On Wed, Nov 12 2008 at 18:13, Joe Warren-Meeks wrote:
> Hey guys,
Hi,

> I'm struggling to get isakpmd to talk to a checkpoint firewall
> 
> I need the following parameters
> 
> General IKE Properties = AES-256 with SHA1
> IKE Phase 1 SA = Group2 (1024 bit)
> IKE Phase 1 SA renegotiation = 1440
> IKE Phase 2 SA renegotiation = 3600
> 
> The network layout looks as follows:
> 
> OurNet              OurFirewall     Internet  TheirFW         TheirNet
> 
> 195.24.xxx.xxx/25 - 195.24.xxx.yyy -----      62.232.xxx.xxx  62.232.xxx.yyy
> 
> I currently have the following in my isakpmd.policy
> 
> Keynote-version: 2
> Authorizer: "POLICY"
> Conditions: app_domain == "IPsec policy" &&
>                 esp_present == "yes" &&
>                 esp_enc_alg != "null" -> "true";
> 
> And my isakmpd.conf is at the end. Any pointers guys?

I don't know if your isakmpd.conf is good or not. The general
part seems good. But I'm wondering why you are not using the new
configuration file (/etc/ipsec.conf) It's much easier to use and to
maintain over time. For your part, you'll have to keep default lifetime
in isakmpd.conf as it's not supported in ipsec.conf.

>From experience I can assure you it works also with Check Point (R60 to
R65) you just have to carefully ensure that all ipsec variables are the
same (As always with ipsec). Please review the parameters with the other
end. If you can, also ask them for their error message when establishing
the tunnel. I found the CheckPoint messages more usefull than the
isakmpd ones.



> [General]
> Retransmits=            5
> Exchange-max-time=      120
> Listen-on=              195.24.xxx.yyy
> Default-phase-1-lifetime=       1440,60:86400
> Default-phase-2-lifetime=       3600,60:86400
> 
> 
> 
> [Phase 1]
> 62.232.xxx.xxx=           local-remote
> 
> [local-remote]
> Phase=                  1
> Transport=              udp
> Local-address=          195.24.xxx.yyy
> Address=                62.232.xxx.xxx
> Configuration=          Default-main-mode
> Authentication=         makemeagoatorsomething
> 
> [Phase 2]
> Connections=    VPN-local-remote-62.232.xx.yy/255.255.255.224
> 
> 
> [VPN-local-remote-62.232.xx.yy/255.255.255.224]
> Phase=                  2
> ISAKMP-peer=            local-remote
> Configuration=          Default-quick-mode
> Local-ID=               network-195.24.xxx.xxx/255.255.255.128
> Remote-ID=              network-62.232.xxx.yyy/255.255.255.224
> 
> 
> 
> [network-195.24.xxx.xxx/255.255.255.128]
> ID-type=                IPV4_ADDR_SUBNET
> Network=                195.24.xxx.xx
> Netmask=                255.255.255.128
> 
> 
> 
> [network-62.232.xxx.yyy/255.255.255.0]
> ID-type=                IPV4_ADDR_SUBNET
> Network=                62.232.xxx.yyy
> Netmask=                255.255.255.0
> 
>         
> [Default-main-mode]
> DOI=            IPSEC
> EXCHANGE_TYPE=  ID_PROT
> Life=                   ANY
> Transforms=             AES-256-SHA
> 
> [Default-quick-mode]
> DOI=            IPSEC
> EXCHANGE_TYPE=  QUICK_MODE
> Suites=         QM-ESP-AES-256-SHA-SUITE
> 
> [AES-256-SHA]
> ENCRYPTION_ALGORITHM=   AES_CBC
> KEY_LENGTH=             256,256:256
> HASH_ALGORITHM=         SHA
> AUTHENTICATION_METHOD=  PRE_SHARED
> GROUP_DESCRIPTION=      MODP_1024
> Life=                   LIFE_MAIN_MODE
> 
> [QM-ESP-AES-256-SHA-SUITE]
> Protocols=              QM-ESP-AES-256-SHA
> 
>  -- joe.

Reply via email to