On Thu, Mar 21, 2002 at 02:32:10PM -0600, Kerry Miller wrote:
: We have a client using a CheckPoint VPN, we're trying to use the VPN-1
: SecureClient.  Does anybody know what ports/protocols I need to open for
: this to work through our firewall?  I tried this:

I'm going to make a few assumptions..

1. You're using the Check Point SecuRemote/SecureClient NG version (this
   version is still backward compatible with VPN-1 4.1)
2. You've enabled IKE over TCP in the client
3. You've enabled the "Force UDP Encapsulation" option in the client

The initial network topology download is a TCP connection from a random
local high port to tcp/256 on the remote gateway.

Once you've got the network topology information, the client will 
automagically activate when you try to access a resource in the remote
gateway's "encryption domain".  

Since you've enabled IKE over TCP, your initial authentication with the
remote gateway will be tcp/500 on the local client to tcp/500 on the 
remote side.  Once you've gone through IKE phase I and phase II, you won't
transmit any more IKE packets, until your SAs are due to renegotiate.

Once IKE/IPSec is up, your ESP traffic will be encapsulated inside UDP
packets that are of the format local client udp/2746 <--> gateway udp/2746.

In order to get this to work with ipchains, I believe you'll need to use
the ipsec_masq modules.  If you convert to iptables, which I HIGHLY 
recommend, you'll get this for "free", no additional configuration.

I'll email you a packet trace privately.

-- 
Jason Costomiris <><           |  Technologist, geek, human.
jcostom {at} jasons {dot} org  |  http://www.jasons.org/ 
          Quidquid latine dictum sit, altum viditur.
                    My account, My opinions.



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to