have the proper license(s) in place, office mode was a freebie for the R60 
client but no longer the case for the E7x client, which is a shame for such a 
needed feature. You still have complete control using simplified mode, it is 
just a mode to simplify the configuration of multiple VPN sites and a few other 
things, once you get over the sticker shock you will see simplified mode is the 
way to go.


-GS


From: Nathan Hawkins na...@thfcom.com
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Sent: Wednesday, September 26, 2012 2:23 PM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

All of that was already set (checked) and applied to the GW

On the Client (E75.20 is currently installed), what I see at the FW and other 
logs I'm using to troubleshoot this is only HTTP/HTTPS connections and I cant 
configure anything else because when I go to create a new site it fails and 
won't continue to configure anything. All I get is a back / cancel / help 
(which brings up the help file) button.

If I must, I'll change to simplified mode, but I like traditional because I 
don't like anything to be automatic. I like complete control over everything.

I appreciate your help! I hope we can fix this...

-Original Message-
From: Mailing list for discussion of Firewall-1 
[mailto:FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio Alvarez
Sent: Wednesday, September 26, 2012 12:14 PM
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

Global Properties  Remotes Access  VPN Auth and Ecryp  IKE over TCP
- here you enable support for TCP encapsulation on the gateway

Gateway Properties  IPSec VPN  Remote Access  Support NAT Traversal
-- Here you enable support for a propietary UDP Encapsulation on
-- the
gateway.

Now, on the client side you must enable these also, otherwise the client won't 
try to use them when trying to establish VPN. Now, I unfortunately don't have 
handy an installation of the new versions of the VPN clients, but on the old 
ones, I remember you go

Re: [FW-1] Setup of Remote VPN on R75+

2012-09-28 Thread Sergio Alvarez
SNX stands for SSL Network Extender.

It is a feature that allows to establish SSL VPNs through a portal hosted
in the gateway, but it does encapsule an IPSec tunnel within SSL, which
allows to have the features of SSL VPN (without having to previously
install a VPN Client on each user's laptop) and the flexibility of a
regular IPSec VPN, which allows access to any client/server application and
not just web-able applications, as happens with regular SSL solutions.

SNX does require extra licensing, it used to be a feature by itself, but it
is now considered part of the Mobile Access Blade.

On Fri, Sep 28, 2012 at 9:03 AM, Nathan Hawkins na...@thfcom.com wrote:

 No, Visitor mode is NOT required as per that guide and a few others I've
 read (please refer to the note about SecuRemote). Anyway, everything is set
 according to the documentation (including that guide). Yes, I'm using the
 FW's external IP for everything (including HTTP/S). I've disabled the NAT
 for every test... No special license is required for SecuRemote... I have
 recently tried the R60 version of SecuRemote/Client and it does not
 connect. I'm not sure what SNX is?

 Any other ideas?

 -Original Message-
 From: Mailing list for discussion of Firewall-1 [mailto:
 FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Gary Scott
 Sent: Thursday, September 27, 2012 10:25 AM
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 Visitor mode is required to be enabled on the gateway for the E75.20
 client to work, check the admin guide specific for this client,
 CP_E75.20_Remote_Access_Clients_Admin_Guide.pdf. To be clear, are you using
 the FW's external IP for port NAT for http/https?, if so then this needs to
 be disabled. Disabling http/https NAT for any other external IP's you have
 I don't think this would have any bearing on this, not something I would
 consider doingthat would be just crazy. Do you have the proper license
 in place? I would try a 32 bit SC R60 client just to make sure basic IPSEC
 VPN/office mode/etc.. were functioning properly, you could also enable SNX,
 if licensed for it, and check if you can https through a browser.



 
 From: Nathan Hawkins na...@thfcom.com
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Sent: Thursday, September 27, 2012 8:23 AM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 Well...the R60 client wont work on the machines I support because they are
 all 64 bit and the R60 client is 32 bit only. Whenever someone has
 something to suggest trying I disable all NATing for HTTP/S to the web
 servers, because so far I have yet to make the VPN client even create the
 site let alone work... I guess I'll switch to simplified mode when it
 presents itself as the better way to go. So far it has not.

 Any suggestions as to what to try next?

 -Original Message-
 From: Mailing list for discussion of Firewall-1 [mailto:
 FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Gary Scott
 Sent: Wednesday, September 26, 2012 8:27 PM
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 The E7x clients do operate a bit differently than the older R60 IPSEC
 client, I think the initial https connection from the client are for auth
 purposes, a change from the older hybrid mode auth. Even though no longer
 supported can you connect with the R60 client?, unless using visitor mode
 it will do native IPSEC with no SSL? Make sure your 443 port is not being
 stepped on by anything else, also have the proper license(s) in place,
 office mode was a freebie for the R60 client but no longer the case for the
 E7x client, which is a shame for such a needed feature. You still have
 complete control using simplified mode, it is just a mode to simplify the
 configuration of multiple VPN sites and a few other things, once you get
 over the sticker shock you will see simplified mode is the way to go.


 -GS

 
 From: Nathan Hawkins na...@thfcom.com
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Sent: Wednesday, September 26, 2012 2:23 PM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 All of that was already set (checked) and applied to the GW

 On the Client (E75.20 is currently installed), what I see at the FW and
 other logs I'm using to troubleshoot this is only HTTP/HTTPS connections
 and I cant configure anything else because when I go to create a new site
 it fails and won't continue to configure anything. All I get is a back /
 cancel / help (which brings up the help file) button.

 If I must, I'll change to simplified mode, but I like traditional because
 I don't like anything to be automatic. I like complete control over
 everything.

 I appreciate your help! I hope we can fix this...

 -Original Message-
 From: Mailing list for discussion of Firewall-1 [mailto:
 FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio

Re: [FW-1] Setup of Remote VPN on R75+

2012-09-28 Thread Nathan Hawkins
Ok, no the FW I'm working on is not licensed for that.

-Original Message-
From: Mailing list for discussion of Firewall-1 
[mailto:FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio Alvarez
Sent: Friday, September 28, 2012 10:12 AM
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

SNX stands for SSL Network Extender.

It is a feature that allows to establish SSL VPNs through a portal hosted in 
the gateway, but it does encapsule an IPSec tunnel within SSL, which allows to 
have the features of SSL VPN (without having to previously install a VPN Client 
on each user's laptop) and the flexibility of a regular IPSec VPN, which allows 
access to any client/server application and not just web-able applications, 
as happens with regular SSL solutions.

SNX does require extra licensing, it used to be a feature by itself, but it is 
now considered part of the Mobile Access Blade.

On Fri, Sep 28, 2012 at 9:03 AM, Nathan Hawkins na...@thfcom.com wrote:

 No, Visitor mode is NOT required as per that guide and a few others
 I've read (please refer to the note about SecuRemote). Anyway,
 everything is set according to the documentation (including that
 guide). Yes, I'm using the FW's external IP for everything (including
 HTTP/S). I've disabled the NAT for every test... No special license is
 required for SecuRemote... I have recently tried the R60 version of
 SecuRemote/Client and it does not connect. I'm not sure what SNX is?

