cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2979
Views
0
Helpful
10
Replies

VPN IPsec issue

ugyen14789
Level 1
Level 1

I am configuring VPN between cisco and checkpoint, phase 1 came up but in phase 2  packets are not encrypted and are not decrypted, I have attached my configuration, please anyone could help on this IWhatsApp Image 2020-05-30 at 12.39.58 PM.jpeg would be grateful

 

 

 

 

10 Replies 10

Hi,

You have PFS (Perfect Forward Secrecy) configured on the cisco router with the command "set pfs group14" but you do not have the tick box "Use Perfect Forward Secrecy) enabled on the Check Point firewall.

 

Either disable PFS on the router (no set pfs group14) or enable it on the Check Point firewall, ensure the same group is defined (group14).

 

Aside from that MD5 is weak and insecure, consider using SHA instead.

 

HTH

Thanks, will try once and if issue still persist will revert to sir

please find the attached debug IPsec log and would like to seek support in troubleshooting the issue

*Jun 1 08:33:48.509: ISAKMP:(1394): IPSec policy invalidated proposal with error 32
*Jun 1 08:33:48.509: ISAKMP:(1394): phase 2 SA policy not acceptable!

*Jun 1 08:33:49.093: IKE Dispatcher: IKEv2 version 2 detected, Dropping packet!
*Jun 1 08:33:58.781: IKE Dispatcher: IKEv2 version 2 detected, Dropping packet!
*Jun 1 08:34:03.861: IKE Dispatcher: IKEv2 version 2 detected, Dropping packet!
*Jun 1 08:34:11.861: IKE Dispatcher: IKEv2 version 2 detected, Dropping packet!
*Jun 1 08:34:23.173: IKE Dispatcher: IKEv2 version 2 detected, Dropping packet!

Change the Check Point configuration to use IKEv1 only instead of "Prefer IKEv2, support IKEv1".
Double check your IPSec/Phase 2 configuration.

when I change ACL to any any, am able to ping other ends global IP but couldn't ping local IP and internet also not working

Dear ,

 

Find below mentioned artical

 

When you are going to create Site2Site vpn from cisco router you should create Route map for No NAT (Subnet which you want to access by VPN)

 

SO please understand below artical

 

https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/14132-ios-D.html

 

Search ACL 101

 

once you will do this configuration you should also check no nat rule should be configured in Checkpoint Also 

 

post please check connectivity it should work

 

I hope you got your answer

 

Regards,

Harmesh Yadav

The issues still coming, couldn't bring up phase 2, please kindly assist us in resolving the issue.

Please recheck access list Informaiton and phase 2 parameter it must match both side as per your debug msg you should check access list and other parameter 

 

Please recheck all phase 2 information and access list with subnet 

 

we need to check checkpoint and Router configuration 

 

Regards,

Harmesh Yadav

 

Dear ,

 

What is the status of Tunnel and in cisco Phase 2 showing up or not 

 

check this command

 

show crypto isakmp sa 

 

show crypto ipsec sa

 

in second command output check all subnet showing or not 

 

And one more thing if you have created access lit in cisco router - In that access list any services should have selected other wise itwill not support

 

and for checkpoint you should check where packet stuck

 

check nating part if checkpoint is doing nating or not 

 

and do you configured proper subnet in VPN domain or not 

 

CHeckpoint Policy also you have to check

 

Regards,

Harmesh Yadav

 

 

Deepak Kumar
VIP Alumni
VIP Alumni

Hi,

Along with can you check your ACL configuration as

ip access-list extended CRST-ACL 
permit ip 10.x.x.0 0.0.0.0 172.x.x0.0 0.0.0.255

I think it would be like 10.x.x.0 0.0.0.255 good answer.  

Regards,
Deepak Kumar,
Don't forget to vote and accept the solution if this comment will help you!