<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: problems with site to site VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896612#M959886</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kevin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your a big help so far&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;There was a typo in the command.&lt;/P&gt;&lt;P&gt;but i changed it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static udp 10.10.40.1 500 interface FastEthernet0/1 500 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;instead of &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static udp 10.10.40.1 interface FastEthernet0/1 500 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It worked. Now the company can start aping on its own. But the thing is only one host on his side can ping to my. We can't ping each other simultaneously. I also see a malformed payload in de debug. Attached the debug file. Can you help out on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Nov 2007 23:44:27 GMT</pubDate>
    <dc:creator>greg-bnets</dc:creator>
    <dc:date>2007-11-28T23:44:27Z</dc:date>
    <item>
      <title>problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896606#M959878</link>
      <description>&lt;P&gt;Hi there i have a problem with a site to site connection with a company we work with. The company works with a checkpoint ngx-1 R65 en we work with Pix. The thing is that we VPN comes up. I can ping host at the company side and traffic is flowing. The company cannot access us only when we start a ping from our side only after that they can access us. We also got some socket errors on one of our apps when connecting to them.&lt;/P&gt;&lt;P&gt;i have debug logs attached. One is when we are sending pings to them (debug ourside.txt). and on were they are sending pings to us (debug company ping.txt .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:35:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896606#M959878</guid>
      <dc:creator>greg-bnets</dc:creator>
      <dc:date>2019-03-11T11:35:59Z</dc:date>
    </item>
    <item>
      <title>Re: problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896607#M959879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok,&lt;/P&gt;&lt;P&gt;the solution is a very simple one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) make sure that you do not NAT inside&lt;/P&gt;&lt;P&gt;the vpn tunnel on the checkpoint side.&lt;/P&gt;&lt;P&gt;In checkpoint VPN community, I am assuming&lt;/P&gt;&lt;P&gt;that you're using simplified mode, there&lt;/P&gt;&lt;P&gt;is a check box that tell you to disabble NAT&lt;/P&gt;&lt;P&gt;inside VPN tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) checkpoint will tend to supper net the &lt;/P&gt;&lt;P&gt;interesting traffic whenever possible. I am &lt;/P&gt;&lt;P&gt;suspecting that is the case because it only &lt;/P&gt;&lt;P&gt;works once you start pinging the other side.&lt;/P&gt;&lt;P&gt;When the tunnel timeout, it will not work&lt;/P&gt;&lt;P&gt;if traffics is initiated from the other side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To fix this, please advise the other company&lt;/P&gt;&lt;P&gt;to do the following:&lt;/P&gt;&lt;P&gt;in the VPN community properties, go to&lt;/P&gt;&lt;P&gt;tunnel Management, look into the "VPN&lt;/P&gt;&lt;P&gt;Tunnel Sharing", select "one vpn tunnel&lt;/P&gt;&lt;P&gt;per each pair of hosts".  The default is&lt;/P&gt;&lt;P&gt;"one vpn tunnel per subnet pair". After that&lt;/P&gt;&lt;P&gt;push the policy and likely it will work after&lt;/P&gt;&lt;P&gt;that.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this method is not efficient but this method&lt;/P&gt;&lt;P&gt;is widely used when setting VPN between Checkpoint and Cisco/Juniper.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Finally, if all else fails, you may&lt;/P&gt;&lt;P&gt;have to go into the $FWDIR/lib of the CMA&lt;/P&gt;&lt;P&gt;or management and modify the user.def file.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if it works for you.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Nov 2007 21:46:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896607#M959879</guid>
      <dc:creator>kevin.jones1</dc:creator>
      <dc:date>2007-11-27T21:46:05Z</dc:date>
    </item>
    <item>
      <title>Re: problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896608#M959880</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Keven,&lt;/P&gt;&lt;P&gt;Thanks for your reply. I contacted the company but still the same reult. Only after i started pinging they could ping us. Before that they would get "no valid SA"in their log but nothing showing up in de debug on my side. attached is the complete debug when we tested just now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2007 14:40:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896608#M959880</guid>
      <dc:creator>greg-bnets</dc:creator>
      <dc:date>2007-11-28T14:40:06Z</dc:date>
    </item>
    <item>