 Any other ideas?

 -Original Message-
 From: Mailing list for discussion of Firewall-1 [mailto:
 FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Gary Scott
 Sent: Thursday, September 27, 2012 10:25 AM
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 Visitor mode is required to be enabled on the gateway for the E75.20
 client to work, check the admin guide specific for this client,
 CP_E75.20_Remote_Access_Clients_Admin_Guide.pdf. To be clear, are you
 using the FW's external IP for port NAT for http/https?, if so then
 this needs to be disabled. Disabling http/https NAT for any other
 external IP's you have I don't think this would have any bearing on
 this, not something I would consider doingthat would be just
 crazy. Do you have the proper license in place? I would try a 32 bit
 SC R60 client just to make sure basic IPSEC VPN/office mode/etc.. were
 functioning properly, you could also enable SNX, if licensed for it, and 
 check if you can https through a browser.



 
 From: Nathan Hawkins na...@thfcom.com
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Sent: Thursday, September 27, 2012 8:23 AM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 Well...the R60 client wont work on the machines I support because they
 are all 64 bit and the R60 client is 32 bit only. Whenever someone has
 something to suggest trying I disable all NATing for HTTP/S to the web
 servers, because so far I have yet to make the VPN client even create
 the site let alone work... I guess I'll switch to simplified mode when
 it presents itself as the better way to go. So far it has not.

 Any suggestions as to what to try next?

 -Original Message-
 From: Mailing list for discussion of Firewall-1 [mailto:
 FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Gary Scott
 Sent: Wednesday, September 26, 2012 8:27 PM
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 The E7x clients do operate a bit differently than the older R60 IPSEC
 client, I think the initial https connection from the client are for
 auth purposes, a change from the older hybrid mode auth. Even though
 no longer supported can you connect with the R60 client?, unless using
 visitor mode it will do native IPSEC with no SSL? Make sure your 443
 port is not being stepped on by anything else, also have the proper
 license(s) in place, office mode was a freebie for the R60 client but
 no longer the case for the E7x client, which is a shame for such a
 needed feature. You still have complete control using simplified mode,
 it is just a mode to simplify the configuration of multiple VPN sites
 and a few other things, once you get over the sticker shock you will see 
 simplified mode is the way to go.


 -GS

 
 From: Nathan Hawkins na...@thfcom.com
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Sent: Wednesday, September 26, 2012 2:23 PM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 All of that was already set (checked) and applied to the GW

 On the Client (E75.20 is currently installed), what I see at the FW
 and other logs I'm using to troubleshoot this is only HTTP/HTTPS
 connections and I cant configure anything else because when I go to
 create a new site it fails and won't continue to configure anything.
 All I get is a back / cancel / help (which brings up the help file) button

Re: [FW-1] Setup of Remote VPN on R75+

2012-09-28 Thread Gary Scott
E7x securemote will also try and use https on the initil connection, if this is 
blocked then it will use IKE. You didn't specify what client option of E7x you 
were installing, assumed it was endpoint security, securemote has inherent 
short falls that make it undesirable for use in several common environments. 
Securemote would require the VPN blade license. None the less, you ruled out a 
problem with SSL when using the R60 client, if you are using the FW's external 
IP for everything (every port?) then you are stepping on ports it needs to have 
open for certain features to work, check out sk52421 and sk62692. In general 
its is not a good idea to use the FW's external IP for static port NAT, if you 
do you have to be careful on what ports you use and what feature you have 
enabled.  




From: Nathan Hawkins na...@thfcom.com
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM 
Sent: Friday, September 28, 2012 11:36 AM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

Ok, no the FW I'm working on is not licensed for that.

-Original Message-
From: Mailing list for discussion of Firewall-1 
[mailto:FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio Alvarez
Sent: Friday, September 28, 2012 10:12 AM
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

SNX stands for SSL Network Extender.

It is a feature that allows to establish SSL VPNs through a portal hosted in 
the gateway, but it does encapsule an IPSec tunnel within SSL, which allows to 
have the features of SSL VPN (without having to previously install a VPN Client 
on each user's laptop) and the flexibility of a regular IPSec VPN, which allows 
access to any client/server application and not just web-able applications, 
as happens with regular SSL solutions.

SNX does require extra licensing, it used to be a feature by itself, but it is 
now considered part of the Mobile Access Blade.

On Fri, Sep 28, 2012 at 9:03 AM, Nathan Hawkins na...@thfcom.com wrote:

 No, Visitor mode is NOT required as per that guide and a few others
 I've read (please refer to the note about SecuRemote). Anyway,
 everything is set according to the documentation (including that
 guide). Yes, I'm using the FW's external IP for everything (including
 HTTP/S). I've disabled the NAT for every test... No special license is
 required for SecuRemote... I have recently tried the R60 version of
 SecuRemote/Client and it does not connect. I'm not sure what SNX is?

 Any other ideas?

 -Original Message-
 From: Mailing list for discussion of Firewall-1 [mailto:
 FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Gary Scott
 Sent: Thursday, September 27, 2012 10:25 AM
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 Visitor mode is required to be enabled on the gateway for the E75.20
 client to work, check the admin guide specific for this client,
 CP_E75.20_Remote_Access_Clients_Admin_Guide.pdf. To be clear, are you
 using the FW's external IP for port NAT for http/https?, if so then
 this needs to be disabled. Disabling http/https NAT for any other
 external IP's you have I don't think this would have any bearing on
 this, not something I would consider doingthat would be just
 crazy. Do you have the proper license in place? I would try a 32 bit
 SC R60 client just to make sure basic IPSEC VPN/office mode/etc.. were
 functioning properly, you could also enable SNX, if licensed for it, and 
 check if you can https through a browser.



 
 From: Nathan Hawkins na...@thfcom.com
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Sent: Thursday, September 27, 2012 8:23 AM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 Well...the R60 client wont work on the machines I support because they
 are all 64 bit and the R60 client is 32 bit only. Whenever someone has
 something to suggest trying I disable all NATing for HTTP/S to the web
 servers, because so far I have yet to make the VPN client even create
 the site let alone work... I guess I'll switch to simplified mode when
 it presents itself as the better way to go. So far it has not.

 Any suggestions as to what to try next?

 -Original Message-
 From: Mailing list for discussion of Firewall-1 [mailto:
 FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Gary Scott
 Sent: Wednesday, September 26, 2012 8:27 PM
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 The E7x clients do operate a bit differently than the older R60 IPSEC
 client, I think the initial https connection from the client are for
 auth purposes, a change from the older hybrid mode auth. Even though
 no longer supported can you connect with the R60 client?, unless using
 visitor mode it will do native IPSEC with no SSL? Make sure your 443
 port is not being stepped on by anything else, also have the proper
 license(s

Re: [FW-1] Setup of Remote VPN on R75+

2012-09-27 Thread Nathan Hawkins
Well...the R60 client wont work on the machines I support because they are all 
64 bit and the R60 client is 32 bit only. Whenever someone has something to 
suggest trying I disable all NATing for HTTP/S to the web servers, because so 
far I have yet to make the VPN client even create the site let alone work... I 
guess I'll switch to simplified mode when it presents itself as the better way 
to go. So far it has not.

