eduardo:checkpoint:ipsec
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
eduardo:checkpoint:ipsec [2010/07/21 05:37] – eduardo | eduardo:checkpoint:ipsec [2024/02/23 08:20] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ====== IPSec ====== | ||
+ | ===== General ===== | ||
+ | {{ipsec-ike1.png|}} | ||
+ | ---- | ||
+ | {{ipsec-ike2.png|}} | ||
+ | ---- | ||
+ | {{ipsec-transf.png|}} | ||
+ | |||
+ | ===== Configuration ===== | ||
+ | |||
+ | ==== Center Gateway ==== | ||
+ | * Assign encryption domain behind the center gateway. | ||
+ | * These are IP addresses behind the local center gateway that will be encrypted | ||
+ | * Traffic is only encrypted between the addresses in the encryption domain of the center and satellite gateway. | ||
+ | * The center gateway is usually the local checkpoint firewall cluster | ||
+ | {{ipsec-conf1.png|}} | ||
+ | |||
+ | ==== Satellite Gateway ==== | ||
+ | * The satellite gateway is the other end of the IPSec tunnels connecting with the Center Gateway | ||
+ | * Create new satellite gateway | ||
+ | * If not checkpoint, create new **interoperable devices** | ||
+ | * If checkpoint, create new **Checkpoint > Externally Managed VPN Gateway** | ||
+ | |||
+ | * Configure Name and IP | ||
+ | {{ipsec-conf2.png|}} | ||
+ | |||
+ | * If the satellite gateway is using a different source IP address than what we have configured, add it under the topology | ||
+ | * Otherwise the local center gateway will reject the IKE with the following message: | ||
+ | < | ||
+ | IKE: Main Mode local machine configured not to respond to unknown IP addresses (i.e. not exportable for SR, and/or not included in the RemoteAccess community, and/or no DAIP's defined) | ||
+ | IKE: Main Mode Sent Notification to Peer: invalid id information | ||
+ | </ | ||
+ | <note important> | ||
+ | * Assign encryption domain to the Satellite gateway | ||
+ | * Traffic is only encrypted between the addresses in the encryption domain of the satellite and center gateway. | ||
+ | {{ipsec-conf3.png|}} | ||
+ | |||
+ | ==== VPN Community ==== | ||
+ | * Create **Star Community** to configure IPSec parameters | ||
+ | * Add **Center Gateway** which is usually the local checkpoint firewall | ||
+ | {{ipsec-conf4.png|}} | ||
+ | |||
+ | * Add **Satellite Gateway** which is remote end of the IPSec termination | ||
+ | {{ipsec-conf5.png|}} | ||
+ | |||
+ | * Configure IKE and IPSec parameters | ||
+ | {{ipsec-conf6.png|}} | ||
+ | |||
+ | * Configure preshared secret | ||
+ | {{ipsec-conf7.png|}} | ||
+ | |||
+ | * Configure the Diffie Hellman parameters | ||
+ | {{ipsec-conf8.png|}} | ||
+ | |||
+ | ==== Policy ==== | ||
+ | * Assign VPN community as target for policy | ||
+ | {{ipsec-conf9.png|}} | ||
+ | {{ipsec-conf10.png|}} | ||
+ | |||
+ | ===== Debug ===== | ||
+ | * To Clear the All the IKE and IPSec SA | ||
+ | * SSH to the VPN-1 firewall | ||
+ | * Need to be in expert mode in R55 | ||
+ | < | ||
+ | [vpn-1-fw]# vpn tu | ||
+ | |||
+ | ********** | ||
+ | |||
+ | (1) List all IKE SAs | ||
+ | (2) List all IPsec SAs | ||
+ | (3) List all IKE SAs for a given peer (GW) or user (Client) | ||
+ | (4) List all IPsec SAs for a given peer (GW) or user (Client) | ||
+ | (5) | ||
+ | (6) | ||
+ | (7) | ||
+ | (8) | ||
+ | (9) | ||
+ | (0) | ||
+ | |||
+ | (Q) Quit | ||
+ | |||
+ | ******************************************* | ||
+ | |||
+ | 0 | ||
+ | </ | ||
+ | |||
+ | * To monitor status of VPN tunnel | ||
+ | * Use SmartView Monitor and select **Tunnels on Gateway** | ||
+ | * Only work from R65 onward | ||
+ | {{ipsec-conf11.png|}} |