      <title>Re: problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896609#M959881</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The problem is that you have phase II &lt;/P&gt;&lt;P&gt;mis-matched when checkpoint initiates&lt;/P&gt;&lt;P&gt;traffics first:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  (key eng. msg.) dest= 10.10.40.1, src= 200.x.x.138,&lt;/P&gt;&lt;P&gt;    dest_proxy= MNS/255.255.255.255/0/0 (type=1),&lt;/P&gt;&lt;P&gt;    src_proxy= DIGICELNW1/255.255.255.0/0/0 (type=4),&lt;/P&gt;&lt;P&gt;    protocol= ESP, transform= esp-3des esp-sha-hmac ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been working with both Checkpoint firewalls and Cisco Pix/IOS for about 7 &lt;/P&gt;&lt;P&gt;years now and checkpoint is doing &lt;/P&gt;&lt;P&gt;suppernet on its side.  That's why it fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tell the folks on the Checkpoint side to run&lt;/P&gt;&lt;P&gt;"vpn debug ikeon" and you the utility IKEView.exe to view the debug and it will tell &lt;/P&gt;&lt;P&gt;you why it fails.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been working with both Checkpoint firewalls and Pix/IOS for about seven years now and what you see is quite typical for VPN&lt;/P&gt;&lt;P&gt;between checkpoint and Cisco.  Use my method in previous post and it will work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to chat, put your phone here and&lt;/P&gt;&lt;P&gt;I will call you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2007 16:02:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896609#M959881</guid>
      <dc:creator>kevin.jones1</dc:creator>
      <dc:date>2007-11-28T16:02:13Z</dc:date>
    </item>
    <item>
      <title>Re: problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896610#M959884</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kevin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Checkpoint support stated that everything is good on their side. What i forgot to mention is that my pix is behind a router. i use a private address 10.10.40.1 which i nat to the public address of the outside interface out the router. They tell me that i have no static nat for inbound traffic sending IPsec traffic to the pix. Attached is the router config. Can you check it for me. The thing is when they are trying to ping first i don't see anything in de debug. also the hosts behind the firewall are nat to 10.10.40.X on the router 10.10.40.0 is nat to the public address on the outside interface. so the topology is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ--&amp;gt; PIX----&amp;gt; router (3725) ---&amp;gt;Internet--&amp;gt; FW checkpoint.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for helping me out. my phone number is +597-8595355&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2007 21:00:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896610#M959884</guid>
      <dc:creator>greg-bnets</dc:creator>
      <dc:date>2007-11-28T21:00:51Z</dc:date>
    </item>
    <item>
      <title>Re: problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896611#M959885</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok now I have a better picture of what you&lt;/P&gt;&lt;P&gt;want to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Checkpoint TAC supports is correct.  In order&lt;/P&gt;&lt;P&gt;for this to work, you need to have static&lt;/P&gt;&lt;P&gt;NAT for inbound traffic to send traffic to the&lt;/P&gt;&lt;P&gt;Pix.  In your case, since you have nat everything to the public address of the outside interface so you may not have anymore&lt;/P&gt;&lt;P&gt;public ip addresses available.  In that case,&lt;/P&gt;&lt;P&gt;I would do the following on the router:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static udp 10.10.40.1 interface FastEthernet0/1 500&lt;/P&gt;&lt;P&gt;ip nat inside source static esp 10.10.40.1 interface FastEthernet0/1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In other words, you are telling the router to&lt;/P&gt;&lt;P&gt;forward isakmp/500 and esp traffics from&lt;/P&gt;&lt;P&gt;interface F0/1 on the router to the Pix.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will allow the checkpoint to communicate&lt;/P&gt;&lt;P&gt;with your Pix firewall and it will work like&lt;/P&gt;&lt;P&gt;a charm.  Make sure on the Checkpoint side,&lt;/P&gt;&lt;P&gt;the InterOperable Device is setup with an&lt;/P&gt;&lt;P&gt;ip address of 200.X.X.19.  Don't forget to&lt;/P&gt;&lt;P&gt;tell them to re-push the policy after they &lt;/P&gt;&lt;P&gt;are done.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I learned about this method while preparing&lt;/P&gt;&lt;P&gt;for the CCIE security lab two years ago.  Funny thing is that I am CCIE security certified but I know more about Checkpoint &lt;/P&gt;&lt;P&gt;technologies and I do with Cisco.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this works for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2007 21:44:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896611#M959885</guid>
      <dc:creator>kevin.jones1</dc:creator>
      <dc:date>2007-11-28T21:44:44Z</dc:date>
    </item>
    <item>