Any suggestions as to what to try next?

-Original Message-
From: Mailing list for discussion of Firewall-1 
[mailto:FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Gary Scott
Sent: Wednesday, September 26, 2012 8:27 PM
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

The E7x clients do operate a bit differently than the older R60 IPSEC client, I 
think the initial https connection from the client are for auth purposes, a 
change from the older hybrid mode auth. Even though no longer supported can you 
connect with the R60 client?, unless using visitor mode it will do native IPSEC 
with no SSL? Make sure your 443 port is not being stepped on by anything else, 
also have the proper license(s) in place, office mode was a freebie for the R60 
client but no longer the case for the E7x client, which is a shame for such a 
needed feature. You still have complete control using simplified mode, it is 
just a mode to simplify the configuration of multiple VPN sites and a few other 
things, once you get over the sticker shock you will see simplified mode is the 
way to go.


-GS


From: Nathan Hawkins na...@thfcom.com
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Sent: Wednesday, September 26, 2012 2:23 PM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

All of that was already set (checked) and applied to the GW

On the Client (E75.20 is currently installed), what I see at the FW and other 
logs I'm using to troubleshoot this is only HTTP/HTTPS connections and I cant 
configure anything else because when I go to create a new site it fails and 
won't continue to configure anything. All I get is a back / cancel / help 
(which brings up the help file) button.

If I must, I'll change to simplified mode, but I like traditional because I 
don't like anything to be automatic. I like complete control over everything.

I appreciate your help! I hope we can fix this...

-Original Message-
From: Mailing list for discussion of Firewall-1 
[mailto:FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio Alvarez
Sent: Wednesday, September 26, 2012 12:14 PM
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

Global Properties  Remotes Access  VPN Auth and Ecryp  IKE over TCP
- here you enable support for TCP encapsulation on the gateway

Gateway Properties  IPSec VPN  Remote Access  Support NAT Traversal
-- Here you enable support for a propietary UDP Encapsulation on
-- the
gateway.

Now, on the client side you must enable these also, otherwise the client won't 
try to use them when trying to establish VPN. Now, I unfortunately don't have 
handy an installation of the new versions of the VPN clients, but on the old 
ones, I remember you go to Settings  Properties of the Site
 Advanced and you configured there the use of TCP and/or UDP Encap
 (also
enable/disable Visitor mode).

If you are still seeing HTTPS from the client IP and destined to the firewall 
on your logs, then your client is still trying to use Visitor Mode.

Finally, you will find more help from people, forums and documentation if you 
turn to simplified VPN mode, traditional mode is pretty old.

On Wed, Sep 26, 2012 at 10:12 AM, Nathan Hawkins na...@thfcom.com wrote:

 Actually I see the FW external IP used frequently, but that's not
 relevant here.

 Please explain where I would involve TCP encapsulation - I've looked
 around for anything that would re-designate a way for Secure Client to
 make a connection and nothing has worked so far.

 I have mentioned (at least once, in my initial post) that in Logviewer
 all I see are accepts for HTTP/HTTPS.

 I have also explained in a recent post that I don't see any drops at
 the console (CLI) for the SIP of where the remote client is coming from.

 Yes - I have read the Admin Guide for R75.20 - several times actually...
 Its not that helpful...

 -Original Message-
 From: Mailing list for discussion of Firewall-1 [mailto:
 FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio
 Alvarez
 Sent: Wednesday, September 26, 2012 10:12 AM
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 Well, usually the Firewall public IP is not used to staticaly NAT web
 servers, so regularly this is not an issue... anyway.

 I have mentioned already that you could try using something else like
 TCP encapsulation, have you tried that??

 So far you have not mentioned anything about the logs

Re: [FW-1] Setup of Remote VPN on R75+

2012-09-27 Thread Gary Scott
Visitor mode is required to be enabled on the gateway for the E75.20 client to 
work, check the admin guide specific for this client, 
CP_E75.20_Remote_Access_Clients_Admin_Guide.pdf. To be clear, are you using the 
FW's external IP for port NAT for http/https?, if so then this needs to be 
disabled. Disabling http/https NAT for any other external IP's you have I don't 
think this would have any bearing on this, not something I would consider 
doingthat would be just crazy. Do you have the proper license in place? I 
would try a 32 bit SC R60 client just to make sure basic IPSEC VPN/office 
mode/etc.. were functioning properly, you could also enable SNX, if licensed 
for it, and check if you can https through a browser.  
 
 


From: Nathan Hawkins na...@thfcom.com
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM 
Sent: Thursday, September 27, 2012 8:23 AM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

Well...the R60 client wont work on the machines I support because they are all 
64 bit and the R60 client is 32 bit only. Whenever someone has something to 
suggest trying I disable all NATing for HTTP/S to the web servers, because so 
far I have yet to make the VPN client even create the site let alone work... I 
guess I'll switch to simplified mode when it presents itself as the better way 
to go. So far it has not.

Any suggestions as to what to try next?

-Original Message-
From: Mailing list for discussion of Firewall-1 
[mailto:FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Gary Scott
Sent: Wednesday, September 26, 2012 8:27 PM
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

The E7x clients do operate a bit differently than the older R60 IPSEC client, I 
think the initial https connection from the client are for auth purposes, a 
change from the older hybrid mode auth. Even though no longer supported can you 
connect with the R60 client?, unless using visitor mode it will do native IPSEC 
with no SSL? Make sure your 443 port is not being stepped on by anything else, 
also have the proper license(s) in place, office mode was a freebie for the R60 
client but no longer the case for the E7x client, which is a shame for such a 
needed feature. You still have complete control using simplified mode, it is 
just a mode to simplify the configuration of multiple VPN sites and a few other 
things, once you get over the sticker shock you will see simplified mode is the 
way to go.


-GS


From: Nathan Hawkins na...@thfcom.com
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Sent: Wednesday, September 26, 2012 2:23 PM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

All of that was already set (checked) and applied to the GW

On the Client (E75.20 is currently installed), what I see at the FW and other 
logs I'm using to troubleshoot this is only HTTP/HTTPS connections and I cant 
configure anything else because when I go to create a new site it fails and 
won't continue to configure anything. All I get is a back / cancel / help 
(which brings up the help file) button.

If I must, I'll change to simplified mode, but I like traditional because I 
don't like anything to be automatic. I like complete control over everything.

I appreciate your help! I hope we can fix this...

-Original Message-
From: Mailing list for discussion of Firewall-1 
[mailto:FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio Alvarez
Sent: Wednesday, September 26, 2012 12:14 PM
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

Global Properties  Remotes Access  VPN Auth and Ecryp  IKE over TCP
- here you enable support for TCP encapsulation on the gateway

Gateway Properties  IPSec VPN  Remote Access  Support NAT Traversal
-- Here you enable support for a propietary UDP Encapsulation on
-- the
gateway.

Now, on the client side you must enable these also, otherwise the client won't 
try to use them when trying to establish VPN. Now, I unfortunately don't have 
handy an installation of the new versions of the VPN clients, but on the old 
ones, I remember you go to Settings  Properties of the Site
 Advanced and you configured there the use of TCP and/or UDP Encap
 (also
enable/disable Visitor mode).

