- CheckMates
- :
- Products
- :
- Quantum
- :
- Remote Access VPN
- :
- IPsec tunnel encryption
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
IPsec tunnel encryption
I am planning create IPsec tunnel between my checkpoint firewall and cisco firewall.
My firewall IP is 10.130.40.50. and I have other interface configured with subnet as 192.168.252.0/24 and 192.168.240.0/24.
in the VPN domain on firewall , If create the encryption domain as 10.130.40.0/24 and if I have the rules to allow the traffic from 192.168.252.0 and 192.168.240.0 to the remote networks behind the cisco firewall, will the traffic encrypted?
or should I include 192.168.252.0/24 and 192.168.240.0/24 also in the encryption domain?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The encryption domain represents the traffic that participates in VPN Tunnel.
If you want traffic from 192.168.252.0/24 and 192.168.240.0/24 traverse the tunnel, must include both networks as group for local encryption domain, so this way the Check Point knows that traffic from those two sources has to be encrypted to reach Cisco's encryption domain.
Regards.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
1. do I need to include the checkpoint firewall IP subnet ( this the interface the tunnel terminated) in the encryption domain?
2. what if I include only the firewall IP subnet in the encryption domain?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
1. You dont need to include the external IP of Check Point Firewall in the encryption domain. By default in Simplified Mode, the external IP addresses of the Gateways participating in the community are included implicitely in the encryption domain, so all traffic between both external IP's is encapsulated inside the tunnel except for IKE and ESP traffic. This is an advantage when you use Check Point Gateways on both ends. The recommendation if you want to reach the 3rd party device is add an exclusion in crypt.def file; otherwise by default the Check Point gateway will try to encrypt traffic such as ping or tcp when the destination is Peer's IP.
2.If you include only the IP, basically you wont be able to negotiate the LAN to LAN tunnel (use your local LANs to traverse across the tunnel). What you do with this is encrypt the traffic from and to the firewall only, which doesnt make sense because you cant use your LAN devices inside the tunnel.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks. one more question. This is with Route based VPN
I read some where we need to have IPSEC/IKE in the excluded services is that true?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
If you will use route based vpn then you will need to create empty groups as encryption domains (This way Route based VPN will take precedence over Domain based VPN in case you have both) because all the encryption is decided according to routing table (vpnt interfaces in GAiA). For more information you always can follow the Official VPN Guide for your version.
Can you explain a little more about the context of IPSEC and IKE as excluded services??
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
In the community ->excluded services - IPsec services (Ah,esp,ike,ike_nat_traversal,skip,vpn1_IPsec_ENCAPSULATION) are excluded.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
Correct. Encryption domain is playing key role in any VPN Tunnel. Traffic which is taking part in VPN need to include in this domain and it must be match at the both end. Subnet mask information also should be same.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
even the encryption didn't match , phase 1 should come up right?even the encryption didn't match , phase 1 should come up right?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yes. If encryption domain is mismatch then you will get error at Phase 2, it will not be UP.
Phase 1 should be UP.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
1.do we need to check"accept all encrypted traffic on box from Encrypted traffic tab? what does it means.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
According to Site to Site VPN Guide:
Regards.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Additional information and details for troubleshooting can be found in sk108600 VPN Site-to-Site with 3rd party and sk44852 How to configure a Site-to-Site VPN with a universal tunnel
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
even the encryption didn't match , phase 1 should come up right?