      <title>Re: problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896612#M959886</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kevin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your a big help so far&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;There was a typo in the command.&lt;/P&gt;&lt;P&gt;but i changed it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static udp 10.10.40.1 500 interface FastEthernet0/1 500 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;instead of &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static udp 10.10.40.1 interface FastEthernet0/1 500 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It worked. Now the company can start aping on its own. But the thing is only one host on his side can ping to my. We can't ping each other simultaneously. I also see a malformed payload in de debug. Attached the debug file. Can you help out on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2007 23:44:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896612#M959886</guid>
      <dc:creator>greg-bnets</dc:creator>
      <dc:date>2007-11-28T23:44:27Z</dc:date>
    </item>
    <item>
      <title>Re: problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896613#M959887</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My consulting rate is $250/hour and I think&lt;/P&gt;&lt;P&gt;the fee is quite reasonable since you're &lt;/P&gt;&lt;P&gt;getting someone who is knowledgeable with&lt;/P&gt;&lt;P&gt;both Cisco and Checkpoint technologies. J/K.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am going to assume that the Checkpoint&lt;/P&gt;&lt;P&gt;External IP address is 200.1.211.138.  Your &lt;/P&gt;&lt;P&gt;Pix external ip address is 10.10.40.1/24?&lt;/P&gt;&lt;P&gt;what is your interesting traffics?  Show me&lt;/P&gt;&lt;P&gt;your ACL address outside1_cryptomap_20.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the checkpoint defined in its Local&lt;/P&gt;&lt;P&gt;Encryption Domain?  What is the remote encryption&lt;/P&gt;&lt;P&gt;domain defined in the InterOperable Device for&lt;/P&gt;&lt;P&gt;the Pix device in Checkpoint?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks to me like you do not have the encryption&lt;/P&gt;&lt;P&gt;match between checkpoint and Cisco.  That's why&lt;/P&gt;&lt;P&gt;it is not working as it should.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One other thing I notice is that you should change&lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 28800 to "isakmp policy 20 &lt;/P&gt;&lt;P&gt;lifetime 86400" and "crypto map outside1_map 20 set &lt;/P&gt;&lt;P&gt;security-association lifetime seconds 7200" to &lt;/P&gt;&lt;P&gt;"crypto map outside1_map 20 set security-association &lt;/P&gt;&lt;P&gt;lifetime seconds 3600" so that it will match with the &lt;/P&gt;&lt;P&gt;default setting on the Checkpoint side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order for me to help you, I need to see your pix&lt;/P&gt;&lt;P&gt;configuration ACL and the entire configuration, not&lt;/P&gt;&lt;P&gt;piecemeal.  It looks to me like you've misconfiguration&lt;/P&gt;&lt;P&gt;on your Pix side.  Until I can see your pix configuration,&lt;/P&gt;&lt;P&gt;very hard to go on from there&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2007 02:03:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896613#M959887</guid>
      <dc:creator>kevin.jones1</dc:creator>
      <dc:date>2007-11-29T02:03:39Z</dc:date>
    </item>
    <item>
      <title>Re: problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896614#M959888</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Keven,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will change the isakmp policy 20 lifetime to 86400 and the security-association lifetime seconds to 3600. attached is my config of the pix. The outside 10.10.40.1 of the pix is nat to 200.X.X.19 on the router side&lt;/P&gt;&lt;P&gt;I appreciate your help and i certainly know what you are worth.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2007 13:21:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896614#M959888</guid>
      <dc:creator>greg-bnets</dc:creator>
      <dc:date>2007-11-29T13:21:40Z</dc:date>
    </item>
    <item>
      <title>Re: problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896615#M959889</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is what I recommend:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) On the Checkpoint side, tell the checkpoint TAC person to include only host 10.10.40.5/32 and 10.10.40.6/32 for the encryption domain&lt;/P&gt;&lt;P&gt;of the Pix Inter-Operable Device&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) On the checkpoint side, tell the checkpoint TAC person to include digicel0, digicel3, digicel4, digicel5, digicelnw1 in his &lt;/P&gt;&lt;P&gt;checkpoint local encryption domain,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) make sure everything in the VPN setting maches on both sides, INCLUDING Perfect&lt;/P&gt;&lt;P&gt;Forward Secrecy (PFS).  There is a checkpoint&lt;/P&gt;&lt;P&gt;in the checkpoint vpn community for that,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at your configuration more carefully,&lt;/P&gt;&lt;P&gt;what you're trying to do will not work&lt;/P&gt;&lt;P&gt;because you're terminating VPN on the outside1&lt;/P&gt;&lt;P&gt;interface (10.10.40.1) and your interesting&lt;/P&gt;&lt;P&gt;traffics is on 10.10.40.5 and 10.10.40.6.&lt;/P&gt;&lt;P&gt;Remember this is a Pix firewall NOT cisco IOS&lt;/P&gt;&lt;P&gt;so what you're trying to do, I do not think will work.  The interesting traffics should&lt;/P&gt;&lt;P&gt;be network not on the same interface as outside1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2007 14:47:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896615#M959889</guid>