If you are still seeing HTTPS from the client IP and destined to the firewall 
on your logs, then your client is still trying to use Visitor Mode.

Finally, you will find more help from people, forums and documentation if you 
turn to simplified VPN mode, traditional mode is pretty old.

On Wed, Sep 26, 2012 at 10:12 AM, Nathan Hawkins na...@thfcom.com wrote:

 Actually I see the FW external IP used frequently, but that's not
 relevant here.

 Please explain where I would involve TCP encapsulation - I've looked
 around for anything that would re-designate a way for Secure Client to
 make a connection and nothing has worked so far.

 I have

Re: [FW-1] Setup of Remote VPN on R75+

2012-09-26 Thread Nathan Hawkins
There has to be a way to set Secure Client to connect at a port (or ports) 
other than port 80 and 443... That it requires those ports is pretty 
stupid/irresponsible...

-Original Message-
From: Mailing list for discussion of Firewall-1 
[mailto:FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio Alvarez
Sent: Monday, September 24, 2012 11:23 AM
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

AFAIK, you need TCP/443 when you enable visitor mode, which basically makes 
the clients establish and SSL conection first and encapsulates an IPSec inside 
that.
It is meant to avoid connectivity issues for users located on public sites, 
where only http/https is allowed to restrict Internet use to browsing only.
I would say, try other advanced connectivity features, such as TCP 
encapsulation.

On Mon, Sep 24, 2012 at 10:08 AM, Nathan Hawkins na...@thfcom.com wrote:

  fw ctl zdebug drop displays ALL drops...I need a way to further 
  filter
 out the drops because there's too many drops to see the one(s) I want.
 fw ctl zdebug drop  | grep myipaddress
  In the global properties there is no specific IKE property. All
 control connections are allowed First.
 
  Well,  you use client encrypt in the action column in order to 
  make
 remote access work...what do you suggest?
 set the user@at in the source, then restrict rule to apply only on 
 remoteaccess community.
 (but it requires the policy to be moved to simplified mode).

 I think I read somewhere that Secure Client/Remote requires port 443 
 to be open on the firewall...which I don't understand why that would 
 be a requirement when HTTPS is necessary for web server 
 applications...anyway...is there a way to make Secure Client/Remote 
 connect at a different port (I suspect so - how do you do so)?

 I don't like simplified mode...so how do you configure the rule policy 
 for secure remote connections for traditional mode?

Scanned by Check Point Total Security Gateway.

=
To set vacation, Out-Of-Office, or away messages,
send an email to lists...@amadeus.us.checkpoint.com
in the BODY of the email add:
set fw-1-mailinglist nomail
=
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=
If you have any questions on how to change your
subscription options, email
fw-1-ow...@ts.checkpoint.com
=


Re: [FW-1] Setup of Remote VPN on R75+

2012-09-26 Thread Sergio Alvarez
As said... it uses TCP/443 when you enable the feature called Visitor
Mode. You can choose to use UDP or TCP encapsulation and that would make
it work on other ports.

On any case, I don't see how using a well used port would be
stupid/irresponsible.

On Wed, Sep 26, 2012 at 7:50 AM, Nathan Hawkins na...@thfcom.com wrote:

 There has to be a way to set Secure Client to connect at a port (or ports)
 other than port 80 and 443... That it requires those ports is pretty
 stupid/irresponsible...

 -Original Message-
 From: Mailing list for discussion of Firewall-1 [mailto:
 FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio Alvarez
 Sent: Monday, September 24, 2012 11:23 AM
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 AFAIK, you need TCP/443 when you enable visitor mode, which basically
 makes the clients establish and SSL conection first and encapsulates an
 IPSec inside that.
 It is meant to avoid connectivity issues for users located on public
 sites, where only http/https is allowed to restrict Internet use to
 browsing only.
 I would say, try other advanced connectivity features, such as TCP
 encapsulation.

 On Mon, Sep 24, 2012 at 10:08 AM, Nathan Hawkins na...@thfcom.com wrote:

   fw ctl zdebug drop displays ALL drops...I need a way to further
   filter
  out the drops because there's too many drops to see the one(s) I want.
  fw ctl zdebug drop  | grep myipaddress
   In the global properties there is no specific IKE property. All
  control connections are allowed First.
  
   Well,  you use client encrypt in the action column in order to
   make
  remote access work...what do you suggest?
  set the user@at in the source, then restrict rule to apply only on
  remoteaccess community.
  (but it requires the policy to be moved to simplified mode).
 
  I think I read somewhere that Secure Client/Remote requires port 443
  to be open on the firewall...which I don't understand why that would
  be a requirement when HTTPS is necessary for web server
  applications...anyway...is there a way to make Secure Client/Remote
  connect at a different port (I suspect so - how do you do so)?
 
  I don't like simplified mode...so how do you configure the rule policy
  for secure remote connections for traditional mode?

 Scanned by Check Point Total Security Gateway.

 =
 To set vacation, Out-Of-Office, or away messages,
 send an email to lists...@amadeus.us.checkpoint.com
 in the BODY of the email add:
 set fw-1-mailinglist nomail
 =
 To unsubscribe from this mailing list,
 please see the instructions at
 http://www.checkpoint.com/services/mailing.html
 =
 If you have any questions on how to change your
 subscription options, email
 fw-1-ow...@ts.checkpoint.com
 =




-- 
Sergio Alvarez
CISSP | CCSE+

=
To set vacation, Out-Of-Office, or away messages,
send an email to lists...@amadeus.us.checkpoint.com
in the BODY of the email add:
set fw-1-mailinglist nomail
=
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=
If you have any questions on how to change your
subscription options, email
fw-1-ow...@ts.checkpoint.com
=


Re: [FW-1] Setup of Remote VPN on R75+

2012-09-26 Thread Nathan Hawkins
Because HTTP/HTTPS is used for web servers - almost exclusively. I cant believe 
that I'm supporting the only company on Earth who uses Checkpoint at the edge 
with web servers that need port 80 and 443 opened and NATed to them without the 
FW intercepting that traffic for Remote VPN connectivity.

In R60-65 Remote Access VPN was initiated on ports other than 80/443 and it 
worked great...even for visitor mode...

Okay. I'll disable visitor mode because its not necessary, but its still not 
connecting - so what now?

-Original Message-
From: Mailing list for discussion of Firewall-1 
[mailto:FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio Alvarez
Sent: Wednesday, September 26, 2012 9:11 AM
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

As said... it uses TCP/443 when you enable the feature called Visitor Mode. 
You can choose to use UDP or TCP encapsulation and that would make it work on 
other ports.

On any case, I don't see how using a well used port would be 
stupid/irresponsible.

On Wed, Sep 26, 2012 at 7:50 AM, Nathan Hawkins na...@thfcom.com wrote:

 There has to be a way to set Secure Client to connect at a port (or 
 ports) other than port 80 and 443... That it requires those ports is 
 pretty stupid/irresponsible...

