The key is do not do PFS and ensure that you manually bypass the NAT on the
check point side. the config on the PIX side is like this. if you have 

access-list 80 permit ip 10.10.corp.inside 255.255.255.0 host
172.16.other.inside

access-list 200 permit ip 10.10.corp.inside 255.255.255.0 host
172.16.other.inside

nat (inside) 0 access-list 80

crypto ipsec transform-set basic esp-des esp-md5-hmac
crypto map ptp 5 ipsec-isakmp
crypto map ptp 5 match address 200
crypto map ptp 5 set peer 192.168.other.outside
crypto map ptp 5 set transform-set basic

isakmp enable outside

isakmp key ******** address 192.168.other.outside netmask 255.255.255.255
no-xauth no-config-mode

isakmp identity hostname

isakmp policy 2 authentication pre-share
isakmp policy 2 encryption des
isakmp policy 2 hash md5
isakmp policy 2 group 1
isakmp policy 2 lifetime 28800

Check point has a good Documents on how to do both the PIX and Checkpoint
side

when the connection is made errors will occur but it will still work.

-----Original Message-----
From: Miller, Ari [mailto:[EMAIL PROTECTED]]
Sent: Friday, April 06, 2001 1:51 PM
To: [EMAIL PROTECTED]
Subject: PIX to Checkpoint VPN


I understand that, theoretically, Checkpoint and PIX should have no problems
establishing (and keeping) an IPSec tunnel between each other, but what are
the caveats? Do certain versions of one vendor not work with a specific
version of the other?  

Can anyone point me to some documentation that points out the problems?  Or,
better yet, has anyone had problems that they can document for me?

Thanks,
Ari
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to