      <dc:creator>kevin.jones1</dc:creator>
      <dc:date>2007-11-29T14:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896616#M959890</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Keven,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Checkpoint is configured with VPN connections to other parties as well so the encryption domain could not only consists with my hosts in it.There other settings you suggested are also in place. Host 10.10.40.5 and 10.10.40.6 are actually on the inside of the pix. (having 10.100.10.91 Nat to 10.10.40.5 and 10.100.10.92 nat to 10.10.40.6 on the outside1 interface. The thing is before we implemented the inbound nat rule on the router we could ping each other simultaneously. Only i had to start pinging first. Now only one host can ping. So this is strange.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a possible work around for this?&lt;/P&gt;&lt;P&gt;Thanks again  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2007 15:16:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896616#M959890</guid>
      <dc:creator>greg-bnets</dc:creator>
      <dc:date>2007-11-29T15:16:40Z</dc:date>
    </item>
    <item>
      <title>Re: problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896617#M959891</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Checkpoint local encryption domain can contain&lt;/P&gt;&lt;P&gt;other network besides 10.10.40.5 and 10.10.40.6.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I am referring is the Pix Interoperable&lt;/P&gt;&lt;P&gt;device encryption domain.  It can contains only&lt;/P&gt;&lt;P&gt;host 10.10.40.5 and 10.10.40.6.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You said:&lt;/P&gt;&lt;P&gt;"Host 10.10.40.5 and 10.10.40.6 are actually on the inside of the pix. (having 10.100.10.91 Nat to 10.10.40.5 and 10.100.10.92 nat to 10.10.40.6"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if that is the case then you need to REMOVE this line:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;because this line says NOT TO NAT 10.10.100.91 and 10.10.100.92 when going to the checkpoint side.  Therefore you are telling the checkpoint side that your interesting is&lt;/P&gt;&lt;P&gt;actually  10.10.100.91 and 10.10.100.92 and NOT 10.10.40.5 and 10.10.40.6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;remove this line and it will work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2007 15:26:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896617#M959891</guid>
      <dc:creator>kevin.jones1</dc:creator>
      <dc:date>2007-11-29T15:26:18Z</dc:date>
    </item>
    <item>
      <title>Re: problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896618#M959892</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kevin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the thing I entered the following command on the PIX &lt;/P&gt;&lt;P&gt;no nat (inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What happens now it that i can ping for instance  172 .24.197.10 (company)from 10.10.40.6 and the company can ping 10.10.40.6 just fine. I did this test continuously pinging to each other. Now i started to ping 172.20.41.199 also. I got timeouts. Only when i closed the ping to 172 .24.197.10 i could ping x.xx.199 from the company side the same. I looks like we could only ping one host at a time. Strange thing. Any thoughts on that?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2007 16:23:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896618#M959892</guid>
      <dc:creator>greg-bnets</dc:creator>
      <dc:date>2007-11-29T16:23:26Z</dc:date>
    </item>
    <item>
      <title>Re: problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896619#M959893</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Greg,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I would do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) tell the checkpoint guy to perform "vpn tu"&lt;/P&gt;&lt;P&gt;and clear tunnel between the checkpoint and&lt;/P&gt;&lt;P&gt;the pix,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) what hfa is running on the checkpoint side?&lt;/P&gt;&lt;P&gt;Ask the TAC to run "fw ver" on the firewall&lt;/P&gt;&lt;P&gt;modules and paste in the output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) is it possible for you to ask the checkpoint TAC person to give you the file &lt;/P&gt;&lt;P&gt;ike.elg file while this error occurs?  I can&lt;/P&gt;&lt;P&gt;debug that file and tell exactly what went&lt;/P&gt;&lt;P&gt;wrong.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2007 16:42:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896619#M959893</guid>
      <dc:creator>kevin.jones1</dc:creator>
      <dc:date>2007-11-29T16:42:17Z</dc:date>
    </item>
    <item>
      <title>Re: problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896620#M959894</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kevin,&lt;/P&gt;&lt;P&gt;This is what i got from them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check Point VPN-1(TM) &amp;amp; FireWall-1(R) NGX (R65) - Build 430&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;see the attachment also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks a million&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2007 17:20:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896620#M959894</guid>