 -Original Message-
 From: Mailing list for discussion of Firewall-1 [mailto:
 FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio 
 Alvarez
 Sent: Monday, September 24, 2012 11:23 AM
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 AFAIK, you need TCP/443 when you enable visitor mode, which 
 basically makes the clients establish and SSL conection first and 
 encapsulates an IPSec inside that.
 It is meant to avoid connectivity issues for users located on public 
 sites, where only http/https is allowed to restrict Internet use to 
 browsing only.
 I would say, try other advanced connectivity features, such as TCP 
 encapsulation.

 On Mon, Sep 24, 2012 at 10:08 AM, Nathan Hawkins na...@thfcom.com wrote:

   fw ctl zdebug drop displays ALL drops...I need a way to further 
   filter
  out the drops because there's too many drops to see the one(s) I want.
  fw ctl zdebug drop  | grep myipaddress
   In the global properties there is no specific IKE property. All
  control connections are allowed First.
  
   Well,  you use client encrypt in the action column in order to 
   make
  remote access work...what do you suggest?
  set the user@at in the source, then restrict rule to apply only on 
  remoteaccess community.
  (but it requires the policy to be moved to simplified mode).
 
  I think I read somewhere that Secure Client/Remote requires port 443 
  to be open on the firewall...which I don't understand why that would 
  be a requirement when HTTPS is necessary for web server 
  applications...anyway...is there a way to make Secure Client/Remote 
  connect at a different port (I suspect so - how do you do so)?
 
  I don't like simplified mode...so how do you configure the rule 
  policy for secure remote connections for traditional mode?

 Scanned by Check Point Total Security Gateway.

 =
 To set vacation, Out-Of-Office, or away messages, send an email to 
 lists...@amadeus.us.checkpoint.com
 in the BODY of the email add:
 set fw-1-mailinglist nomail
 =
 To unsubscribe from this mailing list, please see the instructions at 
 http://www.checkpoint.com/services/mailing.html
 =
 If you have any questions on how to change your subscription options, 
 email fw-1-ow...@ts.checkpoint.com 
 =




--
Sergio Alvarez
CISSP | CCSE+

=
To set vacation, Out-Of-Office, or away messages, send an email to 
lists...@amadeus.us.checkpoint.com
in the BODY of the email add:
set fw-1-mailinglist nomail
=
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=
If you have any questions on how to change your subscription options, email 
fw-1-ow...@ts.checkpoint.com =

Scanned by Check Point Total Security Gateway.

=
To set vacation, Out-Of-Office, or away messages,
send an email to lists...@amadeus.us.checkpoint.com
in the BODY of the email add:
set fw-1-mailinglist nomail
=
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=
If you have any questions on how to change your
subscription options, email
fw-1-ow

Re: [FW-1] Setup of Remote VPN on R75+

2012-09-26 Thread Sergio Alvarez
Well, usually the Firewall public IP is not used to staticaly NAT web
servers, so regularly this is not an issue... anyway.

I have mentioned already that you could try using something else like TCP
encapsulation, have you tried that??

So far you have not mentioned anything about the logs... have you checked
them? What does it say for connection attempts from a test VPN client user?

I see that before someone else explained to you how to use debugging with a
filter to check for drops on the firewall, have you tried that?

Have you read the VPN Admin Guide pdf document?



On Wed, Sep 26, 2012 at 8:34 AM, Nathan Hawkins na...@thfcom.com wrote:

 Because HTTP/HTTPS is used for web servers - almost exclusively. I cant
 believe that I'm supporting the only company on Earth who uses Checkpoint
 at the edge with web servers that need port 80 and 443 opened and NATed to
 them without the FW intercepting that traffic for Remote VPN connectivity.

 In R60-65 Remote Access VPN was initiated on ports other than 80/443 and
 it worked great...even for visitor mode...

 Okay. I'll disable visitor mode because its not necessary, but its still
 not connecting - so what now?

 -Original Message-
 From: Mailing list for discussion of Firewall-1 [mailto:
 FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio Alvarez
 Sent: Wednesday, September 26, 2012 9:11 AM
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 As said... it uses TCP/443 when you enable the feature called Visitor
 Mode. You can choose to use UDP or TCP encapsulation and that would make
 it work on other ports.

 On any case, I don't see how using a well used port would be
 stupid/irresponsible.

 On Wed, Sep 26, 2012 at 7:50 AM, Nathan Hawkins na...@thfcom.com wrote:

  There has to be a way to set Secure Client to connect at a port (or
  ports) other than port 80 and 443... That it requires those ports is
  pretty stupid/irresponsible...
 
  -Original Message-
  From: Mailing list for discussion of Firewall-1 [mailto:
  FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio
  Alvarez
  Sent: Monday, September 24, 2012 11:23 AM
  To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
  Subject: Re: [FW-1] Setup of Remote VPN on R75+
 
  AFAIK, you need TCP/443 when you enable visitor mode, which
  basically makes the clients establish and SSL conection first and
  encapsulates an IPSec inside that.
  It is meant to avoid connectivity issues for users located on public
  sites, where only http/https is allowed to restrict Internet use to
  browsing only.
  I would say, try other advanced connectivity features, such as TCP
  encapsulation.
 
  On Mon, Sep 24, 2012 at 10:08 AM, Nathan Hawkins na...@thfcom.com
 wrote:
 
fw ctl zdebug drop displays ALL drops...I need a way to further
filter
   out the drops because there's too many drops to see the one(s) I want.
   fw ctl zdebug drop  | grep myipaddress
In the global properties there is no specific IKE property. All
   control connections are allowed First.
   
Well,  you use client encrypt in the action column in order to
make
   remote access work...what do you suggest?
   set the user@at in the source, then restrict rule to apply only on
   remoteaccess community.
   (but it requires the policy to be moved to simplified mode).
  
   I think I read somewhere that Secure Client/Remote requires port 443
   to be open on the firewall...which I don't understand why that would
   be a requirement when HTTPS is necessary for web server
   applications...anyway...is there a way to make Secure Client/Remote
   connect at a different port (I suspect so - how do you do so)?
  
   I don't like simplified mode...so how do you configure the rule
   policy for secure remote connections for traditional mode?
 
  Scanned by Check Point Total Security Gateway.
 
  =
  To set vacation, Out-Of-Office, or away messages, send an email to
  lists...@amadeus.us.checkpoint.com
  in the BODY of the email add:
  set fw-1-mailinglist nomail
  =
  To unsubscribe from this mailing list, please see the instructions at
  http://www.checkpoint.com/services/mailing.html
  =
  If you have any questions on how to change your subscription options,
  email fw-1-ow...@ts.checkpoint.com
  =
 



 --
 Sergio Alvarez
 CISSP | CCSE+

 =
 To set vacation, Out-Of-Office, or away messages, send an email to
 lists...@amadeus.us.checkpoint.com
 in the BODY of the email add:
 set fw-1-mailinglist nomail
 =
 To unsubscribe from this mailing list,
 please see the instructions at
 http://www.checkpoint.com/services/mailing.html

Re: [FW-1] Setup of Remote VPN on R75+

2012-09-26 Thread Sergio Alvarez
Global Properties  Remotes Access  VPN Auth and Ecryp  IKE over TCP
- here you enable support for TCP encapsulation on the gateway

Gateway Properties  IPSec VPN  Remote Access  Support NAT Traversal
-- Here you enable support for a propietary UDP Encapsulation on the
gateway.

