Checkpoint S2S VPN to ASA

 Summary

1. Checkpoint GW configuration for S2S VPN

2. Add Interoperable Device for ASA

3. Add VPN Community

4. Add Policy rules.

======================

1. Checkpoint GW configuration for S2S VPN

1.1 "IPSec VPN" blade is selected.




























1.2 Verify network topology

































1.3 Network Management > VPN Domain 










Or set Specific VPN domain for Gateway Communities (R80.40)





















2. Add Interoperable Device for ASA

2.1 Specify remote peer IP address




















2.2 Topology>VPN Domain
















3. Add VPN Community

3.1 Create a Meshed Community, add local and remote gateways to the list































3.2 Configure Phase I and Phase II parameters






































3.3 Tunnel Management, select per subnet pair































3.4 Configure Shared Secret



























3.5 Advanced section to set life time and disable NAT inside the VPN community




 





















4. Verify VPN ip address

by default, main address is selected,  which is the IP in "General Properties" section.






























5. Add rule






6. Note
in case local IP is NATed before go to VPN tunnel
  • Create NAT rule
  • VPN domain includes both real IP and NATed IP
  • Access Rule use original IP

========= Routed base VPN=======

If you configure a Security Gateway for Domain Based VPN and Route Based VPN, Domain Based VPN takes precedence by default.
To force Route Based VPN to take priority, you must create a dummy (empty) group and assign it to the VPN domain


Summary Steps

1

Make sure that the IPsec VPN Software Blade is enabled on the applicable Security Gateways.

2

Create and configure the Security Gateways.

3

Define the VPN community in SmartConsole that includes the two peer Security Gateways.

4

Make Route Based VPN the default option. Do this procedure one time for each Security Management Server.

5

Define the VTI using the Gaia Portal or Gaia Clish.

6

Define Route Based VPN Rules.

7

Save the configuration and install the policy.


3. Create VPN Community
    peer name will be used in VTI creation.

    Set Tunnel Management to "One VPN tunnel per Gateway pair"


4. Create an empty group, point local VPN domain to the empty group

5. Login Gaia, add a VPN tunnel interface. 
Remote peer name is defined in the VPN community.

You must define the two peers in the VPN community before you can define the VTI.

can be numbered or unumbered 




 Add static route



 fetch new interface




















6 Add Access rules






















Directional matching is necessary for Route Based VPN when a VPN community is included in the VPN column in the rule. This is because without bi-directional matching, the rule only applies to connections between a community and an encryption domain (Domain Based Routing).

The directional rule must contain these directional matching conditions:

  • Community > Community
  • Community > Internal_Clear
  • Internal_Clear > Community

MyIntranet is the name of a VPN Community.

Internal_Clear refers to all traffic from IP addresses to and from the specified VPN community.

Note - It is not necessary to define bidirectional matching rules if the VPN column contains the Any value.







Verification:
1. TS will be all "0"
2. VTI has increasing packets.
SG> show interface vpnt1
state on
mac-addr Not configured
type vpnt
link-state not available
mtu 1500
auto-negotiation Not configured
speed N/A
ipv6-autoconfig Not configured
duplex N/A
monitor-mode Not configured
link-speed Not configured
comments
vpn-tunnel-id 1
vpn-peer ASAv
vpn-physical-device eth0
ipv4-address Not Configured
ipv6-address Not Configured
ipv6-local-link-address Not Configured

Statistics:
TX bytes:88032 packets:1048 errors:0 dropped:0 overruns:0 carrier:0
RX bytes:3967824 packets:47236 errors:0 dropped:0 overruns:0 frame:0
SG>




===============Troubleshooting========
1. vpn tu
only view SAs

CP-R80> vpn tu

**********     Select Option     **********

(1)               List all IKE SAs
(2)             * List all IPsec SAs
(3)               List all IKE SAs for a given peer (GW) or user (Client)
(4)             * List all IPsec SAs for a given peer (GW) or user (Client)
(5)               Delete all IPsec SAs for a given peer (GW)
(6)               Delete all IPsec SAs for a given User (Client)
(7)               Delete all IPsec+IKE SAs for a given peer (GW)
(8)               Delete all IPsec+IKE SAs for a given User (Client)
(9)               Delete all IPsec SAs for ALL peers and users
(0)               Delete all IPsec+IKE SAs for ALL peers and users

* To list data for a specific CoreXL instance, append "-i <instance number>" to your selection.

(Q)               Quit

*******************************************









==============
Proxy-ID related issue:

1. ASA is policy-based VPN, Checkpoint is "One VPN tunnel per subnet pair".
   This is recommended configuration.

2. ASA is policy-based VPN, Checkpoint is "One VPN tunnel per Gateway pair".
    Traffic initiates from ASA side can bring up the tunnel quickly, but if the traffic initiate from Checkpoint side, it may take one or two minutes even more to bring up the tunnel.

3. ASA is policy-based VPN, Checkpoint is "One VPN tunnel per host  pair".
  tunnel comes up with host Proxy-ID


==========
How to configure IPsec VPN tunnel between Check Point Security Gateway and Amazon Web Services VPC using static routes
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk100726

How to set up a Site-to-Site VPN with a 3rd-party remote gateway
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk53980

Route Based VPN

https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SitetoSiteVPN_AdminGuide/Topics-VPNSG/Route-Based-VPN.htm

Simplified-Mode vs. Traditional-Mode VPNs





















  





















VPN Troubleshooting Commands

CommandsDescriptions
vpn tuVPN utility, allows you to rekey vpn
vpn ipafile_check ipassignment.conf detail‏Verifies the ipassignment.conf file
dtps licshow desktop policy license status
cpstat -f all polsrvshow status of the dtps
vpn shellStart the VPN shell
vpn shell /tunnels/delete/IKE/peer/[peer ip]delete IKE SA
vpn shell /tunnels/delete/IPsec/peer/[peer ip]delete Phase 2 SA
vpn shell /show/tunnels/ike/peer/[peer ip]show IKE SA
vpn shell /show/tunnels/ipsec/peer/[peer ip]show Phase 2 SA
vpn shell show interface detailed [VTI name]show VTI detail
vpn debug ikeon|ikeoffDebug IKE into $FWDIR/log/ike.elg. Analyze ike.elg with the IKEView tool
vpn debug on|offDebug VPN into $FWDIR/log/vpnd.elg. Analyze vpnd.elg with the IKEView tool
vpn debug truncTruncate and stamp logs, enable IKE & VPN debug
vpn drv statShow status of VPN-1 kernel module
vpn overlap_encdomShow, if any, overlapping VPN domains
vpn macutil <user>Show MAC for Secure Remote user <user>
vpn ver [-k]Check VPN-1 major and minor version as well as build number and latest hotfix. Use -k for kernal version                                                                                                                                                                 











Comments

  1. PureVPN is offering 88% off on early black Friday at just $1.33 per month with multiple features such as 6500+ servers in more than 98 locations, split tunnelling, internet kill switch, no-log privacy, 10 multi logins, 24/7 customer support and much more.

    ReplyDelete

Post a Comment

Popular posts from this blog

Firepower FMC and FTD troubleshooting

ASA IKEv1 VPN troubleshooting Steps and Tips

Firepower 2100/1100 FTD/ASA initial setup, reimage, upgrade.