      <dc:creator>greg-bnets</dc:creator>
      <dc:date>2007-11-29T17:20:45Z</dc:date>
    </item>
    <item>
      <title>Re: problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896621#M959895</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tell the checkpoint TAC that they should be&lt;/P&gt;&lt;P&gt;running the latest HFA, like what I have below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@NGx_R65-1-P]# fw ver&lt;/P&gt;&lt;P&gt;This is Check Point VPN-1(TM) &amp;amp; FireWall-1(R) NGX (R65) HFA_02, Hotfix 602 - Build 006&lt;/P&gt;&lt;P&gt;[Expert@NGx_R65-1-P]#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Furthermore, when I look at the ike.elg file, everything looks clean.&lt;/P&gt;&lt;P&gt;There is an issue with the tunnel 209.16.112.254 but for the tunnel &lt;/P&gt;&lt;P&gt;200.x.x.19, it looks really clean.  Both phase I and phase II looks &lt;/P&gt;&lt;P&gt;really clean so the configuration on both the checkpoint side &lt;/P&gt;&lt;P&gt;and your side is correct.  There is one thing I am not seeing in &lt;/P&gt;&lt;P&gt;the checkpoint debug file is the Perfect Forward Secrecy part.  Can&lt;/P&gt;&lt;P&gt;you check with checkpoint tac if that is in place?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Last resort will be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) upgrade checkpoint to HFA_02.  They are on HFA_0 now,&lt;/P&gt;&lt;P&gt;2) upgrade your pix 6.3(4) to 6.3(5),&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or if you like you can setup a VPN tunnel with me.  I have&lt;/P&gt;&lt;P&gt;a checkpoint NGx R65 firewall but I am running HFA_02 instead &lt;/P&gt;&lt;P&gt;of HFA_00&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2007 19:12:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896621#M959895</guid>
      <dc:creator>kevin.jones1</dc:creator>
      <dc:date>2007-11-29T19:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896622#M959896</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;kevin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't test with you right now. my email address is &lt;A href="mailto:gregory.tai-apin@bnets.sr"&gt;gregory.tai-apin@bnets.sr&lt;/A&gt;  Is my pix config alright here? i'm sending you a debug of mine right now. and a new of a test we just did.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i can upgrade my pix but upgrading on the checkpoint side is out of the question they say.&lt;/P&gt;&lt;P&gt;Thanks for the offer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2007 20:30:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896622#M959896</guid>
      <dc:creator>greg-bnets</dc:creator>
      <dc:date>2007-11-29T20:30:55Z</dc:date>
    </item>
    <item>
      <title>Re: problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896623#M959897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your Pix configuration looks correct.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are they running Checkpoint on SecurePlatform&lt;/P&gt;&lt;P&gt;or Nokia IP appliance?  I remember running&lt;/P&gt;&lt;P&gt;into this issue about two years ago but that&lt;/P&gt;&lt;P&gt;was between my checkpoint NG AI firewall running&lt;/P&gt;&lt;P&gt;on Secureplatform and the other side is a&lt;/P&gt;&lt;P&gt;Cisco IOS router.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I look at the ike10.elg file and everything&lt;/P&gt;&lt;P&gt;looks good on the checkpoint side.  Both&lt;/P&gt;&lt;P&gt;phase I and Phase II are properly exchanged.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2007 20:50:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896623#M959897</guid>
      <dc:creator>kevin.jones1</dc:creator>
      <dc:date>2007-11-29T20:50:33Z</dc:date>
    </item>
    <item>
      <title>Re: problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896624#M959899</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kevin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't know yet which platform. i will ask them. But have you seen things in de debug 3.txt file? What can you make of it. I will upgrade to 6.3(5) look for the upgrade document online now. As soon as i find it i will upgrade.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2007 20:54:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896624#M959899</guid>
      <dc:creator>greg-bnets</dc:creator>
      <dc:date>2007-11-29T20:54:54Z</dc:date>
    </item>
    <item>
      <title>Re: problems with site to site VPN</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896625#M959902</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;do you have remote access VPN terminate on this&lt;/P&gt;&lt;P&gt;Pix firewall?  your IPSec phase II looks &lt;/P&gt;&lt;P&gt;strange with 0.0.0.0/0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2007 21:06:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-site-to-site-vpn/m-p/896625#M959902</guid>
      <dc:creator>kevin.jones1</dc:creator>
      <dc:date>2007-11-29T21:06:28Z</dc:date>
    </item>
  </channel>
</rss>