Now, on the client side you must enable these also, otherwise the client
won't try to use them when trying to establish VPN. Now, I unfortunately
don't have handy an installation of the new versions of the VPN clients,
but on the old ones, I remember you go to Settings  Properties of the Site
 Advanced and you configured there the use of TCP and/or UDP Encap (also
enable/disable Visitor mode).

If you are still seeing HTTPS from the client IP and destined to the
firewall on your logs, then your client is still trying to use Visitor
Mode.

Finally, you will find more help from people, forums and documentation if
you turn to simplified VPN mode, traditional mode is pretty old.

On Wed, Sep 26, 2012 at 10:12 AM, Nathan Hawkins na...@thfcom.com wrote:

 Actually I see the FW external IP used frequently, but that's not relevant
 here.

 Please explain where I would involve TCP encapsulation - I've looked
 around for anything that would re-designate a way for Secure Client to make
 a connection and nothing has worked so far.

 I have mentioned (at least once, in my initial post) that in Logviewer all
 I see are accepts for HTTP/HTTPS.

 I have also explained in a recent post that I don't see any drops at the
 console (CLI) for the SIP of where the remote client is coming from.

 Yes - I have read the Admin Guide for R75.20 - several times actually...
 Its not that helpful...

 -Original Message-
 From: Mailing list for discussion of Firewall-1 [mailto:
 FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio Alvarez
 Sent: Wednesday, September 26, 2012 10:12 AM
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 Well, usually the Firewall public IP is not used to staticaly NAT web
 servers, so regularly this is not an issue... anyway.

 I have mentioned already that you could try using something else like TCP
 encapsulation, have you tried that??

 So far you have not mentioned anything about the logs... have you checked
 them? What does it say for connection attempts from a test VPN client user?

 I see that before someone else explained to you how to use debugging with
 a filter to check for drops on the firewall, have you tried that?

 Have you read the VPN Admin Guide pdf document?



 On Wed, Sep 26, 2012 at 8:34 AM, Nathan Hawkins na...@thfcom.com wrote:

  Because HTTP/HTTPS is used for web servers - almost exclusively. I
  cant believe that I'm supporting the only company on Earth who uses
  Checkpoint at the edge with web servers that need port 80 and 443
  opened and NATed to them without the FW intercepting that traffic for
 Remote VPN connectivity.
 
  In R60-65 Remote Access VPN was initiated on ports other than 80/443
  and it worked great...even for visitor mode...
 
  Okay. I'll disable visitor mode because its not necessary, but its
  still not connecting - so what now?
 
  -Original Message-
  From: Mailing list for discussion of Firewall-1 [mailto:
  FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio
  Alvarez
  Sent: Wednesday, September 26, 2012 9:11 AM
  To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
  Subject: Re: [FW-1] Setup of Remote VPN on R75+
 
  As said... it uses TCP/443 when you enable the feature called Visitor
  Mode. You can choose to use UDP or TCP encapsulation and that would
  make it work on other ports.
 
  On any case, I don't see how using a well used port would be
  stupid/irresponsible.
 
  On Wed, Sep 26, 2012 at 7:50 AM, Nathan Hawkins na...@thfcom.com
 wrote:
 
   There has to be a way to set Secure Client to connect at a port (or
   ports) other than port 80 and 443... That it requires those ports is
   pretty stupid/irresponsible...
  
   -Original Message-
   From: Mailing list for discussion of Firewall-1 [mailto:
   FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio
   Alvarez
   Sent: Monday, September 24, 2012 11:23 AM
   To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
   Subject: Re: [FW-1] Setup of Remote VPN on R75+
  
   AFAIK, you need TCP/443 when you enable visitor mode, which
   basically makes the clients establish and SSL conection first and
   encapsulates an IPSec inside that.
   It is meant to avoid connectivity issues for users located on public
   sites, where only http/https is allowed to restrict Internet use to
   browsing only.
   I would say, try other advanced connectivity features, such as
   TCP encapsulation.
  
   On Mon, Sep 24, 2012 at 10:08 AM, Nathan Hawkins na...@thfcom.com
  wrote:
  
 fw ctl zdebug drop displays ALL drops...I need a way to
 further filter
out the drops because there's too many drops to see the one(s) I
 want

Re: [FW-1] Setup of Remote VPN on R75+

2012-09-26 Thread Nathan Hawkins
All of that was already set (checked) and applied to the GW

On the Client (E75.20 is currently installed), what I see at the FW and other 
logs I'm using to troubleshoot this is only HTTP/HTTPS connections and I cant 
configure anything else because when I go to create a new site it fails and 
won't continue to configure anything. All I get is a back / cancel / help 
(which brings up the help file) button.

If I must, I'll change to simplified mode, but I like traditional because I 
don't like anything to be automatic. I like complete control over everything.

I appreciate your help! I hope we can fix this...

-Original Message-
From: Mailing list for discussion of Firewall-1 
[mailto:FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio Alvarez
Sent: Wednesday, September 26, 2012 12:14 PM
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

Global Properties  Remotes Access  VPN Auth and Ecryp  IKE over TCP
- here you enable support for TCP encapsulation on the gateway

Gateway Properties  IPSec VPN  Remote Access  Support NAT Traversal
-- Here you enable support for a propietary UDP Encapsulation on 
-- the
gateway.

Now, on the client side you must enable these also, otherwise the client won't 
try to use them when trying to establish VPN. Now, I unfortunately don't have 
handy an installation of the new versions of the VPN clients, but on the old 
ones, I remember you go to Settings  Properties of the Site
 Advanced and you configured there the use of TCP and/or UDP Encap 
 (also
enable/disable Visitor mode).

If you are still seeing HTTPS from the client IP and destined to the firewall 
on your logs, then your client is still trying to use Visitor Mode.

Finally, you will find more help from people, forums and documentation if you 
turn to simplified VPN mode, traditional mode is pretty old.

On Wed, Sep 26, 2012 at 10:12 AM, Nathan Hawkins na...@thfcom.com wrote:

 Actually I see the FW external IP used frequently, but that's not 
 relevant here.

 Please explain where I would involve TCP encapsulation - I've looked 
 around for anything that would re-designate a way for Secure Client to 
 make a connection and nothing has worked so far.

 I have mentioned (at least once, in my initial post) that in Logviewer 
 all I see are accepts for HTTP/HTTPS.

 I have also explained in a recent post that I don't see any drops at 
 the console (CLI) for the SIP of where the remote client is coming from.

 Yes - I have read the Admin Guide for R75.20 - several times actually...
 Its not that helpful...

 -Original Message-
 From: Mailing list for discussion of Firewall-1 [mailto:
 FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio 
 Alvarez
 Sent: Wednesday, September 26, 2012 10:12 AM
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 Well, usually the Firewall public IP is not used to staticaly NAT web 
 servers, so regularly this is not an issue... anyway.

