On Thu, Mar 21, 2002 at 02:32:10PM -0600, Kerry Miller wrote: : We have a client using a CheckPoint VPN, we're trying to use the VPN-1 : SecureClient. Does anybody know what ports/protocols I need to open for : this to work through our firewall? I tried this:
I'm going to make a few assumptions.. 1. You're using the Check Point SecuRemote/SecureClient NG version (this version is still backward compatible with VPN-1 4.1) 2. You've enabled IKE over TCP in the client 3. You've enabled the "Force UDP Encapsulation" option in the client The initial network topology download is a TCP connection from a random local high port to tcp/256 on the remote gateway. Once you've got the network topology information, the client will automagically activate when you try to access a resource in the remote gateway's "encryption domain". Since you've enabled IKE over TCP, your initial authentication with the remote gateway will be tcp/500 on the local client to tcp/500 on the remote side. Once you've gone through IKE phase I and phase II, you won't transmit any more IKE packets, until your SAs are due to renegotiate. Once IKE/IPSec is up, your ESP traffic will be encapsulated inside UDP packets that are of the format local client udp/2746 <--> gateway udp/2746. In order to get this to work with ipchains, I believe you'll need to use the ipsec_masq modules. If you convert to iptables, which I HIGHLY recommend, you'll get this for "free", no additional configuration. I'll email you a packet trace privately. -- Jason Costomiris <>< | Technologist, geek, human. jcostom {at} jasons {dot} org | http://www.jasons.org/ Quidquid latine dictum sit, altum viditur. My account, My opinions. _______________________________________________ Redhat-list mailing list [EMAIL PROTECTED] https://listman.redhat.com/mailman/listinfo/redhat-list