 I have mentioned already that you could try using something else like 
 TCP encapsulation, have you tried that??

 So far you have not mentioned anything about the logs... have you 
 checked them? What does it say for connection attempts from a test VPN client 
 user?

 I see that before someone else explained to you how to use debugging 
 with a filter to check for drops on the firewall, have you tried that?

 Have you read the VPN Admin Guide pdf document?



 On Wed, Sep 26, 2012 at 8:34 AM, Nathan Hawkins na...@thfcom.com wrote:

  Because HTTP/HTTPS is used for web servers - almost exclusively. I 
  cant believe that I'm supporting the only company on Earth who uses 
  Checkpoint at the edge with web servers that need port 80 and 443 
  opened and NATed to them without the FW intercepting that traffic 
  for
 Remote VPN connectivity.
 
  In R60-65 Remote Access VPN was initiated on ports other than 80/443 
  and it worked great...even for visitor mode...
 
  Okay. I'll disable visitor mode because its not necessary, but its 
  still not connecting - so what now?
 
  -Original Message-
  From: Mailing list for discussion of Firewall-1 [mailto:
  FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio 
  Alvarez
  Sent: Wednesday, September 26, 2012 9:11 AM
  To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
  Subject: Re: [FW-1] Setup of Remote VPN on R75+
 
  As said... it uses TCP/443 when you enable the feature called 
  Visitor Mode. You can choose to use UDP or TCP encapsulation and 
  that would make it work on other ports.
 
  On any case, I don't see how using a well used port would be 
  stupid/irresponsible.
 
  On Wed, Sep 26, 2012 at 7:50 AM, Nathan Hawkins na...@thfcom.com
 wrote:
 
   There has to be a way to set Secure Client to connect at a port 
   (or
   ports) other than port 80 and 443... That it requires those ports 
   is pretty stupid/irresponsible...
  
   -Original

Re: [FW-1] Setup of Remote VPN on R75+

2012-09-26 Thread Gary Scott
The E7x clients do operate a bit differently than the older R60 IPSEC client, I 
think the initial https connection from the client are for auth purposes, a 
change from the older hybrid mode auth. Even though no longer supported can you 
connect with the R60 client?, unless using visitor mode it will do native IPSEC 
with no SSL? Make sure your 443 port is not being stepped on by anything else, 
also have the proper license(s) in place, office mode was a freebie for the R60 
client but no longer the case for the E7x client, which is a shame for such a 
needed feature. You still have complete control using simplified mode, it is 
just a mode to simplify the configuration of multiple VPN sites and a few other 
things, once you get over the sticker shock you will see simplified mode is the 
way to go. 
 
 
-GS


From: Nathan Hawkins na...@thfcom.com
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM 
Sent: Wednesday, September 26, 2012 2:23 PM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

All of that was already set (checked) and applied to the GW

On the Client (E75.20 is currently installed), what I see at the FW and other 
logs I'm using to troubleshoot this is only HTTP/HTTPS connections and I cant 
configure anything else because when I go to create a new site it fails and 
won't continue to configure anything. All I get is a back / cancel / help 
(which brings up the help file) button.

If I must, I'll change to simplified mode, but I like traditional because I 
don't like anything to be automatic. I like complete control over everything.

I appreciate your help! I hope we can fix this...

-Original Message-
From: Mailing list for discussion of Firewall-1 
[mailto:FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio Alvarez
Sent: Wednesday, September 26, 2012 12:14 PM
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Subject: Re: [FW-1] Setup of Remote VPN on R75+

Global Properties  Remotes Access  VPN Auth and Ecryp  IKE over TCP
- here you enable support for TCP encapsulation on the gateway

Gateway Properties  IPSec VPN  Remote Access  Support NAT Traversal
-- Here you enable support for a propietary UDP Encapsulation on 
-- the
gateway.

Now, on the client side you must enable these also, otherwise the client won't 
try to use them when trying to establish VPN. Now, I unfortunately don't have 
handy an installation of the new versions of the VPN clients, but on the old 
ones, I remember you go to Settings  Properties of the Site
 Advanced and you configured there the use of TCP and/or UDP Encap 
 (also
enable/disable Visitor mode).

If you are still seeing HTTPS from the client IP and destined to the firewall 
on your logs, then your client is still trying to use Visitor Mode.

Finally, you will find more help from people, forums and documentation if you 
turn to simplified VPN mode, traditional mode is pretty old.

On Wed, Sep 26, 2012 at 10:12 AM, Nathan Hawkins na...@thfcom.com wrote:

 Actually I see the FW external IP used frequently, but that's not 
 relevant here.

 Please explain where I would involve TCP encapsulation - I've looked 
 around for anything that would re-designate a way for Secure Client to 
 make a connection and nothing has worked so far.

 I have mentioned (at least once, in my initial post) that in Logviewer 
 all I see are accepts for HTTP/HTTPS.

 I have also explained in a recent post that I don't see any drops at 
 the console (CLI) for the SIP of where the remote client is coming from.

 Yes - I have read the Admin Guide for R75.20 - several times actually...
 Its not that helpful...

 -Original Message-
 From: Mailing list for discussion of Firewall-1 [mailto:
 FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Sergio 
 Alvarez
 Sent: Wednesday, September 26, 2012 10:12 AM
 To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
 Subject: Re: [FW-1] Setup of Remote VPN on R75+

 Well, usually the Firewall public IP is not used to staticaly NAT web 
 servers, so regularly this is not an issue... anyway.

 I have mentioned already that you could try using something else like 
 TCP encapsulation, have you tried that??

 So far you have not mentioned anything about the logs... have you 
 checked them? What does it say for connection attempts from a test VPN client 
 user?

 I see that before someone else explained to you how to use debugging 
 with a filter to check for drops on the firewall, have you tried that?

 Have you read the VPN Admin Guide pdf document?



 On Wed, Sep 26, 2012 at 8:34 AM, Nathan Hawkins na...@thfcom.com wrote:

  Because HTTP/HTTPS is used for web servers - almost exclusively. I 
  cant believe that I'm supporting the only company on Earth who uses 
  Checkpoint at the edge with web servers that need port 80 and 443 
  opened and NATed to them without the FW intercepting that traffic 
  for
 Remote VPN connectivity.
 
  In R60-65 Remote Access VPN was initiated on ports other

Re: [FW-1] Setup of Remote VPN on R75+

2012-09-24 Thread Nathan Hawkins
 fw ctl zdebug drop displays ALL drops...I need a way to further filter out 
 the drops because there's too many drops to see the one(s) I want.
fw ctl zdebug drop  | grep myipaddress
 In the global properties there is no specific IKE property. All control 
 connections are allowed First.

 Well,  you use client encrypt in the action column in order to make remote 
 access work...what do you suggest?
set the user@at in the source, then restrict rule to apply only on remoteaccess 
community.
(but it requires the policy to be moved to simplified mode).

I think I read somewhere that Secure Client/Remote requires port 443 to be open 
on the firewall...which I don't understand why that would be a requirement when 
HTTPS is necessary for web server applications...anyway...is there a way to 
make Secure Client/Remote connect at a different port (I suspect so - how do 
you do so)?

I don't like simplified mode...so how do you configure the rule policy for 
secure remote connections for traditional mode? 

Scanned by Check Point Total Security Gateway.

=
To set vacation, Out-Of-Office, or away messages,
send an email to lists...@amadeus.us.checkpoint.com
in the BODY of the email add:
set fw-1-mailinglist nomail
=
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=
If you have any questions on how to change your
subscription options, email
fw-1-ow...@ts.checkpoint.com
=


Re: [FW-1] Setup of Remote VPN on R75+

2012-09-24 Thread Sergio Alvarez
AFAIK, you need TCP/443 when you enable visitor mode, which basically
makes the clients establish and SSL conection first and encapsulates an
IPSec inside that.
It is meant to avoid connectivity issues for users located on public sites,
where only http/https is allowed to restrict Internet use to browsing only.
I would say, try other advanced connectivity features, such as TCP
encapsulation.

On Mon, Sep 24, 2012 at 10:08 AM, Nathan Hawkins na...@thfcom.com wrote:

  fw ctl zdebug drop displays ALL drops...I need a way to further filter
 out the drops because there's too many drops to see the one(s) I want.
 fw ctl zdebug drop  | grep myipaddress
  In the global properties there is no specific IKE property. All
 control connections are allowed First.
 
  Well,  you use client encrypt in the action column in order to make
 remote access work...what do you suggest?
 set the user@at in the source, then restrict rule to apply only on
 remoteaccess community.
 (but it requires the policy to be moved to simplified mode).

 I think I read somewhere that Secure Client/Remote requires port 443 to be
 open on the firewall...which I don't understand why that would be a
 requirement when HTTPS is necessary for web server
 applications...anyway...is there a way to make Secure Client/Remote connect
 at a different port (I suspect so - how do you do so)?

 I don't like simplified mode...so how do you configure the rule policy for
 secure remote connections for traditional mode?

 Scanned by Check Point Total Security Gateway.

 =
 To set vacation, Out-Of-Office, or away messages,
 send an email to lists...@amadeus.us.checkpoint.com
 in the BODY of the email add:
 set fw-1-mailinglist nomail
 =
 To unsubscribe from this mailing list,
 please see the instructions at
 http://www.checkpoint.com/services/mailing.html
 =
 If you have any questions on how to change your
 subscription options, email
 fw-1-ow...@ts.checkpoint.com
 =

 Scanned by Check Point Total Security Gateway.




-- 
Sergio Alvarez
CISSP | CCSE+

=
To set vacation, Out-Of-Office, or away messages,
send an email to lists...@amadeus.us.checkpoint.com
in the BODY of the email add:
set fw-1-mailinglist nomail
=
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=
If you have any questions on how to change your
subscription options, email
fw-1-ow...@ts.checkpoint.com
=


Re: [FW-1] Setup of Remote VPN on R75+

2012-09-22 Thread pkc_mls

Le 20/09/2012 8:47, Nathan Hawkins a écrit :


fw ctl zdebug drop displays ALL drops...I need a way to further filter out 
the drops because there's too many drops to see the one(s) I want.

fw ctl zdebug drop  | grep myipaddress

In the global properties there is no specific IKE property. All control 
connections are allowed First.

Well,  you use client encrypt in the action column in order to make remote 
access work...what do you suggest?
set the user@at in the source, then restrict rule to apply only on 
remoteaccess community.

(but it requires the policy to be moved to simplified mode).


Scanned by Check Point Total Security Gateway.

=
To set vacation, Out-Of-Office, or away messages,
send an email to lists...@amadeus.us.checkpoint.com
in the BODY of the email add:
set fw-1-mailinglist nomail
=
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=
If you have any questions on how to change your
subscription options, email
fw-1-ow...@ts.checkpoint.com
=


Re: [FW-1] Setup of Remote VPN on R75+

2012-09-20 Thread pkc_mls

Le 20/09/2012 5:26, Nathan Hawkins a écrit :

Ok...so I've setup remote VPNs before...but on earlier versions of Checkpoint. I'm not sure what I'm doing wrong, but the client wont 
connect. I have an R75.20 GW and Mgt Console. Under the IPSec VPN tab of the GW I have MyIntranet and RemoteAccess 
added to the communities.  Under the traditional Mode button everything is checked... Under the Authentication tab I have Username 
and Password ticked. Under Remote Access tab I have the Support NAT traversal mechanism (UDP encapsulation) 
checked with the VPN1_IPSEC_encapsulation object selected. Everything else (I think) is default.

Under the policy I have a rule created with AllUsers@Any / Any / Any / Client 
Encrypt / Log / FW created at the very top of the rule base.

When I try to connect it flat out fails to connect (Reason is Site is not 
responding)...s what the heck is not configured correctly?!

check the drops using fw ctl zdebug drop.
do you have ike allowed in global properties - implied rules ?

I'm quite surprised you use client encrypt for your rule.




Scanned by Check Point Total Security Gateway.

=
To set vacation, Out-Of-Office, or away messages,
send an email to lists...@amadeus.us.checkpoint.com
in the BODY of the email add:
set fw-1-mailinglist nomail
=
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=
If you have any questions on how to change your
subscription options, email
fw-1-ow...@ts.checkpoint.com
=

Scanned by Check Point Total Security Gateway.


Re: [FW-1] Setup of Remote VPN on R75+

2012-09-20 Thread Nathan Hawkins
 Ok...so I've setup remote VPNs before...but on earlier versions of 
 Checkpoint. I'm not sure what I'm doing wrong, but the client wont connect. 
 I have an R75.20 GW and Mgt Console. Under the IPSec VPN tab of the GW I 
 have MyIntranet and RemoteAccess added to the communities.  Under the 
 traditional Mode button everything is checked... Under the Authentication 
 tab I have Username and Password ticked. Under Remote Access tab I have 
 the Support NAT traversal mechanism (UDP encapsulation) checked with the 
 VPN1_IPSEC_encapsulation object selected. Everything else (I think) is 
 default.

 Under the policy I have a rule created with AllUsers@Any / Any / Any / 
 Client Encrypt / Log / FW created at the very top of the rule base.

 When I try to connect it flat out fails to connect (Reason is Site is not 
 responding)...s what the heck is not configured correctly?!
check the drops using fw ctl zdebug drop.
do you have ike allowed in global properties - implied rules ?

I'm quite surprised you use client encrypt for your rule.

fw ctl zdebug drop displays ALL drops...I need a way to further filter out 
the drops because there's too many drops to see the one(s) I want.

In the global properties there is no specific IKE property. All control 
connections are allowed First.

Well,  you use client encrypt in the action column in order to make remote 
access work...what do you suggest?

Scanned by Check Point Total Security Gateway.

=
To set vacation, Out-Of-Office, or away messages,
send an email to lists...@amadeus.us.checkpoint.com
in the BODY of the email add:
set fw-1-mailinglist nomail
=
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=
If you have any questions on how to change your
subscription options, email
fw-1-ow...@ts.checkpoint.com
=